Atjaunināt sīkdatņu piekrišanu

Contemporary Computing: Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings 2009 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 662 pages, height x width: 235x155 mm, weight: 1032 g, XVIII, 662 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 40
  • Izdošanas datums: 28-Jul-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642035469
  • ISBN-13: 9783642035463
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 662 pages, height x width: 235x155 mm, weight: 1032 g, XVIII, 662 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 40
  • Izdošanas datums: 28-Jul-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642035469
  • ISBN-13: 9783642035463
Welcome to the Second International Conference on Contemporary Computing, which was held in Noida (outskirts of New Delhi), India. Computing is an exciting and evolving area. This conference, which was jointly organized by the Jaypee Institute of Information Technology University, Noida, India and the University of Florida, Gainesville, USA, focused on topics that are of contemporary interest to computer and computational scientists and engineers. The conference had an exciting technical program of 61 papers submitted by - searchers and practitioners from academia, industry and government to advance the algorithmic, systems, applications, and educational aspects of contemporary comp- ing. These papers were selected from 213 submissions (with an overall acceptance rate of around 29%). The technical program was put together by a distinguished int- national Program Committee. The Program Committee was led by the following Track Chairs and Special Session Chairs: Srinivas Aluru, Rajkumar Buyya, Yeh-Ching Chung, Sumeet Dua, Ananth Grama, Sandeep Gupta, Rajeev Kumar and Vir Phoha. I would like to thank the Program Committee, the Track Chairs and Special Session Chairs for their tremendous effort. I would like to thank the General Chairs, Sartaj Sahni and Sanjay Goel for giving me the opportunity to lead the technical program. Sanjay Ranka
Technical Session-1: Algorithm-1 (AL-1)
A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling
1(7)
Alok Singh
Marc Sevaux
Andre Rossi
PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images
8(6)
Rajeev Srivastava
J.R.P. Gupta
Harish Parthasarthy
Subodh Srivastava
A New Position-Based Fast Radix-2 Algorithm for Computing the DHT
14(12)
Gautam A. Shah
Tejmal S. Rathore
Study of Bit-Parallel Approximate Parameterized String Matching Algorithms
26(11)
Rajesh Prasad
Suneeta Agarwal
Optimization of Finite Difference Method with Multiwavelet Bases
37(12)
Eralt P. Sumesh
Elizabeth Elias
Technical Session-2: Algorithm-2 (AL-2)
A Novel Genetic Algoritnn Approach to Mobility Prediction in Wireless Networks
49(9)
C. Mala. Mohanraj Loganathan
N.P. Gopalan
B. SivaSelvan
A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks
58(12)
Natarajan Meghanathan
Meena Sugumar
An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems
70(11)
S. Srinivasan
Rajan Vidya
Ramasamy Rajaram
Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip
81(12)
Arshin Rezazadeh
Mahmood Fathy
A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching
93(10)
Deepank Gupta
Bob Morris
Terry Catapano
Guido Sautter
Technical Session-3: Algorithm-3 (AL-3)
Optimized Graph Search Using Multi-Level Graph Clustering
103(12)
Rahul Kala
Anupam Shukla
Ritu Tiwari
An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns
115(12)
B. Pravin Kumar
V. Divakar
E. Vinoth
Radha Senthil Kumar
A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization
127(11)
Musrrat Ali
Millie Pant
Ved Pal Singh
Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts
138(11)
S. V. Rajashekararadhya
P. Vanaja Ranjan
Local Subspace Based Outlier Detection
149(9)
Ankur Agrawal
New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions
158(12)
S.R. Kannan
A. Sathya
S. Ramathilagam
R. Pandiyarajan
Technical Session-4: Algorithm-4 (AL-4)
On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoe Networks
170(12)
Natarajan Meghanathan
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature
182(12)
Saroj Kumar Panigrahy
Debasish Jena
Sathya Babu Korra
Sanjay Kumar Jena
Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands
194(11)
Hunny Mchrotra
Badrinath G. Srinivas
Banshidhar Majhi
Phalguni Gupta
Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties
205(11)
Rohit Pathak
Satyadhar Joshi
Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame
216(12)
Chandan Maity
Ashutosh Gupta
Mahua Maity
Technical Session-5: Application-1 (AP-1)
Secure Receipt-Free Sealed-Bid Electronic Auction
228(12)
Jaydeep Howlader
Anushma Ghosh
Tandra DebRoy Pal
An Architeeture for Handling Fuzzy Queries in Data Warehouses
240(10)
Mana Pratap Singh
Rajdev Tiwari
Manish Mahajan
Diksha Dani
Palmprint Based Verification System Using SURF Features
250(13)
Badrinath G. Srinivas
Phalguni Gupta
A Personnel Centric Knowledge Management System
263(10)
Baisakhi Chakraborty
Meghbartma Gautam
Technical Session-6: Application-2 (AP-2)
A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarehical Organization of Wireless Sensor Networks
273(11)
Ajay Kr. Gautam
Amit Kr. Gautam
Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach
284(11)
Shelly Bansal
Daya Gupta
V.K. Panchal
Shashi Kumar
CDIS: Circle Density Based Iris Segmentation
295(12)
Anand Gupta
Anita Kumari
Boris Kundu
Isha Agarwal
Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines
307(11)
Aneila Bajpai
Vinod Palhangay
Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine
318(9)
Sweta Thakur
Jamuna K. Sing
Dipak K. Basu
Mita Nasipuri
Technical Session-7: Application-3 (AP-3)
Threshold Signature Gryptography Scheme in Wireless Ad-Hoe Computing
327(9)
Sandip Vijay
Subhash G. Sharma
Vehicular Traflic Control: A Ubiquitous Computing Approach
336(13)
Naishadh K. Dave
Vanaraj B. Vaghela
Application of Particle Swarm Optimization Algorithm for Better Nano-Devices
349(9)
Nameirakpam Basanta Singh
Sanjoy Deb
Guru P. Mishra
Samir Kumar Sarkar
Subir Kumar Sarkar
Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES
358(12)
Scluyn Justus
K. Iyakutti
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip
370(11)
Krishan Kumar Paliwal
Jinesh Shaji George
Navaneeth Rameshan
Vijay Laxmi
M.S. Gaur
Vijay Janyani
R. Narasimhan
Technical Session-8: Application-4 (AP-4)
Color Image Restoration Using Morphological Detectors and Adaptive Filter
381(8)
Anita Sahoo
Rohal Suchi
Neha Khan
Pooja Pandey
Mudita Srivastava
Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography
389(11)
Rohit Pathak
Satyadhar Joshi
An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions
400(11)
Vijay Harishchandra Mankar
Tirtha Sankar Das
Subir Kumar Sarkar
Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors
411(11)
Tarun Kumar
Ankush Mittal
Parikshil Sondhi
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions
422(12)
Ankur Gupta
Lalil K. Awasthi
Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks
434(11)
A.S. Poornima
B.B. Amberker
Technical Session-9: Bioinformatics-1 (B-1)
Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology
445(9)
Sanchaita Ukil
Meenakshee Sinha
Lavneesh Varshney
Shipra Agrawal
Study of Drug-Nucleic Acid Interactions: 9-amino- [ N-2-(1-morpholinyl)ethyl]acridine-l-carboxamide
454(7)
Rajeshwer Shukla
Sugriva Nath Tiwari
IDChase: Mitigating Identifier Migration Trap in Biological Databases
461(12)
Anupam Bhattacharjee
Aminual Islam
Hasan Jamil
Derek Wildman
Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships
473(12)
Harpreet Singh
Pradeep Chowriappa
Sumeet Dua
IITKGP-SESC: Speech Database for Emotion Analysis
485(8)
Shashidhar G. Koolagudi
Sudhamay Maity
Vuppala Anil Kumar
Saswal Chakrabarti
K. Sreenivasa Rao
Technical Session-10: Bioinformatics-2 (B-2)
Detection of Splice Sites Using Support Vector Machine
493(10)
Pritish Varadwaj
Neetesh Purohil
Bhumika Arora
Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MIIC Class-II Binding Peptides
503(7)
Satarutra Prakash Singh
Bhartendu Nath Mishra
Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach
510(11)
Appala Raju Kolaru
Ramesh C. Joshi
FCM for Gene Expression Bioinformatics Data
521(12)
Dhiraj Kumar
Santanu Kumar Rath
Korra Sathya Babu
Enhaneing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection
533(11)
Balakrishnan Sarojini
Narayanasamy Ramaraj
Savarimuthu Nickolas
Technical Session-11: System-1 (S-1)
An Electronically Tunable SIMO Biquad Filter Using CCCCTA
544(12)
Sajai Vir Singh
Sudhanshu Maheshwari
Jitendra Mohan
Durg Singh Chauhan
An Architecture for Cross-Cloud System Management
556(12)
Ravi Teja Dodda
Chris Smith
Aad van Moorsel
Energy Efliciency of Thermal-A ware Job Scheduling Algorithms under Various Cooling Models
568(13)
Georgios Varsamopoulos
Ayan Banerjee
Sandeep K.S. Gupta
Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic
581(11)
Arun Sharma
P.S. Grover
Rajesh Kumar
Energy-Constrained Scheduling of DAGs on Multi-core Processors
592(12)
Ishfaq Ahmad
Roman Arora
Derek White
Vangelis Metsis
Rebecca Ingram
Technical Session-12: System-2 (S-2)
Evaluation of Code and Data Spatial Complexity Measures
604(11)
Jitender Kumar Chhabra
Varun Gupta
Piteherpot: Avoiding Honeypot Detection
615(10)
Vinod K. Panchal
Pramod K. Bhatnagar
Mitul Bhatnagar
Verification of Liveness Properties in Distributed Systems
625(12)
Divakar Yadav
Michael Butler
InfoSee-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices
637(12)
Anand Gupta
Deepank Gupta
Nidhi Gupta
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup
649(12)
Rohit Pathak
Satyadhar Joshi
Author Index 661