//]]>
Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 004.6 (Browse Shelf) Not for loan

Workshop on Chemistry and Materials Sciences and Technologies (CMST 2010) -- Accurate Quantum Dynamics on Grid Platforms: Some Effects of Long Range Interactions on the Reactivity of N + N2 -- Supporting Molecular Modeling Workflows within a Grid Services Cloud -- Distributed and Collaborative Learning Objects Repositories on Grid Networks -- Porting of GROMACS Package into the Grid Environment: Testing of a New Distribution Strategy -- Workshop on Biomathematics, Bioinformatics and Biostatistics (IBBB 2010) -- Hashimoto’s Thyroiditis with Petri Nets -- Modelling of the Temporomandibular Joints and the Role of Medical Informatics in Stomatology -- Stability Analysis of an SVLI Epidemic Model -- A New Expert System for Diabetes Disease Diagnosis Using Modified Spline Smooth Support Vector Machine -- Workshop on Human and Information Space Symbiosis (IWHISS 2010) -- Information Privacy in Smart Office Environments: A Cross-Cultural Study Analyzing the Willingness of Users to Share Context Information -- Implementation and Evaluation of Agent Interoperability Mechanism among Heterogeneous Agent Platforms for Symbiotic Computing -- B-Dash: Agent Platform for Mutual Cognition between Human and Agents -- An Extraction Method to Get a Municipality Event Information -- Design and Implementation of Adaptive Inter-platform Communication Mechanism for Agent-Based Framework in Ubiquitous Computing Environment -- An Effective Inference Method Using Sensor Data for Symbiotic Healthcare Support System -- 3D Collaboration Environment Based on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative Applications (RSIA 2010) -- A Cryptographic Algorithm Based on Hybrid Cubes -- Java Implementation for Pairing-Based Cryptosystems -- On Selecting Additional Predictive Models in Double Bagging Type Ensemble Method -- Personalization of Search Profile Using Ant Foraging Approach -- A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application -- An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services -- Accelerating Video Identification by Skipping Queries with a Compact Metric Cache -- Estimating the Influence of Documents in IR Systems: A Marked Indexing Approach -- String Matching with Mismatches by Real-Valued FFT -- Encryption Methods for Restricted Data Limited in Value Range -- The Research for Spatial Role-Based Access Control Model -- Workshop on Collective Evolutionary Systems (IWCES 2010) -- A Bidirectional Heuristic Search Technique for Web Service Composition -- Evolutionary Optimized Networks for Consensus and Synchronization -- Geospatial Analysis of Cooperative Works on Asymmetric Information Environment -- Emergent Stock Market Behaviour from a Multitude of Simple Agents -- A New Neural Network Based Customer Profiling Methodology for Churn Prediction -- General Track on Computational Methods, Algorithms and Applications -- Phonological Recoding in the Second Language Processing -- A Personalized CALL System Considering Users Cognitive Abilities -- Autonomic Resources Management of CORBA Based Systems for Transportation with an Agent -- Performance Evaluation of a Reservoir Simulator on a Multi-core Cluster -- Generating Parallel Random Sequences via Parameterizing EICGs for Heterogeneous Computing Environments -- Efficient Generation of Gray Codes for Reflectable Languages -- Pattern-Unit Based Regular Expression Matching with Reconfigurable Function Unit -- Availability Analysis of an IMS-Based VoIP Network System -- Hybrid Genetic Algorithm for Minimum Dominating Set Problem -- Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control -- Termination of Loop Programs with Polynomial Guards -- Development of Web Based Management Software for Safe Driving -- A Study on Comparative Analysis of the Information Security Management Systems -- Beacon-Based Cooperative Forwarding Scheme for Safety-Related Inter-Vehicle Communications.

The four-volume set LNCS 6016 - 6019 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2010, held in Fukuoka, Japan, in March 2010. The four volumes contain papers presenting a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in virtually all sciences making use of computational techniques. The topics of the fully refereed papers are structured according to the five major conference themes: computational methods, algorithms and scientific application, high performance computing and networks, geometric modelling, graphics and visualization, advanced and emerging applications, and information systems and technologies. Moreover, submissions from more than 30 special sessions and workshops contribute to this publication. These cover These cover topics such as geographical analysis, urban modeling, spatial statistics, wireless and ad hoc networking, logical, scientific and computational aspects of pulse phenomena in transitions, high-performance computing and information visualization, sensor network and its applications, molecular simulations structures and processes, collective evolutionary systems, software engineering processes and applications, molecular simulations structures and processes, internet communication security, security and privacy in pervasive computing environments, and mobile communications.

There are no comments for this item.

Log in to your account to post a comment.

Languages: 
English |
العربية