, , , , , , e.a.

Computational Science and Its Applications - ICCSA 2006

International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III

Paperback Engels 2006 9783540340751
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. The volumes present a total of 664 papers organized according to the five major conference themes: computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies. This is Part III.

Specificaties

ISBN13:9783540340751
Taal:Engels
Bindwijze:paperback
Uitgever:Springer Berlin Heidelberg

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A).- A Security Requirement Management Database Based on ISO/IEC 15408.- Development of Committee Neural Network for Computer Access Security System.- C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model.- Design and Fabrication of Security and Home Automation System.- PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design.- Experiments and Hardware Countermeasures on Power Analysis Attacks.- Information System Modeling for Analysis of Propagation Effects and Levels of Damage.- A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks.- A VLSM Address Management Method for Variable IP Subnetting.- SDSEM: Software Development Success Evolution Model.- A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks.- Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications.- The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks.- Ontology-Based Information Search in the Real World Using Web Services.- An Active Node Set Maintenance Scheme for Distributed Sensor Networks.- Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment.- Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector.- Applying Product Line to the Embedded Systems.- Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold.- Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents.- Design of H.264/AVC-Based Software Decoder for Mobile Phone.- Transforming a Legacy System into Components.- Pseudorandom Number Generator Using Optimal Normal Basis.- Efficient Nonce-Based Authentication Scheme Using Token-Update.- An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool.- A Prediction Method of Network Traffic Using Time Series Models.- An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions.- Intersection Simulation System Based on Traffic Flow Control Framework.- A HIICA(Highly-Improved Intra CA) Design for M-Commerce.- Highly Reliable Synchronous Stream Cipher System for Link Encryption.- Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network.- Hybrid Image Mosaic Construction Using the Hierarchical Method.- Workshop on Applied Cryptography and Information Security (ACIS 2006).- Public Key Encryption with Keyword Search Based on K-Resilient IBE.- A Generic Construction of Secure Signatures Without Random Oracles.- A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption.- Traceable Signature: Better Efficiency and Beyond.- On the TYS Signature Scheme.- Efficient Partially Blind Signatures with Provable Security.- A Framework for Robust Group Key Agreement.- BGN Authentication and Its Extension to Convey Message Commitments.- New Security Problem in RFID Systems “Tag Killing”.- A Model for Security Vulnerability Pattern.- A New Timestamping Scheme Based on Skip Lists.- A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.- New Constructions of Universal Hash Functions Based on Function Sums.- Analysis of Fast Blockcipher-Based Hash Functions.- Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms.- Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.- Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture.- Workshop on Internet Communications Security (WICS 2006).- Security Weaknesses in Two Proxy Signature Schemes.- A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths.- Comparative Analysis of IPv6 VPN Transition in NEMO Environments.- A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream.- Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO.- An Inter-domain Key Agreement Protocol Using Weak Passwords.- A Practical Solution for Distribution Rights Protection in Multicast Environments.- Audit-Based Access Control in Nomadic Wireless Environments.- Workshop on Optimization: Theories and Applications (OTA 2006).- Cost – Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems.- The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution.- Satisfying Constraints for Locating Export Containers in Port Container Terminals.- A Price Discrimination Modeling Using Geometric Programming.- Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation.- Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning.- Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain.- Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area.- Scheduling an R&D Project with Quality-Dependent Time Slots.- The Bottleneck Tree Alignment Problems.- Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers.- Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment.- Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex.- A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment.- Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method.- Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks.- An Entropy Based Group Setup Strategy for PCB Assembly.- Cross-Facility Production and Transportation Planning Problem with Perishable Inventory.- A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload.- Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times.- The Maximum Integer Multiterminal Flow Problem.- Routing with Early Ordering for Just-In-Time Manufacturing Systems.- A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks.- On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers.- Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk.- Two-Server Network Disconnection Problem.- One-Sided Monge TSP Is NP-Hard.- On Direct Methods for Lexicographic Min-Max Optimization.- Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing.- Linear Convergence of Tatônnement in a Bertrand Oligopoly.- Design for Using Purpose of Assembly-Group.- A Conditional Gaussian Martingale Algorithm for Global Optimization.- Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks.- A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process.- Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem.- An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations.- A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps.- Global Optimization of the Scenario Generation and Portfolio Selection Problems.- A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation.- Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers.- A Group Search Optimizer for Neural Network Training.- Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem.- General Tracks.- Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks.- An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling.- Static Analysis Based Software Architecture Recovery.- A First Approach to a Data Quality Model for Web Portals.- Design for Environment-Friendly Product.- Performance of HECC Coprocessors Using Inversion-Free Formulae.- Metrics of Password Management Policy.- Using UML Packages for Designing Secure Data Warehouses.- Practical Attack on the Shrinking Generator.- A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems.- Stochastic Simulation Method for the Term Structure Models with Jump.- The Ellipsoidal l p Norm Obnoxious Facility Location Problem.- On the Performance of Recovery Rate Modeling.- Using Performance Profiles to Evaluate Preconditioners for Iterative Methods.- Multicast ?-Trees Based on Statistical Analysis.- The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results.- Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management.- The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks.- An Efficient Multicast Tree with Delay and Delay Variation Constraints.- Algorithms on Extended (?, ?)-Matching.- SOM and Neural Gas as Graduated Nonconvexity Algorithms.- Analysis of Multi-domain Complex Simulation Studies.- A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance.- Robust Fault Matched Optical Flow Detection Using 2D Histogram.- Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform.- Optimal Edge Detection Using Perfect Sharpening of Ramp Edges.- Eye Tracking Using Neural Network and Mean-Shift.- The Optimal Feature Extraction Procedure for Statistical Pattern Recognition.- A New Approach for Human Identification Using Gait Recognition.- Erratum.- A Security Requirement Management Database Based on ISO/IEC 15408.

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Computational Science and Its Applications - ICCSA 2006