CHF173.90
Download steht sofort bereit
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. The volumes present a total of 664 papers organized according to the five major conference themes: computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies. This is Part III.
Inhalt
Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A).- A Security Requirement Management Database Based on ISO/IEC 15408.- Development of Committee Neural Network for Computer Access Security System.- C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model.- Design and Fabrication of Security and Home Automation System.- PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design.- Experiments and Hardware Countermeasures on Power Analysis Attacks.- Information System Modeling for Analysis of Propagation Effects and Levels of Damage.- A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks.- A VLSM Address Management Method for Variable IP Subnetting.- SDSEM: Software Development Success Evolution Model.- A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks.- Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications.- The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks.- Ontology-Based Information Search in the Real World Using Web Services.- An Active Node Set Maintenance Scheme for Distributed Sensor Networks.- Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment.- Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector.- Applying Product Line to the Embedded Systems.- Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold.- Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents.- Design of H.264/AVC-Based Software Decoder for Mobile Phone.- Transforming a Legacy System into Components.- Pseudorandom Number Generator Using Optimal Normal Basis.- Efficient Nonce-Based Authentication Scheme Using Token-Update.- An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool.- A Prediction Method of Network Traffic Using Time Series Models.- An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions.- Intersection Simulation System Based on Traffic Flow Control Framework.- A HIICA(Highly-Improved Intra CA) Design for M-Commerce.- Highly Reliable Synchronous Stream Cipher System for Link Encryption.- Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network.- Hybrid Image Mosaic Construction Using the Hierarchical Method.- Workshop on Applied Cryptography and Information Security (ACIS 2006).- Public Key Encryption with Keyword Search Based on K-Resilient IBE.- A Generic Construction of Secure Signatures Without Random Oracles.- A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption.- Traceable Signature: Better Efficiency and Beyond.- On the TYS Signature Scheme.- Efficient Partially Blind Signatures with Provable Security.- A Framework for Robust Group Key Agreement.- BGN Authentication and Its Extension to Convey Message Commitments.- New Security Problem in RFID Systems "Tag Killing".- A Model for Security Vulnerability Pattern.- A New Timestamping Scheme Based on Skip Lists.- A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.- New Constructions of Universal Hash Functions Based on Function Sums.- Analysis of Fast Blockcipher-Based Hash Functions.- Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms.- Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.- Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture.- Workshop on Internet Communications Security (WICS 2006).- Security Weaknesses in Two Proxy Signature Schemes.- A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths.- Comparative Analysis of IPv6 VPN Transition in NEMO Environments.- A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream.- Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO.- An Inter-domain Key Agreement Protocol Using Weak Passwords.- A Practical Solution for Distribution Rights Protection in Multicast Environments.- Audit-Based Access Control in Nomadic Wireless Environments.- Workshop on Optimization: Theories and Applications (OTA 2006).- Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems.- The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution.- Satisfying Constraints for Locating Export Containers in Port Container Terminals.- A Price Discrimination Modeling Using Geometric Programming.- Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation.- Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning.- Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain.- Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area.- Scheduling an R&D Project with Quality-Dependent Time Slots.- The Bottleneck Tree Alignment Problems.- Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers.- Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment.- Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex.- A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment.- Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method.- Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks.- An Entropy Based Group Setup Strategy for PCB Assembly.- Cross-Facility Production and Transportation Planning Problem with Perishable Inventory.- A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload.- Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times.- The Maximum Integer Multiterminal Flow Problem.- Routing with Early Ordering for Just-In-Time Manufacturing Systems.- A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks.- On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers.- Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk.- Two-Server Network Disconnection Problem.- One-Sided Monge TSP Is NP-Hard.- On Direct Methods for Lexicographic Min-Max Optimization.- Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing.- Linear Convergence of Tatônnement in a Bertrand Oligopoly.- Design for Using Purpose of Assembly-Group.- A Conditional Gaussian Martingale Algorithm for Global Optimization.- Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks.- A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process.- Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem.- An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations.- A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps.- Global Optimization of the Scenario Generation and P…