Cargando…

Advances in Computer Science and Information Technology AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings /

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Kim, Tai-hoon (Editor ), Adeli, Hojjat (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 6059
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Information Security and Assurance
  • Fuzzy Based Threat Analysis in Total Hospital Information System
  • An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
  • A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition
  • Information Systems Security Criticality and Assurance Evaluation
  • Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'
  • Directed Graph Pattern Synthesis in LSB Technique on Video Steganography
  • Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning
  • Post-quantum Cryptography: Code-Based Signatures
  • Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol
  • A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems
  • An Active Intrusion Detection System for LAN Specific Attacks
  • Analysis on the Improved SVD-Based Watermarking Scheme
  • Advanced Communication and Networking
  • Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes
  • Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks
  • Grammar Encoding in DNA-Like Secret Sharing Infrastructure
  • HATS: High Accuracy Timestamping System Based on NetFPGA
  • A Roadside Unit Placement Scheme for Vehicular Telematics Networks
  • Concurrent Covert Communication Channels
  • Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks
  • High Performance MAC Architecture for 3GPP Modem
  • Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T
  • A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network
  • A Model for Interference on Links in Inter-working Multi-hop Wireless Networks
  • An Optimum ICA Based Multiuser Data Separation for Short Message Service
  • Advanced Computer Science and Information Technology
  • Multiple Asynchronous Requests on a Client-Based Mashup Page
  • Using an Integrated Ontology Database to Categorize Web Pages
  • Topic Detection by Topic Model Induced Distance Using Biased Initiation
  • Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm
  • Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
  • Agent Based Approach to Regression Testing
  • A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem
  • Development of a Digital Textbook Standard Format Based on XML
  • A Pattern-Based Representation Approach for Online Discourses
  • A Fault Tolerant Architecture for Transportation Information Services of E-Government
  • Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS
  • Extract Semantic Information from WordNet to Improve Text Classification Performance
  • Managing Ubiquitous Scientific Knowledge on Semantic Web
  • A Semantic Pattern Approach to Managing Scientific Publications
  • A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults
  • Markov Chain Monte Carlo Random Testing
  • An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics
  • Ubiquitous Computing and Multimedia Applications
  • An Effective Video Steganography Method for Biometric Identification
  • A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction
  • Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis
  • Video Copy Detection: Sequence Matching Using Hypothesis Test
  • An XML-Based Digital Textbook and Its Educational Effectiveness
  • SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition
  • Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network
  • A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming
  • Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech
  • CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture
  • A Power Control Scheme for an Energy-Efficient MAC Protocol
  • Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.