
Advances in Computer Science and Information Technology : AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
by Kim, Tai-hoon; Adeli, Hojjat-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Textbook
Rent Digital
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Information Security and Assurance | |
Fuzzy Based Threat Analysis in Total Hospital Information System | p. 1 |
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model | p. 15 |
A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition | p. 28 |
Information Systems Security Criticality and Assurance Evaluation | p. 38 |
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' | p. 55 |
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography | p. 61 |
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning | p. 70 |
Post-quantum Cryptography: Code-Based Signatures | p. 82 |
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol | p. 100 |
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems | p. 115 |
An Active Intrusion Detection System for LAN Specific Attacks | p. 129 |
Analysis on the Improved SVD-Based Watermarking Scheme | p. 143 |
Advanced Communication and Networking | |
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes | p. 150 |
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks | p. 159 |
Grammar Encoding in DNA-Like Secret Sharing Infrastructure | p. 175 |
HATS: High Accuracy Timestamping System Based on NetFPGA | p. 183 |
A Roadside Unit Placement Scheme for Vehicular Telematics Networks | p. 196 |
Concurrent Covert Communication Channels | p. 203 |
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks | p. 214 |
High Performance MAC Architecture for 3GPP Modem | p. 228 |
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T | p. 239 |
A New Cross-Layer Unstructured P2P File Sharing Protocol Over Mobile Ad Hoc Network | p. 250 |
A Model for Interference on Links in Inter-Working Multi-Hop Wireless Networks | p. 264 |
An Optimum ICA Based Multiuser Data Separation for Short Message Service | p. 279 |
Advanced Computer Science and Information Technology | |
Multiple Asynchronous Requests on a Client-Based Mashup Page | p. 287 |
Using an Integrated Ontology Database to Categorize Web Pages | p. 300 |
Topic Detection by Topic Model Induced Distance Using Biased Initiation | p. 310 |
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm | p. 324 |
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition | p. 337 |
Agent Based Approach to Regression Testing | p. 345 |
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem | p. 356 |
Development of a Digital Textbook Standard Format Based on XML | p. 363 |
A Pattern-Based Representation Approach for Online Discourses | p. 378 |
A Fault Tolerant Architecture for Transportation Information Services of E-Government | p. 385 |
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS | p. 397 |
Extract Semantic Information from WordNet to Improve Text Classification Performance | p. 409 |
Managing Ubiquitous Scientific Knowledge on Semantic Web | p. 421 |
A Semantic Pattern Approach to Managing Scientific Publications | p. 431 |
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults | p. 435 |
Markov Chain Monte Carlo Random Testing | p. 447 |
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics | p. 457 |
Ubiquitous Computing and Multimedia Applications | |
An Effective Video Steganography Method for Biometric Identification | p. 469 |
A Video Coding Technique using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction | p. 480 |
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Aalysis | p. 491 |
Video Copy Detection: Sequence Matching Using Hypothesis Test | p. 499 |
An XML-Based Digital Textbook and Its Educational Effectiveness | p. 509 |
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition | p. 524 |
Design of an Efficient Message Collecting Scheme for the Slot-Based wireless Mesh Network | p. 534 |
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming | p. 544 |
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech | p. 558 |
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture | p. 572 |
A Power Control Scheme for an Energy-Efficient MAC Protocol | p. 586 |
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks | p. 597 |
Author Index | p. 603 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.