Contemporary Computing [electronic resource] : Third International Conference, IC3 2010, Noida, India, August 9-11, 2010, Proceedings, Part II / edited by Sanjay Ranka, Arunava Banerjee, Kanad Kishore Biswas, Sumeet Dua, Prabhat Mishra, Rajat Moona, Sheung-Hung Poon, Cho-Li Wang.
Material type:
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
Bangalore University Library | Available | BUSP015216 |
Technical Session-12: System-1 (S-1) -- Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization -- Efficient Storage of Massive Biological Sequences in Compact Form -- Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing -- An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture -- Event-Based Metric for Computing System Complexity -- Technical Session-13: System-2 (S-2) -- Load Balancing in Xen Virtual Machine Monitor -- Aerial Vehicle Based Sensing Framework for Structural Health Monitoring -- A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks -- Modeling and Simulation of Efficient March Algorithm for Memory Testing -- A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism -- Technical Session-14: System-3 (S-3) -- Detection of Polymorphic Viruses in Windows Executables -- Sensitivity Measurement of Neural Hardware: A Simulation Based Study -- An Approach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools -- A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams -- Technical Session-15: System-4 (S-4) -- Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring -- Test Process Model with Enhanced Approach of State Variable -- Re-engineering Machine Translation Systems through Symbiotic Approach -- Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network -- Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph -- Technical Session-16: System-6 (S-6) -- Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm -- Hardware and Software Co-Design for Robot Arm -- Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP -- Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages.�������������������������������������������������������������������������������������������������.
There are no comments on this title.