Willkommen, schön sind Sie da!
Logo Ex Libris

Computational Science and Its Applications - ICCSA 2008

  • Kartonierter Einband
  • 1348 Seiten
(0) Erste Bewertung abgeben
Bewertungen & Rezensionen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
Leseprobe
This two-volume set is assembled following the 2008 International Conference on Computational Science and Its Applications, ICCSA ... Weiterlesen
20%
211.00 CHF 168.80
Sie sparen CHF 42.20
Print on Demand - Auslieferung erfolgt in der Regel innert 4 bis 6 Wochen.
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

This two-volume set is assembled following the 2008 International Conference on Computational Science and Its Applications, ICCSA 2008, a premium int- national event held in Perugia, Italy, from June 30 to July 3, 2008. The collection of fully refereed high-quality original works accepted as theme papers for presentation at ICCSA 2008 are published in this LNCS proceedings set. This outstanding collection complements the volume of workshop papers, traditionally published by IEEE Computer Society. The continuous support of computational science researchers has helped ICCSA to become a ?rmly established forum in the area of scienti?c computing and the conference itself become a recurring scienti?c and professional meeting that cannot be given up. The computational science ?eld, based on fundamental disciplines such as mathematics, physics, and chemistry, is ?nding new computational approaches to foster the human progress in heterogeneous and fundamental areas such as aerospace and automotive industries, bioinformatics and nanotechnology studies, networks and grid computing, computational geometry and biometrics, computer education, virtual reality, and art. Due to the growing complexity of many ch- lenges in computational science, the use of sophisticated algorithms and eme- ing technologies is inevitable. Together, these far-reaching scienti?c areas help to shape this conference in the areas of state-of-the-art computational science research and applications, encompassing the facilitating theoretical foundations and the innovative applications of such results in other areas.

Klappentext

The two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2008, held in Perugia, Italy in June/July 2008.

The two volumes contain papers presenting a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in virtually all sciences making use of computational techniques. The topics of the refereed papers are structured according to the five major conference themes: computational methods, algorithms and applications, high performance technical computing and networks, advanced and emerging applications, geometric modelling, graphics and visualization, information systems and information technologies.



Inhalt
Workshop on Information Systems and Information Technologies (ISIT 2008).- A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.- Using the Self-Organizing Map (SOM) Algorithm, as a Prototype E-Content Retrieval Tool.- Method of Extract Changing Scene in Animation.- Improved Curvature Scale Space Based on Image Retrieval Using Dynamic Time Warping.- Recovery Schemes for Fast Fault Recovery on GMPLS Network.- Efficient Facial Features Warping Using BSM (Bayesian Shape Model).- Background Separation in Motion Picture Using Presumptive Eyes Position and Different Image.- Workshop on Information Systems and Information Technologies (ISIT 2008).- An X3D Approach to Neuro-Rehabilitation.- User Technology Readiness Measurement in Fingerprint Adoption at Higher Education Institution.- Web Usability on the Nintendo Wii Platform.- Volterra Algorithm for Modelling Sea Surface Current Circulation from Satellite Altimetry Data.- User-Centered Design of Web Pages.- Gesture Based Interface for Crime Scene Analysis: A Proposal.- Script Language Generation Techniques for 3D Avatar Control Using User Annotation.- Perception Based Representation of Female Avatar.- Blended GIS Studies Model the Work of a Forest Expert.- Towards Standards-Based Processing of Digital Elevation Models for Grid Computing through Web Processing Service (WPS).- Workshop on Ubiquitous Web Systems and Intelligence (UWSI 2008).- Identifying Spam Web Pages Based on Content Similarity.- Categorical Data Clustering Using the Combinations of Attribute Values.- Generating Fuzzy Equivalence Classes on RSS News Articles for Retrieving Correlated Information.- An On-theFlight Proxy System for Multi-format Web Content Transcoding for Mobile Devices.- A Semantic-Based Fully Visual Application for Context-Aware Matchmaking and Request Refinement in Ubiquitous Computing.- A Profile Modelling Approach for E-Learning Systems.- Modeling and Analyzing Variability for Mobile Information Systems.- A Glance on Current XML Twig Pattern Matching Algorithms.- Model-Based Evolution of an E-Learning Environment Based on Desktop Computer to Mobile Computing.- Workshop on Wireless and Ad-Hoc Networking (WAD 2008).- An Effective Data Processing Method for Fast Clustering.- MyGuide: A Mobile Context-Aware Exhibit Guide System.- Resource Management through Resource Virtualization in Distributed Network Environments.- A Cost-Effective Mobile Video Streaming with an Adaptive Control of Inter-packet Delays.- Scene Change Detection Using a Local Detection Tree and Clustering in Ubiquitous Environment.- Shot Boundary Detection Using a Global Decision Tree in Ubiquitous Environment.- A Handover Scheme Supporting the Buffer Management in B3G Networks.- Weighted MDS for Sensor Localization.- A Comparative Study of Directional Node-Disjoint Multipath Routing in Wireless Ad Hoc Network.- Multipath Routing Scheme for Wireless Multihop Network.- Improvement of on Demand Multicast Routing Protocol in Ad Hoc Networks to Achieve Good Scalability and Reliability.- Workshop on Internet Communication Security (WICS 2008).- Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol.- AFPL, an Abstract Language Model for Firewall ACLs.- The Design and Message Complexity of Secure Socket SCTP.- Queueing Analysis for Networks Under DoS Attack.- New E-Payment Scenarios in an Extended Version of the Traditional Model.- Enhancing an Integer Challenge-Response Protocol.- Workshop on Integrated Methods and Algorithms for Non-Destructive Evaluations of Concrete Structures (IMANDECS 2008).- Non-Destructive Technique for Defect Localization in Concrete Structures Based on Ultrasonic Wave Propagation.- Development of a Finite Element Code for Non-Destructive Evaluation of Concrete Structures by Means of Ultrasonic Waves.- Time, Wavelet and Hilbert-Huang Domain Analysis of Signals from Ultrasonic Based Equipment for the Non Destructive Evaluation of Concrete and Brick Masonry Walls.- Acoustic NDT on Building Materials Using Features Extraction Techniques.- Acoustic Tomography for Non Destructive Testing of Stone Masonry.- Time and Frequency Approaches to Non Destructive Testing in Concrete Pillars Using Neural Networks.- Innovative Methodology for IR Acquisition.- General Track on Computational Methods, Algorithms and Applications.- A Splitting Scheme for Large-Scale Atmosphere Dynamics Models.- A Unique Complexity Metric.- Measuring Complexity of Object Oriented Programs.- Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators.- Colonial Competitive Algorithm as a Tool for Nash Equilibrium Point Achievement.- Enhanced Empirical Mode Decomposition.- Time-Space FE-PDAS Method for Dynamic Unilateral Contact Problem in Viscoelasticity.- Parallel Implementation of Complexity Reduction Approach to Fourth Order Approximation on 2D Free Space Wave Propagation.- CollocationBased Two Step RungeKutta Methods for Ordinary Differential Equations.- Analysing the Dependence between Variance and Mean Estimated Values: A Theoretical and Experimental Approach.- Feasibility and Dominance Rules in the Electromagnetism-Like Algorithm for Constrained Global Optimization.- Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography.- A Flow Deviation Algorithm for Joint Optimization of Unicast and Anycast Flows in Connection-Oriented Networks.- Scheduling of Updates in an IP Forwarding Engine with Partitioned Prefix Tables.- General Track on High Performance Technical Computing and Networks.- Path Generation Issues for Survivable Network Design.- Semi-systolic Modular Multiplier over GF(2m).- Network-Aware Replica Optimization in the SCoPE Grid Infrastructure.- Fault-Tolerant Cluster Management Tool for Supporting Nonstop of Cluster DBMS.- Finding Synchronization-Free Slices of Operations in Arbitrarily Nested Loops.- Simulation Analysis for the Pricing of Bond Option on Arbitrage-Free Models with Jump.- The Two-Criteria Gateways Location and Topology Assignment Problem in Hierarchical WANs: An Exact Algorithm and Computational Results.- A Control Packet Minimized Routing Protocol for Ad-Hoc Wireless Networks.- A New Paradigm for Prioritizing Multiple Class Services in Optical Burst Switched Networks.- Increasing the Scalability and the Speedup of a Fish School Simulator.- General Track on Advanced and Emerging Applications.- Hopfield Neural Network for Sea Surface Current Tracking from Tiungsat-1 Data.- Generator of Synthetic Rainfall Time Series through Markov Hidden States.- Splitting the Unity, Bisecting a Graph: Applications to Stochastic Boolean Systems.- Estimating Metabolic Pathways Parameters Using Distributed Monte Carlo Method.- Parallel Actions and Generalized Multivalued Constraints in Multivalued Planning.- An Adaptive Multi Pattern Scheme for Fast Block Motion Estimation.- DCT and PCA Based Method for Shape from Focus.- Formula-Dependent Abstraction for CTL Model Checking.- Navigating the New Product Process from Strategic Viewpoint.- Using EDP-Polynomials for Network Structure Optimization.- On Sharp Estimating of Bond Option Prices for Heath-Jarrow-Morton Model Based on Jump.- Analysis of Interhelical Angle and Sequential Distance in Proteins.- Classification of Ligase Function Based on Multi-parametric Feature Extracted from Protein Sequence.- Thai Sign Language Translation Using Fuzzy C-Means and Scale Invariant Feature Transform.- Statistical Prediction for the Pricing of Bond Using Random Number Generation.- Applied Statistical Indicators to the Vehicle Routing Problem with Time Windows for Discriminate Appropriately the Best Algorithm.- The ASRS_RL A Research Platform for Spoken Language Recognition and Understanding Experiments.- A Method for Automatic Text Categorization Using Word Sense Disambiguation.- On Regularization Parameters Estimation in EdgePreserving Image Reconstruction.- General Track on Information Systems and Information Technologies.- Table Based Single Pass Algorithm for Clustering News Articles in NewsPage.com.- On Developing Methods for XML Databases.- A Mixed Approach for Data Warehouse Conceptual Design with MDA.- A New Bitmap Index and a New Data Cube Compression Technology.- Network Stability Assessment Using the Number of Tree Adjacent to an Articulation Node.- Discovering Knowledge from Local Patterns with Global Constraints.- SQL/XML Performance Analysis of Parent/Ancestor Queries.

Produktinformationen

Titel: Computational Science and Its Applications - ICCSA 2008
Untertitel: International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II
Editor:
EAN: 9783540698401
ISBN: 354069840X
Format: Kartonierter Einband
Herausgeber: Springer Berlin Heidelberg
Genre: Informatik
Anzahl Seiten: 1348
Gewicht: 2009g
Größe: H235mm x B155mm x T71mm
Jahr: 2008
Untertitel: Englisch
Auflage: 2008

Weitere Produkte aus der Reihe "Lecture Notes in Computer Science"