ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computational Science and Its Applications – ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III

دانلود کتاب علوم محاسباتی و کاربردهای آن - ICCSA 2007: کنفرانس بین المللی، کوالالامپور، مالزی، 26-29 اوت 2007. مجموعه مقالات. قسمت سوم

Computational Science and Its Applications – ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III

مشخصات کتاب

Computational Science and Its Applications – ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III

ویرایش: [1 ed.] 
نویسندگان: , , , , ,   
سری: Lecture Notes in Computer Science 4707 : Theoretical Computer Science and General Issues 
ISBN (شابک) : 3540744827, 9783540744825 
ناشر: Springer-Verlag Berlin Heidelberg 
سال نشر: 2007 
تعداد صفحات: 1208
[1228] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 34 Mb 

قیمت کتاب (تومان) : 58,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Computational Science and Its Applications – ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علوم محاسباتی و کاربردهای آن - ICCSA 2007: کنفرانس بین المللی، کوالالامپور، مالزی، 26-29 اوت 2007. مجموعه مقالات. قسمت سوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Title Page
Preface
Organization
Table of Contents – Part III
Framework of Integrated System for the Innovation of Mold Manufacturing Through Process Integration and Collaboration
	Introduction
	Analysis of Mold Manufacturing Process
	Extraction of System Functions
	Design of System Framework
	Prototype of System
	Conclusion
	References
A Study on Automated Design System for a Blow Mould
	Introduction
	Procedure of Making Blow Molding
		SBM Introduction
		Business Process for Blow Mould Production
	Design Approach
	System Implementation
	Conclusion
	References
Development of an Evaluation System of the Informatization Level for the Mould Companies in Korea
	Introduction
	ESMI (Evaluation System of Mould Industry Informatization)
		Information/Network Infrastructure Level
		Mould Manufacturing Information System Level
		Collaboration Level
	A Case Study and Verification of the Model
		Selection of Weight Factors Using the AHP Technique
		Survey
		Reliability and Validity
	Conclusions
	References
Framework of a Collaboration-Based Engineering Service System for Mould Industry
	Introduction
		Changes in the Manufacturing Environment
		SMEs and Internet and Information Technology
		The Necessity of Knowledge Collaboration in Mould Industry
		The Purpose and Organization of This Study
	Significance of e-Engineering Service in Mould Industry
		AS-IS and TO-BE Process of Mould Industry Using IDEF0
	Analysis of Type About e-Engineering Service Trade Method
	Collaborative Agents for e-Engineering Service
	An Example
	Conclusions and Future Works
	References
Meta-modelling Syntax and Semantics of Structural Concepts for Open Networked Enterprises
	Introduction
	Related Work
	The RM-ODP
		The RM-ODP Foundations Part
		The RM-ODP Enterprise Language
	Syntax Domain
	Semantics Domain
	Meaning Function
	Conclusion
	References
Component Specification for Parallel Coupling Infrastructure
	Introduction
	The Parallel Coupling Problem
		Coupled Systems
		Consequences of Distributed-Memory Parallelism
		PCI Requirements
	Software Components and the Common Component Architecture
	PCI Component Toolkit
		Data Model for Coupling
		PCI-Tk Components
	Reference Implementation
	Deployment Examples
	Conclusions
Real-Time Navigation for a Mobile Robot Based on the Autonomous Behavior Agent
	Introduction
	Autonomous Behavior Agent
	Sensing Behavior
	Path Planning and Replanning Behavior
	Obstacle Avoidance Behavior
	Simulation Results
	Conclusions
	References
Concurrent Subsystem-Component Development Model (CSCDM) for Developing Adaptive E-Commerce Systems
	Introduction
	E-Commerce System Architectures and Development Models
	Adaptive Concurrent Subsystem-Component Development Model (CSCDM)
	Case Study: Client-Driven Online System Development for WCE Pizza
	Conclusion
	References
A Quantitative Approach for Ranking Change Risk of Component-Based Software
	Introduction
	Related Work
	CBS and Its Changes
		Description Model for CBS
		Changes in CBS
	Change Risk Analysis
		Change Risk of Single Component
		Change Risk of CBS
	A Case Study
	Concluding Remarks
	References
Relating Software Architecture Views by Using MDA
	Introduction
	Relating SAVs and the Model-Driven Architecture
		Software Architecture Views
		The Model-Driven Architecture and the Software Architecture Views
		Using MDA to Build Relations Among SAVs
		Transformation Process of the Architectural Views Models
	Specifying the Meta-models
		Specification of the Modular View Meta-model
		Specification of the C-C View Meta-model
	Establishing Relations Among the Meta-models
		Identifying Correspondence Relations
		Specification of the Relations Between the Software Views
	Applying Transformation at the Model Level
	Conclusions
	References
Update Propagation Technique for Data Grid
	Introduction
	Replica Consistency in Data Grid
		System Model and Assumption
		The Construction and Maintenance of Update Propagation Grid (UPG)
		Participation of a New Site to UPG
		Maintain the Consistency of UPG
	Update Propagation Techniques
		Push Phase
		Pull Phase
	Performance Analysis
		Average Delay Time
		Average Load Balance
		Communication Cost
	Numerical Result and Comparisons
		Evaluation When K=2
		An Effect of K, Evaluation Where K=2, 3, 4, …, 10
	Conclusion
	References
A Spatiotemporal Database Prototype for Managing Volumetric Surface Movement Data in Virtual GIS
	Introduction
	System Architecture
	Volumetric Surface Movements Spatiotemporal Data Model
	Database System Development
		Database Development
		Data Loading Process
		Data Retrieval Process
	Data Visualization
	Results of Implementation
	Conclusion and Future Works
Query Distributed Ontology over Grid Environment
	Introduction
	Related Work
	Architecture
		Node Architecture
		Web Service in DOFG
		Ontology Virtual Organization
	Query Decomposing, Routing and Processing in DOFG
		RDF Data
		Query Decomposing and Matching
		Query Routing in P2P Networks
		Query processing
	Implementation
	Conclusion and Future Work
	References
CSP Transactors for Asynchronous Transaction LevelModeling and IP Reuse
	Introduction
	Related Work
		Transaction Level Modeling: Synchronous Abstractions
		Synchronous Transactors
		Proposed Improvements to the Synchronous TLM Models
	Asynchronous Transaction Level Modeling
		Asynchronous Abstractions
		Abstraction Properties
	Asynchronous Transactors
		Automatic Translation Between Abstractions
		CSP-Based Transactors
		Interface and Code Template Generators
	RAM IP Demonstrator
	Conclusions
	References
A Robust Real-Time Message Scheduling Scheme Capable of Handling Channel Errors in Wireless Local Area Networks
	Introduction
	Related Works
	Basic Assumptions
		Network and Error Models
		Message Model
	Network Operation
		Bandwidth Management
		Runtime Operation
	Performance Evaluation
	Conclusions
	References
Design and Implementation of a Tour Planning System for Telematics Users
	Introduction
	Related Works
	Information Model
		Data Classification
		Computing Algorithm of the Similarity
	Recommender System
		System Architecture
		Tour Plan Generator
	Performance Measurement
	Conclusion
Ionospheric F-Layer Critical Frequency Estimation from Digital Ionogram Analysis
	Introduction
	Ionogram Data Set
	Proposed Techniques
		Ionogram Enhancement Using Size-Contrast Filtering
		Critical Frequency Estimation
	Experimental Results and Discussion
	Conclusion
	References
Study of Digital License Search for Intellectual Property Rights of S/W Source Code
	Introduction
	Related Works
		DRM Technology
		Necessity of Source Code Protection Technology and Business Model
	Design of Digital License of Software Source Code
		Analyze the Structure of Source Code
		Generation Process of Source Code Digital License
		DOM Child Node Generation
		Pattern Generation of Operator and Input/Output Data Type in Child Node
	Indexer and Search Engine of Digital License
		Index Segments and Incremental Indexing
		Indexer and Search Engine of Digital License
	Simulation of Digital License
		Comparison of Digital License Based on XML vs. S/W Source Code
		Digital License Indexing and Searching
	Conclusion
Creating Numerically Efficient FDTD Simulations Using Generic C++ Programming
	Introduction
	Geometry Components of the Contour-Path FDTD
	Design of the FDTD Simulation in EMTL
		Simulation Stages and Basic Components
		Geometry Analysis Stage
		Separation of Duties: Basic and Specialized Updates
		Optimizing Memory Usage
		Parallelization Strategy
	Implementing Basic FDTD Algorithms as Correctors
	Illustrative Examples and Benchmarks
		Mesh Memory Layout Testing
		Parallel Benchmarks
		Testing Subcell Averaging Methods
	Conclusions
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor
	Introduction
		RFID Security and Privacy Issues
		Summary of the Attributes of the Proposed Protocol
		Organization of the Rest of the Paper
	Related Works
	Mutual Authentication Protocol with Monitor
		Notations Used in Our Protocol
		Basic Assumptions
		The Proposed Protocol
		The Structure of the Database Server
	Security Analysis and Comparison
		Security Analysis
		Security Characteristic Comparison
	Efficiency and Comparison
		Efficiency of Tag
		Efficiency Comparison
	Conclusions
	References
Non-linear Least Squares Features Transformation for Improving the Performance of Probabilistic Neural Networks in Classifying Human Brain Tumors on MRI
	Introduction
	Materials and Methods
		Data Acquisition
		Feature Extraction
		Least Squares Feature Transformation – Probabilistic Neural Network Classifier (LSFT-PNN)
		Feature Selection and System Evaluation
	Results and Discussion
	Conclusion
	References
Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based Simulation
	Introduction
	Real-Time Systems
	Related Work
	Multi-agent Simulation Process
	ARTAS Architecture
	Agent Model
	System Agents Implementation
		Main Agent
		Scheduler Agent
		Queue Agent
		Clock Agent
		Server Agent
		Source Agent
		Packet Agent
	Agents Management
	Conclusions and Future Work
	References
Defining Security Architectural Patterns Based on Viewpoints
	Introduction
	Software Architecture Documentation
	Security Patterns
	Defining Security Viewpoints for Security Architectural Patterns
		Viewpoints Catalogue
	Definition of Security Design Subsystem Viewpoint
	Conclusions
	References
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period
	Introduction
	Review of Hsu-Wu-Wu Scheme
		Secret Share Generation Phase
		Proxy Share Generation Phase
		Proxy Signature Generation Phase
		Proxy Signature Verification Phase
	The Proposed Scheme
		Secret Share Generation Phase
		Proxy Share Generation Phase
		Proxy Signature Generation Phase
		Proxy Signature Verification Phase
	Security Analysis
	Performance Evaluation
	Conclusions
	References
Two-Stage Interval Krawczyk-Schwarz Methods with Applications to Nonlinear Parabolic PDE
	Introduction
	Notation
	Basics
	Method
	Convergence and Enclosure
	Numerical Example
Red-Black EDGSOR Iterative Method Using Triangle Element Approximation for 2D Poisson Equations
	Introduction
	Half-Sweep Finite Element Approximation
	Formulation and implementation of the 4 Point-EDG$SOR$-RB
	Numerical Experiments
	Conclusion
Performance of Particle Swarm Optimization in Scheduling Hybrid Flow-Shops with Multiprocessor Tasks
	Introduction
	The PSO Algorithm
	Computational Results
	Summary
	References
Branch-and-Bound Algorithm for Anycast Flow Assignment in Connection-Oriented Networks
	Introduction
	Anycasting in Connection-Oriented Networks
	Anycast Flow Assignment Problem
	Calculation Scheme
	Lower Bound
	Branching Rules
	Results
	Conclusions
	References
Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks
	Introduction
	Problem Formulation
	Algorithm Description
	Results
	Conclusion and Further Work
	References
An Exact Algorithm for the Minimal Cost Gateways Location, Capacity and Flow Assignment Problem in Two-Level Hierarchical Wide Area Networks
	Introduction
	Problem Formulation
	The Branch and Bound Algorithm
		Branching Rules
		Lower Bound
	Heuristic Algorithm
	Computational Results
	Conclusions
	References
Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream Processor
	Introduction
	QNJ-5
		Stream-Level
		Kernel Level
	Experimental Setup and Performance Evaluation
	Implementation Optimizations
		Kernel Join
		Loop-Carried Stream Reusing
		Stream Transpose
	Discussion
	Conclusion
	References
On Disconnection Node Failure and Stochastic Static Resilience of P2P Communication Networks
	Introduction
	Related Work
	Background
		The Topological Structures
	Fault-Tolerance and Connectivity of P2P Networks
	Calculating the Probability of Disconnection
	Simulation Results
	Conclusions
	References
An Efficient Sequence Alignment Algorithm on a LARPBS
	Introduction
	The LARPBS Model
	The Sequence Alignment Algorithm
		Basic Backgrounds
		The New Formula
		The Sequences Alignment Algorithm on a LARPBS
	Complexity Analysis
	Conclusion
An Effective Unconditionally Stable Algorithm for Dispersive Finite Difference Time Domain Simulations
	Introduction
	Formulation
	Stability Analysis
	Numerical Dispersion Analysis
	Simulation Study
	Conclusion
A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization
	Introduction
	System Model
	Congestion Control Algorithm
	Convergence Analysis
	Simulation Results
	Conclusion and Future Work
	References
3D Bathymetry Reconstruction from Airborne Topsar Polarized Data
	Introduction
	Methodology
		Data Set
		3-D Coastal Water Bathymetry Model
		Volterra Model
		The Fuzzy B-splines Method
	Results and Discussion
	Conclusions
	References
A Parallel FDTD Algorithm for the Solution of Maxwell’s Equations with Nearly PML Absorbing Boundary Conditions
	Introduction
	FDTD Formulations
	NPML Formulation
	Parallelizing Strategy
	Simulation Study
	Conclusion
Application of Modified ICA to Secure Communications in Chaotic Systems
	Introduction
	Proposed Secure Communications System
		Secure Communications Scheme
		Proposed Modified ICA
	Experiment
	Results and Discussion
	Conclusion
	References
Zero Memory Information Sources Approximating to Video Watermarking Attacks
	Introduction
	Model Definition
		Watermarking Attacks as Information Sources
		Pdf Estimation Tools
		Model Specification
	Model Computation
	Model Validation
	Conclusion and Future Work
	References
On Statistical Independence in the Logistic Map: A Guide to Design New Chaotic Sequences Useful in Cryptography
	Introduction
	A Study on Statistical Independence in the Continuous Case
	A Study on Statistical Independence in the Discrete Case
	Constructing New Chaotic Sequences for Enciphering Natural Text
	Conclusions
	References
FVM- and FEM-Solution of Elliptical Boundary Value Problems in Different Coordinate Systems
	Introduction
	Functional Analytical Setting and Numerical Methods
		Finite-Element Method (FEM)
		Finite-Volume Method (FVM)
		Coordinate Transformation of the Boundary Value Problem
	Numerical Examples
	Conclusion
Digital Simulation for Micro Assembly Arranged at Rectangular Pattern in Micro Factory
	Introduction
	Building Micro Factory with Micro Assembly Machines
		Micro Assembly Machine
		Building Digital Micro Factory
		Building Digital Micro Factory Process Model
		Recycling of Micro Assembly Machines
	Simulation
		Simulation of Micro Assembly Machine Process Arrangement
		Process Simulation Result
	Conclusion
	References
A New Quantized Input RLS, QI-RLS, Algorithm
	Introduction
	RLS Algorithm
		Standard RLS Algorithm
		Clipped RLS Algorithm
	The Proposed QI-RLS Algorithm
		Convergence of QI-RLS
		Tracking Performance of QI-RLS
	Experimental Results: Predicting a Noisy Chirp Signal
	Conclusion
	References
Decentralized Replica Exchange Parallel Tempering: An Efficient Implementation of Parallel Tempering Using MPI and SPRNG
	Introduction
	The Parallel Tempering Scheme
	Decentralized Parallel Implementation
		Pseudorandom Number Reproducibility for Global Process Synchronization
		Configuration Exchange or Temperature Exchange in Replica Exchange?
		Neighboring Replica Exchange or Random Replica Exchange?
		Random Number Streams
		Efficient Parallel PT Implementation
		Implementation Analysis
	Computational Results
		Rosenbrock’s Function
		Rugged Funnel-Like Function
	Summary
	References
Approximation Algorithms for 2-Source Minimum Routing Cost k-Tree Problems
	Introduction
	Preliminaries
	A PTAS for the 2-kMRCT Problem
	The 2-kBSRT Problem
	The 2-kBVRT Problem
	Conclusion
On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable Network
	Introduction
	Definitions and Notations
	Using Structural Peculiarities
	Branching by Chain
		Case of k=2
		Case of k>2
	Case Studies
	Conclusion
Linearization of Stream Ciphers by Means of Concatenated Automata
	Introduction
	Fundamentals and Basic Notation
	Structural Properties of Multiplicative Polynomial CA
		Period of the Generated Sequences
		Linear Complexity of the Generated Sequences
		The Number of Different Generated Sequences
	Linear Modelling by Concatenation of Primitive CA
		The Shrinking Generator
		The Class of Clock-Controlled Shrinking Generators
		The Cascade Gollmann Generator
	Conclusions
Effective Quantification of Gene Expression Levels in Microarray Images Using a Spot-Adaptive Compound Clustering-Enhancement-Segmentation Scheme
	Introduction
	Material and Methods
		CES-Scheme
		Evaluation of Extracted Genes Expression Levels
	Results
	Discussion
	References
Biomarker Selection, Employing an Iterative Peak Selection Method, and Prostate Spectra Characterization for Identifying Biomarkers Related to Prostate Cancer
	Introduction
	Materials and Methods
		PAS Pre-processing Stage
		PAS Classification Stage
	Results
	Discussion
	References
Classic Cryptanalysis Applied to Exons and Introns Prediction
	Introduction
	Related Works
	Adaptation of Kasiski Method (KM)
	The Variants of Coding Measures Based on KM
		Variant of Codon Usage Based on KM(VCUKM)
		Variant of Amino Acid Usage Based on KM(VAAUKM)
		Variant of Codon Preference Based on KM(VCPKM)
	Design of a Methodology to Predict Exons and Introns
	Experimental Results
	Conclusions
Chronic Hepatitis and Cirrhosis Classification Using SNP Data, Decision Tree and Decision Rule
	Introduction
	Backgrounds
		SNP
		Decision Tree
		Decision Rule
	Feature Selection and Methods
		Problem Description
		Feature Selection Algorithm
	Experimental Results
		Data and Analysis Methods
		Accuracy of Chronic Hepatitis
		Accuracy of Cirrhosis
	Conclusion
Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis
	Introduction
	Constrained Edit Distance Algorithm
	Reconstruction of Optimal and Suboptimal Paths
	Application in Cryptanalysis
	Experimental Results
	Conclusion
Solving a Practical Examination Timetabling Problem: A Case Study
	Introduction
	Problem Definition
	Objective Function
	Heuristic for the Examination Timetabling Problem
	Results
	Conclusion and Future Work
	References
A Geometric Design of Zone-Picking in a Distribution Warehouse
	Introduction
	Problem Description and Design Methods
	The Proposed Methods
		Methods for Determining the Items in Each Zone
		Similarity Coefficients
		Order-Batching Methods
		Route Planning Methods
	Experiments
	Experimental Results
	Summary and Conclusions
	References
Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function
	Introduction
	Motivation
		Overview
		Motivation
	GA Based Routing Method
	Design of Genetic Algorithm
		Genetic Presentation
		Crossover
		Selection
		Mutation
		Fitness Function Using Fuzzy Logic
	Fuzzy Rules in Fitness Function
	Simulation Results
	Conclusion
	References
A Heuristic Local Search Algorithm for Unsatisfiable Cores Extraction
	Introduction
	Related Work
	Preliminaries
	Local Search for Unsatisfiable Cores Extraction
	Some Heuristics in the Algorithm
	Experimental Results
	Conclusion
ontoX - A Method for Ontology-Driven Information Extraction
	Introduction
	Related Work
	ontoX - An Ontology-Driven IES
		Requirements
		The Rule Generation Module
		The Extraction Module
		Change Detection
	Experimental Results
		Evaluation of Performance
		Evaluation of Scalability and Portability
		Evaluation of Change Detection
	Conclusion and Future Work
Improving the Efficiency and Efficacy of the K-means Clustering Algorithm Through a New Convergence Condition
	Introduction
		Description of the Standard K-Means Algorithm
	Related Work
	Proposed Algorithm Improvement
		Proposed Improvement for the Standard K-means Algorithm
	Experimental Results
		Algorithm Implementation
		Other Algorithms for Result Comparison
		Description of the Experiments
		Results Related to the Number of Iterations
		Results Related to Solution Quality
	Conclusions
	References
Modelling Agent Strategies in Simulated Market Using Iterated Prisoner’s Dilemma
	Introduction
	The Prisoner’s Dilemma
	Axelrod’s Computational Tournaments
	Analysis of Strategies
	Applications of Prisoner’s Dilemma to Economic Problems
	The Economy Model
		Implementation of the Model
		Strategy Representation
	Market Competition Simulation
	Conclusion and Future Works
	References
A Local Search Algorithm for a SAT Representation of Scheduling Problems
	Introduction
	The Disjunctive Graph Model
	Reduced SAT Codification
	The Local Search Algorithm
		Example of Assignment of Truth-Values to the SAT Formula
		Walk Wide Search-SAT Algorithm
	Experimental Results
	Conclusions
	Future Work
	References
A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture
	Introduction
	Related Work
	V2V and V2I Communications
		A Multi-purpose Communication Infrastructure
		Protocol Details
	Managing Context-Aware Information for Road Services
		Information Management Through Ontology Modeling
		Ontology Modeling Adapted to the Generation of Context Aware Information in a Large Scale Environment
	Prototype and Tests
		Test Car and Road Side Equipment
		On-Board Software Implementation
		Inference Performance
	Conclusions
A Survey of Revenue Models for Current Generation Social Software’s Systems
	Introduction
	Business Models for Social Software
		Free
		Free and Revenue
		Survey of Different Revenue Models for Social Software Services
	Open Issues in Social Software Business Models
	Conclusion
	References
Context-Driven Requirements Analysis
	Introduction
	Related Works
	Context-Aware Systems
		Context
		Context-Aware Services
	Context-Driven Requirement Analyses
		Requirement Analysis Process
		Context-Aware Use Case Diagram
		Context-Switch Diagram
		Dynamic Service Model
	Conclusions
	References
Performance Analysis of Child/Descendant Queries in an XML-Enabled Database
	Introduction
	Background
		Child/Descendant XML Query
		Queries in XED
	XML Query Optimization
		Existing Works
		Current Trends
	Taxonomy on Child/Descendant Query
		Sub-tree Queries
		Text Node Queries
		Attribute Queries
	Queries Performance Experiments
		Experimental Setup and Tool
		Experimentation
		Experimental Results
		Experimental Summary
	Conclusions and Future Work
	References
Diagonal Data Replication in Grid Environment
	Introduction
	Related Work
	Diagonal Data Replication Algorithms
	Simulation Design
	Performance Analysis and Comparison
	Conclusions
	References
Efficient Shock-Capturing Numerical Schemes Using the Approach of Minimised Integrated Square Difference Error for Hyperbolic Conservation Laws
	Introduction
	Shift Condition
	Runge Kutta Schemes
	$LW$- $epsilon$  Scheme
	Fromm's Scheme in 1-D
	Modified Fromm's Scheme: 1-D Fromm 42-58
	$S^{\beta}_{\alpha}$  and 2-D MacCormack Schemes
	Application of MISDE in 2-D Composite Schemes
		Cylindrical Explosion for 2D Euler Equation
	Conclusion
Improvement on Real-Time Face Recognition Algorithm Using Representation of Face and Priority Order Matching
	Introduction
	Preprocessing
		Lighting Compensation
		Color Transformation
	Face Recognition Algorithm
		PCA
		LDA
		Representation of Face Component Value
		Priority Order Matching
	Experiment Result
	Conclusion
Modeling a Legged Robot for Visual Servoing
	Introduction
	Direct Aibo Kinematics
		Legs Degrees of Freedom
		Head Degrees of Freedom
		Image Features
		Feature Jacobian Matrix
	Inverse Kinematics
	Experimental Results
	Conclusion
Information Extraction in a Set of Knowledge Using a Fuzzy Logic Based Intelligent Agent
	Motivations
	Related Work
	Mode of Operation
		Objectives
		Hierarchic Structure
		Term Weighting
		Fuzzy Logic System
		System Administrator
	Tests and Results
		Test Definition
		Rule Definition
		Input Definition
	Conclusions
	References
Efficient Methods in Finding Aggregate Nearest Neighbor by Projection-Based Filtering
	Introduction
	Related Works
	Our Methods
		$vp$ -ANN Algorithm
		Projection-Based Pruning Algorithm
	Experiments
	Conclusion
	References
On Multicast Routing Based on Route Optimization in Network Mobility
	Introduction
	Previous Works
		Two Basic Multicast Protocols Based on Mobile IP
		NEMO Basic Support Protocol
		The RO Scheme Based on Path Control Header
	Proposed Similar Source-Based Routing Multicast
		Motivation for Multicasting in NEMO
		Operation for the Proposed Multicast Scheme Based on PCH
	Performance Evaluation
	Conclusion
An Effective XML-Based Sensor Data Stream Processing Middleware for Ubiquitous Service
	Introduction
	XML-Based Sensor Data Stream Processing Middleware
	Details of Proposed Middleware
		Continuous Query Language: XQueryStream
		Efficient Evaluation of Window Query
		Hybrid Query
		Pre-filtering
		Specifying the Context-Driven Service
	Experiments
	Related Work
	Conclusions and Future Works
	References
Opportunistic Transmission for Wireless Sensor Networks Under Delay Constraints
	Introduction
	System Model
		MAC Protocol
		Channel Model
		Traffic Model
	Binary-Decision Based Transmission
		Transmission Scheme
		Markov Decision Process (MDP)
	Numerical Results and Simulations
		Optimum Thresholds for BDT
		Energy Efficiency of 802.11 with BDT Versus Plain 802.11
		Throughput of 802.11 with BDT Versus Plain 802.11
	Conclusion
Workflow-Level Parameter Study Support for Production Grids
	Introduction
	The Workflow Concept of P-GRADE Portal
	The “Black Box” Execution Semantics of Workflow-Level Parameter Study Execution
		PS-WF Graph Definition
		Monitoring the PS-WF Graph Execution
	PS-Labeling Algorithm
	Related Research
	Conclusions
	References
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network
	Introduction
	Related Works: Self-initialized Certificate Management
		Self-initialization
		Trusted Certificate Chain
		Certificate Signed by System Private Key
	Proposed Certificate Issuing Scheme
		Preliminaries
		Basic Protocol
		Other Certificate Management Issues
	Simulation
		Simulation Environment
		Simulation Results: Network Performance
		Simulation Results: Node Performance
	Protocol Evaluation
		Flexibility
		Network Performance
		Security Consideration
	Conclusion
XWELL: A XML-Based Workflow Event Logging Mechanism and Language for Workflow Mining Systems
	Introduction
	The Overall System Architecture of e-Chautauqua
	The XML-Based Workflow Event Logging Mechanism and Language
		Engine's Logging Components
		The Implementation Details of XWELL
		Structure of the Mechanism
		Workflow Events Classification and Language
	Implications of the Logging Mechanism on Workflow Mining and Rediscovery
	Conclusions
Workcase-Oriented Workflow Enactment Components for Very Large Scale Workflows
	Introduction
	The Scope of the Very Large Scale Workflows
	A Workcase-Oriented Workflow Architecture
	Components of the Workcase-Oriented Workflow Architecture
		Major Component Types and Their Relationships
	Conclusions
A Workcase-Based Distributed Workflow Architecture and Its Implementation Using Enterprize Java Beans Framework
	Introduction
	Workcase-Based Distributed Workflow Architecture
		Distribution Factors on Workflow Architectures
		The Conceptual Architecture
	Implementation Details
		Overall System Architecture of e-Chautauqua
		Implementation of e-Chautauqua System
	Conclusion
Building Web Application Fragments Using Presentation Framework
	Introduction
	Purpose
	Basic Strategies
		The Model-View-Controller (MVC) Design Pattern
		JMS
		Real-Time Messenger Design Pattern
	Architecture
	Related Works
	Conclusion and Future Work
Three–Dimensional Bursting Simulation on Two Parallel Systems
	Introduction
	Formulation and Numerical Method
		Simulation Results
	Parallel Implementation
	Evaluation of the Parallel Implementation
	Conclusions and Future Works
PAR Reduction Scheme for Efficient Detection of Side Information in OFDM-BLAST System
	Introduction
	PAR Definition in MIMO-OFDM Systems
	Ordinary SLM
	Simplified SLM
	Detection of Side Information
	Examples and Discussions
	Conclusions
Fuzzy PI Controller for Turbojet Engine of Unmanned Aircraft
	Introduction
	Turbo Jet Engine System and Fuzzy Inference Control
		Turbo Jet Engine System
		Fuzzy Inference Control
	Simulation
	Conclusions
	References
Implementation of QoS-Aware Dynamic Multimedia Content Adaptation System
	Introduction
	Related Work
	Multimedia Content Adaptation Framework
		Adaptation Engine
		Adaptation Profile
	User Preference Content Value Model
		$u$-CVM by the Order of Conversion
	Implementation
	Conclusion
	References
Experience of Efficient Data Transformation Solution for PCB Product Automation
	Introduction
	Automated Data Transformation System
		System Architecture
		Data Error Extraction and Sort
		Item Information Correction and Addition
		Coordinates Correction and Layer Separation
	Test and Performance Estimation
		Database and Output
		Comparison to Established System
	Conclusion
Performance Evaluation for Component Retrieval
	Introduction
	Component Retrieval System
		Component Retrieval System
		Component Analysis
		Component Viewer
		Enhanced SARM
		Component Retrieval
	Performance Evaluation
		E-SARM Efficiency
		Component Reusability
	Conclusion
The Clustering Algorithm of Design Pattern Using Object-Oriented Relationship
	Introduction
	Related Work
		Gamma's Pattern Classification
		Facet Classification System of GTE Corp
		Concept Analysis for Pattern Extraction
	Pattern Clustering
		Pattern Clustering Process
		Pattern Clustering Algorithm
	Performance
	Conclusion
Modeling Parametric Web Arc Weight Measurement
	Introduction
	Web-as-a-Graph Approach
	Structuring the Web
		Arc Weights Measurements
		Formulation
	Case Study
	Conclusions and Further Researches
	References
Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol
	Introduction
	Anti-collision Protocol
		EPC Class-1 Gen-2 Anti-collision Protocol
		Analysis
		Operation Algorithm
	Numerical Results and Simulations
	Conclusions
Worst-Case Evaluation of Flexible Solutions in Disjunctive Scheduling Problems
	Introduction
	Problem Setting
	Literature Review
	A Longest Path Formulation of the Problem
	A Polynomial Algorithm for the Flow-Shop Case
	Conclusion
The Search for a Good Lattice Augmentation Sequence in Three Dimensions
	Introduction
	Lattices and Lattice Augmentation Sequences
	Choice of Seed Lattice
	Choice of Intermediate Sequences
	Numerical Examples
	Concluding Remarks
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
	Introduction
	Proposed Method
		The Revised Summary of Our Previous Works and Point to Notice
		Considered Points
	Simulation Result
		Fingerprinting Information Detection
		Collusion Attacks
	Conclusion
	References
Rendering of Translucent Objects Based Upon PRT Techniques
	Introduction
	Related Work
	Algorithms and Implementation
	Results and Discussion
	Conclusion and Future Work
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection
	Introduction
	The Proposed Algorithm
		Human Visual System
		Watermark Embedding
		Watermark Extraction
		Tamper Detection and Localization
		Threshold Selection
	Experimental Results
		Invisibility
		The Effectiveness of Classification Rule
		Robustness
		Fragility and the Localization Property
	Concluding Remarks
	References
Identification of Fuzzy Set-Based Fuzzy Systems by Means of Data Granulation and Genetic Optimization
	Introduction
	Information Granulation (IG)
	Fuzzy Set-Based Fuzzy Systems by Means of IG
		Premise Identification
		Consequence Identification
	Consecutive Optimization by Means of Genetic Algorithms
		Genetic Algorithms
		Objective Function with Weighting Factor
	Experimental Studies
		Chaotic Mackey-Glass Time Series
		Gas Furnace Process
	Conclusions
	References
Public Key Encryption with Keyword Search Based on K-Resilient IBE
	Introduction
	Preliminaries
		Decisional Diffie-Hellman
		Hash Functions
	Public Key Encryption with Keyword Search
		Security Notions Related to PEKS
		Handling Multiple Keywords
		The Strong Relation Between IBE and PEKS
		Construction of a PEKS from the K-Resilient IBE (KRPEKS)
		Security of KRPEKS Against CKA
		Constructing K-Resilient SCF-PEKS Scheme
		Constructing a K-Resilient PECK
	Conclusion
Efficient Partially Blind Signatures with Provable Security
	Introduction
	Notations and Definitions
		Notations
		Partially Blind Signatures
		Security of Partially Blind Signatures
	Proposed Partially Blind Signatures
		Partially Blind OR-Schnorr Signature
		Partially Blind Inverse-Schnorr Signatures
		Comparison of Partially Blind Signatures
	Conclusions
Study on Grid-Based Special Remotely Sensed Data Processing Node
	Introduction
	Architecture of Grid-Based Special Remotely Sensed DataProcessing Node
		Conception of Grid-Based Special Remotely Sensed Data Processing Node
		Architecture of Grid-Based Special Remotely Sensed Data Processing Node
	Node Management and Tasks Scheduling
	Grid-Based Remote Sensing Meta-module Services
		Concept of Grid-Based Remote Sensing Meta-module
		Grid-Based Remotely Sensed Meta-module Service Registry
		Grid-Based Remotely Sensed Meta-module Service Update
	Conclusions
	References
Novel Algorithms for Quantum Simulation of 3D Atom-Diatom Reactive Scattering
	Introduction
	Schrödinger Equation for Reactive Scattering and Transition $S$-Matrix Elements
	Coupled-Channel Method and Calculation of $S$-Matrix Elements in Term of Intrinsic Time
	Etalon Equation Method, Full Wavefunction and $S$-Matrix Elements in Term of Intrinsic Time
	Conclusion
An Algorithm for Rendering Generalized Depth of Field Effects Based on Simulated Heat Diffusion
	Introduction
	Motivation for Generalized Depth of Field
		Limitations of Real Depth of Field
		Partial Occlusion
	Background
		Basic Lens Parameters
		Circle of Confusion
		Real Depth of Field
	Related Work
	Blur Field Semantics
	Algorithm Overview
	Algorithm Details
		Region Growing
		Blur Field Extrapolation
		Blurring a 2D Layer
	Results: An Example
	Future Work
	Conclusion
Fingerprint Template Protection Using Fuzzy Vault
	Introduction
	Background
		Fingerprint Verification
		Protection of Biometric Information
	Integration of Template Protection with Fingerprint Verification
		Generation of Protected Templates
		Fingerprint Verification with the Protected Template
	Implementation Details and Experimental Results
	Conclusions
	References
Design and Application of Optimal Path Service System on Multi-level Road Network
	Introduction
	System Design
	System Framework
		System Server Design
		System Client Design
	Application Example
		Search and Find Service
		Build Multi-level Road Network
		Symbolization Setting of Analysis Result
		Optimal Path Calculation on Multi-level Road Network
	Conclusion
	References
Spatio-temporal Similarity Measure Algorithm for Moving Objects on Spatial Networks
	Introduction
	Related Work
	Similarity Measures
		Spatial Similarity Measure
		Temporal Similarity Measure
		Spatio-temporal Similarity Measure
		Trajectory Search Algorithm
	Performance Analysis
		Addition-Based Approach Versus Multiplication-Based Approach
		Our Methods Versus Existing Method
	Conclusions
	References
Efficient Text Detection in Color Images by Eliminating Reflectance Component
	Introduction
	System Overview
	Determination of Light Environment
	Eliminating Reflectance Component Based on HomomorphicFiltering
	Detection of Text in Color Image
	Experiments and Discussion
	References
Enhanced Non-disjoint Multi-path SourceRouting Protocol for Wireless Ad-Hoc Networks
	Introduction
	A Multi-path Routing Protocol
		The Scheme Using Disjoint Routes
		A Scheme Using Non-disjoint Routes
	Extension Approaches
	Enhanced Non-disjoint Multi-path Source Routing
		Terminology
		The Basic Operation
		Algorithms
	Performance Evaluations
		Simulation Environments
		Performance Analysis
	Conclusion
Author Index




نظرات کاربران