The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004.
Author(s): Jin Ok Kim, Sung Jin Seo, Chin Hyun Chung, Jun Hwang, Woongjae Lee (auth.), Antonio Laganá, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, C. J. Kenneth Tan, Osvaldo Gervasi (eds.)
Series: Lecture Notes in Computer Science 3043
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 1185
Tags: Programming Techniques; Theory of Computation; Mathematics of Computing; Information Systems and Communication Service; Computer Applications; Computational Mathematics and Numerical Analysis
Front Matter....Pages -
Face Detection by Facial Features with Color Images and Face Recognition Using PCA....Pages 1-8
A Shakable Snake for Estimation of Image Contours....Pages 9-16
A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained Ambiguity....Pages 17-24
A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge Model....Pages 25-32
A Feature-Based Algorithm for Recognizing Gestures on Portable Computers....Pages 33-40
Fingerprint Matching Based on Linking Information Structure of Minutiae....Pages 41-48
Video Summarization Using Fuzzy One-Class Support Vector Machine....Pages 49-56
A Transcode and Prefetch Technique of Multimedia Presentations for Mobile Terminals....Pages 57-64
A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurg....Pages 65-72
A Study on Methodology for Enhancing Reliability of Datapath....Pages 73-80
A Useful Method for Multiple Sequence Alignment and Its Implementation....Pages 81-88
A Research on the Stochastic Model for Spoken Language Understanding....Pages 89-96
The Association Rule Algorithm with Missing Data in Data Mining....Pages 97-105
Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow....Pages 106-113
On Negation-Based Conscious Agent....Pages 114-121
A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Document....Pages 122-133
A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic Features....Pages 134-141
Network Security Management Using ARP Spoofing....Pages 142-149
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks....Pages 150-158
A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient Sign....Pages 159-166
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates....Pages 167-174
A Fuzzy Expert System for Network Forensics....Pages 175-182
A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models....Pages 183-190
The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations....Pages 191-198
Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IP....Pages 199-206
Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems*....Pages 207-214
New Approach for Secure and Efficient Metering in the Web Advertising....Pages 215-221
MLS/SDM: Multi-level Secure Spatial Data Model....Pages 222-229
Detection Techniques for ELF Executable File Using Assembly Instruction Searching....Pages 230-237
Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain....Pages 238-245
Committing Secure Results with Replicated Servers....Pages 246-253
Applied Research of Active Network to Control Network Traffic in Virtual Battlefield....Pages 254-261
Design and Implementation of the HoneyPot System with Focusing on the Session Redirection....Pages 262-269
Analysis of Performance for MCVoD System....Pages 270-277
A QoS Improvement Scheme for Real-Time Traffic Using IPv6 Flow Labels....Pages 278-285
Energy-Efficient Message Management Algorithms in HMIPv6....Pages 286-293
A Queue Management Scheme for Alleviating the Impact of Packet Size on the Achieved Throughput....Pages 294-301
PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack....Pages 302-309
Traffic Control Scheme of ABR Service Using NLMS in ATM Network....Pages 310-318
XML-Based Workflow Description Language for Grid Applications....Pages 319-327
Placement Algorithm of Web Server Replicas....Pages 328-336
XML-OGL: UML-Based Graphical Web Query Language for XML Documents....Pages 337-344
Layered Web-Caching Technique for VOD Services....Pages 345-351
QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application....Pages 352-359
Efficient Pre-fetch and Pre-release Based Buffer Cache Management for Web Applications....Pages 360-369
A New Architecture Design for Differentiated Resource Sharing on Grid Service....Pages 370-377
An Experiment and Design of Web-Based Instruction Model for Collaboration Learning....Pages 378-385
Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels....Pages 386-393
PMEPR Reduction Algorithms for STBC-OFDM Signals....Pages 394-401
An Efficient Image Transmission System Adopting OFDM Based Sequence Reordering Method in Non-flat Fading Channel....Pages 402-409
The Efficient Web-Based Mobile GIS Service System through Reduction of Digital Map....Pages 410-417
Reducing Link Loss in Ad Hoc Networks....Pages 418-425
A Web Based Model for Analyzing Compliance of Mobile Content....Pages 426-433
Delay and Collision Reduction Mechanism for Distributed Fair Scheduling in Wireless LANs....Pages 434-441
Bit-Serial Multipliers for Exponentiation and Division in GF (2 m ) Using Irreducible AOP....Pages 442-450
Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504....Pages 451-460
Design on Mobile Secure Electronic Transaction Protocol with Component Based Development....Pages 461-470
A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme....Pages 471-480
A Design of Configuration Management Practices and CMPET in Common Criteria Based on Software Process Improvement Activity....Pages 481-490
The Design and Development for Risk Analysis Automatic Tool....Pages 491-499
A Fault-Tolerant Mobile Agent Model in Replicated Secure Services....Pages 500-509
Computation of Multiplicative Inverses in GF(2 n ) Using Palindromic Representation....Pages 510-516
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks....Pages 517-526
User Authentication Protocol Based on Human Memorable Password and Using RSA....Pages 527-536
Supporting Adaptive Security Levels in Heterogeneous Environments....Pages 537-546
Intrusion Detection Using Noisy Training Data....Pages 547-556
A Study on Key Recovery Agent Protection Profile Having Composition Function....Pages 557-566
Simulation-Based Security Testing for Continuity of Essential Service....Pages 567-576
NextPDM: Improving Productivity and Enhancing the Reusability with a Customizing Framework Toolkit....Pages 577-586
A Framework for Security Assurance in Component Based Development....Pages 587-596
An Information Engineering Methodology for the Security Strategy Planning....Pages 597-607
A Case Study in Applying Common Criteria to Development Process of Virtual Private Network....Pages 608-616
A Pointer Forwarding Scheme for Fault-Tolerant Location Management in Mobile Networks....Pages 617-624
Architecture Environments for E-business Agent Based on Security....Pages 625-634
Multi-modal Biometrics System Using Face and Signature....Pages 635-644
Simple and Efficient Group Key Agreement Based on Factoring....Pages 645-654
On Facial Expression Recognition Using the Virtual Image Masking for a Security System....Pages 655-662
Secure Handoff Based on Dual Session Keys in Mobile IP with AAA....Pages 663-672
Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents....Pages 673-682
DMKB : A Defense Mechanism Knowledge Base....Pages 683-692
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments....Pages 693-700
A New Role-Based Authorization Model in a Corporate Workflow Systems*....Pages 701-710
A New Synchronization Protocol for Authentication in Wireless LAN Environment....Pages 711-721
A Robust Image Authentication Method Surviving Acceptable Modifications....Pages 722-727
Practical Digital Signature Generation Using Biometrics....Pages 728-737
Performance Improvement in Mobile IPv6 Using AAA and Fast Handoff....Pages 738-745
An Efficient Key Agreement Protocol for Secure Authentication....Pages 746-754
A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3....Pages 755-764
IDentification Key Based AAA Mechanism in Mobile IP Networks....Pages 765-775
An Integrated XML Security Mechanism for Mobile Grid Application....Pages 776-783
Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment....Pages 784-791
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment....Pages 792-801
Generic Construction of Certificateless Encryption....Pages 802-811
Security Issues in Network File Systems....Pages 812-820
A Content-Independent Scalable Encryption Model....Pages 821-830
Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash....Pages 831-840
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer....Pages 841-850
Validating the Use of BAN LOGIC....Pages 851-858
Use of Spectral Techniques in the Design of Symmetrical Cryptosystems....Pages 859-867
Load Balancing and Survivability for Network Services Based on Intelligent Agents....Pages 868-881
A Scalable PKI for Secure Routing in the Internet....Pages 882-894
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords....Pages 895-902
Timeout Estimation Using a Simulation Model for Non-repudiation Protocols....Pages 903-914
DDoS Attack Defense Architecture Using Active Network Technology....Pages 915-923
A Voting System with Trusted Verifiable Services....Pages 924-937
Chaotic Protocols....Pages 938-948
Security Consequences of Messaging Hubs in Many-to-Many E-procurement Solutions....Pages 949-959
The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis....Pages 960-967
A Survey of Web Services Security....Pages 968-977
Fair Certified E-mail Protocols with Delivery Deadline Agreement....Pages 978-987
QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server....Pages 988-997
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System....Pages 998-1006
Efficient Key Distribution Protocol for Secure Multicast Communication....Pages 1007-1016
A Bayesian Approach for Estimating Link Travel Time on Urban Arterial Road Network....Pages 1017-1025
Perimeter Defence Policy Model of Cascade MPLS VPN Networks....Pages 1026-1034
Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks....Pages 1035-1043
Detection of Moving Objects Edges to Implement Home Security System in a Wireless Environment....Pages 1044-1051
Reduction Method of Threat Phrases by Classifying Assets....Pages 1052-1059
Anomaly Detection Using Sequential Properties of Packets in Mobile Environment....Pages 1060-1068
A Case Study in Applying Common Criteria to Development Process to Improve Security of Software Products....Pages 1069-1077
A New Recovery Scheme with Reverse Shared Risk Link Group in GMPLS-Based WDM Networks....Pages 1078-1087
Real Time Estimation of Bus Arrival Time under Mobile Environment....Pages 1088-1096
Call Tracking and Location Updating Using DHS in Mobile Networks....Pages 1097-1104
Improving TCP Performance over Mobile IPv6....Pages 1105-1114
Design of Mobile Network Route Optimization Based on the Hierarchical Algorithm....Pages 1115-1124
On Algorithms for Minimum-Cost Quickest Paths with Multiple Delay-Bounds....Pages 1125-1133
A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism....Pages 1134-1143
The Layer 2 Handoff Scheme for Mobile IP over IEEE 802.11 Wireless LAN....Pages 1144-1150
Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Handoff....Pages 1151-1158
A Modified AODV Protocol with Multi-paths Considering Classes of Services....Pages 1159-1168
Back Matter....Pages -