Contemporary Computing

Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part II
Buch | Softcover
XXIV, 275 Seiten
2010 | 2010
Springer Berlin (Verlag)
978-3-642-14824-8 (ISBN)
53,49 inkl. MwSt

This book constitutes the second part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010. 

The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. 

Technical Session-12: System-1 (S-1).- Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization.- Efficient Storage of Massive Biological Sequences in Compact Form.- Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing.- An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture.- Event-Based Metric for Computing System Complexity.- Technical Session-13: System-2 (S-2).- Load Balancing in Xen Virtual Machine Monitor.- Aerial Vehicle Based Sensing Framework for Structural Health Monitoring.- A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks.- Modeling and Simulation of Efficient March Algorithm for Memory Testing.- A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism.- Technical Session-14: System-3 (S-3).- Detection of Polymorphic Viruses in Windows Executables.- Sensitivity Measurement of Neural Hardware: A Simulation Based Study.- AnApproach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools.- A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams.- Technical Session-15: System-4 (S-4).- Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring.- Test Process Model with Enhanced Approach of State Variable.- Re-engineering Machine Translation Systems through Symbiotic Approach.- Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network.- Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph.- Technical Session-16: System-6 (S-6).- Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm.- Hardware and Software Co-Design for Robot Arm.- Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.- Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages.                                                                                                 

Erscheint lt. Verlag 26.7.2010
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo XXIV, 275 p. 134 illus.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte ad hoc networks • Algorithm analysis and problem complexity • algorithms • Cloud Computing • Complexity • Fuzzy Logic • image reconstruction • JPEG • JPEG 2000 • MJPEG • Routing • Scheduling • Watermarking
ISBN-10 3-642-14824-7 / 3642148247
ISBN-13 978-3-642-14824-8 / 9783642148248
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
Mehr entdecken
aus dem Bereich
von absurd bis tödlich: Die Tücken der künstlichen Intelligenz

von Katharina Zweig

Buch | Softcover (2023)
Heyne (Verlag)
20,00
menschliches Denken und künstliche Intelligenz

von Manuela Lenzen

Buch | Softcover (2023)
C.H.Beck (Verlag)
20,00