Contemporary Computing -  Sanjay Ranka,  Srinivas Aluru,  Rajkumar Buyya,  Yeh-Ching Chung,  Sumeet Dua,  Ananth Grama

Contemporary Computing (eBook)

Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings
eBook Download: PDF
2009 | 1. Auflage
XVIII, 677 Seiten
Springer-Verlag
978-3-642-03547-0 (ISBN)
Systemvoraussetzungen
95,23 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book constitutes the refereed papers of the 2nd International Conference on Contemporary Computing, which was held in Noida (New Delhi), India, in August 2009. The 61 revised full papers presented were carefully reviewed and selected from 213 submissions and focus on topics that are of contemporary interest to computer and computational scientists and engineers. The papers are organized in topical sections on Algorithms, Applications, Bioinformatics, and Systems.

Preface 5
Organization 6
Table of Contents 11
Technical Session-1: Algorithm-1 (AL-1) 11
A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling 17
Introduction 17
The Hybrid Approach (HGGA-SSR) 19
The Grouping Genetic Algorithm 19
The Heuristic 20
Computational Results 22
Conclusions 23
References 23
PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images 24
Introduction 24
Proposed PDE Based Model 26
Results 27
Conclusion 28
References 29
A New Position-Based Fast Radix-2 Algorithm for Computing the DHT 30
Introduction 30
Discrete Hartley Transform 31
Proposed Algorithm 34
Operational Complexity 38
Results 39
Conclusions 40
References 40
Study of Bit-Parallel Approximate Parameterized String Matching Algorithms 42
Introduction 42
Related Concepts 43
Parameterized String Matching Problem 43
Approximate String Matching Problem 44
Dynamic Programming Algorithms 44
Algorithms Based on Finite Automata 46
Myers’ Bit-Parallel Algorithm 47
Parameterized Bit-Parallel String Matching Algorithm 47
Approximate Parameterized String Matching (APSM) Problem 49
Proposed Algorithms 49
Algorithm for APSM Problem Based on Finite Automata 49
Algorithm for APSM Problem Based on Myers’ Algorithm 50
Conclusions and Future Work 52
References 52
Optimization of Finite Difference Method with Multiwavelet Bases 53
Introduction 53
Discretization of PDEs 54
Grid Generation Using Multiwavelets 56
Results 58
Conclusion 63
References 63
Technical Session-2: Algorithm-2 (AL-2) 11
A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks 65
Introduction 65
Mobility Prediction Techniques 66
Proposed Approach 67
GA Approach to Predict the Next Movement of the User 67
GA Methodology 69
GA Based Mobility Prediction Algorithm 69
Simulation Results and Performance Analysis 70
Effect of GA Based Mobility Prediction on Call Dropping 70
Accuracy of Prediction 71
Conclusion 72
References 72
A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks 74
Introduction 74
Minimum Interference Based Routing Protocol 76
Route Request-Reply Cycle to Collect Location Update Vectors 76
Route Selection and Route Reply 76
Data Packet Transmission and Route Maintenance 78
Simulations 78
End-to-End Delay per Data Packet 80
Route Lifetime 80
Average Hop Count per Path 81
Packet Delivery Ratio 81
Energy Consumed per Node 82
Impact of Interference Range per Link 83
Conclusions 84
References 85
An Optimal, Distributed Deadlock Detection andResolution Algorithm for Generalized Model in Distributed Systems 86
Introduction 86
Previous Work on Distributed Deadlock Detection Algorithms 87
Paper Objectives 88
Differences between the Proposed Algorithm and Earlier Algorithm 88
Preliminaries 89
Distributed Deadlock Detection Algorithm 90
The Description 90
Formal Specification 91
Example Execution 93
Deadlock Resolution 95
Performance Analysis 95
Conclusion 96
References 96
Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip 97
Introduction 97
Fault-Tolerant Routing Enhancement 99
$f$-cube3 Algorithm 100
$If$-cube2 Algorithm 101
Performance Evaluation and Simulation Results 102
Simulation Methodology 103
Comparison of $f$-cube3 and $if$-cube2 103
Conclusion 106
References 107
A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching 109
Introduction 109
Previous Works 110
Terms and Notations 111
Our Work 111
Input Files 112
Reference Block Identification 112
Reference Parsing 114
Citation Parsing 115
Experiment and Results 116
Conclusion and Future Scope 118
References 118
Technical Session-3: Algorithm-3 (AL-3) 12
Optimized Graph Search Using Multi-Level Graph Clustering 119
Introduction 119
Related Work 121
Algorithm 121
Graph Clustering 122
Searching 126
Results 127
Conclusion 128
References 129
An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns 131
Introduction 131
Related Works 132
Contributions of This Paper 132
CPF Framework 133
User Data 133
Inter-related Generalized Self Organized Mapping (IGSOM) 133
Relational Attributed Oriented Induction (RAOI) 135
CC-MINER 136
Application 138
Experimental Results 138
Educational Data Set 138
Prostrate Cancer Data Set 140
Conclusion 141
References 141
A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization 143
Introduction 143
Basic DE 144
Modified Differential Evolution 145
Experimental Settings and Numerical Results 147
Numerical Results 148
Conclusions 150
References 150
Appendix 151
Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts 154
Introduction 154
Brief Overview of South Indian Scripts 156
Data Set and Preprocessing 156
Proposed Feature Extraction Methodology 157
Experimental Results and Comparative Study 159
Experimental Result on Bangla Numeral Database 161
Conclusion 162
References 163
Local Subspace Based Outlier Detection 165
Introduction 165
Related Work 167
LOF Algorithm 167
DSNOF Algorithm 168
Subspace Outlier Detection in Data with Mixture of Variances and Noise 168
Our Contributions 168
The Proposed Algorithm (LSOF) 168
Complexity Analysis 171
Experimental Evaluation 171
Conclusion 172
References 173
New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions 174
Introduction 174
Fuzzy Clustering 175
Fuzzy C-Mean Algorithm 175
Kernel Induced Fuzzy C-Means Based Gaussian Function [KFCGF] 176
Obtaining Membership 177
Obtaining Cluster Prototype Updating 178
Results and Discussions 179
Conclusion 183
References 184
Technical Session-4: Algorithm-4 (AL-4) 12
On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and ManhattanMobility Models for Vehicular Ad Hoc Networks 186
Introduction 186
Review of the Mobility Models 187
Random Waypoint Mobility Model 188
City Section Mobility Model 188
Manhattan Mobility Model 188
Algorithm to Determine Optimal Number of Path Transitions 189
Mobile Graph 189
Mobile Path 189
Stable Mobile Path and Minimum Hop Mobile Path 189
Algorithm Description 189
Simulations 190
Percentage Network Connectivity 191
Average Route Lifetime 192
Route Lifetime – Hop Count Tradeoff 195
Conclusions 196
References 197
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature 198
Introduction 199
Risks in Biometric Systems 200
Hill Cipher 202
Use of Involutory Key Matrix 202
Image Encryption Using Hill Cipher 203
Proposed Advanced Hill Cipher Encryption Algorithm 203
The AdvHill Algorithm 204
Results and Discussions 204
Palmprint, Face and Signature Image Encryption 207
Conclusion 208
References 208
Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands 210
Introduction 210
Preprocessing and Feature Extraction 211
Indexing Scheme 213
Key Generation 213
Database Creation and Searching 214
Experimental Results 216
Conclusion and Future Work 219
References 219
Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties 221
Introduction 244
Receipt-Free Sealed-Bid Auction: Properties and Security Requirements 246
Properties of Receipt-Free Sealed-Bid Auction 246
Physical Requirements for Receipt-Free Sealed-Bid Auction 247
Entities of Receipt-Free Sealed-Bid Auction 247
Receipt-Free Sealed-Bid Auction Procedure 248
Bidding Phase 248
Opening Phase 251
Security Analysis 252
Efficiency 253
Conclusion 254
References 254
Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame 232
Introduction 232
Reader Tag Communication 233
The Tag Population 236
Timing Analysis 239
Speed Estimation in Dynamic Frame 242
Conclusion 242
References 243
Technical Session-5: Application-1 (AP-1) 13
Secure Receipt-Free Sealed-Bid Electronic Auction 244
Introduction 244
Receipt-Free Sealed-Bid Auction: Properties and Security Requirements 246
Properties of Receipt-Free Sealed-Bid Auction 246
Physical Requirements for Receipt-Free Sealed-Bid Auction 247
Entities of Receipt-Free Sealed-Bid Auction 247
Receipt-Free Sealed-Bid Auction Procedure 248
Bidding Phase 248
Opening Phase 251
Security Analysis 252
Efficiency 253
Conclusion 254
References 254
An Architecture for Handling Fuzzy Queries in Data Warehouses 256
Introduction 257
Related Works 257
Proposed Architecture 258
Crisp Records to Fuzzy Sets 259
Support and a-Cut Operations 261
Fuzzy Extension of Relational Views 262
Designing of ANN Topologies, Training and Prediction 263
Conclusion 265
References 265
Palmprint Based Verification System Using SURF Features 266
Introduction 266
Speeded Up Robust Features 267
Key-Point Detectors 267
Key-Point Descriptor 268
Proposed System 269
Image Acquisition 269
Pre-processing and Region of Interest Extraction 270
Palmprint Image Feature Extraction 271
Matching 271
Matching Method in SURF 271
Sub-image Matching 272
Experimental Results 273
IITK Database 273
PolyU Database 275
Speed 275
Conclusions 277
References 277
A Personnel Centric Knowledge Management System 279
Introduction 279
Related Work 280
The Model 281
Principle 281
Framework 281
Feedback 282
Database Creation 283
Algorithm 283
Example of the Algorithm 284
Database Modification and Maintenance 285
Algorithm 285
Description of Algorithm 285
Advantages of the Model 285
Relevance of Proposed Model to the Knowledge Pyramid Model in E-Government 286
Applications of the KMS Model in E-Governance and E-Government Services 286
Conclusion and Future Works 287
References 288
Technical Session-6: Application-2 (AP-2) 13
A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks 289
Introduction 289
Related Work 290
System Model 291
Implementation 293
Performance Evaluations 296
Conclusion and Future Work 298
References 298
Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach 300
Introduction 300
Rough Set Theory 301
Dependancy of Attributes 302
Fuzzy Set Approach 303
cAnt Miner Algorithm 303
From ACO to Hybrid PSO/ACO Algorithm 304
Algorithm 305
Experimental Study 306
Results 307
Application 307
Conclusion and Future Work 308
References 308
CDIS: Circle Density Based Iris Segmentation 311
Introduction 311
Prior Work 312
Motivation and Contribution 313
Motivation 313
Contribution 313
The System 313
Introduction 313
Terms and Notations Used 314
System Flow Model 314
Image Pre-processing 315
Circle Density Based Iris Segmentation (CDIS) 315
Experimental Results 320
Conclusion and Future Work 321
References 321
Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines 323
Introduction 323
Related Work 325
Suprasegmental Features in the LP Residual Signal 326
Computation of LP Residual from Speech Signal 326
Suprasegmental Features in the LP Residual Signal 326
The Hilbert Envelope of the LP Residual Signal 326
Computation of the Hilbert Envelope from Residual Signal 326
Presence of Suprasegmental Features in the Hilbert Envelope 327
Extraction of Suprasegmental Features Present in the Hilbert Envelope 328
Support Vector Machines for Speaker Recognition 330
Experimental Results 331
Conclusions and Future Work 331
References 332
Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine 334
Introduction 334
Proposed Method 335
Feature Extraction Using FLDA 335
Support Vector Machine (SVM) 337
Basic Theory of SVM for Two Classes 337
SVM for Multiclass Recognition 338
Experimental Results 338
Randomly Partitioning the Database 339
N-Fold Cross Validation Test 340
Conclusion 341
References 341
Technical Session-7: Application-3 (AP-3) 13
Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing 343
Introduction 343
Tate Pairing 344
ID-Based (t, n) Threshold Signature Scheme from Tate Pairings 345
Security Analysis of Our Threshold Scheme 348
Performance Analysis 349
Conclusion 350
References 350
Appendix 351
Vehicular Traffic Control: A Ubiquitous Computing Approach 352
Introduction 352
Ubiquitous Database 353
Proposed Method 353
Organization of the Rest of the Paper 353
Existing Works 354
Proposed Vehicular Traffic Control System 354
URAs in the Network 355
Agents for Information Dissemination 356
Vehicular Traffic Monitoring and Control 357
Vehicle Tracing 357
Creation of Ubiquitous Database 358
Simulation 360
Simulation Environment 360
Simulation Procedure 360
Illustration of Ubiquitous Database in Traffic Monitoring 363
Conclusion 363
References 363
Application of Particle Swarm Optimization Algorithm for Better Nano-Devices 365
Introduction 365
Analytical Model 366
Particle Swarm Optimization 368
Results and Discussions 369
Conclusion 373
References 373
Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES 374
Introduction 374
Knowledge Based Storage Models 375
The Object-Structured Model (OSM) 375
Concept-Structured Model (CSM) 376
Measuring the ORSR 377
Object Size (OS) 377
Relational Coupling (RC) 378
Empirical Investigation 378
Overview of MES 379
Retrieval of OSM Objects 380
Metric Results and Interpretation 381
Conclusion 383
References 383
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip 386
Introduction 386
NoC Simulation Framework 388
Experimental Setup 388
Routing Algorithms 389
XY Routing 389
Proposed Adaptation of Q-Routing for QoS 389
Results 392
Result Analysis 392
Conclusion and Future Work 395
References 396
Technical Session-8: Application-4 (AP-4) 14
Color Image Restoration Using Morphological Detectors and Adaptive Filter 397
Introduction 397
Proposed Method 398
Morphological Noise Detection 398
Stage-I of Noise Detection 398
Stage-II of Noise Detection 399
Noise Elimination 399
Experimental Results 400
Conclusions 404
References 404
Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography 405
Introduction 406
Problem Statement 407
Description 407
VPP (Virtual Party Protocol) 408
Informal Description 408
Formal Description 410
Security Analysis 411
Conclusion 414
References 415
An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions 416
Introduction 416
Preliminaries 418
Quantization Index Modulation (QIM) 418
Spread Transform Dither Modulation STDM 419
Angle Quantization Index Modulation (AQIM) 419
Result and Discussions 421
Conclusion 425
References 425
Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors 427
Introduction 427
INDOC 428
Sony-Toshiba IBM Cell BE Architecture 430
Issues in Porting a Typical Question Answering System 431
Potential Solutions to the Issues 432
Design and Implementation of INDOC Indexing Algorithm on CELL BE 433
PPE 433
SPE 433
General Observations 435
Results and Conclusion 435
Future Work 435
References 436
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions 438
Introduction 438
Security Issues in P2P Systems 440
Peer Enterprises: Enabling Cross-Organizational P2P Interactions 442
Security Solutions 443
Identity Management 443
Ensuring Security of Individual Peers 443
Ensuring Security of Organization’s Data 444
Dealing with Malicious Peers 446
Conclusions 447
References 448
Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks 450
Introduction 450
Problem Statement 452
New Protocols for Dynamic Key Establishment 453
Hash Based Protocol 453
Polynomial-Based Protocol 454
Analysis of the Proposed Protocols 456
Security Analysis 457
Performance Analysis 457
Conclusion 458
References 459
Technical Session-9: Bioinformatics-1 (B-1) 14
Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology 461
Introduction 461
Materials and Methods 462
Results and Discussion 463
Linking Stress Inflammation, Insulin Resistance and CVD Complications via Significant Signaling Molecules Such as P85A 463
SRC as a Link between Type 2 Diabetes and Cardiovascular Phenotype via NF-kB and Beta Catenin Interaction 464
Statistical Validation 466
References 468
Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide 470
Introduction 470
Method of Calculation 471
Results and Discussion 471
Conclusion 475
References 476
IDChase: Mitigating Identifier Migration Trap in Biological Databases 477
Introduction 477
A Motivating Example 478
Chasing ID Migration 481
Detecting Database Inconsistency in Materialized Views 482
Autonomous Online Reconciliation of ID Inconsistencies 483
ID Migration Management Using IDChase 485
IDChase as a Mechanism for Change Management 485
Summary and Future Research 487
References 488
Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships 489
Introduction 489
Homology Using Domain Information 490
Sequence and Structural Information 491
Dataset 492
Methodology 493
Feature Extraction 493
Vector Quantization 494
Association Rule Mining 495
Classifier Training 496
Results and Discussions 497
Multi-domain Classification 497
Superfamily Classification 497
Classification between Single and Multi-domain Proteins 498
Conclusion 499
References 500
IITKGP-SESC: Speech Database for Emotion Analysis 501
Introduction 501
IITKGP-SESC (Indian Institute of Technology Kharagpur Simulated Emotion Speech Corpus) 503
Prosodic Analysis 504
Subjective Evaluation 507
Summary and Conclusions 508
References 508
Technical Session-10: Bioinformatics-2 (B-2) 15
Detection of Splice Sites Using Support Vector Machine 509
Introduction 509
Materials and Methods 511
Result and Discussion 514
Conclusion and Future Work 516
References 516
Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides 519
Introduction 519
Materials and Methods 520
Wang et al. 2008 Dataset 520
Algorithms Used for the Prediction of MHC Class-II Binding Peptides 520
Evaluation Parameters 521
Results and Discussion 521
Conclusions 523
References 524
Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach 526
Introduction 526
Brief Review 528
Methods 529
Support Vector Machine 529
Data 530
Results and Discussion 531
Conclusion 535
References 535
FCM for Gene Expression Bioinformatics Data 537
Introduction 537
Related Work 538
Methodology 538
Problem Definition 538
Clustering 538
K-Means Clustering Algorithm 539
Fuzzy C-Means Clustering Algorithm 539
Experimental Work 539
Datasets 539
Parameter Selection for FCM 540
Results and Discussion 541
Conclusion 546
References 546
Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection 549
Introduction 549
Related Works 551
Dataset 552
Experimental Analysis 552
Experimental Design 552
Measures for Performance Evaluation 553
Results and Discussion 554
Conclusions 557
References 557
Technical Session-11: System-1 (S-1) 15
An Electronically Tunable SIMO Biquad Filter Using CCCCTA 560
Introduction 560
Current Controlled Current Conveyor Transconductance Amplifier (CCCCTA) 561
Proposed Configuration 562
Non Ideal Analysis 565
Sensitivity Analysis 566
Simulation Results 566
Conclusion 569
References 570
An Architecture for Cross-Cloud System Management 572
Introduction 572
System Management of Compute Resources 574
An Architecture for Cross-Cloud System Management 575
An Implementation Using Amazon Elastic Compute Cloud (EC2) 577
User Interface of Architecture for Cross-Cloud System Management 579
Empirical Results 580
Conclusion 582
References 582
Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models 584
Introduction 584
Preliminaries 585
ALHI Model and XInt Job Scheduling Algorithms 586
The Abstract Linear Heat Interference Model 587
The XInt Algorithm Family 587
Cooling Models 588
Energy Consumption under Various Cooling Models 590
Simulation Setup 590
Energy Savings of under Constant Cooling Model 591
Energy Consumption under the Step-Wise Linear Cooling Model 592
Discussion and Conclusions 595
References 595
Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic 597
Introduction 597
Maintainability 598
Maintainability Challenges for CBS 598
Estimating Maintainability 599
Proposed Fuzzy-Based Approach for Estimating Maintainability of CBS 600
Fuzzy Logic 601
Implementation of Fuzzy Logic 602
Experimental Desig 602
Empirical Evaluation 603
Validation of the Proposed Model 605
Conclusions 605
References 606
Energy-Constrained Scheduling of DAGs on Multi-core Processors 608
Introduction 608
Related Work 609
Task and Energy Model 610
LBL Algorithm 610
DCP Algorithm 611
ISVA Techniques 612
Testing Methodology 614
Workload Generation 614
Variable Values Used in Testing 615
Experimental Results 615
Future Research and Conclusions 617
References 618
Technical Session-12: System-2 (S-2) 16
Evaluation of Code and Data Spatial Complexity Measures 620
Introduction 620
Code Spatial Complexity Measures 621
Data Spatial Complexity Measures 622
Evaluation of Spatial Measures Using Weyuker Properties 622
Validation of Spatial Measures Using Briand’s Criteria 627
Related Work 628
Conclusion 629
References 629
Pitcherpot: Avoiding Honeypot Detection 631
Introduction 631
Honeypot Identification 632
Traffic Scans in the Network 632
Send Fake Packets to Honeypots 633
Connection to System Results in No Acknowledgement 633
Detection of Virtual Computers 633
Proxy Checking through a Third Source 635
Cannot Handle Multiple Attacks at the Same Time 635
Architecture Proposed for Pitcherpot Systems 635
Way a System Is Imitated into the Proposed Pitcherpot 636
Detail of Flow Graph 637
Important Findings 639
Conclusion and Future Works 640
References 640
Verification of Liveness Properties in Distributed Systems 641
Introduction 641
Safety and Liveness in the Event-B Models 642
Event-B Models of Distributed Transactions 643
Abstract Transaction States 643
Refined Transaction States 644
Non-divergence 645
Enabledness Preservation 648
Conclusions 651
References 652
InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices 653
Introduction 653
Previous Works 654
Motivation and Contribution 655
Terms and Notations 655
InfoSec-MobCop System 656
System Design 656
Validation Components 660
Experiment and Results 661
Conclusions 663
References 664
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup 665
Introduction 665
Modeling of RFID MEMS Devices 667
Modeling of Abstraction Level RFID 668
Implementation of Multi-scale Modeling on MCCS, Designing the Framework for NANO RFID 669
Conclusion 673
References 674
Author Index 676

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften Biologie
Schlagworte ad hoc networks • algorithms • authentication • Bioinformatics • biometrics • Computer Applications • Manet • Pattern Matching • security • wireless protocols
ISBN-10 3-642-03547-7 / 3642035477
ISBN-13 978-3-642-03547-0 / 9783642035470
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 16,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Build memory-efficient cross-platform applications using .NET Core

von Trevoir Williams

eBook Download (2024)
Packt Publishing (Verlag)
29,99
Learn asynchronous programming by building working examples of …

von Carl Fredrik Samson

eBook Download (2024)
Packt Publishing Limited (Verlag)
29,99