Advanced computing and systems for security. Volume Three /

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Scienc...

Full description

Saved in:
Bibliographic Details
Corporate Author: International Doctoral Symposium on Applied Computation and Security Systems
Other Authors: Chaki, Rituparna, (Editor), Saeed, Khalid (Computer scientist), (Editor), Cortesi, Agostino, 1963- (Editor), Chaki, Nabendu, (Editor)
Format: eBook
Language: English
Published: Singapore : Springer, [2017]
Series: Advances in intelligent systems and computing ; 567.
Subjects:
ISBN: 9789811034091
9789811033919
9789811034084
Physical Description: 1 online resource (xiii, 197 pages) : color illustrations

Cover

Table of contents

LEADER 07000cam a2200565Ii 4500
001 99889
003 CZ-ZlUTB
005 20240914112329.0
006 m o d
007 cr cnu|||unuuu
008 170314s2017 si a ob 101 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d GW5XE  |d EBLCP  |d IDEBK  |d YDX  |d OCLCF  |d AZU  |d IOG  |d UPM  |d ESU  |d JBG  |d IAD  |d ICW  |d ICN  |d VT2  |d OTZ  |d OCLCQ  |d NAM  |d U3W  |d OCLCA  |d CAUOI  |d KSU  |d AU@  |d OCLCQ  |d WYU  |d AUD  |d UKMGB  |d OCLCQ  |d ERF  |d UKBTH  |d OCLCQ 
020 |a 9789811034091  |q (electronic bk.) 
020 |a 9789811033919 
020 |z 9789811034084 
024 7 |a 10.1007/978-981-10-3409-1  |2 doi 
035 |a (OCoLC)975486974  |z (OCoLC)975892587  |z (OCoLC)975924318  |z (OCoLC)976164428  |z (OCoLC)976165501  |z (OCoLC)976296053  |z (OCoLC)976326294  |z (OCoLC)976397059  |z (OCoLC)978469982  |z (OCoLC)978481093  |z (OCoLC)978746051  |z (OCoLC)978747613  |z (OCoLC)979073424  |z (OCoLC)979113517  |z (OCoLC)979280736  |z (OCoLC)979338322  |z (OCoLC)979477832  |z (OCoLC)979521252  |z (OCoLC)981993887  |z (OCoLC)982014019  |z (OCoLC)984882872  |z (OCoLC)985343917  |z (OCoLC)999412910  |z (OCoLC)1005794841  |z (OCoLC)1011908507  |z (OCoLC)1048172554  |z (OCoLC)1058337308  |z (OCoLC)1066479405  |z (OCoLC)1066528997  |z (OCoLC)1086426571  |z (OCoLC)1112550651  |z (OCoLC)1113097188  |z (OCoLC)1113448294  |z (OCoLC)1127213410 
245 0 0 |a Advanced computing and systems for security.  |n Volume Three /  |c Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki, editors. 
264 1 |a Singapore :  |b Springer,  |c [2017] 
300 |a 1 online resource (xiii, 197 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Advances in intelligent systems and computing ;  |v 567 
504 |a Includes bibliographical references and index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India. 
505 0 |a Preface; About the Book; Contents; About the Editors; Algorithms; 1 A Heuristic Framework for Priority Based Nurse Scheduling; Abstract; 1 Introduction; 2 Bibliographic Survey; 2.1 Integer Programming Model; 2.2 Satisfiablity Model; 2.3 Meta-Heuristic Search Techniques; 3 Open Issues; 3.1 Identification of the Parameters to be Used for Long-Term Scheduling of Nurses; 3.2 Decision Support System (DSS) in Making Dynamic or Flexible Scheduling; 4 Description of the Heuristic Method for Nurse Assignment in the Remote Centre; 4.1 Methodology; 4.2 Flow Diagram of the Proposed Framework. 
505 8 |a 4.3 Experimental Results5 Conclusion; References; 2 A Divide-and-Conquer Algorithm for All Spanning Tree Generation; Abstract; 1 Introduction; 2 Literature Survey; 3 Existing Techniques for All Spanning Tree Generation; 3.1 Trees by Test and Select Method; 3.2 Elementary Tree Transformation Method; 3.3 Successive Reduction Method; 4 The New Algorithm (DCC_Trees); 4.1 Selection of a Reference Vertex and Elimination of Its Pendant Edges; 4.2 Divide: Decomposition of the Graph; 4.3 Conquer: Searching for Connectors; 4.4 Combine: Forming the Trees; 4.5 Rejoining the Pendant Edges. 
505 8 |a 4.6 Algorithm DCC_Trees4.7 Data Structures and Complexity Issues; 4.8 Salient Features of DCC_Trees; 5 Experimental Results; 6 Applications; 7 Conclusion; References; Circuit Synthesis of Marked Clique Problem using Quantum Walk; 1 Introduction; 2 Background; 2.1 Discrete Walk in Line; 2.2 Continuous Quantum Walk; 2.3 Discrete Quantum Walk in a Graph; 3 Algorithm for Finding the Marked Clique; 3.1 Steps for Finding Marked Clique Using Our Proposed Algorithm; 3.2 Calculation of the Degree; 3.3 Applying Hadamard Gate; 3.4 Starting Quantum Walk; 3.5 Checking Interconnection Between Vertices. 
505 8 |a 3.6 Getting the Clique3.7 Coin Operator on Marked List; 4 Analysis of the Circuit; 4.1 Applying Hadamard Gate; 4.2 Circuit for Different Coin States; 4.3 Interconnection Between Adjacent Vertices; 5 Simulation of Marked Clique Problem; 6 Circuit for General Graph; 7 Conclusion; References; 4 Abort-Free STM: A Non-blocking Concurrency Control Approach Using Software Transactional Memory; Abstract; 1 Introduction; 2 Proposed Abort Free STM; 2.1 Terminologies; 2.2 Basic Concepts; 2.3 Data Structure; 2.4 Opening Data Object; 2.5 Committing of Transactions; 2.6 Algorithm. 
505 8 |a 3 Making AFTM Abort Free: A Critical Analysis4 Performance Evaluation by Experiments; 4.1 Experimental Results with Increased Number of Write Transactions; 4.2 Experimental Results with Increased Transactions' Execution Time; 5 Concluding Remarks; References; Graph Problems Performance Comparison Using Intel Xeon and Intel Xeon-Phi; 1 Introduction; 2 Graph 500 Benchmark; 3 Betweenness Centrality Benchmark; 4 Experiments; 4.1 Experimental Setup; 5 Results; 6 Conclusion and Future Work; References; 6 A Novel Image Steganographic Scheme Using 8 \times 8 Sudoku Puzzle; Abstract; 1 Introduction. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Computer security  |v Congresses. 
650 0 |a Computers  |x Access control  |v Congresses. 
650 0 |a Computer science  |v Congresses. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Chaki, Rituparna,  |e editor. 
700 1 |a Saeed, Khalid  |c (Computer scientist),  |e editor. 
700 1 |a Cortesi, Agostino,  |d 1963-  |e editor. 
700 1 |a Chaki, Nabendu,  |e editor. 
711 2 |a International Doctoral Symposium on Applied Computation and Security Systems  |n (3rd :  |d 2016 :  |c Kolkata, India) 
776 0 8 |i Print version:  |t Advanced computing and systems for security. Volume Three.  |d Singapore : Springer, [2017]  |z 9811034087  |z 9789811034084  |w (OCoLC)962889348 
830 0 |a Advances in intelligent systems and computing ;  |v 567. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-981-10-3391-9  |y Plný text 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-981-10-3409-1  |y Plný text 
992 |c NTK-SpringerENG 
999 |c 99889  |d 99889 
993 |x NEPOSILAT  |y EIZ