Willkommen, schön sind Sie da!
Logo Ex Libris

Computational Science and Its Applications - ICCSA 2006

  • Kartonierter Einband
  • 1243 Seiten
(0) Erste Bewertung abgeben
Bewertungen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA ... Weiterlesen
CHF 179.00
Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 811, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA 2006. Computational science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental theore- cal research as well as endeavors in emerging ?elds. Together, these far-reaching scienti?c areas contributed to shaping this conference in the realms of state-- the-art computational science researchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.

Part III of the five-volume refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006

Presents 664 papers organized according to the five major conference themes

Themes include computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies



Inhalt
Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A).- A Security Requirement Management Database Based on ISO/IEC 15408.- Development of Committee Neural Network for Computer Access Security System.- C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model.- Design and Fabrication of Security and Home Automation System.- PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design.- Experiments and Hardware Countermeasures on Power Analysis Attacks.- Information System Modeling for Analysis of Propagation Effects and Levels of Damage.- A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks.- A VLSM Address Management Method for Variable IP Subnetting.- SDSEM: Software Development Success Evolution Model.- A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks.- Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications.- The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks.- Ontology-Based Information Search in the Real World Using Web Services.- An Active Node Set Maintenance Scheme for Distributed Sensor Networks.- Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment.- Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector.- Applying Product Line to the Embedded Systems.- Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold.- Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents.- Design of H.264/AVC-Based Software Decoder for Mobile Phone.- Transforming a Legacy System into Components.- Pseudorandom Number Generator Using Optimal Normal Basis.- Efficient Nonce-Based Authentication Scheme Using Token-Update.- An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool.- A Prediction Method of Network Traffic Using Time Series Models.- An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions.- Intersection Simulation System Based on Traffic Flow Control Framework.- A HIICA(Highly-Improved Intra CA) Design for M-Commerce.- Highly Reliable Synchronous Stream Cipher System for Link Encryption.- Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network.- Hybrid Image Mosaic Construction Using the Hierarchical Method.- Workshop on Applied Cryptography and Information Security (ACIS 2006).- Public Key Encryption with Keyword Search Based on K-Resilient IBE.- A Generic Construction of Secure Signatures Without Random Oracles.- A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption.- Traceable Signature: Better Efficiency and Beyond.- On the TYS Signature Scheme.- Efficient Partially Blind Signatures with Provable Security.- A Framework for Robust Group Key Agreement.- BGN Authentication and Its Extension to Convey Message Commitments.- New Security Problem in RFID Systems Tag Killing.- A Model for Security Vulnerability Pattern.- A New Timestamping Scheme Based on Skip Lists.- A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.- New Constructions of Universal Hash Functions Based on Function Sums.- Analysis of Fast Blockcipher-Based Hash Functions.- Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms.- Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.- Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture.- Workshop on Internet Communications Security (WICS 2006).- Security Weaknesses in Two Proxy Signature Schemes.- A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths.- Comparative Analysis of IPv6 VPN Transition in NEMO Environments.- A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream.- Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO.- An Inter-domain Key Agreement Protocol Using Weak Passwords.- A Practical Solution for Distribution Rights Protection in Multicast Environments.- Audit-Based Access Control in Nomadic Wireless Environments.- Workshop on Optimization: Theories and Applications (OTA 2006).- Cost Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems.- The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution.- Satisfying Constraints for Locating Export Containers in Port Container Terminals.- A Price Discrimination Modeling Using Geometric Programming.- Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation.- Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning.- Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain.- Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area.- Scheduling an R&D Project with Quality-Dependent Time Slots.- The Bottleneck Tree Alignment Problems.- Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers.- Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment.- Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex.- A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment.- Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method.- Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks.- An Entropy Based Group Setup Strategy for PCB Assembly.- Cross-Facility Production and Transportation Planning Problem with Perishable Inventory.- A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload.- Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times.- The Maximum Integer Multiterminal Flow Problem.- Routing with Early Ordering for Just-In-Time Manufacturing Systems.- A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks.- On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers.- Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk.- Two-Server Network Disconnection Problem.- One-Sided Monge TSP Is NP-Hard.- On Direct Methods for Lexicographic Min-Max Optimization.- Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing.- Linear Convergence of Tatônnement in a Bertrand Oligopoly.- Design for Using Purpose of Assembly-Group.- A Conditional Gaussian Martingale Algorithm for Global Optimization.- Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks.- A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process.- Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem.- An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations.- A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps.- Global Optimization of the Scenario Generation and Portfolio Selection Problems.- A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation.- Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers.- A Group Search Optimizer for Neural Network Training.- Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem.- General Tracks.- Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks.- An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling.- Static Analysis Based Software Architecture Recovery.- A First Approach to a Data Quality Model for Web Portals.- Design for Environment-Friendly Product.- Performance of HECC Coprocessors Using Inversion-Free Formulae.- Metrics of Password Management Policy.- Using UML Packages for Designing Secure Data Warehouses.- Practical Attack on the Shrinking Generator.- A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems.- Stochastic Simulation Method for the Term Structure Models with Jump.- The Ellipsoidal l p Norm Obnoxious Facility Location Problem.- On the Performance of Recovery Rate Modeling.- Using Performance Profiles to Evaluate Preconditioners for Iterative Methods.- Multicast ?-Trees Based on Statistical Analysis.- The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results.- Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management.- The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks.- An Efficient Multicast Tree with Delay and Delay Variation Constraints.- Algorithms on Extended (?, ?)-Matching.- SOM and Neural Gas as Graduated Nonconvexity Algorithms.- Analysis of Multi-domain Complex Simulation Studies.- A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance.- Robust Fault Matched Optical Flow Detection Using 2D Histogram.- Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform.- Optimal Edge Detection Using Perfect Sharpening of Ramp Edges.- Eye Tracking Using Neural Network and Mean-Shift.- The Optimal Feature Extraction Procedure for Statistical Pattern Recognition.- A New Approach for Human Identification Using Gait Recognition.- Erratum.- A Security Requirement Management Database Based on ISO/IEC 15408.

Produktinformationen

Titel: Computational Science and Its Applications - ICCSA 2006
Untertitel: International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III
Editor:
EAN: 9783540340751
ISBN: 978-3-540-34075-1
Format: Kartonierter Einband
Herausgeber: Springer, Berlin
Genre: Informatik
Anzahl Seiten: 1243
Größe: H235mm x B235mm x T155mm
Jahr: 2006
Untertitel: Englisch
Auflage: 2006

Weitere Produkte aus der Reihe "Lecture Notes in Computer Science"