Muutke küpsiste eelistusi

E-raamat: International e-Conference on Computer Science (IeCCS 2005): Lecture Series on Computer and Computational Sciences II [Taylor & Francis e-raamat]

  • Taylor & Francis e-raamat
  • Hind: 258,50 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 369,29 €
  • Säästad 30%
The aim of IeCCS 2005, which was held in May 2005, was to bring together leading scientists of the international Computer Science community and to attract original research papers. This volume in the Lecture Series on Computer and Computational Sciences contains the extended abstracts of the presentations.

The topics covered included (but were not limited to): Numerical Analysis, Scientific Computation, Computational Mathematics, Mathematical Software, Programming Techniques and Languages, Parallel Algorithms and its Applications, Symbolic and Algebraic Manipulation, Analysis of Algorithms, Problem Complexity, Mathematical Logic, Formal Languages, Data Structures, Data Bases, Information Systems, Artificial Intelligence, Expert Systems, Simulation and Modeling, Computer Graphics, Software Engineering, Image Processing, Computer Applications, Hardware, Computer Systems Organization, Software, Data, Theory of Computation, Mathematics of Computing, Information Systems, Computing Methodologies, Computer Applications, Computing Milieu
Heuristic Scheduling Algorithms for Stochastic Tasks in a Distributed Multiprocei Environments
1(5)
Ehab Abdel Maksoud
Reda A. Ammar
Approximating by Szisz-Type Operators
6(5)
A. Aral
H. Erbay
Implicit Versus Explicit Classification: Excerpts From a Concept Analysis of Classification
11(5)
T.K. Bjelland
Smoothing Finite-Element Method for the Reconstruction of Surface from 3D Scattered Data
16(4)
Zhong-Yi Cai
Ming-Zhe Li
An Online Collaborative Stock Management Mechanism for Multiple E-retailers
20(4)
T. Chen
Guei-Sian Peng
Hsin-Chieh Wu
Symbolic Semantics for Weak Open Bisimulation in n -calculus
24(4)
Taolue Chen
Tingting
Han Man Lu
A Fuzzy Set Approach for Analyzing Customer RFM Data
28(4)
T. Chen Hsin-Chieh Wu
Towards A Bisimulation Congruence for ROAM
32(5)
Taolue Chen
Tingting Han
Man Lu
Modelling Heat Transfer in Work Rolls of a Continuous Hot Strip Mill. Part II: Operating Conditions
37(5)
R. L. Corral
R. Colds
A. Pirez
Singular Value Decomposition (SVD) Based Attack on Different Watermarking Schemes
42(4)
Milind Engedy
Munaga V. N. K. Prasad
Ashutosh Saxena
Updating TULV Decomposition
46(5)
H. Erbay
Analysis of the Wavelet Transform Parameters in Images Processing
51(4)
G. Farias
M. Santos
The properties of the Zadeh extension of logo x
55(4)
Wang Guixiang
Li Youming
Zhao Chunhui
Numerical Simulation of Temperature Field 9SiCr Alloy Steel During Gas Quenching
59(4)
Cheng Heming
Jin Min
Xie Manbin
Monte Carlo Method for Simulation of a Laser Beam Propagating in a Cavity with Specular and Diffuse Components of Reflection
63(4)
C. Y. Ho
Numerical Simulation of Temperature Field for T10 Steel during High Pressure Gas Quenching
67(4)
Lijun Hou
Heming Cheng
Jianyun Li
Numerical Simulation of Turbulent Flow through a Water-Turbine Spiral Casing
71(4)
Huying
Cheng Heming
LiZiliang
Dynamic Delegation using Privilege Storage in Centralized Administration
75(4)
Jun-Cheol Jeon
Kee-Won Kim
Kee-Young Yoo
Effcient and Secure User Identification Scheme based on ID-based Cryptosystem
79(4)
Kee-Won Kim
Jun-Cheol Jeon
Kee-Young Yoo
Evaluation of Success Factors in Mobile Commerce Using the AHP Techniques
83(5)
Jongwan Kim
Chong-Sun Hwang
A Posteriori Error Estimation of Quantities of Interest for the Linear Elasticity Problems
88(4)
S. Korotov
If I know it then it can't be false (and if it's true then it is not impossible)
92(5)
Costas D. Koutras
Christos Nomikos
Pavlos Peppas
A Multistep Block Scheme for the Numerical Solution of Ordinary Differential Equations
97(5)
G. Psihoyios
Differential Entropy Approximations and Diffusive Restoration of Digital Images
102(4)
F. Rodenas
P. Mayo
D. Gineslar
G. Verau
Asymptotic Complexity of Algorithms via the Nonsymmetric Hausdorff Distance
106(4)
J. Rodriguez-Lopez
S. Romaguera
O. Valero
Numerical Computation and Experimental Study of the stress field of En-echelon Cracks
110(6)
Guo Rongxin
Li Junchang
Xiong Bingheng
Modelling Business to Consumer Systems Adoption
116(4)
J. L. Salmeron
J. M. Hurlado
Detecting IS/IT Future Trends: An Analysis of Technology Foresight Processes Around the World
120(4)
J. L. Salmeron
V. A. Banuls
Modelling Success in Information Technology Projects
124(4)
Jose L. Sameron
M. Baldomero Ramirez
An Isomorphic-Based Model in IT/IS Assimilation
128(4)
J. L. Salmeron
Salvador Bueno
Artificial Intelligence Hybrid Model Applied to Wastewater Treatment
132(4)
Yanet Rodriguez Sarabia
Xiomara Cabrera Bermudez
Rafael Jesus Falcon Martinez
Zenaida Herrera Rodriguez
Ana M. Contreras Maya
Maria Matilde Garcia Lorenzo
Resource Packing to Fit Grid Infrastructure
136(5)
Yu Xiong
Daizhong Su
A Procedure Based on Synthetic Projection Model for Multiple Attribute Decision Making in Uncertain Setting
141(5)
Z. S. Xu
A Method for Fuzzy Decision Making Problem with Triangular Fuzzy Complementary Judgment Matrix
146(4)
Z. S. Xu
Maximizing Deviations Procedure for Multiple Attribute Group Decision Making under Linguistic Environment
150(5)
Z. S. Xu
Multicast Routing Path Selection in Fiber-optic Ring Networks: A Simulation Study
155(4)
Rong-Jou Yang
Hann-Jang Ho
Jack Lee
A Table Look-Up Pipelined Multiplication - Accumulation Co-processor for H.264
159(4)
Chang N. Zhang
Xiang Xiao
Computers & Security Special Session
Introduction
163(3)
Nicolas Sklavos
Implementation Aspects of Rijndael Encryption Algorithm
166(4)
M. Shahraki
Low Power and High Throughput Implementation of SHA-256 Hash Function
170(4)
H. E. Michail
A. P. Kakarountas
A. Milidonis
C. E. Goutis
Switchable Data-Dependent Operations: New Designs
174(4)
N.A. Moldovyan
A.A. Moldovyan
A Low Power, High Frequency and High Precision Multiplier Architecture in GF(P)
178(6)
Abdoul Rjoub
Lo'ai A. Tawaibeh
A New 64-Bit Cipher for Efficient Implementation Using Constrained FPGA Resources
184(7)
N. A. Moldovyan
A. A. Moldovyan
N. Sklavos
A Reconfigurable Linear Feedback Shift Register Architecture for Cryptographic Applications
191
P. Kitsos
N. Sklavos
Simos, Theodore