AHA-BUCH

Contemporary Computing

Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part II
 Taschenbuch
Sofort lieferbar | Lieferzeit:3-5 Tage I

96,29 €*

Alle Preise inkl. MwSt. | zzgl. Versand
ISBN-13:
9783642148248
Einband:
Taschenbuch
Erscheinungsdatum:
01.07.2010
Seiten:
275
Autor:
Sanjay Ranka
Gewicht:
457 g
Format:
243x159x18 mm
Serie:
95, Communications in Computer and Information Science
Sprache:
Englisch
Beschreibung:

99
Technical Session-12: System-1 (S-1).- Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization.- Efficient Storage of Massive Biological Sequences in Compact Form.- Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing.- An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture.- Event-Based Metric for Computing System Complexity.- Technical Session-13: System-2 (S-2).- Load Balancing in Xen Virtual Machine Monitor.- Aerial Vehicle Based Sensing Framework for Structural Health Monitoring.- A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks.- Modeling and Simulation of Efficient March Algorithm for Memory Testing.- A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism.- Technical Session-14: System-3 (S-3).- Detection of Polymorphic Viruses in Windows Executables.- Sensitivity Measurement of Neural Hardware: A Simulation Based Study.- An Approach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools.- A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams.- Technical Session-15: System-4 (S-4).- Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring.- Test Process Model with Enhanced Approach of State Variable.- Re-engineering Machine Translation Systems through Symbiotic Approach.- Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network.- Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph.- Technical Session-16: System-6 (S-6).- Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm.- Hardware and Software Co-Design for Robot Arm.- Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.- Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages.
This book constitutes the second part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010.
The 23 revised full papers presented were carefully reviewed and selected from numerous submissions.