Limit search to available items
Book Cover
E-book
Author International Conference on Computer Science and Information Technology (2011- ) (2nd : 2012 : Bangalore, India)

Title Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings. Part III / Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xvii, 567 pages)
Series Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-8211 ; 86
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 86.
Contents Part 1. Advances in Computer Science and Information Technology -- Driving Hazards Message Propagation Using Road Side Infrastructure in VANETs -- Policy Based Distributed Run Time Fault Diagnoser Model for Web Services -- The Reconstruction Conjecture -- Collaborative Framework for Distributed Computing in P2P Network -- Minimizing Boolean Sum of Products Functions Using Binary Decision Diagram -- Compression of Gray Scale Images Using Linear Prediction on Wavelet Coefficients -- An Innovative Approach to Association Rule Mining Using Graph and Clusters -- Policy Based Accounting for Web Services -- Fusion Based Linked Object Web Ranking for Social Networks -- Comparing Supervised Learning Classifiers to Detect Advanced Fee Fraud Activities on Internet -- Algebra of Geometric Filters Defined over Three Dimenisonal Rectangular Lattice-PartI -- Finite State Transducers Framework for Monitors Conflict Detection and Resolution -- Real Time Facial Expression Recognition -- Face Recognition System in Cell Phones Based on Text Message Service -- Requirements Volatility in Software Maintenance -- Information Security Measurement and E-Governance -- Comparison of Efficient and Rand Index Fitness Function for Clustering Gene Expression Data -- A Novel Hybrid Fuzzy Multi-Objective Evolutionary Algorithm: HFMOEA -- Testability Estimation Model (TEMOOD) -- Generation of All Spanning Trees in the Limelight -- A New Encryption Method for Secured Message Passing by Sorting Technique -- Algorithm for Constructing Complete Distributive Lattice of Polyhedrons Defined over Three Dimensional Rectangular Grid- Part II -- Enhancing the Network Security Using Lexicographic Game -- Spectral Characterization of Rank Filters Based Directional Textures of Digital Images Using Rajan Transform -- Enlargement of Clinical Stemmer in Hindi Language for Homoeopathy Province -- Fuzziness in Text Classification Using Different Similarity Metrics -- Image Compression over Low Channel Bandwidth -- Fuzzy Identification of Geometric Shapes -- Towards Perception Based Image Retrieval -- Estimation of f-Similarity in f-Triangles Using FIS -- Survey on Image Compression Techniques: Using CVIP Tools -- Developing Hindi POS Tagger for Homoeopathy Clinical Language -- Wireless Sensor Network Security -- Recent Developments in Scheduling and Allocation of High Level Synthesis -- Digital Signature of an Image by Elliptic Curve Cryptosystem -- Part 2. Ad Hoc and Ubiquitous Computing -- Mobile-Cloud: A Framework of Cloud Computing for Mobile Application -- The Effect of Design Patterns on Aspect Oriented Software Quality-An Empirical Evaluation -- A Novel Statistical Fusion Rule for Image Fusion in Non Subsampled Contourlet Transform Domain -- Maximizing Lifetime of Wireless Sensor Network through Extended LEACH Algorithm -- Intersection Area Based Geocasting Protocol (IBGP) for Vehicular Ad Hoc Networks -- Survey on H.264 Standard -- Self-configurable Processor Schedule Window Algorithm -- An Authenticated BSS Methodology for Data Security Using Steganography -- A Real Time Multivariate Robust Regression Based Flood Prediction Model Using Polynomial Approximation for Wireless Sensor Network Based Flood Forecasting Systems -- AODV Enhancement Based on the Minimization of Route-Request Packets -- Key Management for Group Based Mobile Ad Hoc Networks -- Optimal Clustering in Zone Based Protocol of Wireless Sensor Network -- Optimized FZ-LEACH Using Exponential Weighted Moving Average for Wireless Sensor Network -- IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks -- A Study on Various Deployment Schemes for Wireless Sensor Networks -- Spanning Tree Based Reliable Data Transmission in LEACH -- Image Deblurring Using Bayesian Framework -- Taxonomy and Control Measures of SPAM and SPIM -- A Distributed OFDM Polarizing Transmission via Broadcast Switching -- Multipath OLSR with Energy Optimization in Mobile Adhoc NETwork (MANET)
Summary The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson advances in computer science and information technology; and ad hoc andubiquitous computing
Analysis Computer science
Computer Communication Networks
Software engineering
Computer software
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Artificial Intelligence (incl. Robotics)
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
Bibliography Includes bibliographical references and author index
Subject Computer science -- Congresses
Information technology -- Congresses
Informatique.
Computer science
Information technology
Computersicherheit
Informationstechnik
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Meghanathan, Natarajan, 1977-
Chaki, Nabendu.
Nagamalai, Dhinaharan.
ISBN 9783642273179
3642273173
3642273165
9783642273162