Muutke küpsiste eelistusi

E-raamat: Computer Information Systems - Analysis and Technologies: 10th International Conference, CISIM 2011, Held in Kolkata, India, December 14-16, 2011. Proceedings

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 10th International Conference on Computer Information Systems, CISIM 2011, held in Kolkata, India, in December 2011. The 30 revised full papers presented together with 6 keynote tasks and plenary lectures were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on networking and its applications; agent-based systems; biometric applications; pattern recognition and image processing; industrial applications; algorithmic applications and data management; information and network security.
Keynote and Plenary Lectures
The Future of Intelligent Ubiquitous Computing Systems
1(3)
Young Im Cho
Who Is Responsible for Security and Privacy in the Cloud?
4(1)
Dipankar Dasgupta
The Optimizing Web: Leveraging Agent Technology for Sustainability
5(4)
Aditya Ghose
Scalable Detection of Cyber Attacks
9(10)
Massimiliano Albanese
Sushil Jajodia
Andrea Pugliese
V.S. Subrahmanian
An Effective Research of Emotion
19(3)
Dong Hwa Kim
Khalid Sated
Cha Geun Jung
Regularization of Large Scale Total Least Squares Problems
22(16)
Heinrich Voss
Jorg Lampe
Networking and Its Applications
Reliability Estimation of Delay Tolerant QoS Mobile Agent System in MANET
38(10)
Chandreyee Chowdhury
Sarmistha Neogy
Network Event Correlation and Semantic Reasoning for Federated Networks Protection System
48(7)
Michal Choras
Rafal Kozik
VAMI - A Novel Architecture for Vehicular Ambient Intelligent System
55(10)
Anupam Saha
Rituparna Chaki
A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh Network
65(9)
Subhendu Barat
Ashok Kumar Pradhan
Tanmay De
Agent-Based Systems
Combination of Decision Support System (DSS) for Remote Healthcare Monitoring Using a Multi-agent Approach
74(11)
Mohamed Achraf Dhouib
Lamine Bougueroua
Katarzyna Wegrzyn-Wolska
MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System
85(10)
Debdutta Barman Roy
Rituparna Chaki
Agent Based Approach for Radio Resource Optimization for Cellular Networks
95(10)
Rakesh Kumar Mishra
Suparna Saha
Sankhayan Choudhury
Nabendu Chaki
Biometric Applications
Influence of Database Quality on the Results of Keystroke Dynamics Algorithms
105(8)
Piotr Panasiuk
Khalid Saeed
A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of Speech
113(8)
Jakub Karwan
Khalid Saeed
Fast Feature Extractors for Palmprint Biometrics
121(7)
Michal Choras
Rafal Kozik
Pattern Recognition and Image Processing
Handwritten Signature Recognition with Adaptive Selection of Behavioral Features
128(9)
Rafal Doroz
Piotr Porwik
Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor
137(8)
Kamil Surmacz
Khalid Saeed
A Method for Unsupervised Detection of the Boundary of Coarticulated Units from Isolated Speech Using Recurrence Plot
145(7)
Arijit Sinharay
Syed Mohd Bilal
Tanushyam Chattopadhyay
Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann Law
152(9)
Tomas Kocyan
Jan Martinovic
Jiri Dvorsky
Vaclav Snasel
On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method
161(9)
Soharab Hossain Shaikh
Asis Kumar Maiti
Nabendu Chaki
Medical Aid for Automatic Detection of Malaria
170(9)
Pramit Ghosh
Debotosh Bhattacharjee
Mita Nasipuri
Dipak Kumar Basu
Industrial Applications
Measuring Leanness and Agility Status of Iranian Food Industries Supply Chains Using Data Envelopment Analysis
179(13)
Pouyeh Rezazadeh
KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment
192(10)
Antonio Candiello
Agostino Cortesi
Stochastic Local Search Approaches in Solving the Nurse Scheduling Problem
202(10)
Sudip Kundu
Sriyankar Acharyya
Algorithmic Applications and Data Management
GA Based Denoising of Impulses (GADI)
212(9)
Jyotsna Kumar Mandal
Somnath Mukhopadhyay
Handling Write Lock Assignment in Cloud Computing Environment
221(10)
Sangeeta Sen
Rituparna Chaki
The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz Systems
231(8)
Sundarapandian Vaidyanathan
Sarasu Pakiriswamy
Parallel Hybrid SOM Learning on High Dimensional Sparse Data
239(8)
Lukas Vojacek
Jan Martinovic
Jiri Dvorsky
Katerina Slaninova
Ivo Vondrak
Operational Algebra for a Graph Based Semantic Web Data Model
247(10)
Abhijit Sanyal
Sankhayan Choudhury
A Survey on the Semi-Structured Data Models
257(10)
Supriya Chakraborty
Nabendu Chaki
Information and Network Security
Observation-Based Fine Grained Access Control for XML Documents
267(10)
Raju Halder
Agostino Cortesi
Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology
277(9)
Subhasis Dasgupta
Aditya Bagchi
Secret Image Sharing with Embedded Session Key
286(9)
Prabir Kumar Naskar
Hari Narayan Khan
Ujjal Roy
Ayan Chaudhuri
Atal Chaudhuri
Command and Block Profiles for Legitimate Users of a Computer Network
295(10)
Anna M. Bartkowiak
Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS)
305(9)
Uttam Kr. Mondal
Jyotsna Kumar Mandal
Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques
314(11)
Riti Chowdhury
Debashis De
Author Index 325