Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Includes the best papers of the SNPD 2008 held on August 6-8, 2008 in Phuket, Thailand
The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, held in Phuket Thailand on August 6 – 8, 2008 is aimed at bringing together researchers and scientist, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. This publication captures 20 of the conference’s most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field.
Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification.- Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm.- Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM.- An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.- Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.- Design and Implementation of Clustering File Backup Server Using File Fingerprint.- Aspect Oriented Testing Frameworks for Embedded Software.- Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model.- Information Technology Service Management: A Thailand Perspective.- A New Artificial Immune System for the Detection of Abnormal Behaviour.- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise.- A Security Supervision System for Hybrid Networks.- Cost Minimization in Service Systems Using Particle Swarm Optimization.- MS2Web: Applying MDA and SOA to Web Services.- Security Analysis of One Verifiable Encryption Scheme.- Proactive Fault Management with Virtualization for Software Aging.- A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems.- Text Classification by Relearning and Ensemble Computation.- Analysis of Agents’ Cooperation in RoboCupRescue Simulation.- A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network.- A Formal Specification of UML Class and State Diagrams.