دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1 ed.] نویسندگان: Bo Hyun Kim, Sung Bum Park, Gyu Bong Lee, So Young Chung (auth.), Osvaldo Gervasi, Marina L. Gavrilova (eds.) سری: Lecture Notes in Computer Science 4707 : Theoretical Computer Science and General Issues ISBN (شابک) : 3540744827, 9783540744825 ناشر: Springer-Verlag Berlin Heidelberg سال نشر: 2007 تعداد صفحات: 1208 [1228] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 34 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Computational Science and Its Applications – ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علوم محاسباتی و کاربردهای آن - ICCSA 2007: کنفرانس بین المللی، کوالالامپور، مالزی، 26-29 اوت 2007. مجموعه مقالات. قسمت سوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Title Page Preface Organization Table of Contents – Part III Framework of Integrated System for the Innovation of Mold Manufacturing Through Process Integration and Collaboration Introduction Analysis of Mold Manufacturing Process Extraction of System Functions Design of System Framework Prototype of System Conclusion References A Study on Automated Design System for a Blow Mould Introduction Procedure of Making Blow Molding SBM Introduction Business Process for Blow Mould Production Design Approach System Implementation Conclusion References Development of an Evaluation System of the Informatization Level for the Mould Companies in Korea Introduction ESMI (Evaluation System of Mould Industry Informatization) Information/Network Infrastructure Level Mould Manufacturing Information System Level Collaboration Level A Case Study and Verification of the Model Selection of Weight Factors Using the AHP Technique Survey Reliability and Validity Conclusions References Framework of a Collaboration-Based Engineering Service System for Mould Industry Introduction Changes in the Manufacturing Environment SMEs and Internet and Information Technology The Necessity of Knowledge Collaboration in Mould Industry The Purpose and Organization of This Study Significance of e-Engineering Service in Mould Industry AS-IS and TO-BE Process of Mould Industry Using IDEF0 Analysis of Type About e-Engineering Service Trade Method Collaborative Agents for e-Engineering Service An Example Conclusions and Future Works References Meta-modelling Syntax and Semantics of Structural Concepts for Open Networked Enterprises Introduction Related Work The RM-ODP The RM-ODP Foundations Part The RM-ODP Enterprise Language Syntax Domain Semantics Domain Meaning Function Conclusion References Component Specification for Parallel Coupling Infrastructure Introduction The Parallel Coupling Problem Coupled Systems Consequences of Distributed-Memory Parallelism PCI Requirements Software Components and the Common Component Architecture PCI Component Toolkit Data Model for Coupling PCI-Tk Components Reference Implementation Deployment Examples Conclusions Real-Time Navigation for a Mobile Robot Based on the Autonomous Behavior Agent Introduction Autonomous Behavior Agent Sensing Behavior Path Planning and Replanning Behavior Obstacle Avoidance Behavior Simulation Results Conclusions References Concurrent Subsystem-Component Development Model (CSCDM) for Developing Adaptive E-Commerce Systems Introduction E-Commerce System Architectures and Development Models Adaptive Concurrent Subsystem-Component Development Model (CSCDM) Case Study: Client-Driven Online System Development for WCE Pizza Conclusion References A Quantitative Approach for Ranking Change Risk of Component-Based Software Introduction Related Work CBS and Its Changes Description Model for CBS Changes in CBS Change Risk Analysis Change Risk of Single Component Change Risk of CBS A Case Study Concluding Remarks References Relating Software Architecture Views by Using MDA Introduction Relating SAVs and the Model-Driven Architecture Software Architecture Views The Model-Driven Architecture and the Software Architecture Views Using MDA to Build Relations Among SAVs Transformation Process of the Architectural Views Models Specifying the Meta-models Specification of the Modular View Meta-model Specification of the C-C View Meta-model Establishing Relations Among the Meta-models Identifying Correspondence Relations Specification of the Relations Between the Software Views Applying Transformation at the Model Level Conclusions References Update Propagation Technique for Data Grid Introduction Replica Consistency in Data Grid System Model and Assumption The Construction and Maintenance of Update Propagation Grid (UPG) Participation of a New Site to UPG Maintain the Consistency of UPG Update Propagation Techniques Push Phase Pull Phase Performance Analysis Average Delay Time Average Load Balance Communication Cost Numerical Result and Comparisons Evaluation When K=2 An Effect of K, Evaluation Where K=2, 3, 4, …, 10 Conclusion References A Spatiotemporal Database Prototype for Managing Volumetric Surface Movement Data in Virtual GIS Introduction System Architecture Volumetric Surface Movements Spatiotemporal Data Model Database System Development Database Development Data Loading Process Data Retrieval Process Data Visualization Results of Implementation Conclusion and Future Works Query Distributed Ontology over Grid Environment Introduction Related Work Architecture Node Architecture Web Service in DOFG Ontology Virtual Organization Query Decomposing, Routing and Processing in DOFG RDF Data Query Decomposing and Matching Query Routing in P2P Networks Query processing Implementation Conclusion and Future Work References CSP Transactors for Asynchronous Transaction LevelModeling and IP Reuse Introduction Related Work Transaction Level Modeling: Synchronous Abstractions Synchronous Transactors Proposed Improvements to the Synchronous TLM Models Asynchronous Transaction Level Modeling Asynchronous Abstractions Abstraction Properties Asynchronous Transactors Automatic Translation Between Abstractions CSP-Based Transactors Interface and Code Template Generators RAM IP Demonstrator Conclusions References A Robust Real-Time Message Scheduling Scheme Capable of Handling Channel Errors in Wireless Local Area Networks Introduction Related Works Basic Assumptions Network and Error Models Message Model Network Operation Bandwidth Management Runtime Operation Performance Evaluation Conclusions References Design and Implementation of a Tour Planning System for Telematics Users Introduction Related Works Information Model Data Classification Computing Algorithm of the Similarity Recommender System System Architecture Tour Plan Generator Performance Measurement Conclusion Ionospheric F-Layer Critical Frequency Estimation from Digital Ionogram Analysis Introduction Ionogram Data Set Proposed Techniques Ionogram Enhancement Using Size-Contrast Filtering Critical Frequency Estimation Experimental Results and Discussion Conclusion References Study of Digital License Search for Intellectual Property Rights of S/W Source Code Introduction Related Works DRM Technology Necessity of Source Code Protection Technology and Business Model Design of Digital License of Software Source Code Analyze the Structure of Source Code Generation Process of Source Code Digital License DOM Child Node Generation Pattern Generation of Operator and Input/Output Data Type in Child Node Indexer and Search Engine of Digital License Index Segments and Incremental Indexing Indexer and Search Engine of Digital License Simulation of Digital License Comparison of Digital License Based on XML vs. S/W Source Code Digital License Indexing and Searching Conclusion Creating Numerically Efficient FDTD Simulations Using Generic C++ Programming Introduction Geometry Components of the Contour-Path FDTD Design of the FDTD Simulation in EMTL Simulation Stages and Basic Components Geometry Analysis Stage Separation of Duties: Basic and Specialized Updates Optimizing Memory Usage Parallelization Strategy Implementing Basic FDTD Algorithms as Correctors Illustrative Examples and Benchmarks Mesh Memory Layout Testing Parallel Benchmarks Testing Subcell Averaging Methods Conclusions Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor Introduction RFID Security and Privacy Issues Summary of the Attributes of the Proposed Protocol Organization of the Rest of the Paper Related Works Mutual Authentication Protocol with Monitor Notations Used in Our Protocol Basic Assumptions The Proposed Protocol The Structure of the Database Server Security Analysis and Comparison Security Analysis Security Characteristic Comparison Efficiency and Comparison Efficiency of Tag Efficiency Comparison Conclusions References Non-linear Least Squares Features Transformation for Improving the Performance of Probabilistic Neural Networks in Classifying Human Brain Tumors on MRI Introduction Materials and Methods Data Acquisition Feature Extraction Least Squares Feature Transformation – Probabilistic Neural Network Classifier (LSFT-PNN) Feature Selection and System Evaluation Results and Discussion Conclusion References Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based Simulation Introduction Real-Time Systems Related Work Multi-agent Simulation Process ARTAS Architecture Agent Model System Agents Implementation Main Agent Scheduler Agent Queue Agent Clock Agent Server Agent Source Agent Packet Agent Agents Management Conclusions and Future Work References Defining Security Architectural Patterns Based on Viewpoints Introduction Software Architecture Documentation Security Patterns Defining Security Viewpoints for Security Architectural Patterns Viewpoints Catalogue Definition of Security Design Subsystem Viewpoint Conclusions References A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period Introduction Review of Hsu-Wu-Wu Scheme Secret Share Generation Phase Proxy Share Generation Phase Proxy Signature Generation Phase Proxy Signature Verification Phase The Proposed Scheme Secret Share Generation Phase Proxy Share Generation Phase Proxy Signature Generation Phase Proxy Signature Verification Phase Security Analysis Performance Evaluation Conclusions References Two-Stage Interval Krawczyk-Schwarz Methods with Applications to Nonlinear Parabolic PDE Introduction Notation Basics Method Convergence and Enclosure Numerical Example Red-Black EDGSOR Iterative Method Using Triangle Element Approximation for 2D Poisson Equations Introduction Half-Sweep Finite Element Approximation Formulation and implementation of the 4 Point-EDG$SOR$-RB Numerical Experiments Conclusion Performance of Particle Swarm Optimization in Scheduling Hybrid Flow-Shops with Multiprocessor Tasks Introduction The PSO Algorithm Computational Results Summary References Branch-and-Bound Algorithm for Anycast Flow Assignment in Connection-Oriented Networks Introduction Anycasting in Connection-Oriented Networks Anycast Flow Assignment Problem Calculation Scheme Lower Bound Branching Rules Results Conclusions References Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks Introduction Problem Formulation Algorithm Description Results Conclusion and Further Work References An Exact Algorithm for the Minimal Cost Gateways Location, Capacity and Flow Assignment Problem in Two-Level Hierarchical Wide Area Networks Introduction Problem Formulation The Branch and Bound Algorithm Branching Rules Lower Bound Heuristic Algorithm Computational Results Conclusions References Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream Processor Introduction QNJ-5 Stream-Level Kernel Level Experimental Setup and Performance Evaluation Implementation Optimizations Kernel Join Loop-Carried Stream Reusing Stream Transpose Discussion Conclusion References On Disconnection Node Failure and Stochastic Static Resilience of P2P Communication Networks Introduction Related Work Background The Topological Structures Fault-Tolerance and Connectivity of P2P Networks Calculating the Probability of Disconnection Simulation Results Conclusions References An Efficient Sequence Alignment Algorithm on a LARPBS Introduction The LARPBS Model The Sequence Alignment Algorithm Basic Backgrounds The New Formula The Sequences Alignment Algorithm on a LARPBS Complexity Analysis Conclusion An Effective Unconditionally Stable Algorithm for Dispersive Finite Difference Time Domain Simulations Introduction Formulation Stability Analysis Numerical Dispersion Analysis Simulation Study Conclusion A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization Introduction System Model Congestion Control Algorithm Convergence Analysis Simulation Results Conclusion and Future Work References 3D Bathymetry Reconstruction from Airborne Topsar Polarized Data Introduction Methodology Data Set 3-D Coastal Water Bathymetry Model Volterra Model The Fuzzy B-splines Method Results and Discussion Conclusions References A Parallel FDTD Algorithm for the Solution of Maxwell’s Equations with Nearly PML Absorbing Boundary Conditions Introduction FDTD Formulations NPML Formulation Parallelizing Strategy Simulation Study Conclusion Application of Modified ICA to Secure Communications in Chaotic Systems Introduction Proposed Secure Communications System Secure Communications Scheme Proposed Modified ICA Experiment Results and Discussion Conclusion References Zero Memory Information Sources Approximating to Video Watermarking Attacks Introduction Model Definition Watermarking Attacks as Information Sources Pdf Estimation Tools Model Specification Model Computation Model Validation Conclusion and Future Work References On Statistical Independence in the Logistic Map: A Guide to Design New Chaotic Sequences Useful in Cryptography Introduction A Study on Statistical Independence in the Continuous Case A Study on Statistical Independence in the Discrete Case Constructing New Chaotic Sequences for Enciphering Natural Text Conclusions References FVM- and FEM-Solution of Elliptical Boundary Value Problems in Different Coordinate Systems Introduction Functional Analytical Setting and Numerical Methods Finite-Element Method (FEM) Finite-Volume Method (FVM) Coordinate Transformation of the Boundary Value Problem Numerical Examples Conclusion Digital Simulation for Micro Assembly Arranged at Rectangular Pattern in Micro Factory Introduction Building Micro Factory with Micro Assembly Machines Micro Assembly Machine Building Digital Micro Factory Building Digital Micro Factory Process Model Recycling of Micro Assembly Machines Simulation Simulation of Micro Assembly Machine Process Arrangement Process Simulation Result Conclusion References A New Quantized Input RLS, QI-RLS, Algorithm Introduction RLS Algorithm Standard RLS Algorithm Clipped RLS Algorithm The Proposed QI-RLS Algorithm Convergence of QI-RLS Tracking Performance of QI-RLS Experimental Results: Predicting a Noisy Chirp Signal Conclusion References Decentralized Replica Exchange Parallel Tempering: An Efficient Implementation of Parallel Tempering Using MPI and SPRNG Introduction The Parallel Tempering Scheme Decentralized Parallel Implementation Pseudorandom Number Reproducibility for Global Process Synchronization Configuration Exchange or Temperature Exchange in Replica Exchange? Neighboring Replica Exchange or Random Replica Exchange? Random Number Streams Efficient Parallel PT Implementation Implementation Analysis Computational Results Rosenbrock’s Function Rugged Funnel-Like Function Summary References Approximation Algorithms for 2-Source Minimum Routing Cost k-Tree Problems Introduction Preliminaries A PTAS for the 2-kMRCT Problem The 2-kBSRT Problem The 2-kBVRT Problem Conclusion On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable Network Introduction Definitions and Notations Using Structural Peculiarities Branching by Chain Case of k=2 Case of k>2 Case Studies Conclusion Linearization of Stream Ciphers by Means of Concatenated Automata Introduction Fundamentals and Basic Notation Structural Properties of Multiplicative Polynomial CA Period of the Generated Sequences Linear Complexity of the Generated Sequences The Number of Different Generated Sequences Linear Modelling by Concatenation of Primitive CA The Shrinking Generator The Class of Clock-Controlled Shrinking Generators The Cascade Gollmann Generator Conclusions Effective Quantification of Gene Expression Levels in Microarray Images Using a Spot-Adaptive Compound Clustering-Enhancement-Segmentation Scheme Introduction Material and Methods CES-Scheme Evaluation of Extracted Genes Expression Levels Results Discussion References Biomarker Selection, Employing an Iterative Peak Selection Method, and Prostate Spectra Characterization for Identifying Biomarkers Related to Prostate Cancer Introduction Materials and Methods PAS Pre-processing Stage PAS Classification Stage Results Discussion References Classic Cryptanalysis Applied to Exons and Introns Prediction Introduction Related Works Adaptation of Kasiski Method (KM) The Variants of Coding Measures Based on KM Variant of Codon Usage Based on KM(VCUKM) Variant of Amino Acid Usage Based on KM(VAAUKM) Variant of Codon Preference Based on KM(VCPKM) Design of a Methodology to Predict Exons and Introns Experimental Results Conclusions Chronic Hepatitis and Cirrhosis Classification Using SNP Data, Decision Tree and Decision Rule Introduction Backgrounds SNP Decision Tree Decision Rule Feature Selection and Methods Problem Description Feature Selection Algorithm Experimental Results Data and Analysis Methods Accuracy of Chronic Hepatitis Accuracy of Cirrhosis Conclusion Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis Introduction Constrained Edit Distance Algorithm Reconstruction of Optimal and Suboptimal Paths Application in Cryptanalysis Experimental Results Conclusion Solving a Practical Examination Timetabling Problem: A Case Study Introduction Problem Definition Objective Function Heuristic for the Examination Timetabling Problem Results Conclusion and Future Work References A Geometric Design of Zone-Picking in a Distribution Warehouse Introduction Problem Description and Design Methods The Proposed Methods Methods for Determining the Items in Each Zone Similarity Coefficients Order-Batching Methods Route Planning Methods Experiments Experimental Results Summary and Conclusions References Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function Introduction Motivation Overview Motivation GA Based Routing Method Design of Genetic Algorithm Genetic Presentation Crossover Selection Mutation Fitness Function Using Fuzzy Logic Fuzzy Rules in Fitness Function Simulation Results Conclusion References A Heuristic Local Search Algorithm for Unsatisfiable Cores Extraction Introduction Related Work Preliminaries Local Search for Unsatisfiable Cores Extraction Some Heuristics in the Algorithm Experimental Results Conclusion ontoX - A Method for Ontology-Driven Information Extraction Introduction Related Work ontoX - An Ontology-Driven IES Requirements The Rule Generation Module The Extraction Module Change Detection Experimental Results Evaluation of Performance Evaluation of Scalability and Portability Evaluation of Change Detection Conclusion and Future Work Improving the Efficiency and Efficacy of the K-means Clustering Algorithm Through a New Convergence Condition Introduction Description of the Standard K-Means Algorithm Related Work Proposed Algorithm Improvement Proposed Improvement for the Standard K-means Algorithm Experimental Results Algorithm Implementation Other Algorithms for Result Comparison Description of the Experiments Results Related to the Number of Iterations Results Related to Solution Quality Conclusions References Modelling Agent Strategies in Simulated Market Using Iterated Prisoner’s Dilemma Introduction The Prisoner’s Dilemma Axelrod’s Computational Tournaments Analysis of Strategies Applications of Prisoner’s Dilemma to Economic Problems The Economy Model Implementation of the Model Strategy Representation Market Competition Simulation Conclusion and Future Works References A Local Search Algorithm for a SAT Representation of Scheduling Problems Introduction The Disjunctive Graph Model Reduced SAT Codification The Local Search Algorithm Example of Assignment of Truth-Values to the SAT Formula Walk Wide Search-SAT Algorithm Experimental Results Conclusions Future Work References A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture Introduction Related Work V2V and V2I Communications A Multi-purpose Communication Infrastructure Protocol Details Managing Context-Aware Information for Road Services Information Management Through Ontology Modeling Ontology Modeling Adapted to the Generation of Context Aware Information in a Large Scale Environment Prototype and Tests Test Car and Road Side Equipment On-Board Software Implementation Inference Performance Conclusions A Survey of Revenue Models for Current Generation Social Software’s Systems Introduction Business Models for Social Software Free Free and Revenue Survey of Different Revenue Models for Social Software Services Open Issues in Social Software Business Models Conclusion References Context-Driven Requirements Analysis Introduction Related Works Context-Aware Systems Context Context-Aware Services Context-Driven Requirement Analyses Requirement Analysis Process Context-Aware Use Case Diagram Context-Switch Diagram Dynamic Service Model Conclusions References Performance Analysis of Child/Descendant Queries in an XML-Enabled Database Introduction Background Child/Descendant XML Query Queries in XED XML Query Optimization Existing Works Current Trends Taxonomy on Child/Descendant Query Sub-tree Queries Text Node Queries Attribute Queries Queries Performance Experiments Experimental Setup and Tool Experimentation Experimental Results Experimental Summary Conclusions and Future Work References Diagonal Data Replication in Grid Environment Introduction Related Work Diagonal Data Replication Algorithms Simulation Design Performance Analysis and Comparison Conclusions References Efficient Shock-Capturing Numerical Schemes Using the Approach of Minimised Integrated Square Difference Error for Hyperbolic Conservation Laws Introduction Shift Condition Runge Kutta Schemes $LW$- $epsilon$ Scheme Fromm's Scheme in 1-D Modified Fromm's Scheme: 1-D Fromm 42-58 $S^{\beta}_{\alpha}$ and 2-D MacCormack Schemes Application of MISDE in 2-D Composite Schemes Cylindrical Explosion for 2D Euler Equation Conclusion Improvement on Real-Time Face Recognition Algorithm Using Representation of Face and Priority Order Matching Introduction Preprocessing Lighting Compensation Color Transformation Face Recognition Algorithm PCA LDA Representation of Face Component Value Priority Order Matching Experiment Result Conclusion Modeling a Legged Robot for Visual Servoing Introduction Direct Aibo Kinematics Legs Degrees of Freedom Head Degrees of Freedom Image Features Feature Jacobian Matrix Inverse Kinematics Experimental Results Conclusion Information Extraction in a Set of Knowledge Using a Fuzzy Logic Based Intelligent Agent Motivations Related Work Mode of Operation Objectives Hierarchic Structure Term Weighting Fuzzy Logic System System Administrator Tests and Results Test Definition Rule Definition Input Definition Conclusions References Efficient Methods in Finding Aggregate Nearest Neighbor by Projection-Based Filtering Introduction Related Works Our Methods $vp$ -ANN Algorithm Projection-Based Pruning Algorithm Experiments Conclusion References On Multicast Routing Based on Route Optimization in Network Mobility Introduction Previous Works Two Basic Multicast Protocols Based on Mobile IP NEMO Basic Support Protocol The RO Scheme Based on Path Control Header Proposed Similar Source-Based Routing Multicast Motivation for Multicasting in NEMO Operation for the Proposed Multicast Scheme Based on PCH Performance Evaluation Conclusion An Effective XML-Based Sensor Data Stream Processing Middleware for Ubiquitous Service Introduction XML-Based Sensor Data Stream Processing Middleware Details of Proposed Middleware Continuous Query Language: XQueryStream Efficient Evaluation of Window Query Hybrid Query Pre-filtering Specifying the Context-Driven Service Experiments Related Work Conclusions and Future Works References Opportunistic Transmission for Wireless Sensor Networks Under Delay Constraints Introduction System Model MAC Protocol Channel Model Traffic Model Binary-Decision Based Transmission Transmission Scheme Markov Decision Process (MDP) Numerical Results and Simulations Optimum Thresholds for BDT Energy Efficiency of 802.11 with BDT Versus Plain 802.11 Throughput of 802.11 with BDT Versus Plain 802.11 Conclusion Workflow-Level Parameter Study Support for Production Grids Introduction The Workflow Concept of P-GRADE Portal The “Black Box” Execution Semantics of Workflow-Level Parameter Study Execution PS-WF Graph Definition Monitoring the PS-WF Graph Execution PS-Labeling Algorithm Related Research Conclusions References Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network Introduction Related Works: Self-initialized Certificate Management Self-initialization Trusted Certificate Chain Certificate Signed by System Private Key Proposed Certificate Issuing Scheme Preliminaries Basic Protocol Other Certificate Management Issues Simulation Simulation Environment Simulation Results: Network Performance Simulation Results: Node Performance Protocol Evaluation Flexibility Network Performance Security Consideration Conclusion XWELL: A XML-Based Workflow Event Logging Mechanism and Language for Workflow Mining Systems Introduction The Overall System Architecture of e-Chautauqua The XML-Based Workflow Event Logging Mechanism and Language Engine's Logging Components The Implementation Details of XWELL Structure of the Mechanism Workflow Events Classification and Language Implications of the Logging Mechanism on Workflow Mining and Rediscovery Conclusions Workcase-Oriented Workflow Enactment Components for Very Large Scale Workflows Introduction The Scope of the Very Large Scale Workflows A Workcase-Oriented Workflow Architecture Components of the Workcase-Oriented Workflow Architecture Major Component Types and Their Relationships Conclusions A Workcase-Based Distributed Workflow Architecture and Its Implementation Using Enterprize Java Beans Framework Introduction Workcase-Based Distributed Workflow Architecture Distribution Factors on Workflow Architectures The Conceptual Architecture Implementation Details Overall System Architecture of e-Chautauqua Implementation of e-Chautauqua System Conclusion Building Web Application Fragments Using Presentation Framework Introduction Purpose Basic Strategies The Model-View-Controller (MVC) Design Pattern JMS Real-Time Messenger Design Pattern Architecture Related Works Conclusion and Future Work Three–Dimensional Bursting Simulation on Two Parallel Systems Introduction Formulation and Numerical Method Simulation Results Parallel Implementation Evaluation of the Parallel Implementation Conclusions and Future Works PAR Reduction Scheme for Efficient Detection of Side Information in OFDM-BLAST System Introduction PAR Definition in MIMO-OFDM Systems Ordinary SLM Simplified SLM Detection of Side Information Examples and Discussions Conclusions Fuzzy PI Controller for Turbojet Engine of Unmanned Aircraft Introduction Turbo Jet Engine System and Fuzzy Inference Control Turbo Jet Engine System Fuzzy Inference Control Simulation Conclusions References Implementation of QoS-Aware Dynamic Multimedia Content Adaptation System Introduction Related Work Multimedia Content Adaptation Framework Adaptation Engine Adaptation Profile User Preference Content Value Model $u$-CVM by the Order of Conversion Implementation Conclusion References Experience of Efficient Data Transformation Solution for PCB Product Automation Introduction Automated Data Transformation System System Architecture Data Error Extraction and Sort Item Information Correction and Addition Coordinates Correction and Layer Separation Test and Performance Estimation Database and Output Comparison to Established System Conclusion Performance Evaluation for Component Retrieval Introduction Component Retrieval System Component Retrieval System Component Analysis Component Viewer Enhanced SARM Component Retrieval Performance Evaluation E-SARM Efficiency Component Reusability Conclusion The Clustering Algorithm of Design Pattern Using Object-Oriented Relationship Introduction Related Work Gamma's Pattern Classification Facet Classification System of GTE Corp Concept Analysis for Pattern Extraction Pattern Clustering Pattern Clustering Process Pattern Clustering Algorithm Performance Conclusion Modeling Parametric Web Arc Weight Measurement Introduction Web-as-a-Graph Approach Structuring the Web Arc Weights Measurements Formulation Case Study Conclusions and Further Researches References Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol Introduction Anti-collision Protocol EPC Class-1 Gen-2 Anti-collision Protocol Analysis Operation Algorithm Numerical Results and Simulations Conclusions Worst-Case Evaluation of Flexible Solutions in Disjunctive Scheduling Problems Introduction Problem Setting Literature Review A Longest Path Formulation of the Problem A Polynomial Algorithm for the Flow-Shop Case Conclusion The Search for a Good Lattice Augmentation Sequence in Three Dimensions Introduction Lattices and Lattice Augmentation Sequences Choice of Seed Lattice Choice of Intermediate Sequences Numerical Examples Concluding Remarks Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods Introduction Proposed Method The Revised Summary of Our Previous Works and Point to Notice Considered Points Simulation Result Fingerprinting Information Detection Collusion Attacks Conclusion References Rendering of Translucent Objects Based Upon PRT Techniques Introduction Related Work Algorithms and Implementation Results and Discussion Conclusion and Future Work An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection Introduction The Proposed Algorithm Human Visual System Watermark Embedding Watermark Extraction Tamper Detection and Localization Threshold Selection Experimental Results Invisibility The Effectiveness of Classification Rule Robustness Fragility and the Localization Property Concluding Remarks References Identification of Fuzzy Set-Based Fuzzy Systems by Means of Data Granulation and Genetic Optimization Introduction Information Granulation (IG) Fuzzy Set-Based Fuzzy Systems by Means of IG Premise Identification Consequence Identification Consecutive Optimization by Means of Genetic Algorithms Genetic Algorithms Objective Function with Weighting Factor Experimental Studies Chaotic Mackey-Glass Time Series Gas Furnace Process Conclusions References Public Key Encryption with Keyword Search Based on K-Resilient IBE Introduction Preliminaries Decisional Diffie-Hellman Hash Functions Public Key Encryption with Keyword Search Security Notions Related to PEKS Handling Multiple Keywords The Strong Relation Between IBE and PEKS Construction of a PEKS from the K-Resilient IBE (KRPEKS) Security of KRPEKS Against CKA Constructing K-Resilient SCF-PEKS Scheme Constructing a K-Resilient PECK Conclusion Efficient Partially Blind Signatures with Provable Security Introduction Notations and Definitions Notations Partially Blind Signatures Security of Partially Blind Signatures Proposed Partially Blind Signatures Partially Blind OR-Schnorr Signature Partially Blind Inverse-Schnorr Signatures Comparison of Partially Blind Signatures Conclusions Study on Grid-Based Special Remotely Sensed Data Processing Node Introduction Architecture of Grid-Based Special Remotely Sensed DataProcessing Node Conception of Grid-Based Special Remotely Sensed Data Processing Node Architecture of Grid-Based Special Remotely Sensed Data Processing Node Node Management and Tasks Scheduling Grid-Based Remote Sensing Meta-module Services Concept of Grid-Based Remote Sensing Meta-module Grid-Based Remotely Sensed Meta-module Service Registry Grid-Based Remotely Sensed Meta-module Service Update Conclusions References Novel Algorithms for Quantum Simulation of 3D Atom-Diatom Reactive Scattering Introduction Schrödinger Equation for Reactive Scattering and Transition $S$-Matrix Elements Coupled-Channel Method and Calculation of $S$-Matrix Elements in Term of Intrinsic Time Etalon Equation Method, Full Wavefunction and $S$-Matrix Elements in Term of Intrinsic Time Conclusion An Algorithm for Rendering Generalized Depth of Field Effects Based on Simulated Heat Diffusion Introduction Motivation for Generalized Depth of Field Limitations of Real Depth of Field Partial Occlusion Background Basic Lens Parameters Circle of Confusion Real Depth of Field Related Work Blur Field Semantics Algorithm Overview Algorithm Details Region Growing Blur Field Extrapolation Blurring a 2D Layer Results: An Example Future Work Conclusion Fingerprint Template Protection Using Fuzzy Vault Introduction Background Fingerprint Verification Protection of Biometric Information Integration of Template Protection with Fingerprint Verification Generation of Protected Templates Fingerprint Verification with the Protected Template Implementation Details and Experimental Results Conclusions References Design and Application of Optimal Path Service System on Multi-level Road Network Introduction System Design System Framework System Server Design System Client Design Application Example Search and Find Service Build Multi-level Road Network Symbolization Setting of Analysis Result Optimal Path Calculation on Multi-level Road Network Conclusion References Spatio-temporal Similarity Measure Algorithm for Moving Objects on Spatial Networks Introduction Related Work Similarity Measures Spatial Similarity Measure Temporal Similarity Measure Spatio-temporal Similarity Measure Trajectory Search Algorithm Performance Analysis Addition-Based Approach Versus Multiplication-Based Approach Our Methods Versus Existing Method Conclusions References Efficient Text Detection in Color Images by Eliminating Reflectance Component Introduction System Overview Determination of Light Environment Eliminating Reflectance Component Based on HomomorphicFiltering Detection of Text in Color Image Experiments and Discussion References Enhanced Non-disjoint Multi-path SourceRouting Protocol for Wireless Ad-Hoc Networks Introduction A Multi-path Routing Protocol The Scheme Using Disjoint Routes A Scheme Using Non-disjoint Routes Extension Approaches Enhanced Non-disjoint Multi-path Source Routing Terminology The Basic Operation Algorithms Performance Evaluations Simulation Environments Performance Analysis Conclusion Author Index