Computational Science and Its Applications-ICCSA 2005, Part II(计算机科学及其应用-ICCSA 2005 /会议录 第II部分)

价格 1333.40对比
发货 广东东莞市
销量 暂无
评价 已有 0 条评价
人气 已有 1 人关注
数量
+-
库存100
 
联系方式
加关注0

新图书资料发布

VIP   VIP会员第1年
资料未认证
保证金未缴纳

内容简介

The four-volume set LNCS 3480-3483 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2005, held in Singapore in May 2005. The four volumes present a total of 540 papers selected from around 2700 submissions. The papers span the whole range of computational science, comprising advanced applications in virtually all sciences making use of computational techniques as well as foundations, techniques, and methodologies from computer science and mathematics, such as high performance computing and communication, networking, optimization, information systems and technologies, scientific visualization, graphics, image processing, data analysis, simulation and modelling, software systems, algorithms, security, multimedia etc.

目录

Approaches or Methods of Security Engineering Workshop Implementation of Short Message Service System to Be based Mobile Wireless Internet Fuzzy Clustering for documents based on Optimization of Classifier Using the Genetic Algorithm P2P Protocol Analysis and Blocking Algorithm Object Modeling of RDF Schema for Converting UML Class Diagram A framework for Security Assurance in Component based Development Security framework to Verify the Low Level Implementation Codes A Study on evaluation of Component Metric Suites The K-Means Clustering Architecture in the Multi-stage Data Mining Process A Privacy Protection Model in ID Management Using Access Control A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems Modified Token-Update Scheme for Site Authentication A Study on Secure SDP of RFID Using Bluetooth Communication The Semantic Web Approach in Location based Services SCTE: Software Component Testing Environments Computer Security Management Model Using MAUT and SNMP Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS Networks A GQS-based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc Networks A Study on the E-Cash System with Anonymity and Divisibility An Authenticated Key Exchange Mechanism Using One-Time Shared Key Creation of Soccer Video Highlight Using the Caption Information The Information Search System Using Neural Network and Fuzzy Clustering based on Mobile Agent A Security evaluation and Testing Methodology for Open Source Software Embedded Information Security System …… Information Security and Hiding(ISH 2005)Workshop Modeling of Location Management in Mobile Information Systems Workshop Intelligent Multimedia Services and Synchronization in Mobile Multimedia Networks Workshop Ubiquitius Web Systems and Intelligence Workshop Modelling Complex Systems Workshop Author Index

举报收藏 0
网站首页  |  关于我们  |  联系方式  |  用户协议  |  隐私政策  |  版权声明  |  网站地图  |  排名推广  |  广告服务  |  积分换礼  |  网站留言  |  RSS订阅  |  违规举报  |  粤ICP备2021111040号