Thesearetheproceedingsofthe21stInternationalSymposiumonComputerand ? Information Sciences (ISCIS 2006) held in Istanbul, Turkey, November 1 – 3, 2006. ISCIS 2006 was organized by the Faculty of Engineering and Natural S- ences of Sabanc?University. These proceedings include updated versions of 106 papers selected by the program committee for presentation at the symposium. The increasing com- tition for presenting at the symposium, which relies on the success of previous ISCIS symposia,has led to many excellent papers and a higher standard overall. From a record-breaking 606 submissions, scheduling constraints dictated that only 106 papers could be accepted, resulting in a 17.5% acceptance rate. The program committee and external reviewers worked very hard and went through all submissions meticulously to select the best in a limited time frame. The selection process was especially hard when some of the good submissions could not be selected for publication due to space and time limitations. Another interesting fact about the submissions is that they were by authors from 41 countries covering all habitable continents (excluding Antarctica). This is a clear indication of the ever-increasing popularity of ISCIS symposia among researchersallaroundtheworldasamediumtoshareanddisseminatetheresults of their research activities.
Author(s): Erol Gelenbe (auth.), Albert Levi, Erkay Savaş, Hüsnü Yenigün, Selim Balcısoy, Yücel Saygın (eds.)
Series: Lecture Notes in Computer Science 4263
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 1088
Tags: Information Systems and Communication Service; Computer Systems Organization and Communication Networks; Software Engineering/Programming and Operating Systems; Theory of Computation; Computing Methodologies; Computer Imaging, Vision, Pa
Front Matter....Pages -
Analysis of Automated Auctions....Pages 1-12
Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications....Pages 13-23
Requirements Engineering as a Key to Holistic Software Quality....Pages 24-34
Problems and Challenges of Image-Guided Neurosurgical Navigation and Intervention....Pages 35-35
Information and Communication Technologies in the EU’s Seventh Framework Programme....Pages 36-36
The Greedy Prepend Algorithm for Decision List Induction....Pages 37-46
Heuristics for Minimum Brauer Chain Problem....Pages 47-54
Dispatching Rules for Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards....Pages 55-64
Heuristic Approach to Schedule Crew for a Regional Airline....Pages 65-74
Automatic Segmentation of the Liver in CT Images Using a Model of Approximate Contour....Pages 75-84
Unambiguous 3D Measurements by a Multi-period Phase Shift Method....Pages 85-94
Hybrid Techniques for Dynamic Optimization Problems....Pages 95-104
Minimizing the Search Space for Shape Retrieval Algorithms....Pages 105-114
Decision Support for Packing in Warehouses....Pages 115-124
A Fast Partial Distortion Elimination Algorithm Using Selective Matching Scan....Pages 125-133
Variable Neighborhood Search for the Orienteering Problem....Pages 134-143
Extracting Gene Regulation Information from Microarray Time-Series Data Using Hidden Markov Models....Pages 144-153
Asymptotical Lower Limits on Required Number of Examples for Learning Boolean Networks....Pages 154-164
Modified Association Rule Mining Approach for the MHC-Peptide Binding Problem....Pages 165-173
Prediction and Classification for GPCR Sequences Based on Ligand Specific Features....Pages 174-181
An Efficient Algorithm for the Identification of Repetitive Variable Motifs in the Regulatory Sequences of Co-expressed Genes....Pages 182-191
An Intelligent Shopping Agent for Optimal Purchasing Decision on the Semantic Web....Pages 192-201
Adapting the Pyramid Technique for Indexing Ontological Data....Pages 202-211
Comparison of Different Neural Networks Performances on Motorboat Datasets....Pages 212-220
Dynamic Role Assignment for Multi-agent Cooperation....Pages 221-229
Lexical Ambiguity Resolution for Turkish in Direct Transfer Machine Translation Models....Pages 230-238
Design of a Feature Set for Face Recognition Problem....Pages 239-247
Low-Cost Microarchitectural Techniques for Enhancing the Prediction of Return Addresses on High-Performance Trace Cache Processors....Pages 248-257
Recovery Logics for Speculative Update Global and Local Branch History....Pages 258-266
An ILP Formulation for Task Scheduling on Heterogeneous Chip Multiprocessors....Pages 267-276
Hardware Designs for Local Alignment of Protein Sequences....Pages 277-285
A New Model of BAM: Alpha-Beta Bidirectional Associative Memories....Pages 286-295
PARM: Data Structure for Efficient Volume Ray Casting....Pages 296-305
Triangle Propagation for Mass-Spring Chain Algorithm....Pages 306-315
Hardware Acceleration of Terrain Visualization Using ef- Buffers....Pages 316-324
Computer Simulation of Woven Fabric Defects Based on Faulty Yarn Photographs....Pages 325-333
Bidirectional Distancemap for Efficient Volume Ray Casting....Pages 334-342
Segmenting Free-Form 3D Objects by a Function Representation in Spherical Coordinates....Pages 343-352
Applying Natural Neighbor Coordinates for Electromagnetic Tracker Calibration....Pages 353-362
Minkowski Sum Based Octree Generation for Triangular Meshes....Pages 363-373
Hardware-Oriented Visualisation of Trees....Pages 374-383
A Multi-resolution Technique for Real-time Animation of Large Crowds....Pages 384-393
A Framework for Working with Digitized Cultural Heritage Artifacts....Pages 394-400
On the Stability of Application-Layer Multicast Tree....Pages 401-412
Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks....Pages 413-423
A New Function for Optimization of Working Paths in Survivable MPLS Networks....Pages 424-433
HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes....Pages 434-444
Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time Communication....Pages 445-454
A Model of a Packet Aggregation System....Pages 455-463
On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network Traffic....Pages 464-473
Throughput Analysis of UDP and VPN Traffic in 802.11g Networks....Pages 474-482
Path Loss Rate Driven Burst Assembly in OBS Networks....Pages 483-492
Pixel Domain Spatio-temporal Denoising for Archive Videos....Pages 493-502
Fast Sub-pixel Motion Estimation by Means of One-Bit Transform....Pages 503-510
Neighborhood Decomposition of Convex Structuring Elements for Mathematical Morphology on Hexagonal Grid....Pages 511-521
Block Motion Estimation Using Modified Two-Bit Transform....Pages 522-531
3D Face Tracking Using Appearance Registration and Robust Iterative Closest Point Algorithm....Pages 532-541
Video as Input: Spiral Search with the Sparse Angular Sampling....Pages 542-552
An Adept Segmentation Algorithm and Its Application to the Extraction of Local Regions Containing Fiducial Points....Pages 553-562
Lossless Compression of Volumetric Medical Data....Pages 563-571
Identification of Luminal and Medial Adventitial Borders in Intravascular Ultrasound Images Using Level Sets....Pages 572-582
Prediction of Moving Object Location Based on Frequent Trajectories....Pages 583-592
A Framework for Visualizing Association Mining Results....Pages 593-602
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources....Pages 603-612
Evaluating Proposals in Web Services Negotiation....Pages 613-621
Nested Bitemporal Relational Algebra....Pages 622-633
A Protocol for Reconciling Recovery and High-Availability in Replicated Databases....Pages 634-644
Migrating a Hierarchical Legacy Database Application onto an XML-Based Service-Oriented Web Platform....Pages 645-654
Power-Aware Processors for Wireless Sensor Networks....Pages 655-664
Effects of Asynchronism and Neighborhood Size on Clustering in Self-propelled Particle Systems....Pages 665-676
Virtual-ROM: A New Demand Paging Component for RTOS and NAND Flash Memory Based Mobile Devices....Pages 677-686
Model-Driven Development of RTOS-Based Embedded Software....Pages 687-696
A Target Oriented Agent to Collect Specific Information in a Chat Medium....Pages 697-706
Algorithms for Within-Cluster Searches Using Inverted Files....Pages 707-716
Effect of Inverted Index Partitioning Schemes on Performance of Query Processing in Parallel Text Retrieval Systems....Pages 717-725
Exploiting Social Networks Dynamics for P2P Resource Organisation....Pages 726-734
Security Considerations in e-Cognocracy....Pages 735-744
A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol Performance....Pages 745-754
A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing....Pages 755-764
Camera-Based Virtual Environment Interaction on Mobile Devices....Pages 765-773
A Cost Model for an Adaptive Cell-Based Index Structure....Pages 774-782
Positioning Method for Outdoor Systems in Wireless Sensor Networks....Pages 783-792
Formal Description of a Runtime Infrastructure for Automatic Distribution of Programs....Pages 793-802
Super-Peer Selection Based Framework Using Dynamic Capacity and Similarity....Pages 803-812
A General Graph Model for Representing Exact Communication Volume in Parallel Sparse Matrix–Vector Multiplication....Pages 813-824
Safety of Rollback-Recovery Protocol Maintaining WFR Session Guarantee....Pages 825-833
3-D Parallel Implementation of the Wave-Equation PML Algorithm Using Distributed System....Pages 834-843
Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM....Pages 844-853
jEQN a Java-Based Language for the Distributed Simulation of Queueing Networks....Pages 854-865
Exact Performance Measures for Peer-to-Peer Epidemic Information Diffusion....Pages 866-876
A Leader Election Protocol for Timed Asynchronous Distributed Systems....Pages 877-886
Computing the Steady-State Distribution of G-networks with Synchronized Partial Flushing....Pages 887-896
Worst-Case Analysis of Router Networks with Rival Queueing Models....Pages 897-907
An Anomaly Intrusion Detection Approach Using Cellular Neural Networks....Pages 908-917
A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers....Pages 918-923
Improved Merkle Cryptosystem (IMC)....Pages 924-934
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing....Pages 935-942
Capture Resilient ElGamal Signature Protocols....Pages 943-951
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks....Pages 952-962
A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps....Pages 963-971
A Non-committing Encryption Scheme Based on Quadratic Residue....Pages 972-980
Biometric Cryptosystem Using Online Signatures....Pages 981-990
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography....Pages 991-1001
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity....Pages 1002-1010
Deterministic Analysis of Balancedness in Symmetric Cryptography....Pages 1011-1020
Test Suite Reduction Based on Dependence Analysis....Pages 1021-1030
Realism in Project-Based Software Engineering Courses: Rewards, Risks, and Recommendations....Pages 1031-1039
Problems of Adiabatic Quantum Program Design....Pages 1040-1049
Modified Cognitive Complexity Measure....Pages 1050-1059
Coverage-Based, Prioritized Testing Using Neural Network Clustering....Pages 1060-1071
Component Oriented Design Based on Axiomatic Design Theory and COSEML....Pages 1072-1079
Back Matter....Pages -