Willkommen, schön sind Sie da!
Logo Ex Libris

Computer and Information Sciences - ISCIS 2005

  • Kartonierter Einband
  • 974 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
This volume collects a subset of the high-quality papers that were accepted for presentationatthe20thInternationalSymposiumonCompu... Weiterlesen
197.00 CHF 157.60
Sie sparen CHF 39.40
Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
Bestellung & Lieferung in eine Filiale möglich


This volume collects a subset of the high-quality papers that were accepted for presentationatthe20thInternationalSymposiumonComputerandInformation Sciences (ISCIS). ISCIS 2005 was organized by the Department of Computer Engineering of Bo? gazi ci University and was held in Istanbul, Turkey during 26 28October,2005. Following on the success of previous ISCIS symposia, ISCIS 2005 attracted a total of 491 papers. The submitted papers went through a rigorous subm- sion period with the help of the Program Committee and external reviewers. Keeping up with the tradition of previous editions of ISCIS, the selected papers covera wide spectrum of topicsin computer and information sciences.The main topics of ISCIS 2005 can be listed as: computer networks, sensor and satellite networks,securityand cryptography,performanceevaluation,databasesystems, algorithms,multiagentsystems,e-commerce,machinelearning,naturallanguage processing and information retrieval, image and speech processing, and theory of computing. In addition to the paper presentations, the symposium enjoyed four invited talks. The honorary chair of ISCIS 2005, Erol Gelenbe from Imperial College, London, gave a talk on a probability model of natural or arti?cial infection. The second talk was by Onn Shehory of IBM Haifa Research Labs, on online auctions. JacquesStern from EcoleNormaleSup erieure,France, focused his talk on alternatives to RSA. The last invited speaker, Yanghee Choi from Seoul National University, Korea, delivered a talk on location and address issues in ubiquitous computing.

Invited Speakers.- Keeping Viruses Under Control.- Online Auctions: Notes on Theory, Practice, and the Role of Agents.- Computer Networks.- A Unified Approach to Survivability of Connection-Oriented Networks.- SCTP Based Framework for Mobile Web Agent.- An Agent-Based Scheme for Efficient Multicast Application in Mobile Networks.- An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theorem.- Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks.- An Efficient On-line Job Admission Control Scheme to Guarantee Deadlines for QoS-Demanding Applications.- A Methodology of Resilient MPLS/VPN Path Management Under Multiple Link Failures.- Sensor and Satellite Networks.- Comparison of Hyper-DAG Based Task Mapping and Scheduling Heuristics for Wireless Sensor Networks.- A Markov-Based Model to Analyze the Temporal Evolution and Lifetime of a Sensor Network.- Power-Efficient Seamless Publishing and Subscribing in Wireless Sensor Networks.- Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting.- IP Traffic Load Distribution in NGEO Broadband Satellite Networks (Invited Paper).- Cross-Layer Management of Radio Resources in an Interactive DVB-RCS-Based Satellite Network(Invited Paper).- Aggressive Back off Strategy in Congestion Management Algorithm for DBS-RCS (Invited Paper).- TCP-Peach++: Enhancement of TCP-Peach+ for Satellite IP Networks with Asymmetrical Bandwidth and Persistent Fades(Invited Paper).- Security and Cryptography.- Automatic Translation of Serial to Distributed Code Using CORBA Event Channels.- Fault Tolerant and Robust Mutual Exclusion Protocol for Synchronous Distributed Systems.- Exact Best-Case End-to-End Response Time Analysis for Hard Real-Time Distributed Systems.- A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network.- A Generic Policy-Conflict Handling Model.- A Truly Random Number Generator Based on a Continuous-Time Chaotic Oscillator for Applications in Cryptography.- A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers.- SVM Approach with a Genetic Algorithm for Network Intrusion Detection.- Performance Evaluation.- Modeling Access Control Lists with Discrete-Time Quasi Birth-Death Processes.- Stochastic Bounds on Partial Ordering: Application to Memory Overflows Due to Bursty Arrivals.- QoS Evaluation Method in Multimedia Applications Using a Fuzzy Genetic Rule-Based System.- Impact of Setup Message Processing and Optical Switch Configuration Times on the Performance of IP over Optical Burst Switching Networks.- Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation.- Computing Communities in Large Networks Using Random Walks.- Fame as an Effect of the Memory Size.- Keeping Viruses Under Control.- Distributed Evaluation Using Multi-agents.- Classification of Volatile Organic Compounds with Incremental SVMs and RBF Networks.- E-Commerce and Web Services.- Agent Based Dynamic Execution of BPEL Documents.- A Fair Multimedia Exchange Protocol.- A Pervasive Environment for Location-Aware and Semantic Matching Based Information Gathering.- A Web Service Platform for Web-Accessible Archaeological Databases.- A WSDL Extension for Performance-Enabled Description of Web Services.- A Novel Authorization Mechanism for Service-Oriented Virtual Organization.- Metrics, Methodology, and Tool for Performance-Considered Web Service Composition.- Brazilian Software Process Reference Model and Assessment Method.- Multiagent Systems.- A Secure Communication Framework for Mobile Agents.- A Novel Algorithm for the Coordination of Multiple Mobile Robots.- Multiagent Elite Search Strategy for Combinatorial Optimization Problems.- Managing Theories of Trust in Agent Based Systems.- Applying Semantic Capability Matching into Directory Service Structures of Multi Agent Systems.- Self-organizing Distribution of Agents over Hosts.- Machine Learning.- Evolutionary Design of Group Communication Schedules for Interconnection Networks.- Memetic Algorithms for Nurse Rostering.- Discretizing Continuous Attributes Using Information Theory.- System Identification Using Genetic Programming and Gene Expression Programming.- ARKAQ-Learning: Autonomous State Space Segmentation and Policy Generation.- Signature Verification Using Conic Section Function Neural Network.- Fusion of Rule-Based and Sample-Based Classifiers Probabilistic Approach.- Construction of a Learning Automaton for Cycle Detection in Noisy Data Sequences.- Information Retrieval and Natural Language Processing.- A New Trend Heuristic Time-Variant Fuzzy Time Series Method for Forecasting Enrollments.- Using GARCH-GRNN Model to Forecast Financial Time Series.- Boosting Classifiers for Music Genre Classification.- Discriminating Biased Web Manipulations in Terms of Link Oriented Measures.- ORF-NT: An Object-Based Image Retrieval Framework Using Neighborhood Trees.- Text Categorization with Class-Based and Corpus-Based Keyword Selection.- Aligning Turkish and English Parallel Texts for Statistical Machine Translation.- The Effect of Windowing in Word Sense Disambiguation.- Pronunciation Disambiguation in Turkish.- Image and Speech Processing.- Acoustic Flow and Its Applications.- A DCOM-Based Turkish Speech Recognition System: TREN Turkish Recognition ENgine.- Speaker Recognition in Unknown Mismatched Conditions Using Augmented PCA.- Real Time Isolated Turkish Sign Language Recognition from Video Using Hidden Markov Models with Global Features.- An Animation System for Fracturing of Rigid Objects.- 2D Shape Tracking Using Algebraic Curve Spaces.- A Multi-camera Vision System for Real-Time Tracking of Parcels Moving on a Conveyor Belt.- Selection and Extraction of Patch Descriptors for 3D Face Recognition.- Implementation of a Video Streaming System Using Scalable Extension of H.264.- Blotch Detection and Removal for Archive Video Restoration.- Performance Study of an Image Restoration Algorithm for Bursty Mobile Satellite Channels.- Algorithms and Database Systems.- Polymorphic Compression.- Efficient Adaptive Data Compression Using Fano Binary Search Trees.- Word-Based Fixed and Flexible List Compression.- Effective Early Termination Techniques for Text Similarity Join Operator.- Multimodal Video Database Modeling, Querying and Browsing.- Semantic Load Shedding for Prioritized Continuous Queries over Data Streams.- Probabilistic Point Queries over Network-Based Movements.- Effective Clustering by Iterative Approach.- Recursive Lists of Clusters: A Dynamic Data Structure for Range Queries in Metric Spaces.- Incremental Clustering Using a Core-Based Approach.- Indexing of Sequences of Sets for Efficient Exact and Similar Subsequence Matching.- An Investigation of the Course-Section Assignment Problem.- Crympix: Cryptographic Multiprecision Library.- Optimal Control for Real-Time Feedback Rate-Monotonic Schedulers.- Graphical User Interface Development on the Basis of Data Flows Specification.- Theory of Computing.- Generalizing Redundancy Elimination in Checking Sequences.- A Computable Version of Dini's Theorem for Topological Spaces.- Improved Simulation of Quantum Random Walks.- An Alternative Proof That Exact Inference Problem in Bayesian Belief Networks Is NP-Hard.- Recovering the Lattice of Repetitive Sub-functions.- Epilogue.- Erol Gelenbe's Career and Contributions.


Titel: Computer and Information Sciences - ISCIS 2005
Untertitel: 20th International Symposium, Istanbul, Turkey, October 26 -- 28, 2005, Proceedings
EAN: 9783540294146
ISBN: 978-3-540-29414-6
Format: Kartonierter Einband
Herausgeber: Springer, Berlin
Genre: Informatik
Anzahl Seiten: 974
Gewicht: 1450g
Größe: H55mm x B234mm x T153mm
Jahr: 2005
Untertitel: Englisch
Auflage: 2005

Weitere Produkte aus der Reihe "Lecture Notes in Computer Science"