Willkommen, schön sind Sie da!
Logo Ex Libris

Computational Science and Its Applications - ICCSA 2006

  • E-Book (pdf)
  • 1191 Seiten
(0) Erste Bewertung abgeben
Bewertungen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science ... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hier erhalten Sie Ihren Download-Link.
CHF 169.90
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. The volumes present a total of 664 papers organized according to the five major conference themes: computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies. This is Part IV.



Inhalt

Workshop on Ubiquitous Web Systems and Intelligence (UWSI 2006).- Message Transport Interface for Efficient Communication Between Agent Framework and Event Service.- An Ontology-Based Context Model in a Smart Home.- Service Mobility Manager for OSGi Framework.- A Ubiquitous Workflow Service Framework.- Self Organizing Sensor Networks Using Intelligent Clustering.- Searching and Selecting Web Services Using Case Based Reasoning.- Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks.- Content Delivery with Spatial Caching Scheme in Mobile Wireless Networks.- Higher Education Web Information System Usage Analysis with a Data Webhouse.- A User Management System for Federated Databases Using Web Services.- A Dynamic Evaluation Framework for Mobile Applications.- SOAM: An Environment Adaptation Model for the Pervasive Semantic Web.- Implementing the MPEG-21 Adaptation Quality of Service in Dynamic Environments.- A Middleware Architecture Determining Application Context Using Shared Ontology.- Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing Environments.- Designing and Implementing Physical Hypermedia Applications.- Replicated Ubiquitous Nets.- Design of a Shared Ontology Used for Translating Negotiation Primitives.- A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements.- Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for Bluetooth.- ECA Rule Component for Timely Collaboration of Web-Based Distributed Business Systems.- Dynamic Approach for Integrating Web Data Warehouses.- Location Aware Business Process Deployment.- A Framework for Rapid Development of RFID Applications.- Workshop on Ubiquitous Application and Security Service (UASS 2006).- A Flexible DRM System Considering Ubiquitous Environment.- User Centric Intelligent IPMPS in Ubi-Home.- The Design and Development of a Secure Keystroke System for u Business.- Linkability of a Blind Signature Scheme and Its Improved Scheme.- A Noble Structural Model for e-Learning Services in Ubiquitous Environment.- Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms.- Design of the Configurable Clothes Using Mobile Actuator-Sensor Network.- Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure.- Counting-Based Distance Estimations and Localizations in Wireless Sensor Networks.- Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System.- Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification.- Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes.- Tracking Illegal System Access in a Ubiquitous Environment - Proposal for ATS, a Traceback System Using STOP.- Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.- A Security Model for Home Networks with Authority Delegation.- An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption.- Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.- An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing Environment.- Efficient User Authentication and Key Agreement in Ubiquitous Computing.- Single Sign-On and Key Establishment for Ubiquitous Smart Environments.- A Light Weight Authentication Protocol for Digital Home Networks.- Smart Home Microcontroller: Telephone Interfacing.- SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network.- Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks.- The Performance Analysis of UWB System for the HD Multimedia Communication in a Home Network.- Extraction of Implicit Context Information in Ubiquitous Computing Environments.- Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive Interactions.- An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTS.- Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing Environments.- A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time Constraints.- Workshop on Embedded System for Ubiquitous Computing (ESUC 2006).- Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks.- Wireless Sensor Networks: A Scalable Time Synchronization.- A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor Networks.- Two-Dimensional Priority Scheduling Scheme for Open Real-Time Systems.- An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control Systems.- Adaptive Load Balancing Mechanism for Server Cluster.- Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster Computing.- A Method for Efficient Malicious Code Detection Based on Conceptual Similarity.- A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault Detection.- Efficient Exponentiation in GF(p m ) Using the Frobenius Map.- A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc Networks.- A Power-Efficient Design Employing an Extreme Condition Detector for Embedded Systems.- An Efficient Delay Metric on RC Interconnects Under Saturated Ramp Inputs.- Low Power Microprocessor Design for Embedded Systems.- History Length Adjustable gshare Predictor for High-Performance Embedded Processor.- Workshop on Information Engineering and Applications in Ubiquitous Computing Environments (IEAUCE 2006).- Security Engineering Methodology Based on Problem Solving Theory.- Design and Implementation of an Ontology Algorithm for Web Documents Classification.- Automatic Test Approach of Web Application for Security (AutoInspect).- A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network Middlewares.- Session Key Agreement Protocol for End-to-End Security in MANET.- Process-Oriented DFM System for Ubiquitous Devices.- A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-Logistics.- Information Security Management System for SMB in Ubiquitous Computing.- A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV).- Workshop on Component Based Software Engineering and Software Process Model (CBSE 2006).- Designing Aspectual Architecture Views in Aspect-Oriented Software Development.- Process and Techniques to Generate Components in MDA/CB-PIM for Automation.- An Ontology Definition Framework for Model Driven Development.- An AHP-Based Evaluation Model for Service Composition.- Construction of Quality Test and Certification System for Package Software.- Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.- Goal Programming Approach to Compose the Web Service Quality of Service.- Healthcare Home Service System Based on Distributed Object Group Framework.- A Learning Attitude Evaluation System for Learning Concentration on Distance Education.- A Calculation Method for Direction Based Handover Rate in Cell Based Mobile Networks.- The Classification of the Software Quality by Employing the Tolerence Class.- Components Searching System Using Component Identifiers and Request Specifics.- Software Architecture Generation on UML.- Distributed Programming Developing Tool Based on Distributed Object Group Framework.- A Study on Automatic Code Generation Tool from Design Patterns Based on the XMI.- Design of Opportunity Tree for Organization's Process Strategy Decision-Making Based on SPICE Assessment Experience.- SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM System.- Design of Mobile Video Player Based on the WIPI Platform.- Discovering Patterns Based on Fuzzy Logic Theory.- Metrics Design for Software Process Assessment Based on ISO/IEC 15504.- A Quantitative Evaluation Model Using the ISO/IEC 9126 Quality Model in the Component Based Development Process.- Component Specification Model for the Web Services.- A Data-Driven Approach to Constructing an Ontological Concept Hierarchy Based on the Formal Concept Analysis.- Web-Document Filtering Using Concept Graph.- Development of Integrated DAO Pattern Applying Iterator Pattern.- A Coupling Metric Applying the Characteristics of Components.- Software Process Improvement Environment.- A Design Technique of CBD Meta-model Based on Graph Theory.- Description Technique for Component Composition Focusing on Black-Box View.- XML Security Model for Secure Information Exchange in E-Commerce.- Design and Implementation of B2Bi Collaboration Workflow Tool Based on J2EE.- Traffic-Predicting A Routing Algorithm Using Time Series Models.- A Study on Software Architecture Evaluation.- RFID-Based ALE Application Framework Using Context-Based Security Service.- A Study on the Standard of Software Quality Testing.- Scene Change Detection Using the Weighted Chi-Test and Automatic Threshold Decision Algorithm.- Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO.- CTL Model Checking for Boolean Program.- General Tracks.- Grid Service Implementation of Aerosol Optical Thickness Retrieval over Land from MODIS.- Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains.- Nailfold Capillary Microscopy High-Resolution Image Analysis Framework for Connective Tissue Disease Diagnosis Using Grid Computing Technology.- EFH: An Edge-Based Fast Handover for Mobile IPv6 in IEEE 802.11b WLAN.- An Extendible Hashing Based Recovery Method in a Shared-Nothing Spatial Database Cluster.- A Quantitative Justification to Partial Replication of Web Contents.- Content Distribution Strategy Using Web-Cached Multicast Technique.- Load Distribution Strategies in Cluster-Based Transcoding Servers for Mobile Clients.- Safety of Recovery Protocol Preserving MW Session Guarantee in Mobile Systems.

Produktinformationen

Titel: Computational Science and Its Applications - ICCSA 2006
Untertitel: International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV
Editor:
EAN: 9783540340782
Digitaler Kopierschutz: Wasserzeichen
Format: E-Book (pdf)
Hersteller: Springer-Verlag GmbH
Genre: IT & Internet
Anzahl Seiten: 1191
Veröffentlichung: 11.05.2006
Dateigrösse: 23.5 MB

Weitere Bände aus der Buchreihe "Lecture Notes in Computer Science"