Computer Science and its Applications

CSA 2012

Editors:

ISBN: 978-94-007-5698-4 (Print) 978-94-007-5699-1 (Online)

Table of contents (98 chapters)

previous Page of 5
  1. Front Matter

    Pages i-xxvi

  2. Computer Science and its Applications

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-12

      Utilizing TPM Functionalities on Remote Server

    3. No Access

      Book Chapter

      Pages 13-21

      Security and QoS relationships in Mobile Platforms

    4. No Access

      Book Chapter

      Pages 23-28

      A Hybrid Natural Computing Approach for the VRP Problem Based on PSO, GA and Quantum Computation

    5. No Access

      Book Chapter

      Pages 29-37

      Finger Triggered Virtual Musical Instruments

    6. No Access

      Book Chapter

      Pages 39-47

      A Low Complexity Multi-Layered Space Frequency Coding Detection Algorithm for MIMO-OFDM

    7. No Access

      Book Chapter

      Pages 49-57

      Dynamic Transmit Antenna Shuffling Scheme for MIMO Wireless Communication Systems

    8. No Access

      Book Chapter

      Pages 59-67

      A Low Complexity V-BLAST/STBC Detection Algorithm for MIMO System

    9. No Access

      Book Chapter

      Pages 69-78

      A Grid-Based Cloaking Scheme for Continuous Location-Based Services in Distributed Systems

    10. No Access

      Book Chapter

      Pages 79-85

      Occluded and Low Resolution Face Detection with Hierarchical Deformable Model

    11. No Access

      Book Chapter

      Pages 87-96

      Negotiated Economic Grid Brokering for Quality of Service

    12. No Access

      Book Chapter

      Pages 97-105

      Differential Fault Analysis on HAS-160 Compression Function

    13. No Access

      Book Chapter

      Pages 107-119

      A New Energy-Efficient Routing Protocol Based on Clusters for Wireless Sensor Networks

    14. No Access

      Book Chapter

      Pages 121-128

      MIDI-to-Singing Online Karaoke for English M-Learning

    15. No Access

      Book Chapter

      Pages 129-138

      A New Cloaking Method Based on Weighted Adjacency Graph for Preserving User Location Privacy in LBS

    16. No Access

      Book Chapter

      Pages 139-147

      Simulation Videos for Understanding Occlusion Effects on Kernel Based Object Tracking

    17. No Access

      Book Chapter

      Pages 149-157

      Originator Recognition (or) Path Recovery Mechanism for Load-Based Routing Protocol

    18. No Access

      Book Chapter

      Pages 159-167

      Analysis of Correlation Peak Position Modulation

    19. No Access

      Book Chapter

      Pages 169-177

      Simulation Study on Distribution of Control Points for Aerial Images Rectification

    20. No Access

      Book Chapter

      Pages 179-187

      A Secure Image Watermarking Using Visual Cryptography

    21. No Access

      Book Chapter

      Pages 189-196

      Bit Error Rate Analysis of Partial Packets in Ad hoc Wireless Networks

previous Page of 5