Advanced computing and systems for security. Volume Three /
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Scienc...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , , , |
Format: | eBook |
Language: | English |
Published: |
Singapore :
Springer,
[2017]
|
Series: | Advances in intelligent systems and computing ;
567. |
Subjects: | |
ISBN: | 9789811034091 9789811033919 9789811034084 |
Physical Description: | 1 online resource (xiii, 197 pages) : color illustrations |
LEADER | 07000cam a2200565Ii 4500 | ||
---|---|---|---|
001 | 99889 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112329.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 170314s2017 si a ob 101 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d GW5XE |d EBLCP |d IDEBK |d YDX |d OCLCF |d AZU |d IOG |d UPM |d ESU |d JBG |d IAD |d ICW |d ICN |d VT2 |d OTZ |d OCLCQ |d NAM |d U3W |d OCLCA |d CAUOI |d KSU |d AU@ |d OCLCQ |d WYU |d AUD |d UKMGB |d OCLCQ |d ERF |d UKBTH |d OCLCQ | ||
020 | |a 9789811034091 |q (electronic bk.) | ||
020 | |a 9789811033919 | ||
020 | |z 9789811034084 | ||
024 | 7 | |a 10.1007/978-981-10-3409-1 |2 doi | |
035 | |a (OCoLC)975486974 |z (OCoLC)975892587 |z (OCoLC)975924318 |z (OCoLC)976164428 |z (OCoLC)976165501 |z (OCoLC)976296053 |z (OCoLC)976326294 |z (OCoLC)976397059 |z (OCoLC)978469982 |z (OCoLC)978481093 |z (OCoLC)978746051 |z (OCoLC)978747613 |z (OCoLC)979073424 |z (OCoLC)979113517 |z (OCoLC)979280736 |z (OCoLC)979338322 |z (OCoLC)979477832 |z (OCoLC)979521252 |z (OCoLC)981993887 |z (OCoLC)982014019 |z (OCoLC)984882872 |z (OCoLC)985343917 |z (OCoLC)999412910 |z (OCoLC)1005794841 |z (OCoLC)1011908507 |z (OCoLC)1048172554 |z (OCoLC)1058337308 |z (OCoLC)1066479405 |z (OCoLC)1066528997 |z (OCoLC)1086426571 |z (OCoLC)1112550651 |z (OCoLC)1113097188 |z (OCoLC)1113448294 |z (OCoLC)1127213410 | ||
245 | 0 | 0 | |a Advanced computing and systems for security. |n Volume Three / |c Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki, editors. |
264 | 1 | |a Singapore : |b Springer, |c [2017] | |
300 | |a 1 online resource (xiii, 197 pages) : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in intelligent systems and computing ; |v 567 | |
504 | |a Includes bibliographical references and index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India. | ||
505 | 0 | |a Preface; About the Book; Contents; About the Editors; Algorithms; 1 A Heuristic Framework for Priority Based Nurse Scheduling; Abstract; 1 Introduction; 2 Bibliographic Survey; 2.1 Integer Programming Model; 2.2 Satisfiablity Model; 2.3 Meta-Heuristic Search Techniques; 3 Open Issues; 3.1 Identification of the Parameters to be Used for Long-Term Scheduling of Nurses; 3.2 Decision Support System (DSS) in Making Dynamic or Flexible Scheduling; 4 Description of the Heuristic Method for Nurse Assignment in the Remote Centre; 4.1 Methodology; 4.2 Flow Diagram of the Proposed Framework. | |
505 | 8 | |a 4.3 Experimental Results5 Conclusion; References; 2 A Divide-and-Conquer Algorithm for All Spanning Tree Generation; Abstract; 1 Introduction; 2 Literature Survey; 3 Existing Techniques for All Spanning Tree Generation; 3.1 Trees by Test and Select Method; 3.2 Elementary Tree Transformation Method; 3.3 Successive Reduction Method; 4 The New Algorithm (DCC_Trees); 4.1 Selection of a Reference Vertex and Elimination of Its Pendant Edges; 4.2 Divide: Decomposition of the Graph; 4.3 Conquer: Searching for Connectors; 4.4 Combine: Forming the Trees; 4.5 Rejoining the Pendant Edges. | |
505 | 8 | |a 4.6 Algorithm DCC_Trees4.7 Data Structures and Complexity Issues; 4.8 Salient Features of DCC_Trees; 5 Experimental Results; 6 Applications; 7 Conclusion; References; Circuit Synthesis of Marked Clique Problem using Quantum Walk; 1 Introduction; 2 Background; 2.1 Discrete Walk in Line; 2.2 Continuous Quantum Walk; 2.3 Discrete Quantum Walk in a Graph; 3 Algorithm for Finding the Marked Clique; 3.1 Steps for Finding Marked Clique Using Our Proposed Algorithm; 3.2 Calculation of the Degree; 3.3 Applying Hadamard Gate; 3.4 Starting Quantum Walk; 3.5 Checking Interconnection Between Vertices. | |
505 | 8 | |a 3.6 Getting the Clique3.7 Coin Operator on Marked List; 4 Analysis of the Circuit; 4.1 Applying Hadamard Gate; 4.2 Circuit for Different Coin States; 4.3 Interconnection Between Adjacent Vertices; 5 Simulation of Marked Clique Problem; 6 Circuit for General Graph; 7 Conclusion; References; 4 Abort-Free STM: A Non-blocking Concurrency Control Approach Using Software Transactional Memory; Abstract; 1 Introduction; 2 Proposed Abort Free STM; 2.1 Terminologies; 2.2 Basic Concepts; 2.3 Data Structure; 2.4 Opening Data Object; 2.5 Committing of Transactions; 2.6 Algorithm. | |
505 | 8 | |a 3 Making AFTM Abort Free: A Critical Analysis4 Performance Evaluation by Experiments; 4.1 Experimental Results with Increased Number of Write Transactions; 4.2 Experimental Results with Increased Transactions' Execution Time; 5 Concluding Remarks; References; Graph Problems Performance Comparison Using Intel Xeon and Intel Xeon-Phi; 1 Introduction; 2 Graph 500 Benchmark; 3 Betweenness Centrality Benchmark; 4 Experiments; 4.1 Experimental Setup; 5 Results; 6 Conclusion and Future Work; References; 6 A Novel Image Steganographic Scheme Using 8 \times 8 Sudoku Puzzle; Abstract; 1 Introduction. | |
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Computers |x Access control |v Congresses. | |
650 | 0 | |a Computer science |v Congresses. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Chaki, Rituparna, |e editor. | |
700 | 1 | |a Saeed, Khalid |c (Computer scientist), |e editor. | |
700 | 1 | |a Cortesi, Agostino, |d 1963- |e editor. | |
700 | 1 | |a Chaki, Nabendu, |e editor. | |
711 | 2 | |a International Doctoral Symposium on Applied Computation and Security Systems |n (3rd : |d 2016 : |c Kolkata, India) | |
776 | 0 | 8 | |i Print version: |t Advanced computing and systems for security. Volume Three. |d Singapore : Springer, [2017] |z 9811034087 |z 9789811034084 |w (OCoLC)962889348 |
830 | 0 | |a Advances in intelligent systems and computing ; |v 567. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-981-10-3391-9 |y Plný text |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-981-10-3409-1 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 99889 |d 99889 | ||
993 | |x NEPOSILAT |y EIZ |