Contemporary Computing | Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings | ISBN 9783642035463

Contemporary Computing

Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings

herausgegeben von Sanjay Ranka und weiteren
Mitwirkende
Herausgegeben vonSanjay Ranka
Herausgegeben vonSrinivas Aluru
Herausgegeben vonRajkumar Buyya
Herausgegeben vonYeh-Ching Chung
Herausgegeben vonSandeep Gupta
Herausgegeben vonAnanth Grama
Herausgegeben vonRajeev Kumar
Herausgegeben vonVir V. Phoha
Herausgegeben vonSumeet Dua
Buchcover Contemporary Computing  | EAN 9783642035463 | ISBN 3-642-03546-9 | ISBN 978-3-642-03546-3

Contemporary Computing

Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings

herausgegeben von Sanjay Ranka und weiteren
Mitwirkende
Herausgegeben vonSanjay Ranka
Herausgegeben vonSrinivas Aluru
Herausgegeben vonRajkumar Buyya
Herausgegeben vonYeh-Ching Chung
Herausgegeben vonSandeep Gupta
Herausgegeben vonAnanth Grama
Herausgegeben vonRajeev Kumar
Herausgegeben vonVir V. Phoha
Herausgegeben vonSumeet Dua

Inhaltsverzeichnis

  • Technical Session-1: Algorithm-1 (AL-1).
  • A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling.
  • PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images.
  • A New Position-Based Fast Radix-2 Algorithm for Computing the DHT.
  • Study of Bit-Parallel Approximate Parameterized String Matching Algorithms.
  • Optimization of Finite Difference Method with Multiwavelet Bases.
  • Technical Session-2: Algorithm-2 (AL-2).
  • A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks.
  • A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks.
  • An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems.
  • Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip.
  • A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching.
  • Technical Session-3: Algorithm-3 (AL-3).
  • Optimized Graph Search Using Multi-Level Graph Clustering.
  • An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns.
  • A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization.
  • Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts.
  • Local Subspace Based Outlier Detection.
  • New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions.
  • Technical Session-4: Algorithm-4 (AL-4).
  • On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks.
  • On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature.
  • Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands.
  • Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties.
  • Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame.
  • Technical Session-5: Application-1 (AP-1).
  • Secure Receipt-Free Sealed-Bid Electronic Auction.
  • An Architecture for Handling Fuzzy Queries in Data Warehouses.
  • Palmprint Based Verification System Using SURF Features.
  • A Personnel Centric Knowledge Management System.
  • Technical Session-6: Application-2 (AP-2).
  • A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks.
  • Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach.
  • CDIS: Circle Density Based Iris Segmentation.
  • Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines.
  • Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine.
  • Technical Session-7: Application-3 (AP-3).
  • Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing.
  • Vehicular Traffic Control: A Ubiquitous Computing Approach.
  • Application of Particle Swarm Optimization Algorithm for Better Nano-Devices.
  • Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES.
  • Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip.
  • Technical Session-8: Application-4 (AP-4).
  • Color Image Restoration Using Morphological Detectors and Adaptive Filter.
  • Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography.
  • An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions.
  • Parallelization Issues of Domain Specific Question Answering System on Cell B. E. Processors.
  • Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions.
  • Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks.
  • Technical Session-9: Bioinformatics-1 (B-1).
  • Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology.
  • Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide.
  • IDChase: Mitigating Identifier Migration Trap in Biological Databases.
  • Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships.
  • IITKGP-SESC: Speech Database for Emotion Analysis.
  • Technical Session-10: Bioinformatics-2 (B-2).
  • Detection of Splice Sites Using Support Vector Machine.
  • Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides.
  • Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach.
  • FCM for Gene Expression Bioinformatics Data.
  • Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection.
  • Technical Session-11: System-1 (S-1).
  • An Electronically Tunable SIMO Biquad Filter Using CCCCTA.
  • An Architecture for Cross-Cloud System Management.
  • Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models.
  • Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic.
  • Energy-Constrained Scheduling of DAGs on Multi-core Processors.
  • Technical Session-12: System-2 (S-2).
  • Evaluation of Code and Data Spatial Complexity Measures.
  • Pitcherpot: Avoiding Honeypot Detection.
  • Verification of Liveness Properties in Distributed Systems.
  • InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile ComputingDevices.
  • Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup.