Contemporary Computing (eBook, PDF)
Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings
Redaktion: Ranka, Sanjay; Dua, Sumeet; Phoha, Vir V.; Kumar, Rajeev; Grama, Ananth; Gupta, Sandeep; Chung, Yeh-Ching; Buyya, Rajkumar; Aluru, Srinivas
73,95 €
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
37 °P sammeln
73,95 €
Als Download kaufen
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
37 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
37 °P sammeln
Contemporary Computing (eBook, PDF)
Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings
Redaktion: Ranka, Sanjay; Dua, Sumeet; Phoha, Vir V.; Kumar, Rajeev; Grama, Ananth; Gupta, Sandeep; Chung, Yeh-Ching; Buyya, Rajkumar; Aluru, Srinivas
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed papers of the 2nd International Conference on Contemporary Computing, which was held in Noida (New Delhi), India, in August 2009. The 61 revised full papers presented were carefully reviewed and selected from 213 submissions and focus on topics that are of contemporary interest to computer and computational scientists and engineers. The papers are organized in topical sections on Algorithms, Applications, Bioinformatics, and Systems.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 16.13MB
Andere Kunden interessierten sich auch für
- Bioinformatics Research and Applications (eBook, PDF)40,95 €
- Bioinformatics Research and Applications (eBook, PDF)40,95 €
- Advances in Bioinformatics and Computational Biology (eBook, PDF)32,95 €
- Pattern Recognition in Bioinformatics (eBook, PDF)32,95 €
- Computational Intelligence Methods for Bioinformatics and Biostatistics (eBook, PDF)36,95 €
- Pattern Recognition in Bioinformatics (eBook, PDF)40,95 €
- Pattern Recognition in Bioinformatics (eBook, PDF)36,95 €
-
-
-
This book constitutes the refereed papers of the 2nd International Conference on Contemporary Computing, which was held in Noida (New Delhi), India, in August 2009. The 61 revised full papers presented were carefully reviewed and selected from 213 submissions and focus on topics that are of contemporary interest to computer and computational scientists and engineers. The papers are organized in topical sections on Algorithms, Applications, Bioinformatics, and Systems.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 662
- Erscheinungstermin: 19. August 2009
- Englisch
- ISBN-13: 9783642035470
- Artikelnr.: 43884934
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 662
- Erscheinungstermin: 19. August 2009
- Englisch
- ISBN-13: 9783642035470
- Artikelnr.: 43884934
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Rajkumar Buyya is Co-Chair of the IEEE Task Force on Cluster Computing and an international speaker in the IEEE Computer Society Chapter Tutorials Program. Currently at Monash University, Melbourne, Australia, he is conducting R&D on the use of an economics paradigm for peer-to-peer and grid-based service-oriented computing. He has co-authored Microprocessor x86 Programming and Mastering C++, and edited a popular two-volume book on high performance cluster computing. He has published over 50 research articles in major international journals and conferences.
Technical Session-1: Algorithm-1 (AL-1).- A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling.- PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images.- A New Position-Based Fast Radix-2 Algorithm for Computing the DHT.- Study of Bit-Parallel Approximate Parameterized String Matching Algorithms.- Optimization of Finite Difference Method with Multiwavelet Bases.- Technical Session-2: Algorithm-2 (AL-2).- A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks.- A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks.- An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems.- Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip.- A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching.- Technical Session-3: Algorithm-3 (AL-3).- Optimized Graph Search Using Multi-Level Graph Clustering.- An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns.- A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization.- Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts.- Local Subspace Based Outlier Detection.- New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions.- Technical Session-4: Algorithm-4 (AL-4).- On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks.- On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature.- Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands.- Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties.- Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame.- Technical Session-5: Application-1 (AP-1).- Secure Receipt-Free Sealed-Bid Electronic Auction.- An Architecture for Handling Fuzzy Queries in Data Warehouses.- Palmprint Based Verification System Using SURF Features.- A Personnel Centric Knowledge Management System.- Technical Session-6: Application-2 (AP-2).- A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks.- Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach.- CDIS: Circle Density Based Iris Segmentation.- Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines.- Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine.- Technical Session-7: Application-3 (AP-3).- Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing.- Vehicular Traffic Control: A Ubiquitous Computing Approach.- Application of Particle Swarm Optimization Algorithm for Better Nano-Devices.- Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES.- Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip.- Technical Session-8: Application-4 (AP-4).- Color Image Restoration Using Morphological Detectors and Adaptive Filter.- Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography.- An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions.- Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors.- Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions.- Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks.- Technical Session-9: Bioinformatics-1 (B-1).- Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology.- Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide.- IDChase: Mitigating Identifier Migration Trap in Biological Databases.- Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships.- IITKGP-SESC: Speech Database for Emotion Analysis.- Technical Session-10: Bioinformatics-2 (B-2).- Detection of Splice Sites Using Support Vector Machine.- Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides.- Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach.- FCM for Gene Expression Bioinformatics Data.- Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection.- Technical Session-11: System-1 (S-1).- An Electronically Tunable SIMO Biquad Filter Using CCCCTA.- An Architecture for Cross-Cloud System Management.- Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models.- Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic.- Energy-Constrained Scheduling of DAGs on Multi-core Processors.- Technical Session-12: System-2 (S-2).- Evaluation of Code and Data Spatial Complexity Measures.- Pitcherpot: Avoiding Honeypot Detection.- Verification of Liveness Properties in Distributed Systems.- InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile ComputingDevices.- Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup.
Technical Session-1: Algorithm-1 (AL-1).- A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling.- PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images.- A New Position-Based Fast Radix-2 Algorithm for Computing the DHT.- Study of Bit-Parallel Approximate Parameterized String Matching Algorithms.- Optimization of Finite Difference Method with Multiwavelet Bases.- Technical Session-2: Algorithm-2 (AL-2).- A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks.- A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks.- An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems.- Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip.- A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching.- Technical Session-3: Algorithm-3 (AL-3).- Optimized Graph Search Using Multi-Level Graph Clustering.- An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns.- A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization.- Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts.- Local Subspace Based Outlier Detection.- New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions.- Technical Session-4: Algorithm-4 (AL-4).- On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks.- On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature.- Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands.- Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties.- Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame.- Technical Session-5: Application-1 (AP-1).- Secure Receipt-Free Sealed-Bid Electronic Auction.- An Architecture for Handling Fuzzy Queries in Data Warehouses.- Palmprint Based Verification System Using SURF Features.- A Personnel Centric Knowledge Management System.- Technical Session-6: Application-2 (AP-2).- A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks.- Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach.- CDIS: Circle Density Based Iris Segmentation.- Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines.- Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine.- Technical Session-7: Application-3 (AP-3).- Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing.- Vehicular Traffic Control: A Ubiquitous Computing Approach.- Application of Particle Swarm Optimization Algorithm for Better Nano-Devices.- Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES.- Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip.- Technical Session-8: Application-4 (AP-4).- Color Image Restoration Using Morphological Detectors and Adaptive Filter.- Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography.- An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions.- Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors.- Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions.- Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks.- Technical Session-9: Bioinformatics-1 (B-1).- Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology.- Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide.- IDChase: Mitigating Identifier Migration Trap in Biological Databases.- Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships.- IITKGP-SESC: Speech Database for Emotion Analysis.- Technical Session-10: Bioinformatics-2 (B-2).- Detection of Splice Sites Using Support Vector Machine.- Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides.- Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach.- FCM for Gene Expression Bioinformatics Data.- Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection.- Technical Session-11: System-1 (S-1).- An Electronically Tunable SIMO Biquad Filter Using CCCCTA.- An Architecture for Cross-Cloud System Management.- Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models.- Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic.- Energy-Constrained Scheduling of DAGs on Multi-core Processors.- Technical Session-12: System-2 (S-2).- Evaluation of Code and Data Spatial Complexity Measures.- Pitcherpot: Avoiding Honeypot Detection.- Verification of Liveness Properties in Distributed Systems.- InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile ComputingDevices.- Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup.