Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/computational-science-and-its-applications-iccsa-2005-part-ii-international-conference-singapore-may-9-12-2005-proceedings-part-ii/gervasi/descriptif_2296862
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=2296862

Computational Science and Its Applications - ICCSA 2005, 2005 International Conference, Singapore, May 9-12, 2005, Proceedings, Part II Theoretical Computer Science and General Issues Series

Langue : Anglais

Coordonnateurs : Gervasi Osvaldo, Gavrilova Marina L., Kumar Vipin, Laganà Antonio, Lee Heow Pueh, Mun Youngson, Taniar David, Tan Chih Jeng Kenneth

Couverture de l’ouvrage Computational Science and Its Applications - ICCSA 2005
The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental t- oretical research as well as endeavors in emerging ?elds. Together, these far reaching scienti?c areas contribute to shape this Conference in the realms of state-of-the-art computational science research and applications, encompassing the facilitating theoretical foundations and the innovative applications of such results in other areas.
Approaches or Methods of Security Engineering Workshop.- Implementation of Short Message Service System to Be Based Mobile Wireless Internet.- Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic Algorithm.- P2P Protocol Analysis and Blocking Algorithm.- Object Modeling of RDF Schema for Converting UML Class Diagram.- A Framework for Security Assurance in Component Based Development.- Security Framework to Verify the Low Level Implementation Codes.- A Study on Evaluation of Component Metric Suites.- The K-Means Clustering Architecture in the Multi-stage Data Mining Process.- A Privacy Protection Model in ID Management Using Access Control.- A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems.- Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems.- Modified Token-Update Scheme for Site Authentication.- A Study on Secure SDP of RFID Using Bluetooth Communication.- The Semantic Web Approach in Location Based Services.- SCTE: Software Component Testing Environments.- Computer Security Management Model Using MAUT and SNMP.- Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS Networks.- A GQS-Based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc Networks.- A Study on the E-Cash System with Anonymity and Divisibility.- An Authenticated Key Exchange Mechanism Using One-Time Shared Key.- Creation of Soccer Video Highlight Using the Caption Information.- The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent.- A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System.- An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.- A New Stream Cipher Using Two Nonlinear Functions.- New Key Management Systems for Multilevel Security.- Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation.- The Role of Secret Sharing in the Distributed MARE Protocols.- Security Risk Vector for Quantitative Asset Assessment.- A Remote Video Study Evaluation System Using a User Profile.- Performance Enhancement of Wireless LAN Based on Infrared Communications Using Multiple-Subcarrier Modulation.- Modeling Virtual Network Collaboration in Supply Chain Management.- SPA-Resistant Simultaneous Scalar Multiplication.- HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment.- A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security.- Distribution Data Security System Based on Web Based Active Database.- Efficient DoS Resistant Multicast Authentication Schemes.- Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement.- Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets.- Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme.- The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme.- IPv6/IPsec Conformance Test Management System with Formal Description Technique.- Interference Cancellation Algorithm Development and Implementation for Digital Television.- Algorithm for ABR Traffic Control and Formation Feedback Information.- Interference-Free ZCD-UWB for Wireless Home Network Applications.- Safe Authentication Method for Security Communication in Ubiquitous.- Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System.- SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization.- Design Procedure of IT Systems Security Countermeasures.- Similarity Retrieval Based on Self-organizing Maps.- An Expert System Development for Operating Procedure Monitoring of PWR Plants.- Security Evaluation Targets for Enhancement of IT Systems Assurance.- Protection Profile for Software Development Site.- Information Security and Hiding (ISH 2005) Workshop.- Improved RS Method for Detection of LSB Steganography.- Robust Undetectable Interference Watermarks.- Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms.- Color Cube Analysis for Detection of LSB Steganography in RGB Color Images.- Compact and Robust Image Hashing.- Watermarking for 3D Mesh Model Using Patch CEGIs.- Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE.- Fault Attack on the DVB Common Scrambling Algorithm.- HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment.- Perturbed Hidden Matrix Cryptosystems.- Identity-Based Identification Without Random Oracles.- Linkable Ring Signatures: Security Models and New Schemes.- Practical Scenarios for the Van Trung-Martirosyan Codes.- Obtaining True-Random Binary Numbers from a Weak Radioactive Source.- Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases.- A New Method of Building More Non-supersingular Elliptic Curves.- Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography.- Modeling of Location Management in Mobile Information Systems Workshop.- Access Control Capable Integrated Network Management System for TCP/IP Networks.- A Directional-Antenna Based MAC Protocol for Wireless Sensor Networks.- An Extended Framework for Proportional Differentiation: Performance Metrics and Evaluation Considerations.- QoS Provisioning in an Enhanced FMIPv6 Architecture.- Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm.- Design and Implementation of Frequency Offset Estimation, Symbol Timing and Sampling Clock Offset Control for an IEEE 802.11a Physical Layer.- Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet Environment.- Improved Authentication Scheme in W-CDMA Networks.- Memory Reused Multiplication Implementation for Cryptography System.- Scheme for the Information Sharing Between IDSs Using JXTA.- Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information.- Detecting Water Area During Flood Event from SAR Image.- Position Based Handover Control Method.- Improving Yellow Time Method of Left-Turning Traffic Flow at Signalized Intersection Networks by ITS.- Intelligent Multimedia Services and Synchronization in Mobile Multimedia Networks Workshop.- A Multimedia Database System Using Dependence Weight Values for a Mobile Environment.- A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular Network.- Heuristic Algorithm for Traffic Condition Classification with Loop Detector Data.- Spatial Data Channel in a Mobile Navigation System.- A Video Retrieval System for Electrical Safety Education Based on a Mobile Agent.- Fuzzy Multi-criteria Decision Making-Based Mobile Tracking.- Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application.- Design and Implementation of Mobile-Learning System for Environment Education.- A Simulation Model of Congested Traffic in the Waiting Line.- Core Technology Analysis and Development for the Virus and Hacking Prevention.- Development of Traffic Accidents Prediction Model with Intelligent System Theory.- Prefetching Scheme Considering Mobile User’s Preference in Mobile Networks.- System Development of Security Vulnerability Diagnosis in Wireless Internet Networks.- An Active Node Management System for Secure Active Networks.- Ubiquitous Web Systems and Intelligence Workshop.- A Systematic Design Approach for XML-View Driven Web Document Warehouses.- Clustering and Retrieval of XML Documents by Structure.- A New Method for Mining Association Rules from a Collection of XML Documents.- Content-Based Recommendation in E-Commerce.- A Personalized Multilingual Web Content Miner: PMWebMiner.- Context-Based Recommendation Service in Ubiquitous Commerce.- A New Continuous Nearest Neighbor Technique for Query Processing on Mobile Environments.- Semantic Web Enabled Information Systems: Personalized Views on Web Data.- Design of Vehicle Information Management System for Effective Retrieving of Vehicle Location.- Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing.- A Ubiquitous Approach for Visualizing Back Pain Data.- Prototype Design of Mobile Emergency Telemedicine System.- An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices.- Reflective Middleware for Location-Aware Application Adaptation.- Efficient Approach for Interactively Mining Web Traversal Patterns.- Query Decomposition Using the XML Declarative Description Language.- On URL Normalization.- Clustering-Based Schema Matching of Web Data for Constructing Digital Library.- Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach.- Mobile Mini-payment Scheme Using SMS-Credit.- Context Summarization and Garbage Collecting Context.- EXtensible Web (xWeb): An XML-View Based Web Engineering Methodology.- A Web Services Framework for Integrated Geospatial Coverage Data.- Open Location-Based Service Using Secure Middleware Infrastructure in Web Services.- Ubiquitous Systems and Petri Nets.- Virtual Lab Dashboard: Ubiquitous Monitoring and Control in a Smart Bio-laboratory.- On Discovering Concept Entities from Web Sites.- Modelling Complex Systems Workshop.- Towards a Realistic Microscopic Traffic Simulation at an Unsignalised Intersection.- Complex Systems: Particles, Chains, and Sheets.- Discretization of Delayed Multi-input Nonlinear System via Taylor Series and Scaling and Squaring Technique.- On the Scale-Free Intersection Graphs.- A Stochastic Viewpoint on the Generation of Spatiotemporal Datasets.- A Formal Approach to the Design of Distributed Data Warehouses.- A Mathematical Model for Genetic Regulation of the Lactose Operon.- Network Emergence in Immune System Shape Space.- A Multi-agent System for Modelling Carbohydrate Oxidation in Cell.- Characterizing Complex Behavior in (Self-organizing) Multi-agent Systems.- Protein Structure Abstractionand Automatic Clustering Using Secondary Structure Element Sequences.- A Neural Network Method for Induction Machine Fault Detection with Vibration Signal.

Date de parution :

Ouvrage de 1316 p.

15.5x23.5 cm

Sous réserve de disponibilité chez l'éditeur.

Prix indicatif 105,49 €

Ajouter au panier