This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 8–11, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA 2006. Computational science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental theore- cal research as well as endeavors in emerging ?elds. Together, these far-reaching scienti?c areas contributed to shaping this conference in the realms of state-- the-art computational science researchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.
Author(s): Pinaki Mitra, Chitrita Chaudhuri (auth.), Marina L. Gavrilova, Osvaldo Gervasi, Vipin Kumar, C. J. Kenneth Tan, David Taniar, Antonio Laganá, Youngsong Mun, Hyunseung Choo (eds.)
Series: Lecture Notes in Computer Science 3981 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 1255
Tags: Theory of Computation; Software Engineering/Programming and Operating Systems; Numeric Computing; Information Systems and Communication Service; Simulation and Modeling; Computer Imaging, Vision, Pattern Recognition and Graphics
Front Matter....Pages -
Efficient Algorithm for the Extraction of Association Rules in Data Mining....Pages 1-10
A Robust Digital Fingerprinting Mechanism for Digital Copyright Protection....Pages 11-17
SoapFS: A Multiplatform File System....Pages 18-27
An Application-Independent Multimedia Adaptation Framework for the Mobile Web....Pages 28-39
Effort Prediction Model Using Similarity for Embedded Software Development....Pages 40-48
A Component Cohesion Metric Applying the Properties of Linear Increment by Dynamic Dependency Relationships Between Classes....Pages 49-58
The Maximum Capacity and Minimum Detectable Capacity of Information Hiding in Digital Images....Pages 59-66
BEAST: A Buffer Replacement Algorithm Using Spatial and Temporal Locality....Pages 67-76
Performance Evaluation of the Flow-Based Router Using Intel IXP2800 Network Processors....Pages 77-86
Robust 3D Face Data Acquisition Using a Sequential Color-Coded Pattern and Stereo Camera System....Pages 87-95
Robust Design of Face Recognition Systems....Pages 96-105
Transmission Rate Prediction of VBR Motion Image Using the Kalman Filter....Pages 106-113
A Modeling and Similarity Measure Function for Multiple Trajectories in Moving Databases....Pages 114-124
Distributed Processing of Context-Aware Authorization in Ubiquitous Computing Environments....Pages 125-134
An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment....Pages 135-144
Hybrid Storage Design for NC-94 Database Within the Parametric Data Model Framework....Pages 145-154
A Unified Index for Moving-Objects Databases....Pages 155-164
A Semantic Context-Aware Access Control in Pervasive Environments....Pages 165-174
Design and Implementation of an Index Structure Using Fixed Intervals for Tracing of RFID Tags....Pages 175-185
GARPAN: Gateway-Assisted Inter-PAN Routing for 6LoWPANs....Pages 186-194
Design and Performance Analysis of Multimedia Teachware Making System Using 2D Barcode....Pages 195-203
A Traffic Conditioning Algorithm for Enhancing the Fairness Between TCP and UDP Flows in DiffServ....Pages 204-213
Adaptive Mode Switching for Internetworking of MANET and WLAN Based on HMIPv6....Pages 214-223
Automated Keyword Extraction Using Category Correlation of Data....Pages 224-230
On Cognitive Role of Negative Schema....Pages 231-238
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management....Pages 239-248
A Real-Time Web Contents Adaptation for Mobile User....Pages 249-258
STMPE: An Efficient Movement Pattern Extraction Algorithm for Spatio-temporal Data Mining....Pages 259-269
Return on Security Investment Against Cyber Attacks on Availability....Pages 270-278
An Approach for Document Fragment Retrieval and Its Formatting Issue in Engineering Information Management....Pages 279-287
Minimum Cost Multicast Routing Based on High Utilization MC Nodes Suited to Sparse-Splitting Optical Networks....Pages 288-297
Refinement Method of Post-processing and Training for Improvement of Automated Text Classification....Pages 298-308
An Implementation of the Vectorizing-Based Automatic Nesting Software NST ....Pages 309-318
A Resource Balancing Scheme in Heterogeneous Mobile Networks....Pages 319-329
Fast BU Process Method for Real Time Multimedia Traffic in MIPv6....Pages 330-339
Network Intrusion Detection Using Statistical Probability Distribution....Pages 340-348
Network Anomaly Detection Based on Clustering of Sequence Patterns....Pages 349-358
A Routing Protocol for Throughput Enhancement and Energy Saving in Mobile Ad Hoc Networks....Pages 359-368
Spatial Indexing Based on the Semi-approximation Scheme of MBR....Pages 369-378
Workflow Clustering Method Based on Process Similarity....Pages 379-389
Distributed, Scalable and Reconfigurable Inter-grid Resource Sharing Framework....Pages 390-399
Scalable Mobile Internet Servers: Selecting Useful Images from the Web for Mobile Services....Pages 400-409
A Macro Mobility Handover Performance Improvement Scheme for HMIPv6....Pages 410-419
Cost Evaluation of Differentiated QoS Model in Mobile IPv6 Networks....Pages 420-429
Proactive Self-healing System for Application Maintenance in Ubiquitous Computing Environment....Pages 430-440
An Approach to Developing Domain Architectures Based on Variability Analysis....Pages 441-450
A Technical Assessment of SoC Methodologies and Requirements for a Full-Blown Methodology....Pages 451-461
Context-Aware Home Network Environment on Grid (CAHE-G)....Pages 462-470
An Efficient Binding Update Scheme in HMIPv6....Pages 471-479
A Scheduling Algorithm for Parallel Tasks in Peer-to-Peer Systems....Pages 480-486
Automatic Configuration of IPv6 Tunneling in a Dual Stack Host....Pages 487-494
Estimation of Link Speed Using Pattern Classification of GPS Probe Car Data....Pages 495-504
Storing and Querying of XML Documents Without Redundant Path Information....Pages 505-514
Route Optimization Problems with Local Mobile Nodes in Nested Mobile Networks....Pages 515-524
Design of Network Aware Resource Allocation System for Grid Applications....Pages 525-533
Traffic Groomed Multicasting in Sparse-Splitting WDM Backbone Networks....Pages 534-544
2-Way Text Classification for Harmful Web Documents....Pages 545-551
Integration of a Structural Index with a Structural Join for Accelerating Path Queries....Pages 552-561
Thin-Client Computing for Supporting the QoS of Streaming Media in Mobile Devices....Pages 562-571
MPLS Alternate Path Restoration with Guaranteed Bandwidth....Pages 572-581
A Study on the WBTC and NBTC for CDMA Mobile Communications Networks....Pages 582-590
A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving Nodes....Pages 591-600
Seamless and Reliable Mobile Multicast Mechanism in Next Generation Networks....Pages 601-610
Adaptive Selection of MIPv6 and Hierarchical MIPv6 for Minimizing Signaling Cost....Pages 611-620
DIASCOPE: Distributed Adaptation System Using Cooperative Proxies in Ubiquitous Network....Pages 621-630
A Novel Method for Energy-Efficient Clustering in Wireless Sensor Networks....Pages 631-640
iSCSI Multi-connection and Error Recovery Method for Remote Storage System in Mobile Appliance....Pages 641-650
Distributed Coordination and QoS-Aware Fair Queueing in Wireless Ad Hoc Networks....Pages 651-660
Lightweight Bindings for Mobile Routers....Pages 661-670
A Balanced Deployment Algorithm for Mobile Sensor Networks....Pages 671-680
A Merging Clustering Algorithm for Mobile Ad Hoc Networks....Pages 681-690
Context-Aware Cross Layered Multimedia Streaming Based on Variable Packet Size Transmission....Pages 691-700
Adaptive Mobile Checkpointing Facility for Wireless Sensor Networks....Pages 701-709
NeMRI - Based Multicasting in Network Mobility....Pages 710-719
Improving TCP Throughput and Fairness over Multi-rate IEEE 802.11 Wireless LANs....Pages 720-729
Local Source Routing Based Route Optimization in Nested Mobile Networks....Pages 730-739
An Efficient Movement Management Method of Mobile Node in Mobile IPv6....Pages 740-749
Homogeneous 2-Hops Broadcast in 2D....Pages 750-759
A Study on the Transportation Period of the EPG Data Specification in Terrestrial DMB....Pages 760-768
Cluster-Based Certificate Chain for Mobile Ad Hoc Networks....Pages 769-778
Optimization of Base Stations Positioning in Mobile Networks....Pages 779-787
Design of Maximum Remaining Energy Constrained Directed Diffusion Routing for Wireless Sensor Networks....Pages 788-795
A Timestamp-Based Optimistic Concurrency Control for Handling Mobile Transactions....Pages 796-805
Effects of PRF and Slot Interval on the Data Throughput of PPM-Based Ultra Wide-Band Systems in Multi-path Channels....Pages 806-815
Hierarchical Cluster Configuration Scheme for Scalable Ad Hoc Networks....Pages 816-826
A Route Optimization Via Recursive CoA Substitution for Nested Mobile Networks....Pages 827-836
Energy-Aware Routing Algorithm Using Backup Route for Ad-Hoc Networks....Pages 837-846
Mitigating Broadcast Storms in Stateless Address Auto-configuring MANETs....Pages 847-855
Routing with Maximum EDPs and Wavelength Assignment with Path Conflict Graphs....Pages 856-865
Energy Conserving Security Mechanism for Wireless Sensor Network....Pages 866-875
Inter-domain Security Management to Protect Legitimate User Access from DDoS Attacks....Pages 876-884
An Authentication Scheme Between Wireless LAN and Mobile IPv6 During Handover....Pages 885-894
Mechanism of the Secure MAP Discovery in Hierarchical MIPv6....Pages 895-904
An Efficient Authentication Mechanism for Fast Mobility Service in MIPv6....Pages 905-914
An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards....Pages 915-922
Route Optimization with AAA in Network Mobility....Pages 923-933
Verifier-Based Home Network Security Mechanism....Pages 934-944
VO Authentication Framework in Grid Environment Using Digital Signature....Pages 945-953
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments....Pages 954-963
An Efficient Mobility Management Scheme for Hierarchical Mobile IPv6 Networks....Pages 964-973
The Verification of Linearizer for Wibro PAM....Pages 974-981
Automatic Location Detection System for Anomaly Traffic on Wired/Wireless Networks....Pages 982-988
Road Boundary Extraction Using Shadow Path Reconstruction in Urban Areas....Pages 989-995
Photograph Database for Highway Facility Management in Mobile Mapping System....Pages 996-1002
High Speed Codebook Searching Algorithm for the CELP Vocoder in the Internet-Based Environment....Pages 1003-1008
Algorithm and Structure to Cancel Signal Distortion in ATSC Digital TV System....Pages 1009-1016
Mobility Management for INS in 3G Mobile Networks....Pages 1017-1024
Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks....Pages 1025-1032
A Dynamic QoS Management Scheme in B3G Networks....Pages 1033-1042
Stereo Matching Strategy for 3-D Urban Modeling....Pages 1043-1050
Protection Structure Building for Malicious Traffic Protecting in Intranet Systems....Pages 1051-1059
A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems....Pages 1060-1065
Temporal Land Information System (TLIS) for Dynamically Changing Cadastral Data....Pages 1066-1073
A Study on the Pitch Extraction Detection by Linear Approximation of Sub-band....Pages 1074-1081
Hybrid Queuing Scheme to Reduce Call Blocking in Multimedia Mobile Networks....Pages 1082-1089
A Study for Monitoring Technique for Home Server Based on Web Camera....Pages 1090-1100
New Algorithms for the Unsplittable Flow Problem....Pages 1101-1110
Performance Evaluation of the Parallel Packet Switch with a Sliding Window Scheme....Pages 1111-1120
A Simple and Efficient RWA Algorithm Based on Priority of Edge Disjoint Paths....Pages 1121-1130
Performance Improvement of TCP over Optical Burst Switching Networks with Drop Policy....Pages 1131-1139
A New Size-Based Burst Assembly Scheme for OBS Switches....Pages 1140-1148
The E-Textile Token Grid Network with Dual Rings....Pages 1149-1158
A MAC Protocol Using Separate Wakeup Slots for Sensor Network....Pages 1159-1168
A Study on L2/OPN Design for Grid High Performance Network....Pages 1169-1178
Reasoning Technique for Extended Fuzzy $\cal{ALCQ}$ ....Pages 1179-1188
Reducing Delivery Delay in HRM Tree....Pages 1189-1198
Data Analysis and Utilization Method Based on Genetic Programming in Ship Design....Pages 1199-1209
An Evolutionary and Attribute-Oriented Ensemble Classifier....Pages 1210-1218
A Study of the Evaluation Function and the Clustering Algorithm for Semantic Web Environment....Pages 1219-1228
A Divergence-Oriented Approach for Web Users Clustering....Pages 1229-1238
Back Matter....Pages -