Shortcuts
Bitte warten Sie, bis die Seite geladen ist.
 
PageMenu- Hauptmenü-
Page content

Katalogdatenanzeige

Frontier and Innovation in Future Computing and Communications

Frontier and Innovation in Future Computing and Communications
Kataloginformation
Feldname Details
Vorliegende Sprache eng
ISBN 978-94-017-8797-0
Name Pak, Chong-hyun
Zomaya, Albert Y. ¬[Hrsg.]¬
ANZEIGE DER KETTE Zomaya, Albert Y. ¬[Hrsg.]¬
Name Jeong, Hwa-Young ¬[Hrsg.]¬
Obaidat, Mohammad ¬[Hrsg.]¬
T I T E L Frontier and Innovation in Future Computing and Communications
Verlagsort Dordrecht ; s.l.
Verlag Springer Netherlands
Erscheinungsjahr 2014
2014
Umfang Online-Ressource (XXVIII, 923 p. 427 illus, online resource)
Reihe Lecture Notes in Electrical Engineering ; 301
Notiz / Fußnoten Includes indexes
Weiterer Inhalt Message from the FCC 2014 General Chairs; Message from the FCC 2014 Program Chairs; Organization; Message from the KCIC 2013 General Chairs; Message from the KCIC 2013 Program Chairs; Organization; Contents; 1 SA-TCP: A Secure and Adaptive TCP for Wireless Ad Hoc Networks; Abstract; 1.1…Introduction; 1.2…System Model and Key Distribution; 1.3…SA-TCP: Secure and Adaptive Transmission Control Protocol; 1.3.1 Security; 1.4…Simulation; 1.4.1 Simulation Results; 1.5…Conclusion; References; 2 IPAS: User Test Phase and Evaluation; Abstract; 2.1…Introduction; 2.2…Related Work. 2.2.1 Recognition-Based Systems2.3…IPAS Overview and its Advantages; 2.3.1 IPAS Domains; 2.4…IPAS User Test Phase; 2.4.1 Methodology; 2.4.2 IPAS Experiment; 2.4.3 Survey Questions; 2.4.4 Survey Analysis; 2.5…Usability of IPAS; 2.6…Security of IPAS; 2.7…Conclusion and Future Directions; References; 3 Coding DNA Sequence Watermarking; Abstract; 3.1…Introduction; 3.2…Proposed DNA Sequence Watermarking; 3.3…Experimental Results; 3.4…Conclusions; Acknowledgments; References; 4 Exclusive Region Based Scheduling for MB-OFDM UWB Using Hidden Pilot Sequences; Abstract; 4.1…Introduction. 4.2…System Model4.3…Proposed Exclusive Region-Based Scheduling; 4.4…Simulation Results; 4.5…Conclusions; References; 5 The Digital Video Frame Obfuscation Method in Consideration of Human Visual System for Intellectual Property Protection and Authentication; Abstract; 5.1…Introduction; 5.2…Authentication Signal Consisting of Signature Signal and M-sequence; 5.3…The Digital Video Frame Obfuscation Method Using DC Coefficient and Movement Vector; 5.4…Experimental Results; 5.5…Conclusion; References; 6 Fuzzy-Based Resource Reallocation Scheduling Model in Cloud Computing; Abstract. 6.1…Introduction6.2…Related Works; 6.3…Method; 6.3.1 Dynamic Resource Reallocation in Cloud Environment; 6.3.2 Resource Reallocation Algorithm; 6.4…Experiment; 6.5…Conclusions; Acknowledgments; References; 7 An Efficient Algorithm for High Utility Sequential Pattern Mining; Abstract; 7.1…Introduction; 7.2…Preliminaries; 7.3…The Proposed Algorithm; 7.3.1 Overview; 7.3.2 The Reduced Sequence Utility Strategy; 7.3.3 The Projected-Database Utility Strategy; 7.4…Performance Evaluation; 7.5…Conclusions and Future Work; References. 8 Simulated Annealing for the Design of Location Management System and Relation MapAbstract; 8.1…Introduction; 8.2…Location Area Planning; 8.2.1 Solution Representation; 8.3…Experiment Results and Discussions; 8.3.1 Experiment Results; 8.3.2 Discussions; 8.4…Conclusions; Acknowledgments; References; 9 A Simple, Flexible and Adaptable Solution to Enable Information Exchange for Specific Business Processes; Abstract; 9.1…Introduction; 9.2…Proposed Solution; 9.3…Concept of Execution; 9.3.1 Sample Execution of the Concept; 9.4…Conclusions; References. 10 User Authentication with Distributed Cluster Formation in Wireless Sensor Networks. SA-TCP: A Secure and Adaptive TCP for Wireless Ad Hoc Networks; W.S. Alnumay, et alIPAS: User Test Phase and Evaluation; S.Almuairfi, et al -- Coding DNA Sequence Watermarking; S.-H.Lee, et al -- Exclusive Region based Scheduling for MB-OFDM UWB using Hidden Pilot Sequences; B.W.Kim, B.-G. Kim- The Digital Video Frame Obfuscation Method in Consideration of Human Visual System for Intellectual Property Protection and Authentication; H.Bu, et al -- Fuzzy-Based Resource Reallocation Scheduling Model in Cloud Computing; J.Kim, et al -- An Efficient Algorithm for High Utility Sequential Pattern Mining; J.-Z. Wang, et al -- Simulated Annealing for the Design of Location Management System and Relation Map; S.-H. Jang, et al -- A simple, flexible and adaptable solution to enable information exchange for specific business processes; M.BIÇAKÇ I, M.U. ÇAKIR -- User Authentication with Distributed Cluster Formation in Wireless Sensor Networks; D.-H.Kim, et al -- Comparative Study of Cyber Security Characteristics for Nuclear Systems; J.Shin, et al -- Optical computing for digital signal process in incoherent fiber system using positive realization; K.Kim, et al -- Optimization of Non-Fuzzy Neural Networks Based on Crisp Rules in Scatter Partition; K.-J. Park, et al -- LBG-based Non-Fuzzy Inference System for Nonlinear Process; K.-J.Park, et al -- An Efficient Embedded System for the Detection and Recognition of Speed-Limit Signs; H.-L. Chen, et al -- Future Enterprise Computing Looking Into 2020; Y.-C. Fang, et al -- Implementation of a Multi-Core Prototyping System for a Video-based Fire Detection Algorithm; Y.-H. Park, et al -- A Novel Spectrum Sensing Scheme based on Wavelet Denoising with Fuzzy for Cognitive Radio Sensor Networks; H. Vu-Van, I.Koo -- Accelerating a Bellman-Ford Routing Algorithm Using GPU; I.-K. Jeong, et al -- Early Fire Detection Using Multi-Stage Pattern Recognition Techniques in Video Sequences; D.Shon, et al -- Energy Efficient Backoff-Free Fragment Retransmission Fragmentation Scheme for IEEE 802.11 WLAN; P. Mafole, et al -- Fault Classification of an Induction Motor Using Texture Features of Vibration Signals; W.-C. Jang, et al -- An Efficient Audit Scheme for Cloud Storage; O. Kwon, et al -- High-Performance Cluster Estimation Using Many-Core Models; J.Seo, et al -- Dynamic Processing of Floating Continuous Query for Cold Chain Management; B.Hong, et al -- A New Approach for Task Scheduling Optimization in Mobile Cloud Computing; P.P. Hung, et al -- Study on Encryption of Wireless Network-Based Mobility Energy-Enterprise Security Management; Y.-H. Kim, et al -- Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage; D. Koo, et al -- Tool Selection - a Cloud-based Approach; C.Singh, et al -- The Self-Induction System for Fuel-Efficient Driving using OBD II; W.A.Jang, et al -- Intuitive hand motion recognition and NUI/NUX framework; G. Lee, et al -- Evaluating Skin Hereditary Traits Based on Daily Activities; J. Rew, et al -- A New Fast Encoding Algorithm Based on Motion Activity for High Efficiency Video Coding (HEVC); J.-H. Lee, et al -- Smart Network Services using Ticket Issuance in the TSM(Trusted Software Monitor) System; S.-W.Park, J.N.Kim -- Macro Modeling Approach for Semi-Digital Smart Integrated Circuits; Z.Hoseini, et al -- Hybrid Performance with Pixel values' Transition and Curve Fitting for Improved Stereo Matching; K.Shin, et al -- ActiveSTB: Scalable Scheme over Wireless Networks; H.K.Lee, et al -- Rhythm-based Authentication Scheme on Smart Devices; J.D.Lee, et al -- Cloud Services Aided e-Tourism: in the Case of Low-Cost Airlines for Backpacking; Q. Zhou, et al -- Modified Cat Swarm Optimization Algorithm for Feature Selection of Support Vector Machines; K.-C. Lin, et al -- Using Affective Computing To Detect Emotions with Color; M.-F.Lee, et al -- Bucket Index Ordering Problem in Range Queries; T.-Y.Youn, et al -- Signal Interference of Ubiquitous Wireless Networks on Data Throughput; J.Zhang, et al -- Privacy-Preserving Data Collection with Self-Awareness Protection; K.-S.Wong, M.H. Kim -- User-Centric Security Service Model for Cloud Storage; S.M. Yoo, et al -- Continuity Labeling Technique of Multiple Face in Multiple Frame; H.-j. Kim, et al -- Audio Classification Using GA-Based Fuzzy C-Means; M.Kang , J.-M.Kim -- Anonymous Editing Prevention Method for Depth-image-based Rendering Stereoscopic Video; J.-W.Lee, et al -- Different Knowledge Modeling Approach for Clinical Decision Supporting Service in u-Health Context; J.A.Kim -- Formal Verification for Inter-Partitions Communication of RTOS supporting IMA; S.Park, G.Kwon -- 3D Face Representation using Inverse Compositional Image Alignment for Multimodal Face Recognition; K.Jeong, et al -- Simulating Synthesized Automata from Decentralized Specifications in LTL; R. Kwon, G. Kwon -- Peers-Based Location of Mobile Devices; M.Guri, et al -- Platform design for data sharing; Y.-H. Son, et al -- Reasonable Resolution of Fingerprint Wi-Fi Radio Map for Dense Map Interpolation; W. Bong, Y.C. Kim -- Sensor Based Ubiquitous Application Modeling Using Process Definition Language; S.-Y. Lee -- Smart Device Locking System provides handy and Improved Security; H.-W.Kim, Y.-S.Jeong -- A Study on the efficient management of Android Apps using a Whitelist; U.Jang, et al -- A Workflow Scheduling Technique to Consider Task Processing rate in Spot Instance-Based Cloud; D.Jung, et al -- Enhanced Beacon Scheduling of IEEE802.15.4e DSME; S.-w. Nam, K.-i. Hwang -- Building Recognition Guided by Wi-Fi Based Localization; W.Bong, Y. C. Kim -- Context Aware Based Access Control Model In Cloud Data Center Environment; Y.S. Byun, J.Kwak -- Whitelist generation technique for industrial firewall in SCADA networks; D.-H.Kang, et al -- Design of Industrial Firewall System Based on Multiple Access Control Filter; B. Kim, et al -- The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS System; N.Park -- Abnormal Behavior Detection Technique Based on Big Data; H. Kim, et al -- Rotational Bridge Priority Masking for building Equal-Cost Multi-Tree; C.Suh, U.Jang -- Linear SVM-based Android Malware Detection; H.-S. Ham, et al -- A Study on Authentication Mechanism to Ensure the Reliability of Content Distribution Using Log Monitoring & Encoding of OPSs; B.-S. Koh, et al -- Virtual Agent Learning for NUI/NUX-based Games; D. Jin, et al -- An Analysis of the Korea National DNS Using Big Data Technology; E. Jung, et al -- Development of Bio-signal based Continuous Intensity Wearable Input Device; J. Kim, et al -- Speaker Adaptive Real-time Korean Single Vowel Recognition for an Animation Producing; S.-M.Whang, et al -- Social Network Service Real Time Data Analysis Process Research; Y.-J. Jang, J.Kwak -- A Database Design for Pre-Ordering System Based on Prediction of Customer Arrival Time; A.Nasridinov, et al -- Behavior Execution Method for a Robot using an Online Development Approach; S. Ssin, et al -- Smart Logistics Service Model based on Context Information; K.H. Kwak, et al -- Auto-configuration of the Initial Contour using Level-set Method for Lung Segmentation on Chest CT images; S.-H. Chae, et al -- Suction based Wall Climbing Robot for Edge Movement; J. Lee, S. Kim -- Improving Data Hiding Capacity based on Hamming Code; C. Kim, C.-N. Yang -- Analysis of the Dynamic Characteristics of a Torque-Assist System Using the Model-based Design Method; K.G. Eun, K.B. Woo -- Improved Branch Prediction for Just-in-time Decompression of Canonical Hu man Bytecode Streams; C.Jeong, et al.-Effective Path Modification using Intuitive Gestures; H. Liu, et al -- DSRC based Self-Adaptive Navigation System: Aiming Spread out the Vehicles for Alleviating Traffic Congestion; H. Jeong, et al -- A Two-tier Routing Algorithm based on Geographical Zone in VANET; S.-H. Lee, S.-J. Seok -- Analysis of Vehicle Surroundings Monitoring System Based on Vehicle-to-vehicle Communication; H.Cho, B.-W. Kim -- The Energy-efficient Probabilistic Routing in MANETs; S.-H. Park, J.-R. Lee -- Functional annotation of proteins by a novel method using weight & feature selection; J. Jung, et al -- Gaze Behavior Analysis System based on Objects Using Trajectory Information; J.-M. Oh, et al -- The Crack Width Calculation Program for Structural Concrete Members Based on a Limit State Design; H.M. Lee, et al -- Novel Real-time Automobile Detection Algorithm for Blind Spot Area; S.-H. Yang, et al -- Environment control model of intelligent plant factory using context based of sensing data; N.J. Bae, et al -- Implementation of an Integrated Log Analysis System through Statistics-based Prediction Techniques; K. Ko -- The Comparison of Pricing Schemes for Cloud Services; S.-H. Chun, et al -- Platform Design for Co-creation; S.G. Hong, et al -- Towards the Implementation of an Ubiquitous Car Park Availability Detection System; Tan Ian K.T., et al -- Improvised Classification Model for Cloud based Authentication using Keystroke Dynamics; T.S. Kumar, et al.
Titelhinweis Druckausg.ISBN: 978-940-178-797-0
ISBN ISBN 978-94-017-8798-7
Klassifikation TJK
TEC041000
621.382
TK1-9971
Kurzbeschreibung IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.
2. Kurzbeschreibung IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners
SWB-Titel-Idn 405482973
Signatur Springer E-Book
Bemerkungen Elektronischer Volltext - Campuslizenz
Elektronische Adresse $uhttp://dx.doi.org/10.1007/978-94-017-8798-7
Internetseite / Link Volltext
Siehe auch Volltext
Siehe auch Cover
Kataloginformation500187507 Datensatzanfang . Kataloginformation500187507 Seitenanfang .
Vollanzeige Katalogdaten 

Auf diesem Bildschirm erhalten Sie Katalog- und Exemplarinformationen zum ausgewählten Titel.

Im Bereich Kataloginformation werden die bibliographischen Details angezeigt. Per Klick auf Hyperlink-Begriffe wie Schlagwörter, Autoren, Reihen, Körperschaften und Klassifikationen können Sie sich weitere Titel des gewählten Begriffes anzeigen lassen.

Der Bereich Exemplarinformationen enthält zum einen Angaben über den Standort und die Verfügbarkeit der Exemplare. Zum anderen haben Sie die Möglichkeit, ausgeliehene Exemplare vorzumerken oder Exemplare aus dem Magazin zu bestellen.
Schnellsuche