download
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Contemporary Computing

Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part II
Lieferzeit: Sofort lieferbar I

53,49 €*

ISBN-13:
9783642148255
Veröffentl:
2010
Seiten:
275
Autor:
Sanjay Ranka
Serie:
95, Communications in Computer and Information Science
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:
This book constitutes the second part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010.
Technical Session-12: System-1 (S-1).- Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization.- Efficient Storage of Massive Biological Sequences in Compact Form.- Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing.- An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture.- Event-Based Metric for Computing System Complexity.- Technical Session-13: System-2 (S-2).- Load Balancing in Xen Virtual Machine Monitor.- Aerial Vehicle Based Sensing Framework for Structural Health Monitoring.- A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks.- Modeling and Simulation of Efficient March Algorithm for Memory Testing.- A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism.- Technical Session-14: System-3 (S-3).- Detection of Polymorphic Viruses in Windows Executables.- Sensitivity Measurement of Neural Hardware: A Simulation Based Study.- AnApproach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools.- A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams.- Technical Session-15: System-4 (S-4).- Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring.- Test Process Model with Enhanced Approach of State Variable.- Re-engineering Machine Translation Systems through Symbiotic Approach.- Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network.- Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph.- Technical Session-16: System-6 (S-6).- Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm.- Hardware and Software Co-Design for Robot Arm.- Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.- Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.