Gulati / Das | Intelligent Information Technology | Buch | 978-3-540-24126-3 | sack.de

Buch, Englisch, Band 3356, 430 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1380 g

Reihe: Lecture Notes in Computer Science

Gulati / Das

Intelligent Information Technology

7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004, Proceedings
2005
ISBN: 978-3-540-24126-3
Verlag: Springer Berlin Heidelberg

7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004, Proceedings

Buch, Englisch, Band 3356, 430 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1380 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-24126-3
Verlag: Springer Berlin Heidelberg


The 7th International Conference on Information Technology (CIT 2004) was held in Hyderabad, India, during December 20–23, 2004. The CIT 2004 was a forum where researchers from various areas of information technology and its applications could stimulate and exchange ideas on technological advancements. CIT, organizedby the Orissa InformationTechnologySociety (OITS), has emerged as one of the major international conferences in India and is fast becoming the premier forum for the presentation of the latest research and development in the critical area of information technology. The last six conferences attracted reputed researchers from around the world, and CIT 2004 took this trend forward. This conference focused on the latest research ?ndings on all topics in the area of information technology. Although the natural focus was on computer science issues, research results contributed from management, business and other disciplines formed an integral part. We received more than 200 papers from over 27 countries in the areas of com- tational intelligence, neural networks, mobile and adhoc networks, security, databases, softwareengineering,signal andimageprocessing,andInternetandWWW-basedc- puting. The programme committee, consisting of eminent researchers, academicians and practitioners, ?nally selected 43 full papers on the basis of reviewer grades. This proceedings contains the research papers selected for presentation at the c- ference and this is the ?rst time that the proceedingshave been published in the Lecture Notes in Computer Science (LNCS) series. The poster papers are being printed as a separate conference proceedings.

Gulati / Das Intelligent Information Technology jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Computational Intelligence.- An Approach for Conceptual Modeling and Extracting Expressive Semantics from Dance Videos.- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis Platform.- A Linear Time Algorithm for Constructing Tree 4-Spanner in 2-Trees.- Task Scheduling Algorithm for Interconnection Constrained Network of Heterogeneous Processors.- Neural Networks.- Detecting Topology Preserving Feature Subset with SOM.- Adaptive Neural Network-Based Clustering of Yeast Protein–Protein Interactions.- Design of Neuro-fuzzy Controller Based on Dynamic Weights Updating.- Interval Computing in Neural Networks: One Layer Interval Neural Networks.- Communication Networks.- Design and Deployment of IP Virtual Private Networks: A Case Study.- QoS Driven Online Multicast Routing Algorithm.- Software Radio Implementation of a Smart Antenna System on Digital Signal Processors for cdma2000.- An Efficient Cost Effective Location Management Scheme Based on Velocity Vector Information of Mobile Unit.- Integrated Computation, Communication and Control: Towards Next Revolution in Information Technology.- Mobile and Adhoc Networks.- Designing Mobile Distributed Virtual Memory System.- Efficient Grid Location Update Scheme for Mobile Ad Hoc Networks.- Power Optimization in Mobile Networks Using Genetic Algorithm to Guarantee QoS.- Associativity Based Mobility-Adaptive K-Clustering in Mobile Ad-Hoc Networks.- Self-organized Security Architecture for MANET.- Clock Synchronization in IEEE 802.11 Ad Hoc Networks.- Security.- Internet Banking – A Layered Approach to Security.- On Reduction of Bootstrapping Information Using Digital Multisignature.- SpamNet – Spam Detection Using PCA and Neural Networks.- TCP Based Denial-of-Service Attacks to Edge Network:Analysis and Detection.- Network Intrusion Detection Using Wavelet Analysis.- Building a Secure and Highly Scalable Data Distribution System.- Database.- Performance of Distributed Optimistic Concurrency Control in Real-Time Databases.- An Extension to ER Model for Top-Down Semantic Modeling of Databases of Applications.- Overlaying Multiple Maps Efficiently.- Software Engineering.- Relational Schema Evolution for Program Independency.- Reliability Enhancement in Software Testing – An Agent-Based Approach for Complex Systems.- MurO: A Multi-representation Ontology as a Foundation of Enterprise Information Systems.- A Tool to Automatically Detect Defects in C++ Programs.- Implementation of Embedded Cores-Based Digital Devices in JBits Java Simulation Environment.- Automatic Model Generation in Model Management.- Signal and Image Processing.- Contourlet Based Multiresolution Texture Segmentation Using Contextual Hidden Markov Models.- FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder.- Multi-agent Based User Access Patterned Optimal Content Allocation Method for Federated Video Digital Libraries.- Optimizing Surplus Harmonics Distribution in PWM.- M-BCJR Based Turbo Equalizer.- Internet and WWW-Based Computing.- YALXP: Yet Another Lightweight XPath Processor.- Early Performance Modeling for Web Based Applications.- An Examination of Website Quality Dimensions in Australian e-Retailing: A Confirmatory Factor Analysis Approach.- Aspects of Pervasive Computing for Web Based Learning.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.