Workshop on Software Engineering Processes and Applications (SEPA 2009).- Ontology-Based Requirements Conflicts Analysis in Activity Diagrams.- Resource Allocation Optimization for GSD Projects.- Verification of Use Case with Petri Nets in Requirement Analysis.- Towards Guidelines for a Development Process for Component-Based Embedded Systems.- Effective Project Leadership in Computer Science and Engineering.- Weyuker's Properties, Language Independency and Object Oriented Metrics.- Workshop on Molecular Simulations ...
Read More
Workshop on Software Engineering Processes and Applications (SEPA 2009).- Ontology-Based Requirements Conflicts Analysis in Activity Diagrams.- Resource Allocation Optimization for GSD Projects.- Verification of Use Case with Petri Nets in Requirement Analysis.- Towards Guidelines for a Development Process for Component-Based Embedded Systems.- Effective Project Leadership in Computer Science and Engineering.- Weyuker's Properties, Language Independency and Object Oriented Metrics.- Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009).- Lattice Constant Prediction of A2BB'O6 Type Double Perovskites.- A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients.- A Grid Implementation of Direct Quantum Calculations of Rate Coefficients.- A Grid Implementation of Chimere: Ozone Production in Central Italy.- Workshop on Internet Communication Security (WICS 2009).- MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT.- Testing Topologies for the Evaluation of IPSEC Implementations.- Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key.- Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009).- Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment.- Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.- Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments.- A Practical Approach to a Reliable Electronic Election.- Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key.- Workshop on Mobile Communications (MC 2009).- Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments.- Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System.- Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition.- A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System.- Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes.- Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System.- WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up.- Overlay Ring Based Secure Group Communication Scheme for Mobile Agents.- Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems.- AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization.- Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol.- Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.- On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors.- Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code.- Design of an Efficient Multicast Scheme for Vehicular Telematics Networks.- ODDUGI: Ubiquitous Mobile Agent System.- Determination of the Optimal Hop Number for Wireless Sensor Networks.- Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models.- A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs.- Analysis of Moving Patterns of Moving Objects with the Proposed Framework.- A User-Defined Index for Containment Queries in XML.- On Optimal Placement of the Monitoring Devices on Channels of Communication Network.- Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks.- A Capacity Aware Data Transport Protocol for Wireless Sensor Network.- Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs).- VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802...
Read Less
Add this copy of Computational Science and Its Applications - Iccsa 2009 to cart. $103.32, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2009 by Springer.