Computational Science and Its Applications - Iccsa 2009: International Conference, Seoul, Korea, June 29--July 2, 2009, Proceedings, Part II
| PUBLISHER | Springer (06/15/2009) |
| PRODUCT TYPE | Paperback (Paperback) |
Description
Workshop on Software Engineering Processes and Applications (SEPA 2009).- Ontology-Based Requirements Conflicts Analysis in Activity Diagrams.- Resource Allocation Optimization for GSD Projects.- Verification of Use Case with Petri Nets in Requirement Analysis.- Towards Guidelines for a Development Process for Component-Based Embedded Systems.- Effective Project Leadership in Computer Science and Engineering.- Weyuker's Properties, Language Independency and Object Oriented Metrics.- Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009).- Lattice Constant Prediction of A2BB'O6 Type Double Perovskites.- A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients.- A Grid Implementation of Direct Quantum Calculations of Rate Coefficients.- A Grid Implementation of Chimere: Ozone Production in Central Italy.- Workshop on Internet Communication Security (WICS 2009).- MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT.- Testing Topologies for the Evaluation of IPSEC Implementations.- Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key.- Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009).- Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.- Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.- Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.- A Practical Approach to a Reliable Electronic Election.- Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.- Workshop on Mobile Communications (MC 2009).- Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments.- Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System.- Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition.- A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System.- Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes.- Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System.- WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up.- Overlay Ring Based Secure Group Communication Scheme for Mobile Agents.- Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems.- AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization.- Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol.- Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.- On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors.- Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code.- Design of an Efficient Multicast Scheme for Vehicular Telematics Networks.- ODDUGI: Ubiquitous Mobile Agent System.- Determination of the Optimal Hop Number for Wireless Sensor Networks.- Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models.- A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs.- Analysis of Moving Patterns of Moving Objects with the Proposed Framework.- A User-Defined Index for Containment Queries in XML.- On Optimal Placement of the Monitoring Devices on Channels of Communication Network.- Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks.- A Capacity Aware Data Transport Protocol for Wireless Sensor Network.- Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs).- VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802...
Show More
Product Format
Product Details
ISBN-13:
9783642024566
ISBN-10:
3642024564
Binding:
Paperback or Softback (Trade Paperback (Us))
Content Language:
English
More Product Details
Page Count:
957
Carton Quantity:
8
Product Dimensions:
6.10 x 1.30 x 9.10 inches
Weight:
2.45 pound(s)
Feature Codes:
Illustrated
Country of Origin:
DE
Subject Information
BISAC Categories
Computers | Networking - Hardware
Computers | Artificial Intelligence - General
Computers | Software Development & Engineering - General
Dewey Decimal:
004
Descriptions, Reviews, Etc.
publisher marketing
Workshop on Software Engineering Processes and Applications (SEPA 2009).- Ontology-Based Requirements Conflicts Analysis in Activity Diagrams.- Resource Allocation Optimization for GSD Projects.- Verification of Use Case with Petri Nets in Requirement Analysis.- Towards Guidelines for a Development Process for Component-Based Embedded Systems.- Effective Project Leadership in Computer Science and Engineering.- Weyuker's Properties, Language Independency and Object Oriented Metrics.- Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009).- Lattice Constant Prediction of A2BB'O6 Type Double Perovskites.- A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients.- A Grid Implementation of Direct Quantum Calculations of Rate Coefficients.- A Grid Implementation of Chimere: Ozone Production in Central Italy.- Workshop on Internet Communication Security (WICS 2009).- MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT.- Testing Topologies for the Evaluation of IPSEC Implementations.- Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key.- Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009).- Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.- Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.- Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.- A Practical Approach to a Reliable Electronic Election.- Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.- Workshop on Mobile Communications (MC 2009).- Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments.- Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System.- Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition.- A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System.- Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes.- Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System.- WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up.- Overlay Ring Based Secure Group Communication Scheme for Mobile Agents.- Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems.- AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization.- Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol.- Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.- On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors.- Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code.- Design of an Efficient Multicast Scheme for Vehicular Telematics Networks.- ODDUGI: Ubiquitous Mobile Agent System.- Determination of the Optimal Hop Number for Wireless Sensor Networks.- Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models.- A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs.- Analysis of Moving Patterns of Moving Objects with the Proposed Framework.- A User-Defined Index for Containment Queries in XML.- On Optimal Placement of the Monitoring Devices on Channels of Communication Network.- Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks.- A Capacity Aware Data Transport Protocol for Wireless Sensor Network.- Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs).- VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802...
Show More
Editor:
Taniar, David
Wenny Rahayu is a senior lecturer at La Trobe University. David Taniar is with the School of Business Systems, Faculty of Information Technology at Monash University and is the editor-in-chief of the "International Journal of Data Warehousing and Mining," Eric Pardede is a professor in the department of computer science and computer engineering at La Trobe University.
Show More
List Price $109.99
Your Price
$108.89
