This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 8–11, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA 2006. Computational science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental theore- cal research as well as endeavors in emerging ?elds. Together, these far-reaching scienti?c areas contributed to shaping this conference in the realms of state-- the-art computational science researchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.
Author(s): Sang Yong Park, Hee Yong Youn (auth.), Marina L. Gavrilova, Osvaldo Gervasi, Vipin Kumar, C. J. Kenneth Tan, David Taniar, Antonio Laganá, Youngsong Mun, Hyunseung Choo (eds.)
Series: Lecture Notes in Computer Science 3983 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 1191
Tags: Theory of Computation; Software Engineering/Programming and Operating Systems; Numeric Computing; Information Systems and Communication Service; Simulation and Modeling; Computer Imaging, Vision, Pattern Recognition and Graphics
Front Matter....Pages -
Message Transport Interface for Efficient Communication Between Agent Framework and Event Service....Pages 1-10
An Ontology-Based Context Model in a Smart Home....Pages 11-20
Service Mobility Manager for OSGi Framework....Pages 21-29
A Ubiquitous Workflow Service Framework....Pages 30-39
Self Organizing Sensor Networks Using Intelligent Clustering....Pages 40-49
Searching and Selecting Web Services Using Case Based Reasoning....Pages 50-57
Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks....Pages 58-67
Content Delivery with Spatial Caching Scheme in Mobile Wireless Networks....Pages 68-77
Higher Education Web Information System Usage Analysis with a Data Webhouse....Pages 78-87
A User Management System for Federated Databases Using Web Services....Pages 88-97
A Dynamic Evaluation Framework for Mobile Applications....Pages 98-107
SOAM: An Environment Adaptation Model for the Pervasive Semantic Web....Pages 108-117
Implementing the MPEG-21 Adaptation Quality of Service in Dynamic Environments....Pages 118-127
A Middleware Architecture Determining Application Context Using Shared Ontology....Pages 128-137
Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing Environments....Pages 138-147
Designing and Implementing Physical Hypermedia Applications....Pages 148-157
Replicated Ubiquitous Nets....Pages 158-168
Design of a Shared Ontology Used for Translating Negotiation Primitives....Pages 169-178
A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements....Pages 179-186
Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for Bluetooth....Pages 187-196
ECA Rule Component for Timely Collaboration of Web-Based Distributed Business Systems....Pages 197-206
Dynamic Approach for Integrating Web Data Warehouses....Pages 207-216
Location Aware Business Process Deployment....Pages 217-225
A Framework for Rapid Development of RFID Applications....Pages 226-235
A Flexible DRM System Considering Ubiquitous Environment....Pages 236-244
User Centric Intelligent IPMPS in Ubi-Home....Pages 245-254
The Design and Development of a Secure Keystroke System for u Business....Pages 255-261
Linkability of a Blind Signature Scheme and Its Improved Scheme....Pages 262-270
A Noble Structural Model for e-Learning Services in Ubiquitous Environment....Pages 271-278
Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms....Pages 279-287
Design of the Configurable Clothes Using Mobile Actuator-Sensor Network....Pages 288-295
Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure....Pages 296-305
Counting-Based Distance Estimations and Localizations in Wireless Sensor Networks....Pages 306-315
Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System....Pages 316-325
Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification....Pages 326-335
Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes....Pages 336-343
Tracking Illegal System Access in a Ubiquitous Environment – Proposal for ATS, a Traceback System Using STOP....Pages 344-351
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach....Pages 352-359
A Security Model for Home Networks with Authority Delegation....Pages 360-369
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption....Pages 370-379
Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol....Pages 380-387
An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing Environment....Pages 388-395
Efficient User Authentication and Key Agreement in Ubiquitous Computing....Pages 396-405
Single Sign-On and Key Establishment for Ubiquitous Smart Environments....Pages 406-415
A Light Weight Authentication Protocol for Digital Home Networks....Pages 416-423
Smart Home Microcontroller: Telephone Interfacing....Pages 424-431
SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network....Pages 432-439
Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks....Pages 440-447
The Performance Analysis of UWB System for the HD Multimedia Communication in a Home Network....Pages 448-455
Extraction of Implicit Context Information in Ubiquitous Computing Environments....Pages 456-465
Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive Interactions....Pages 466-474
An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTS....Pages 475-482
Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing Environments....Pages 483-490
A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time Constraints....Pages 491-498
Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks....Pages 499-508
Wireless Sensor Networks: A Scalable Time Synchronization....Pages 509-518
A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor Networks....Pages 519-528
Two-Dimensional Priority Scheduling Scheme for Open Real-Time Systems....Pages 529-538
An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control Systems....Pages 539-548
Adaptive Load Balancing Mechanism for Server Cluster....Pages 549-557
Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster Computing....Pages 558-566
A Method for Efficient Malicious Code Detection Based on Conceptual Similarity....Pages 567-576
A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault Detection....Pages 577-583
Efficient Exponentiation in GF ( p m ) Using the Frobenius Map....Pages 584-593
A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc Networks....Pages 594-602
A Power-Efficient Design Employing an Extreme Condition Detector for Embedded Systems....Pages 603-611
An Efficient Delay Metric on RC Interconnects Under Saturated Ramp Inputs....Pages 612-621
Low Power Microprocessor Design for Embedded Systems....Pages 622-630
History Length Adjustable gshare Predictor for High-Performance Embedded Processor....Pages 631-638
Security Engineering Methodology Based on Problem Solving Theory....Pages 639-648
Design and Implementation of an Ontology Algorithm for Web Documents Classification....Pages 649-658
Automatic Test Approach of Web Application for Security (AutoInspect)....Pages 659-668
A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network Middlewares....Pages 669-678
Session Key Agreement Protocol for End-to-End Security in MANET....Pages 679-686
Process-Oriented DFM System for Ubiquitous Devices....Pages 687-696
A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-Logistics....Pages 697-706
Information Security Management System for SMB in Ubiquitous Computing....Pages 707-715
A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV)....Pages 716-725
Designing Aspectual Architecture Views in Aspect-Oriented Software Development....Pages 726-735
Process and Techniques to Generate Components in MDA/CB-PIM for Automation....Pages 736-745
An Ontology Definition Framework for Model Driven Development....Pages 746-755
An AHP-Based Evaluation Model for Service Composition....Pages 756-766
Construction of Quality Test and Certification System for Package Software....Pages 767-776
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model....Pages 777-786
Goal Programming Approach to Compose the Web Service Quality of Service....Pages 787-797
Healthcare Home Service System Based on Distributed Object Group Framework....Pages 798-807
A Learning Attitude Evaluation System for Learning Concentration on Distance Education....Pages 808-817
A Calculation Method for Direction Based Handover Rate in Cell Based Mobile Networks....Pages 818-827
The Classification of the Software Quality by Employing the Tolerence Class....Pages 828-834
Components Searching System Using Component Identifiers and Request Specifics....Pages 835-843
Software Architecture Generation on UML....Pages 844-852
Distributed Programming Developing Tool Based on Distributed Object Group Framework....Pages 853-863
A Study on Automatic Code Generation Tool from Design Patterns Based on the XMI....Pages 864-872
Design of Opportunity Tree for Organization’s Process Strategy Decision-Making Based on SPICE Assessment Experience....Pages 873-882
SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM System....Pages 883-892
Design of Mobile Video Player Based on the WIPI Platform....Pages 893-898
Discovering Patterns Based on Fuzzy Logic Theory....Pages 899-908
Metrics Design for Software Process Assessment Based on ISO/IEC 15504....Pages 909-916
A Quantitative Evaluation Model Using the ISO/IEC 9126 Quality Model in the Component Based Development Process....Pages 917-926
Component Specification Model for the Web Services....Pages 927-936
A Data-Driven Approach to Constructing an Ontological Concept Hierarchy Based on the Formal Concept Analysis....Pages 937-946
Web-Document Filtering Using Concept Graph....Pages 947-954
Development of Integrated DAO Pattern Applying Iterator Pattern....Pages 955-965
A Coupling Metric Applying the Characteristics of Components....Pages 966-975
Software Process Improvement Environment....Pages 976-984
A Design Technique of CBD Meta-model Based on Graph Theory....Pages 985-993
Description Technique for Component Composition Focusing on Black-Box View....Pages 994-1002
XML Security Model for Secure Information Exchange in E-Commerce....Pages 1003-1011
Design and Implementation of B2B i Collaboration Workflow Tool Based on J2EE....Pages 1012-1021
Traffic-Predicting A Routing Algorithm Using Time Series Models....Pages 1022-1031
A Study on Software Architecture Evaluation....Pages 1032-1041
RFID-Based ALE Application Framework Using Context-Based Security Service....Pages 1042-1051
A Study on the Standard of Software Quality Testing....Pages 1052-1059
Scene Change Detection Using the Weighted Chi-Test and Automatic Threshold Decision Algorithm....Pages 1060-1069
Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO....Pages 1070-1080
CTL Model Checking for Boolean Program....Pages 1081-1089
Grid Service Implementation of Aerosol Optical Thickness Retrieval over Land from MODIS....Pages 1090-1097
Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains....Pages 1098-1106
Nailfold Capillary Microscopy High-Resolution Image Analysis Framework for Connective Tissue Disease Diagnosis Using Grid Computing Technology....Pages 1107-1115
EFH: An Edge-Based Fast Handover for Mobile IPv6 in IEEE 802.11b WLAN....Pages 1116-1125
An Extendible Hashing Based Recovery Method in a Shared-Nothing Spatial Database Cluster....Pages 1126-1135
A Quantitative Justification to Partial Replication of Web Contents....Pages 1136-1145
Content Distribution Strategy Using Web-Cached Multicast Technique....Pages 1146-1155
Load Distribution Strategies in Cluster-Based Transcoding Servers for Mobile Clients....Pages 1156-1165
Safety of Recovery Protocol Preserving MW Session Guarantee in Mobile Systems....Pages 1166-1174
Back Matter....Pages -