Advances in Computer Science and Information Technology
Home > Computing and Information Technology > Computer hardware > Network hardware > Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings(Information Systems and Applications, incl. Internet/Web, and HCI)
Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings(Information Systems and Applications, incl. Internet/Web, and HCI)

Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings(Information Systems and Applications, incl. Internet/Web, and HCI)

|
     0     
5
4
3
2
1




International Edition


About the Book

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.

Table of Contents:
Information Security and Assurance.- Fuzzy Based Threat Analysis in Total Hospital Information System.- An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model.- A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition.- Information Systems Security Criticality and Assurance Evaluation.- Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’.- Directed Graph Pattern Synthesis in LSB Technique on Video Steganography.- Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning.- Post-quantum Cryptography: Code-Based Signatures.- Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol.- A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems.- An Active Intrusion Detection System for LAN Specific Attacks.- Analysis on the Improved SVD-Based Watermarking Scheme.- Advanced Communication and Networking.- Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes.- Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks.- Grammar Encoding in DNA-Like Secret Sharing Infrastructure.- HATS: High Accuracy Timestamping System Based on NetFPGA.- A Roadside Unit Placement Scheme for Vehicular Telematics Networks.- Concurrent Covert Communication Channels.- Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks.- High Performance MAC Architecture for 3GPP Modem.- Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T.- A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network.- A Model for Interference on Links in Inter-working Multi-hop Wireless Networks.- An Optimum ICA Based Multiuser Data Separation for Short Message Service.- Advanced Computer Science and Information Technology.- Multiple Asynchronous Requests on a Client-Based Mashup Page.- Using an Integrated Ontology Database to Categorize Web Pages.- Topic Detection by Topic Model Induced Distance Using Biased Initiation.- Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm.- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition.- Agent Based Approach to Regression Testing.- A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem.- Development of a Digital Textbook Standard Format Based on XML.- A Pattern-Based Representation Approach for Online Discourses.- A Fault Tolerant Architecture for Transportation Information Services of E-Government.- Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS.- Extract Semantic Information from WordNet to Improve Text Classification Performance.- Managing Ubiquitous Scientific Knowledge on Semantic Web.- A Semantic Pattern Approach to Managing Scientific Publications.- A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults.- Markov Chain Monte Carlo Random Testing.- An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics.- Ubiquitous Computing and Multimedia Applications.- An Effective Video Steganography Method for Biometric Identification.- A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction.- Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis.- Video Copy Detection: Sequence Matching Using Hypothesis Test.- An XML-Based Digital Textbook and Its Educational Effectiveness.- SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition.- Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network.- A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming.- Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech.- CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture.- A Power Control Scheme for an Energy-Efficient MAC Protocol.- Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.


Best Sellers


Product Details
  • ISBN-13: 9783642135767
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
  • Publisher Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: English
  • Returnable: Y
  • Series Title: 6059 Lecture Notes in Computer Science
  • ISBN-10: 3642135765
  • Publisher Date: 01 Jun 2010
  • Binding: Paperback
  • No of Pages: 604
  • Series Title: Information Systems and Applications, incl. Internet/Web, and HCI
  • Sub Title: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings(Information Systems and Applications, incl. Internet/Web, and HCI)
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG -
Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings(Information Systems and Applications, incl. Internet/Web, and HCI)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings(Information Systems and Applications, incl. Internet/Web, and HCI)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!