This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 8–11, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA 2006. Computational science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental theore- cal research as well as endeavors in emerging ?elds. Together, these far-reaching scienti?c areas contributed to shaping this conference in the realms of state-- the-art computational science researchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.
Author(s): Shoichi Morimoto, Daisuke Horie, Jingde Cheng (auth.), Marina Gavrilova, Osvaldo Gervasi, Vipin Kumar, C. J. Kenneth Tan, David Taniar, Antonio Laganá, Youngsong Mun, Hyunseung Choo (eds.)
Series: Lecture Notes in Computer Science 3982
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 1243
Tags: Theory of Computation; Software Engineering/Programming and Operating Systems; Numeric Computing; Information Systems and Communication Service; Simulation and Modeling; Computer Imaging, Vision, Pattern Recognition and Graphics
Front Matter....Pages -
A Security Requirement Management Database Based on ISO/IEC 15408....Pages 1-10
Development of Committee Neural Network for Computer Access Security System....Pages 11-20
C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model....Pages 21-30
Design and Fabrication of Security and Home Automation System....Pages 31-37
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design....Pages 38-47
Experiments and Hardware Countermeasures on Power Analysis Attacks....Pages 48-53
Information System Modeling for Analysis of Propagation Effects and Levels of Damage....Pages 54-63
A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks....Pages 64-72
A VLSM Address Management Method for Variable IP Subnetting....Pages 73-83
SDSEM: Software Development Success Evolution Model....Pages 84-92
A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks....Pages 93-103
Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications....Pages 104-114
The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks....Pages 115-124
Ontology-Based Information Search in the Real World Using Web Services....Pages 125-133
An Active Node Set Maintenance Scheme for Distributed Sensor Networks....Pages 134-143
Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment....Pages 144-153
Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector....Pages 154-162
Applying Product Line to the Embedded Systems....Pages 163-171
Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold....Pages 172-177
Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents....Pages 178-187
Design of H.264/AVC-Based Software Decoder for Mobile Phone....Pages 188-197
Transforming a Legacy System into Components....Pages 198-205
Pseudorandom Number Generator Using Optimal Normal Basis....Pages 206-212
Efficient Nonce-Based Authentication Scheme Using Token-Update....Pages 213-221
An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool....Pages 222-233
A Prediction Method of Network Traffic Using Time Series Models....Pages 234-243
An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions....Pages 244-250
Intersection Simulation System Based on Traffic Flow Control Framework....Pages 251-260
A HIICA(Highly-Improved Intra CA) Design for M-Commerce....Pages 261-268
Highly Reliable Synchronous Stream Cipher System for Link Encryption....Pages 269-278
Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network....Pages 279-286
Hybrid Image Mosaic Construction Using the Hierarchical Method....Pages 287-297
Public Key Encryption with Keyword Search Based on K-Resilient IBE....Pages 298-308
A Generic Construction of Secure Signatures Without Random Oracles....Pages 309-317
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption....Pages 318-326
Traceable Signature: Better Efficiency and Beyond....Pages 327-337
On the TYS Signature Scheme....Pages 338-344
Efficient Partially Blind Signatures with Provable Security....Pages 345-354
A Framework for Robust Group Key Agreement....Pages 355-364
BGN Authentication and Its Extension to Convey Message Commitments....Pages 365-374
New Security Problem in RFID Systems “Tag Killing”....Pages 375-384
A Model for Security Vulnerability Pattern....Pages 385-394
A New Timestamping Scheme Based on Skip Lists....Pages 395-405
A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques....Pages 406-415
New Constructions of Universal Hash Functions Based on Function Sums....Pages 416-425
Analysis of Fast Blockcipher-Based Hash Functions....Pages 426-435
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms....Pages 436-445
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis....Pages 446-455
Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture....Pages 456-465
Security Weaknesses in Two Proxy Signature Schemes....Pages 466-475
A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths....Pages 476-485
Comparative Analysis of IPv6 VPN Transition in NEMO Environments....Pages 486-496
A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream....Pages 497-506
Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO....Pages 507-516
An Inter-domain Key Agreement Protocol Using Weak Passwords....Pages 517-526
A Practical Solution for Distribution Rights Protection in Multicast Environments....Pages 527-536
Audit-Based Access Control in Nomadic Wireless Environments....Pages 537-545
Cost – Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems....Pages 546-553
The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution....Pages 554-563
Satisfying Constraints for Locating Export Containers in Port Container Terminals....Pages 564-573
A Price Discrimination Modeling Using Geometric Programming....Pages 574-580
Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation....Pages 581-589
Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning....Pages 590-599
Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain....Pages 600-609
Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area....Pages 610-620
Scheduling an R&D Project with Quality-Dependent Time Slots....Pages 621-630
The Bottleneck Tree Alignment Problems....Pages 631-637
Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers....Pages 638-648
Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment....Pages 649-658
Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex....Pages 659-667
A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment....Pages 668-677
Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method....Pages 678-687
Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks....Pages 688-697
An Entropy Based Group Setup Strategy for PCB Assembly....Pages 698-707
Cross-Facility Production and Transportation Planning Problem with Perishable Inventory....Pages 708-717
A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload....Pages 718-727
Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times....Pages 728-737
The Maximum Integer Multiterminal Flow Problem....Pages 738-747
Routing with Early Ordering for Just-In-Time Manufacturing Systems....Pages 748-756
A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks....Pages 757-766
On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers....Pages 767-776
Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk....Pages 777-784
Two-Server Network Disconnection Problem....Pages 785-792
One-Sided Monge TSP Is NP-Hard....Pages 793-801
On Direct Methods for Lexicographic Min-Max Optimization....Pages 802-811
Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing....Pages 812-821
Linear Convergence of Tatônnement in a Bertrand Oligopoly....Pages 822-831
Design for Using Purpose of Assembly-Group....Pages 832-840
A Conditional Gaussian Martingale Algorithm for Global Optimization....Pages 841-851
Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks....Pages 852-861
A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process....Pages 862-874
Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem....Pages 875-884
An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations....Pages 885-897
A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps....Pages 898-907
Global Optimization of the Scenario Generation and Portfolio Selection Problems....Pages 908-917
A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation....Pages 918-927
Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers....Pages 928-933
A Group Search Optimizer for Neural Network Training....Pages 934-943
Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem....Pages 944-953
Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks....Pages 954-963
An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling....Pages 964-973
Static Analysis Based Software Architecture Recovery....Pages 974-983
A First Approach to a Data Quality Model for Web Portals....Pages 984-993
Design for Environment-Friendly Product....Pages 994-1003
Performance of HECC Coprocessors Using Inversion-Free Formulae....Pages 1004-1012
Metrics of Password Management Policy....Pages 1013-1023
Using UML Packages for Designing Secure Data Warehouses....Pages 1024-1034
Practical Attack on the Shrinking Generator....Pages 1035-1043
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems....Pages 1044-1053
Stochastic Simulation Method for the Term Structure Models with Jump....Pages 1054-1063
The Ellipsoidal l p Norm Obnoxious Facility Location Problem....Pages 1064-1072
On the Performance of Recovery Rate Modeling....Pages 1073-1080
Using Performance Profiles to Evaluate Preconditioners for Iterative Methods....Pages 1081-1089
Multicast ω -Trees Based on Statistical Analysis....Pages 1090-1099
The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results....Pages 1100-1109
Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management....Pages 1110-1118
The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks....Pages 1119-1128
An Efficient Multicast Tree with Delay and Delay Variation Constraints....Pages 1129-1136
Algorithms on Extended ( δ , γ )-Matching....Pages 1137-1142
SOM and Neural Gas as Graduated Nonconvexity Algorithms....Pages 1143-1152
Analysis of Multi-domain Complex Simulation Studies....Pages 1153-1162
A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance....Pages 1163-1171
Robust Fault Matched Optical Flow Detection Using 2D Histogram....Pages 1172-1179
Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform....Pages 1180-1189
Optimal Edge Detection Using Perfect Sharpening of Ramp Edges....Pages 1190-1199
Eye Tracking Using Neural Network and Mean-Shift....Pages 1200-1209
The Optimal Feature Extraction Procedure for Statistical Pattern Recognition....Pages 1210-1215
A New Approach for Human Identification Using Gait Recognition....Pages 1216-1225
A Security Requirement Management Database Based on ISO/IEC 15408....Pages E1-E1
Back Matter....Pages -