000 | 06347nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-12179-1 | ||
003 | DE-He213 | ||
005 | 20160624102141.0 | ||
007 | cr nn 008mamaa | ||
008 | 100402s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642121791 _9978-3-642-12179-1 |
||
024 | 7 |
_a10.1007/978-3-642-12179-1 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aComputational Science and Its Applications – ICCSA 2010 _h[electronic resource] : _bInternational Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part III / _cedited by David Taniar, Osvaldo Gervasi, Beniamino Murgante, Eric Pardede, Bernady O. Apduhan. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
300 |
_aXIX, 570p. 284 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6018 |
|
505 | 0 | _aWorkshop on Mobile Communications (MC 2010) -- A Control Loop Reduction Scheme for Wireless Process Control on Traffic Light Networks -- Performance Measurement of a Dual-Channel Intersection Switch on the Vehicular Network -- A Rapid Code Acquisition Scheme for Optical CDMA Systems -- Optimal and Suboptimal Synchronization Schemes for Ultra-Wideband Systems -- Partial Information Relaying with Multi-Layered Superposition Coding -- Performance Measurement of the Hybrid Prefetch Scheme on Vehicular Telematics Networks -- Power Control for Soft Fractional Frequency Reuse in OFDMA System -- Authentication – Based Medium Access Control to Prevent Protocol Jamming: A-MAC -- Femtocell Deployment to Minimize Performance Degradation in Mobile WiMAX Systems -- A Novel Frequency Planning for Femtocells in OFDMA-Based Cellular Networks Using Fractional Frequency Reuse -- Association Analysis of Location Tracking Data for Various Telematics Services -- An Efficient ICI Cancellation Method for Cooperative STBC-OFDM Systems -- Low-Cost Two-Hop Anchor Node-Based Distributed Range-Free Localization in Wireless Sensor Networks -- SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs -- Avoidance of Co-channel Interference Using Switched Parasitic Array Antenna in Femtocell Networks -- User Policy Based Transmission Control Method in Cognitive Wireless Network -- Workshop on Rough and Soft Sets Theories and Applications (RSSA 2010) -- Development of a Hybrid Case-Based Reasoning for Bankruptcy Prediction -- The Time Series Image Analysis of the HeLa Cell Using Viscous Fluid Registration -- Matrices Representation of Multi Soft-Sets and Its Application -- Clustering Analysis of Water Quality for Canals in Bangkok, Thailand -- Workshop on Wireless and Ad Hoc Networking (WADNet 2010) -- A Review of Routing Protocols for UWB MANETs -- An Efficient and Reliable Routing Protocol for Wireless Mesh Networks -- A Context-Aware Service Model Based on Workflows for u-Agriculture -- A History-Based Scheduler for Dynamic Load Balancing on Distributed VOD Server Environments -- A Secure Routing Protocol for Wireless Sensor Networks -- Efficient Pairwise Key Establishment Scheme Based on Random Pre-distribution Keys in WSN -- Agent Based Approach of Routing Protocol Minimizing the Number of Hops and Maintaining Connectivity of Mobile Terminals Which Move One Area to the Other -- Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN -- Workshop on Wireless Multimedia Sensor Networks (WMSN 2010) -- A Review of Redundancy Elimination Protocols for Wireless Sensor Networks -- A Light-Weighted Misused Key Detection in Wireless Sensor Networks -- Identifying Mudslide Area and Obtaining Forewarned Time Using AMI Associated Sensor Network -- General Track on Information Systems and Information Technologies -- Utilization of Ontology in Health for Archetypes Constraint Enforcement -- Time-Decaying Bloom Filters for Efficient Middle-Tier Data Management -- Soft Decision Making for Patients Suspected Influenza -- Personal Identification by EEG Using ICA and Neural Network -- A Formal Concept Analysis-Based Domain-Specific Thesaurus and Its Application in Document Representation -- On the Configuration of the Similarity Search Data Structure D-Index for High Dimensional Objects -- Automatic Chinese Text Classification Using N-Gram Model -- Genetic Algorithms Evolving Quasigroups with Good Pseudorandom Properties -- Software Openness: Evaluating Parameters of Parametric Modeling Tools to Support Creativity and Multidisciplinary Design Integration -- Dynamic and Cyclic Response Simulation of Shape Memory Alloy Devices -- Adaptive Fuzzy Filter for Speech Enhancement -- Risk Prediction for Postoperative Morbidity of Endovascular Aneurysm Repair Using Ensemble Model -- Further Results on Swarms Solving Graph Coloring -- Data Collection System for the Navigation of Wheelchair Users: A Preliminary Report. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer software. | |
650 | 0 | _aData mining. | |
650 | 0 | _aInformation systems. | |
650 | 0 | _aComputer simulation. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aSimulation and Modeling. |
650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
700 | 1 |
_aTaniar, David. _eeditor. |
|
700 | 1 |
_aGervasi, Osvaldo. _eeditor. |
|
700 | 1 |
_aMurgante, Beniamino. _eeditor. |
|
700 | 1 |
_aPardede, Eric. _eeditor. |
|
700 | 1 |
_aApduhan, Bernady O. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642121784 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6018 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-12179-1 |
942 |
_2EBK8979 _cEBK |
||
999 |
_c38273 _d38273 |