Contemporary Computing [electronic resource] : Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings / edited by Sanjay Ranka, Srinivas Aluru, Rajkumar Buyya, Yeh-Ching Chung, Sumeet Dua, Ananth Grama, Sandeep K. S. Gupta, Rajeev Kumar, Vir V. Phoha.

Contributor(s): Ranka, Sanjay [editor.] | Aluru, Srinivas [editor.] | Buyya, Rajkumar [editor.] | Chung, Yeh-Ching [editor.] | Dua, Sumeet [editor.] | Grama, Ananth [editor.] | Gupta, Sandeep K. S [editor.] | Kumar, Rajeev [editor.] | Phoha, Vir V [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Communications in Computer and Information Science ; 40Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009Description: XVIII, 662 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642035470Subject(s): Life sciences | Computer programming | Algorithms | Pattern recognition | Application software | Bioinformatics | Life Sciences | Life Sciences, general | Programming Techniques | Pattern Recognition | Algorithm Analysis and Problem Complexity | Computational Biology/Bioinformatics | Computer ApplicationsAdditional physical formats: Printed edition:: No titleDDC classification: 570 LOC classification: QH301-705Online resources: Click here to access online
Contents:
Technical Session-1: Algorithm-1 (AL-1) -- A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling -- PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images -- A New Position-Based Fast Radix-2 Algorithm for Computing the DHT -- Study of Bit-Parallel Approximate Parameterized String Matching Algorithms -- Optimization of Finite Difference Method with Multiwavelet Bases -- Technical Session-2: Algorithm-2 (AL-2) -- A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks -- A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks -- An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems -- Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip -- A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching -- Technical Session-3: Algorithm-3 (AL-3) -- Optimized Graph Search Using Multi-Level Graph Clustering -- An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns -- A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization -- Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts -- Local Subspace Based Outlier Detection -- New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions -- Technical Session-4: Algorithm-4 (AL-4) -- On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks -- On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature -- Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands -- Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties -- Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame -- Technical Session-5: Application-1 (AP-1) -- Secure Receipt-Free Sealed-Bid Electronic Auction -- An Architecture for Handling Fuzzy Queries in Data Warehouses -- Palmprint Based Verification System Using SURF Features -- A Personnel Centric Knowledge Management System -- Technical Session-6: Application-2 (AP-2) -- A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks -- Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach -- CDIS: Circle Density Based Iris Segmentation -- Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines -- Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine -- Technical Session-7: Application-3 (AP-3) -- Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing -- Vehicular Traffic Control: A Ubiquitous Computing Approach -- Application of Particle Swarm Optimization Algorithm for Better Nano-Devices -- Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES -- Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip -- Technical Session-8: Application-4 (AP-4) -- Color Image Restoration Using Morphological Detectors and Adaptive Filter -- Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography -- An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions -- Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors -- Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions -- Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks -- Technical Session-9: Bioinformatics-1 (B-1) -- Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology -- Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide -- IDChase: Mitigating Identifier Migration Trap in Biological Databases -- Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships -- IITKGP-SESC: Speech Database for Emotion Analysis -- Technical Session-10: Bioinformatics-2 (B-2) -- Detection of Splice Sites Using Support Vector Machine -- Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides -- Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach -- FCM for Gene Expression Bioinformatics Data -- Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection -- Technical Session-11: System-1 (S-1) -- An Electronically Tunable SIMO Biquad Filter Using CCCCTA -- An Architecture for Cross-Cloud System Management -- Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models -- Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic -- Energy-Constrained Scheduling of DAGs on Multi-core Processors -- Technical Session-12: System-2 (S-2) -- Evaluation of Code and Data Spatial Complexity Measures -- Pitcherpot: Avoiding Honeypot Detection -- Verification of Liveness Properties in Distributed Systems -- InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices -- Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Technical Session-1: Algorithm-1 (AL-1) -- A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling -- PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images -- A New Position-Based Fast Radix-2 Algorithm for Computing the DHT -- Study of Bit-Parallel Approximate Parameterized String Matching Algorithms -- Optimization of Finite Difference Method with Multiwavelet Bases -- Technical Session-2: Algorithm-2 (AL-2) -- A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks -- A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks -- An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems -- Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip -- A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching -- Technical Session-3: Algorithm-3 (AL-3) -- Optimized Graph Search Using Multi-Level Graph Clustering -- An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns -- A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization -- Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts -- Local Subspace Based Outlier Detection -- New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions -- Technical Session-4: Algorithm-4 (AL-4) -- On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks -- On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature -- Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands -- Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties -- Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame -- Technical Session-5: Application-1 (AP-1) -- Secure Receipt-Free Sealed-Bid Electronic Auction -- An Architecture for Handling Fuzzy Queries in Data Warehouses -- Palmprint Based Verification System Using SURF Features -- A Personnel Centric Knowledge Management System -- Technical Session-6: Application-2 (AP-2) -- A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks -- Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach -- CDIS: Circle Density Based Iris Segmentation -- Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines -- Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine -- Technical Session-7: Application-3 (AP-3) -- Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing -- Vehicular Traffic Control: A Ubiquitous Computing Approach -- Application of Particle Swarm Optimization Algorithm for Better Nano-Devices -- Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES -- Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip -- Technical Session-8: Application-4 (AP-4) -- Color Image Restoration Using Morphological Detectors and Adaptive Filter -- Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography -- An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions -- Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors -- Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions -- Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks -- Technical Session-9: Bioinformatics-1 (B-1) -- Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology -- Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide -- IDChase: Mitigating Identifier Migration Trap in Biological Databases -- Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships -- IITKGP-SESC: Speech Database for Emotion Analysis -- Technical Session-10: Bioinformatics-2 (B-2) -- Detection of Splice Sites Using Support Vector Machine -- Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides -- Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach -- FCM for Gene Expression Bioinformatics Data -- Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection -- Technical Session-11: System-1 (S-1) -- An Electronically Tunable SIMO Biquad Filter Using CCCCTA -- An Architecture for Cross-Cloud System Management -- Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models -- Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic -- Energy-Constrained Scheduling of DAGs on Multi-core Processors -- Technical Session-12: System-2 (S-2) -- Evaluation of Code and Data Spatial Complexity Measures -- Pitcherpot: Avoiding Honeypot Detection -- Verification of Liveness Properties in Distributed Systems -- InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices -- Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup.

There are no comments on this title.

to post a comment.

Powered by Koha