rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642121784

Computational Science and Its Applications - ICCSA 2010 : International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part III

by ; ; ; ;
  • ISBN13:

    9783642121784

  • ISBN10:

    3642121780

  • Format: Paperback
  • Copyright: 2010-04-21
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $149.00 Save up to $98.96
  • Digital
    $108.42*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the RD community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available.

Table of Contents

Workshop on Mobile Communications (MC 2010)
A Control Loop Reduction Scheme for Wireless Process Control on Traffic Light Networksp. 1
Performance Measurement of a Dual-Channel Intersection Switch on the Vehicular Networkp. 11
A Rapid Code Acquisition Scheme for Optical CDMA Systemsp. 21
Optimal and Suboptimal Synchronization Schemes for Ultra-Wideband Systemsp. 31
Partial Information Relaying with Multi-Layered Superposition Codingp. 42
Performance Measurement of the Hybrid Prefetch Scheme on Vehicular Telematics Networksp. 52
Power Control for Soft Fractional Frequency Reuse in OFDMA Systemp. 63
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MACp. 72
Femtocell Deployment to Minimize Performance Degradation in Mobile WiMAX Systemsp. 85
A Novel Frequency Planning for Femtocells in OFDMA-Based Cellular Networks Using Fractional Frequency Reusep. 96
Association Analysis of Location Tracking Data for Various Telematics Servicesp. 107
An Efficient ICI Cancellation Method for Cooperative STBC-OFDM Systemsp. 118
Low-Cost Two-Hop Anchor Node-Based Distributed Range-Free Localization in Wireless Sensor Networksp. 129
SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNsp. 142
Avoidance of Co-channel Interference Using Switched Parasitic Array Antenna in Femtocell Networksp. 158
User Policy Based Transmission Control Method in Cognitive Wireless Networkp. 168
Workshop on Rough and Soft Sets Theories and Applications (RSSA 2010)
Development of a Hybrid Case-Based Reasoning for Bankruptcy Predictionp. 178
The Time Series Image Analysis of the HeLa Cell Using Viscous Fluid Registrationp. 189
Matrices Representation of Multi Soft-Sets and Its Applicationp. 201
Clustering Analysis of Water Quality for Canals in Bangkok, Thailandp. 215
Workshop on Wireless and Ad Hoc Networking (WADNet 2010)
A Review of Routing Protocols for UWB MANETsp. 228
An Efficient and Reliable Routing Protocol for Wireless Mesh Networksp. 246
A Context-Aware Service Model Based on Workflows for u-Agriculturep. 258
A History-Based Scheduler for Dynamic Load Balancing on Distributed VOD Server Environmentsp. 269
A Secure Routing Protocol for Wireless Sensor Networksp. 277
Efficient Pairwise Key Establishment Scheme Based on Random Pre-distribution Keys in WSNp. 291
Agent Based Approach of Routing Protocol Minimizing the Number of Hops and Maintaining Connectivity of Mobile Terminals Which Move One Area to the Otherp. 305
Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSNp. 321
Workshop on Wireless Multimedia Sensor Networks (WMSN 2010)
A Review of Redundancy Elimination Protocols for Wireless Sensor Networksp. 336
A Light-Weighted Misused Key Detection in Wireless Sensor Networksp. 352
Identifying Mudslide Area and Obtaining Forewarned Time Using AMI Associated Sensor Networkp. 368
General Track on Information Systems and Information Technologies
Utilization of Ontology in Health for Archetypes Constraint Enforcementp. 380
Time-Decaying Bloom Filters for Efficient Middle-Tier Data Managementp. 395
Soft Decision Making for Patients Suspected Influenzap. 405
Personal Identification by EEG Using ICA and Neural Networkp. 419
A Formal Concept Analysis-Based Domain-Specific Thesaurus and Its Application in Document Representationp. 431
On the Configuration of the Similarity Search Data Structure D-Index for High Dimensional Objectsp. 443
Automatic Chinese Text Classification Using N-Gram Modelp. 458
Genetic Algorithms Evolving Quasigroups with Good Pseudorandom Propertiesp. 472
Software Openness: Evaluating Parameters of Parametric Modeling Tools to Support Creativity and Multidisciplinary Design Integrationp. 483
Dynamic and Cyclic Response Simulation of Shape Memory Alloy Devicesp. 498
Adaptive Fuzzy Filter for Speech Enhancementp. 511
Risk Prediction for Postoperative Morbidity of Endovascular Aneurysm Repair Using Ensemble Modelp. 526
Further Results on Swarms Solving Graph Coloringp. 541
Data Collection System for the Navigation of Wheelchair Users: A Preliminary Reportp. 552
Author Indexp. 565
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program