Advances in Computer Science and Information Technology

AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

  • Tai-hoon Kim
  • Hojjat Adeli

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6059)

Table of contents

  1. Front Matter
  2. Information Security and Assurance

    1. Nurzaini Mohamad Zain, Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail, Azizah Abdul Manaf
      Pages 1-14
    2. Moussa Ouedraogo, Haralambos Mouratidis, Eric Dubois, Djamel Khadraoui
      Pages 38-54
    3. Debnath Bhattacharyya, Arup Kumar Bhaumik, Minkyu Choi, Tai-hoon Kim
      Pages 61-69
    4. Pierre-Louis Cayrel, Mohammed Meziani
      Pages 82-99
    5. Bo Li, Jianxin Li, Tianyu Wo, Xudong Wu, Junaid Arshad, Wantao Liu
      Pages 115-128
    6. Neminath Hubballi, S Roopa, Ritesh Ratti, F. A. Barbhuiya, Santosh Biswas, Arijit Sur et al.
      Pages 129-142
    7. Huo-Chong Ling, Raphael C-W. Phan, Swee-Huay Heng
      Pages 143-149
  3. Advanced Communication and Networking

    1. Zhian Zheng, Dang Hai Pham, Tomohisa Wada
      Pages 150-158
    2. Seong-Yong Choi, Jin-Su Kim, Seung-Jin Han, Jun-Hyeog Choi, Kee-Wook Rim, Jung-Hyun Lee
      Pages 159-174
    3. Marek R. Ogiela, Urszula Ogiela
      Pages 175-182
    4. Zhiqiang Zhou, Lin Cong, Guohan Lu, Beixing Deng, Xing Li
      Pages 183-195
    5. Junghoon Lee, Cheol Min Kim
      Pages 196-202
    6. Md Amiruzzaman, Hassan Peyravi, M. Abdullah-Al-Wadud, Yoojin Chung
      Pages 203-213

About these proceedings


Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.


E-Governement ad hoc networks attacks biometrics classification clustering collaborative communication data hiding data mining energy efficiency graph matching information technology multimedia network measurement risk

Editors and affiliations

  • Tai-hoon Kim
    • 1
  • Hojjat Adeli
    • 2
  1. 1.Hannam UniversityDaejeonSouth Korea
  2. 2.The Ohio State UniversityColumbusUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-13576-7
  • Online ISBN 978-3-642-13577-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book