Applied Computation and Security Systems

Volume Two

Nonfiction, Computers, Advanced Computing, Artificial Intelligence, Science & Nature, Technology, Electronics
Cover of the book Applied Computation and Security Systems by , Springer India
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9788132219880
Publisher: Springer India Publication: August 26, 2014
Imprint: Springer Language: English
Author:
ISBN: 9788132219880
Publisher: Springer India
Publication: August 26, 2014
Imprint: Springer
Language: English

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.

The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters.

Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on *Software Engineering *ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.

The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters.

Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on *Software Engineering *ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

More books from Springer India

Cover of the book Women’s Political Participation in Bangladesh by
Cover of the book Indian Skilled Migration and Development by
Cover of the book Plant Growth Promoting Rhizobacteria for Horticultural Crop Protection by
Cover of the book Proceedings of the International Conference on Transformations in Engineering Education by
Cover of the book Aquatic Ecosystem: Biodiversity, Ecology and Conservation by
Cover of the book Laser Physics and Technology by
Cover of the book Proceedings of Ninth International Conference on Wireless Communication and Sensor Networks by
Cover of the book Measures of Positive Psychology by
Cover of the book Nanoscale and Microscale Phenomena by
Cover of the book Energy Security and Development by
Cover of the book A Practical Approach to Cognitive Behaviour Therapy for Adolescents by
Cover of the book Infectious Diseases and Nanomedicine II by
Cover of the book Benchmarking for Performance Evaluation by
Cover of the book Multimedia Processing, Communication and Computing Applications by
Cover of the book Advanced Computing and Systems for Security by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy