Contemporary Computing
Springer Berlin (Verlag)
978-3-642-03546-3 (ISBN)
Rajkumar Buyya is Co-Chair of the IEEE Task Force on Cluster Computing and an international speaker in the IEEE Computer Society Chapter Tutorials Program. Currently at Monash University, Melbourne, Australia, he is conducting R&D on the use of an economics paradigm for peer-to-peer and grid-based service-oriented computing. He has co-authored Microprocessor x86 Programming and Mastering C++, and edited a popular two-volume book on high performance cluster computing. He has published over 50 research articles in major international journals and conferences.
Technical Session-1: Algorithm-1 (AL-1).- A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling.- PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images.- A New Position-Based Fast Radix-2 Algorithm for Computing the DHT.- Study of Bit-Parallel Approximate Parameterized String Matching Algorithms.- Optimization of Finite Difference Method with Multiwavelet Bases.- Technical Session-2: Algorithm-2 (AL-2).- A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks.- A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks.- An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems.- Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip.- A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching.- Technical Session-3: Algorithm-3 (AL-3).- Optimized Graph Search Using Multi-Level Graph Clustering.- An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns.- A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization.- Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts.- Local Subspace Based Outlier Detection.- New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions.- Technical Session-4: Algorithm-4 (AL-4).- On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks.- On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature.- Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands.- Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties.- Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame.- Technical Session-5: Application-1 (AP-1).- Secure Receipt-Free Sealed-Bid Electronic Auction.- An Architecture for Handling Fuzzy Queries in Data Warehouses.- Palmprint Based Verification System Using SURF Features.- A Personnel Centric Knowledge Management System.- Technical Session-6: Application-2 (AP-2).- A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks.- Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach.- CDIS: Circle Density Based Iris Segmentation.- Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines.- Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine.- Technical Session-7: Application-3 (AP-3).- Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing.- Vehicular Traffic Control: A Ubiquitous Computing Approach.- Application of Particle Swarm Optimization Algorithm for Better Nano-Devices.- Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES.- Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip.- Technical Session-8: Application-4 (AP-4).- Color Image Restoration Using Morphological Detectors and Adaptive Filter.- Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography.- An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions.- Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors.- Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions.- Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks.- Technical Session-9: Bioinformatics-1 (B-1).- Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology.- Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide.- IDChase: Mitigating Identifier Migration Trap in Biological Databases.- Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships.- IITKGP-SESC: Speech Database for Emotion Analysis.- Technical Session-10: Bioinformatics-2 (B-2).- Detection of Splice Sites Using Support Vector Machine.- Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides.- Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach.- FCM for Gene Expression Bioinformatics Data.- Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection.- Technical Session-11: System-1 (S-1).- An Electronically Tunable SIMO Biquad Filter Using CCCCTA.- An Architecture for Cross-Cloud System Management.- Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models.- Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic.- Energy-Constrained Scheduling of DAGs on Multi-core Processors.- Technical Session-12: System-2 (S-2).- Evaluation of Code and Data Spatial Complexity Measures.- Pitcherpot: Avoiding Honeypot Detection.- Verification of Liveness Properties in Distributed Systems.- InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile ComputingDevices.- Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup.
Erscheint lt. Verlag | 28.7.2009 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | XVIII, 662 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1032 g |
Themenwelt | Mathematik / Informatik ► Informatik |
Naturwissenschaften ► Biologie | |
Schlagworte | ad hoc networks • Algorithm analysis and problem complexity • algorithms • authentication • Bioinformatics • biometrics • Computer Applications • Hardcover, Softcover / Informatik, EDV/Informatik • Manet • Pattern Matching • security • wireless protocols |
ISBN-10 | 3-642-03546-9 / 3642035469 |
ISBN-13 | 978-3-642-03546-3 / 9783642035463 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich