Eurasia-ict 2002: Information And Communication Technology: First Eurasian Conference, Shiraz, Iran, October 29-31, 2 by M. Hassan ShafazandEurasia-ict 2002: Information And Communication Technology: First Eurasian Conference, Shiraz, Iran, October 29-31, 2 by M. Hassan Shafazand

Eurasia-ict 2002: Information And Communication Technology: First Eurasian Conference, Shiraz, Iran…

byM. Hassan Shafazand

Paperback | October 9, 2002

Pricing and Purchase Info

$288.50

Earn 1,443 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

We welcomed participants to the 1st EurAsian Conference on Advances in Information and Communication Technology (EurAsia ICT 2002) held in Iran. The aim of the conference was to serve as a forum to bring together researchers from academia and commercial developers from industry to discuss the current state of the art in ICT, mainly in Europe and Asia. Inspirations and new ideas were expected to emerge from intensive discussions during formal sessions and social events. Keynote addresses, research presentation, and discussion during the conference helped to further develop the exchange of ideas among the researchers, developers, and practitioners who attended. The conference attracted more than 300 submissions and each paper was reviewed by at least three program committee members. The program committee selected 119 papers from authors of 30 different countries for presentation and publication, a task which was not easy due to the high quality of the submitted papers. Eleven workshops were organized in parallel with the EurAsia ICT conference. The proceedings of these workshops, with more than 100 papers, were published by the Austrian Computer Society. We would like to express our thanks to our colleagues who helped with putting together the technical program: the program committee members and external reviewers for their timely and rigorous reviews of the papers, and the organizing committee for their help in administrative work and support. We owe special thanks to Thomas Schierer for always being available when his helping hand was needed.
Title:Eurasia-ict 2002: Information And Communication Technology: First Eurasian Conference, Shiraz, Iran…Format:PaperbackDimensions:1028 pages, 23.5 × 15.5 × 0.1 inPublished:October 9, 2002Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540000283

ISBN - 13:9783540000280

Look for similar items by category:

Reviews

Table of Contents

Artificial Intelligence I.- Speaker Model and Decision Threshold Updating in Speaker Verification.- Application of Constraint Hierarchy to Timetabling Problems.- An Intelligent System for Therapy Control in a Distributed Organization.- Data Mining.- Discovering Local Patterns from Multiple Temporal Sequences.- The Geometric Framework for Exact and Similarity Querying XML Data.- A Mobile System for Extracting and Visualizing Protein-Protein Interactions.- Discovering Temporal Relation Rules Mining from Interval Data.- Multimedia I.- An Abstract Image Representation Based on Edge Pixel Neighborhood Information (EPNI).- Motion Estimation Based on Temporal Correlations.- A New Boundary Matching Algorithm Based on Edge Detection.- Lookmark: A 2.5D Web Information Visualization System.- Artificial Intelligence II.- Different Local Search Algorithms in STAGE for Solving Bin Packing Problem.- A Prototype for Functionality Based Network Management System.- Coaching a Soccer Simulation Team in RoboCup Environment.- Security I.- Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme.- A New Scheme Based on Semiconductor Lasers with Phase-Conjugate Feedback for Cryptographic Communications.- Parallel Algorithm and Architecture for Public-Key Cryptosystem.- Specification and Verification of Security Policies in Firewalls.- Multimedia II.- Image Segmentation Based on Shape Space Modeling.- HERMES: File System Support for Multimedia Streaming in Information Home Appliance.- Motion Vector Recovery for Error Concealment Based on Macroblock Distortion Modeling.- A Memory Copy Reduction Scheme for Networked Multimedia Service in Linux Kernel.- Neural Network.- Hidden Markov Model and Neural Network Hybrid.- Neural Network Based Algorithms for IP Lookup and Packet Classification.- Non-linear Prediction of Speech Signal Using Artificial Neural Nets.- Security II.- Web Document Access Control Using Two-Layered Storage Structures with RBAC Server.- Development of UML Descriptions with USE.- FPGA Implementation of Digital Chaotic Cryptography.- Multimedia III.- Stereo for Recovering Sharp Object Boundaries.- Priority Vantage Points Structures for Similarity Queries in Metric Spaces.- A High Performance Image Coding Using Uniform Morphological Sampling, Residues Classifying, and Vector Quantization.- A Genetic Algorithm for Steiner Tree Optimization with Multiple Constraints Using Prüfer Number.- Data and Knowledge Engineering I.- A New Technique for Participation of Non-CORBA Independent Persistent Objects in OTS Transactions.- Compositional Modelling of Workflow Processes.- EDMIS: Metadata Interchange System for OLAP.- An Efficient Method for Controlling Access in Object-Oriented Databases.- XML I.- Extracting Information from XML Documents by Reverse Generating a DTD.- Mapping XML-Schema to Relational Schema.- Flexible Modification of Relational Schema by X2RMap in Storing XML into Relations.- B2B Integration - Aligning ebXML and Ontology Approaches.- Mobile Communication I.- An Agent Based Service Discovery Architecture for Mobile Environments.- Location Management Using Multicasting HLR in Mobile Networks.- Packet Error Probability of Multi-carrier CDMA System in Fast/Slow Correlated Fading Plus Interference Channel.- Computer Graphics.- A Distributed Low-Cost Dynamic Multicast Routing Algorithm with Delay Constraints.- A New Bandwidth Reduction Method for Distributed Rendering Systems.- Neural Networks Based Mesh Generation Method in 2-D.- Image Denoising Using Hidden Markov Models.- Data and Knowledge Engineering II.- Anaphoric Definitions in Description Logic.- Storage and Querying of High Dimensional Sparsely Populated Data in Compressed Representation.- The GlobData Fault-Tolerant Replicated Distributed Object Database.- XML II.- A Levelized Schema Extraction for XML Document Using User-Defined Graphs.- Extracting, Interconnecting, and Accessing Heterogeneous Data Sources: An XML Query Based Approach.- Mobile Communication II.- Call Admission Control in Cellular Mobile Networks: A Learning Automata Approach.- An Adaptive Flow Control Scheme for Improving TCP Performance in Wireless Internet.- An Adaptive TCP Protocol for Lossy Mobile Environment.- Design and Implementation of Application-Level Multicasting Services over ATM Networks.- Digital Libraries and Natural Language Issues.- Bon: The Persian Stemmer.- Current and Future Features of Digital Journals.- Solving Language Problems in a Multilingual Digital Library Federation.- Internet and Quality of Service.- Performing IP Lookup on Very High Line Speed.- A Study of Marking Aggregated TCP and UDP Flows Using Generalized Marking Scheme.- Information Society.- Towards the Global Information Society: The Enactment of a Regulatory Framework as a Factor of Transparency and Social Cohesion.- E-learning.- On the Application of the Semantic Web Concepts to Adaptive E-learning.- An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm.- The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU.- Mobile Communication III.- Monte Carlo Soft Handoff Modeling.- A QoS Provision Architecture for Mobile IPv6 over MPLS Using HMAT.- A New Propagation Model for Cellular Mobile Radio Communications in Urban Environments Including Tree Effects.- Mobile Web Information Systems.- A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme.- Transmission Time Analysis of WAP over CDMA System Using Turbo Code Scheme.- On the Use of New Technologies in Health Care.- Wireless Communication Technology I.- Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless Networks.- A Dynamic Backoff Scheme to Guarantee QoS over IEEE 802.11 Wireless Local Area Networks.- Performance Evaluation of Serial/Parallel Block Coded CDMA System with Complex Spreading in Near/Far Multiple-Access Interference and Multi-path Nakagami Fading Channel.- A Learning Automata Based Dynamic Guard Channel Scheme.- Web-Based Application.- Dynamic System Simulation on the Web.- Using Proximity Information for Load Balancing in Geographically Distributed Web Server Systems.- Strategic Tool for Assessment of the Supply and Demand Relationship between ASPs and SMEs for Competitive Advantage.- Intelligent Agents I.- Trust and Commitment in Dynamic Logic.- Modelling Heterogeneity in Multi Agent Systems.- Pricing Agents for a Group Buying System.- Evolution of Cooperation in Multiagent Systems.- Real-Time Systems.- A Dynamic Window-Based Approximate Shortest Path Re-computation Method for Digital Road Map Databases in Mobile Environments.- Web-Based Process Control Systems: Architectural Patterns, Data Models, and Services.- A Comparison of Techniques to Estimate Response Time for Data Placement.- Using a Real-Time Web-Based Pattern Recognition System to Search for Component Patterns Database.- Wireless Communication Technology II.- An Adaptive Call Admission Control to Support Flow Handover in Wireless Ad Hoc Networks.- Design of Optimal LA in Personal Communication Services Network Using Simulated Annealing Technique.- Secure Bluetooth Piconet Using Non-anonymous Group Key.- Differentiated Bandwidth Allocation and Power Saving for Wireless Personal Area Networks.- Software Engineering I.- Combining Extreme Programming with ISO 9000.- The Class Cohesion Using the Reference Graph G1 and G2.- Process-Oriented Interactive Simulation of Software Acquisition Projects.- Automatic Design Patterns Identification of C++ Programs.- Intelligent Agents II.- Specifying the Merging of Desires into Goals in the Context of Beliefs.- The Illegal Copy Protection Using Hidden Agent.- Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System.- Algorithm and Computer Theory.- H-Colorings of Large Degree Graphs.- Hyper-Star Graph: A New Interconnection Network Improving the Network Cost of the Hypercube.- Sequential Consistency as Lazy Linearizability.- Embedding Full Ternary Trees into Recursive Circulants.- Wireless Communication Technology III.- A Handoff Priority Scheme for TDMA/FDMA-Based Cellular Networks.- On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies.- Intelligent Paging Strategy in 3G Personal Communication Systems.- Experience from Mobile Application Service Framework in WIP.- An Efficient Approach to Improve TCP Performance over Wireless Networks.- Extended Hexagonal Constellations as a Means of Multicarrier PAPR Reduction.- Software Engineering II.- Adaptive Application-Centric Management in Meta-computing Environments.- The Weakest Failure Detector for Solving Election Problems in Asynchronous Distributed Systems.- From Lens to Flow Structure.- ADML: A Language for Automatic Generation of Migration Plans.- Considerations for Using Domain-Specific Modeling in the Analysis Phase of Software Development Process.- Intelligent Agents II.- Organizations and Normative Agents.- A Framework for Agent-Based Software Development.- Application of Agent Technologies in Extended Enterprise Production Planning.- Zamin: An Artificial Ecosystem.