Computational Science and Its Applications - ICCSA 2004: International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part 3

Front Cover
Antonio LaganÓ, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, C.J. Kenneth Tan, Osvaldo Gervasi
Springer Science & Business Media, May 7, 2004 - Computers - 1044 pages
The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Geometric Graphs Realization as Coin Graphs
1
A Shakable Snake for Estimation of Image Contours
9
The PGRADE Grid Portal
10
A Fast Construction Algorithm for the Incidence Matrices
11
A New Recurrent Fuzzy Associative Memory for Recognizing
17
A Smart AgentBased Grid Computing Platform
20
On Local Transformations in Plane Geometric Graphs Embedded
22
A Novel Approach for ContentsBased Ecatalogue Image Retrieval
25
Debugging of Java Programs Using HDT with Program Slicing
524
ParallelDistributed Film Line Scratch Restoration
525
User Authentication Protocol Based on Human Memorable Password
527
A Cluster Based Hierarchical Routing Protocol for Mobile Networks
528
Supporting Adaptive Security Levels in Heterogeneous Environments Ghita Kouadri MostÚfaoui Mansoo Kim Mokdong Chung
537
Exception Rules Mining Based on Negative Association Rules
543
On Triangulations
544
Intrusion Detection Using Noisy Training Data Yongsu Park Jaeheung Lee Yookun Cho
547

Optimal Gait Control for a Biped Locomotion
29
Publishing and Executing Parallel Legacy Code Using an OGSI
30
A FeatureBased Algorithm for Recognizing Gestures
33
The PROVE Trace Visualisation Tool as a Grid Service
37
A Bayes Algorithm for the Multitask Pattern Recognition Problem
39
Fingerprint Matching Based on Linking Information Structure
41
A Practical Algorithm for Approximating Shortest Weighted Path
42
Privacy Protection in Ubiquitous Computing Based on Privacy Label
46
Video Summarization Using Fuzzy OneClass Support Vector Machine
49
New Parameter for Balancing Two Independent Measures
56
A Transcode and Prefetch Technique of Multimedia Presentations
57
Shortest Paths for Disc Obstacles
62
A Study on Generating an Efficient Bottomup Tree Rewrite Machine
65
A Monitoring and Prediction Tool for TimeConstraint
66
A Study on Methodology for Enhancing Reliability of Datapath
73
Optimal Server Allocation in Reconfigurable Clusters with
76
Track on Parallel and Distributed Computing
77
Combinatories and Triangulations
81
Design and Evaluation of an AgentBased Communication Model for
87
The Association Rule Algorithm with Missing Data in Data Mining
97
Computing Largest Empty Slabs
99
A Document Classification Algorithm Using the Fuzzy Set Theory
122
Partitioning Orthogonal Polygons by Extension of All Edges
126
A Novel LMS Method for RealTime Network Traffic Prediction
127
Network Security Management Using ARP Spoofing
142
Data Discovery Mechanism for a Large PeertoPeer Based
146
Approximating Smallest Enclosing Balls
147
A Digital Watermarking Scheme in JPEG2000 Using the Properties
159
CORBABased Multithreaded Distributed Simulation
167
A Robust and Fast Algorithm for Computing Exact
168
A Fuzzy Expert System for Network Forensics
175
A Design of Preventive Integrated Security Management System
183
A Systematic Database Summary Generation Using
185
Maintenance Strategy for Efficient Communication at Data Warehouse
186
Speculative Parallelization of a Randomized Incremental Convex
188
Authentication of Mobile Node Using AAA in Coexistence of
199
A Framework for Orthogonal Data and Control
206
The Anchored Voronoi Diagram
207
Maximizing Parallelism for Nested Loops
213
New Approach for Secure and Efficient Metering
215
Unified Development Solution for Cluster and Grid Computing
226
Approximation of the BoatSail Voronoi Diagram and Its Application
227
Detection Techniques for ELF Executable File Using Assembly
230
Gossip Based Causal Order Broadcast Algorithm
233
Incremental Adaptive Loop Subdivision
237
Committing Secure Results with Replicated Servers
246
Reverse Subdivision Multiresolution for Polygonal Silhouette
247
Extract Shape from Clipart Image Using Modified Chain Code
251
Cylindrical Approximation of a Neuron from
257
Design and Implementation of the HoneyPot System with Focusing
262
Skeletizing 3DObjects by Projections
267
SceneBased Video Watermarking for Broadcasting Systems
271
Track on Computational Geometry
277
A QoS Improvement Scheme for RealTime Traffic
278
Molecular Processes Simulation Workshop
280
Error Concealment Method Using ThreeDimensional
288
Enhanced Video Coding with Error Resilience Based
291
A Queue Management Scheme for Alleviating the Impact
294
Confidence Sets for the Aumann Mean of a Random Closed Set
298
An Algorithm of Mapping Additional Scalar Value in 2D Vector
308
Traffic Control Scheme of ABR Service Using NLMS in ATM Network
310
ModelBased Human Motion Tracking and Behavior Recognition
311
Numerical Revelation and Analysis of Critical Ignition Conditions
313
Exact Calculation
315
Curvature Dependent Polygonization by the Edge Spinning
325
Placement Algorithm of Web Server Replicas
328
New Packetization Method for Error Resilient Video Communications
329
A Novel Model for Defining Topological LineRegion Relations
335
Inorganic Phosphates Investigation by Support Vector Machine Cinzia Pierro Francesco Capitelli
338
Track on Adaptive Algorithms
345
Characterization of Equilibrium Structure for N2N2 Dimer
350
Approximation Algorithms for kSource Bottleneck Routing Cost
355
A Time Dependent Study of the Nitrogen Atom Nitrogen
357
A TCPFriendly Congestion Control Scheme Using Hybrid Approach
359
Efficient Prefetch and Prerelease Based Buffer Cache Management
360
From DFT Cluster Calculations to Molecular Dynamics Simulation
366
Efficient Sequential and Parallel Algorithms for Popularity
367
A New Architecture Design for Differentiated Resource Sharing
370
Molecular Mechanics and Dynamics Calculations to Bridge Molecular
374
Decentralized Interagent Message Forwarding Protocols
376
Inverse Dithering through IMAP Estimation
379
Direct Simulation Monte Carlo Modeling of Non Equilibrium
383
Optimization of Usability on an Authentication System Built from
386
Molecular Simulation of Reaction and Adsorption in Nanochemical
392
An Efficient Simple Cooling Schedule for Simulated Annealing
396
An Efficient Image Transmission System Adopting OFDM Based
402
A ProblemSpecific Convergence Bound for Simulated
405
C6NH6+ Ions as Intermediates in the Reaction between
412
Speech Hiding Based on Auditory Wavelet
414
Comparison and Selection of Exact and Heuristic Algorithms
415
Reducing Link Loss in Ad Hoc Networks
418
Towards a Full Dimensional Exact Quantum Calculation
422
Adaptive Texture Recognition in Image Sequences with Prediction
425
Track on Telecommunications
431
Conformations of 1246Tetrathiepane Issa Yavari Arash Jabbari Shahram Moradi
432
Fuzzy Matching of User Profiles for a Banner Engine
433
Delay and Collision Reduction Mechanism for Distributed Fair
434
Track on Biology Biochemistry Bioinformatics
443
Numerical Models in Biomechanics Session
445
Introduction and Evaluation of Development System Security
451
Design on Mobile Secure Electronic Transaction Protocol
461
High Throughput insilico Screening against Flexible
465
Musculoskeletal Modeling of Lumbar Spine under Follower Loads
467
A Distributed Online Certificate Status Protocol Based
471
A SequenceFocused Parallelisation of EMBOSS on a Cluster
473
A Design of Configuration Management Practices and CMPET
481
Encoding Image Based on Retinal Ganglion Cell
486
Deformable Templates for Recognizing the Shape
489
The Design and Development for Risk Analysis Automatic Tool YoungHwan Bang YoonJung Jung Injung Kim Namhoon Lee
491
A FaultTolerant Mobile Agent Model in Replicated Secure Services Kyeongmo Park
500
Integrating Medical Imaging into a Grid Based
505
Using a GoalRefinement Tree to Obtain and Refine
506
Track on Cluster Computing
508
Computation of Multiplicative Inverses in GF2n
510
A Study on Smart Card Security Evaluation Criteria
517
Cache Conscious Dynamic Transaction Routing
548
Probability Distribution of OpCodes in Edgebreaker
554
A Study on Key Recovery Agent Protection Profile Having
557
Relevance Feedback for ContentBased Image Retrieval Using
559
Action Reasoning with Uncertain Resources
563
An Adaptive Prefetching Method for Web Caches
566
SimulationBased Security Testing for Continuity of Essential
567
Synthesis of Mechanical Structures Using a Genetic Algorithm
573
Track on Computational Medicine
575
Improving Productivity and Enhancing the Reusability
577
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion
584
Automatic Extension of Korean PredicateBased Subcategorization
585
A Framework for Security Assurance in Component Based Development
587
Fast and Efficient Rendering System
592
Information Fusion for Probabilistic Reasoning and Its Application
593
An Information Engineering Methodology for the Security Strategy
597
Robust Contrast Enhancement for Microcalcification
602
An Authenticated Key Agreement Protocol Resistant
603
A Case Study in Applying Common Criteria to Development Process
608
Track on Computational Methods
611
Parametric Freehand Sketches
613
A Pointer Forwarding Scheme for FaultTolerant Location
617
Data Management with Load Balancing in Distributed Computing Jong Sik Lee
621
Architecture Environments for Ebusiness Agent Based on Security
625
High Performance Modeling with Quantized System Jong Sik Lee
630
BÚzier Solutions of the Wave Equation
631
Multimodal Biometrics System Using Face and Signature
635
A Novel Data Encryption and Distribution Approach
637
New DigitSerial Systolic Arrays for PowerSum and Division
638
Simple and Efficient Group Key Agreement
645
Generation of Unordered Binary Trees
648
A Differential Method for Parametric Surface Intersection
651
On Facial Expression Recognition Using the Virtual Image Masking
655
A New Systolic Array for Least Significant Digit First
656
Secure Handoff Based on Dual Session Keys in Mobile
663
Asymptotic Error Estimate of Iterative NewtonType Methods
667
Visualization of Large Terrain Using Nonrestricted
671
IDBased Authenticated MultipleKey Agreement Protocol
672
Detection and Identification Mechanism against Spoofed Traffic
673
Numerical Solution of Linear HighIndex DAEs Mohammad Mahdi Hosseini
676
A Defense Mechanism Knowledge Base EunJung Choi HyungJong Kim MyuhngJoo Kim
683
Improved Mathematical
686
A Secure and Flexible Multisigncryption Scheme
689
A FineGrained Taxonomy of Security Vulnerability
693
A New RoleBased Authorization Model
701
A Comparison of Multiresolution Modelling
703
Applications of Fuzzy Data Mining Methods for Intrusion
706
Effective Packet Marking Approach to Defend against DDoS Attack
708
Texture Mapping on Arbitrary 3D Surfaces
721
A Relationship of Configuration Management Requirements
725
Optimizing Symmetric FFTs with Prime EdgeLength
736
Performance Improvement in Mobile IPv6 Using
738
A Bandwidth Reduction Scheme for 3D TextureBased Volume
741
ContextBased Proofreading of Structured Documents
743
A Method to Establish the Cooling Scheme in Simulated
755
Where the Truth Lies in Automatic Theorem Proving
761
Storing Together the Structural Information of XML Documents
763
Track on Computational Science Education
776
An Application of Computer Graphics for Landscape
779
Isolating and Specifying the Relevant Information of
783
A Scheme for Improving WEP Key Transmission between
792
View Morphing Based on Autocalibration for Generation
799
A New Pedagogical
806
An ObjectOriented Metric to Measure the Degree of Dependency
808
Security Issues in Network File Systems
812
Track on Computer Modeling and Simulation
817
A ContentIndependent Scalable Encryption Model
821
Teletraffic Generation of SelfSimilar Processes with
827
Multimodal Biometrics System Using Face and Signature
828
Design Analysis and Optimization of LCD Backlight Unit Using
837
A Geometrical Approach for Network Intrusion Detection
841
Dynamically Changing Road Networks Modelling
843
An Efficient Parameter Estimation Technique
847
Association Inlining for Mapping XML DTDs to Relational Tables
849
A Computer Tool for the Generation
857
Use of Spectral Techniques in the Design
859
Ontologies in Fashion
863
Macroscopic Treatment to Polymorphic Email Based Viruses
867
An Efficient Cache Conscious Multidimensional Index Structure
869
Making Discrete Games
877
A Scalable PKI for Secure Routing in the Internet
882
Speech Driven Facial Animation Using Chinese Mandarin
886
Feature Extraction and Correlation for TimetoImpact
887
Cryptanalysis and Improvement of Password Authenticated
895
Autonomic Protection System Using Adaptive Security Policy
896
The Development and Application of a WebBased Information
902
A Novel Method to Support Users Consent in Usage Control
906
Track on Financial and Economical Modeling
915
Observing Standards for WebBased Learning from the Web
922
A New Approach for Numerical Identification
926
KolmogorovSmirnov Test for Image Comparison
933
Chaotic Protocols
938
Track on Mobile Computing Systems
945
Image Corner Detection Using Radon Transform
948
OrthonormalityConstrained INDSCAL with Nonnegative Saliences
952
A New Randomness Test with Some Applications
960
On Extraction of Facial Features from Color Images
964
An Adaptive Security Model for Heterogeneous Networks Using
965
Numerical Methods Based on Gaussian Quadrature and Continuous
971
Fair Certified Email Protocols with Delivery Deadline Agreement
978
Using MAUT and Simple Heuristics
983
A Study for Performance Improvement of Smooth Handoff Using
985
A Continuous Technique for the Weighted LowRank
988
Implementation and Performance Evaluation of HighPerformance
998
Performance Analysis of Multimedia Data Transmission with
1002
Author Index
1005
Density Analysis on Large Geographical Databases Search for
1009
A Bayesian Approach for Estimating Link Travel Time
1017
A Study on Secure and Efficient Sensor Network Management Scheme
1020
Using Formal Ontology for Integrated Spatial Data Mining
1026
Author Index 1129
1029
A New Recovery Scheme with Reverse Shared Risk Link Group
1030
Design of Authentication and Key Exchange Protocol
1035
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information