default search action
ICCSA 2006: Glasgow, UK
- Marina L. Gavrilova, Osvaldo Gervasi, Vipin Kumar, Chih Jeng Kenneth Tan, David Taniar, Antonio Laganà, Youngsong Mun, Hyunseung Choo:
Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III. Lecture Notes in Computer Science 3982, Springer 2006, ISBN 3-540-34075-0
Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)
- Shoichi Morimoto, Daisuke Horie, Jingde Cheng:
A Security Requirement Management Database Based on ISO/IEC 15408. 1-10 - A. Sermet Anagun:
Development of Committee Neural Network for Computer Access Security System. 11-20 - Byeongchang Kim, Gary Geunbae Lee:
C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model. 21-30 - Eung Soo Kim, Min Sung Kim:
Design and Fabrication of Security and Home Automation System. 31-37 - Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim:
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. 38-47 - ManKi Ahn, Hoon-Jae Lee:
Experiments and Hardware Countermeasures on Power Analysis Attacks. 48-53 - InJung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won:
Information System Modeling for Analysis of Propagation Effects and Levels of Damage. 54-63 - Youngrag Kim, JaeYoun Jung, Seunghwan Lee, Chonggun Kim:
A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks. 64-72 - SeongKwon Cheon, Dongxue Jin, ChongGun Kim:
A VLSM Address Management Method for Variable IP Subnetting. 73-83 - Haeng-Kon Kim, Sang-Yong Byun:
SDSEM: Software Development Success Evolution Model. 84-92 - Mary Wu, Sangjoon Jung, Seunghwan Lee, Chonggun Kim:
A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks. 93-103 - Hae Geun Kim:
Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications. 104-114 - Kyung-Hoon Jung, Seok-Cheol Lee, Hyun-Suk Hwang, Chang Soo Kim:
The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks. 115-124 - Hyun-Suk Hwang, Kyoo-Seok Park, Chang Soo Kim:
Ontology-Based Information Search in the Real World Using Web Services. 125-133 - Tae Young Byun, Min-Su Kim, Sung-Ho Hwang, Sung-Eok Jeon:
An Active Node Set Maintenance Scheme for Distributed Sensor Networks. 134-143 - Subong Yi, Bobby D. Gerardo, Young-Seok Lee, Jaewan Lee:
Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment. 144-153 - Misun Kim, Minsoo Kim, Jae-Hyun Seo:
Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector. 154-162 - Haeng-Kon Kim:
Applying Product Line to the Embedded Systems. 163-171 - Kwang-Baek Kim, Byung-Kwan Lee, Soon-Ho Kim:
Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold. 172-177 - Romeo Mark A. Mateo, Jaewan Lee, Hyunho Yang:
Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents. 178-187 - Hyung-Su Jeon, Hye-Min Noh, Cheol-Jung Yoo, Ok-Bae Chang:
Design of H.264/AVC-Based Software Decoder for Mobile Phone. 188-197 - Haeng-Kon Kim, Youn-Ky Chung:
Transforming a Legacy System into Components. 198-205 - Injoo Jang, Hyeong Seon Yoo:
Pseudorandom Number Generator Using Optimal Normal Basis. 206-212 - Wenbo Shi, Hyeong Seon Yoo:
Efficient Nonce-Based Authentication Scheme Using Token-Update. 213-221 - Seong-Man Choi, Cheol-Jung Yoo, Ok-Bae Chang:
An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool. 222-233 - Sangjoon Jung, Chonggun Kim, Younky Chung:
A Prediction Method of Network Traffic Using Time Series Models. 234-243 - Youngchul Bae, Malrey Lee, Thomas M. Gatton:
An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions. 244-250 - Chang-Sun Shin, Dong-In Ahn, Hyun Yoe, Su-Chong Joo:
Intersection Simulation System Based on Traffic Flow Control Framework. 251-260 - Byung kwan Lee, Chang-Min Kim, Dae-won Shin, Seung Hae Yang:
A HIICA(Highly-Improved Intra CA) Design for M-Commerce. 261-268 - Hoon-Jae Lee:
Highly Reliable Synchronous Stream Cipher System for Link Encryption. 269-278 - Kwang-Baek Kim, Hwang-Kyu Yang, Sang-Ho Ahn:
Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network. 279-286 - Oh-Hyung Kang, Ji-Hyun Lee, Yang-Won Rhee:
Hybrid Image Mosaic Construction Using the Hierarchical Method. 287-297
Workshop on Applied Cryptography and Information Security (ACIS 2006)
- Dalia Khader:
Public Key Encryption with Keyword Search Based on K-Resilient IBE. 298-308 - Jin Li, Yuen-Yan Chan, Yanming Wang:
A Generic Construction of Secure Signatures Without Random Oracles. 309-317 - David Galindo:
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. 318-326 - He Ge, Stephen R. Tate:
Traceable Signature: Better Efficiency and Beyond. 327-337 - Marc Joye, Hung-Mei Lin:
On the TYS Signature Scheme. 338-344 - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. 345-354 - Jens-Matthias Bohli:
A Framework for Robust Group Key Agreement. 355-364 - Yuen-Yan Chan, Jin Li:
BGN Authentication and Its Extension to Convey Message Commitments. 365-374 - Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung:
New Security Problem in RFID Systems "Tag Killing". 375-384 - Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee:
A Model for Security Vulnerability Pattern. 385-394 - Kaouthar Blibech, Alban Gabillon:
A New Timestamping Scheme Based on Skip Lists. 395-405 - Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai:
A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. 406-415 - Khoongming Khoo, Swee-Huay Heng:
New Constructions of Universal Hash Functions Based on Function Sums. 416-425 - Martin Stanek:
Analysis of Fast Blockcipher-Based Hash Functions. 426-435 - Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. 436-445 - Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. 446-455 - Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido:
Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture. 456-465
Workshop on Internet Communications Security (WICS 2006)
- Jiqiang Lu:
Security Weaknesses in Two Proxy Signature Schemes. 466-475 - Byung Ryong Kim, Ki-Chang Kim:
A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. 476-485 - Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung:
Comparative Analysis of IPv6 VPN Transition in NEMO Environments. 486-496 - Namhi Kang, Younghan Kim:
A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream. 497-506 - Yuen-Yan Chan:
Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO. 507-516 - Youngsook Lee, Junghyun Nam, Dongho Won:
An Inter-domain Key Agreement Protocol Using Weak Passwords. 517-526 - Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano:
A Practical Solution for Distribution Rights Protection in Multicast Environments. 527-536 - Francesco Palmieri, Ugo Fiore:
Audit-Based Access Control in Nomadic Wireless Environments. 537-545
Workshop on Optimization: Theories and Applications (OTA 2006)
- Morteza Bagherpour, Siamak Noori, Seyed Jafar Sadjadi:
Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems. 546-553 - Liliana Capacho, Rafael Pastor:
The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution. 554-563 - Kap Hwan Kim, Jong-Sool Lee:
Satisfying Constraints for Locating Export Containers in Port Container Terminals. 564-573 - Seyed Jafar Sadjadi, Mohsen Ziaee:
A Price Discrimination Modeling Using Geometric Programming. 574-580 - Byounghak Yang:
Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation. 581-589 - Seung-Hyun Son, Jae-Yearn Kim:
Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning. 590-599 - Jeong Hun Lee, Il Kyeong Moon:
Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain. 600-609 - Shu-Hsing Chung, Chun-Ying Huang, Amy Hsin-I Lee:
Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area. 610-620 - Mario Vanhoucke:
Scheduling an R&D Project with Quality-Dependent Time Slots. 621-630 - Yen Hung Chen, Chuan Yi Tang:
The Bottleneck Tree Alignment Problems. 631-637 - Gerrit Färber, Anna M. Coves Moreno:
Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers. 638-648 - Chung-Hsing Yeh, Yu-Hern Chang:
Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment. 649-658 - Guoli Liu, Lixin Tang:
Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex. 659-667 - Kung-Jeng Wang, Wen-Hai Chih, Ken Hwang:
A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment. 668-677 - A. Sermet Anagun, T. Sarac:
Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method. 678-687 - Andrew Lim, Hong Ma, Zhaowei Miao:
Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks. 688-697 - In-Jae Jeong:
An Entropy Based Group Setup Strategy for PCB Assembly. 698-707 - Sandra Duni Eksioglu, Mingzhou Jin:
Cross-Facility Production and Transportation Planning Problem with Perishable Inventory. 708-717 - Ho Woo Lee, Se Won Lee, Won Ju Seo, Sahng Hoon Cheon, Jongwoo Jeon:
A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload. 718-727 - Sang-Il Kim, Hyun-Seon Choi, Dong-Ho Lee:
Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times. 728-737 - Cédric Bentz:
The Maximum Integer Multiterminal Flow Problem. 738-747 - Mingzhou Jin, Kai Liu, Burak Eksioglu:
Routing with Early Ordering for Just-In-Time Manufacturing Systems. 748-756 - Eugenio Mijangos:
A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks. 757-766 - Soo-Tae Kwon:
On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers. 767-776 - Wanmo Kang, Kyungsik Lee:
Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk. 777-784 - Byung-Cheon Choi, Sung-Pil Hong:
Two-Server Network Disconnection Problem. 785-792 - Vladimir G. Deineko, Alexandre Tiskin:
One-Sided Monge TSP Is NP-Hard. 793-801 - Wlodzimierz Ogryczak, Tomasz Sliwinski:
On Direct Methods for Lexicographic Min-Max Optimization. 802-811 - Alex Y. D. Siem, Dick den Hertog, Aswin L. Hoffmann:
Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing. 812-821 - Guillermo Gallego, Woonghee Tim Huh, Wanmo Kang, Robert Phillips:
Linear Convergence of Tatônnement in a Bertrand Oligopoly. 822-831 - Hak-Soo Mok, Chang-Hyo Han, Chan-Hyoung Lim, John-Hee Hong, Jong-Rae Cho:
Design for Using Purpose of Assembly-Group. 832-840 - Manuel L. Esquível:
A Conditional Gaussian Martingale Algorithm for Global Optimization. 841-851 - Hyunsoo Kim, Hee Yong Youn:
Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks. 852-861 - Hui-Ming Wee, Chun-Jen Chung:
A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process. 862-874 - Jinho Lee, Young Hoon Lee, Yun Ho Lee:
Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem. 875-884 - Hui-Ming Wee, Jonas C. P. Yu, Kung-Jeng Wang:
An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations. 885-897 - Jong-Sub Lee, Maing-Kyu Kang:
A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps. 898-907 - Panos Parpas, Berç Rustem:
Global Optimization of the Scenario Generation and Portfolio Selection Problems. 908-917 - E. Ertugrul Karsak:
A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation. 918-927 - Seungwoo Kwon, Kyungdo Park, Chulung Lee, Sung-Shick Kim, Hak-Jin Kim, Zhong Liang:
Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers. 928-933 - Shan He, Q. H. Wu, Jon R. Saunders:
A Group Search Optimizer for Neural Network Training. 934-943 - Kuo-Hwa Chang, Huifen Chen, Ching-Fen Lin:
Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem. 944-953
General Tracks
- Sulyun Sung, Yuhwa Seo, Yongtae Shin:
Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks. 954-963 - Miguel Gutiérrez, Alfonso Durán, Pedro Cocho:
An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling. 964-973 - Jiang Guo, Yuehong Liao, Raj Pamula:
Static Analysis Based Software Architecture Recovery. 974-983 - Angélica Caro, Coral Calero, Ismael Caballero, Mario Piattini:
A First Approach to a Data Quality Model for Web Portals. 984-993 - Hak-Soo Mok, Jong-Rae Cho, Kwang-Sup Moon:
Design for Environment-Friendly Product. 994-1003 - Thomas J. Wollinger, Guido Bertoni, Luca Breveglieri, Christof Paar:
Performance of HECC Coprocessors Using Inversion-Free Formulae. 1004-1012 - Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Metrics of Password Management Policy. 1013-1023 - Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Using UML Packages for Designing Secure Data Warehouses. 1024-1034 - Pino Caballero-Gil, Amparo Fúster-Sabater:
Practical Attack on the Shrinking Generator. 1035-1043 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. 1044-1053 - Kisoeb Park, Moonseong Kim, Seki Kim:
Stochastic Simulation Method for the Term Structure Models with Jump. 1054-1063 - Yu Xia:
The Ellipsoidal lp Norm Obnoxious Facility Location Problem. 1064-1072 - J. Samuel Baixauli, Susana Alvarez:
On the Performance of Recovery Rate Modeling. 1073-1080 - Michael Lazzareschi, Tzu-Yi Chen:
Using Performance Profiles to Evaluate Preconditioners for Iterative Methods. 1081-1089 - Moonseong Kim, Young-Cheol Bang, Hyunseung Choo:
Multicast omega-Trees Based on Statistical Analysis. 1090-1099 - Przemyslaw Ryba, Andrzej Kasprzak:
The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results. 1100-1109 - Gye Hang Hong, Sung Ho Ha:
Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management. 1110-1118 - Marcin Markowski, Andrzej Kasprzak:
The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks. 1119-1128 - Moonseong Kim, Young-Cheol Bang, Jong S. Yang, Hyunseung Choo:
An Efficient Multicast Tree with Delay and Delay Variation Constraints. 1129-1136 - Inbok Lee, Raphaël Clifford, Sung-Ryul Kim:
Algorithms on Extended (delta, gamma)-Matching. 1137-1142 - Ana Isabel González, Alicia D'Anjou, M. Teresa García-Sebastián, Manuel Graña:
SOM and Neural Gas as Graduated Nonconvexity Algorithms. 1143-1152 - James R. Gattiker, Earl Lawrence, David Higdon:
Analysis of Multi-domain Complex Simulation Studies. 1153-1162 - Dong Joong Kang, Jong-Eun Ha, Tae-Jung Lho:
A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance. 1163-1171 - Jaechoon Chon, Hyongsuk Kim:
Robust Fault Matched Optical Flow Detection Using 2D Histogram. 1172-1179 - Mohammadreza Noruzi, Mansour Vafadoost, Mohammad Shahram Moin:
Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform. 1180-1189 - Eun Mi Kim, Cherl Soo Pahk, Jong Gu Lee:
Optimal Edge Detection Using Perfect Sharpening of Ramp Edges. 1190-1199 - Eun Yi Kim, Sin Kuk Kang:
Eye Tracking Using Neural Network and Mean-Shift. 1200-1209 - Marek Kurzynski, Edward Puchala:
The Optimal Feature Extraction Procedure for Statistical Pattern Recognition. 1210-1215 - Murat Ekinci:
A New Approach for Human Identification Using Gait Recognition. 1216-1225
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.