Computational Science and Its Applications – ICCSA 2005: International Conference, Singapore, May 9-12, 2005, Proceedings, Part II

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The four-volume set LNCS 3480-3483 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2005, held in Singapore in May 2005.

The four volumes present a total of 540 papers selected from around 2700 submissions. The papers span the whole range of computational science, comprising advanced applications in virtually all sciences making use of computational techniques as well as foundations, techniques, and methodologies from computer science and mathematics, such as high performance computing and communication, networking, optimization, information systems and technologies, scientific visualization, graphics, image processing, data analysis, simulation and modelling, software systems, algorithms, security, multimedia etc.

Author(s): Hae-Sool Yang, Jung-Hun Hong, Seok-Hyung Hwang, Haeng-Kon Kim (auth.), Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganà , Heow Pueh Lee, Youngsong Mun, David Taniar, Chih Jeng Kenneth Tan (eds.)
Series: Lecture Notes in Computer Science 3481 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer Berlin Heidelberg
Year: 2005

Language: English
Pages: LXV, 1316p.


Content:
Front Matter....Pages -
Implementation of Short Message Service System to Be Based Mobile Wireless Internet....Pages 1-9
Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic Algorithm....Pages 10-20
P2P Protocol Analysis and Blocking Algorithm....Pages 21-30
Object Modeling of RDF Schema for Converting UML Class Diagram....Pages 31-41
A Framework for Security Assurance in Component Based Development....Pages 42-51
Security Framework to Verify the Low Level Implementation Codes....Pages 52-61
A Study on Evaluation of Component Metric Suites....Pages 62-70
The K-Means Clustering Architecture in the Multi-stage Data Mining Process....Pages 71-81
A Privacy Protection Model in ID Management Using Access Control....Pages 82-91
A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems....Pages 92-101
Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems....Pages 102-110
Modified Token-Update Scheme for Site Authentication....Pages 111-116
A Study on Secure SDP of RFID Using Bluetooth Communication....Pages 117-126
The Semantic Web Approach in Location Based Services....Pages 127-136
SCTE: Software Component Testing Environments....Pages 137-146
Computer Security Management Model Using MAUT and SNMP....Pages 147-156
Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS Networks....Pages 157-168
A GQS-Based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc Networks....Pages 169-176
A Study on the E-Cash System with Anonymity and Divisibility....Pages 177-186
An Authenticated Key Exchange Mechanism Using One-Time Shared Key....Pages 187-194
Creation of Soccer Video Highlight Using the Caption Information....Pages 195-204
The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent....Pages 205-214
A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System....Pages 215-224
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification....Pages 225-234
A New Stream Cipher Using Two Nonlinear Functions....Pages 235-244
New Key Management Systems for Multilevel Security....Pages 245-253
Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation....Pages 254-263
The Role of Secret Sharing in the Distributed MARE Protocols ....Pages 264-273
Security Risk Vector for Quantitative Asset Assessment....Pages 274-283
A Remote Video Study Evaluation System Using a User Profile....Pages 284-294
Performance Enhancement of Wireless LAN Based on Infrared Communications Using Multiple-Subcarrier Modulation....Pages 295-303
Modeling Virtual Network Collaboration in Supply Chain Management....Pages 304-313
SPA-Resistant Simultaneous Scalar Multiplication....Pages 314-321
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment....Pages 322-331
A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security....Pages 332-340
Distribution Data Security System Based on Web Based Active Database....Pages 341-352
Efficient DoS Resistant Multicast Authentication Schemes....Pages 353-362
Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement....Pages 363-372
Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets....Pages 373-380
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme....Pages 381-390
The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme....Pages 391-400
IPv6/IPsec Conformance Test Management System with Formal Description Technique....Pages 401-410
Interference Cancellation Algorithm Development and Implementation for Digital Television....Pages 411-419
Algorithm for ABR Traffic Control and Formation Feedback Information....Pages 420-428
Interference-Free ZCD-UWB for Wireless Home Network Applications....Pages 429-441
Safe Authentication Method for Security Communication in Ubiquitous....Pages 442-448
Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System....Pages 449-457
SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization....Pages 458-467
Design Procedure of IT Systems Security Countermeasures....Pages 468-473
Similarity Retrieval Based on Self-organizing Maps....Pages 474-482
An Expert System Development for Operating Procedure Monitoring of PWR Plants....Pages 483-490
Security Evaluation Targets for Enhancement of IT Systems Assurance....Pages 491-498
Protection Profile for Software Development Site....Pages 499-507
Improved RS Method for Detection of LSB Steganography....Pages 508-516
Robust Undetectable Interference Watermarks ....Pages 517-526
Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms....Pages 527-536
Color Cube Analysis for Detection of LSB Steganography in RGB Color Images....Pages 537-546
Compact and Robust Image Hashing....Pages 547-556
Watermarking for 3D Mesh Model Using Patch CEGIs....Pages 557-566
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE....Pages 567-576
Fault Attack on the DVB Common Scrambling Algorithm....Pages 577-584
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment....Pages 585-594
Perturbed Hidden Matrix Cryptosystems....Pages 595-602
Identity-Based Identification Without Random Oracles....Pages 603-613
Linkable Ring Signatures: Security Models and New Schemes....Pages 614-623
Practical Scenarios for the Van Trung-Martirosyan Codes....Pages 624-633
Obtaining True-Random Binary Numbers from a Weak Radioactive Source....Pages 634-646
Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases....Pages 647-656
A New Method of Building More Non-supersingular Elliptic Curves....Pages 657-664
Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography....Pages 665-675
Access Control Capable Integrated Network Management System for TCP/IP Networks....Pages 676-685
A Directional-Antenna Based MAC Protocol for Wireless Sensor Networks....Pages 686-695
An Extended Framework for Proportional Differentiation: Performance Metrics and Evaluation Considerations....Pages 696-703
QoS Provisioning in an Enhanced FMIPv6 Architecture....Pages 704-713
Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm....Pages 714-722
Design and Implementation of Frequency Offset Estimation, Symbol Timing and Sampling Clock Offset Control for an IEEE 802.11a Physical Layer....Pages 723-731
Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet Environment....Pages 732-740
Improved Authentication Scheme in W-CDMA Networks....Pages 741-748
Memory Reused Multiplication Implementation for Cryptography System....Pages 749-753
Scheme for the Information Sharing Between IDSs Using JXTA....Pages 754-761
Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information....Pages 762-770
Detecting Water Area During Flood Event from SAR Image....Pages 771-780
Position Based Handover Control Method....Pages 781-788
Improving Yellow Time Method of Left-Turning Traffic Flow at Signalized Intersection Networks by ITS....Pages 789-797
A Multimedia Database System Using Dependence Weight Values for a Mobile Environment....Pages 798-805
A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular Network....Pages 806-815
Heuristic Algorithm for Traffic Condition Classification with Loop Detector Data....Pages 816-821
Spatial Data Channel in a Mobile Navigation System....Pages 822-831
A Video Retrieval System for Electrical Safety Education Based on a Mobile Agent....Pages 832-838
Fuzzy Multi-criteria Decision Making-Based Mobile Tracking....Pages 839-847
Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application....Pages 848-855
Design and Implementation of Mobile-Learning System for Environment Education....Pages 856-862
A Simulation Model of Congested Traffic in the Waiting Line....Pages 863-869
Core Technology Analysis and Development for the Virus and Hacking Prevention....Pages 870-879
Development of Traffic Accidents Prediction Model with Intelligent System Theory....Pages 880-888
Prefetching Scheme Considering Mobile User’s Preference in Mobile Networks....Pages 889-895
System Development of Security Vulnerability Diagnosis in Wireless Internet Networks....Pages 896-903
An Active Node Management System for Secure Active Networks....Pages 904-913
A Systematic Design Approach for XML-View Driven Web Document Warehouses....Pages 914-924
Clustering and Retrieval of XML Documents by Structure....Pages 925-935
A New Method for Mining Association Rules from a Collection of XML Documents....Pages 936-945
Content-Based Recommendation in E-Commerce....Pages 946-955
A Personalized Multilingual Web Content Miner: PMWebMiner....Pages 956-965
Context-Based Recommendation Service in Ubiquitous Commerce....Pages 966-976
A New Continuous Nearest Neighbor Technique for Query Processing on Mobile Environments....Pages 977-987
Semantic Web Enabled Information Systems: Personalized Views on Web Data....Pages 988-997
Design of Vehicle Information Management System for Effective Retrieving of Vehicle Location....Pages 998-1007
Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing....Pages 1008-1017
A Ubiquitous Approach for Visualizing Back Pain Data....Pages 1018-1027
Prototype Design of Mobile Emergency Telemedicine System....Pages 1028-1034
An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices....Pages 1035-1044
Reflective Middleware for Location-Aware Application Adaptation....Pages 1045-1054
Efficient Approach for Interactively Mining Web Traversal Patterns....Pages 1055-1065
Query Decomposition Using the XML Declarative Description Language....Pages 1066-1075
On URL Normalization....Pages 1076-1085
Clustering-Based Schema Matching of Web Data for Constructing Digital Library....Pages 1086-1095
Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach....Pages 1096-1105
Mobile Mini-payment Scheme Using SMS-Credit....Pages 1106-1114
Context Summarization and Garbage Collecting Context....Pages 1115-1124
EXtensible Web (xWeb): An XML-View Based Web Engineering Methodology....Pages 1125-1135
A Web Services Framework for Integrated Geospatial Coverage Data....Pages 1136-1145
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services....Pages 1146-1155
Ubiquitous Systems and Petri Nets....Pages 1156-1166
Virtual Lab Dashboard: Ubiquitous Monitoring and Control in a Smart Bio-laboratory....Pages 1167-1176
On Discovering Concept Entities from Web Sites....Pages 1177-1186
Towards a Realistic Microscopic Traffic Simulation at an Unsignalised Intersection....Pages 1187-1196
Complex Systems: Particles, Chains, and Sheets....Pages 1197-1206
Discretization of Delayed Multi-input Nonlinear System via Taylor Series and Scaling and Squaring Technique....Pages 1207-1216
On the Scale-Free Intersection Graphs....Pages 1217-1224
A Stochastic Viewpoint on the Generation of Spatiotemporal Datasets....Pages 1225-1234
A Formal Approach to the Design of Distributed Data Warehouses....Pages 1235-1244
A Mathematical Model for Genetic Regulation of the Lactose Operon....Pages 1245-1253
Network Emergence in Immune System Shape Space....Pages 1254-1263
A Multi-agent System for Modelling Carbohydrate Oxidation in Cell....Pages 1264-1273
Characterizing Complex Behavior in (Self-organizing) Multi-agent Systems....Pages 1274-1283
Protein Structure Abstractionand Automatic Clustering Using Secondary Structure Element Sequences....Pages 1284-1292
A Neural Network Method for Induction Machine Fault Detection with Vibration Signal....Pages 1293-1302
Back Matter....Pages -