Tiefpreis
CHF143.20
Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 811, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA 2006. Computational science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental theore- cal research as well as endeavors in emerging ?elds. Together, these far-reaching scienti?c areas contributed to shaping this conference in the realms of state-- the-art computational science researchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.
Part IV of the five-volume refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006
Presents 664 papers organized according to the five major conference themes
Themes include computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies
Inhalt
Workshop on Ubiquitous Web Systems and Intelligence (UWSI 2006).- Message Transport Interface for Efficient Communication Between Agent Framework and Event Service.- An Ontology-Based Context Model in a Smart Home.- Service Mobility Manager for OSGi Framework.- A Ubiquitous Workflow Service Framework.- Self Organizing Sensor Networks Using Intelligent Clustering.- Searching and Selecting Web Services Using Case Based Reasoning.- Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks.- Content Delivery with Spatial Caching Scheme in Mobile Wireless Networks.- Higher Education Web Information System Usage Analysis with a Data Webhouse.- A User Management System for Federated Databases Using Web Services.- A Dynamic Evaluation Framework for Mobile Applications.- SOAM: An Environment Adaptation Model for the Pervasive Semantic Web.- Implementing the MPEG-21 Adaptation Quality of Service in Dynamic Environments.- A Middleware Architecture Determining Application Context Using Shared Ontology.- Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing Environments.- Designing and Implementing Physical Hypermedia Applications.- Replicated Ubiquitous Nets.- Design of a Shared Ontology Used for Translating Negotiation Primitives.- A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements.- Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for Bluetooth.- ECA Rule Component for Timely Collaboration of Web-Based Distributed Business Systems.- Dynamic Approach for Integrating Web Data Warehouses.- Location Aware Business Process Deployment.- A Framework for Rapid Development of RFID Applications.- Workshop on Ubiquitous Application and Security Service (UASS 2006).- A Flexible DRM System Considering Ubiquitous Environment.- User Centric Intelligent IPMPS in Ubi-Home.- The Design and Development of a Secure Keystroke System for u Business.- Linkability of a Blind Signature Scheme and Its Improved Scheme.- A Noble Structural Model for e-Learning Services in Ubiquitous Environment.- Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms.- Design of the Configurable Clothes Using Mobile Actuator-Sensor Network.- Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure.- Counting-Based Distance Estimations and Localizations in Wireless Sensor Networks.- Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System.- Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification.- Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes.- Tracking Illegal System Access in a Ubiquitous Environment Proposal for ATS, a Traceback System Using STOP.- Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.- A Security Model for Home Networks with Authority Delegation.- An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption.- Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.- An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing Environment.- Efficient User Authentication and Key Agreement in Ubiquitous Computing.- Single Sign-On and Key Establishment for Ubiquitous Smart Environments.- A Light Weight Authentication Protocol for Digital Home Networks.- Smart Home Microcontroller: Telephone Interfacing.- SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network.- Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks.- The Performance Analysis of UWB System for the HD Multimedia Communication in a Home Network.- Extraction of Implicit Context Information in Ubiquitous Computing Environments.- Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive Interactions.- An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTS.- Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing Environments.- A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time Constraints.- Workshop on Embedded System for Ubiquitous Computing (ESUC 2006).- Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks.- Wireless Sensor Networks: A Scalable Time Synchronization.- A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor Networks.- Two-Dimensional Priority Scheduling Scheme for Open Real-Time Systems.- An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control Systems.- Adaptive Load Balancing Mechanism for Server Cluster.- Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster Computing.- A Method for Efficient Malicious Code Detection Based on Conceptual Similarity.- A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault Detection.- Efficient Exponentiation in GF(p m ) Using the Frobenius Map.- A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc Networks.- A Power-Efficient Design Employing an Extreme Condition Detector for Embedded Systems.- An Efficient Delay Metric on RC Interconnects Under Saturated Ramp Inputs.- Low Power Microprocessor Design for Embedded Systems.- History Length Adjustable gshare Predictor for High-Performance Embedded Processor.- Workshop on Information Engineering and Applications in Ubiquitous Computing Environments (IEAUCE 2006).- Security Engineering Methodology Based on Problem Solving Theory.- Design and Implementation of an Ontology Algorithm for Web Documents Classification.- Automatic Test Approach of Web Application for Security (AutoInspect).- A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network Middlewares.- Session Key Agreement Protocol for End-to-End Security in MANET.- Process-Oriented DFM System for Ubiquitous Devices.- A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-Logistics.- Information Security Management System for SMB in Ubiquitous Computing.- A Study on the Development of U…