//]]>

Advances in Computer Science and Information Technology (Record no. 12988)

000 -LEADER
fixed length control field 07347nam a22005415i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310144049.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100618s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642135774
978-3-642-13577-4
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.5-5105.9
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 23
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
912 ## -
-- ZDB-2-SCS
-- ZDB-2-LNC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kim, Tai-hoon.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Advances in Computer Science and Information Technology
Medium [electronic resource] :
Remainder of title AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings /
Statement of responsibility, etc edited by Tai-hoon Kim, Hojjat Adeli.
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 604p. 261 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 6059
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Information Security and Assurance -- Fuzzy Based Threat Analysis in Total Hospital Information System -- An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model -- A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition -- Information Systems Security Criticality and Assurance Evaluation -- Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’ -- Directed Graph Pattern Synthesis in LSB Technique on Video Steganography -- Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning -- Post-quantum Cryptography: Code-Based Signatures -- Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol -- A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems -- An Active Intrusion Detection System for LAN Specific Attacks -- Analysis on the Improved SVD-Based Watermarking Scheme -- Advanced Communication and Networking -- Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes -- Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks -- Grammar Encoding in DNA-Like Secret Sharing Infrastructure -- HATS: High Accuracy Timestamping System Based on NetFPGA -- A Roadside Unit Placement Scheme for Vehicular Telematics Networks -- Concurrent Covert Communication Channels -- Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks -- High Performance MAC Architecture for 3GPP Modem -- Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T -- A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network -- A Model for Interference on Links in Inter-working Multi-hop Wireless Networks -- An Optimum ICA Based Multiuser Data Separation for Short Message Service -- Advanced Computer Science and Information Technology -- Multiple Asynchronous Requests on a Client-Based Mashup Page -- Using an Integrated Ontology Database to Categorize Web Pages -- Topic Detection by Topic Model Induced Distance Using Biased Initiation -- Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm -- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition -- Agent Based Approach to Regression Testing -- A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem -- Development of a Digital Textbook Standard Format Based on XML -- A Pattern-Based Representation Approach for Online Discourses -- A Fault Tolerant Architecture for Transportation Information Services of E-Government -- Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS -- Extract Semantic Information from WordNet to Improve Text Classification Performance -- Managing Ubiquitous Scientific Knowledge on Semantic Web -- A Semantic Pattern Approach to Managing Scientific Publications -- A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults -- Markov Chain Monte Carlo Random Testing -- An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics -- Ubiquitous Computing and Multimedia Applications -- An Effective Video Steganography Method for Biometric Identification -- A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction -- Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis -- Video Copy Detection: Sequence Matching Using Hypothesis Test -- An XML-Based Digital Textbook and Its Educational Effectiveness -- SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition -- Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network -- A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming -- Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech -- CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture -- A Power Control Scheme for an Energy-Efficient MAC Protocol -- Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed joint proceedings of four co-located international conferences, concertedly held in Miyazaki, Japan, in June 2010. The papers in this volume were selected based on their scores obtained from the independent reviewing processes at particular conferences, and their relevance to the idea of constructing hybrid solution to address the real-world challenges of IT. It provides a chance for academic and industry professionals to catch up on recent progress in the related areas. The 49 revised full papers presented were carefully reviewed and selected during two rounds of reviewing and improvement from more than 1000 initial submissions. The papers emanate from the four following international conferences: Information Security and Assurance (ISA 2010), Advanced Communication and Networking (ACN 2010), Advanced Science and Technology (AST 2010), and Ubiquitous Computing and Multimedia Applications (UCMA 2010). This volume focuses on various aspects of advance
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Computer software.
Topical term or geographic name as entry element Database management.
Topical term or geographic name as entry element Information storage and retrieval systems.
Topical term or geographic name as entry element Information systems.
Topical term or geographic name as entry element Artificial intelligence.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Information Systems Applications (incl.Internet).
Topical term or geographic name as entry element Information Storage and Retrieval.
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
Topical term or geographic name as entry element Database Management.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Adeli, Hojjat.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642135767
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-13577-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-03-27AUM Main Library2014-03-27 2014-03-27 E-Book   AUM Main Library004.6

Languages: 
English |
العربية