000724653 000__ 05596cam\a2200565Ii\4500 000724653 001__ 724653 000724653 005__ 20230306140544.0 000724653 006__ m\\\\\o\\d\\\\\\\\ 000724653 007__ cr\cn\nnnunnun 000724653 008__ 141203t20142015gw\\\\\\o\\\\\100\0\eng\d 000724653 019__ $$a908088941 000724653 020__ $$a9783662454022$$qelectronic book 000724653 020__ $$a3662454025$$qelectronic book 000724653 020__ $$z9783662454015 000724653 035__ $$aSP(OCoLC)ocn897377253 000724653 035__ $$aSP(OCoLC)897377253$$z(OCoLC)908088941 000724653 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dYDXCP$$dGW5XE$$dOCLCF$$dIDEBK$$dEBLCP 000724653 049__ $$aISEA 000724653 050_4 $$aQA76.9.C643 000724653 08204 $$a004.22$$223 000724653 24500 $$aComputer science and its applications$$h[electronic resource] :$$bubiquitous information technologies /$$cJames J. (Jong Hyuk) Park, Ivan Stojmenovic, Hwa Young Jeong, Gangman Yi, editors. 000724653 264_1 $$aHeidelberg :$$bSpringer,$$c[2014] 000724653 264_4 $$c©2015 000724653 300__ $$a1 online resource. 000724653 336__ $$atext$$btxt$$2rdacontent 000724653 337__ $$acomputer$$bc$$2rdamedia 000724653 338__ $$aonline resource$$bcr$$2rdacarrier 000724653 4901_ $$aLecture notes in electrical engineering ;$$v330 000724653 5050_ $$aOrganization; Contents; Maneuvering Target Tracking Algorithm for Adaptive Estimation on Measurement Noise Variance Matrix; 1 Introduction; 2 The "Current" Statistical Model of Adaptive Filtering Algorithm; 3 An Adaptive Estimation Based on the Innovation Adjustment; 4 Simulation Results and Analysis; 5 Conclusion; References; Performance of a Hybrid DCT SVD Visually Imperceptible Digital Watermarking against Signal Processing Attacks; 1 Introduction; 2 Literature Review; 3 Proposed DCT-SVD Watermarking Method; 4 Simulation Results; 5 Conclusions; References 000724653 5058_ $$aA Simplified Hybrid Navigation System Design of a Mobile Robot Using Kalman Filter1 Introduction; 2 Development of Hybrid Navigation System; 3 Result; 4 Conclusion; References; Proposal for Easily Detachable Proxy for Personal Information Leakage Detection; 1 Introduction; 2 Design of Proposed Method; 3 Implementation of Proposed Method; 4 Evaluation of Proposed Method; 5 Related Work; 6 Conclusion; References; Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart Devices; 1 Introduction; 2 Adaptive Transformation Engine (ATE); 3 ATE-Enabled Remote Home Control Service 000724653 5058_ $$a4 Implementation and Result5 Conclusions; References; The Improved 16th-Order Differential Attack on 10- Round Variant of Block Cipher PRESENT; 1 Introduction; 2 Specification Outline of PRESENT; 3 The 16th-Order Differential Property and Attack Equation; 4 Conclusions; References; Implementation of Stereo Camera Module for Hand Gesture Recognition; 1 Introduction; 2 Stereo Camera Module Design and Implementation; 3 Implementation of Hand Gesture Recognition; 4 Control of the Mouse Cursor; 5 Conclusion; References; Social Network Recommendation Based on Hybrid Suffix Tree Clustering 000724653 5058_ $$a1 Introduction2 STC Based Hybrid Clustering Algorithm Structure; 3 Hybrid STC Based Social Network Recommendation; 4 Evaluation Experiment and Analysis; 5 Conclusion; References; A Reputation-Based Adaptive Trust Management System for Vehicular Clouds; 1 Introduction; 2 Related Works; 3 RA-VTrust System; 4 Performance Evaluation; 5 Conclusion; References; Semi-automatic Construction of a Named Entity Dictionary Based on Active Learning; 1 Introduction; 2 Semi-automatic Construction of a Named Entity Dictionary; 3 Experiments; 4 Conclusion; References 000724653 5058_ $$aResearch on Privacy Protection of WHOIS Information in DNS1 Introduction; 2 WHOIS Protocol; 3 WHOIS Privacy Collection; 4 WHOIS Privacy Protection; 5 The Experimental Results; 6 Conclusion; References; Fuzzy Logic-Driven Resource Evaluation Method for Automated Negotiation with Resource Allocation in Distributed Environment; 1 Introduction; 2 Related Works; 3 Fuzzy-Based Distributed Resource Allocation Management; 4 Simulation; 5 Conclusion; References; ERAGHC: Enhanced Reliable Authenticated Group Head Communication; 1 Introduction; 2 Literature Survey; 3 Design and Topology 000724653 506__ $$aAccess limited to authorized users. 000724653 520__ $$aThe 6th FTRA International Conference on Computer Science and its Applications (CSA-14) will be held in Guam, USA, Dec. 17 - 19, 2014. CSA-14 presents a comprehensive conference focused on the various aspects of advances in engineering systems in computer science, and applications, including ubiquitous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application. 000724653 650_0 $$aComputer science. 000724653 650_0 $$aComputer network architectures. 000724653 650_0 $$aSoftware engineering. 000724653 650_0 $$aManagement information systems. 000724653 7001_ $$aPark, James J.,$$eauthor. 000724653 7001_ $$aStojmenović, Ivan,$$eeditor. 000724653 7001_ $$aJeong, Hwa-Young,$$eeditor. 000724653 7001_ $$aYi, Gangman,$$eeditor. 000724653 7112_ $$aInternational Conference on Computer Science and Its Applications$$n(6th :$$d2014 :$$cGuam) 000724653 77608 $$iPrint version:$$aPark, James J. (Jong Hyuk)$$tComputer Science and its Applications : Ubiquitous Information Technologies$$dBerlin, Heidelberg : Springer Berlin Heidelberg,c2014$$z9783662454015 000724653 830_0 $$aLecture notes in electrical engineering ;$$v330. 000724653 852__ $$bebk 000724653 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-45402-2$$zOnline Access$$91397441.1 000724653 909CO $$ooai:library.usi.edu:724653$$pGLOBAL_SET 000724653 980__ $$aEBOOK 000724653 980__ $$aBIB 000724653 982__ $$aEbook 000724653 983__ $$aOnline 000724653 994__ $$a92$$bISE