Applied Computation and Security Systems

Volume One

Nonfiction, Computers, Advanced Computing, Artificial Intelligence, Science & Nature, Technology, Electronics
Cover of the book Applied Computation and Security Systems by , Springer India
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9788132219859
Publisher: Springer India Publication: August 22, 2014
Imprint: Springer Language: English
Author:
ISBN: 9788132219859
Publisher: Springer India
Publication: August 22, 2014
Imprint: Springer
Language: English

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different Parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different Parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

More books from Springer India

Cover of the book Psycho-Social Analysis of the Indian Mindset by
Cover of the book Phase Transformation of Kaolinite Clay by
Cover of the book Disaster Education and Management by
Cover of the book Anatomy of Global Stock Market Crashes by
Cover of the book Advanced Computing and Systems for Security by
Cover of the book ZnO Nanocrystals and Allied Materials by
Cover of the book Financial Management Practices by
Cover of the book Network Performance and Fault Analytics for LTE Wireless Service Providers by
Cover of the book Applied Geoinformatics for Sustainable Integrated Land and Water Resources Management (ILWRM) in the Brahmaputra River basin by
Cover of the book Cities and Sustainability by
Cover of the book Indian Skilled Migration and Development by
Cover of the book Biology of C Reactive Protein in Health and Disease by
Cover of the book The Electronic Nose: Artificial Olfaction Technology by
Cover of the book An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks by
Cover of the book Mathematical Analysis and its Applications by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy