Wonder Club world wonders pyramid logo
×

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II Book

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II
Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II, , Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II has a rating of 4 stars
   2 Ratings
X
Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II, , Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II
4 out of 5 stars based on 2 reviews
5
50 %
4
0 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II
  • Written by author Osvaldo Gervasi
  • Published by Springer-Verlag New York, LLC, September 2007
  • The three-volume set LNCS 4705-4707 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2007, held in Kuala Lumpur, Malaysia, August 26-29, 2007.The three volumes contain pape
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Workshop on High-Performance Computing and Information Visualization (HPCIV 07)
Parallel Image Understanding on a Multi-DSP System   M. Fikret Ercan     1
Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave Propagation   Mohammad Khatim Hasan   Mohamed Othman   Zulkifly Abbas   Jumat Sulaiman   Fatimah Ahmad     13
Visibility Computations - Scanline Algorithms and Techniques   Md Mizanur Rahman     25
Adaptive Scheduling of Parallel Computations for SPMD Tasks   Mikhail Panshenskov   Alexander Vakhitov     38
Determining the Visibility of a Planar Set of Line Segments in O (n log log n) Time   Frank Devai   Marina L. Gavrilova     51
Workshop on Intelligence and Security Informatics (ISI 07)
An Efficient Identity-Based Ring Signature Scheme and Its Extension   Jianhong Zhang     63
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures   In Jung Kim   Cheol-Won Lee   Eul Gyu Im     75
Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines   Wahyudi Martono   Hasimah Ali   Momoh Jimoh E. Salami     85
An Attack Classification Mechanism Based on Multiple Support Vector Machines   Jungtaek Seo     94
An Efficient Iteration Decoding Stopping Criterion for Turbo Codes   Byoung-Sup Shim   Hyoung-Keun Park   Sun-Youb Kim   Yu-Chan Ra     104
Efficient an Implementation Method Research of a Smart Card Atomic Operation   Eun A. Jun   Seok Won Jung   Jeom Goo Kim   Jong In Lim     113
Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model   Do-hyeon Lee   Doo-young Kim   Jae-il Jung     122
Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks   Do-hyeon Lee   Sun Choi   Ji-hyeon Choi   Jae-il Jung     131
A Design of Fair Blind Signatures Protocol Using PVNIOT   Jeom-goo Kim   Do-hyeon Lee   Jeog-bae Lee     140
An Access Control Using SPKI Certificate in Peer-to-Peer Environment   Jeom Goo Kim   Do-hyeon Lee     148
Security and Test Environment for SIP   Geuk Lee   Seok Tae Kim   In Kyu Han   Chang Yong Lee   Seon Ho Park   Do Won Yi   Jung Min Oh     157
Simulation Based Nodal Analysis for Effects Based Operations   Gang Taek Lee   Dong Hwi Lee   Kuinam J. Kim     166
A Stable Evidence Collection Procedure of a Volatile Data in Research   Yong-Ho Kim   Dong Hwi Lee   Kuinam J. Kim     177
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique   Dong Hwi Lee   Kyong Ho Choi   Kuinam J. Kim     185
Workshop on Mobile Communications (MobiComm 07)
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks   Young-Ju Han   Seon-Ho Park   Jung-Ho Eom   Tai-Myoung Chung     195
An Automatic Mobile Web Generation Method from PC Web Using DFS and W-DFS   DaeHyuck Park   Euisun Kang   YoungHwan Lim     207
Cross-Layer Design for Reducing Handoff Latency in Mobile Network   Woo Jin Jung   Hyung Joo Ki   Tae-Jin Lee   Hyunseung Choo   Min Young Chung     216
Quick Paging IP Scheme Using Residence Pattern of Mobile Node   Sukyoung Ahn   Youngsong Mun     226
An Efficient Macro Mobility Scheme Supporting Reactive Fast Handover Mode in HMIPv6   Kyunghye Lee   Youngsong Mun     237
Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks   Hongju Cheng   Xiaohua Jia   Hai Liu     247
An Enhanced Bandwidth Reservation Scheme Based on Road Topology Information for QoS Sensitive Multimedia Wireless Cellular Networks   M. Sanabani   S. Shamala   M. Othman   Z. Zukarnain     261
Energy Efficient LEACH with TCP for Wireless Sensor Networks   Jungrae Kim   Ki-young Jang   Hyunseung Choo   Won Kim     275
Route Optimization with Additional Destination-Information in Mobile Networks   Jeonghoon Park   Sangho Lee   Youho Lee   Hyunseung Choo     286
Workshop on Information Systems and Information Technologies (ISIT 07)
Requirements Change Management on Feature-Oriented Requirements Tracing   Sangim Ahn   Kiwon Chong     296
A Comparison Between Complexity and Temporal GIS Models for Spatio-temporal Urban Applications   Majeed Pooyandeh   Saadi Mesgari   Abbas Alimohammadi   Rouzbeh Shad     308
Crawling the Content Hidden Behind Web Forms   Manuel Alvarez   Juan Raposo   Alberto Pan   Fidel Cacheda   Fernando Bellas   Victor Carneiro     322
Simple Performance Model for Differentiated Services in Mobile IPv6 Networks   Misun Kim   Youngsong Mun     334
Multi-site Distributed Software Development: Issues, Solutions, and Challenges    Pornpit Wongthongtham   Elizabeth Chang   Tharam Dillon     346
A Design and Implementation of Transcoder for Displaying Diagram Data of Multimedia Title on Web Browser   DaeHyuck Park   Euisun Kang   YoungHwan Lim     360
A Recommender System Based on Multi-features   Maria Trujillo   Marta Millan   Edward Ortiz     370
Hybrid Intrusion Detection System for Wireless Sensor Networks   Tran Hoang Hai   Faraz Khan   Eui-Nam Huh     383
A Site-Ranking Algorithm for a Small Group of Sites   KiJoo Kim   MunSu Kang   YoungSik Choi     397
Cognitive Model of Schema as Complex System   Kang Soo Tae   An Ryeol Jeong   Kang Soo You     406
Improved Fast Handover Protocol Using HMIPv6 Based on IEEE 802.16e Network   Gyodu Koo   KiSung Yu   Minki Noh   Youngsong Mun     415
Advanced Macro Mobility Handover Supporting Fast Handover in HMIPv6   Kyunghye Lee   Youngsong Mun     424
New Fast Algorithm for Constructing Concept Lattice   YaJun Du   Zheng Pei   HaiMing Li   Dan Xiang   Kai Li     434
Measuring the Usability of Software Applications: Metrics for Behaviorness   Amalina Farhi Ahmad Fadzlah   Aziz Deraman     448
An Efficient Information Dissemination for Publish/Subscription System on Grid   Bo-Hyun Seok   Pill-Woo Lee   Eui-Nam Huh   Ki-Moon Choi   Kang-Soo Tae     455
On Dynamic Multicast Trees for Stormless Binding Update in Network Mobility   Moonseong Kim   Sungchang Lee   Hyunseung Choo     469
Authentication Scheme Using Mobile IPv4 in VPN Intranet   Youngsong Mun   Miyoung Kim     479
Workshop on Internet Communications Security (WICS 07)
Implementation and Attacks Analysis of a Honeypot   Claudia J. Barenco Abbas   L. Javier Garcia Villalba   Victoria Lopez Lopez     489
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol   Meng-Hui Lim   Sanggon Lee   Youngho Park   Hoonjae Lee     503
Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6   Zhen Cao   Hui Deng   Yuanchen Ma   Po Hu     514
Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm   Juan Hernandez-Serrano   Josep Pegueroles   Miguel Soriano      526
Using Adaptative Encryption for Ubiquitous Environments   Antonio Izquierdo   Joaquin Torres   Jose M. Sierra   Mildrey Carbonell     540
Estimation of TTP Features in Non-repudiation Service   Mildrey Carbonell   Jose Maria Sierra   Jose A. Onieva   Javier Lopez   Jianying Zhou     549
Workshop on Wireless Sensor Networks (WSNs 07)
TLKMS: A Dynamic Keys Management Scheme for Large-Scale Wireless Sensor Networks   Huanzhao Wang   Dongwei Luo   Yufei Guo   Qingping Zhao     559
Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks   Hae Young Lee   Tae Ho Cho     573
Design and Implementation of Wireless Sensor Based-Monitoring System for Smart Factory   Seok Cheol Lee   Tae Gun Jeon   Hyun-Suk Hwang   Chang-Soo Kim     584
Energy Efficient Route Recovery Methods for Wireless Sensor Networks Using Hybrid Checkpointing   Kwang-Mo Jung   Joong-Jin Kook   Kwang-Soon Choi   Seong-Dong Kim   SangWon Min     593
Technical Session on Computer Graphics (TSCG 07)
AM-GM Difference Based Adaptive Sampling for Monte Carlo Global Illumination   Qing Xu   Mateu Sbert    Miquel Feixas   Jianfeng Zhang     602
Data-Driven Feature Control Models for Creating Virtual Faces   Yu Zhang     612
Variable Neighbourhood Texture Synthesis with Patch Initialisation   Minh Tran   Amitava Datta     627
Multi-Resolution Protein Model   Deok-Soo Kim   Bohyung Lee   Chung-In Won   Donguk Kim   Joonghyun Ryu   Youngsong Cho   Chong-Min Kim   Sung-Hoon Lee   Jonghwa Bhak     639
Modeling Origami for Computational Construction and Beyond   Tetsuo Ida   Hidekazu Takahashi   Mircea Marin   Fadoua Ghourabi     653
A Ghost Cell-Based Data Structure for Multiresolution Meshes   Rui Rodrigues   Jose Morgado   Frutuoso Silva   Abel Gomes     666
Bezier Curve and Surface Fitting of 3D Point Clouds Through Genetic Algorithms, Functional Networks and Least-Squares Approximation   Akemi Galvez   Andres Iglesias   Angel Cobo   Jaime Puig-Pey   Jesus Espinola     680
Markov-Gibbs Random Field Modeling of 3D Skin Surface Textures for Haptic Applications   Nazr-e-Batool   Ahmad Fadzil M. Hani   Vooi Voon Yap     694
Elliptic Polygon Based 2D Sketch Interface for 3D Shape Matching   Jaeho Lee   Joon Young Park   Young Choi     706
View Synthesis of the New Viewpoint Based on Contour Information   Hu Zhi-ping   He Yuan-jun   Ou Zong-ying     716
DTIWeb: A Web-Based Framework for DTI Data Visualization and Processing   F. Prados   I. Boada   M. Feixas   A. Prats   G. Blasco   S. Pedraza   J. Puig     727
A New Way to Re-using Paths   Qing Xu   Mateu Sbert     741
Workshop on Wireless and Ad-Hoc Networking (WAD 07)
A Routing Scheme of Mobile Sink in Sensor Networks   Jongchan Lee   Miyoung Hwang   Sangjoon Park   HaeSuk Jang   Byunggi Kim     751
Explicit Routing Designation (ERD) Method the Cache Information in Nested Mobile Networks   Jiyoung Song   Sangjoon Park   Jongchan Lee   Hyunjoo Moon   Byunggi Kim     764
Performance Analysis of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network   Ji-Hong Kim   Yong-Hyun Kim   Youn-Sik Hong   Ki-Young Lee     778
An Administration Structure for the OLSR Protocol   Vinicius Pacheco   Ricardo Puttini      790
Obstacle Mobility Model Based on Activity Area in Ad Hoc Networks   Hamideh Babaei   Mahmood Fathi   Morteza Romoozi     804
A XML Script-Based Testing Tool for Embedded Softwares   Jongbae Moon   Donggyu Kwak   Yongyun Cho   Sangjoon Park   Jongchan Lee     818
A Context-Adaptive Workflow Language for Ubiquitous Computing Environments   Yongyun Cho   Kyoungho Shin   Jongsun Choi   Jaeyoung Choi     829
A Semantic Interoperable Context Infrastructure Using Web Services   Eunhoe Kim   Jaeyoung Choi     839
An Effective Detection Method for Clustering Similar XML DTDs Using Tag Sequences   Hyun-Joo Moon   Jae-Woo Yoo   Jongmyung Choi     849
An Automatic Correction Tool for Relational Algebra Queries   Josep Soler   Imma Boada   Ferran Prados   Jordi Poch   Ramon Fabregat     861
Workshop on e-Printing CAE Technology (E-PCAET 07)
Study on the Nonlinearity of the Nonstationary Impulse Signal Using Reassigned Time-Frequency Analysis   Tae-Gun Jeong     873
Development of Systematic Design Automation System for Hemming Die Manufacturing Process   Seoung Soo Lee   Ho Yeon Ryu   Keun Sang Park    Hyo Sang Jung     883
Numerical Simulation of the Lateral Frequency Response of a Thin Cantilever Beam-Like Structure by Using the Finite Element Model   Dojoong Kim   Tae-Gun Jeong     895
On the Ink Transfer Process in Gravure Printing   Suhong Ahn   Yang Na     907
A Study on the Optimal Taper Tension Control in a Roll to Roll Machine   Changwoo Lee   Jangwon Lee   Keehyun Shin     919
On-Line Measurement of Wrinkle Using Machine Vision   Hoang Minh To   Dong Keun Shin   Sung Lim Ko     931
An Effective Visualization and Analysis Method for Edge Measurement   Andrey Toropov     941
The Analysis of Film Flow Around Rotating Roller Partially Immersed Ink   Seung-Hwan Yu   Soojin Kang   Kwan-Soo Lee   Sukkee Um     951
An Automated Design System of Press Die Components Using 3-D CAD Library   C.W. Kim   C.H. Park   S.S. Lee     961
Workshop on Advanced Security Services (ASS 07)
Security Analysis of TORA Routing Protocol   Vee Liem Chee   Wei Chuen Yau     975
A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy   Daeyoung Kim   Kounggang Cui   Sangjin Kim    Heekuck Oh     987
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification   Seokhyang Cho   Kiwon Song   Dongsub Cho   Dongho Won     996
An Enhanced ID-Based Deniable Authentication Protocol on Pairings   Meng-Hui Lim   Sanggon Lee   Youngho Park   Hoonjae Lee     1008
Design of Hybrid Network Discovery Module for Detecting Client Applications and ActiveX Controls   Kyounghee Ko   Pilyong Kang   Wontae Sim     1018
An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks   Faraz Idris Khan   Hassan Jameel   S.M.K. Raazi   Adil Mehmood Khan   Eui Nam Huh     1028
Secure Protocol for Fast Authentication in EAP-Based Wireless Networks   Rafa Marin   Santiago Zapata   Antonio F. Gomez     1038
Using Return Routability for Authentication of Fast Handovers in Mobile IPv6   Youngsong Mun   Kyunghye Lee   Seonggeun Ryu   Teail Shin     1052
Enhancement for Security of Peer-to-Peer by Expanding CGA Mechanism   Seonggeun Ryu   Youngsong Mun     1062
A Simplified Anonymous Dynamic Source Routing Protocol for Ad-Hoc Networks   Chunum Kong    Hyunseung Choo   Won Kim     1072
Proactive Code Verification Protocol in Wireless Sensor Network   Young-Geun Choi   Jeonil Kang   DaeHun Nyang     1085
A Trust Management Model for PACS-Grid   Hyun-Sook Cho   Bong-Hwan Lee   Kyu-Won Lee     1097
N-dimensional Grid-Based Key Predistribution in Wireless Sensor Networks   Jong-Myoung Kim   Young-Ju Han   Seon-Ho Park   Tai-Myoung Chung     1107
Author Index     1121


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II, , Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II

X
WonderClub Home

This item is in your Collection

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II, , Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II

X
WonderClub Home

This Item is in Your Inventory

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II, , Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007 Proceedings, Part II

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: