- ISBN: 9780849314902 | 0849314909
- Cover: Nonspecific Binding
- Copyright: 10/30/2002
Plenary Talks | |
Gradient-Based Learning and Optimization | p. 3 |
Stochastic Fluid Models for Communication Networks | p. 8 |
Stochastic Process Algebra, Reversed Processes and Product Forms | p. 12 |
Static Scheduling Strategies for Heterogeneous Systems | p. 18 |
Advanced Networking Hardware | |
Towards 10-100 Gbps Cryptographic Architectures | p. 25 |
Integrated Photonic Devices for Optical and Wireless Networking | p. 31 |
Splintering TCP | p. 36 |
Network Processors: Origin of Species | p. 41 |
Multimedia Technology | |
Automatic Generation of Motion Activity Descriptors in Video Sequences | p. 49 |
ETCP: An Efficacy-Oriented Transport Protocol for Point-to-Point Connections | p. 54 |
Buffer Management for Periodic Broadcast Servers | p. 59 |
A Formal Treatment of the Sampling-Based Approach to Managing Image Databases | p. 64 |
Image Processing I | |
Measuring Female Facial Beauty by Calculating the Proportions of the Face | p. 71 |
Appearance Reconstruction of Three Dimensional Models from Real Images | p. 76 |
Texture Segmentation by Using Adaptive Polyphase Subband Decomposition | p. 81 |
Multiscale Image Representation Using Switched Codebook Predictive Vector Quantization | p. 86 |
Computer Networks I | |
A Parallel Algorithm for Global Optimisation and Semi-Infinite Programming | p. 93 |
Logical Performance of the Optical Packet Metropolitan Ring Architecture | p. 98 |
Packet Selection in a Deflection Routing Algorithm | p. 103 |
Geometrically Batched Networks | p. 108 |
Algorithms | |
A Polynomial-Time Algorithm for Allocating Independent Tasks on Heterogeneous Fork-Graphs | p. 115 |
An Experimental Evaluation of Modified Algorithms for the Graph Partitioning Problem | p. 120 |
Bottleneck Perfect Domination on Some Classes of Graphs | p. 125 |
Concept of and Experiments on Combining Compression with Encryption | p. 130 |
Computer Graphics | |
Honeycomb Subdivision | p. 137 |
A New Image-Based Lighting Method: Practical Shadow-Based Light Reconstruction | p. 142 |
Interactive Deformation with Triangles | p. 147 |
Marker Mapping Techniques for Augmented Reality Visualization | p. 152 |
Coding and Wireless Communication | |
Resource Allocation for an Enterprise Mobile Services Platform | p. 159 |
Wireless MAC Protocols Supporting Real-Time Services in Wireless LANs | p. 164 |
The Role of Error Control Coding in Joint Detection CDMA | p. 169 |
Sensivity to Timing Errors in EGC and MRC Techniques | p. 174 |
Artificial Intelligence | |
Visualizing Transition Diagrams of Action Language Programs | p. 181 |
Turkish Natural Language Interface: CEVAPVER | p. 187 |
A Machine Translation System between a Pair of Closely Related Languages | p. 192 |
An Intelligent System Dealing with Nuanced Information | p. 197 |
Image Processing II | |
Robust Rotation Estimation from Three Orthogonally Oriented Cameras | p. 205 |
Computer Vision-Based Unistroke Keyboards | p. 210 |
Camera Auto-Calibration Using a Sequence of 2D Images with Small Rotations and Translations | p. 215 |
Biometric Security System Design Using Keystroke Rhythms Algorithm | p. 220 |
Evolutionary Computation | |
Evolutionary Computation: Current Research and Open Issues | p. 227 |
Mixing of Building Blocks and Single-Point Crossover | p. 232 |
Solution Stability in Evolutionary Computation | p. 237 |
A Comparison of Haploidy and Diploidy without Dominance on Integer Representations | p. 242 |
Computer Networks II | |
Control of Lightpaths in Heterogeneous Optical Networks | p. 249 |
The Link-Orientation Problem on Several Practical Networks | p. 254 |
Peer-to-Peer Cooperative Driving | p. 259 |
Fairness in Differentiated Services Architecture | p. 264 |
Databases | |
Exploiting Semantic Constraints in a Database Browser | p. 271 |
Dispatching Java Agents to User for Data Extraction from Third Party Web Sites | p. 276 |
Incremental Maintenance of Object-Oriented Views in Data Warehouses | p. 281 |
Cortex-Based Mechanism for Discovery of High-Order Features | p. 286 |
Graph Theory | |
Maximum Alliance-Free and Minimum Alliance-Cover Sets | p. 293 |
Offensive Alliances in Graphs | p. 298 |
Global Defensive Alliances | p. 303 |
Introduction to Alliances in Graphs | p. 308 |
Computer Networks III | |
Case-Based Agents for Packet-Level Intrusion Detection in Ad Hoc Networks | p. 315 |
A Routing Solution for a Global, Space-Based Multimedia System | p. 321 |
Design and Implementation of Smart Packet Processor for the Cognitive Packet Network Router | p. 327 |
Dynamic Shortest Path Routing in 2-Circulants | p. 332 |
Software Engineering | |
Measuring the Size of Object-Oriented Software Applications | p. 339 |
Net Class: A Multilingual, Web-Based Learning Management Tool | p. 344 |
How Human Factors Impact on Software Process Maturity | p. 349 |
A Mathematical Formalism for Specifying Design Patterns | p. 354 |
New Issues in Networking | |
A New Wireless Archtecture for QoS, Security and Mobility | p. 361 |
Bandwidth Allocation in Bluetooth Scatternets | p. 367 |
Mobility and Multicast: Protocol Design and Analysis | p. 372 |
Performance Modeling of an Edge Optical Burst Switching Node | p. 377 |
Web-Based Simulation | |
Educational Application of an Online Context Sensitive Speech Dictionary | p. 385 |
Using Computer Simulation to Optimize the Operations for an Automotive Manufacturing Facility | p. 390 |
A Web-Based Framework with Experimental Design Approach to Simulation Optimization | p. 394 |
Evaluation of the Adaptivity of a Continuous Review Inventory Control Model | p. 399 |
Software Performance Engineering | |
Performance Engineering Based on UML and SPNs: A Software Performance Tool | p. 405 |
Extending Mascot to a Component-Based Software Performance Engineering Methodology | p. 410 |
Qualitative and Quantitative Evaluation Using Process Algebra | p. 415 |
Modeling Nodes of Communication Networks at the Bit and Packet Levels | p. 419 |
Author Index | p. 425 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.