Contemporary Computing
Springer Berlin (Verlag)
978-3-642-14824-8 (ISBN)
This book constitutes the second part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010.
The 23 revised full papers presented were carefully reviewed and selected from numerous submissions.
Technical Session-12: System-1 (S-1).- Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization.- Efficient Storage of Massive Biological Sequences in Compact Form.- Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing.- An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture.- Event-Based Metric for Computing System Complexity.- Technical Session-13: System-2 (S-2).- Load Balancing in Xen Virtual Machine Monitor.- Aerial Vehicle Based Sensing Framework for Structural Health Monitoring.- A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks.- Modeling and Simulation of Efficient March Algorithm for Memory Testing.- A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism.- Technical Session-14: System-3 (S-3).- Detection of Polymorphic Viruses in Windows Executables.- Sensitivity Measurement of Neural Hardware: A Simulation Based Study.- AnApproach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools.- A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams.- Technical Session-15: System-4 (S-4).- Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring.- Test Process Model with Enhanced Approach of State Variable.- Re-engineering Machine Translation Systems through Symbiotic Approach.- Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network.- Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph.- Technical Session-16: System-6 (S-6).- Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm.- Hardware and Software Co-Design for Robot Arm.- Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.- Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages.
Erscheint lt. Verlag | 26.7.2010 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | XXIV, 275 p. 134 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
Schlagworte | ad hoc networks • Algorithm analysis and problem complexity • algorithms • Cloud Computing • Complexity • Fuzzy Logic • image reconstruction • JPEG • JPEG 2000 • MJPEG • Routing • Scheduling • Watermarking |
ISBN-10 | 3-642-14824-7 / 3642148247 |
ISBN-13 | 978-3-642-14824-8 / 9783642148248 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich