Transactions on Computational Science XVII

  • Marina L. Gavrilova
  • C. J. Kenneth Tan

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7420)

Table of contents

  1. Front Matter
  2. Neural Networks and Cognitive Computing

    1. Front Matter
      Pages 1-1
    2. Yulin He, Xizhao Wang, Tingting Fu
      Pages 31-50
    3. Himanshu Thapliyal, H. V. Jayashree, A. N. Nagamani, Hamid R. Arabnia
      Pages 73-97
  3. Wireless Sensor Networks Security

    1. Front Matter
      Pages 99-99
    2. Laxmi Shrivastava, Sarita S. Bhadauraia, Geetam Singh Tomar, Brijesh Kumar Chaurasia
      Pages 101-115
    3. Pradheepkumar Singaravelu, Shekhar Verma
      Pages 116-132
    4. Brijesh Kumar Chaurasia, Shekhar Verma, Geetam Singh Tomar
      Pages 133-149
    5. Ranjeet Singh Tomar, Shekhar Verma, Geetam Singh Tomar
      Pages 150-171
  4. Back Matter

About this book


The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.
The 17th issue of the Transactions on Computational Science journal consists of two parts. The first part is comprised of four papers, spanning the areas of robotics and augmented reality, computer game evaluation strategies, cognitive perception in crowd control simulation, and reversible processor design using look-ahead. The second part consists of five papers  covering the topics of secure congestion adaptive routing, cryptographic schemes for wireless sensor networks, intersection attacks on anonymity, and reliable message delivery in Vehicular Ad Hoc Networks (VANET).


cognitive computing neural networks robotics security wireless sensor networks

Editors and affiliations

  • Marina L. Gavrilova
    • 1
  • C. J. Kenneth Tan
    • 2
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada
  2. 2.Exascala Ltd.BirminghamUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35839-5
  • Online ISBN 978-3-642-35840-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods