logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Future Generation Information Technology: Second International Conference, Fgit 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

Future Generation Information Technology: Second International Conference, Fgit 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings (Paperback, 2010)

(Second International Conference, Fgit 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings)

Tai-hoon Kim, Young-hoon Lee (엮은이)
Springer-Verlag New York Inc
207,470원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
170,120원 -18% 0원
8,510원
161,610원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
알라딘 판매자 배송 1개 6,000원 >
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Future Generation Information Technology: Second International Conference, Fgit 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
eBook 미리보기

책 정보

· 제목 : Future Generation Information Technology: Second International Conference, Fgit 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings (Paperback, 2010) (Second International Conference, Fgit 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings)
· 분류 : 외국도서 > 컴퓨터 > 소프트웨어 개발/엔지니어링 > 일반
· ISBN : 9783642175688
· 쪽수 : 756쪽
· 출판일 : 2010-11-22

목차

Keynote and Plenary Papers.- Wavelet-Chaos-Neural Network Models for EEG-Based Diagnosis of Neurological Disorders.- An Introduction to Perception Based Computing.- Social Networks: Research and Applications.- The Roadmap for Sharing Electronic Health Records: The Emerging Ubiquity and Cloud Computing Trends.- Compound Analytics of Compound Data within RDBMS Framework Infobright s Perspective.- From Grid Computing to Cloud Computing: Experiences on Virtualization Technology.- Data Analysis, Data Processing, Advanced Computation Models.- Recursive Queries Using Object Relational Mapping.- Agent Based Ontology Driven Virtual Meeting Assistant.- Topic Number Estimation by Consensus Soft Clustering with NMF.- Infrastructure Aided Privacy Preserving-Authentication in VANETs.- Computational Analysis of a Power Distribution System with Petri Nets.- Analysis of Effect of Different Factors on Burst Dropping Probability in Optical Burst Switching Network.- An Optimization of Fundamental Frequency and Length of Syllables for Rule-Based Speech Synthesis.- Grid Smoothing for Image Enhancement.- Suppressing False Nagatives in Skin Segmentation.- Steady State Analysis of an Energy Efficient Mobility Management Scheme in IP-Based Wireless Networks.- Performance Comparison of Handoff Modes in Terms of Energy.- Energy Efficient Coexistence of WiFi and WiMAX Systems Sharing Frequency Band.- IP Mobility Performance Enhancement Using Link-Layer Prediction.- Header Compression for Resource and Energy Efficient IP over Tactical Data Link.- A Frequency-Based Algorithm for Workflow Outlier Mining.- A Framework to Describe and Search for Virtual Resource Objects.- Developer Toolkit for Embedded Fuzzy System Based on E-Fuzz.- A Quadsection Algorithm for Grammar-Based Image Compression.- Effective Storage Structure for Multi-version XML Documents.- An Ontology-Based Platform for Scientific Writing and Publishing.- Multi-facade and Ubiquitous Web Navigation and Access through Embedded Semantics.- New Format and Framework for Managing Scientific Knowledge.- A General Bayesian Network-Assisted Ensemble System for Context Prediction: An Emphasis on Location Prediction.- Bayesian Network Approach to Predict Mobile Churn Motivations: Emphasis on General Bayesian Network, Markov Blanket, and What-If Simulation.- Logical Mechanism for Allocating Resources to Exploitation and Exploration to Achieve Ambidexterity: Team Level Analysis.- Analyzing Economic Impact of Disruptive Technology Using Multi-Agent Simulation: Smart Payment Case.- Research on Mobile Payment Technology and Business Models in China under e-Commerce Environment.- Fusion of Gaussian Mixture Densities for Face and Ear Biometrics Using Support Vector Machines.- Benchmarking Query Complexity between RDB and OWL.- FEDTIC: A Security Design for Embedded Systems with Insecure External Memory.- Security, Software Engineering, Communication and Networking.- Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation.- End-to-End Security Methods for UDT Data Transmissions.- Evading Virus Detection Using Code Obfuscation.- High Flexible Sanitizing Signature Scheme Based on Bilinear Maps.- An Access Control Framework of Federated IPTV Providers for Mobile IPTV Services.- A Novel Scheme for PMIPv6 Based Wireless Sensor Network.- Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model.- A Privacy Preserving Service Broker Architecture for Data Sharing.- Checking the Paths to Identify Mutant Application on Embedded Systems.- Enhanced Sinkhole System by Improving Post-processing Mechanism.- A Practical Methodology and Framework for Comprehensive Incident Handling Focused on Bot Response.- Real Time Watermarking and Encryption Method for DMB Contents Protection.- A Study on Data Transmission Performance of Sensor Networks for Livestock Feedlot.- Development of an MPEG-4 Scene Converter for Rich Media Services in Mobile Environments.- Dynamic Profili

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책