Applied Computation and Security Systems

Volume Two

Nonfiction, Computers, Advanced Computing, Artificial Intelligence, Science & Nature, Technology, Electronics
Cover of the book Applied Computation and Security Systems by , Springer India
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9788132219880
Publisher: Springer India Publication: August 26, 2014
Imprint: Springer Language: English
Author:
ISBN: 9788132219880
Publisher: Springer India
Publication: August 26, 2014
Imprint: Springer
Language: English

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.

The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters.

Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on *Software Engineering *ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.

The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters.

Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on *Software Engineering *ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

More books from Springer India

Cover of the book Fundamentals of Invertebrate Palaeontology by
Cover of the book Governing India's Northeast by
Cover of the book Design of Canals by
Cover of the book Optimal Mixture Experiments by
Cover of the book Magnetic Perovskites by
Cover of the book Nature in Indian Philosophy and Cultural Traditions by
Cover of the book Proceedings of the International Conference on Research and Innovations in Mechanical Engineering by
Cover of the book Novel Combustion Concepts for Sustainable Energy Development by
Cover of the book R&D Management by
Cover of the book Connexins: The Gap Junction Proteins by
Cover of the book Breast Diseases by
Cover of the book The Tagore-Gandhi Debate on Matters of Truth and Untruth by
Cover of the book Biogeogens and Human Health by
Cover of the book Decision Processes by Using Bivariate Normal Quantile Pairs by
Cover of the book Mathematical Analysis and its Applications by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy