Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part II
De som köpt den här boken har ofta också köpt The Art of Doing Science and Engineering av Richard Hamming (inbunden).
Köp båda 2 för 792 krTechnical Session-12: System-1 (S-1).- Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization.- Efficient Storage of Massive Biological Sequences in Compact Form.- Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing.- An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture.- Event-Based Metric for Computing System Complexity.- Technical Session-13: System-2 (S-2).- Load Balancing in Xen Virtual Machine Monitor.- Aerial Vehicle Based Sensing Framework for Structural Health Monitoring.- A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks.- Modeling and Simulation of Efficient March Algorithm for Memory Testing.- A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism.- Technical Session-14: System-3 (S-3).- Detection of Polymorphic Viruses in Windows Executables.- Sensitivity Measurement of Neural Hardware: A Simulation Based Study.- AnApproach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools.- A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams.- Technical Session-15: System-4 (S-4).- Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring.- Test Process Model with Enhanced Approach of State Variable.- Re-engineering Machine Translation Systems through Symbiotic Approach.- Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network.- Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph.- Technical Session-16: System-6 (S-6).- Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm.- Hardware and Software Co-Design for Robot Arm.- Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.- Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages.