libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > TESTI GENERALI

laganà antonio (curatore); gavrilova marina l. (curatore); kumar vipin (curatore); mun youngsong (curatore); tan c.j. kenneth (curatore); gervasi osvaldo (curatore) - computational science and its applications -- iccsa 2004

Computational Science and Its Applications -- ICCSA 2004 International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I

; ; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
86,98 €
NICEPRICE
82,63 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 05/2004
Edizione: 2004





Trama

The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004.




Sommario

Information Systems and Information Technologies (ISIT) Workshop, Multimedia Session.- Face Detection by Facial Features with Color Images and Face Recognition Using PCA.- A Shakable Snake for Estimation of Image Contours.- A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained Ambiguity.- A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge Model.- A Feature-Based Algorithm for Recognizing Gestures on Portable Computers.- Fingerprint Matching Based on Linking Information Structure of Minutiae.- Video Summarization Using Fuzzy One-Class Support Vector Machine.- A Transcode and Prefetch Technique of Multimedia Presentations for Mobile Terminals.- Information Systems and Information Technologies (ISIT) Workshop, Algorithm Session.- A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurg.- A Study on Methodology for Enhancing Reliability of Datapath.- A Useful Method for Multiple Sequence Alignment and Its Implementation.- A Research on the Stochastic Model for Spoken Language Understanding.- The Association Rule Algorithm with Missing Data in Data Mining.- Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow.- On Negation-Based Conscious Agent.- A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Document.- A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic Features.- Information Systems and Information Technologies (ISIT) Workshop, Security Session.- Network Security Management Using ARP Spoofing.- A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks.- A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient Sign.- A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates.- A Fuzzy Expert System for Network Forensics.- A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models.- The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations.- Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IP.- Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems*.- New Approach for Secure and Efficient Metering in the Web Advertising.- MLS/SDM: Multi-level Secure Spatial Data Model.- Detection Techniques for ELF Executable File Using Assembly Instruction Searching.- Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain.- Committing Secure Results with Replicated Servers.- Applied Research of Active Network to Control Network Traffic in Virtual Battlefield.- Design and Implementation of the HoneyPot System with Focusing on the Session Redirection.- Information Systems and Information Technologies (ISIT) Workshop, Network Session.- Analysis of Performance for MCVoD System.- A QoS Improvement Scheme for Real-Time Traffic Using IPv6 Flow Labels.- Energy-Efficient Message Management Algorithms in HMIPv6.- A Queue Management Scheme for Alleviating the Impact of Packet Size on the Achieved Throughput.- PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack.- Traffic Control Scheme of ABR Service Using NLMS in ATM Network.- Information Systems and Information Technologies (ISIT) Workshop, Grid Session.- XML-Based Workflow Description Language for Grid Applications.- Placement Algorithm of Web Server Replicas.- XML-OGL: UML-Based Graphical Web Query Language for XML Documents.- Layered Web-Caching Technique for VOD Services.- QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application.- Efficient Pre-fetch and Pre-release Based Buffer Cache Management for Web Applications.- A New Architecture Design for Differentiated Resource Sharing on Grid Service.- An Experiment and Design of Web-Based Instruction Model for Collaboration Learning.- Information Systems and Information Technologies (ISIT) Workshop, Mobile Session.- Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels.- PMEPR Reduction Algorithms for STBC-OFDM Signals.- An Efficient Image Transmission System Adopting OFDM Based Sequence Reordering Method in Non-flat Fading Channel.- The Efficient Web-Based Mobile GIS Service System through Reduction of Digital Map.- Reducing Link Loss in Ad Hoc Networks.- A Web Based Model for Analyzing Compliance of Mobile Content.- Delay and Collision Reduction Mechanism for Distributed Fair Scheduling in Wireless LANs.- Approaches or Methods of Security Engineering Workshop.- Bit-Serial Multipliers for Exponentiation and Division in GF(2 m ) Using Irreducible AOP.- and Evaluation of Development System Security Process of ISO/IEC TR 15504.- Design on Mobile Secure Electronic Transaction Protocol with Component Based Development.- A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme.- A Design of Configuration Management Practices and CMPET in Common Criteria Based on Software Process Improvement Activity.- The Design and Development for Risk Analysis Automatic Tool.- A Fault-Tolerant Mobile Agent Model in Replicated Secure Services.- Computation of Multiplicative Inverses in GF(2 n ) Using Palindromic Representation.- A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks.- User Authentication Protocol Based on Human Memorable Password and Using RSA.- Supporting Adaptive Security Levels in Heterogeneous Environments.- Intrusion Detection Using Noisy Training Data.- A Study on Key Recovery Agent Protection Profile Having Composition Function.- Simulation-Based Security Testing for Continuity of Essential Service.- NextPDM: Improving Productivity and Enhancing the Reusability with a Customizing Framework Toolkit.- A Framework for Security Assurance in Component Based Development.- An Information Engineering Methodology for the Security Strategy Planning.- A Case Study in Applying Common Criteria to Development Process of Virtual Private Network.- A Pointer Forwarding Scheme for Fault-Tolerant Location Management in Mobile Networks.- Architecture Environments for E-business Agent Based on Security.- Authentication Authorization Accounting (AAA) Workshop.- Multi-modal Biometrics System Using Face and Signature.- Simple and Efficient Group Key Agreement Based on Factoring.- On Facial Expression Recognition Using the Virtual Image Masking for a Security System.- Secure Handoff Based on Dual Session Keys in Mobile IP with AAA.- Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents.- DMKB : A Defense Mechanism Knowledge Base.- A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments.- A New Role-Based Authorization Model in a Corporate Workflow Systems*.- A New Synchronization Protocol for Authentication in Wireless LAN Environment.- A Robust Image Authentication Method Surviving Acceptable Modifications.- Practical Digital Signature Generation Using Biometrics.- Performance Improvement in Mobile IPv6 Using AAA and Fast Handoff.- An Efficient Key Agreement Protocol for Secure Authentication.- A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3.- IDentification Key Based AAA Mechanism in Mobile IP Networks.- An Integrated XML Security Mechanism for Mobile Grid Application.- Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment.- A Scheme for Improving WEP Key Transmission between APs in Wireless Environment.- Internet Communication Security Workshop.- Generic Construction of Certificateless Encryption.- Security Issues in Network File Systems.- A Content-Independent Scalable Encryption Model.- Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash.- N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer.- Vali










Altre Informazioni

ISBN:

9783540220541

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm Ø 1360 gr
Formato: Brossura
Illustration Notes:CVI, 1185 p.
Pagine Arabe: 1185
Pagine Romane: cvi


Dicono di noi