We welcomed participants to the 1st EurAsian Conference on Advances in Information and Communication Technology (EurAsia ICT 2002) held in Iran. The aim of the conference was to serve as a forum to bring together researchers from academia and commercial developers from industry to discuss the current state of the art in ICT, mainly in Europe and Asia. Inspirations and new ideas were expected to emerge from intensive discussions during formal sessions and social events. Keynote addresses, research presentation, and discussion during the conference helped to further develop the exchange of ideas among the researchers, developers, and practitioners who attended. The conference attracted more than 300 submissions and each paper was reviewed by at least three program committee members. The program committee selected 119 papers from authors of 30 different countries for presentation and publication, a task which was not easy due to the high quality of the submitted papers. Eleven workshops were organized in parallel with the EurAsia ICT conference. The proceedings of these workshops, with more than 100 papers, were published by the Austrian Computer Society. We would like to express our thanks to our colleagues who helped with putting together the technical program: the program committee members and external reviewers for their timely and rigorous reviews of the papers, and the organizing committee for their help in administrative work and support. We owe special thanks to Thomas Schierer for always being available when his helping hand was needed.
Author(s): M. Mehdi Homayounpour (auth.), Hassan Shafazand, A. Min Tjoa (eds.)
Series: Lecture Notes in Computer Science 2510
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002
Language: English
Pages: 1028
Tags: Information Systems and Communication Service; Computer Communication Networks; Software Engineering/Programming and Operating Systems; Computing Methodologies; Computer Imaging, Vision, Pattern Recognition and Graphics
Speaker Model and Decision Threshold Updating in Speaker Verification....Pages 1-10
Application of Constraint Hierarchy to Timetabling Problems....Pages 11-18
An Intelligent System for Therapy Control in a Distributed Organization....Pages 19-26
Discovering Local Patterns from Multiple Temporal Sequences....Pages 27-34
The Geometric Framework for Exact and Similarity Querying XML Data....Pages 35-46
A Mobile System for Extracting and Visualizing Protein-Protein Interactions....Pages 47-56
Discovering Temporal Relation Rules Mining from Interval Data....Pages 57-66
An Abstract Image Representation Based on Edge Pixel Neighborhood Information (EPNI)....Pages 67-74
Motion Estimation Based on Temporal Correlations....Pages 75-83
A New Boundary Matching Algorithm Based on Edge Detection....Pages 84-92
Lookmark: A 2.5D Web Information Visualization System....Pages 93-101
Different Local Search Algorithms in STAGE for Solving Bin Packing Problem....Pages 102-109
A Prototype for Functionality Based Network Management System....Pages 110-116
Coaching a Soccer Simulation Team in RoboCup Environment....Pages 117-126
Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme....Pages 127-134
A New Scheme Based on Semiconductor Lasers with Phase-Conjugate Feedback for Cryptographic Communications....Pages 135-144
Parallel Algorithm and Architecture for Public-Key Cryptosystem....Pages 145-153
Specification and Verification of Security Policies in Firewalls....Pages 154-163
Image Segmentation Based on Shape Space Modeling....Pages 164-171
HERMES: File System Support for Multimedia Streaming in Information Home Appliance....Pages 172-179
Motion Vector Recovery for Error Concealment Based on Macroblock Distortion Modeling....Pages 180-187
A Memory Copy Reduction Scheme for Networked Multimedia Service in Linux Kernel....Pages 188-195
Hidden Markov Model and Neural Network Hybrid....Pages 196-203
Neural Network Based Algorithms for IP Lookup and Packet Classification....Pages 204-211
Non-linear Prediction of Speech Signal Using Artificial Neural Nets....Pages 212-219
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server....Pages 220-227
Development of UML Descriptions with USE....Pages 228-238
FPGA Implementation of Digital Chaotic Cryptography....Pages 239-247
Stereo for Recovering Sharp Object Boundaries....Pages 248-255
Priority Vantage Points Structures for Similarity Queries in Metric Spaces....Pages 256-263
A High Performance Image Coding Using Uniform Morphological Sampling, Residues Classifying, and Vector Quantization....Pages 264-271
A Genetic Algorithm for Steiner Tree Optimization with Multiple Constraints Using Prüfer Number....Pages 272-280
A New Technique for Participation of Non-CORBA Independent Persistent Objects in OTS Transactions....Pages 281-288
Compositional Modelling of Workflow Processes....Pages 289-296
EDMIS: Metadata Interchange System for OLAP....Pages 297-305
An Efficient Method for Controlling Access in Object-Oriented Databases....Pages 306-313
Extracting Information from XML Documents by Reverse Generating a DTD....Pages 314-321
Mapping XML-Schema to Relational Schema....Pages 322-329
Flexible Modification of Relational Schema by X2RMap in Storing XML into Relations....Pages 330-338
B2B Integration — Aligning ebXML and Ontology Approaches....Pages 339-349
An Agent Based Service Discovery Architecture for Mobile Environments....Pages 350-357
Location Management Using Multicasting HLR in Mobile Networks....Pages 358-365
Packet Error Probability of Multi-carrier CDMA System in Fast/Slow Correlated Fading Plus Interference Channel....Pages 366-376
A Distributed Low-Cost Dynamic Multicast Routing Algorithm with Delay Constraints....Pages 377-386
A New Bandwidth Reduction Method for Distributed Rendering Systems....Pages 387-394
Neural Networks Based Mesh Generation Method in 2-D....Pages 395-401
Image Denoising Using Hidden Markov Models....Pages 402-409
Anaphoric Definitions in Description Logic....Pages 410-417
Storage and Querying of High Dimensional Sparsely Populated Data in Compressed Representation....Pages 418-425
The GlobData Fault-Tolerant Replicated Distributed Object Database....Pages 426-433
A Levelized Schema Extraction for XML Document Using User-Defined Graphs....Pages 434-441
Extracting, Interconnecting, and Accessing Heterogeneous Data Sources: An XML Query Based Approach....Pages 442-449
Call Admission Control in Cellular Mobile Networks: A Learning Automata Approach....Pages 450-457
An Adaptive Flow Control Scheme for Improving TCP Performance in Wireless Internet....Pages 458-465
An Adaptive TCP Protocol for Lossy Mobile Environment....Pages 466-478
Design and Implementation of Application-Level Multicasting Services over ATM Networks....Pages 479-486
Bon: The Persian Stemmer....Pages 487-494
Current and Future Features of Digital Journals....Pages 495-502
Solving Language Problems in a Multilingual Digital Library Federation....Pages 503-510
Performing IP Lookup on Very High Line Speed....Pages 511-518
A Study of Marking Aggregated TCP and UDP Flows Using Generalized Marking Scheme....Pages 519-526
Towards the Global Information Society: The Enactment of a Regulatory Framework as a Factor of Transparency and Social Cohesion....Pages 527-535
On the Application of the Semantic Web Concepts to Adaptive E-learning....Pages 536-543
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm....Pages 544-551
The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU....Pages 552-559
Monte Carlo Soft Handoff Modeling....Pages 560-568
A QoS Provision Architecture for Mobile IPv6 over MPLS Using HMAT....Pages 569-579
A New Propagation Model for Cellular Mobile Radio Communications in Urban Environments Including Tree Effects....Pages 580-587
A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme....Pages 588-596
Transmission Time Analysis of WAP over CDMA System Using Turbo Code Scheme....Pages 597-606
On the Use of New Technologies in Health Care....Pages 607-614
Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless Networks....Pages 615-623
A Dynamic Backoff Scheme to Guarantee QoS over IEEE 802.11 Wireless Local Area Networks....Pages 624-631
Performance Evaluation of Serial/Parallel Block Coded CDMA System with Complex Spreading in Near/Far Multiple-Access Interference and Multi-path Nakagami Fading Channel....Pages 632-642
A Learning Automata Based Dynamic Guard Channel Scheme....Pages 643-650
Dynamic System Simulation on the Web....Pages 651-658
Using Proximity Information for Load Balancing in Geographically Distributed Web Server Systems....Pages 659-666
Strategic Tool for Assessment of the Supply and Demand Relationship between ASPs and SMEs for Competitive Advantage....Pages 667-676
Trust and Commitment in Dynamic Logic....Pages 677-684
Modelling Heterogeneity in Multi Agent Systems....Pages 685-692
Pricing Agents for a Group Buying System....Pages 693-700
Evolution of Cooperation in Multiagent Systems....Pages 701-710
A Dynamic Window-Based Approximate Shortest Path Re-computation Method for Digital Road Map Databases in Mobile Environments....Pages 711-720
Web-Based Process Control Systems: Architectural Patterns, Data Models, and Services....Pages 721-729
A Comparison of Techniques to Estimate Response Time for Data Placement....Pages 730-738
Using a Real-Time Web-Based Pattern Recognition System to Search for Component Patterns Database....Pages 739-746
An Adaptive Call Admission Control to Support Flow Handover in Wireless Ad Hoc Networks....Pages 747-754
Design of Optimal LA in Personal Communication Services Network Using Simulated Annealing Technique....Pages 755-765
Secure Bluetooth Piconet Using Non-anonymous Group Key....Pages 766-777
Differentiated Bandwidth Allocation and Power Saving for Wireless Personal Area Networks....Pages 778-785
Combining Extreme Programming with ISO 9000....Pages 786-794
The Class Cohesion Using the Reference Graph G1 and G2....Pages 795-805
Process-Oriented Interactive Simulation of Software Acquisition Projects....Pages 806-815
Automatic Design Patterns Identification of C++ Programs....Pages 816-823
Specifying the Merging of Desires into Goals in the Context of Beliefs....Pages 824-831
The Illegal Copy Protection Using Hidden Agent....Pages 832-841
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System....Pages 842-849
H -Colorings of Large Degree Graphs....Pages 850-857
Hyper-Star Graph: A New Interconnection Network Improving the Network Cost of the Hypercube....Pages 858-865
Sequential Consistency as Lazy Linearizability....Pages 866-873
Embedding Full Ternary Trees into Recursive Circulants....Pages 874-882
A Handoff Priority Scheme for TDMA/FDMA-Based Cellular Networks....Pages 883-890
On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies....Pages 891-898
Intelligent Paging Strategy in 3G Personal Communication Systems....Pages 899-906
Experience from Mobile Application Service Framework in WIP....Pages 907-915
An Efficient Approach to Improve TCP Performance over Wireless Networks....Pages 916-925
Extended Hexagonal Constellations as a Means of Multicarrier PAPR Reduction....Pages 926-936
Adaptive Application-Centric Management in Meta-computing Environments....Pages 937-944
The Weakest Failure Detector for Solving Election Problems in Asynchronous Distributed Systems....Pages 945-952
From Lens to Flow Structure....Pages 953-964
ADML: A Language for Automatic Generation of Migration Plans....Pages 965-974
Considerations for Using Domain-Specific Modeling in the Analysis Phase of Software Development Process....Pages 975-981
Organizations and Normative Agents....Pages 982-989
A Framework for Agent-Based Software Development....Pages 990-997
Application of Agent Technologies in Extended Enterprise Production Planning....Pages 998-1007
Zamin: An Artificial Ecosystem....Pages 1008-1016