<p>Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researc
Advanced Computer Science and Information Technology: Second International Conference, AST 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings
โ Scribed by Takafumi Fukunaga (auth.), G. S. Tomar, Ruay-Shiung Chang, Osvaldo Gervasi, Tai-hoon Kim, Samir Kumar Bandyopadhyay (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2010
- Tongue
- English
- Leaves
- 204
- Series
- Communications in Computer and Information Science 74
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.
โฆ Table of Contents
Front Matter....Pages -
Parallel Processing Performance on Multi-Core PC Cluster Distributing Communication Load to Multiple Paths....Pages 1-11
Modeling Real-Time Applications with Reusable Design Patterns....Pages 12-25
Optimal Total Exchange in Anonymous Cayley Graphs....Pages 26-31
A Variant of Naor-Pinkas Oblivious Transfer for More Efficient Authentication....Pages 32-38
Wireless Network of Collaborative Physiological Signal Devices in a U-Healthcare System....Pages 39-55
An Encryption Scheme for Communication Internet SCADA Components....Pages 56-64
Context-Aware Based Efficient Training System Using Augmented Reality and Gravity Sensor for Healthcare Services....Pages 65-71
XMDR-DAI Based on GQBP and LQBP for Business Process....Pages 72-85
Dynamic Relation Management of Hierarchical Data for Interoperability in Distributed Environments....Pages 86-100
Change-Point Modeling with an Environmental Factor for Software Reliability Assessment and Its Application....Pages 101-112
Reliability Analysis and Optimal Release Problem Considering Maintenance Time of Software Components for an Embedded OSS Porting Phase....Pages 113-124
Optimal Policies for Random and Periodic Garbage Collections with Tenuring Threshold....Pages 125-135
Optimal Checking Times of Backup Operation for a Database System....Pages 136-144
Comparison of Aperiodic Checkpoint Placement Algorithms....Pages 145-156
Comparative Study of Simulated Annealing Algorithms for Optimal Arrangement Problems in a Linear Consecutive- k -out-of- n : F System....Pages 157-168
Tracing Stopping Point for Remaining Distance through Multi Brake Modeling in the ATO....Pages 169-178
A Study on Automated Context-aware Access Control Model Using Ontology....Pages 179-186
Ontology Based Intelligent Monitoring-Control System....Pages 187-194
Back Matter....Pages -
โฆ Subjects
Algorithm Analysis and Problem Complexity; Computer Communication Networks; Software Engineering; Information Systems Applications (incl.Internet); Artificial Intelligence (incl. Robotics); Computation by Abstract Devices
๐ SIMILAR VOLUMES
<p>Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researc
<p>Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researc
This volume constitutes the refereed proceedings of the International Conference on Ubiquitous Computing and Multimedia Applications, UCMA 2010, held in Miyazaki, Japan, in June 2010. The 14 revised full papers presented in this volume were carefully reviewed and selected from 150 submissions. T
<p>Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researc