000 | 05676nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-10509-8 | ||
003 | DE-He213 | ||
005 | 20160624102138.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2009 gw | s |||| 0|eng d | ||
020 |
_a9783642105098 _9978-3-642-10509-8 |
||
024 | 7 |
_a10.1007/978-3-642-10509-8 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aFuture Generation Information Technology _h[electronic resource] : _bFirst International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009. Proceedings / _cedited by Young-hoon Lee, Tai-hoon Kim, Wai-chi Fang, Dominik Ślęzak. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
300 |
_aXIII, 318 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5899 |
|
505 | 0 | _aKeynotes -- Computer Science: Where Is the Next Frontier? -- Video Forgery -- Data Analysis, Data Processing, Advanced Computation Models -- Intelligent Data Granulation on Load: Improving Infobright’s Knowledge Grid -- Data Analysis Methods for Library Marketing -- HMM Approach for Classifying Protein Structures -- Investigation of Average Mutual Information for Species Separation Using GSOM -- Speech Recognition System and Formant Based Analysis of Spoken Arabic Vowels -- A Study on Mental Tasks Discriminative Power -- A Straight Line-Based Distance Measure to Compute Photographic Compositional Dissimilarity -- Data Gathering for Gesture Recognition Systems Based on Mono Color-, Stereo Color- and Thermal Cameras -- Object Surface Reconstruction from One Camera System -- The Study of Development Strategy for Bank Distribution Network through the Analysis of Inter-regional Financial Transaction Network -- Global Synchronization Properties for Different Classes of Underlying Interconnection Graphs for Kuramoto Coupled Oscillators -- Predicting the Performance of a GRID Environment: An Initial Effort to Increase Scheduling Efficiency -- Towards an Integrated Vision across Inter-cooperative Grid Virtual Organizations -- Effective GIS Mobile Query System -- Modeling and Simulation of Tandem Tollbooth Operations with Max-Algebra Approach -- Security, Software Engineering, Communication and Networking -- Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism -- Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis -- Fragmentation Point Detection of JPEG Images at DHT Using Validator -- Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol -- Automatic Detection of Infinite Recursion in AspectJ Programs -- A Hierarchical Test Model and Automated Test Framework for RTC -- A Bi-objective Model Inspired Greedy Algorithm for Test Suite Minimization -- Analysing Object Type Hierarchies to Identify Crosscutting Concerns -- A Bayesian Inference Tool for NHPP-Based Software Reliability Assessment -- AGILE Rate Control for IEEE 802.11 Networks -- Low Density Parity Check Code for the Single Carrier Frequency Division Multiple Access -- Dual Optimization of Dynamic Sensor Function Allocation and Effective Sensed Data Aggregation in Wireless Sensor Networks -- Depth-Spatio-Temporal Joint Region-of-Interest Extraction and Tracking for 3D Video -- Dynamic Routing Algorithm for Reliability and Energy Efficiency in Wireless Sensor Networks -- QoS Multicast Routing Algorithms Based on Tabu Search with Hybrid Candidate List -- A Lifetime Enhancing Node Deployment Strategy in WSN -- Data Analysis, Data Processing, Advanced Computation Models -- Experimental Investigation of Three Machine Learning Algorithms for ITS Dataset. | |
520 | _aThis book constitutes the reviewed proceedings of the first Conference on Future Generation Information Technology, FGIT 2009, held in Jeju Island, Korea, December 10-12, 2009. The 33 full papers presented together with two keynote papers were carefully selected from 1051 submissions. This book considers the best papers of the conference and issues such as data analysis, data processing, advanced computation models and security, software engineering, communication and networking. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputer network architectures. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aComputer system performance. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
650 | 2 | 4 | _aPerformance and Reliability. |
650 | 2 | 4 | _aSystem Performance and Evaluation. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aLee, Young-hoon. _eeditor. |
|
700 | 1 |
_aKim, Tai-hoon. _eeditor. |
|
700 | 1 |
_aFang, Wai-chi. _eeditor. |
|
700 | 1 |
_aŚlęzak, Dominik. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642105081 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5899 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-10509-8 |
942 |
_2EBK8876 _cEBK |
||
999 |
_c38170 _d38170 |