Computational Science and Its Applications - ICCSA 2004: International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Partie 2Antonio Laganà, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, C.J. Kenneth Tan, Osvaldo Gervasi Springer Science & Business Media, 21 mai 2004 - 1143 pages The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004. |
Table des matières
Grid Computing Workshop | 1 |
An Information Engineering Methodology for the Security Strategy | 13 |
A Smart AgentBased Grid Computing Platform | 20 |
A Useful Method for Multiple Sequence Alignment | 30 |
The PROVE Trace Visualisation Tool as a Grid Service 37 336 | 37 |
Optimal Server Allocation in Reconfigurable Clusters with | 76 |
A Research on the Stochastic Model | 89 |
Task Allocation for Minimizing Programs Completion Time | 97 |
Generation of Unordered Binary Trees | 648 |
A Differential Method for Parametric Surface Intersection | 651 |
Secure Handoff Based on Dual Session Keys in Mobile | 663 |
Security of Shen et al s TimestampBased Password | 665 |
Asymptotic Error Estimate of Iterative NewtonType Methods | 667 |
Visualization of Large Terrain Using Nonrestricted | 671 |
Design of Mobile Network Route Optimization Based | 673 |
A FineGrained Taxonomy of Security Vulnerability | 681 |
Constructing Control Flow Graph for Java by Decoupling Exception | 106 |
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion | 107 |
3DColorStructureCode A New Nonplainness Island Hierarchy | 109 |
Adaptive IntervalBased Caching Management Scheme for Cluster | 116 |
A Document Classification Algorithm Using the Fuzzy Set Theory | 122 |
Partitioning Orthogonal Polygons by Extension of All Edges | 127 |
The Measurement of an Optimum Load Balancing Algorithm in | 136 |
Network Security Management Using ARP Spoofing | 142 |
Price Driven Market Mechanism for Computational | 148 |
A DAGBased XCIGS Algorithm for Dependent Tasks | 159 |
A SequenceFocused Parallelisation of EMBOSS on a Cluster | 168 |
Parallel and Distributed Computing Workshop | 178 |
A Design of Preventive Integrated Security Management System | 183 |
Conflict Resolution of Data Synchronization in Mobile Environment | 197 |
Authentication of Mobile Node Using AAA in Coexistence of | 199 |
Maximizing Parallelism for Nested Loops | 213 |
New Approach for Secure and Efficient Metering | 215 |
Multiplier with Parallel CSA Using CRTs Specific Moduli | 216 |
Detection Techniques for ELF Executable File Using Assembly | 230 |
Gossip Based Causal Order Broadcast Algorithm | 233 |
Remote Visualization Based on Grid Computing | 236 |
Incremental Adaptive Loop Subdivision | 237 |
Committing Secure Results with Replicated Servers | 246 |
Reverse Subdivision Multiresolution for Polygonal Silhouette | 247 |
A Modified Parallel Computation Model Based on Cluster | 252 |
Cylindrical Approximation of a Neuron from | 257 |
Skeletizing 3DObjects by Projections | 267 |
A Parallel Volume Splatting Algorithm Based on PCClusters | 272 |
Track on Computational Geometry | 277 |
A QOS Improvement Scheme for RealTime Traffic | 278 |
Error Concealment Method Using ThreeDimensional | 288 |
A Queue Management Scheme for Alleviating the Impact | 294 |
Confidence Sets for the Aumann Mean of a Random Closed Set | 298 |
An Algorithm of Mapping Additional Scalar Value in 2D Vector | 308 |
Traffic Control Scheme of ABR Service Using NLMS in ATM Network | 310 |
Numerical Revelation and Analysis of Critical Ignition Conditions | 313 |
Exact Calculation | 315 |
Curvature Dependent Polygonization by the Edge Spinning | 325 |
Bond Order Potentials for a priori Simulations | 328 |
A Novel Model for Defining Topological LineRegion Relations | 335 |
Inorganic Phosphates Investigation by Support Vector Machine | 338 |
Layered WebCaching Technique for VOD Services | 345 |
Characterization of Equilibrium Structure for N2N2 Dimer | 350 |
Approximation Algorithms for kSource Bottleneck Routing Cost | 355 |
A Time Dependent Study of the Nitrogen Atom Nitrogen | 357 |
Efficient Prefetch and Prerelease Based Buffer Cache Management | 360 |
From DFT Cluster Calculations to Molecular Dynamics Simulation | 366 |
Efficient Sequential and Parallel Algorithms for Popularity | 367 |
A New Architecture Design for Differentiated Resource Sharing | 370 |
Molecular Mechanics and Dynamics Calculations to Bridge Molecular | 374 |
Decentralized Interagent Message Forwarding Protocols | 376 |
Direct Simulation Monte Carlo Modeling of Non Equilibrium | 383 |
Performance Limitation of STBC OFDMCDMA Systems | 386 |
Molecular Simulation of Reaction and Adsorption in Nanochemical | 392 |
An Efficient Simple Cooling Schedule for Simulated Annealing | 396 |
Quantum Generalization of Molecular Dynamics Method | 402 |
A ProblemSpecific Convergence Bound for Simulated | 405 |
C6NH6+ Ions as Intermediates in the Reaction between | 412 |
Comparison and Selection of Exact and Heuristic Algorithms | 415 |
Reducing Link Loss in Ad Hoc Networks | 418 |
Towards a Full Dimensional Exact Quantum Calculation | 422 |
Adaptive Texture Recognition in Image Sequences with Prediction | 425 |
Conformations of 1246Tetrathiepane | 432 |
Fuzzy Matching of User Profiles for a Banner Engine | 433 |
Delay and Collision Reduction Mechanism for Distributed Fair | 434 |
Track on Biology Biochemistry Bioinformatics | 443 |
Numerical Models in Biomechanics Session | 445 |
Introduction and Evaluation of Development System Security | 451 |
Achieving Fair New Call CAC for Heterogeneous Services | 460 |
Design on Mobile Secure Electronic Transaction Protocol | 461 |
High Throughput insilico Screening against Flexible | 465 |
Musculoskeletal Modeling of Lumbar Spine under Follower Loads | 467 |
Visual Mining of Market Basket Association Rules | 479 |
A Design of Configuration Management Practices and CMPET | 481 |
Encoding Image Based on Retinal Ganglion Cell | 486 |
Track on Signal Processing | 493 |
Track on Software Engineering | 496 |
from Renal Measurements with a ThreeHeaded SPECT System | 504 |
Computation of Multiplicative Inverses in GF2 | 510 |
Using C++ Functors with Legacy C Libraries | 514 |
Distributed Mutual Exclusion Algorithms on a Ring of Clusters | 518 |
ParallelDistributed Film Line Scratch Restoration | 525 |
User Authentication Protocol Based on Human Memorable Password | 527 |
Frameworks as Web Services | 534 |
Distributed Optimization of Fiber Optic Network Layout | 538 |
On Triangulations | 544 |
Intrusion Detection Using Noisy Training Data | 547 |
A Reduced Codification for the Logical Representation | 553 |
Probability Distribution of OpCodes in Edgebreaker | 554 |
A Personalized Recommendation Agent System | 558 |
SimulationBased Security Testing for Continuity of Essential | 567 |
Synthesis of Mechanical Structures Using a Genetic Algorithm | 573 |
Track on Security Engineering | 574 |
Track on Computational Medicine | 575 |
Fast and Efficient Rendering System | 592 |
Information Fusion for Probabilistic Reasoning and Its Application | 593 |
An Authenticated Key Agreement Protocol Resistant | 603 |
A Case Study in Applying Common Criteria to Development Process | 608 |
Track on Computational Methods | 611 |
Parametric Freehand Sketches | 613 |
Architecture Environments for Ebusiness Agent Based on Security | 625 |
A TwoPublic Key Scheme Omitting Collision Problem | 627 |
Workshop on Computational Geometry | 630 |
Bézier Solutions of the Wave Equation | 631 |
Simple and Efficient Group Key Agreement | 645 |
An Efficient Conference Key Distribution System Based | 647 |
DMKB A Defense Mechanism Knowledge Base | 683 |
Improved Mathematical | 686 |
A Secure and Flexible Multisigncryption Scheme | 689 |
Image Coherence Based Adaptive Sampling for Image Synthesis 693 | 695 |
A New RoleBased Authorization Model | 701 |
A Comparison of Multiresolution Modelling | 703 |
Applications of Fuzzy Data Mining Methods for Intrusion | 706 |
Effective Packet Marking Approach to Defend against DDoS Attack | 708 |
Texture Mapping on Arbitrary 3D Surfaces | 721 |
A Robust Image Authentication Method Surviving Acceptable | 722 |
A Relationship of Configuration Management Requirements | 725 |
Optimizing Symmetric FFTs with Prime EdgeLength | 736 |
Performance Improvement in Mobile IPv6 Using | 738 |
A Bandwidth Reduction Scheme for 3D TextureBased Volume | 741 |
ContextBased Proofreading of Structured Documents | 743 |
Applied Research of Active Network to Control Network Traffic | 751 |
A PolicyBased Security Management Architecture Using XML | 755 |
Where the Truth Lies in Automatic Theorem Proving | 761 |
Storing Together the Structural Information of XML Documents | 763 |
An Integrated XML Security Mechanism for Mobile Grid Application | 776 |
An Application of Computer Graphics for Landscape | 779 |
Isolating and Specifying the Relevant Information of | 783 |
A Scheme for Improving WEP Key Transmission between | 792 |
View Morphing Based on Autocalibration for Generation | 801 |
A New Pedagogical | 807 |
An ObjectOriented Metric to Measure the Degree of Dependency | 808 |
Security Issues in Network File Systems | 812 |
Virtual Reality Technology Applied to Simulate | 817 |
A ContentIndependent Scalable Encryption Model | 821 |
Virtual Reality Applied to Molecular Sciences | 827 |
Multimodal Biometrics System Using Face and Signature | 828 |
A Geometrical Approach for Network Intrusion Detection | 841 |
Dynamically Changing Road Networks Modelling | 843 |
An Efficient Parameter Estimation Technique | 847 |
Association Inlining for Mapping XML DTDs to Relational Tables | 849 |
A Computer Tool for the Generation | 857 |
Use of Spectral Techniques in the Design | 859 |
Ontologies in Fashion | 863 |
Macroscopic Treatment to Polymorphic Email Based Viruses | 867 |
An Efficient Cache Conscious Multidimensional Index Structure | 869 |
Making Discrete Games | 877 |
WebBased Learning Session | 880 |
A Scalable PKI for Secure Routing in the Internet | 882 |
Speech Driven Facial Animation Using Chinese Mandarin | 886 |
Feature Extraction and Correlation for TimetoImpact | 887 |
Cryptanalysis and Improvement of Password Authenticated | 895 |
Autonomic Protection System Using Adaptive Security Policy | 896 |
The Development and Application of a WebBased Information | 902 |
A Novel Method to Support Users Consent in Usage Control | 906 |
DDoS Attack Defense Architecture Using | 915 |
Observing Standards for WebBased Learning from the Web | 922 |
A New Approach for Numerical Identification | 926 |
KolmogorovSmirnov Test for Image Comparison | 933 |
Chaotic Protocols | 938 |
Relevance Feedback for ContentBased Image Retrieval Using | 942 |
Track on Mobile Computing Systems | 945 |
Image Corner Detection Using Radon Transform | 948 |
Face Detection by Facial Features with Color Images and Face | 1 |
A Shakable Snake for Estimation of Image Contours 9 | 9 |
Disc Covering Problem with Application to Digital Halftoning 11 | 11 |
A New Recurrent Fuzzy Associative Memory for Recognizing | 17 |
A SpaceEfficient Incomplete LU Preconditioner 20 | 20 |
On Local Transformations in Plane Geometric Graphs Embedded | 22 |
A Novel Approach for ContentsBased Ecatalogue Image Retrieval | 25 |
Optimal Gait Control for a Biped Locomotion | 29 |
Reducing the Time Complexity of MinkowskiSum Based Similarity | 32 |
A FeatureBased Algorithm for Recognizing Gestures | 33 |
Efficient Key Distribution Protocol for Secure Multicast | 34 |
A Bayes Algorithm for the Multitask Pattern Recognition Problem | 39 |
Fingerprint Matching Based on Linking Information Structure | 41 |
A Practical Algorithm for Approximating Shortest Weighted Path | 42 |
Video Summarization Using Fuzzy OneClass Support Vector Machine 49 | 49 |
PlaneSweep Algorithm of Onlogn for the Inclusion Hierarchy | 53 |
New Parameter for Balancing Two Independent Measures | 56 |
A Transcode and Prefetch Technique of Multimedia Presentations | 57 |
Shortest Paths for Disc Obstacles 62 | 62 |
A Study on Generating an Efficient Bottomup Tree Rewrite Machine | 65 |
A Study on Efficient Key Distribution and Renewal | 66 |
Improving the Global Continuity of the Natural | 71 |
A Study on Methodology for Enhancing Reliability of Datapath 73 | 73 |
Track on Parallel and Distributed Computing | 77 |
Combinatories and Triangulations 81 | 81 |
Approximations for Two DecompositionBased Geometric | 90 |
Computing Largest Empty Slabs 99 | 99 |
A Novel LMS Method for RealTime Network Traffic Prediction 127 | 127 |
On the Time Complexity of Rectangular Covering Problems | 137 |
A MarketBased Scheduler for JXTABased PeertoPeer | 147 |
CORBABased Multithreaded Distributed Simulation | 167 |
A Fuzzy Expert System for Network Forensics 175 | 175 |
Automated Model Generation System Based on Freeform Deformation | 178 |
A Systematic Database Summary Generation Using | 185 |
The Employment of Regular Triangulation for Constrained | 198 |
Implementation of the VoronoiDelaunay Method for Analysis | 217 |
Intermediate View Synthesis from Stereoscopic | 243 |
Control Messaging Channel for Distributed Computer Systems 261 | 261 |
Design and Implementation of the HoneyPot System with Focusing | 262 |
DistortionFree of General Information with Edge Enhanced Error | 281 |
Filtering of Colored Noise for Signal Enhancement 301 | 301 |
Effective Digital Watermarking Algorithm by Contour Detection 321 | 321 |
RealTime Video Watermarking for MPEG Streams 348 | 348 |
Object Boundary Edge Selection Using LevelofDetail Canny Edges 369 | 369 |
A Study on Neural Networks Using Taylor Series Expansion | 389 |
Speech Emotion Recognition and Intensity Estimation 406 | 406 |
421 | |
Autres éditions - Tout afficher
Expressions et termes fréquents
agent algorithm application approach architecture avatars Berlin Heidelberg 2004 cache calculations Chem client cluster collaborative filtering components Computer Graphics Computer Science configuration coordinates curve Data Grid data warehouse dataset defined developed distributed dynamic efficient energy environment equation evaluation execution function geometry Globus Toolkit Grid computing Grid service ICCSA IEEE implementation input integrals interaction interface interpolation iterations Java Laganà layer LNCS load machine matching matrix mesh method monitoring nodes obtained OpenMP operations optimal P-GRADE paper Parallel Computing parallel program parameters parametric surfaces performance Phys pixel portal problem Proc processors proposed quadtree reaction rendering request scheduling Section server simulation solution Springer-Verlag Berlin Heidelberg structure surface SyncML tasks techniques texture mapping triangle strips triangles University University of Perugia update vector vertex virtual visualization volume rendering voxel