UID:
almahu_9947364142102882
Format:
XIII, 318 p.
,
online resource.
ISBN:
9783642105098
Series Statement:
Lecture Notes in Computer Science, 5899
Content:
This book constitutes the reviewed proceedings of the first Conference on Future Generation Information Technology, FGIT 2009, held in Jeju Island, Korea, December 10-12, 2009. The 33 full papers presented together with two keynote papers were carefully selected from 1051 submissions. This book considers the best papers of the conference and issues such as data analysis, data processing, advanced computation models and security, software engineering, communication and networking.
Note:
Keynotes -- Computer Science: Where Is the Next Frontier? -- Video Forgery -- Data Analysis, Data Processing, Advanced Computation Models -- Intelligent Data Granulation on Load: Improving Infobright’s Knowledge Grid -- Data Analysis Methods for Library Marketing -- HMM Approach for Classifying Protein Structures -- Investigation of Average Mutual Information for Species Separation Using GSOM -- Speech Recognition System and Formant Based Analysis of Spoken Arabic Vowels -- A Study on Mental Tasks Discriminative Power -- A Straight Line-Based Distance Measure to Compute Photographic Compositional Dissimilarity -- Data Gathering for Gesture Recognition Systems Based on Mono Color-, Stereo Color- and Thermal Cameras -- Object Surface Reconstruction from One Camera System -- The Study of Development Strategy for Bank Distribution Network through the Analysis of Inter-regional Financial Transaction Network -- Global Synchronization Properties for Different Classes of Underlying Interconnection Graphs for Kuramoto Coupled Oscillators -- Predicting the Performance of a GRID Environment: An Initial Effort to Increase Scheduling Efficiency -- Towards an Integrated Vision across Inter-cooperative Grid Virtual Organizations -- Effective GIS Mobile Query System -- Modeling and Simulation of Tandem Tollbooth Operations with Max-Algebra Approach -- Security, Software Engineering, Communication and Networking -- Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism -- Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis -- Fragmentation Point Detection of JPEG Images at DHT Using Validator -- Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol -- Automatic Detection of Infinite Recursion in AspectJ Programs -- A Hierarchical Test Model and Automated Test Framework for RTC -- A Bi-objective Model Inspired Greedy Algorithm for Test Suite Minimization -- Analysing Object Type Hierarchies to Identify Crosscutting Concerns -- A Bayesian Inference Tool for NHPP-Based Software Reliability Assessment -- AGILE Rate Control for IEEE 802.11 Networks -- Low Density Parity Check Code for the Single Carrier Frequency Division Multiple Access -- Dual Optimization of Dynamic Sensor Function Allocation and Effective Sensed Data Aggregation in Wireless Sensor Networks -- Depth-Spatio-Temporal Joint Region-of-Interest Extraction and Tracking for 3D Video -- Dynamic Routing Algorithm for Reliability and Energy Efficiency in Wireless Sensor Networks -- QoS Multicast Routing Algorithms Based on Tabu Search with Hybrid Candidate List -- A Lifetime Enhancing Node Deployment Strategy in WSN -- Data Analysis, Data Processing, Advanced Computation Models -- Experimental Investigation of Three Machine Learning Algorithms for ITS Dataset.
In:
Springer eBooks
Additional Edition:
Printed edition: ISBN 9783642105081
Language:
English
DOI:
10.1007/978-3-642-10509-8
URL:
http://dx.doi.org/10.1007/978-3-642-10509-8