Atjaunināt sīkdatņu piekrišanu

High Performance Architecture and Grid Computing: International Conference, HPAGC 2011, Chandigarh, India, July 19-20, 2011. Proceedings [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 659 pages, height x width: 235x155 mm, weight: 1136 g, XIX, 659 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 169
  • Izdošanas datums: 05-Jul-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642225764
  • ISBN-13: 9783642225765
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 659 pages, height x width: 235x155 mm, weight: 1136 g, XIX, 659 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 169
  • Izdošanas datums: 05-Jul-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642225764
  • ISBN-13: 9783642225765
This book constitutes the refereeds proceedings of the International Conference on High Performance Architecture and Grid Computing, HPAGC 2011, held in Chandigarh, India, in July 2011. The 87 revised full papers presented were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on grid and cloud computing; high performance architecture; information management and network security.
Theme-1 Grid and Cloud Computing
Era of Cloud Computing
1(8)
Pramod Kumar Joshi
Sadhana Rana
An Overview on Soft Computing Techniques
9(15)
K. Koteswara Rao
G. S.V.P. Raju
A Novel Approach for Task Processing through NEST Network in a Grid
24(6)
Tarun Gupta
Vipin Tyagi
TCP/IP Security Protocol Suite for Grid Computing Architecture
30(6)
Vikas Kamra
Amit Chugh
Security Issues in Cloud Computing
36(10)
Pardeep Sharma
Sandeep K. Sood
Sumeet Kaur
Classification of Software Quality Attributes for Service Oriented Architecture
46(6)
Satish Kumar
Neeta Singh
Anuj Kumar
Energy Efficiency for Software and Services on the Cloud
52(4)
Priyanka Bhati
Prerna Sharma
Avinash Sharma
Jatin Sutaria
M. Hanumanthapa
Evaluation of Grid Middleware Frameworks for Execution of MPI Applications
56(6)
Abhishek Jain
Sathish S. Vadhiyar
Virtualization as an Engine to Drive Cloud Computing Security
62(5)
Jyoti Snehi
Manish Snehi
Rupali Gill
Multi-dimensional Grid Quorum Consensus for High Capacity and Availability in a Replica Control Protocol
67(12)
Vinit Kumar
Ajay Agarwal
Efficient Task Scheduling Algorithms for Cloud Computing Environment
79(5)
S. Sindhu
Saswati Mukherjee
"Cloud Computing: Towards Risk Assessment"
84(8)
Bharat Chhabra
Bhawna Taneja
Efficient Grid Scheduling with Clouds
92(11)
L. Yamini
G. LathaSelvi
Saswati Mukherjee
Security Concerns in Cloud Computing
103(10)
Puneet Jai Kaur
Sakshi Kaushal
Cloud Computing - The Future
113(6)
Vinay Chawla
Prenul Sogani
Cloud Computing: A Need for a Regulatory Body
119(7)
Bikramjit Singh
Rizul Khanna
Dheeraj Gujral
Clustering Dynamic Class Coupling Data to Measure Class Reusability Pattern
126(5)
Anshu Parashar
Jitender Kumar Chhabra
Cloud Computing in Education: Make India Better with the Emerging Trends
131(9)
Sunita Manro
Jagmohan Singh
Rajan Manro
Enhancing Grid Resource Scheduling Algorithms for Cloud Environments
140(5)
Pankaj Deep Kaur
Inderveer Chana
Development of Efficient Artificial Neural Network and Statistical Models for Forecasting Shelf Life of Cow Milk Khoa - A Comparative Study
145(5)
Sumit Goyal
A.K. Sharma
R.K. Sharma
QoS for Grid Systems
150(4)
Vandana
Tamanna Sehgal
Creating Information Advantage in Cloudy World
154(5)
Ravita Chahar
Vikram Mangla
Theme-2 High Performance Architecture
Design of CMOS Energy Efficient Single Bit Full Adders
159(10)
Manoj Kumar
Sujata Pandey
Sandeep K. Arya
Exploring Associative Classification Technique Using Weighted Utility Association Rules for Predictive Analytics
169(10)
Mamta Punjabi
Vineet Kushwaha
Rashmi Ranjan
Bio-enable Security for Operating System by Customizing Gina
179(7)
Swapnaja A. Ubale
S.S. Apte
A Destination Capability Aware Dynamic Load Balancing Algorithm for Heterogeneous Environment
186(6)
Sharma Rajkumar
Kanungo Priyesh
Chandwani Manohar
Reliable Mobile Agent in Multi - Region Environment with Fault Tolerance for E-Service Applications
192(9)
M. Vigilson Prem
S. Swamynathan
Composition of Composite Semantic Web Services Using Abductive Event Calculus
201(13)
D. Paulraj
S. Swamynathan
Ant Colony Optimization Based Congestion Control Algorithm for MPLS Network
214(10)
S. Rajagopalan
E.R. Naganathan
P. Herbert Raj
Low Power Optimized Array Multiplier with Reduced Area
224(9)
Padma Devi
Gurinder Pal Singh
Balwinder Singh
Simulink Library Development and Implementation for VLSI Testing in Matlab
233(8)
Gurinder Pal Singh
Balwinder Singh
Processing of Image Data Using FPGA-Based MicroBlaze Core
241(6)
Swagata Samanta
Soumi Paik
Shreedeep Gangopadhyay
Amlan Chakrabarti
Parametric Analysis of Zone Routing Protocol
247(5)
Rani Astya
Parma Nand
S.C. Sharma
Vision of 5G Communication
252(5)
Mohd. Maroof Siddiqui
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform
257(8)
Musheer Ahmad
Omar Farooq
Computational Analysis of Availability of Process Industry for High Performance
265(10)
Shakuntla
A.K. Lal
S.S. Bhatia
A Preprocessing Technique for Recognition of Online Handwritten Gurmukhi Numerals
275(7)
Rajesh Kumar Bawa
Rekha Rani
A Framework for Vulnerability Analysis during Software Maintenance
282(6)
Jitender Kumar Chhabra
Amarjeet Prajapati
Performance Optimization for Logs of Servers
288(5)
M. Vedaprakash
Ramakrishna Alavala
Veena R. Desai
Ontology Based Information retrieval for Learning Styles of Autistic People
293(6)
Sanchika Gupta
Deepak Garg
Analyze the Performance of New Edge Web Application's over N-Tiers Layer Architecture
299(7)
Pushpendra Kumar Singh
Prabhakar Gupta
S.S. Bedi
Krishna Singh
Self-Configurable Scheduling Algorithm for Heterogeneous Computing Systems
306(10)
A. PrashanthRao
A. Govardhan
Performance Analysis of Proposed Maes Cryptographic Techniques
316(6)
Richa Kalra
Ankur Singhal
Rajneesh Kaler
Promila Singhal
Analysis of Core-Level Scale-Out Efficiency for OpenMP Programs on Multi-core Processors
322(5)
Sareh Doroodian
Nima Ghaemian
Mohsen Sharifi
SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services
327(11)
V. Shanmughaneethi
Ra. Yagna Pravin
C. Emilin Shyni
S. Swamynathan
Analysis and Study of Incremental K-Means Clustering Algorithm
338(4)
Sanjay Chakraborty
N.K. Nagwani
Computational Model for Prokaryotic and Eukaryotic Gene Prediction
342(7)
Sandeep Kaur
Anu Sheetal
Preetkanwal Singh
Detection of Malicious Node in Ad Hoc Networks Using Statistical Technique Based on CPU Utilization
349(8)
Deepak Sharma
Deepak Prashar
Dalwinder Singh Salaria
G. Geetha
Optimum Controller for Automatic Generation Control
357(7)
Rahul Agnihotri
Gursewak Singh Brar
Raju Sharma
Abstraction of Design Information From Procedural Program
364(9)
R.N. Kulkarni
T. Aruna
N. Amrutha
Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent Interface
373(12)
Aarti Singh
Dimple Juneja
A.K. Sharma
Autonomous Robot Motion Control Using Fuzzy PID Controller
385(6)
Vaishali Sood
A Multiresolution Technique to Despeckle Ultrasound Images
391(6)
Parvinder Kaur
Baljit Singh
Theme-3 Information Management and Network Security
Design and Analysis of the Gateway Discovery Approaches in MANET
397(9)
Koushik Majumder
Sudhabindu Ray
Subir Kumar Sarkar
Wireless Sensor Network Security Research and Challenges: A Backdrop
406(11)
Dimple Juneja
Atul Sharma
A.K. Sharma
Automated Test Case Generation for Object Oriented Systems Using UML Object Diagrams
417(7)
M. Prasanna
K.R. Chandran
Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO)
424(6)
Tanu Preet Singh
Manmeet Kaur
Vishal Sharma
On the Potential of Ricart-Agrawala Algorithm in Mobile Computing Environments
430(5)
Bharti Sharma
Rabinder Singh Bhatia
Awadhesh Kumar Singh
Analysis of Digital Forensic Tools and Investigation Process
435(7)
Seema Yadav
Khaleel Ahmad
Jayant Shekhar
Evaluation of Normalized Routing Load for MANET
442(7)
Sunil Taneja
Ashwani Kush
Reliabilty and Performance Based Resource Selection in Grid Environment
449(6)
Rajesh Kumar Bawa
Gaurav Sharma
Elliptic Curve Cryptography: Current Status and Research Challenges
455(6)
Sheetal Kalra
Sandeep K. Sood
SBFDR: Sector Based Fault Detection and Recovery in Wireless Sensor Networks
461(9)
Indrajit Banerjee
Prasenjit Chanak
Hafizur Rahaman
Study and Analysis of Incremental Apriori Algorithm
470(3)
Neeraj Kumar Sharma
N.K. Nagwani
Energy Aware and Energy Efficient Routing Protocol for Adhoc Network Using Restructured Artificial Bee Colony System
473(12)
B. Chandra Mohan
R. Baskaran
Implementing Key Management for Security in Ad Hoc Network
485(5)
Avinash Sharma
Narendra Agarwal
Satyabrata Roy
Ajay Sharma
Pankaj Sharma
Performance Evaluation of MAC- and PHY-Protocols in IEEE 802.11 WLAN
490(7)
Vishal Sharma
Jagjit Malhotra
Harsukhpreet Singh
Key Authentication for MANET Security
497(8)
Vijay Kumar
Rakesh Sharma
Ashwani Kush
Biometric Encryption: Combining Fingerprints and Cryptography
505(10)
Mini Singh Ahuja
Sumit Chabbra
Node Architectures and Its Deployment in Wireless Sensor Networks: A Survey
515(12)
Sumit Kushwaha
Vinay Kumar
Sanjeev Jain
New Innovations in Cryptography and Its Applications
527(12)
Saurabh Sharma
Neeraj Kumar Mishra
Competitive Equilibrium Theory and Its Applications in Computer Science
539(9)
J. Ujwala Rekha
K. Shahu Chatrapati
A. Vinaya Babu
A Novel Approach for Information Dissemination in Vehicular Networks
548(9)
Rakesh Kumar
Mayank Dave
Understanding the Generation of Cellular Technologies
557(11)
Manjit Sandhu
Tajinder Kaur
Mahesh Chander
Anju Bala
Evaluation of Routing Schemes for MANET
568(6)
Sima Singh
Ashwani Kush
Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc Networks
574(6)
Sonia Gupta
P.K. Bharti
Vishal Choudhary
Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor Networks
580(8)
P. Kalyani
C. Chellappan
Simulative Analysis of Bidirectional WDM/TDM-PON Using NRZ and RZ Downstream Signals and Narrowband AWG
588(6)
Rajniti
Anita Suman
Anu Sheetal
Parveen Kumar
Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks
594(9)
Naveen Chauhan
L.K. Awasthi
Narottam Chand
An Image Steganography Approach Based upon Matching
603(6)
Sukhpreet Kaur
Sumeet Kaur
From Calculus to Number Theory Paves Way to Break OSS Scheme
609(3)
G. Geetha
Saruchi
Digital Image Watermarking Technique Based on Dense Descriptor
612(5)
Ekta Walia
Anu Suneja
Novel Face Detection Using Gabor Filter Bank with Variable Threshold
617(9)
P.K. Suri
Ekta Walia
Amit Verma
When to Stop Testing
626(5)
Ajay Jangra
Gurbaj Singh
Chander Kant
Priyanka
An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs)
631(9)
Ajay Jangra
Nitin Goel
Chander Kant
Priyanka
Agile Software: Ensuring Quality Assurance and Processes
640(9)
Narinder Pal Singh
Rachna Soni
Measure Complexity in Heterogeneous System
649(8)
Kuldeep Sharma
Author Index 657