did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642035463

Contemporary Computing: Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings

by ; ; ; ;
  • ISBN13:

    9783642035463

  • ISBN10:

    3642035469

  • Format: Paperback
  • Copyright: 2009-08-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $189.00

Summary

This book constitutes the refereed papers of the 2nd International Conference on Contemporary Computing, which was held in Noida (New Delhi), India, in August 2009. The 61 revised full papers presented were carefully reviewed and selected from 213 submissions and focus on topics that are of contemporary interest to computer and computational scientists and engineers. The papers are organized in topical sections on Algorithms, Applications, Bioinformatics, and Systems.

Table of Contents

Algorithm-1 (AL-1)
A Hybrid Grouping Genetic Algorithm for Multiprocessor Schedulingp. 1
PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Imagesp. 8
A New Position-Based Fast Radix-2 Algorithm for Computing the DHTp. 14
Study of Bit-Parallel Approximate Parameterized String Matching Algorithmsp. 26
Optimization of Finite Difference Method with Multiwavelet Basesp. 37
Algorithm-2 (AL-2)
A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networksp. 49
A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networksp. 58
An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systemsp. 70
Throughput Considerations of Fault-Tolerant Routing in Network-on-Chipp. 81
A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matchingp. 93
Algorithm-3 (AL-3)
Optimized Graph Search Using Multi-Level Graph Clusteringp. 103
An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patternsp. 115
A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimizationp. 127
Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scriptsp. 138
Local Subspace Based Outlier Detectionp. 149
New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regionsp. 158
Algorithm-4 (AL-4)
On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networksp. 170
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signaturep. 182
Indexing Iris Biometric Database Using Energy Histogram of DCT Subbandsp. 194
Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Partiesp. 205
Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Framep. 216
Application-1 (AP-1)
Secure Receipt-Free Sealed-Bid Electronic Auctionp. 228
An Architecture for Handling Fuzzy Queries in Data Warehousesp. 240
Palmprint Based Verification System Using SURF Featuresp. 250
A Personnel Centric Knowledge Management Systemp. 263
Application-2 (AP-2)
A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networksp. 273
Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approachp. 284
CDIS: Circle Density Based Iris Segmentationp. 295
Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machinesp. 307
Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machinep. 318
Application-3 (AP-3)
Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computingp. 327
Vehicular Traffic Control: A Ubiquitous Computing Approachp. 336
Application of Particle Swarm Optimization Algorithm for Better Nano-Devicesp. 349
Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MESp. 358
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chipp. 370
Application-4 (AP-4)
Color Image Restoration Using Morphological Detectors and Adaptive Filterp. 381
Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptographyp. 389
An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortionsp. 400
Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processorsp. 411
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutionsp. 422
Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networksp. 434
Bioinformatics-1 (B-1)
Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biologyp. 445
Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamidep. 454
IDChase: Mitigating Identifier Migration Trap in Biological Databasesp. 461
Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationshipsp. 473
IITKGP-SESC: Speech Database for Emotion Analysisp. 485
Bioinformatics-2 (B-2)
Detection of Splice Sites Using Support Vector Machinep. 493
Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptidesp. 503
Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approachp. 510
FCM for Gene Expression Bioinformatics Datap. 521
Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selectionp. 533
System-1 (S-1)
An Electronically Tunable SIMO Biquad Filter Using CCCCTAp. 544
An Architecture for Cross-Cloud System Managementp. 556
Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Modelsp. 568
Predicting Maintainability of Component-Based Systems by Using Fuzzy Logicp. 581
Energy-Constrained Scheduling of DAGs on Multi-core Processorsp. 592
System-2 (S-2)
Evaluation of Code and Data Spatial Complexity Measuresp. 604
Pitcherpot: Avoiding Honeypot Detectionp. 615
Verification of Liveness Properties in Distributed Systemsp. 625
InfoSec-MobCop-Framework for Theft Detection and Data Security on Mobile Computing Devicesp. 637
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setupp. 649
Author Indexp. 661
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program