Advances in Computer Science and Information Technology AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings /
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Information Systems and Applications, incl. Internet/Web, and HCI ;
6059 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Information Security and Assurance
- Fuzzy Based Threat Analysis in Total Hospital Information System
- An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
- A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition
- Information Systems Security Criticality and Assurance Evaluation
- Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'
- Directed Graph Pattern Synthesis in LSB Technique on Video Steganography
- Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning
- Post-quantum Cryptography: Code-Based Signatures
- Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol
- A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems
- An Active Intrusion Detection System for LAN Specific Attacks
- Analysis on the Improved SVD-Based Watermarking Scheme
- Advanced Communication and Networking
- Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes
- Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks
- Grammar Encoding in DNA-Like Secret Sharing Infrastructure
- HATS: High Accuracy Timestamping System Based on NetFPGA
- A Roadside Unit Placement Scheme for Vehicular Telematics Networks
- Concurrent Covert Communication Channels
- Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks
- High Performance MAC Architecture for 3GPP Modem
- Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T
- A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network
- A Model for Interference on Links in Inter-working Multi-hop Wireless Networks
- An Optimum ICA Based Multiuser Data Separation for Short Message Service
- Advanced Computer Science and Information Technology
- Multiple Asynchronous Requests on a Client-Based Mashup Page
- Using an Integrated Ontology Database to Categorize Web Pages
- Topic Detection by Topic Model Induced Distance Using Biased Initiation
- Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm
- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
- Agent Based Approach to Regression Testing
- A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem
- Development of a Digital Textbook Standard Format Based on XML
- A Pattern-Based Representation Approach for Online Discourses
- A Fault Tolerant Architecture for Transportation Information Services of E-Government
- Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS
- Extract Semantic Information from WordNet to Improve Text Classification Performance
- Managing Ubiquitous Scientific Knowledge on Semantic Web
- A Semantic Pattern Approach to Managing Scientific Publications
- A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults
- Markov Chain Monte Carlo Random Testing
- An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics
- Ubiquitous Computing and Multimedia Applications
- An Effective Video Steganography Method for Biometric Identification
- A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction
- Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis
- Video Copy Detection: Sequence Matching Using Hypothesis Test
- An XML-Based Digital Textbook and Its Educational Effectiveness
- SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition
- Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network
- A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming
- Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech
- CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture
- A Power Control Scheme for an Energy-Efficient MAC Protocol
- Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.