## Computational Science and Its Applications - ICCSA 2004: International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part 3Antonio Laganà, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, C.J. Kenneth Tan, Osvaldo Gervasi The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Geometric Graphs Realization as Coin Graphs | 1 |

A Shakable Snake for Estimation of Image Contours | 9 |

The PGRADE Grid Portal | 10 |

A Fast Construction Algorithm for the Incidence Matrices | 11 |

A New Recurrent Fuzzy Associative Memory for Recognizing | 17 |

A Smart AgentBased Grid Computing Platform | 20 |

On Local Transformations in Plane Geometric Graphs Embedded | 22 |

A Novel Approach for ContentsBased Ecatalogue Image Retrieval | 25 |

Debugging of Java Programs Using HDT with Program Slicing | 524 |

ParallelDistributed Film Line Scratch Restoration | 525 |

User Authentication Protocol Based on Human Memorable Password | 527 |

A Cluster Based Hierarchical Routing Protocol for Mobile Networks | 528 |

Supporting Adaptive Security Levels in Heterogeneous Environments Ghita Kouadri Mostéfaoui Mansoo Kim Mokdong Chung | 537 |

Exception Rules Mining Based on Negative Association Rules | 543 |

On Triangulations | 544 |

Intrusion Detection Using Noisy Training Data Yongsu Park Jaeheung Lee Yookun Cho | 547 |

Optimal Gait Control for a Biped Locomotion | 29 |

Publishing and Executing Parallel Legacy Code Using an OGSI | 30 |

A FeatureBased Algorithm for Recognizing Gestures | 33 |

The PROVE Trace Visualisation Tool as a Grid Service | 37 |

A Bayes Algorithm for the Multitask Pattern Recognition Problem | 39 |

Fingerprint Matching Based on Linking Information Structure | 41 |

A Practical Algorithm for Approximating Shortest Weighted Path | 42 |

Privacy Protection in Ubiquitous Computing Based on Privacy Label | 46 |

Video Summarization Using Fuzzy OneClass Support Vector Machine | 49 |

New Parameter for Balancing Two Independent Measures | 56 |

A Transcode and Prefetch Technique of Multimedia Presentations | 57 |

Shortest Paths for Disc Obstacles | 62 |

A Study on Generating an Efficient Bottomup Tree Rewrite Machine | 65 |

A Monitoring and Prediction Tool for TimeConstraint | 66 |

A Study on Methodology for Enhancing Reliability of Datapath | 73 |

Optimal Server Allocation in Reconfigurable Clusters with | 76 |

Track on Parallel and Distributed Computing | 77 |

Combinatories and Triangulations | 81 |

Design and Evaluation of an AgentBased Communication Model for | 87 |

The Association Rule Algorithm with Missing Data in Data Mining | 97 |

Computing Largest Empty Slabs | 99 |

A Document Classification Algorithm Using the Fuzzy Set Theory | 122 |

Partitioning Orthogonal Polygons by Extension of All Edges | 126 |

A Novel LMS Method for RealTime Network Traffic Prediction | 127 |

Network Security Management Using ARP Spoofing | 142 |

Data Discovery Mechanism for a Large PeertoPeer Based | 146 |

Approximating Smallest Enclosing Balls | 147 |

A Digital Watermarking Scheme in JPEG2000 Using the Properties | 159 |

CORBABased Multithreaded Distributed Simulation | 167 |

A Robust and Fast Algorithm for Computing Exact | 168 |

A Fuzzy Expert System for Network Forensics | 175 |

A Design of Preventive Integrated Security Management System | 183 |

A Systematic Database Summary Generation Using | 185 |

Maintenance Strategy for Efficient Communication at Data Warehouse | 186 |

Speculative Parallelization of a Randomized Incremental Convex | 188 |

Authentication of Mobile Node Using AAA in Coexistence of | 199 |

A Framework for Orthogonal Data and Control | 206 |

The Anchored Voronoi Diagram | 207 |

Maximizing Parallelism for Nested Loops | 213 |

New Approach for Secure and Efficient Metering | 215 |

Unified Development Solution for Cluster and Grid Computing | 226 |

Approximation of the BoatSail Voronoi Diagram and Its Application | 227 |

Detection Techniques for ELF Executable File Using Assembly | 230 |

Gossip Based Causal Order Broadcast Algorithm | 233 |

Incremental Adaptive Loop Subdivision | 237 |

Committing Secure Results with Replicated Servers | 246 |

Reverse Subdivision Multiresolution for Polygonal Silhouette | 247 |

Extract Shape from Clipart Image Using Modified Chain Code | 251 |

Cylindrical Approximation of a Neuron from | 257 |

Design and Implementation of the HoneyPot System with Focusing | 262 |

Skeletizing 3DObjects by Projections | 267 |

SceneBased Video Watermarking for Broadcasting Systems | 271 |

Track on Computational Geometry | 277 |

A QoS Improvement Scheme for RealTime Traffic | 278 |

Molecular Processes Simulation Workshop | 280 |

Error Concealment Method Using ThreeDimensional | 288 |

Enhanced Video Coding with Error Resilience Based | 291 |

A Queue Management Scheme for Alleviating the Impact | 294 |

Confidence Sets for the Aumann Mean of a Random Closed Set | 298 |

An Algorithm of Mapping Additional Scalar Value in 2D Vector | 308 |

Traffic Control Scheme of ABR Service Using NLMS in ATM Network | 310 |

ModelBased Human Motion Tracking and Behavior Recognition | 311 |

Numerical Revelation and Analysis of Critical Ignition Conditions | 313 |

Exact Calculation | 315 |

Curvature Dependent Polygonization by the Edge Spinning | 325 |

Placement Algorithm of Web Server Replicas | 328 |

New Packetization Method for Error Resilient Video Communications | 329 |

A Novel Model for Defining Topological LineRegion Relations | 335 |

Inorganic Phosphates Investigation by Support Vector Machine Cinzia Pierro Francesco Capitelli | 338 |

Track on Adaptive Algorithms | 345 |

Characterization of Equilibrium Structure for N2N2 Dimer | 350 |

Approximation Algorithms for kSource Bottleneck Routing Cost | 355 |

A Time Dependent Study of the Nitrogen Atom Nitrogen | 357 |

A TCPFriendly Congestion Control Scheme Using Hybrid Approach | 359 |

Efficient Prefetch and Prerelease Based Buffer Cache Management | 360 |

From DFT Cluster Calculations to Molecular Dynamics Simulation | 366 |

Efficient Sequential and Parallel Algorithms for Popularity | 367 |

A New Architecture Design for Differentiated Resource Sharing | 370 |

Molecular Mechanics and Dynamics Calculations to Bridge Molecular | 374 |

Decentralized Interagent Message Forwarding Protocols | 376 |

Inverse Dithering through IMAP Estimation | 379 |

Direct Simulation Monte Carlo Modeling of Non Equilibrium | 383 |

Optimization of Usability on an Authentication System Built from | 386 |

Molecular Simulation of Reaction and Adsorption in Nanochemical | 392 |

An Efficient Simple Cooling Schedule for Simulated Annealing | 396 |

An Efficient Image Transmission System Adopting OFDM Based | 402 |

A ProblemSpecific Convergence Bound for Simulated | 405 |

C6NH6+ Ions as Intermediates in the Reaction between | 412 |

Speech Hiding Based on Auditory Wavelet | 414 |

Comparison and Selection of Exact and Heuristic Algorithms | 415 |

Reducing Link Loss in Ad Hoc Networks | 418 |

Towards a Full Dimensional Exact Quantum Calculation | 422 |

Adaptive Texture Recognition in Image Sequences with Prediction | 425 |

Track on Telecommunications | 431 |

Conformations of 1246Tetrathiepane Issa Yavari Arash Jabbari Shahram Moradi | 432 |

Fuzzy Matching of User Profiles for a Banner Engine | 433 |

Delay and Collision Reduction Mechanism for Distributed Fair | 434 |

Track on Biology Biochemistry Bioinformatics | 443 |

Numerical Models in Biomechanics Session | 445 |

Introduction and Evaluation of Development System Security | 451 |

Design on Mobile Secure Electronic Transaction Protocol | 461 |

High Throughput insilico Screening against Flexible | 465 |

Musculoskeletal Modeling of Lumbar Spine under Follower Loads | 467 |

A Distributed Online Certificate Status Protocol Based | 471 |

A SequenceFocused Parallelisation of EMBOSS on a Cluster | 473 |

A Design of Configuration Management Practices and CMPET | 481 |

Encoding Image Based on Retinal Ganglion Cell | 486 |

Deformable Templates for Recognizing the Shape | 489 |

The Design and Development for Risk Analysis Automatic Tool YoungHwan Bang YoonJung Jung Injung Kim Namhoon Lee | 491 |

A FaultTolerant Mobile Agent Model in Replicated Secure Services Kyeongmo Park | 500 |

Integrating Medical Imaging into a Grid Based | 505 |

Using a GoalRefinement Tree to Obtain and Refine | 506 |

Track on Cluster Computing | 508 |

Computation of Multiplicative Inverses in GF2n | 510 |

A Study on Smart Card Security Evaluation Criteria | 517 |

Cache Conscious Dynamic Transaction Routing | 548 |

Probability Distribution of OpCodes in Edgebreaker | 554 |

A Study on Key Recovery Agent Protection Profile Having | 557 |

Relevance Feedback for ContentBased Image Retrieval Using | 559 |

Action Reasoning with Uncertain Resources | 563 |

An Adaptive Prefetching Method for Web Caches | 566 |

SimulationBased Security Testing for Continuity of Essential | 567 |

Synthesis of Mechanical Structures Using a Genetic Algorithm | 573 |

Track on Computational Medicine | 575 |

Improving Productivity and Enhancing the Reusability | 577 |

A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion | 584 |

Automatic Extension of Korean PredicateBased Subcategorization | 585 |

A Framework for Security Assurance in Component Based Development | 587 |

Fast and Efficient Rendering System | 592 |

Information Fusion for Probabilistic Reasoning and Its Application | 593 |

An Information Engineering Methodology for the Security Strategy | 597 |

Robust Contrast Enhancement for Microcalcification | 602 |

An Authenticated Key Agreement Protocol Resistant | 603 |

A Case Study in Applying Common Criteria to Development Process | 608 |

Track on Computational Methods | 611 |

Parametric Freehand Sketches | 613 |

A Pointer Forwarding Scheme for FaultTolerant Location | 617 |

Data Management with Load Balancing in Distributed Computing Jong Sik Lee | 621 |

Architecture Environments for Ebusiness Agent Based on Security | 625 |

High Performance Modeling with Quantized System Jong Sik Lee | 630 |

Bézier Solutions of the Wave Equation | 631 |

Multimodal Biometrics System Using Face and Signature | 635 |

A Novel Data Encryption and Distribution Approach | 637 |

New DigitSerial Systolic Arrays for PowerSum and Division | 638 |

Simple and Efficient Group Key Agreement | 645 |

Generation of Unordered Binary Trees | 648 |

A Differential Method for Parametric Surface Intersection | 651 |

On Facial Expression Recognition Using the Virtual Image Masking | 655 |

A New Systolic Array for Least Significant Digit First | 656 |

Secure Handoff Based on Dual Session Keys in Mobile | 663 |

Asymptotic Error Estimate of Iterative NewtonType Methods | 667 |

Visualization of Large Terrain Using Nonrestricted | 671 |

IDBased Authenticated MultipleKey Agreement Protocol | 672 |

Detection and Identification Mechanism against Spoofed Traffic | 673 |

Numerical Solution of Linear HighIndex DAEs Mohammad Mahdi Hosseini | 676 |

A Defense Mechanism Knowledge Base EunJung Choi HyungJong Kim MyuhngJoo Kim | 683 |

Improved Mathematical | 686 |

A Secure and Flexible Multisigncryption Scheme | 689 |

A FineGrained Taxonomy of Security Vulnerability | 693 |

A New RoleBased Authorization Model | 701 |

A Comparison of Multiresolution Modelling | 703 |

Applications of Fuzzy Data Mining Methods for Intrusion | 706 |

Effective Packet Marking Approach to Defend against DDoS Attack | 708 |

Texture Mapping on Arbitrary 3D Surfaces | 721 |

A Relationship of Configuration Management Requirements | 725 |

Optimizing Symmetric FFTs with Prime EdgeLength | 736 |

Performance Improvement in Mobile IPv6 Using | 738 |

A Bandwidth Reduction Scheme for 3D TextureBased Volume | 741 |

ContextBased Proofreading of Structured Documents | 743 |

A Method to Establish the Cooling Scheme in Simulated | 755 |

Where the Truth Lies in Automatic Theorem Proving | 761 |

Storing Together the Structural Information of XML Documents | 763 |

Track on Computational Science Education | 776 |

An Application of Computer Graphics for Landscape | 779 |

Isolating and Specifying the Relevant Information of | 783 |

A Scheme for Improving WEP Key Transmission between | 792 |

View Morphing Based on Autocalibration for Generation | 799 |

A New Pedagogical | 806 |

An ObjectOriented Metric to Measure the Degree of Dependency | 808 |

Security Issues in Network File Systems | 812 |

Track on Computer Modeling and Simulation | 817 |

A ContentIndependent Scalable Encryption Model | 821 |

Teletraffic Generation of SelfSimilar Processes with | 827 |

Multimodal Biometrics System Using Face and Signature | 828 |

Design Analysis and Optimization of LCD Backlight Unit Using | 837 |

A Geometrical Approach for Network Intrusion Detection | 841 |

Dynamically Changing Road Networks Modelling | 843 |

An Efficient Parameter Estimation Technique | 847 |

Association Inlining for Mapping XML DTDs to Relational Tables | 849 |

A Computer Tool for the Generation | 857 |

Use of Spectral Techniques in the Design | 859 |

Ontologies in Fashion | 863 |

Macroscopic Treatment to Polymorphic Email Based Viruses | 867 |

An Efficient Cache Conscious Multidimensional Index Structure | 869 |

Making Discrete Games | 877 |

A Scalable PKI for Secure Routing in the Internet | 882 |

Speech Driven Facial Animation Using Chinese Mandarin | 886 |

Feature Extraction and Correlation for TimetoImpact | 887 |

Cryptanalysis and Improvement of Password Authenticated | 895 |

Autonomic Protection System Using Adaptive Security Policy | 896 |

The Development and Application of a WebBased Information | 902 |

A Novel Method to Support Users Consent in Usage Control | 906 |

Track on Financial and Economical Modeling | 915 |

Observing Standards for WebBased Learning from the Web | 922 |

A New Approach for Numerical Identification | 926 |

KolmogorovSmirnov Test for Image Comparison | 933 |

Chaotic Protocols | 938 |

Track on Mobile Computing Systems | 945 |

Image Corner Detection Using Radon Transform | 948 |

OrthonormalityConstrained INDSCAL with Nonnegative Saliences | 952 |

A New Randomness Test with Some Applications | 960 |

On Extraction of Facial Features from Color Images | 964 |

An Adaptive Security Model for Heterogeneous Networks Using | 965 |

Numerical Methods Based on Gaussian Quadrature and Continuous | 971 |

Fair Certified Email Protocols with Delivery Deadline Agreement | 978 |

Using MAUT and Simple Heuristics | 983 |

A Study for Performance Improvement of Smooth Handoff Using | 985 |

A Continuous Technique for the Weighted LowRank | 988 |

Implementation and Performance Evaluation of HighPerformance | 998 |

Performance Analysis of Multimedia Data Transmission with | 1002 |

Author Index | 1005 |

Density Analysis on Large Geographical Databases Search for | 1009 |

A Bayesian Approach for Estimating Link Travel Time | 1017 |

A Study on Secure and Efficient Sensor Network Management Scheme | 1020 |

Using Formal Ontology for Integrated Spatial Data Mining | 1026 |

Author Index 1129 | 1029 |

1030 | |

1035 | |

### Other editions - View all

### Common terms and phrases

agent applications approach approximation algorithm Berlin Heidelberg 2004 cache calculated cell circulant graph client cluster complexity Computer Science convex hull corresponding curve database defined Delaunay triangulation denote differential algebraic discs distribution edge equation error example execution filter finite field function fuzzy geometric given global graph heuristic ICCSA IEEE implementation input integration interpolation intersection interval intrusion detection islands of level iteration Lagan`a Lemma LNCS mapping Markov chain matrix mesh method mobile nodes NP-hard object obtained optimal paper parallel parameters partition patterns performance points polygon polynomial prefetching problem proposed protocol random segment sequence server shortest path shows Simulated Annealing simulation smallest enclosing ball solution solve Springer-Verlag Berlin Heidelberg step structure surface systolic array techniques Theorem tree triangulation variables vector vertex vertices Voronoi diagram web cache