Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part Ii by Osvaldo GervasiComputational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part Ii by Osvaldo Gervasi

Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur…

byOsvaldo Gervasi

Paperback | August 13, 2007

Pricing and Purchase Info

$282.80 online 
$343.95 list price save 17%
Earn 1,414 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


This three-volume set constitutes the refereed proceedings of the International Conference on Computational Science and its Applications. These volumes feature outstanding papers that present a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in almost all sciences that use computational techniques.

Title:Computational Science and Its Applications - ICCSA 2007: International Conference, Kuala Lumpur…Format:PaperbackDimensions:1129 pages, 24.2 × 17 × 0.07 inPublished:August 13, 2007Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540744754

ISBN - 13:9783540744757

Look for similar items by category:


Table of Contents

Workshop on High-Performance Computing and Information Visualization (HPCIV 07).- Parallel Image Understanding on a Multi-DSP System.- Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave Propagation.- Visibility Computations - Scanline Algorithms and Techniques.- Adaptive Scheduling of Parallel Computations for SPMD Tasks.- Determining the Visibility of a Planar Set of Line Segments in Time.- Workshop on Intelligence and Security Informatics (ISI 07).- An Efficient Identity-Based Ring Signature Scheme and Its Extension.- Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.- Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines.- An Attack Classification Mechanism Based on Multiple Support Vector Machines.- An Efficient Iteration Decoding Stopping Criterion for Turbo Codes.- Efficient an Implementation Method Research of a Smart Card Atomic Operation.- Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model.- Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks.- A Design of Fair Blind Signatures Protocol Using PVNIOT.- An Access Control Using SPKI Certificate in Peer-to-Peer Environment.- Security and Test Environment for SIP.- Simulation Based Nodal Analysis for Effects Based Operations.- A Stable Evidence Collection Procedure of a Volatile Data in Research.- Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique.- Workshop on Mobile Communications (MobiComm 07).- Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks.- An Automatic Mobile Web Generation Method from PC Web Using DFS and W-DFS.- Cross-Layer Design for Reducing Handoff Latency in Mobile Network.- Quick Paging IP Scheme Using Residence Pattern of Mobile Node.- An Efficient Macro Mobility Scheme Supporting Reactive Fast Handover Mode in HMIPv6.- Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks.- An Enhanced Bandwidth Reservation Scheme Based on Road Topology Information for QoS Sensitive Multimedia Wireless Cellular Networks.- Energy Efficient LEACH with TCP for Wireless Sensor Networks.- Route Optimization with Additional Destination-Information in Mobile Networks.- Workshop on Information Systems and Information Technologies (ISIT 07).- Requirements Change Management on Feature-Oriented Requirements Tracing.- A Comparison Between Complexity and Temporal GIS Models for Spatio-temporal Urban Applications.- Crawling the Content Hidden Behind Web Forms.- Simple Performance Model for Differentiated Services in Mobile IPv6 Networks.- Multi-site Distributed Software Development: Issues, Solutions, and Challenges.- A Design and Implementation of Transcoder for Displaying Diagram Data of Multimedia Title on Web Browser.- A Recommender System Based on Multi-features.- Hybrid Intrusion Detection System for Wireless Sensor Networks.- A Site-Ranking Algorithm for a Small Group of Sites.- Cognitive Model of Schema as Complex System.- Improved Fast Handover Protocol Using HMIPv6 Based on IEEE 802.16e Network.- Advanced Macro Mobility Handover Supporting Fast Handover in HMIPv6.- New Fast Algorithm for Constructing Concept Lattice.- Measuring the Usability of Software Applications: Metrics for Behaviorness.- An Efficient Information Dissemination for Publish/Subscription System on Grid.- On Dynamic Multicast Trees for Stormless Binding Update in Network Mobility.- Authentication Scheme Using Mobile IPv4 in VPN Intranet.- Workshop on Internet Communications Security (WICS 07).- Implementation and Attacks Analysis of a Honeypot.- An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol.- Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6.- Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm.- Using Adaptative Encryption for Ubiquitous Environments.- Estimation of TTP Features in Non-repudiation Service.- Workshop on Wireless Sensor Networks (WSNs 07).- TLKMS: A Dynamic Keys Management Scheme for Large-Scale Wireless Sensor Networks.- Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks.- Design and Implementation of Wireless Sensor Based-Monitoring System for Smart Factory.- Energy Efficient Route Recovery Methods for Wireless Sensor Networks Using Hybrid Checkpointing.- Technical Session on Computer Graphics (TSCG 07).- AM-GM Difference Based Adaptive Sampling for Monte Carlo Global Illumination.- Data-Driven Feature Control Models for Creating Virtual Faces.- Variable Neighbourhood Texture Synthesis with Patch Initialisation.- Multi-Resolution Protein Model.- Modeling Origami for Computational Construction and Beyond.- A Ghost Cell-Based Data Structure for Multiresolution Meshes.- Bézier Curve and Surface Fitting of 3D Point Clouds Through Genetic Algorithms, Functional Networks and Least-Squares Approximation.- Markov-Gibbs Random Field Modeling of 3D Skin Surface Textures for Haptic Applications.- Elliptic Polygon Based 2D Sketch Interface for 3D Shape Matching.- View Synthesis of the New Viewpoint Based on Contour Information.- DTIWeb: A Web-Based Framework for DTI Data Visualization and Processing.- A New Way to Re-using Paths.- Workshop on Wireless and Ad-Hoc Networking (WAD 07).- A Routing Scheme of Mobile Sink in Sensor Networks.- Explicit Routing Designation (ERD) Method the Cache Information in Nested Mobile Networks.- Performance Analysis of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network.- An Administration Structure for the OLSR Protocol.- Obstacle Mobility Model Based on Activity Area in Ad Hoc Networks.- A XML Script-Based Testing Tool for Embedded Softwares.- A Context-Adaptive Workflow Language for Ubiquitous Computing Environments.- A Semantic Interoperable Context Infrastructure Using Web Services.- An Effective Detection Method for Clustering Similar XML DTDs Using Tag Sequences.- An Automatic Correction Tool for Relational Algebra Queries.- Workshop on e-Printing CAE Technology (E-PCAET 07).- Study on the Nonlinearity of the Nonstationary Impulse Signal Using Reassigned Time-Frequency Analysis.- Development of Systematic Design Automation System for Hemming Die Manufacturing Process.- Numerical Simulation of the Lateral Frequency Response of a Thin Cantilever Beam-Like Structure by Using the Finite Element Model.- On the Ink Transfer Process in Gravure Printing.- A Study on the Optimal Taper Tension Control in a Roll to Roll Machine.- On-Line Measurement of Wrinkle Using Machine Vision.- An Effective Visualization and Analysis Method for Edge Measurement.- The Analysis of Film Flow Around Rotating Roller Partially Immersed Ink.- An Automated Design System of Press Die Components Using 3-D CAD Library.- Workshop on Advanced Security Services (ASS 07).- Security Analysis of TORA Routing Protocol.- A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy.- Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification.- An Enhanced ID-Based Deniable Authentication Protocol on Pairings.- Design of Hybrid Network Discovery Module for Detecting Client Applications and ActiveX Controls.- An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks.- Secure Protocol for Fast Authentication in EAP-Based Wireless Networks.- Using Return Routability for Authentication of Fast Handovers in Mobile IPv6.- Enhancement for Security of Peer-to-Peer by Expanding CGA Mechanism.- A Simplified Anonymous Dynamic Source Routing Protocol for Ad-Hoc Networks.- Proactive Code Verification Protocol in Wireless Sensor Network.- A Trust Management Model for PACS-Grid.- N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks.