Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.
1111740502
Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.
109.99 In Stock
Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

Paperback(2010)

$109.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.

Product Details

ISBN-13: 9783642135767
Publisher: Springer Berlin Heidelberg
Publication date: 07/21/2010
Series: Lecture Notes in Computer Science , #6059
Edition description: 2010
Pages: 604
Product dimensions: 6.10(w) x 9.20(h) x 1.30(d)

Table of Contents

Information Security and Assurance

Fuzzy Based Threat Analysis in Total Hospital Information System Nurzaini Mohamad Zain Ganthan Narayana Samy Rabiah Ahmad Zuraini Ismail Azizah Abdul Manaf 1

An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model Bo Zhang Qiuliang Xu 15

A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition Yingqi Lu Cheng Lu Miao Qi Shuyan Wang 28

Information Systems Security Criticality and Assurance Evaluation Moussa Ouedraogo Haralambos Mouratidis Eric Dubois Djamel Khadraoui 38

Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' Muhammad Khurram Khan Khaled Alghathbar 55

Directed Graph Pattern Synthesis in LSB Technique on Video Steganography Debnath Bhattacharyya Arup Kumar Bhaumik Minkyu Choi Tai-hoon Kim 61

Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning Dakshina Ranjan Kisku Phalguni Gupta Jamuna Kanta Sing 70

Post-quantum Cryptography: Code-Based Signatures Pierre-Louis Cayrel Mohammed Meziani 82

Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol Danilo Valeros Bernardo Doan Hoang 100

A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems Bo Li Jianxin Li Tianyu Wo Xudong Wu Junaid Arshad Wantao Liu 115

An Active Intrusion Detection System for LAN Specific Attacks Neminath Hubballi S. Roopa Ritesh Ratti F.A. Barbhuiya Santosh Biswas Arijit Sur Sukumar Nandi Vivek Ramachandran 129

Analysis on the Improved SVD-Based Watermarking Scheme Huo-Chong Ling Raphael C-W. Phan Swee-Huay Heng 143

Advanced Communication and Networking

Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes Zhian Zheng Dang Hai Pham Tomohisa Wada 150

Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks Seong-Yong Choi Jin-Su Kim Seung-Jin Han Jun-Hyeog Choi Kee-Wook Rim Jung-Hyun Lee 159

Grammar Encoding in DNA-Like Secret Sharing Infrastructure Marek R. Ogiela Urszula Ogiela 175

HATS: High Accuracy Timestamping System Based on NetFPGA Zhiqiang Zhou Lin Cong Guohan Lu Beixing Deng Xing Li 183

A Roadside Unit Placement Scheme for Vehicular Telematics Networks Junghoon Lee Cheol Min Kim 196

Concurrent Covert Communication Channels Md Amiruzzaman Hassan Peyravi M. Abdullah-Al-Wadud Yoojin Chung 203

Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks Husnain Naqvi Stevan Berber Zoran Salcic 214

High Performance MAC Architecture for 3GPP Modem Sejin Park Yong Kim Inchul Song Kichul Han Jookwang Kim Kyungho Kim 228

Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T Zhian Zheng Yoshitomo Kaneda Dang Hai Pham Tomohisa Wada 239

A New Cross-Layer Unstructured P2P File Sharing Protocol Over Mobile Ad Hoc Network Nadir Shah Depei Qian 250

A Model for Interference on Links in Inter-Working Multi-Hop Wireless Networks Oladayo Salami Antoine Bagula H. Anthony Chan 264

An Optimum ICA Based Multiuser Data Separation for Short Message Service Mahdi Khosravy Mohammad Reza Alsharif Katsumi Yamashita 279

Advanced Computer Science and Information Technology

Multiple Asynchronous Requests on a Client-Based Mashup Page Eunjung Lee Kyung-Jin Seo 287

Using an Integrated Ontology Database to Categorize Web Pages Rujiang Bai Xiaoyue Wang Junhua Liao 300

Topic Detection by Topic Model Induced Distance Using Biased Initiation Yonghui Wu Yuxin Ding Xiaolong Wang Jun Xu 310

Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm Zailani Abdullah Tutut Herawan Mustafa Mat Deris 324

Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition Phalguni Gupta Dakshina Ranjan Kisku Jamuna Kanta Sing Massimo Tistarelli 337

Agent Based Approach to Regression Testing Praveen Ranjan Srivastava Tai-hoon Kim 345

A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem Lianbo Gao Jianming Shi 356

Development of a Digital Textbook Standard Format Based on XML Mihye Kim Kwan-Hee Yoo Chan Park Jae-Soo Yoo 363

A Pattern-Based Representation Approach for Online Discourses Hao Xu 378

A Fault Tolerant Architecture for Transportation Information Services of E-Government Woonsuk Suh Boo-Mann Choung Eunseok Lee 385

Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS Pavan Kumar Pandey G.P. Biswas 397

Extract Semantic Information from WordNet to Improve Text Classification Performance Rujiang Bai Xiaoyue Wang Junhua Liao 409

Managing Ubiquitous Scientific Knowledge on Semantic Web Hao Xu 421

A Semantic Pattern Approach to Managing Scientific Publications Hao Xu 431

A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults Mitsuhiro Kimura Takaji Fujiwara 435

Markov Chain Monte Carlo Random Testing Bo Zhou Hiroyuki Okamura Tadashi Dohi 447

An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics Osamu Mizuno Hideaki Hata 457

Ubiquitous Computing and Multimedia Applications

An Effective Video Steganography Method for Biometric Identification Yingqi Lu Cheng Lu Miao Qi 469

A Video Coding Technique using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction Bibhas Chandra Dhara Sanjoy Kumar Saha Bhabatosh Chanda 480

Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Aalysis Soumya Banerjee Hameed Al-Qaheri El-Sayed A. El-Dahshan Aboul Ella Hassanien 491

Video Copy Detection: Sequence Matching Using Hypothesis Test Debabrata Dutta Sanjoy Kumar Saha Bhabatosh Chanda 499

An XML-Based Digital Textbook and Its Educational Effectiveness Mihye Kim Kwan-Hee Yoo Chan Park Jae-Soo Yoo Hoseung Byun Wanyoung Cho Jeeheon Ryu Namgyun Kim 509

SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition Kevin Bouchard Amir Ajroud Bruno Bouchard Abdenour Bouzouane 524

Design of an Efficient Message Collecting Scheme for the Slot-Based wireless Mesh Network Junghoon Lee Gyung-Leen Park 534

A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming Xiaohong Yang Qingcai Chen Xiaolong Wang 544

Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech Byeongchang Kim 558

CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture Yongyun Cho Hyun Yoe Haeng-Kon Kim 572

A Power Control Scheme for an Energy-Efficient MAC Protocol Ho-chul Lee Jeong-hwan Hwang Meong-hun Lee Haeng-kon Kim Hyun Yoe 586

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks Iftikhar Ahmad Azween B Abdulah Abdullah S Alghamdi 597

Author Index 603

From the B&N Reads Blog

Customer Reviews