February 22, 2017

Advances in Computing, Communication, and Control: Third by Pankti Doshi, Vijay Raisinghani (auth.), Srija Unnikrishnan,

By Pankti Doshi, Vijay Raisinghani (auth.), Srija Unnikrishnan, Sunil Surve, Deepak Bhoir (eds.)

This booklet constitutes the refereed lawsuits of the 3rd foreign convention on Advances in Computing, verbal exchange and keep watch over, ICAC3 2013, held in Mumbai, India, in January 2013. The sixty nine papers offered during this quantity have been rigorously reviewed and chosen for inclusion within the publication. They take care of themes reminiscent of photo processing, synthetic intelligence, robotics, instant communications; information warehousing and mining, and are equipped in topical sections named: computing; conversation; keep watch over; and others.

Show description

Read or Download Advances in Computing, Communication, and Control: Third International Conference, ICAC3 2013, Mumbai, India, January 18-19, 2013. Proceedings PDF

Similar international books

BIS 2000: 4th International Conference on Business Information Systems, Poznań, Poland, 12–13 April 2000

This quantity comprises papers provided through the technological know-how hint on the 4th foreign convention of industrial details platforms, BIS 2000, held in Poznan, Poland, 12-13 April 2000, which mentioned the advance, implementation, purposes and development of desktops for company tactics.

Graphics Recognition. Achievements, Challenges, and Evolution: 8th International Workshop, GREC 2009, La Rochelle, France, July 22-23, 2009. Selected Papers

This publication comprises refereed and stronger papers awarded on the eighth IAPR Workshop on snap shots reputation (GREC 2009), held in los angeles Rochelle, France, July 22–23, 2009. The GREC workshops offer a great chance for researchersand practitionersat all degrees of expertise to satisfy colleaguesand to percentage new rules and information approximately portraits popularity tools.

Extra info for Advances in Computing, Communication, and Control: Third International Conference, ICAC3 2013, Mumbai, India, January 18-19, 2013. Proceedings

Example text

1 D´ej`a Vu: A User Study Using Images for Authentication [2] Using D´ej`a Vu, the user creates an image portfolio, by selecting a subset of p images out of a set of sample images. To authenticate the user, the system presents a challenge set, consisting of n images. This challenge contains m images out of the portfolio, remaining n - m images are decoy images. To authenticate, the user must correctly identify the images which are part of her portfolio. 2 Graphical Password Authentication Using Cued Click Points [5] It proposes and examines the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique.

International Journal of Computer Application 43, 7–12 (2012) 16. : From Market-driven e-Negotiation Agents to Market-driven G-Negotiation Agents. In: Proc. of the IEEE Int. Conf. on e-Technology, e-Commerce and e-Services, Hong Kong, pp. 408–413 (2005) 17. : Agent-based Cloud Commerce. In: Proc. IEEE Int. Conf. on Industrial Eng. and Eng. Management, Hong Kong, pp. 717–721 (2009) 18. V. com 2 Department of Computer Science & Engineering Sri Venkateswara University, Tirupati, India Abstract. Desktop grid is based on desktop computers owned and volunteered by individual users.

This sequence of routines becomes the user’s GRAF password. 3 GRAF Password Selection and Inputs Any real life example of virtual environment is considered. Here the chessboard example is taken as an example. The initial representation of user actions in the 3Dvirtual environment can be recorded as follows: 1. 2. 3. 4. (15, 15) Action = Move Black Pawn to next square. (15, 65) Action = Move White Pawn to next square. (65, 15) Action = Move Black Knight to next square. (15, 65) Action = Move White Knight to next square.

Download PDF sample

Rated 4.32 of 5 – based on 41 votes