The two volume set, CCIS 262 and 263, constitutes the refereed proceedings of the internationalconference, MulGraB 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, in conjunct...
ISBN:
(纸本)9783642271854
The two volume set, CCIS 262 and 263, constitutes the refereed proceedings of the internationalconference, MulGraB 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of multimedia, computer graphics and broadcasting.
Recent works have demonstrated the effectiveness of retrieval augmentation in the Event Argument Extraction (EAE) task. However, existing retrieval-based EAE methods have two main limitations: (1) input length constra...
详细信息
In addressing the challenges of low detection accuracy and substantial model parameters in traditional object detection networks, this paper proposes an enhanced algorithm, GDP-YOLO (Incorporating Gather-and-Distribut...
详细信息
The proceedings contain 69 papers. The special focus in this conference is on computerscience and information Technology. The topics include: Qualitative optimization of coupling parasitics and driver width in global...
ISBN:
(纸本)9783642273070
The proceedings contain 69 papers. The special focus in this conference is on computerscience and information Technology. The topics include: Qualitative optimization of coupling parasitics and driver width in global VLSI interconnects;survey on optimization techniques in high level synthesis;design of fractional order digital differentiator using inverse multiquadric radial basis function;cognitive symmetric key cryptographic algorithm;modeling and verification of Fiat-Shamir zero knowledge authentication protocol;developing software metrics for analysis and design artifacts in unified process;a novel approach for green computing through event-driven power aware pervasive computing;security analysis of proxy blind signature scheme based on factoring and ECDLP;dynamic enterprises architecture for one or more clouds;congestion control in distributed networks - a comparative study;opinion mining from weblogs and its relevance for socio-political research;generalized projective synchronization of three-scroll chaotic systems via active control;switching algorithms in peer to peer networks - review;proposed software development model for small organization and its explanation;Tele-control of remote digital irrigation system performed through internet;a fuzzy rule based expert system for effective heart disease diagnosis;moving object detection using incremental statistical mean technique;classification of moving vehicles in traffic videos;use of augmented reality in serious game for training medical personnel;encouraging the usage of neural network in video text detection application;a novel face recognition method using PCA, LDA and support vector machine;contextual strategies for detecting spam in academic portals;hybrid synchronization of hyperchaotic Chen systems via sliding mode control;design and implementation of efficient Viterbi decoders;classification of MRI brain images using cosine-modulated wavelets;a novel approach for email login system;a non-revisiting
This book constitutes the refereed proceedings of the internationalconference, UNESST 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, Jeju Island, Korea, in December 2011. Th...
ISBN:
(纸本)9783642272097
This book constitutes the refereed proceedings of the internationalconference, UNESST 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of u- and e-service, science and technology.
The proceedings contain 66 papers. The special focus in this conference is on computerscience and information Technology. The topics include: Adaptive quorum based MAC protocol in non uniform node distribution of wir...
ISBN:
(纸本)9783642272981
The proceedings contain 66 papers. The special focus in this conference is on computerscience and information Technology. The topics include: Adaptive quorum based MAC protocol in non uniform node distribution of wireless sensor networks;mobile agent in InVANET - traffic management;the design of observers for nonlinear control systems around equilibria;a node stability index-based connected dominating set algorithm for mobile ad hoc networks;energy efficient dynamic routing protocol for wireless sensor networks;energy efficient stable connected dominating set construction in mobile ad hoc networks;hybrid synchronization of Arneodo and Rossler chaotic systems by active nonlinear control;realization of SDR in partial reconfigurable FPGA using different types of modulation techniques;a recommender system for sweaty sock syndrome;enhanced AODV routing protocol for wireless sensor network based on zigbee;sliding mode controller design for the global chaos synchronization of Coullet systems;generalized projective synchronization of double-scroll chaotic systems using active feedback control;mobile ad hoc networks security attacks and secured routing protocols;privacy and security in digital networks from the perspective of modeling and software development;a logical topology to find alternate routes in WDM lightwave network;a trust based routing scheme for wireless sensor networks;survey of trust schemes on ad-hoc network;improve service discovery performance over different networks utilization and sizes;adaptive K-means clustering to handle heterogeneous data using basic rough set theory;different types of attacks mitigation in mobile ad hoc networks using cellular automata;a location dependent semantic cache replacement strategy in mobile environment;connectivity of autonomous agents using ad-hoc mobile router networks;a new approach to Stegnography;survey on key pre distribution for security in wireless sensor networks;a link distance ratio based stable multicast rout
This book comprises selected papers of the internationalconferences, SecTech 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea,...
ISBN:
(纸本)9783642271885
This book comprises selected papers of the internationalconferences, SecTech 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.
This book constitutes the refereed proceedings of the internationalconference, GDC 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, Jeju Island, Korea, in December 2011. The p...
ISBN:
(纸本)9783642271793
This book constitutes the refereed proceedings of the internationalconference, GDC 2011, held as Part of the Future Generation information Technology conference, FGIT 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of grid and distributed computing.
The two-volume set, CCIS 243 and CCIS 244, constitutes the refereed proceedings of the Second internationalconference on information Computing and Applications, ICICA 2010, held in Qinhuangdao, China, in October 2011...
ISBN:
(纸本)9783642274510
The two-volume set, CCIS 243 and CCIS 244, constitutes the refereed proceedings of the Second internationalconference on information Computing and Applications, ICICA 2010, held in Qinhuangdao, China, in October 2011. The 191 papers presented in both volumes were carefully reviewed and selected from numerous submissions. They are organized in topical sections on computational statistics, social networking and computing, evolutionary computing and applications, information education and application, internet and web computing, scientific and engineering computing, system simulation computing, bio-inspired and DNA computing, internet and Web computing, multimedia networking and computing, parallel and distributed computing.
暂无评论