Proceedings of the 2012 International Conference on Information Technology and Software Engineering

Information Technology

Editors:

ISBN: 978-3-642-34527-2 (Print) 978-3-642-34528-9 (Online)

Table of contents (103 chapters)

previous Page of 6
  1. Front Matter

    Pages i-xviii

  2. No Access

    Book Chapter

    Pages 1-12

    Generalized Graph Regularized Non-negative Matrix Factorization for Data Representation

  3. No Access

    Book Chapter

    Pages 13-21

    Research on Conformal Phased Array Antenna Pattern Synthesis

  4. No Access

    Book Chapter

    Pages 23-31

    Research on the Optimization of Wireless Sensor Network Localization Based on Real-Time Estimation

  5. No Access

    Book Chapter

    Pages 33-40

    Process Calculus for Cost Analysis of Process Creation

  6. No Access

    Book Chapter

    Pages 41-48

    Parameter Estimation of LFM Signal by Direct and Spline Interpolation Based on FrFT

  7. No Access

    Book Chapter

    Pages 49-56

    An Analysis Method for Network Status of Open-Pit WLAN Based on Latency Time

  8. No Access

    Book Chapter

    Pages 57-65

    Multi-Source Scheme for Reprogramming in Wireless Sensor Networks

  9. No Access

    Book Chapter

    Pages 67-74

    Study on Industrial Cluster Knowledge Emergence Model Based on Asymmetric Influence

  10. No Access

    Book Chapter

    Pages 75-85

    Study and Optimization of FIR Filters Based on FPGA

  11. No Access

    Book Chapter

    Pages 87-97

    ES-VBF: An Energy Saving Routing Protocol

  12. No Access

    Book Chapter

    Pages 99-106

    The Enhancements of UE Mobility State Estimation in the Het-net of the LTE-A System

  13. No Access

    Book Chapter

    Pages 107-114

    Efficient Authentication Based on Orthogonality and Timeliness for Network Coding

  14. No Access

    Book Chapter

    Pages 115-123

    Modeling of Foreign Objects Debris Detection Radar on Airport Runway

  15. No Access

    Book Chapter

    Pages 125-134

    Min–Max Decoding for Non-Binary LDPC Codes

  16. No Access

    Book Chapter

    Pages 135-143

    A Security Attack Risk Assessment for Web Services Based on Data Schemas and Semantics

  17. No Access

    Book Chapter

    Pages 145-152

    Analysis and Modeling of Heterogeneity from Google Cluster Traces

  18. No Access

    Book Chapter

    Pages 153-164

    A String Approach for Updates in Order-Sensitive XML Data

  19. No Access

    Book Chapter

    Pages 165-172

    Fault Diagnosis of Nodes in WSN Based on Particle Swarm Optimization

  20. No Access

    Book Chapter

    Pages 173-181

    Beat Analysis Based on Autocorrelation Phase Matrix

  21. No Access

    Book Chapter

    Pages 183-189

    Improved Serially Concatenated Overlapped Multiplexing System and Performance

previous Page of 6