default search action
ICCSA 2007: Kuala Lumpur, Malaysia
- Osvaldo Gervasi, Marina L. Gavrilova:
Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III. Lecture Notes in Computer Science 4707, Springer 2007, ISBN 978-3-540-74482-5
Workshop on CAD/CAM and Web Based Collaboration (CADCAM 07)
- Bo Hyun Kim, Sung Bum Park, Gyu-Bong Lee, So Young Chung:
Framework of Integrated System for the Innovation of Mold Manufacturing Through Process Integration and Collaboration. 1-10 - Yong Ju Cho, Kwang Yeol Ryu, Seok Woo Lee:
A Study on Automated Design System for a Blow Mould. 11-19 - Yong Ju Cho, Sung Hee Lee:
Development of an Evaluation System of the Informatization Level for the Mould Companies in Korea. 20-32 - Chang Ho Lee, Yong Ju Cho:
Framework of a Collaboration-Based Engineering Service System for Mould Industry. 33-44
Workshop on Component Based Software Engineering and Software Process Model (CBSE 07)
- Mohamed Bouhdadi, Youssef Balouki, El maati Chabbar:
Meta-modelling Syntax and Semantics of Structural Concepts for Open Networked Enterprises. 45-54 - Jay Walter Larson, Boyana Norris:
Component Specification for Parallel Coupling Infrastructure. 55-68 - Lu Xu, Liguo Zhang, Yangzhou Chen:
Real-Time Navigation for a Mobile Robot Based on the Autonomous Behavior Agent. 69-80 - Liangtie Dai, Wanwu Guo:
Concurrent Subsystem-Component Development Model (CSCDM) for Developing Adaptive E-Commerce Systems. 81-91 - Chengying Mao:
A Quantitative Approach for Ranking Change Risk of Component-Based Software. 92-103 - Rogelio N. Limón Cordero, Isidro Ramos Salavert:
Relating Software Architecture Views by Using MDA. 104-114
Workshop on Distributed Data and Storage System Managemnt (DDSM 07)
- Mohammed Radi, Ali Mamat, Mustafa Mat Deris, Hamidah Ibrahim, Subramaniam Shamala:
Update Propagation Technique for Data Grid. 115-127 - Mohd Shafry Mohd Rahim, Abdul Rashid Mohamed Shariff, Shattri Mansor, Ahmad Rodzi Mahmud, Daut Daman:
A Spatiotemporal Database Prototype for Managing Volumetric Surface Movement Data in Virtual GIS. 128-139 - Ngot Phu Bui, SeungGwan Lee, TaeChoong Chung:
Query Distributed Ontology over Grid Environment. 140-153
Workshop on Embedded Systems for Ubiquitous Computing (ESUC 07)
- Lilian Janin, Doug Edwards:
CSP Transactors for Asynchronous Transaction Level Modeling and IP Reuse. 154-168 - Junghoon Lee, Mikyung Kang, Gyung-Leen Park, In-Hye Shin, Hanil Kim, Sang-Wook Kim:
A Robust Real-Time Message Scheduling Scheme Capable of Handling Channel Errors in Wireless Local Area Networks. 169-178 - Junghoon Lee, Eui-young Kang, Gyung-Leen Park:
Design and Implementation of a Tour Planning System for Telematics Users. 179-189
General Track
- Nipon Theera-Umpon:
Ionospheric F-Layer Critical Frequency Estimation from Digital Ionogram Analysis. 190-200 - ByungRae Cha, Kyungjun Kim, Dongseob Lee:
Study of Digital License Search for Intellectual Property Rights of S/W Source Code. 201-212 - Ilya Valuev, Alexei Deinega, A. Knizhnik, B. Potapkin:
Creating Numerically Efficient FDTD Simulations Using Generic C++ Programming. 213-226 - Song Han, Vidyasagar M. Potdar, Elizabeth Chang:
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. 227-238 - Pantelis Georgiadis, Dionisis A. Cavouras, Ioannis Kalatzis, Antonis Daskalakis, George C. Kagadis, Koralia Sifaki, Menelaos Malamas, George Nikiforidis, Ekaterini Solomou:
Non-linear Least Squares Features Transformation for Improving the Performance of Probabilistic Neural Networks in Classifying Human Brain Tumors on MRI. 239-247 - Moutaz Saleh Mustafa, Zulaiha Ali Othman:
Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based Simulation. 248-261 - David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Defining Security Architectural Patterns Based on Viewpoints. 262-272 - Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li:
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. 273-284 - Hartmut Schwandt:
Two-Stage Interval Krawczyk-Schwarz Methods with Applications to Nonlinear Parabolic PDE. 285-297 - Jumat Sulaiman, Mohamed Othman, Mohammad Khatim Hasan:
Red-Black EDG SOR Iterative Method Using Triangle Element Approximation for 2D Poisson Equations. 298-308 - Muhammet Fikret Ercan, Yu-Fai Fung:
Performance of Particle Swarm Optimization in Scheduling Hybrid Flow-Shops with Multiprocessor Tasks. 309-318 - Krzysztof Walkowiak:
Branch-and-Bound Algorithm for Anycast Flow Assignment in Connection-Oriented Networks. 319-329 - Michal Przewozniczek, Krzysztof Walkowiak:
Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks. 330-342 - Przemyslaw Ryba, Andrzej Kasprzak:
An Exact Algorithm for the Minimal Cost Gateways Location, Capacity and Flow Assignment Problem in Two-Level Hierarchical Wide Area Networks. 343-352 - Ying Zhang, Gen Li, Xuejun Yang:
Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream Processor. 353-366 - Farshad Safaei, Mahmood Fathy, Ahmad Khonsari, N. Talebanfard:
On Disconnection Node Failure and Stochastic Static Resilience of P2P Communication Networks. 367-378 - David Semé, Sidney Youlou:
An Efficient Sequence Alignment Algorithm on a LARPBS. 379-387 - Omar Ramadan:
An Effective Unconditionally Stable Algorithm for Dispersive Finite Difference Time Domain Simulations. 388-397 - Mohammad Sadegh Talebi, Fahimeh Jafari, Ahmad Khonsari, Mohammad Hossien Yaghmaee:
A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization. 398-409 - Maged Marghany, Mazlan Hashim, Arthur P. Cracknell:
3D Bathymetry Reconstruction from Airborne Topsar Polarized Data. 410-420 - Omar Ramadan:
A Parallel FDTD Algorithm for the Solution of Maxwell's Equations with Nearly PML Absorbing Boundary Conditions. 421-430 - Shih-Lin Lin, Pi-Cheng Tung:
Application of Modified ICA to Secure Communications in Chaotic Systems. 431-444 - Mihai Mitrea, Octavian Dumitru, Françoise J. Prêteux, Adriana Vlad:
Zero Memory Information Sources Approximating to Video Watermarking Attacks. 445-459 - Adriana Vlad, Adrian Luca, Bogdan Badea:
On Statistical Independence in the Logistic Map: A Guide to Design New Chaotic Sequences Useful in Cryptography. 460-474 - Günter Bärwolff:
FVM- and FEM-Solution of Elliptical Boundary Value Problems in Different Coordinate Systems. 475-485 - Murali Subramaniyam, Sangho Park, Sung-il Choi, Seokho Jang, Joon-Yub Song:
Digital Simulation for Micro Assembly Arranged at Rectangular Pattern in Micro Factory. 486-494 - Ali Amiri, Mahmood Fathy, Mahmood Amintoosi, Hadi Sadoghi Yazdi:
A New Quantized Input RLS, QI-RLS, Algorithm. 495-506 - Yaohang Li, Michael Mascagni, Andrey Gorin:
Decentralized Replica Exchange Parallel Tempering: An Efficient Implementation of Parallel Tempering Using MPI and SPRNG. 507-519 - Yen Hung Chen, Gwo-Liang Liao, Chuan Yi Tang:
Approximation Algorithms for 2-Source Minimum Routing Cost k -Tree Problems. 520-533 - Alexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo:
On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable Network. 534-543 - Amparo Fúster-Sabater, Pino Caballero-Gil:
Linearization of Stream Ciphers by Means of Concatenated Automata. 544-554 - Antonis Daskalakis, Dionisis A. Cavouras, Panagiotis Bougioukos, Spiros Kostopoulos, Pantelis Georgiadis, Ioannis Kalatzis, George C. Kagadis, George Nikiforidis:
Effective Quantification of Gene Expression Levels in Microarray Images Using a Spot-Adaptive Compound Clustering-Enhancement-Segmentation Scheme. 555-565 - Panagiotis Bougioukos, Dionisis A. Cavouras, Antonis Daskalakis, Ioannis Kalatzis, George Nikiforidis, Anastasios Bezerianos:
Biomarker Selection, Employing an Iterative Peak Selection Method, and Prostate Spectra Characterization for Identifying Biomarkers Related to Prostate Cancer. 566-574 - Manuel Aguilar R., Héctor J. Fraire H., Laura Cruz Reyes, Juan Javier González Barbosa, Graciela Mora Guadalupe Castilla V., Claudia Gómez Santillán:
Classic Cryptanalysis Applied to Exons and Introns Prediction. 575-584 - Dong Hoi Kim, Saangyong Uhmn, Young Woong Ko, Sung Won Cho, Jae Youn Cheong, Jin Kim:
Chronic Hepatitis and Cirrhosis Classification Using SNP Data, Decision Tree and Decision Rule. 585-596 - Slobodan Petrovic, Amparo Fúster-Sabater:
Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis. 597-610 - Masri Ayob, Ariff Md. Ab. Malik, Salwani Abdullah, Abdul Razak Hamdan, Graham Kendall, Rong Qu:
Solving a Practical Examination Timetabling Problem: A Case Study. 611-624 - Ying-Chin Ho, Hui-Ming Wee, Hsiao Ching Chen:
A Geometric Design of Zone-Picking in a Distribution Warehouse. 625-636 - Jin Myoung Kim, Tae Ho Cho:
Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. 637-648 - Jianmin Zhang, ShengYu Shen, Sikun Li:
A Heuristic Local Search Algorithm for Unsatisfiable Cores Extraction. 649-659 - Burcu Yildiz, Silvia Miksch:
ontoX - A Method for Ontology-Driven Information Extraction. 660-673 - Joaquín Pérez Ortega, Rodolfo A. Pazos Rangel, Laura Cruz Reyes, Gerardo Reyes Salgado, Rosy Basave T., Héctor J. Fraire H.:
Improving the Efficiency and Efficacy of the K-means Clustering Algorithm Through a New Convergence Condition. 674-682 - Raymond Chiong:
Modelling Agent Strategies in Simulated Market Using Iterated Prisoner's Dilemma. 683-696 - Marco Antonio Cruz-Chavez, Rafael Rivera-López:
A Local Search Algorithm for a SAT Representation of Scheduling Problems. 697-709 - José Santa, Andrés Muñoz, Antonio Fernandez Gómez-Skarmeta:
A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture. 710-723 - Kevin Chai, Vidyasagar M. Potdar, Elizabeth Chang:
A Survey of Revenue Models for Current Generation Social Software's Systems. 724-738 - Jongmyung Choi:
Context-Driven Requirements Analysis. 739-748 - Eric Pardede, J. Wenny Rahayu, David Taniar, Ramanpreet Kaur Aujla:
Performance Analysis of Child/Descendant Queries in an XML-Enabled Database. 749-762 - Rohaya Latip, Hamidah Ibrahim, Mohamed Othman, Md Nasir Sulaiman, Azizol Abdullah:
Diagonal Data Replication in Grid Environment. 763-773 - Appanah Rao Appadu, Muhammad Zaid Dauhoo, S. D. D. V. Rughooputh:
Efficient Shock-Capturing Numerical Schemes Using the Approach of Minimised Integrated Square Difference Error for Hyperbolic Conservation Laws. 774-789 - Tae-Eun Kim, Chin Hyun Chung, Jin Ok Kim:
Improvement on Real-Time Face Recognition Algorithm Using Representation of Face and Priority Order Matching. 790-797 - Zelmar Echegoyen, Alicia D'Anjou, Manuel Graña:
Modeling a Legged Robot for Visual Servoing. 798-810 - Jorge Ropero, Ariel Gómez, Carlos León, Alejandro Carrasco:
Information Extraction in a Set of Knowledge Using a Fuzzy Logic Based Intelligent Agent. 811-820 - Yanmin Luo, Hanxiong Chen, Kazutaka Furuse, Nobuo Ohbo:
Efficient Methods in Finding Aggregate Nearest Neighbor by Projection-Based Filtering. 821-833 - Jong-Ki Kim, Kisoeb Park, Moonseong Kim:
On Multicast Routing Based on Route Optimization in Network Mobility. 834-843 - Hun-Soon Lee, Seung-Il Jin:
An Effective XML-Based Sensor Data Stream Processing Middleware for Ubiquitous Service. 844-857 - Ca Van Phan, Kikyung Baek, Jeong Geun Kim:
Opportunistic Transmission for Wireless Sensor Networks Under Delay Constraints. 858-871 - Péter Kacsuk, Zoltán Farkas, Gabor Hermann:
Workflow-Level Parameter Study Support for Production Grids. 872-885 - Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim:
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. 886-899 - Min-Jae Park, Kwanghoon Pio Kim:
XWELL: A XML-Based Workflow Event Logging Mechanism and Language for Workflow Mining Systems. 900-909 - Jae-Kang Won, Kwanghoon Pio Kim:
Workcase-Oriented Workflow Enactment Components for Very Large Scale Workflows. 910-919 - Hyung-Jin Ahn, Kwanghoon Pio Kim:
A Workcase-Based Distributed Workflow Architecture and Its Implementation Using Enterprize Java Beans Framework. 920-928 - Junghwa Chae:
Building Web Application Fragments Using Presentation Framework. 929-940 - Siham Tabik, Luis F. Romero, Ester M. Garzón, Inmaculada García, Juan I. Ramos:
Three-Dimensional Bursting Simulation on Two Parallel Systems. 941-949 - Myung-Sun Baek, Sang-Tae Kim, Young-Hwan You, Hyoung-Kyu Song:
PAR Reduction Scheme for Efficient Detection of Side Information in OFDM-BLAST System. 950-957 - Min Seok Jie, Eun Jong Mo, Kang Woong Lee:
Fuzzy PI Controller for Turbojet Engine of Unmanned Aircraft. 958-967 - SooCheol Lee, Daesub Yoon, Oh-Cheon Kwon, Eenjun Hwang:
Implementation of QoS-Aware Dynamic Multimedia Content Adaptation System. 968-977 - Jung-Soo Han, Gui-Jung Kim:
Experience of Efficient Data Transformation Solution for PCB Product Automation. 978-986 - Jung-Soo Han:
Performance Evaluation for Component Retrieval. 987-996 - Gui-Jung Kim, Jung-Soo Han:
The Clustering Algorithm of Design Pattern Using Object-Oriented Relationship. 997-1006 - Wookey Lee, Seungkil Lim, Taesoo Lim:
Modeling Parametric Web Arc Weight Measurement. 1007-1016 - Jeong Geun Kim, Woo Jin Shin, Ji Ho Yoo:
Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol. 1017-1026 - Mohamed Ali Aloulou, Christian Artigues:
Worst-Case Evaluation of Flexible Solutions in Disjunctive Scheduling Problems. 1027-1036 - Tiancheng Li, Ian Robinson:
The Search for a Good Lattice Augmentation Sequence in Three Dimensions. 1037-1045 - Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi:
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods. 1046-1055 - Jiawan Zhang, Yang Gao, Jizhou Sun, Zhou Jin:
Rendering of Translucent Objects Based Upon PRT Techniques. 1056-1065 - Hengfu Yang, Xingming Sun, Bin Wang, Zheng Qin:
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. 1066-1075 - Keon-Jun Park, Sung-Kwun Oh, Hyun-Ki Kim, Witold Pedrycz, Seong-Whan Jang:
Identification of Fuzzy Set-Based Fuzzy Systems by Means of Data Granulation and Genetic Optimization. 1076-1085 - Dalia Khader:
Public Key Encryption with Keyword Search Based on K-Resilient IBE. 1086-1095 - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. 1096-1105 - Jianqin Wang, Yong Xue, Yincui Hu, Chaolin Wu, Jianping Guo, Lei Zheng, Ying Luo, Ruizhi Sun, Guangli Liu, YunLing Liu:
Study on Grid-Based Special Remotely Sensed Data Processing Node. 1106-1113 - Ashot Gevorkyan, Gabriel G. Balint-Kurti, Alexander V. Bogdanov, Gunnar Nyman:
Novel Algorithms for Quantum Simulation of 3 D Atom-Diatom Reactive Scattering. 1114-1123 - Todd J. Kosloff, Brian A. Barsky:
An Algorithm for Rendering Generalized Depth of Field Effects Based on Simulated Heat Diffusion. 1124-1140 - Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi:
Fingerprint Template Protection Using Fuzzy Vault. 1141-1151 - Yumin Chen, Jianya Gong, Chenchen Wu:
Design and Application of Optimal Path Service System on Multi-level Road Network. 1152-1164 - Jae-Woo Chang, Rabindra Bista, Young-Chang Kim, Yong-Ki Kim:
Spatio-temporal Similarity Measure Algorithm for Moving Objects on Spatial Networks. 1165-1178 - Mi Young Choi, Hyung-Il Choi:
Efficient Text Detection in Color Images by Eliminating Reflectance Component. 1179-1186 - Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom:
Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. 1187-1196
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.