default search action
ICCSA 2004: Assisi, Italy
- Antonio Laganà, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, Chih Jeng Kenneth Tan, Osvaldo Gervasi:
Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV. Lecture Notes in Computer Science 3046, Springer 2004, ISBN 3-540-22060-7
Track on Numerical Methods and Algorithms
- Weidong Shen, Shulin Yang:
New Techniques in Designing Finite Difference Domain Decomposition Algorithm for the Heat Equation. 1-10 - Ju-Hyun Lee, Sungkwon Kang, Hoo-Kyun Choi:
A Fast Construction Algorithm for the Incidence Matrices of a Class of Symmetric Balanced Incomplete Block Designs. 11-19 - Tzu-Yi Chen:
ILUTP Mem: A Space-Efficient Incomplete LU Preconditioner. 20-28 - Jin-Geol Kim, SangHo Choi, Ki heon Park:
Optimal Gait Control for a Biped Locomotion Using Genetic Algorithm. 29-38 - Edward Puchala:
A Bayes Algorithm for the Multitask Pattern Recognition Problem - Direct and Decomposed Independent Approaches. 39-45 - Hyung-Wook Yoon, Bo-Hyeong Lee, Tae-Jin Lee, Min Young Chung:
Energy Efficient Routing with Power Management to Increase Network Lifetime in Sensor Networks. 46-55 - Moonseong Kim, Young-Cheol Bang, Hyunseung Choo:
New Parameter for Balancing Two Independent Measures in Routing Path. 56-65 - Deok-Gyu Lee, Im-Yeong Lee:
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. 66-76
Track on Parallel and Distributed Computing
- Joaquín Pérez Ortega, Rodolfo A. Pazos, Juan Frausto Solís, Guillermo Rodríguez, Laura Cruz Reyes, Graciela Mora O., Héctor J. Fraire H.:
Self-Tuning Mechanism for Genetic Algorithms Parameters, an Application to Data-Object Allocation in the Web. 77-86 - Nam-Yeun Kim, Kee-Young Yoo:
Digit-Serial AB2 Systolic Array for Division in GF(2m). 87-96 - Sangman Moh, Chansu Yu, Dongsoo Han:
Design and Experiment of a Communication-Aware Parallel Quicksort with Weighted Partition of Processors. 97-105 - Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong:
A Linear Systolic Array for Multiplication in GF(2m) for High Speed Cryptographic Processors. 106-116 - Chunlin Li, Zhengding Lu, Layuan Li:
Price Driven Market Mechanism for Computational Grid Resource Allocation. 117-126 - Xinyu Yang, Ming Zeng, Rui Zhao, Yi Shi:
A Novel LMS Method for Real-Time Network Traffic Prediction. 127-136 - Víctor Jesús Sosa Sosa, Juan Gabriel González Serna, Xochitl Landa Miguez, Francisco Verduzco Medina, Manuel A. Valdés Marrero:
Dynamic Configuration between Proxy Caches within an Intranet. 137-146 - Tan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, Fazilah Haron, Rajkumar Buyya:
A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System. 147-157 - Hyontai Sug:
Reducing on the Number of Testing Items in the Branches of Decision Trees. 158-166 - Ki-Hyung Kim, Won-Seok Kang:
CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical One. 167-176 - Jesús Acosta Elías, Ulises Pineda Rico, Jose Martin Luna-Rivera, Enrique Stevens-Navarro, Isaac Campos-Cantón, Leandro Navarro-Moldes:
The Effects of Network Topology on Epidemic Algorithms. 177-184 - Tae-Wan Ryu, Christoph F. Eick:
A Systematic Database Summary Generation Using the Distributed Query Discovery System. 185-195 - Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo:
Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. 196-205 - Sung Baik, Jerzy W. Bala:
A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection. 206-212 - Sam Jin Jeong:
Maximizing Parallelism for Nested Loops with Non-uniform Dependences. 213-222 - Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. 223-232 - ChaYoung Kim, JinHo Ahn, Chong-Sun Hwang:
Gossip Based Causal Order Broadcast Algorithm. 233-242
Track on Signal Processing
- Chaohui Lu, Ping An, Zhaoyang Zhang:
Intermediate View Synthesis from Stereoscopic Videoconference Images. 243-250 - Chang-Gyu Choi, Yongseok Chang, Jung Hyun Cho, Sung-Ho Kim:
Extract Shape from Clipart Image Using Modified Chain Code - Rectangle Representation. 251-260 - Boguslaw Cyganek, Jan Borgosz:
Control Messaging Channel for Distributed Computer Systems. 261-270 - Uk-Chul Choi, Yoon-Hee Choi, Dae-Chul Kim, Tae-Sun Choi:
Scene-Based Video Watermarking for Broadcasting Systems. 271-280 - Byong-Won Hwang, Tae-Ha Kang, Tae-Seung Lee:
Distortion-Free of General Information with Edge Enhanced Error Diffusion Halftoning. 281-290 - Tanzeem Muzaffar, Tae-Sun Choi:
Enhanced Video Coding with Error Resilience Based on Macroblock Data Manipulation. 291-300 - Myung Eui Lee, Pyung Soo Kim:
Filtering of Colored Noise for Signal Enhancement. 301-310 - Jihun Park, Sunghun Park, Jake K. Aggarwal:
Model-Based Human Motion Tracking and Behavior Recognition Using Hierarchical Finite State Automata. 311-320 - Won-Hyuck Choi, Hye-jin Shim, Jung-Sun Kim:
Effective Digital Watermarking Algorithm by Contour Detection. 321-328 - Kook-Yeol Yoo:
New Packetization Method for Error Resilient Video Communications. 329-337 - Yoon-Hee Choi, Yeong Kyeong Seong, Joo-Young Kim, Tae-Sun Choi:
A Video Mosaicking Technique with Self Scene Segmentation for Video Indexing. 338-347 - Kyung-Pyo Kang, Yoon-Hee Choi, Tae-Sun Choi:
Real-Time Video Watermarking for MPEG Streams. 348-358 - Jong-Un Yang, Jeong-Hyun Cho, Sang-Hyun Bae, In-Ho Ra:
A TCP-Friendly Congestion Control Scheme Using Hybrid Approach for Reducing Transmission Delay of Real-Time Video Stream. 359-368 - Jihun Park, Sunghun Park:
Object Boundary Edge Selection Using Level-of-Detail Canny Edges. 369-378 - Monia Discepoli, Ivan Gerace:
Inverse Dithering through IMAP Estimation. 379-388 - Fevzullah Temurtas, Ali Gülbag, Nejat Yumusak:
A Study on Neural Networks Using Taylor Series Expansion of Sigmoid Activation Function. 389-397 - Fevzullah Temurtas, Cihat Tasaltin, Hasan Temurtas, Nejat Yumusak, Zafer Ziya Öztürk:
A Study on Neural Networks with Tapped Time Delays: Gas Concentration Estimation. 398-405 - Mingli Song, Chun Chen, Jiajun Bu, Mingyu You:
Speech Emotion Recognition and Intensity Estimation. 406-413 - Liran Shen, Xueyao Li, Huiqiang Wang, Rubo Zhang:
Speech Hiding Based on Auditory Wavelet. 414-420 - Sung-kwan Je, Jae-Hyun Cho, Eui-Young Cha:
Automatic Selecting Coefficient for Semi-blind Watermarking. 421-430
Track on Telecommunications
- Olga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo:
Network Probabilistic Connectivity: Optimal Structures. 431-440 - Myung-Sub Lee, Chang-Hyeon Park, Young-Ho Sohn:
Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load Balancing. 441-450 - Kwang-Jae Lee, Won-Hyuck Choi, Jung-Sun Kim:
Adaptive CBT/Anycast Routing Algorithm for Multimedia Traffic Overload. 451-459 - SungKee Noh, YoungHa Hwang, Ki-Il Kim, Sang-Ha Kim:
Achieving Fair New Call CAC for Heterogeneous Services in Wireless Networks. 460-470
Track on Visualization and Virtual and Augmented Reality
- Zhiqiang Ma, Anthony Watson, Wanwu Guo:
Application of MCDF Operations in Digital Terrain Model Processing. 471-478 - Kesaraporn Techapichetvanich, Amitava Datta:
Visual Mining of Market Basket Association Rules. 479-488 - Sung Baik, Jerzy W. Bala, Sung Ahn:
Visualizing Predictive Models in Decision Tree Generation. 489-495
Track on Software Engineering
- José Daniel García, Jesús Carretero, José María Pérez, Félix García:
A Model for Use Case Priorization Using Criticality Analysis. 496-505 - Hugo Estrada, Oscar Pastor, Alicia Martínez, Jose Torres-Jimenez:
Using a Goal-Refinement Tree to Obtain and Refine Organizational Requirements. 506-513 - Jan Broeckhove, Kurt Vanmechelen:
Using C++ Functors with Legacy C Libraries. 514-523 - Hoon-Joon Kouh, Ki-Tae Kim, Sun-Moon Jo, Weon-Hee Yoo:
Debugging of Java Programs Using HDT with Program Slicing. 524-533 - Olivia Graciela Fragoso Diaz, René Santaolaya Salgado, Isaac M. Vásquez Mendez, Manuel A. Valdés Marrero:
Frameworks as Web Services. 534-542 - Olena Daly, David Taniar:
Exception Rules Mining Based on Negative Association Rules. 543-552 - Juan Frausto Solís, Marco Antonio Cruz-Chavez:
A Reduced Codification for the Logical Representation of Job Shop Scheduling Problems. 553-562 - Alfredo Milani, Valentina Poggioni:
Action Reasoning with Uncertain Resources. 563-573
Track on Security Engineering
- Khin Mi Mi Aung, Jong Sou Park:
Software Rejuvenation Approach to Security Engineering. 574-583 - Myung-Kyu Yi, Chong-Sun Hwang:
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. 584-593 - Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang:
Design and Implementation of High-Performance Intrusion Detection System. 594-602 - Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo:
An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. 603-610 - Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim:
A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. 611-616 - Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo:
Efficient Password-Based Authenticated Key Agreement Protocol. 617-626 - Sung-Keun Song, Hee Yong Youn, Chang-Won Park:
A Two-Public Key Scheme Omitting Collision Problem in Digital Signature. 627-636 - Sung Jin Choi, Hee Yong Youn:
A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition. 637-646 - Youngjoo Cho, ChangKyun Chi, Ilyong Chung:
An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block Design. 647-654 - Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im:
Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. 655-664 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. 665-671 - Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo:
ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. 672-680 - Jin S. Yang, Young-Ju Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myung Chung, Jung C. Na:
A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. 681-688 - Seung-Hyun Seo, Sang-Ho Lee:
A Secure and Flexible Multi-signcryption Scheme. 689-697 - IkSu Park, Seung Bae Park, ByeongKyun Oh:
User Authentication Protocol Based on Human Memorable Password and Using RSA. 698-707 - Heeran Lim, Manpyo Hong:
Effective Packet Marking Approach to Defend against DDoS Attack. 708-716 - Tai-Hoon Kim, Haeng-Kon Kim:
A Relationship between Security Engineering and Security Evaluation. 717-724 - Hae-ki Lee, Jae-sun Shim, Seung Lee, Jong-bu Kim:
A Relationship of Configuration Management Requirements between KISEC and ISO/IEC 15408. 725-734
Track on Information Systems and Information Technology
- Seung-Shik Kang:
Term-Specific Language Modeling Approach to Text Categorization. 735-742 - Won-Sung Sohn, Teuk-Seob Song, Jae-Kyung Kim, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Bong Yang, Francis Neelamkavil:
Context-Based Proofreading of Structured Documents. 743-753 - Jeong-Hoon Shin, Kwang-Seok Hong, Sung-Kyun Eom:
Implementation of New CTI Service Platform Using Voice XML. 754-762 - Min Jin, Byung-Joo Shin:
Storing Together the Structural Information of XML Documents in Relational Databases. 763-771 - Won-Sung Sohn, Myeong-Cheol Ko, Hak-Keun Kim, Soon-Bum Lim, Yoon-Chul Choy:
Annotation Repositioning Methods in the XML Documents: Context-Based Approach. 772-782 - Alicia Martínez, Oscar Pastor, Hugo Estrada:
Isolating and Specifying the Relevant Information of an Organizational Model: A Process Oriented Towards Information System Generation. 783-790 - Ho Joon Kim, Tae-Wan Ryu, Thai T. Nguyen, Joon Shik Lim, Sudhir Gupta:
A Weighted Fuzzy Min-Max Neural Network for Pattern Classification and Feature Extraction. 791-798 - Yongsu Park, Yookun Cho:
The eSAIDA Stream Authentication Scheme. 799-807 - René Santaolaya Salgado, Olivia Graciela Fragoso Diaz, Manuel A. Valdés Marrero, Isaac M. Vásquez Mendez, Sheila L. Delfín Lara:
An Object-Oriented Metric to Measure the Degree of Dependency Due to Unused Interfaces. 808-817 - Eun-Ju Ha, Byeong-Soo Yun:
End-to-End QoS Management for VoIP Using DiffServ. 818-827 - Dae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun:
Multi-modal Biometrics System Using Face and Signature. 828-837
Track on Information Retrieval
- SooCheol Lee, Eenjun Hwang, YangKyoo Lee:
Using 3D Spatial Relationships for Image Retrieval by XML Annotation. 838-848 - Byung-Joo Shin, Min Jin:
Association Inlining for Mapping XML DTDs to Relational Tables. 849-858 - Seungmin Rho, SooCheol Lee, Eenjun Hwang, YangKyoo Lee:
XCRAB: A Content and Annotation-Based Multimedia Indexing and Retrieval System. 859-868 - Jeong Min Shim, Seok Il Song, Young Soo Min, Jae Soo Yoo:
An Efficient Cache Conscious Multi-dimensional Index Structure. 869-876
Track on Image Processing
- Muhammad Bilal Ahmad, Min Hyuk Chang, Seung-Jin Park, Jong-An Park, Tae-Sun Choi:
Tracking of Moving Objects Using Morphological Segmentation, Statistical Moments, and Radon Transform. 877-886 - Fernando Pardo, Jose Antonio Boluda, Esther de Ves:
Feature Extraction and Correlation for Time-to-Impact Segmentation Using Log-Polar Images. 887-895 - Dong Joong Kang, Jong-Eun Ha, In-Mo Ahn:
Object Mark Segmentation Algorithm Using Dynamic Programming for Poor Quality Images in Automated Inspection Process. 896-905 - Tae-Jung Lho, Dong Joong Kang, Jong-Eun Ha:
A Line-Based Pose Estimation Algorithm for 3-D Polyhedral Object Recognition. 906-914 - Jong-Eun Ha, Dong Joong Kang:
Initialization Method for the Self-Calibration Using Minimal Two Images. 915-923 - Hyoun-Joo Go, Keun Chang Kwak, Sung-Suk Kim, Myung-Geun Chun:
Face Recognition for Expressive Face Images. 924-932 - Eugene Demidenko:
Kolmogorov-Smirnov Test for Image Comparison. 933-939 - Sung Kwan Kang, Muhammad Bilal Ahmad, Jong-Hun Chun, Pan-Koo Kim, Jong-An Park:
Modified Radius-Vector Function for Shape Contour Description. 940-947 - Seung-Jin Park, Muhammad Bilal Ahmad, Seung-Hak Rhee, Seung Jo Han, Jong-An Park:
Image Corner Detection Using Radon Transform. 948-955 - Yinghua Lu, Wanwu Guo:
Analytical Comparison of Conventional and MCDF Operations in Image Processing. 956-963 - Jin Ok Kim, Jin-Soo Kim, Young Ro Seo, Bum Ro Lee, Chin Hyun Chung, Key Seo Lee, Wha Young Yim, Sang Hyo Lee:
On Extraction of Facial Features from Color Images. 964-973
Track on Networking
- Dohyeon Kim, Beongku An:
An Architecture for Mobility Management in Mobile Computing Networks. 974-982 - Jongwoo Chae, Ghita Kouadri Mostéfaoui, Mokdong Chung:
An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics. 983-993 - Hae-Joung Lee, Kyu-Yeop Song, Won-Ho So, Jing Zhang, Debasish Datta, Biswanath Mukherjee, Young-Chon Kim:
A Hybrid Restoration Scheme Based on Threshold Reaction Time in Optical Burst-Switched Networks. 994-1004
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.