• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Computational Science and Its Applications - Iccsa 2009: International Conference, Seoul, Korea, June 29--July 2, 2009, Proceedings, Part II

Computational Science and Its Applications - Iccsa 2009: International Conference, Seoul, Korea, June 29--July 2, 2009, Proceedings, Part II

Paperback

General ComputersNetworkingProgramming

ISBN10: 3642024564
ISBN13: 9783642024566
Publisher: Springer
Published: Jun 15 2009
Pages: 957
Weight: 2.45
Height: 1.30 Width: 6.10 Depth: 9.10
Language: English
Workshop on Software Engineering Processes and Applications (SEPA 2009).- Ontology-Based Requirements Conflicts Analysis in Activity Diagrams.- Resource Allocation Optimization for GSD Projects.- Verification of Use Case with Petri Nets in Requirement Analysis.- Towards Guidelines for a Development Process for Component-Based Embedded Systems.- Effective Project Leadership in Computer Science and Engineering.- Weyuker's Properties, Language Independency and Object Oriented Metrics.- Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009).- Lattice Constant Prediction of A2BB'O6 Type Double Perovskites.- A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients.- A Grid Implementation of Direct Quantum Calculations of Rate Coefficients.- A Grid Implementation of Chimere: Ozone Production in Central Italy.- Workshop on Internet Communication Security (WICS 2009).- MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT.- Testing Topologies for the Evaluation of IPSEC Implementations.- Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key.- Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009).- Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.- Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.- Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.- A Practical Approach to a Reliable Electronic Election.- Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.- Workshop on Mobile Communications (MC 2009).- Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments.- Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System.- Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition.- A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System.- Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes.- Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System.- WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up.- Overlay Ring Based Secure Group Communication Scheme for Mobile Agents.- Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems.- AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization.- Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol.- Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.- On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors.- Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code.- Design of an Efficient Multicast Scheme for Vehicular Telematics Networks.- ODDUGI: Ubiquitous Mobile Agent System.- Determination of the Optimal Hop Number for Wireless Sensor Networks.- Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models.- A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs.- Analysis of Moving Patterns of Moving Objects with the Proposed Framework.- A User-Defined Index for Containment Queries in XML.- On Optimal Placement of the Monitoring Devices on Channels of Communication Network.- Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks.- A Capacity Aware Data Transport Protocol for Wireless Sensor Network.- Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs).- VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802...

26 different editions

Also available

Also in

Networking