Contemporary Computing Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Σειρά: | Communications in Computer and Information Science,
40 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Technical Session-1: Algorithm-1 (AL-1)
- A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling
- PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images
- A New Position-Based Fast Radix-2 Algorithm for Computing the DHT
- Study of Bit-Parallel Approximate Parameterized String Matching Algorithms
- Optimization of Finite Difference Method with Multiwavelet Bases
- Technical Session-2: Algorithm-2 (AL-2)
- A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks
- A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks
- An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems
- Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip
- A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching
- Technical Session-3: Algorithm-3 (AL-3)
- Optimized Graph Search Using Multi-Level Graph Clustering
- An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns
- A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization
- Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts
- Local Subspace Based Outlier Detection
- New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions
- Technical Session-4: Algorithm-4 (AL-4)
- On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks
- On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature
- Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands
- Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties
- Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame
- Technical Session-5: Application-1 (AP-1)
- Secure Receipt-Free Sealed-Bid Electronic Auction
- An Architecture for Handling Fuzzy Queries in Data Warehouses
- Palmprint Based Verification System Using SURF Features
- A Personnel Centric Knowledge Management System
- Technical Session-6: Application-2 (AP-2)
- A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks
- Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach
- CDIS: Circle Density Based Iris Segmentation
- Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines
- Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine
- Technical Session-7: Application-3 (AP-3)
- Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing
- Vehicular Traffic Control: A Ubiquitous Computing Approach
- Application of Particle Swarm Optimization Algorithm for Better Nano-Devices
- Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES
- Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip
- Technical Session-8: Application-4 (AP-4)
- Color Image Restoration Using Morphological Detectors and Adaptive Filter
- Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography
- An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions
- Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors
- Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions
- Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks
- Technical Session-9: Bioinformatics-1 (B-1)
- Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology
- Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide
- IDChase: Mitigating Identifier Migration Trap in Biological Databases
- Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships
- IITKGP-SESC: Speech Database for Emotion Analysis
- Technical Session-10: Bioinformatics-2 (B-2)
- Detection of Splice Sites Using Support Vector Machine
- Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides
- Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach
- FCM for Gene Expression Bioinformatics Data
- Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection
- Technical Session-11: System-1 (S-1)
- An Electronically Tunable SIMO Biquad Filter Using CCCCTA
- An Architecture for Cross-Cloud System Management
- Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models
- Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic
- Energy-Constrained Scheduling of DAGs on Multi-core Processors
- Technical Session-12: System-2 (S-2)
- Evaluation of Code and Data Spatial Complexity Measures
- Pitcherpot: Avoiding Honeypot Detection
- Verification of Liveness Properties in Distributed Systems
- InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices
- Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup.