Advances in Computer Science and Information Technology : AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

by ;
Format: Paperback
Pub. Date: 2010-07-02
Publisher(s): Springer-Verlag New York Inc
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $177.45

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$35.64
Online:60 Days access
Downloadable:60 Days
$47.52
Online:90 Days access
Downloadable:90 Days
$59.40
Online:120 Days access
Downloadable:120 Days
$71.28
Online:180 Days access
Downloadable:180 Days
$77.22
Online:1825 Days access
Downloadable:Lifetime Access
$118.80
$77.22

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the refereed joint proceedings of four co-locatedinternational conferences, concertedly held in Miyazaki, Japan, in June2010. The papers in this volume were selected based on their scoresobtained from the independent reviewing processes at particularconferences, and their relevance to the idea of constructing hybridsolution to address the real-world challenges of IT. It provides achance for academic and industry professionals to catch up on recentprogress in the related areas.The 49 revised full papers presented were carefully reviewed andselected during two rounds of reviewing and improvement from more than1000 initial submissions. The papers emanate from the four followinginternational conferences: Information Security and Assurance (ISA2010), Advanced Communication and Networking (ACN 2010), AdvancedScience and Technology (AST 2010), and Ubiquitous Computing andMultimedia Applications (UCMA 2010). This volume focuses on variousaspects of advance

Table of Contents

Information Security and Assurance
Fuzzy Based Threat Analysis in Total Hospital Information Systemp. 1
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Modelp. 15
A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognitionp. 28
Information Systems Security Criticality and Assurance Evaluationp. 38
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'p. 55
Directed Graph Pattern Synthesis in LSB Technique on Video Steganographyp. 61
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioningp. 70
Post-quantum Cryptography: Code-Based Signaturesp. 82
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocolp. 100
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systemsp. 115
An Active Intrusion Detection System for LAN Specific Attacksp. 129
Analysis on the Improved SVD-Based Watermarking Schemep. 143
Advanced Communication and Networking
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codesp. 150
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networksp. 159
Grammar Encoding in DNA-Like Secret Sharing Infrastructurep. 175
HATS: High Accuracy Timestamping System Based on NetFPGAp. 183
A Roadside Unit Placement Scheme for Vehicular Telematics Networksp. 196
Concurrent Covert Communication Channelsp. 203
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networksp. 214
High Performance MAC Architecture for 3GPP Modemp. 228
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-Tp. 239
A New Cross-Layer Unstructured P2P File Sharing Protocol Over Mobile Ad Hoc Networkp. 250
A Model for Interference on Links in Inter-Working Multi-Hop Wireless Networksp. 264
An Optimum ICA Based Multiuser Data Separation for Short Message Servicep. 279
Advanced Computer Science and Information Technology
Multiple Asynchronous Requests on a Client-Based Mashup Pagep. 287
Using an Integrated Ontology Database to Categorize Web Pagesp. 300
Topic Detection by Topic Model Induced Distance Using Biased Initiationp. 310
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithmp. 324
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognitionp. 337
Agent Based Approach to Regression Testingp. 345
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problemp. 356
Development of a Digital Textbook Standard Format Based on XMLp. 363
A Pattern-Based Representation Approach for Online Discoursesp. 378
A Fault Tolerant Architecture for Transportation Information Services of E-Governmentp. 385
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETSp. 397
Extract Semantic Information from WordNet to Improve Text Classification Performancep. 409
Managing Ubiquitous Scientific Knowledge on Semantic Webp. 421
A Semantic Pattern Approach to Managing Scientific Publicationsp. 431
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faultsp. 435
Markov Chain Monte Carlo Random Testingp. 447
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metricsp. 457
Ubiquitous Computing and Multimedia Applications
An Effective Video Steganography Method for Biometric Identificationp. 469
A Video Coding Technique using Octagonal Motion Search and BTC-PF Method for Fast Reconstructionp. 480
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Aalysisp. 491
Video Copy Detection: Sequence Matching Using Hypothesis Testp. 499
An XML-Based Digital Textbook and Its Educational Effectivenessp. 509
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognitionp. 524
Design of an Efficient Message Collecting Scheme for the Slot-Based wireless Mesh Networkp. 534
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Hummingp. 544
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speechp. 558
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculturep. 572
A Power Control Scheme for an Energy-Efficient MAC Protocolp. 586
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networksp. 597
Author Indexp. 603
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.