default search action
ICCSA 2008: Perugia, Italy
- Marina L. Gavrilova, Osvaldo Gervasi, Antonio Laganà, Youngsong Mun, Andrés Iglesias:
Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, ICCSA '08, Perugia, Italy, June 30 - July 3, 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3243-1
Information Systems and Information Technologies
- Moonseong Kim, Hayder Radha, Hyunseung Choo:
On Multicast-Based Binding Update Scheme for NEMO Environments. 3-8 - Jong-An Park, Seung Jo Han, Youngeun An:
Heuristic Features for Color Correlogram for Image Retrieval. 9-13 - Waqas Rasheed, Junguk Beak, Pankoo Kim, Jonghun Chun, Jong-An Park:
Key Objects Based Profile for a Content-Based Video Information Retrieval and Streaming System Using Viewpoint Invariant Regions. 14-18 - YoungHan Choi, HyoungChun Kim, HyungGeun Oh, DoHoon Lee:
Call-Flow Aware API Fuzz Testing for Security of Windows Systems. 19-25 - Mohammad Mehedi Hassan, Bo-Hyun Seok, Ki-Moon Choi, Eui-Nam Huh:
An Efficient Event Matching Algorithm for Information Dissemination on Grid. 26-32 - Sofianita Mutalib, Nurulwahidah Mohammad Azlan, Marina Yusoff, Shuzlina Abdul Rahman, Azlinah Mohamed:
Plant Selection System. 33-38 - Sunghoon Cho, Moo-hun Lee, Jeongseok Kim, Bong-hoi Kim, Eui-In Choi:
A Novel Weight for Recommendation: Item Quality. 39-46 - Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, Youngsong Mun:
A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication. 47-51 - Mohammad Mehedi Hassan, Eui-Nam Huh, Jai-Ho Oh, Kyoung-Min Lee, Ok-Hwan Byeon:
A Resource Utilization Framework Using Partial State Information on Grid. 52-59 - Misun Kim, Youngsong Mun:
Distributed Control Scheme for DiffServ in Heterogeneous Mobile IP Networks. 60-64 - Youngsong Mun, Miyoung Kim, Gye-Young Kim:
Mutual Authentication Scheme in Proxy Mobile IP. 65-72 - Jaeseung Lim, Eunjoo Jeong, Kwanjoong Kim, Jongchan Lee, Youngsong Mun, Byunggi Kim:
Energy Efficient Cluster Management Scheme for Ubiquitous Sensor Networks. 73-83 - Ki-Moon Choi, Mohammad Mehedi Hassan, Eui-Nam Huh:
Propagation Service Decision Method for Web Services Composition in u-Lifecare System. 84-91 - Minu Park, Jung Hwan Choi, Hyunseung Choo:
Enhanced Westwood as per Vegas-Based Estimator with Slowstart Threshold for High-Speed Networks. 92-99 - Ali Sajedi Badashian, Mehregan Mahdavi, Amir Pourshirmohammadi:
Enabling Effective User Interface Design Using Compound and Layered Structures. 100-105 - Ali Sajedi Badashian, Mehregan Mahdavi, Amir Pourshirmohammadi, Minoo Monajjemi Nejad:
Fundamental Usability Guidelines for User Interface Design. 106-113
Data Storage Devices and Systems
- Jung Ha Kim, Sa Yong Shim, Sang Sun Lee:
Improvement and Design 1R PoRAM with Read/Write/Erase Operation. 117-121 - Keun-Tae Park, Hong-Yeon Kim, Young-Chul Kim, Sangmin Lee, Young-Kyun Kim, Myoung-Joon Kim:
Lake: Towards Highly Manageable Cluster Storage for Extremely Scalable Services. 122-131 - Ohhoon Kwon, Yunjung Yoo, Hyokyung Bahn, Kern Koh:
Caching and Data Allocation for Streaming Service in MEMS-Based Storage. 132-138 - Youjip Won, Rakie Kim, Jongmyeong Ban, Jungpil Hur, Sangkyu Oh, Jangsun Lee:
PRUN : Eliminating Information Redundancy for Large Scale Data Backup System. 139-144 - Jongmin Gim, Jaehyeok Chang, Hyungwon Jung, Youjip Won, Junseok Shim, Youngseon Park:
Hard Disk Drive for HD Quality Multimedia Home Appliance. 145-150 - Sohyang Ko, Seonsoo Jun, Yeonseung Ryu, Ohhoon Kwon, Kern Koh:
A New Linux Swap System for Flash Memory Storage Devices. 151-156 - Seunghwan Hyun, Sehwan Lee, Sungyong Ahn, Kern Koh:
Improving the Demand Paging Performance with NAND-type Flash Memory. 157-163
Future Security Services
- ByungRae Cha:
Access Control of Software Source Code by CRYPTEX Model. 167-173 - Nahar Sultana, Ki-Moon Choi, Eui-nam Huh:
Mobility Support Secure Coverage Protocol for Monitoring Applications Using Wireless Sensor Networks. 174-183 - Tran Hoang Hai, Eui-Nam Huh:
Minimizing the Intrusion Detection Modules in Wireless Sensor Networks. 184-189 - Majid Javid Moayed, Abdul Azim Abdul Ghani, Ramlan Mahmod:
A Survey on Cryptography Algorithms in Security of Voting System Approaches. 190-200 - Sung-Hyun Eum, Sung-Jae Cho, Hyoung-Kee Choi, Hyunseung Choo:
A Robust Session Key Distribution in 802.11i. 201-206 - Jongpil Jeong, Min Young Chung, Youho Lee, Hyunseung Choo:
Reduction of Inter-MAP Ping-pong Handoff Rate Based on 2-Layers in Hierarchical Mobile IPv6 Networks. 207-213 - ByungGoo Choi, JaeHyun Ryu, Choong Seon Hong, DongJin Kwak:
Enhanced SEND Protocol for Secure Data Transmission in Mobile IPv6 Environment. 214-220
UnConventional High Performance Computing
- Pinar Muyan-Özçelik, John D. Owens, Junyi Xia, Sanjiv S. Samant:
Fast Deformable Registration on the GPU: A CUDA Implementation of Demons. 223-233 - Linda Kaouane, Dominique Houzet, Sylvain Huet:
SysCellC: SystemC on Cell. 234-244 - Mohammad Mahdi Heyhat, Mohammad Moghiman, Shoatb Mahjoub:
Comparison of Mist Effect on the Heat Transfer Coefficient and Skin Friction Factor in an Impinging Jet. 245-251 - Abdul Samad bin Haji Ismail, Abdul Hanan Abdullah, Kamalrulnizam bin Abu Bak, Md. Asri Ngadi, Dahliyusmanto Dahlan, Witcha Chimphlee:
A Novel Method for Unsupervised Anomaly Detection Using Unlabelled Data. 252-260 - Moo-hun Lee, Sunghoon Cho, Hyokyung Chang, Junghee Jo, Hoiyoung Jung, Eui-In Choi:
Auditing System Using Rule-Based Reasoning in Ubiquitous Computing. 261-266 - Nezha Hamdi, Khalid Auhmani, Moha M'rabet Hassani:
Design of a High-Accuracy Classifier Based on Fisher Discriminant Analysis: Application to Computer-Aided Diagnosis of Microcalcifications. 267-273
Computer Algebra Systems and their Applications
- Masayoshi Sekiguchi, Takayuki Abe, Hajime Izumi, Masataka Kaneko, Satoshi Yamashita, Kenji Fukazawa, Kiyoshi Kitahara, Setsuo Takato:
Monochrome Line Drawings of 3D Objects due to the Programmability of KETpic. 277-283 - Mikhail I. Karyakin, Dmitry Y. Sukhov, Tatyana V. Gavrilyachenko:
Designing of the Interface for Nonlinear Boundary Value Problems Solver Using Maple. 284-290 - Haiduke Sarafian:
Rotating Elliptical Parallel-Plate Capacitor and a Transient Electric Circuit. 291-296 - Andrés Iglesias Prieto, Robert Ipanaqué Chero:
Symbolic Proof of Limits of Functions in Mathematica with Applications to Mathematics Education. 297-305 - Tadashi Takahashi:
Groebner Basis for Polynomials with Parametric Exponents. 306-312 - Maria Angelica de Oliveira Camargo-Brunetto, Rafael Yul Arabori:
Learning Numerical and Algebraic Computation Using ANAWEB. 313-320 - Akemi Gálvez Tomida:
Matlab Toolbox and GUI for Analyzing One-Dimensional Chaotic Maps. 321-330 - Xin Li, Marc Moreno Maza, Raqeeb Rasheed, Éric Schost:
High-Performance Symbolic Computation in a Hybrid Compiled-Interpreted Programming Environment. 331-341 - Changbo Chen, François Lemaire, Liyun Li, Marc Moreno Maza, Wei Pan, Yuzhen Xie:
The ConstructibleSetTools and ParametricSystemTools Modules of the RegularChains Library in Maple. 342-352 - Stephen M. Watt:
Functional Decomposition of Symbolic Polynomials. 353-362
Computational Geometry and Applications
- Manuel Abellanas, Mercè Claverol, Inês Matos:
The alpha-Embracing Contour. 365-372 - Russell Tempero, Sergey Bereg, Xiangxu Meng, Changhe Tu, Chenglei Yang, Binhai Zhu:
Automatically Approximating 3D Points with Co-Axisal Objects. 373-381 - Uday Chebrolu, Piyush Kumar, Joseph S. B. Mitchell:
On Finding Large Empty Convex Bodies in 3D Scenes of Polygonal Models. 382-393 - Marta Fort, Joan Antoni Sellarès:
Computing Distance Functions from Generalized Sources on Weighted Polyhedral Surfaces. 394-404 - Takashi Michikawa, Hiromasa Suzuki:
Spherical Distance Transforms. 405-412 - Yukie Nagai, Yutaka Ohtake, Kiwamu Kase, Hiromasa Suzuki:
Extraction of Skeletal Meshes from Volumetric Data by Sparse Polynomial Approximation. 413-420 - António Leslie Bajuelos, Santiago Canales, Gregorio Hernández-Peñalver, Ana Mafalda Martins:
Estimating the Maximum Hidden Vertex Set in Polygons. 421-432 - Hamzeh Khazaei, Ali Mohades:
Fingerprint Matching Algorithm Based on Voronoi Diagram. 433-440 - Lidija Comic, Leila De Floriani:
Multi-Scale 3D Morse Complexes. 441-451 - Kira Vyatkina:
On the Structure of Straight Skeletons. 452-460 - Luca Grilli, Seok-Hee Hong, Antonios Symvonis, Camille Wormser:
Locally Delaunay Realizability of Regular Series-Parallel Graphs. 461-467 - Luke Olsen, Faramarz F. Samavati:
A Discrete Approach to Multiresolution Curves and Surfaces. 468-477 - Sachin Jambawalikar, Piyush Kumar:
A Note on Approximate Minimum Volume Enclosing Ellipsoid of Ellipsoids. 478-487
Computer Graphics and Geometric Modeling
- Muhammad Riaz, Gwangwon Kang, Youngbae Kim, Sung Bum Pan, Jong-An Park:
Efficient Image Retrieval Using Adaptive Segmentation of HSV Color Space. 491-496 - Ivan Gerace, Marcello Mastroleo, Alfredo Milani, Simona Moraglia:
Genetic Blind Image Restoration With Dynamical Local Evaluation. 497-506 - Chenyang Lu, Hong Zhu, Nengchao Wang:
Fast N-Dimensional Hilbert Mapping Algorithm. 507-513 - Xin Liu, Marina L. Gavrilova, Faramarz F. Samavati:
NURBS Fusion. 514-522 - Arthur van Bilsen, Egbert Stolk:
Solving Error Problems in Visibility Analysis for Urban Environments by Shifting from a Discrete to a Continuous Approach. 523-528 - Saeed Muhammad Mannan, Tae-Sun Choi:
Rectification of Illumination on 3D Shape Recovery. 529-534
Computational Forensics - Computational Methods and Applications in Criminal Investigations
- Richard Bache, Fabio Crestani:
Towards an Automated Approach to Offender Profiling. 537-545 - Babak Mahdian, Stanislav Saic:
Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics. 546-556 - Erwin J. Alles, Zeno J. M. H. Geradts, Cor J. Veenman:
Source Camera Identification for Low Resolution Heavily Compressed Images. 557-567
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.