Sobh | Innovations and Advances in Computer Sciences and Engineering | E-Book | www.sack.de
E-Book

E-Book, Englisch, 589 Seiten

Sobh Innovations and Advances in Computer Sciences and Engineering


1. Auflage 2010
ISBN: 978-90-481-3658-2
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 589 Seiten

ISBN: 978-90-481-3658-2
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark



Innovations and Advances in Computer Sciences and Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Software Engineering, Computer Engineering, and Systems Engineering and Sciences.

Innovations and Advances in Computer Sciences and Engineering includes selected papers form the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2008) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).



Sobh Innovations and Advances in Computer Sciences and Engineering jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Preface;6
2;Table of Contents;7
3;Acknowledgements;13
4;Reviewers List;14
5;Possibilities of Computer Simulation in Power Engineering and Environmental Engineering;15
6;Mining Time Pattern Association Rules in Temporal Database;20
7;Domain-Based Intelligent Tutoring System;25
8;I Know What You Did This Summer – Users’ Behavior on Internet;30
9;Relative Ranking – A Biased Rating;36
10;Resource Redundancy – A Staffing Factor using SFIA;41
11;Integrating Text Mining and Genetic Algorithm for Subject Selection;46
12;“DESIGN, DEVELOPMENT & IMPLEMENTATION OF E- LEARNING TOOLS”;51
13;Search for equilibrium state flight;57
14;Possibilities of Computer Simulation in Power Engineering andEnvironmental Engineering;15
15;Enhanced Progressive Vector Data Transmission For Mobile Geographic Information Systems ( MGIS);69
16;Mining Inter-transaction Data Dependencies for Database Intrusion Detection*;75
17;Energy-Security Adaptation Scheme of Block Cipher Mode of Operations;81
18;Treating measurement uncertainty in complete conformity control system;87
19;Software Process Improvement Models Implementation in Malaysia;93
20;Neural Network and Social Network to enhance the customer loyalty process;99
21;Using B-trees to Implement Water: a Portable, High Performance, High- Level Language;105
22;Using GIS to produce Vulnerability Maps of Non- Gauged Watersheds area ( Qena Valley– Pilot area);114
23;Arabic Character Recognition Using Gabor Filters;120
24;Contextual Data Rule Generation For Autonomous Vehicle Control;129
25;Features Based Approach to Identify the P2P File Sharing;153
26;Evaluating the Performance of 3D Face Reconstruction Algorithms;158
27;Multi Dimensional and Flexible Model for Databases;164
28;Secondary Emotions Deduction from Context;170
29;A Method of Evaluating Authentication Mechanisms;184
30;ASTRA: An Awareness Connectivity Platform for Designing Pervasive Awareness Applications;190
31;Extending OWL-S to nested services: an application to optimum wireless network planning;196
32;A Multi-Agent Role-Based System for Business Intelligence;206
33;LERUS: A User Interface Specification Language;212
34;Mitral Valve Models Reconstructor: a Python based GUI software in a HPC environment for patient- specific FEM structural analysis;218
35;Creating Personally Identifiable Honeytokens;228
36;Using Spectral Fractal Dimension in Image Classification;238
37;A Novel Method to Compute English Verbs’ Metaphor Making Potential in SUMO;243
38;Computer Simulation of Differential Digital Holography;254
39;Evaluation of Case Based Reasoning for Clinical Decision Support Systems applied to Acute Meningitis Diagnose;258
40;Information Systems via Epistemic States;264
41;A Practical Application of Performance Models to Predict the Productivity of Projects;271
42;An Approach to Evaluate and Improve the Organizational Processes Assets: the First Experience of Use;276
43;A Multiple Criteria Approach to Analysis and Resolution of the Causes of Problems on Software Organizations;282
44;A Secure Software Development Supported by Knowledge Management;288
45;A General Framework for Testing Web-Based Applications;300
46;Integrated Reverse Engineering Process Model;304
47;Achieving Consistency and Reusability in Presentation Layer Design using Formal Methods and Design Patterns;309
48;First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices;315
49;Visualization of Large Software Projects by using Advanced Techniques;321
50;BWN - A Software Platform for Developing Bengali WordNet;332
51;Robust Learning Algorithm for Networks of Neuro- Fuzzy Units;338
52;An Experience of Use of an Approach to Construct Measurement Repositories in Software Organizations;342
53;A Visualization-based Intelligent Decision Support System Conceptual Model;348
54;Analysis of selected component technologies efficiency for parallel and distributed seismic wave field modeling;354
55;Modified Locally Linear Embedding based on Neighborhood Radius;358
56;A Digital Forensics Primer;363
57;Semantic Enrichment: The First Phase of Relational Database Migration;367
58;The Impact of the Prototype Selection on a Multicriteria Decision Aid Classification Algorithm;373
59;Information Handling in Security Solution Decisions;377
60;Identifying Connected Classes for Software Reuse and Maintenance;383
61;Usability Design Recommendations: A First Advance;388
62;THE STATUS QUO OF 3G APPLICATION IN CHINA;394
63;A new approach for critical resources allocation;400
64;Numerical-Analytic Model of Multi-Class, Multi- Server Queue with Nonpreemptive Priorities;405
65;Project Prioritization as a Key Element in IT Strategic Demand Management;408
66;Greylisting method analysis in real SMTP server environment – Case- study;414
67;Using Formal Methods in Component Based Software Development;419
68;Costs and Benefits in Knowledge Management in Czech Enterprises;423
69;Ontology-based representation of activity spheres in ubiquitous computing spaces;428
70;Image Decomposition on the basis of an Inverse Pyramid with 3- layer Neural Networks;433
71;Testing Grammars For Top-Down Parsers;439
72;Accessing Web Based Multimedia Contents for the Visually Challenged: Combined Tree Structure and XML Metadata;445
73;M-Business and Organizational Behavior;451
74;A Policy- based Framework for QoS Management in Service Oriented Environments;455
75;An Attacks Ontology for computer andnetworks attack;461
76;Information Quality and Accessibility;465
77;Engineering Autonomous Trust-Management Requirements for Software Agents: Requirements and Concepts;470
78;Evaluation of Semantic Actions in Predictive Non- Recursive Parsing;477
79;Pair Hidden Markov Model for Named Entity Matching;483
80;Escaping Death – Geometrical Recommendations for High Value Targets;489
81;Parallelization of Finite Element Navier-Stokes codes using MUMPS Solver;501
82;Shapely Functions and Data Structure Preserving Computations;505
83;IraqComm and FlexTrans: A Speech Translation System and Flexible Framework;512
84;Development of Ubiquitous Median Strip Total System in the Road;518
85;An LOD Control Interface for an OpenGL-based Softbody Simulation Framework;523
86;Laboratory performance test of overload vehicles regu-lation system on Ubiquitous road;528
87;Design of bridge health monitoring system on Wireless Sensor Network;534
88;TOTALLY SENDER- AND FILE-ORDER RECOVERY TECHNIQUE FOR RELIABLE MULTICASTING SOLUTIONS USING HEARTBEAT;538
89;Enterprise 2.0 Collaboration for Collective Knowledge and Intelligence Applications;548
90;Knowledge Engineering Experimentation Management System for Collaboration;554
91;Building Information Modeling and Interoperability with Environmental Simulation Systems;560



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.