Applied Computation and Security Systems

Volume One

Nonfiction, Computers, Advanced Computing, Artificial Intelligence, Science & Nature, Technology, Electronics
Cover of the book Applied Computation and Security Systems by , Springer India
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9788132219859
Publisher: Springer India Publication: August 22, 2014
Imprint: Springer Language: English
Author:
ISBN: 9788132219859
Publisher: Springer India
Publication: August 22, 2014
Imprint: Springer
Language: English

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different Parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different Parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

More books from Springer India

Cover of the book Enabling Environment by
Cover of the book Proceedings of the Second International Conference on Computer and Communication Technologies by
Cover of the book Psycho-Social Analysis of the Indian Mindset by
Cover of the book Low-Power VLSI Circuits and Systems by
Cover of the book Biomonitoring of Water and Waste Water by
Cover of the book Principles and Practice of Lacrimal Surgery by
Cover of the book Plant Microbe Symbiosis: Fundamentals and Advances by
Cover of the book Power Electronics and Renewable Energy Systems by
Cover of the book Efficiency of Elementary Education in India by
Cover of the book New Horizons in Insect Science: Towards Sustainable Pest Management by
Cover of the book Applied Mathematics by
Cover of the book Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012) by
Cover of the book Globalization and Standards by
Cover of the book An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks by
Cover of the book Chromosome Structure and Aberrations by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy