The International Conference on Computational Science and its Applications was held in Kuala Lumpur, Malaysia, in August 2007. The conference drew leading researchers in computational science who came to share their findings and discuss the latest developments and applications in the field. This three-volume set constitutes the refereed proceedings of the conference.
The outstanding papers in these volumes present a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in almost all sciences that use computational techniques.
The refereed papers are grouped according to the five major conference themes: computational methods; algorithms and applications; high performance technical computing and networks; advanced and emerging applications; geometric modeling, graphics and visualization information systems and technologies.
Author(s): M. Fikret Ercan (auth.), Osvaldo Gervasi, Marina L. Gavrilova (eds.)
Series: Lecture Notes in Computer Science 4706 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 1129
Tags: Theory of Computation; Software Engineering/Programming and Operating Systems; Numeric Computing; Information Systems and Communication Service; Simulation and Modeling; Computer Imaging, Vision, Pattern Recognition and Graphics
Front Matter....Pages -
Parallel Image Understanding on a Multi-DSP System....Pages 1-12
Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave Propagation....Pages 13-24
Visibility Computations – Scanline Algorithms and Techniques....Pages 25-37
Adaptive Scheduling of Parallel Computations for SPMD Tasks....Pages 38-50
Determining the Visibility of a Planar Set of Line Segments in ${\mathcal{O}(n\log\log n)}$ Time....Pages 51-62
An Efficient Identity-Based Ring Signature Scheme and Its Extension....Pages 63-74
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures....Pages 75-84
Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines....Pages 85-93
An Attack Classification Mechanism Based on Multiple Support Vector Machines....Pages 94-103
An Efficient Iteration Decoding Stopping Criterion for Turbo Codes....Pages 104-112
Efficient an Implementation Method Research of a Smart Card Atomic Operation....Pages 113-121
Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model....Pages 122-130
Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks....Pages 131-139
A Design of Fair Blind Signatures Protocol Using PVNIOT....Pages 140-147
An Access Control Using SPKI Certificate in Peer-to-Peer Environment....Pages 148-156
Security and Test Environment for SIP....Pages 157-165
Simulation Based Nodal Analysis for Effects Based Operations....Pages 166-176
A Stable Evidence Collection Procedure of a Volatile Data in Research....Pages 177-184
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique....Pages 185-194
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks....Pages 195-206
An Automatic Mobile Web Generation Method from PC Web Using DFS and W-DFS....Pages 207-215
Cross-Layer Design for Reducing Handoff Latency in Mobile Network....Pages 216-225
Quick Paging IP Scheme Using Residence Pattern of Mobile Node....Pages 226-236
An Efficient Macro Mobility Scheme Supporting Reactive Fast Handover Mode in HMIPv6....Pages 237-246
Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks....Pages 247-260
An Enhanced Bandwidth Reservation Scheme Based on Road Topology Information for QoS Sensitive Multimedia Wireless Cellular Networks....Pages 261-274
Energy Efficient LEACH with TCP for Wireless Sensor Networks....Pages 275-285
Route Optimization with Additional Destination-Information in Mobile Networks....Pages 286-295
Requirements Change Management on Feature-Oriented Requirements Tracing....Pages 296-307
A Comparison Between Complexity and Temporal GIS Models for Spatio-temporal Urban Applications....Pages 308-321
Crawling the Content Hidden Behind Web Forms....Pages 322-333
Simple Performance Model for Differentiated Services in Mobile IPv6 Networks....Pages 334-345
Multi-site Distributed Software Development: Issues, Solutions, and Challenges....Pages 346-359
A Design and Implementation of Transcoder for Displaying Diagram Data of Multimedia Title on Web Browser....Pages 360-369
A Recommender System Based on Multi-features....Pages 370-382
Hybrid Intrusion Detection System for Wireless Sensor Networks....Pages 383-396
A Site-Ranking Algorithm for a Small Group of Sites....Pages 397-405
Cognitive Model of Schema as Complex System....Pages 406-414
Improved Fast Handover Protocol Using HMIPv6 Based on IEEE 802.16e Network....Pages 415-423
Advanced Macro Mobility Handover Supporting Fast Handover in HMIPv6....Pages 424-433
New Fast Algorithm for Constructing Concept Lattice....Pages 434-447
Measuring the Usability of Software Applications: Metrics for Behaviorness ....Pages 448-454
An Efficient Information Dissemination for Publish/Subscription System on Grid....Pages 455-468
On Dynamic Multicast Trees for Stormless Binding Update in Network Mobility....Pages 469-478
Authentication Scheme Using Mobile IPv4 in VPN Intranet....Pages 479-488
Implementation and Attacks Analysis of a Honeypot....Pages 489-502
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol....Pages 503-513
Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6....Pages 514-525
Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm....Pages 526-539
Using Adaptative Encryption for Ubiquitous Environments....Pages 540-548
Estimation of TTP Features in Non-repudiation Service....Pages 549-558
TLKMS: A Dynamic Keys Management Scheme for Large-Scale Wireless Sensor Networks....Pages 559-572
Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks....Pages 573-583
Design and Implementation of Wireless Sensor Based-Monitoring System for Smart Factory....Pages 584-592
Energy Efficient Route Recovery Methods for Wireless Sensor Networks Using Hybrid Checkpointing....Pages 593-601
AM-GM Difference Based Adaptive Sampling for Monte Carlo Global Illumination....Pages 602-611
Data-Driven Feature Control Models for Creating Virtual Faces....Pages 612-626
Variable Neighbourhood Texture Synthesis with Patch Initialisation....Pages 627-638
Multi-Resolution Protein Model....Pages 639-652
Modeling Origami for Computational Construction and Beyond....Pages 653-665
A Ghost Cell-Based Data Structure for Multiresolution Meshes....Pages 666-679
Bézier Curve and Surface Fitting of 3D Point Clouds Through Genetic Algorithms, Functional Networks and Least-Squares Approximation....Pages 680-693
Markov-Gibbs Random Field Modeling of 3D Skin Surface Textures for Haptic Applications....Pages 694-705
Elliptic Polygon Based 2D Sketch Interface for 3D Shape Matching....Pages 706-715
View Synthesis of the New Viewpoint Based on Contour Information....Pages 716-726
DTIWeb: A Web-Based Framework for DTI Data Visualization and Processing....Pages 727-740
A New Way to Re-using Paths....Pages 741-750
A Routing Scheme of Mobile Sink in Sensor Networks....Pages 751-763
Explicit Routing Designation (ERD) Method the Cache Information in Nested Mobile Networks....Pages 764-777
Performance Analysis of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network....Pages 778-789
An Administration Structure for the OLSR Protocol....Pages 790-803
Obstacle Mobility Model Based on Activity Area in Ad Hoc Networks....Pages 804-817
A XML Script-Based Testing Tool for Embedded Softwares....Pages 818-828
A Context-Adaptive Workflow Language for Ubiquitous Computing Environments....Pages 829-838
A Semantic Interoperable Context Infrastructure Using Web Services....Pages 839-848
An Effective Detection Method for Clustering Similar XML DTDs Using Tag Sequences....Pages 849-860
An Automatic Correction Tool for Relational Algebra Queries....Pages 861-872
Study on the Nonlinearity of the Nonstationary Impulse Signal Using Reassigned Time-Frequency Analysis....Pages 873-882
Development of Systematic Design Automation System for Hemming Die Manufacturing Process....Pages 883-894
Numerical Simulation of the Lateral Frequency Response of a Thin Cantilever Beam-Like Structure by Using the Finite Element Model....Pages 895-906
On the Ink Transfer Process in Gravure Printing....Pages 907-918
A Study on the Optimal Taper Tension Control in a Roll to Roll Machine....Pages 919-930
On-Line Measurement of Wrinkle Using Machine Vision....Pages 931-940
An Effective Visualization and Analysis Method for Edge Measurement....Pages 941-950
The Analysis of Film Flow Around Rotating Roller Partially Immersed Ink....Pages 951-960
An Automated Design System of Press Die Components Using 3-D CAD Library....Pages 961-974
Security Analysis of TORA Routing Protocol....Pages 975-986
A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy....Pages 987-995
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification....Pages 996-1007
An Enhanced ID-Based Deniable Authentication Protocol on Pairings....Pages 1008-1017
Design of Hybrid Network Discovery Module for Detecting Client Applications and ActiveX Controls....Pages 1018-1027
An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks....Pages 1028-1037
Secure Protocol for Fast Authentication in EAP-Based Wireless Networks....Pages 1038-1051
Using Return Routability for Authentication of Fast Handovers in Mobile IPv6....Pages 1052-1061
Enhancement for Security of Peer-to-Peer by Expanding CGA Mechanism....Pages 1062-1071
A Simplified Anonymous Dynamic Source Routing Protocol for Ad-Hoc Networks....Pages 1072-1084
Proactive Code Verification Protocol in Wireless Sensor Network....Pages 1085-1096
A Trust Management Model for PACS-Grid....Pages 1097-1106
N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks....Pages 1107-1120
Back Matter....Pages -