Computational Science and Its Applications - ICCSA 2004: International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Partie 2

Couverture
Antonio Laganà, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, C.J. Kenneth Tan, Osvaldo Gervasi
Springer Science & Business Media, 21 mai 2004 - 1143 pages
The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004.
 

Table des matières

Grid Computing Workshop
1
An Information Engineering Methodology for the Security Strategy
13
A Smart AgentBased Grid Computing Platform
20
A Useful Method for Multiple Sequence Alignment
30
The PROVE Trace Visualisation Tool as a Grid Service 37 336
37
Optimal Server Allocation in Reconfigurable Clusters with
76
A Research on the Stochastic Model
89
Task Allocation for Minimizing Programs Completion Time
97
Generation of Unordered Binary Trees
648
A Differential Method for Parametric Surface Intersection
651
Secure Handoff Based on Dual Session Keys in Mobile
663
Security of Shen et al s TimestampBased Password
665
Asymptotic Error Estimate of Iterative NewtonType Methods
667
Visualization of Large Terrain Using Nonrestricted
671
Design of Mobile Network Route Optimization Based
673
A FineGrained Taxonomy of Security Vulnerability
681

Constructing Control Flow Graph for Java by Decoupling Exception
106
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion
107
3DColorStructureCode A New Nonplainness Island Hierarchy
109
Adaptive IntervalBased Caching Management Scheme for Cluster
116
A Document Classification Algorithm Using the Fuzzy Set Theory
122
Partitioning Orthogonal Polygons by Extension of All Edges
127
The Measurement of an Optimum Load Balancing Algorithm in
136
Network Security Management Using ARP Spoofing
142
Price Driven Market Mechanism for Computational
148
A DAGBased XCIGS Algorithm for Dependent Tasks
159
A SequenceFocused Parallelisation of EMBOSS on a Cluster
168
Parallel and Distributed Computing Workshop
178
A Design of Preventive Integrated Security Management System
183
Conflict Resolution of Data Synchronization in Mobile Environment
197
Authentication of Mobile Node Using AAA in Coexistence of
199
Maximizing Parallelism for Nested Loops
213
New Approach for Secure and Efficient Metering
215
Multiplier with Parallel CSA Using CRTs Specific Moduli
216
Detection Techniques for ELF Executable File Using Assembly
230
Gossip Based Causal Order Broadcast Algorithm
233
Remote Visualization Based on Grid Computing
236
Incremental Adaptive Loop Subdivision
237
Committing Secure Results with Replicated Servers
246
Reverse Subdivision Multiresolution for Polygonal Silhouette
247
A Modified Parallel Computation Model Based on Cluster
252
Cylindrical Approximation of a Neuron from
257
Skeletizing 3DObjects by Projections
267
A Parallel Volume Splatting Algorithm Based on PCClusters
272
Track on Computational Geometry
277
A QOS Improvement Scheme for RealTime Traffic
278
Error Concealment Method Using ThreeDimensional
288
A Queue Management Scheme for Alleviating the Impact
294
Confidence Sets for the Aumann Mean of a Random Closed Set
298
An Algorithm of Mapping Additional Scalar Value in 2D Vector
308
Traffic Control Scheme of ABR Service Using NLMS in ATM Network
310
Numerical Revelation and Analysis of Critical Ignition Conditions
313
Exact Calculation
315
Curvature Dependent Polygonization by the Edge Spinning
325
Bond Order Potentials for a priori Simulations
328
A Novel Model for Defining Topological LineRegion Relations
335
Inorganic Phosphates Investigation by Support Vector Machine
338
Layered WebCaching Technique for VOD Services
345
Characterization of Equilibrium Structure for N2N2 Dimer
350
Approximation Algorithms for kSource Bottleneck Routing Cost
355
A Time Dependent Study of the Nitrogen Atom Nitrogen
357
Efficient Prefetch and Prerelease Based Buffer Cache Management
360
From DFT Cluster Calculations to Molecular Dynamics Simulation
366
Efficient Sequential and Parallel Algorithms for Popularity
367
A New Architecture Design for Differentiated Resource Sharing
370
Molecular Mechanics and Dynamics Calculations to Bridge Molecular
374
Decentralized Interagent Message Forwarding Protocols
376
Direct Simulation Monte Carlo Modeling of Non Equilibrium
383
Performance Limitation of STBC OFDMCDMA Systems
386
Molecular Simulation of Reaction and Adsorption in Nanochemical
392
An Efficient Simple Cooling Schedule for Simulated Annealing
396
Quantum Generalization of Molecular Dynamics Method
402
A ProblemSpecific Convergence Bound for Simulated
405
C6NH6+ Ions as Intermediates in the Reaction between
412
Comparison and Selection of Exact and Heuristic Algorithms
415
Reducing Link Loss in Ad Hoc Networks
418
Towards a Full Dimensional Exact Quantum Calculation
422
Adaptive Texture Recognition in Image Sequences with Prediction
425
Conformations of 1246Tetrathiepane
432
Fuzzy Matching of User Profiles for a Banner Engine
433
Delay and Collision Reduction Mechanism for Distributed Fair
434
Track on Biology Biochemistry Bioinformatics
443
Numerical Models in Biomechanics Session
445
Introduction and Evaluation of Development System Security
451
Achieving Fair New Call CAC for Heterogeneous Services
460
Design on Mobile Secure Electronic Transaction Protocol
461
High Throughput insilico Screening against Flexible
465
Musculoskeletal Modeling of Lumbar Spine under Follower Loads
467
Visual Mining of Market Basket Association Rules
479
A Design of Configuration Management Practices and CMPET
481
Encoding Image Based on Retinal Ganglion Cell
486
Track on Signal Processing
493
Track on Software Engineering
496
from Renal Measurements with a ThreeHeaded SPECT System
504
Computation of Multiplicative Inverses in GF2
510
Using C++ Functors with Legacy C Libraries
514
Distributed Mutual Exclusion Algorithms on a Ring of Clusters
518
ParallelDistributed Film Line Scratch Restoration
525
User Authentication Protocol Based on Human Memorable Password
527
Frameworks as Web Services
534
Distributed Optimization of Fiber Optic Network Layout
538
On Triangulations
544
Intrusion Detection Using Noisy Training Data
547
A Reduced Codification for the Logical Representation
553
Probability Distribution of OpCodes in Edgebreaker
554
A Personalized Recommendation Agent System
558
SimulationBased Security Testing for Continuity of Essential
567
Synthesis of Mechanical Structures Using a Genetic Algorithm
573
Track on Security Engineering
574
Track on Computational Medicine
575
Fast and Efficient Rendering System
592
Information Fusion for Probabilistic Reasoning and Its Application
593
An Authenticated Key Agreement Protocol Resistant
603
A Case Study in Applying Common Criteria to Development Process
608
Track on Computational Methods
611
Parametric Freehand Sketches
613
Architecture Environments for Ebusiness Agent Based on Security
625
A TwoPublic Key Scheme Omitting Collision Problem
627
Workshop on Computational Geometry
630
Bézier Solutions of the Wave Equation
631
Simple and Efficient Group Key Agreement
645
An Efficient Conference Key Distribution System Based
647
DMKB A Defense Mechanism Knowledge Base
683
Improved Mathematical
686
A Secure and Flexible Multisigncryption Scheme
689
Image Coherence Based Adaptive Sampling for Image Synthesis 693
695
A New RoleBased Authorization Model
701
A Comparison of Multiresolution Modelling
703
Applications of Fuzzy Data Mining Methods for Intrusion
706
Effective Packet Marking Approach to Defend against DDoS Attack
708
Texture Mapping on Arbitrary 3D Surfaces
721
A Robust Image Authentication Method Surviving Acceptable
722
A Relationship of Configuration Management Requirements
725
Optimizing Symmetric FFTs with Prime EdgeLength
736
Performance Improvement in Mobile IPv6 Using
738
A Bandwidth Reduction Scheme for 3D TextureBased Volume
741
ContextBased Proofreading of Structured Documents
743
Applied Research of Active Network to Control Network Traffic
751
A PolicyBased Security Management Architecture Using XML
755
Where the Truth Lies in Automatic Theorem Proving
761
Storing Together the Structural Information of XML Documents
763
An Integrated XML Security Mechanism for Mobile Grid Application
776
An Application of Computer Graphics for Landscape
779
Isolating and Specifying the Relevant Information of
783
A Scheme for Improving WEP Key Transmission between
792
View Morphing Based on Autocalibration for Generation
801
A New Pedagogical
807
An ObjectOriented Metric to Measure the Degree of Dependency
808
Security Issues in Network File Systems
812
Virtual Reality Technology Applied to Simulate
817
A ContentIndependent Scalable Encryption Model
821
Virtual Reality Applied to Molecular Sciences
827
Multimodal Biometrics System Using Face and Signature
828
A Geometrical Approach for Network Intrusion Detection
841
Dynamically Changing Road Networks Modelling
843
An Efficient Parameter Estimation Technique
847
Association Inlining for Mapping XML DTDs to Relational Tables
849
A Computer Tool for the Generation
857
Use of Spectral Techniques in the Design
859
Ontologies in Fashion
863
Macroscopic Treatment to Polymorphic Email Based Viruses
867
An Efficient Cache Conscious Multidimensional Index Structure
869
Making Discrete Games
877
WebBased Learning Session
880
A Scalable PKI for Secure Routing in the Internet
882
Speech Driven Facial Animation Using Chinese Mandarin
886
Feature Extraction and Correlation for TimetoImpact
887
Cryptanalysis and Improvement of Password Authenticated
895
Autonomic Protection System Using Adaptive Security Policy
896
The Development and Application of a WebBased Information
902
A Novel Method to Support Users Consent in Usage Control
906
DDoS Attack Defense Architecture Using
915
Observing Standards for WebBased Learning from the Web
922
A New Approach for Numerical Identification
926
KolmogorovSmirnov Test for Image Comparison
933
Chaotic Protocols
938
Relevance Feedback for ContentBased Image Retrieval Using
942
Track on Mobile Computing Systems
945
Image Corner Detection Using Radon Transform
948
Face Detection by Facial Features with Color Images and Face
1
A Shakable Snake for Estimation of Image Contours 9
9
Disc Covering Problem with Application to Digital Halftoning 11
11
A New Recurrent Fuzzy Associative Memory for Recognizing
17
A SpaceEfficient Incomplete LU Preconditioner 20
20
On Local Transformations in Plane Geometric Graphs Embedded
22
A Novel Approach for ContentsBased Ecatalogue Image Retrieval
25
Optimal Gait Control for a Biped Locomotion
29
Reducing the Time Complexity of MinkowskiSum Based Similarity
32
A FeatureBased Algorithm for Recognizing Gestures
33
Efficient Key Distribution Protocol for Secure Multicast
34
A Bayes Algorithm for the Multitask Pattern Recognition Problem
39
Fingerprint Matching Based on Linking Information Structure
41
A Practical Algorithm for Approximating Shortest Weighted Path
42
Video Summarization Using Fuzzy OneClass Support Vector Machine 49
49
PlaneSweep Algorithm of Onlogn for the Inclusion Hierarchy
53
New Parameter for Balancing Two Independent Measures
56
A Transcode and Prefetch Technique of Multimedia Presentations
57
Shortest Paths for Disc Obstacles 62
62
A Study on Generating an Efficient Bottomup Tree Rewrite Machine
65
A Study on Efficient Key Distribution and Renewal
66
Improving the Global Continuity of the Natural
71
A Study on Methodology for Enhancing Reliability of Datapath 73
73
Track on Parallel and Distributed Computing
77
Combinatories and Triangulations 81
81
Approximations for Two DecompositionBased Geometric
90
Computing Largest Empty Slabs 99
99
A Novel LMS Method for RealTime Network Traffic Prediction 127
127
On the Time Complexity of Rectangular Covering Problems
137
A MarketBased Scheduler for JXTABased PeertoPeer
147
CORBABased Multithreaded Distributed Simulation
167
A Fuzzy Expert System for Network Forensics 175
175
Automated Model Generation System Based on Freeform Deformation
178
A Systematic Database Summary Generation Using
185
The Employment of Regular Triangulation for Constrained
198
Implementation of the VoronoiDelaunay Method for Analysis
217
Intermediate View Synthesis from Stereoscopic
243
Control Messaging Channel for Distributed Computer Systems 261
261
Design and Implementation of the HoneyPot System with Focusing
262
DistortionFree of General Information with Edge Enhanced Error
281
Filtering of Colored Noise for Signal Enhancement 301
301
Effective Digital Watermarking Algorithm by Contour Detection 321
321
RealTime Video Watermarking for MPEG Streams 348
348
Object Boundary Edge Selection Using LevelofDetail Canny Edges 369
369
A Study on Neural Networks Using Taylor Series Expansion
389
Speech Emotion Recognition and Intensity Estimation 406
406
Automatic Selecting Coefficient for Semiblind Watermarking 421
421
Droits d'auteur

Autres éditions - Tout afficher

Expressions et termes fréquents

Informations bibliographiques