Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7513 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040658222 | ||
003 | DE-604 | ||
005 | 20130911 | ||
007 | t| | ||
008 | 130108s2012 gw ad|| |||| 10||| eng d | ||
015 | |a 12,N47 |2 dnb | ||
016 | 7 | |a 1027871828 |2 DE-101 | |
020 | |a 3642356052 |9 3-642-35605-2 | ||
020 | |a 9783642356056 |c Pb. : ca. EUR 110.21 (DE) (freier Pr.), ca. EUR 113.30 (AT) (freier Pr.), ca. sfr 137.50 (freier Pr.) |9 978-3-642-35605-6 | ||
024 | 3 | |a 9783642356056 | |
028 | 5 | 2 | |a Best.-Nr.: 86204939 |
035 | |a (OCoLC)826572749 | ||
035 | |a (DE-599)DNB1027871828 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-91G |a DE-11 | ||
082 | 0 | |a 004.35 |2 22/ger | |
082 | 0 | |a 004.6 |2 22/ger | |
084 | |a DAT 516f |2 stub | ||
084 | |a DAT 250f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 212f |2 stub | ||
245 | 1 | 0 | |a Network and parallel computing |b 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings |c James J. Park ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XIX, 647 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7513 | |
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Parallelverarbeitung |0 (DE-588)4075860-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Leistungsbewertung |0 (DE-588)4167271-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Grid Computing |0 (DE-588)4743648-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Kwangju |2 gnd-content | |
689 | 0 | 0 | |a Parallelverarbeitung |0 (DE-588)4075860-6 |D s |
689 | 0 | 1 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 1 | 1 | |a Grid Computing |0 (DE-588)4743648-7 |D s |
689 | 1 | 2 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 1 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 4 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 1 | 5 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
700 | 1 | |a Pak, Chong-hyun |e Sonstige |0 (DE-588)138427526 |4 oth | |
711 | 2 | |a NPC |n 9 |d 2012 |c Kwangju |j Sonstige |0 (DE-588)1029484384 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-35606-3 |
830 | 0 | |a Lecture notes in computer science |v 7513 |w (DE-604)BV000000607 |9 7513 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4179916&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025485025&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025485025 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 001z 2001 A 999 |
---|---|
DE-BY-TUM_katkey | 1906821 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040071429311 |
_version_ | 1822409459587088384 |
adam_text |
IMAGE 1
TABLE O F C O N T E N T S
ALGORITHMS, SCHEDULING, A N A L Y S I S , A N D D A T A M I N I N G
AN APPLICATION-LEVEL SCHEDULING WITH TASK BUNDLING APPROACH FOR
MANY-TASK COMPUTING IN HETEROGENEOUS ENVIRONMENTS 1
JIAN XIAO, YU ZHANG, SHUWEI CHEN, AND HUASHAN YU
DGRAPH: ALGORITHMS FOR SHORTGUN READS ASSEMBLY USING DE BRUIJN GRAPH 14
JINTAO MENG, JIANRUI YUAN, JIEFENG CHENG, YANJIE WEI, AND SHENGZHONG
FENG
KNOWLEDGE-BASED ADAPTIVE SELF-SCHEDULING 22
YIZHUO WANG, WEIXING JI, FENG SHI, QI ZUO, AND NING DENG
COMMUNICATION LOCALITY ANALYSIS OF TRIPLET-BASED HIERARCHICAL
INTERCONNECTION NETWORK IN CHIP MULTIPROCESSOR 33
SHAHNAWAZ TALPUR, FENG SHI, AND YIZHUO WANG
A SCORING SYSTEM FOR SHORT ANSWERS ON THE TEST IN A LARGE GROUP 42
JAE-YOUNG LEE
NETWORK A R C H I T E C T U R E A N D P R O T O C O L D E S I G N
REFERENCE VARIABLES FOR DYNAMIC, RELIABLE PACKET OPERATIONS 48
RALPH DUNCAN, PEDER JUNGCK, KENNETH ROSS, AND DWIGHT MULCAHY
ARE HETEROGENEOUS CELLULAR NETWORKS SUPERIOR T O HOMOGENEOUS ONES? 61
SHELLY SALIRN, CHRISTIAN H. W. OEY, AND SANGMAN MOH
DYNAMIC SPRAY AND WAIT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS 69
LONGBO ZHANG, CHEN YU, AND HAI J I N
A DYNAMIC POPULARITY-AWARE LOAD BALANCING ALGORITHM FOR STRUCTURED P2P
SYSTEMS 77
NARJES SOLTANI, EHSAN MOUSAVI KHANEGHAH, MOHSEN SHARIFI, AND SEYEDEH
LEILI MIRTAHERI
NCCPIS: A CO-SIMULATION TOOL FOR NETWORKED CONTROL AND CYBER-PHYSICAL
SYSTEM EVALUATION 85
JINZHI LIN, YING WU, GONGYI WU, AND JINGDONG X U
HTTP://D-NB.INFO/1027871828
IMAGE 2
XIV TABLE OF CONTENTS
N E T W O R K S E C U R I T Y
DEMPSTER-SHAFER THEORY T O IDENTIFY INSIDER ATTACKER IN WIRELESS SENSOR
NETWORK 94
MUHAMMAD AHMED,, X U HUANG, AND DHARMENDRA SHARMA
MIB-ITRACE-CP: AN IMPROVEMENT OF ICMP-BASED TRACEBACK EFFICIENCY IN
NETWORK FORENSIC ANALYSIS 101
BO-CHAO CHENG, GUO-TAN LIAO, GHING-KAI LIN, SHIH-CHUN HSU, PING-HAI HSU,
AND JONG HYUK PARK
BREAKING A ROBUST REMOTE USER AUTHENTICATION SCHEME USING SMART CARDS
110
DING WANG, CHUN-GUANG MA, SEN-DONG ZHAO, AND CHANG-LI ZHOU
AN ANALYSIS OF PRIVACY PRESERVING D A T A AGGREGATION PROTOCOLS FOR WSNS
119
IRFANA MEMON
HYBRID OBFUSCATED JAVASCRIPT STRENGTH ANALYSIS SYSTEM FOR DETECTION OF
MALICIOUS WEBSITES 129
R. KRISHNAVENI, C. CHELLAPPAN, AND R. DHANALAKSHRNI
DETECTION AND MITIGATION OF WEB APPLICATION VULNERABILITIES BASED ON
SECURITY TESTING 138
TAESEUNG LEE, GIYOUN WON, SEONGJE CHO, NAMJE PARK, AND DONGHO WON
PARALLEL, D I S T R I B U T E D , A N D V I R T U A L I Z A T I O N T E
C H N I Q U E S
SMALL WORLD ASYNCHRONOUS PARALLEL MODEL FOR GENOME ASSEMBLY 145 JINTAO
MENG, JIANRUI YUAN, JIEFENG CHENG, YANJIE WEI, AND SHENGZHONG FENG
UKCF: A NEW GRAPHICS DRIVER CROSS-PLATFORM TRANSLATION FRAMEWORK FOR
VIRTUAL MACHINES 156
HAITAO JIANG, YUN XU, YIN LIAO, GUOJIE JIN, AND GUOLIANG CHEN
FAST PARALLEL GARNER ALGORITHM FOR CHINESE REMAINDER THEOREM 164 YONGNAN
LI, LIMIN XIAO, AIHUA LIANG, YAO ZHENG, AND L I R U A N
DMPI: FACILITATING DEBUGGING OF M P I PROGRAMS VIA DETERMINISTIC MESSAGE
PASSING 172
X U ZHOU, KAI LU, XICHENG LU, XIAOPING WANG, AND BAOHUA FAN
ON DYNAMIC COMMUNICATION PERFORMANCE OF A HIERARCHICAL 3D-MESH NETWORK
180
M.M. HAFIZUR RAHMAN, ASADULLAH SHAH, AND YASUSHI INOGUCHI
IMAGE 3
TABLE OF CONTENTS XV
PERFORMANCE M O D E L I N G , P R E D I C T I O N , A N D T U N I N G
; AN ELASTIC ARCHITECTURE ADAPTABLE T O MILLIONS OF APPLICATION
SCENARIOS 188
YUNJI CHEN, TIANSHI CHEN, QI GUO, ZHIWEI XU, AND LEI ZHANG
I DEMYSTIFYING PERFORMANCE PREDICTIONS OF DISTRIBUTED F F T 3 D
IMPLEMENTATIONS 196
I DANIEL OROZCO, ELKIN GARCIA, ROBERT PAVEL, ORLANDO AYALA, LIAN-PING
WANG, AND GUANG GAO
MAP -NUMA: ACCESS PATTERNS USED T O CHARACTERIZE THE NUMA MEMORY ACCESS
OPTIMIZATION TECHNIQUES AND ALGORITHMS 208
QIUMING LUO, CHENJIAN LIU, CHANG KONG, AND YE CAI
; MHLOGGP: A PARALLEL COMPUTATION MODEL FOR C P U / G P U :
HETEROGENEOUS COMPUTING CLUSTER 217
GANGFENG LIU, YUNLAN WANG, TIANHAI ZHAO, JIANHUA GU, AND DONGYANG L I
RESOURCE M A N A G E M E N T
= ESTIMATING AVAILABLE BANDWIDTH IN COOPERATIVE MULTI-HOP WIRELESS S
NETWORKS 225
WEI FENG, JIAN LIU, JIANNONG CAO, LIANG YANG, AND QIN X I N
RELATIVE PRIORITY ANALYSIS OF KOREAN IS AUDIT STANDARD CHECK ITEMS I
USING THE CONSTANT-SUM METHOD 233
BOO-HYOUNG LEE, CHI-SU KIM, AND HEON-TAG KONG
I IMPROVING THE PERFORMANCES OF INTERNET-BASED MARKETPLACE FOR
TECHNOLOGY: A KOREAN CASE STUDY 241
JONG BOK PARK
S THE DAY-OF-THE WEEK EFFECTS FOR CLOUD-BASED SHIPMENT TIMING : SUPPORT
SYSTEM FOR STORED APPLES 248
YOUNGSIK KWAK AND YOONJUNG N A M
U B I Q U I T O U S C O M M U N I C A T I O N S A N D N E T W O R K S
; AN EMPIRICAL VIEW ON OPPORTUNISTIC FORWARDING RELAY SELECTION USING ;
CONTACT RECORDS 256
JIA JIANBIN, CHEN YINGWEN, AND X U MING
DESIGN AND DEPLOYMENT OF TESTBED FOR EXPERIMENTAL SENSOR NETWORK
RESEARCH 264
ZEESHAN HAMEED MIR, HYEON PARK, YOUNG BAG MOON, NAE SOO KIM, AND CHEOL
SIG PYO
IMAGE 4
XVI TABLE OF CONTENTS
IMPLEMENTATION OF THE INTEGRATED MONITORING SYSTEM BASED ON A N
AUTOMATIC DISASTER PREVENTION DEVICE 273
YOONSIK KWAK
W E B , C O M M U N I C A T I O N , A N D C L O U D C O M P U T I N G
SMART RING: A MODEL OF NODE FAILURE DETECTION IN HIGH AVAILABLE CLOUD D
A T A CENTER 279
LEI XU, WENZHI CHEN, ZONGHUI WANG, HUAFEI NI, AND JIAJIE W U
EASYNC: A TRANSPARENT FILE SYNCHRONIZATION SERVICE ACROSS MULTIPLE
MACHINES 289
HUAJIAN MAO, HANG ZHANG, XIANQIANG BAO, NONG XIAO, WEISONG SHI, AND
YUTONG L U
RELATIONSHIP BETWEEN CORRECTING CODE AND MODULE TECHNIQUE IN HIDING
SECRET D A T A 297
PHAN TRUNG HUY, NGUYEN HAI THANH, AND CHEONSICK K I M
DIFFERENT CHARACTERISTICS OF RADIO MODULES IN WIRELESS BODY SENSOR
NETWORK SYSTEMS 308
WOOSIK LEE, MIN CHOI, AND NAMGI KIRN
THE DEVELOPMENT OF SUSTAINABLE GROWTH STRATEGY MODEL BASED ON THE USER
TENDENCY IN THE ONLINE GAME SERVICES 315
HYEOG-IN KUION, HI-YEOB JOO, DAE-JIN KIM, AND JONG-SEOK PARK
COMPUTER EDUCATION'S TEACHING-LEARNING METHODS USING EDUCATIONAL
PROGRAMMING LANGUAGE BASED ON STEAM EDUCATION 320
NAMJE PARK AND YEONGHAE K O
A T I M C N
THE PERFORMANCES STUDY OF E D C F WITH BLOCK_ACK IN WLANS 328
CHIEN-ERH WENG, CHIEN-HUNG CHEN, CHIUNG-HSING CHEN, AND JYH-HOMG WEN
A STUDY OF SLA-BASED DEFENSE RESOURCE MANAGEMENT STRATEGY IN NETWORK
SECURITY DEFENSE SYSTEM 336
WEN-HSU HSIAO, HUI-KAI SU, YU-SIANG WEI, WEI-SHENG HO, AND KIM-JOAN CHEN
A NEW APPROACH FOR DETECTING SMTPFA BASED ON ENTROPY MEASUREMENT 349
HSING- CHUNG CHEN, JAI-ZONG SUN, SHIAN-SHYONG TSENG, AND CHIEN-ERH WENG
IMAGE 5
TABLE OF CONTENTS XVII
A MULTI-CONSTRAINT RESOURCE SEARCH ALGORITHM FOR P2P-SIP CONFERENCE
SERVICES 360
HUI-KAI SU, WEN-HSU HSIAO, JIAN-TING PAN, CHEN-HUNG LIAO, KIM-JOAN CHEN,
AND CHIEN-MIN W U
A T S M E
THE EFFECTS OF GOVERNMENTAL SUBSIDY ON THE QUALITY OF EDUCATION IN
TAIWAN'S PRIVATE UNIVERSITIES AND COLLEGES 373
CHING-HUI SHIH
EXAMINING THE EFFECTIVENESS OF A DISTANT LEARNING EDUCATION PROGRAM: USE
OF PATIENT SAFETY AND REPORTING LAW AND ETHICS AS EXAMPLE 381
CHIOU-FEN LIN, MEEI-LING SHYU, MEEI-SHIOW LU, AND CHUNG-I. HUANG
THE INSTRUCTIONAL DESIGN OF A WEB-BASED SELF-REFLECTIVE LEARNING
PORTFOLIO FOR SKILL TRAINING 386
HUNG-CHANG L I N AND YAO-HUA WANG
THE DIFFERENCE ANALYSIS BETWEEN DEMOGRAPHIC VARIABLES AND PERSONAL
ATTRIBUTES - THE CASE OF INTERNAL AUDITORS IN TAIWAN 394
LI-JIA CHIU AND NENG-TANG NORMAN HUANG
SUCCESS FACTORS AND PROBLEMS ENCOUNTERED IN THE WORKPLACE LEARNING OF
UNIVERSITY/COLLEGE OF TECHNOLOGY STUDENTS IN TAIWAN: A FIVE-STAR HOTEL
AS AN EXAMPLE 401
MEY-TYNG WANG AND GUO-HONG LEI
CROSS-CULTURAL TRAINING PROGRAMS AND EXPATRIATE ADJUSTMENT EFFECTIVENESS
409
SHIANG-LAN K U O
SOFT POWER: A CRITICAL FACTOR FOR THE EFFECTIVENESS AND DEVELOPMENT OF A
SCHOOL 414
HUI-MIN K O
CLOUD & G R I D
MERGING GRID INTO CLUSTERING-BASED ROUTING PROTOCOL FOR WIRELESS SENSOR
NETWORKS 421
YING-HONG WANG, YU-WEI LIN, YU-YU LIN, AND HANG-MING CHANG
A TERMINATION DETECTION TECHNIQUE USING GOSSIP IN CLOUD COMPUTING
ENVIRONMENTS 429
JONGBEOM LIM, KWANG-SIK CHUNG, AND HEON- CHANG YU
OEIRM: AN OPEN DISTRIBUTED PROCESSING BASED INTEROPERABILITY REFERENCE
MODEL FOR E-SCIENCE 437
ZHIMING ZHAO, PAOLA GROSSO, AND CEES DE LAAT
IMAGE 6
XVIII TABLE OF CONTENTS
USING P C I PASS-THROUGH FOR G P U VIRTUALIZATION WITH CUDA 445
CHAO-TUNG YANG, HSIEN-YI WANG, AND YU-TSO L I U
D A T I C S
PARALLEL VALUATION OF THE LOWER AND UPPER BOUND PRICES FOR MULTI-ASSET
BERMUDAN OPTIONS 453
NAN ZHANG AND K A LOK M A N
INSIGHT OF DIRECT SEARCH METHODS AND MODULE-INTEGRATED ALGORITHMS FOR
MAXIMUM POWER POINT TRACKING ( M P P T ) OF STAND-ALONE PHOTOVOLTAIC
SYSTEMS 463
JIEMING MA, K A LOK MAN, T.O. TING, HYUNSHIN LEE, TAIKYEONG JEONG,
JONG-KUG SEAN, SHENG-JJEI GUAN, AND PRUDENCE W.H. WONG
PRICING BERMUDAN INTEREST RATE SWAPTIONS VIA PARALLEL SIMULATION UNDER
THE EXTENDED MULTI-FACTOR LIBOR MARKET MODEL 472
NAN ZHANG, K A LOK MAN, AND ENG GEE LIRA
EVOLVING LINEAR DISCRIMINANT IN A CONTINUOUSLY GROWING DIMENSIONAL SPACE
FOR INCREMENTAL ATTRIBUTE LEARNING 482
TING WANG, SHENG-UEI GUAN, T.O. TING, K A LOK MAN, AND FEI LIU
COMPACT MULTIPLICATIVE INVERTER FOR HARDWARE ELLIPTIC CURVE CRYPTOSYSTEM
492
M.M. WONG, M.L.D. WONG, AND K A LOK M A N
SPACE EXPLORATION OF MULTI-AGENT ROBOTICS VIA GENETIC ALGORITHM 500 T.
O. TING, KAIYU WAN, K A LOK MAN, AND SANGHYUK LEE
WEIGHTLESS SWARM ALGORITHM (WSA) FOR DYNAMIC OPTIMIZATION PROBLEMS 508
T.O. TING, K A LOK MAN, SHENG-UEI GUAN, MOHAMED NAYEL, AND KAIYU WAN
DESIGN OF A RELIABLE XOR-XNOR CIRCUIT FOR ARITHMETIC LOGIC UNITS . . .
516 MOUNA KARMANI, CHIRAZ KHEDHIRI, BELGACEM HAMDI, AMIR-MOHAMMAD
RAHMANI, K A LOK MAN, AND KAIYU WAN
U M A S
NEW ELECTRONIC ACUPUNCTURE SYSTEM USING INTELLIGENCE 524
YOU-SIK HONG, HONGKYUN KIM, CHEONSHIK KIM, AND GEUK LEE
A RUNTIME ENVIRONMENT FOR DISTRIBUTED MASHUPS IN MULTI-DEVICE SCENARIOS
532
OLIVER MROFI AND KLAUS MEIFINER
IMAGE 7
TABLE OF CONTENTS XIX
A LOCATION-BASED ALGORITHM FOR SUPPORTING MULTICAST ROUTING IN MOBILE
AD-HOC NETWORKS 542
LE THE DUNG AND BEONGKU A N
NIBBLE-CRC FOR UNDERWATER ACOUSTIC COMMUNICATION 550
IMTIAZ AHMED KHAN, NAM- YEOL YUN, AND SOO-HYUN PARK
AN OPTIMIZED SUB-TEXTURE MAPPING TECHNIQUE FOR A N ARBITRARY TEXTURE
CONSIDERING TOPOLOGY RELATIONS 559
SANGYONG LEE, CHEONSHIK KIM, AND SEONGAH CHIN
RESEARCH ON A SMART INPUT DEVICE USING MULTIMODAL BIO-SIGNAL INTERFACE
565
HYUNJU LEE, TAEHYUN KIM, DONGKYOO SHIN, HEEWON PARK, SOOHAN KIM, AND
DONGLL SHIN
CRYPTANALYSIS OF AN RFID TAG SEARCH PROTOCOL PRESERVING PRIVACY OF
MOBILE READER 575
EUN-JUN YOON
CRYPTANALYSIS OF GORIPARTHI ET AL.'S BILINEAR PAIRING BASED REMOTE USER
AUTHENTICATION SCHEME 581
HAE-JUNG K I M AND EUN-JUN YOON
ENERGY-EFFICIENCY PROTOCOL FOR SECURING THE WIRELESS SENSOR NETWORKS 589
LUU HOANG LONG AND EUNMI CHOI
A NOVEL TIME REVERSAL-LEAST SIDELOBE SCHEME T O MINIMIZE ISI AND MUI 599
DO-HOON KIM, JUNGWOOK WEE, AND KYU-SUNG HWANG
SNR-BASED PARTIAL RELAY SELECTION SCHEME OVER MULTIPLE RELAY NETWORK 608
KYU-SUNG HWANG
ROBUST FACE RECOGNITION IN LOW RESOLUTION AND BLURRED IMAGE USING JOINT
INFORMATION IN SPACE AND FREQUENCY 616
GUOQING LI, GUANGLING SUN, AND XINPENG ZHANG
ALGORITHMS BASED ON FINITE AUTOMATA FOR TESTING OF Z-CODES 625
DANG QUYET THANG, NGUYEN DINH HAN, AND PHAN TRUNG HUY
DESIGN OF THE COGNITIVE INFORMATION DISPLAY FOR WATER LEVEL CONTROL OF
THE STEAM GENERATOR IN KOREAN NUCLEAR POWER REACTOR 636
SOOILL LEE
AUTHOR I N D E X 645 |
any_adam_object | 1 |
author_GND | (DE-588)138427526 |
building | Verbundindex |
bvnumber | BV040658222 |
classification_rvk | SS 4800 |
classification_tum | DAT 516f DAT 250f DAT 460f DAT 212f |
ctrlnum | (OCoLC)826572749 (DE-599)DNB1027871828 |
dewey-full | 004.35 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.35 004.6 |
dewey-search | 004.35 004.6 |
dewey-sort | 14.35 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040658222</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130911</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">130108s2012 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N47</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1027871828</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642356052</subfield><subfield code="9">3-642-35605-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642356056</subfield><subfield code="c">Pb. : ca. EUR 110.21 (DE) (freier Pr.), ca. EUR 113.30 (AT) (freier Pr.), ca. sfr 137.50 (freier Pr.)</subfield><subfield code="9">978-3-642-35605-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642356056</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86204939</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)826572749</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1027871828</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.35</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 516f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 212f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network and parallel computing</subfield><subfield code="b">9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings</subfield><subfield code="c">James J. Park ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 647 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7513</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Parallelverarbeitung</subfield><subfield code="0">(DE-588)4075860-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Grid Computing</subfield><subfield code="0">(DE-588)4743648-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Kwangju</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Parallelverarbeitung</subfield><subfield code="0">(DE-588)4075860-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Grid Computing</subfield><subfield code="0">(DE-588)4743648-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pak, Chong-hyun</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)138427526</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">NPC</subfield><subfield code="n">9</subfield><subfield code="d">2012</subfield><subfield code="c">Kwangju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1029484384</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-35606-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7513</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7513</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4179916&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025485025&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025485025</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Kwangju gnd-content |
genre_facet | Konferenzschrift 2012 Kwangju |
id | DE-604.BV040658222 |
illustrated | Illustrated |
indexdate | 2025-01-27T13:38:15Z |
institution | BVB |
institution_GND | (DE-588)1029484384 |
isbn | 3642356052 9783642356056 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025485025 |
oclc_num | 826572749 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
physical | XIX, 647 S. Ill., graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings James J. Park ... (eds.) Berlin [u.a.] Springer 2012 XIX, 647 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7513 Netzwerktopologie (DE-588)4208537-8 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Parallelverarbeitung (DE-588)4075860-6 gnd rswk-swf Leistungsbewertung (DE-588)4167271-9 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Ubiquitous Computing (DE-588)4657367-7 gnd rswk-swf Grid Computing (DE-588)4743648-7 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Kwangju gnd-content Parallelverarbeitung (DE-588)4075860-6 s Netzwerktopologie (DE-588)4208537-8 s DE-604 Cloud Computing (DE-588)7623494-0 s Grid Computing (DE-588)4743648-7 s Trusted Computing (DE-588)7562931-8 s Kryptoanalyse (DE-588)4830502-9 s Ubiquitous Computing (DE-588)4657367-7 s Leistungsbewertung (DE-588)4167271-9 s Netzwerk (DE-588)4171529-9 s 1\p DE-604 Pak, Chong-hyun Sonstige (DE-588)138427526 oth NPC 9 2012 Kwangju Sonstige (DE-588)1029484384 oth Erscheint auch als Online-Ausgabe 978-3-642-35606-3 Lecture notes in computer science 7513 (DE-604)BV000000607 7513 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4179916&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025485025&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings Lecture notes in computer science Netzwerktopologie (DE-588)4208537-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd Parallelverarbeitung (DE-588)4075860-6 gnd Leistungsbewertung (DE-588)4167271-9 gnd Cloud Computing (DE-588)7623494-0 gnd Ubiquitous Computing (DE-588)4657367-7 gnd Grid Computing (DE-588)4743648-7 gnd Netzwerk (DE-588)4171529-9 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4208537-8 (DE-588)4830502-9 (DE-588)4075860-6 (DE-588)4167271-9 (DE-588)7623494-0 (DE-588)4657367-7 (DE-588)4743648-7 (DE-588)4171529-9 (DE-588)7562931-8 (DE-588)1071861417 |
title | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings |
title_auth | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings |
title_exact_search | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings |
title_full | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings James J. Park ... (eds.) |
title_fullStr | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings James J. Park ... (eds.) |
title_full_unstemmed | Network and parallel computing 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings James J. Park ... (eds.) |
title_short | Network and parallel computing |
title_sort | network and parallel computing 9th ifip international conference npc 2012 gwangju korea september 6 8 2012 proceedings |
title_sub | 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6 - 8, 2012 ; proceedings |
topic | Netzwerktopologie (DE-588)4208537-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd Parallelverarbeitung (DE-588)4075860-6 gnd Leistungsbewertung (DE-588)4167271-9 gnd Cloud Computing (DE-588)7623494-0 gnd Ubiquitous Computing (DE-588)4657367-7 gnd Grid Computing (DE-588)4743648-7 gnd Netzwerk (DE-588)4171529-9 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Netzwerktopologie Kryptoanalyse Parallelverarbeitung Leistungsbewertung Cloud Computing Ubiquitous Computing Grid Computing Netzwerk Trusted Computing Konferenzschrift 2012 Kwangju |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4179916&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025485025&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT pakchonghyun networkandparallelcomputing9thifipinternationalconferencenpc2012gwangjukoreaseptember682012proceedings AT npckwangju networkandparallelcomputing9thifipinternationalconferencenpc2012gwangjukoreaseptember682012proceedings |