Coverart for item
The Resource Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III, Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.), (electronic resource)

Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III, Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.), (electronic resource)

Label
Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III
Title
Advances in computer science and information technology
Title remainder
computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings
Title number
Part III
Statement of responsibility
Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.)
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson advances in computer science and information technology; and ad hoc andubiquitous computing
Member of
Cataloging source
GW5XE
Image bit depth
0
LC call number
QA75.5
LC item number
.I58 2012
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
International Conference on Computer Science and Information Technology (2011- )
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1977-
http://library.link/vocab/relatedWorkOrContributorName
  • SpringerLink
  • Meghanathan, Natarajan
  • Chaki, Nabendu
  • Nagamalai, Dhinaharan
Series statement
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Series volume
86
http://library.link/vocab/subjectName
  • Computer science
  • Information technology
  • Computer science
  • Information technology
  • Informatique
  • Computersicherheit
  • Informationstechnik
Label
Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III, Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.), (electronic resource)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • An Innovative Approach to Association Rule Mining Using Graph and Clusters
  • Policy Based Accounting for Web Services
  • Fusion Based Linked Object Web Ranking for Social Networks
  • Comparing Supervised Learning Classifiers to Detect Advanced Fee Fraud Activities on Internet
  • Algebra of Geometric Filters Defined over Three Dimenisonal Rectangular Lattice-PartI
  • Finite State Transducers Framework for Monitors Conflict Detection and Resolution
  • Real Time Facial Expression Recognition
  • Face Recognition System in Cell Phones Based on Text Message Service
  • Requirements Volatility in Software Maintenance
  • Information Security Measurement and E-Governance
  • Part 1.
  • Comparison of Efficient and Rand Index Fitness Function for Clustering Gene Expression Data
  • A Novel Hybrid Fuzzy Multi-Objective Evolutionary Algorithm: HFMOEA
  • Testability Estimation Model (TEMOOD)
  • Generation of All Spanning Trees in the Limelight
  • A New Encryption Method for Secured Message Passing by Sorting Technique
  • Algorithm for Constructing Complete Distributive Lattice of Polyhedrons Defined over Three Dimensional Rectangular Grid- Part II
  • Enhancing the Network Security Using Lexicographic Game
  • Spectral Characterization of Rank Filters Based Directional Textures of Digital Images Using Rajan Transform
  • Enlargement of Clinical Stemmer in Hindi Language for Homoeopathy Province
  • Fuzziness in Text Classification Using Different Similarity Metrics
  • Advances in Computer Science and Information Technology
  • Image Compression over Low Channel Bandwidth
  • Fuzzy Identification of Geometric Shapes
  • Towards Perception Based Image Retrieval
  • Estimation of f-Similarity in f-Triangles Using FIS
  • Survey on Image Compression Techniques: Using CVIP Tools
  • Developing Hindi POS Tagger for Homoeopathy Clinical Language
  • Wireless Sensor Network Security
  • Recent Developments in Scheduling and Allocation of High Level Synthesis
  • Digital Signature of an Image by Elliptic Curve Cryptosystem
  • Part 2.
  • Driving Hazards Message Propagation Using Road Side Infrastructure in VANETs
  • Ad Hoc and Ubiquitous Computing
  • Mobile-Cloud: A Framework of Cloud Computing for Mobile Application
  • The Effect of Design Patterns on Aspect Oriented Software Quality-An Empirical Evaluation
  • A Novel Statistical Fusion Rule for Image Fusion in Non Subsampled Contourlet Transform Domain
  • Maximizing Lifetime of Wireless Sensor Network through Extended LEACH Algorithm
  • Intersection Area Based Geocasting Protocol (IBGP) for Vehicular Ad Hoc Networks
  • Survey on H.264 Standard
  • Self-configurable Processor Schedule Window Algorithm
  • An Authenticated BSS Methodology for Data Security Using Steganography
  • A Real Time Multivariate Robust Regression Based Flood Prediction Model Using Polynomial Approximation for Wireless Sensor Network Based Flood Forecasting Systems
  • Policy Based Distributed Run Time Fault Diagnoser Model for Web Services
  • AODV Enhancement Based on the Minimization of Route-Request Packets
  • Key Management for Group Based Mobile Ad Hoc Networks
  • Optimal Clustering in Zone Based Protocol of Wireless Sensor Network
  • Optimized FZ-LEACH Using Exponential Weighted Moving Average for Wireless Sensor Network
  • IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks
  • A Study on Various Deployment Schemes for Wireless Sensor Networks
  • Spanning Tree Based Reliable Data Transmission in LEACH
  • Image Deblurring Using Bayesian Framework
  • Taxonomy and Control Measures of SPAM and SPIM
  • A Distributed OFDM Polarizing Transmission via Broadcast Switching
  • The Reconstruction Conjecture
  • Multipath OLSR with Energy Optimization in Mobile Adhoc NETwork (MANET)
  • Collaborative Framework for Distributed Computing in P2P Network
  • Minimizing Boolean Sum of Products Functions Using Binary Decision Diagram
  • Compression of Gray Scale Images Using Linear Prediction on Wavelet Coefficients
Dimensions
unknown
Extent
1 online resource (xvii, 567 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642273179
Level of compression
uncompressed
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)778076286
  • (OCoLC)ocn778076286
Label
Advances in computer science and information technology : computer science and information technology : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III, Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.), (electronic resource)
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • An Innovative Approach to Association Rule Mining Using Graph and Clusters
  • Policy Based Accounting for Web Services
  • Fusion Based Linked Object Web Ranking for Social Networks
  • Comparing Supervised Learning Classifiers to Detect Advanced Fee Fraud Activities on Internet
  • Algebra of Geometric Filters Defined over Three Dimenisonal Rectangular Lattice-PartI
  • Finite State Transducers Framework for Monitors Conflict Detection and Resolution
  • Real Time Facial Expression Recognition
  • Face Recognition System in Cell Phones Based on Text Message Service
  • Requirements Volatility in Software Maintenance
  • Information Security Measurement and E-Governance
  • Part 1.
  • Comparison of Efficient and Rand Index Fitness Function for Clustering Gene Expression Data
  • A Novel Hybrid Fuzzy Multi-Objective Evolutionary Algorithm: HFMOEA
  • Testability Estimation Model (TEMOOD)
  • Generation of All Spanning Trees in the Limelight
  • A New Encryption Method for Secured Message Passing by Sorting Technique
  • Algorithm for Constructing Complete Distributive Lattice of Polyhedrons Defined over Three Dimensional Rectangular Grid- Part II
  • Enhancing the Network Security Using Lexicographic Game
  • Spectral Characterization of Rank Filters Based Directional Textures of Digital Images Using Rajan Transform
  • Enlargement of Clinical Stemmer in Hindi Language for Homoeopathy Province
  • Fuzziness in Text Classification Using Different Similarity Metrics
  • Advances in Computer Science and Information Technology
  • Image Compression over Low Channel Bandwidth
  • Fuzzy Identification of Geometric Shapes
  • Towards Perception Based Image Retrieval
  • Estimation of f-Similarity in f-Triangles Using FIS
  • Survey on Image Compression Techniques: Using CVIP Tools
  • Developing Hindi POS Tagger for Homoeopathy Clinical Language
  • Wireless Sensor Network Security
  • Recent Developments in Scheduling and Allocation of High Level Synthesis
  • Digital Signature of an Image by Elliptic Curve Cryptosystem
  • Part 2.
  • Driving Hazards Message Propagation Using Road Side Infrastructure in VANETs
  • Ad Hoc and Ubiquitous Computing
  • Mobile-Cloud: A Framework of Cloud Computing for Mobile Application
  • The Effect of Design Patterns on Aspect Oriented Software Quality-An Empirical Evaluation
  • A Novel Statistical Fusion Rule for Image Fusion in Non Subsampled Contourlet Transform Domain
  • Maximizing Lifetime of Wireless Sensor Network through Extended LEACH Algorithm
  • Intersection Area Based Geocasting Protocol (IBGP) for Vehicular Ad Hoc Networks
  • Survey on H.264 Standard
  • Self-configurable Processor Schedule Window Algorithm
  • An Authenticated BSS Methodology for Data Security Using Steganography
  • A Real Time Multivariate Robust Regression Based Flood Prediction Model Using Polynomial Approximation for Wireless Sensor Network Based Flood Forecasting Systems
  • Policy Based Distributed Run Time Fault Diagnoser Model for Web Services
  • AODV Enhancement Based on the Minimization of Route-Request Packets
  • Key Management for Group Based Mobile Ad Hoc Networks
  • Optimal Clustering in Zone Based Protocol of Wireless Sensor Network
  • Optimized FZ-LEACH Using Exponential Weighted Moving Average for Wireless Sensor Network
  • IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks
  • A Study on Various Deployment Schemes for Wireless Sensor Networks
  • Spanning Tree Based Reliable Data Transmission in LEACH
  • Image Deblurring Using Bayesian Framework
  • Taxonomy and Control Measures of SPAM and SPIM
  • A Distributed OFDM Polarizing Transmission via Broadcast Switching
  • The Reconstruction Conjecture
  • Multipath OLSR with Energy Optimization in Mobile Adhoc NETwork (MANET)
  • Collaborative Framework for Distributed Computing in P2P Network
  • Minimizing Boolean Sum of Products Functions Using Binary Decision Diagram
  • Compression of Gray Scale Images Using Linear Prediction on Wavelet Coefficients
Dimensions
unknown
Extent
1 online resource (xvii, 567 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642273179
Level of compression
uncompressed
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)778076286
  • (OCoLC)ocn778076286

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...