Titel: Computational Science and Its Applications - ICCSA 2004. Pt.1
International Conference, Assisi, Italy, May 14-17, 2004. Proceedings.
Sprachen: Deutsch Englisch.
Herausgegeben von A. Lagana, Marina L. Gavrilova, Vipin Kumar
7. Mai 2004 - kartoniert - 1185 Seiten
The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14-17, 2004.
Information Systems and Information Technologies (ISIT) Workshop, Multimedia Session.- Face Detection by Facial Features with Color Images and Face Recognition Using PCA.- A Shakable Snake for Estimation of Image Contours.- A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained Ambiguity.- A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge Model.- A Feature-Based Algorithm for Recognizing Gestures on Portable Computers.- Fingerprint Matching Based on Linking Information Structure of Minutiae.- Video Summarization Using Fuzzy One-Class Support Vector Machine.- A Transcode and Prefetch Technique of Multimedia Presentations for Mobile Terminals.- Information Systems and Information Technologies (ISIT) Workshop, Algorithm Session.- A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurg.- A Study on Methodology for Enhancing Reliability of Datapath.- A Useful Method for Multiple Sequence Alignment and Its Implementation.- A Research on the Stochastic Model for Spoken Language Understanding.- The Association Rule Algorithm with Missing Data in Data Mining.- Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow.- On Negation-Based Conscious Agent.- A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Document.- A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic Features.- Information Systems and Information Technologies (ISIT) Workshop, Security Session.- Network Security Management Using ARP Spoofing.- A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks.- A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient Sign.- A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates.- A Fuzzy Expert System for Network Forensics.- A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models.- The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations.- Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IP.- Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems .- New Approach for Secure and Efficient Metering in the Web Advertising.- MLS/SDM: Multi-level Secure Spatial Data Model.- Detection Techniques for ELF Executable File Using Assembly Instruction Searching.- Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain.- Committing Secure Results with Replicated Servers.- Applied Research of Active Network to Control Network Traffic in Virtual Battlefield.- Design and Implementation of the HoneyPot System with Focusing on the Session Redirection.- Information Systems and Information Technologies (ISIT) Workshop, Network Session.- Analysis of Performance for MCVoD System.- A QoS Improvement Scheme for Real-Time Traffic Using IPv6 Flow Labels.- Energy-Efficient Message Management Algorithms in HMIPv6.- A Queue Management Scheme for Alleviating the Impact of Packet Size on the Achieved Throughput.- PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack.- Traffic Control Scheme of ABR Service Using NLMS in ATM Network.- Information Systems and Information Technologies (ISIT) Workshop, Grid Session.- XML-Based Workflow Description Language for Grid Applications.- Placement Algorithm of Web Server Replicas.- XML-OGL: UML-Based Graphical Web Query Language for XML Documents.- Layered Web-Caching Technique for VOD Services.- QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application.- Efficient Pre-fetch and Pre-release Based Buffer Cache Management for Web Applications.- A New Architecture Design for Differentiated Resource Sharing on Grid Service.- An Experiment and Design of Web-Based Instruction Model for Collaboration