Computational Science and Its Applications - ICCSA 2005Part II: International Conference, Singapore, May 9-12, 2005Proceedings

Front Cover
Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganą, Heow Pueh Lee, Youngson Mun, David Taniar, Chih Jeng Kenneth Tan
Springer Science & Business Media, Apr 27, 2005 - Computers - 1316 pages
The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental t- oretical research as well as endeavors in emerging ?elds. Together, these far reaching scienti?c areas contribute to shape this Conference in the realms of state-of-the-art computational science research and applications, encompassing the facilitating theoretical foundations and the innovative applications of such results in other areas.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Implementation of Short Message Service System to Be Based Mobile Wireless Internet
1
Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic Algorithm
10
P2P Protocol Analysis and Blocking Algorithm
21
Object Modeling of RDF Schema for Converting UML Class Diagram
31
A Framework for Security Assurance in Component Based Development
42
Security Framework to Verify the Low Level Implementation Codes
52
A Study on Evaluation of Component Metric Suites
62
The KMeans Clustering Architecture in the Multistage Data Mining Process
71
Access Control Capable Integrated Network Management System for TCPIP Networks
676
A DirectionalAntenna Based MAC Protocol for Wireless Sensor Networks
686
Performance Metrics and Evaluation Considerations
696
QoS Provisioning in an Enhanced FMIPv6 Architecture
704
Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm
714
Design and Implementation of Frequency Offset Estimation Symbol Timing and Sampling Clock Offset Control for an IEEE 80211a Physical Layer
723
Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet Environment
732
Improved Authentication Scheme in WCDMA Networks
741

A Privacy Protection Model in ID Management Using Access Control
82
A TimeVariant Risk Analysis and Damage Estimation for LargeScale Network Systems
92
Efficient Multibit Shifting Algorithm in Multiplicative Inversion Problems
102
Modified TokenUpdate Scheme for Site Authentication
111
A Study on Secure SDP of RFID Using Bluetooth Communication
117
The Semantic Web Approach in Location Based Services
127
Software Component Testing Environments
137
Computer Security Management Model Using MAUT and SNMP
147
Session and Connection Management for QoSGuaranteed Multimedia Service Provisioning on IPMPLS Networks
157
A GQSBased Adaptive Mobility Management Scheme Considering the Gravity of Locality in AdHoc Networks
169
A Study on the ECash System with Anonymity and Divisibility
177
An Authenticated Key Exchange Mechanism Using OneTime Shared Key
187
Creation of Soccer Video Highlight Using the Caption Information
195
The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent
205
A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System
215
An Effective Method for Analyzing Intrusion Situation Through IPBased Classification
225
A New Stream Cipher Using Two Nonlinear Functions
235
New Key Management Systems for Multilevel Security
245
Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation
254
The Role of Secret Sharing in the Distributed MARE Protocols
264
Security Risk Vector for Quantitative Asset Assessment
274
A Remote Video Study Evaluation System Using User Profile
284
Performance Enhancement of Wireless LAN Based on Infrared Communications Using MultipleSubcarrier Modulation
295
Modeling Virtual Network Collaboration in Supply Chain Management
304
SPAResistant Simultaneous Scalar Multiplication
314
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under eCommerce Environment
322
A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security
332
Distribution Data Security System Based on Web Based Active Database
341
Efficient DoS Resistant Multicast Authentication Schemes
353
Development System Security Process of ISOIEC TR 15504 and Security Considerations for Software Process Improvement
363
Flexible ZCDUWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets
373
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme
381
The Large Scale Electronic Voting Scheme Based on Undeniable Multisignature Scheme
391
IPv6IPsec Conformance Test Management System with Formal Description Technique
401
Interference Cancellation Algorithm Development and Implementation for Digital Television
411
Algorithm for ABR Traffic Control and Formation Feedback Information
420
InterferenceFree ZCDUWB for Wireless Home Network Applications
429
Safe Authentication Method for Security Communication in Ubiquitous
442
PrePost Rake Receiver Design for Maximum SINR in MIMO Communication System
449
A Security Functional Requirement Specification Development Tool for Application Information System of Organization
458
Design Procedure of IT Systems Security Countermeasures
468
Similarity Retrieval Based on Selforganizing Maps
474
An Expert System Development for Operating Procedure Monitoring of PWR Plants
483
Security Evaluation Targets for Enhancement of IT Systems Assurance
491
Protection Profile for Software Development Site
499
Improved RS Method for Detection of LSB Steganography
508
Robust Undetectable Interference Watermarks
517
Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms
527
Color Cube Analysis for Detection of LSB Steganography in RGB Color Images
537
Compact and Robust Image Hashing
547
Watermarking for 3D Mesh Model Using Patch CEGIs
557
RelatedKey and MeetintheMiddle Attacks on TripleDES and DESEXE
567
Fault Attack on the DVB Common Scrambling Algorithm
577
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under eCommerce Environment
585
Perturbed Hidden Matrix Cryptosystems
595
IdentityBased Identification Without Random Oracles
603
Security Models and New Schemes Extended Abstract
614
Practical Scenarios for the Van TrungMartirosyan Codes
624
Obtaining TrueRandom Binary Numbers from a Weak Radioactive Source
634
Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases
647
A New Method of Building More Nonsupersingular Elliptic Curves
657
Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography
665
Memory Reused Multiplication Implementation for Cryptography System
749
Scheme for the Information Sharing Between IDSs Using JXTA
754
Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information
762
Detecting Water Area During Flood Event from SAR Image
771
Position Based Handover Control Method
781
Improving Yellow Time Method of LeftTurning Traffic Flow at Signalized Intersection Networks by ITS
789
A Multimedia Database System Using Dependence Weight Values for a Mobile Environment
798
A General Framework for Analyzing the Optimal Call Admission Control in DSCDMA Cellular Network
806
Heuristic Algorithm for Traffic Condition Classification with Loop Detector Data
816
Spatial Data Channel in a Mobile Navigation System
822
A Video Retrieval System for Electrical Safety Education Based on a Mobile Agent
832
Fuzzy Multicriteria Decision MakingBased Mobile Tracking
839
Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application
848
Design and Implementation of MobileLearning System for Environment Education
856
A Simulation Model of Congested Traffic in the Waiting Line
863
Core Technology Analysis and Development for the Virus and Hacking Prevention
870
Development of Traffic Accidents Prediction Model with Intelligent System Theory
880
Prefetching Scheme Considering Mobile Users Preference in Mobile Networks
889
System Development of Security Vulnerability Diagnosis in Wireless Internet Networks
896
An Active Node Management System for Secure Active Networks
904
A Systematic Design Approach for XMLView Driven Web Document Warehouses
914
Clustering and Retrieval of XML Documents by Structure
925
A New Method for Mining Association Rules from a Collection of XML Documents
936
ContentBased Recommendation in ECommerce
946
PM WebMiner
956
ContextBased Recommendation Service in Ubiquitous Commerce
966
A New Continuous Nearest Neighbor Technique for Query Processing on Mobile Environments
977
Personalized Views on Web Data
988
Design of Vehicle Information Management System for Effective Retrieving of Vehicle Location
998
ContextAware Workflow Language Based on Web Services for Ubiquitous Computing
1008
A Ubiquitous Approach for Visualizing Back Pain Data
1018
Prototype Design of Mobile Emergency Telemedicine System
1028
An Intermediate Target for QuickRelay of Remote Storage to Mobile Devices
1035
Adaptation
1045
Efficient Approach for Interactively Mining Web Traversal Patterns
1055
Query Decomposition Using the XML Declarative Description Language
1066
On URL Normalization
1076
ClusteringBased Schema Matching of Web Data for Constructing Digital Library
1086
A Surrogate Middleware Approach
1096
Mobile Minipayment Scheme Using SMSCredit
1106
Context Summarization and Garbage Collecting Context
1115
An XMLView Based Web Engineering Methodology
1125
A Web Services Framework for Integrated Geospatial Coverage Data
1136
Open LocationBased Service Using Secure Middleware Infrastructure in Web Services
1146
Ubiquitous Systems and Petri Nets
1156
Ubiquitous Monitoring and Control in a Smart Biolaboratory
1167
On Discovering Concept Entities from Web Sites
1177
Towards a Realistic Microscopic Traffic Simulation at an Unsignalised Intersection
1187
Particles Chains and Sheets
1197
Discretization of Delayed Multiinput Nonlinear System via Taylor Series and Scaling and Squaring Technique
1207
On the ScaleFree Intersection Graphs
1217
A Stochastic Viewpoint on the Generation of Spatiotemporal Datasets
1225
A Formal Approach to the Design of Distributed Data Warehouses
1235
A Mathematical Model for Genetic Regulation of the Lactose Operon
1245
Network Emergence in Immune System Shape Space
1254
A Multiagent System for Modelling Carbohydrate Oxidation in Cell
1264
Characterizing Complex Behavior in Selforganizing Multiagent Systems
1274
Protein Structure Abstraction and Automatic Clustering Using Secondary Structure Element Sequences
1284
A Neural Network Method for Induction Machine Fault Detection with Vibration Signal
1293
Author Index
1303
Copyright

Other editions - View all

Common terms and phrases