Information Technology Convergence, Secure and Trust Computing, and Data Management

ITCS 2012 & STA 2012

ISBN: 978-94-007-5082-1 (Print) 978-94-007-5083-8 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages 1-23

  2. No Access

    Book Chapter

    Pages 1-8

    Implementing Business/IT Projects Alignment through the Project Portfolio Approval Process

  3. No Access

    Book Chapter

    Pages 9-14

    A Design of IoT Based Agricultural Zone Management System

  4. No Access

    Book Chapter

    Pages 15-20

    A Design of Plant Factory Environment Control System

  5. No Access

    Book Chapter

    Pages 21-27

    A Study on Ubiquitous Business Process Management for Real-Time Open USN Mash-Up Services

  6. No Access

    Book Chapter

    Pages 29-34

    Adaptive Auto Bias Control in Wireless Communication Systems

  7. No Access

    Book Chapter

    Pages 35-40

    Comparison of Temperature in the Deep Part of the Dummy by the Electronic Moxibustion and the Gu-Gwan Moxibustion

  8. No Access

    Book Chapter

    Pages 41-46

    Wound Healing Effect by 633 nm Wavelength Using LED Irradiator

  9. No Access

    Book Chapter

    Pages 47-53

    Development and Evaluation of an In-Vehicle Haptic Navigation System

  10. No Access

    Book Chapter

    Pages 55-61

    Modeling of Energy Consumption for K-Coverage in Wireless Sensor Networks

  11. No Access

    Book Chapter

    Pages 63-70

    Natural Language Processing for Modeling Stable Writing Characteristics of Users

  12. No Access

    Book Chapter

    Pages 71-78

    Electronic Cane Usability for Visually Impaired People

  13. No Access

    Book Chapter

    Pages 79-86

    Solving Traffic Assignment Problem by an Improved Particle Swarm Optimization and a Segmented Impedance Function

  14. No Access

    Book Chapter

    Pages 87-93

    3D Reconstruction for Internal Organs Based on Improved Gray-Coded Structured Light

  15. No Access

    Book Chapter

    Pages 95-102

    Adaptive Resource Control Strategy over Cognitive Networks for Multimedia Services

  16. No Access

    Book Chapter

    Pages 103-117

    Towards a Trusted Vehicular Routing in VANET

  17. No Access

    Book Chapter

    Pages 119-126

    Forensic Analysis of Digsby Log Data to Trace Suspected User Activities

  18. No Access

    Book Chapter

    Pages 127-133

    SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems

  19. No Access

    Book Chapter

    Pages 135-143

    Data Consistency for Self-acting Load Balancing of Parallel File System

  20. No Access

    Book Chapter

    Pages 145-153

    Isomorphism Classes of Jacobi Quartic Curve over Finite Fields

  21. No Access

    Book Chapter

    Pages 155-162

    Fingerprinting Data Based on Secret Mask

previous Page of 2