The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004.
Author(s): Shen Weidong, Yang Shulin (auth.), Antonio Laganá, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, C. J. Kenneth Tan, Osvaldo Gervasi (eds.)
Series: Lecture Notes in Computer Science 3046
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 1023
Tags: Programming Techniques; Theory of Computation; Mathematics of Computing; Information Systems and Communication Service; Computer Applications; Computational Mathematics and Numerical Analysis
Front Matter....Pages -
New Techniques in Designing Finite Difference Domain Decomposition Algorithm for the Heat Equation....Pages 1-10
A Fast Construction Algorithm for the Incidence Matrices of a Class of Symmetric Balanced Incomplete Block Designs....Pages 11-19
ILUTP_Mem: A Space-Efficient Incomplete LU Preconditioner....Pages 20-28
Optimal Gait Control for a Biped Locomotion Using Genetic Algorithm....Pages 29-38
A Bayes Algorithm for the Multitask Pattern Recognition Problem – Direct and Decomposed Independent Approaches....Pages 39-45
Energy Efficient Routing with Power Management to Increase Network Lifetime in Sensor Networks....Pages 46-55
New Parameter for Balancing Two Independent Measures in Routing Path....Pages 56-65
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption....Pages 66-76
Self-Tuning Mechanism for Genetic Algorithms Parameters, an Application to Data-Object Allocation in the Web....Pages 77-86
Digit-Serial AB 2 Systolic Array for Division in GF(2 m )....Pages 87-96
Design and Experiment of a Communication-Aware Parallel Quicksort with Weighted Partition of Processors....Pages 97-105
A Linear Systolic Array for Multiplication in GF (2 m ) for High Speed Cryptographic Processors....Pages 106-116
Price Driven Market Mechanism for Computational Grid Resource Allocation....Pages 117-126
A Novel LMS Method for Real-Time Network Traffic Prediction....Pages 127-136
Dynamic Configuration between Proxy Caches within an Intranet....Pages 137-146
A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System....Pages 147-157
Reducing on the Number of Testing Items in the Branches of Decision Trees....Pages 158-166
CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical One....Pages 167-176
The Effects of Network Topology on Epidemic Algorithms....Pages 177-184
A Systematic Database Summary Generation Using the Distributed Query Discovery System....Pages 185-195
Parallel Montgomery Multiplication and Squaring over GF(2 m ) Based on Cellular Automata....Pages 196-205
A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection....Pages 206-212
Maximizing Parallelism for Nested Loops with Non-uniform Dependences....Pages 213-222
Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash....Pages 223-232
Gossip Based Causal Order Broadcast Algorithm....Pages 233-242
Intermediate View Synthesis from Stereoscopic Videoconference Images....Pages 243-250
Extract Shape from Clipart Image Using Modified Chain Code – Rectangle Representation....Pages 251-260
Control Messaging Channel for Distributed Computer Systems....Pages 261-270
Scene-Based Video Watermarking for Broadcasting Systems....Pages 271-280
Distortion-Free of General Information with Edge Enhanced Error Diffusion Halftoning....Pages 281-290
Enhanced Video Coding with Error Resilience Based on Macroblock Data Manipulation....Pages 291-300
Filtering of Colored Noise for Signal Enhancement....Pages 301-310
Model-Based Human Motion Tracking and Behavior Recognition Using Hierarchical Finite State Automata....Pages 311-320
Effective Digital Watermarking Algorithm by Contour Detection....Pages 321-328
New Packetization Method for Error Resilient Video Communications....Pages 329-337
A Video Mosaicking Technique with Self Scene Segmentation for Video Indexing....Pages 338-347
Real-Time Video Watermarking for MPEG Streams....Pages 348-358
A TCP-Friendly Congestion Control Scheme Using Hybrid Approach for Reducing Transmission Delay of Real-Time Video Stream....Pages 359-368
Object Boundary Edge Selection Using Level-of-Detail Canny Edges....Pages 369-378
Inverse Dithering through IMAP Estimation....Pages 379-388
A Study on Neural Networks Using Taylor Series Expansion of Sigmoid Activation Function....Pages 389-397
A Study on Neural Networks with Tapped Time Delays: Gas Concentration Estimation....Pages 398-405
Speech Emotion Recognition and Intensity Estimation....Pages 406-413
Speech Hiding Based on Auditory Wavelet....Pages 414-420
Automatic Selecting Coefficient for Semi-blind Watermarking....Pages 421-430
Network Probabilistic Connectivity: Optimal Structures....Pages 431-440
Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load Balancing....Pages 441-450
Adaptive CBT/Anycast Routing Algorithm for Multimedia Traffic Overload....Pages 451-459
Achieving Fair New Call CAC for Heterogeneous Services in Wireless Networks....Pages 460-470
Application of MCDF Operations in Digital Terrain Model Processing....Pages 471-478
Visual Mining of Market Basket Association Rules....Pages 479-488
Visualizing Predictive Models in Decision Tree Generation....Pages 489-495
A Model for Use Case Priorization Using Criticality Analysis....Pages 496-505
Using a Goal-Refinement Tree to Obtain and Refine Organizational Requirements....Pages 506-513
Using C++ Functors with Legacy C Libraries....Pages 514-523
Debugging of Java Programs Using HDT with Program Slicing....Pages 524-533
Frameworks as Web Services....Pages 534-542
Exception Rules Mining Based on Negative Association Rules....Pages 543-552
A Reduced Codification for the Logical Representation of Job Shop Scheduling Problems....Pages 553-562
Action Reasoning with Uncertain Resources....Pages 563-573
Software Rejuvenation Approach to Security Engineering....Pages 574-583
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System....Pages 584-593
Design and Implementation of High-Performance Intrusion Detection System....Pages 594-602
An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack....Pages 603-610
A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host....Pages 611-616
Efficient Password-Based Authenticated Key Agreement Protocol....Pages 617-626
A Two-Public Key Scheme Omitting Collision Problem in Digital Signature....Pages 627-636
A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition....Pages 637-646
An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block Design....Pages 647-654
Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing....Pages 655-664
Security of Shen et al.’s Timestamp-Based Password Authentication Scheme....Pages 665-671
ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings....Pages 672-680
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments....Pages 681-688
A Secure and Flexible Multi-signcryption Scheme....Pages 689-697
User Authentication Protocol Based on Human Memorable Password and Using RSA....Pages 698-707
Effective Packet Marking Approach to Defend against DDoS Attack....Pages 708-716
A Relationship between Security Engineering and Security Evaluation....Pages 717-724
A Relationship of Configuration Management Requirements between KISEC and ISO/IEC 15408....Pages 725-734
Term-Specific Language Modeling Approach to Text Categorization....Pages 735-742
Context-Based Proofreading of Structured Documents....Pages 743-753
Implementation of New CTI Service Platform Using Voice XML....Pages 754-762
Storing Together the Structural Information of XML Documents in Relational Databases....Pages 763-771
Annotation Repositioning Methods in the XML Documents: Context-Based Approach....Pages 772-782
Isolating and Specifying the Relevant Information of an Organizational Model: A Process Oriented Towards Information System Generation....Pages 783-790
A Weighted Fuzzy Min-Max Neural Network for Pattern Classification and Feature Extraction....Pages 791-798
The eSAIDA Stream Authentication Scheme....Pages 799-807
An Object-Oriented Metric to Measure the Degree of Dependency Due to Unused Interfaces....Pages 808-817
End-to-End QoS Management for VoIP Using DiffServ....Pages 818-827
Multi-modal Biometircs System Using Face and Signature....Pages 828-837
Using 3D Spatial Relationships for Image Retrieval by XML Annotation....Pages 838-848
Association Inlining for Mapping XML DTDs to Relational Tables....Pages 849-858
XCRAB: A Content and Annotation-Based Multimedia Indexing and Retrieval System....Pages 859-868
An Efficient Cache Conscious Multi-dimensional Index Structure....Pages 869-876
Tracking of Moving Objects Using Morphological Segmentation, Statistical Moments, and Radon Transform....Pages 877-886
Feature Extraction and Correlation for Time-to-Impact Segmentation Using Log-Polar Images....Pages 887-895
Object Mark Segmentation Algorithm Using Dynamic Programming for Poor Quality Images in Automated Inspection Process....Pages 896-905
A Line-Based Pose Estimation Algorithm for 3-D Polyhedral Object Recognition....Pages 906-914
Initialization Method for the Self-Calibration Using Minimal Two Images....Pages 915-923
Face Recognition for Expressive Face Images....Pages 924-932
Kolmogorov-Smirnov Test for Image Comparison....Pages 933-939
Modified Radius-Vector Function for Shape Contour Description....Pages 940-947
Image Corner Detection Using Radon Transform....Pages 948-955
Analytical Comparison of Conventional and MCDF Operations in Image Processing....Pages 956-963
On Extraction of Facial Features from Color Images....Pages 964-973
An Architecture for Mobility Management in Mobile Computing Networks....Pages 974-982
An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics....Pages 983-993
A Hybrid Restoration Scheme Based on Threshold Reaction Time in Optical Burst-Switched Networks....Pages 994-1003
Back Matter....Pages -