


default search action
ICCSA 2006: Glasgow, UK
- Marina L. Gavrilova, Osvaldo Gervasi, Vipin Kumar, Chih Jeng Kenneth Tan, David Taniar, Antonio Laganà, Youngsong Mun, Hyunseung Choo:

Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III. Lecture Notes in Computer Science 3982, Springer 2006, ISBN 3-540-34075-0
Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)
- Shoichi Morimoto, Daisuke Horie, Jingde Cheng:

A Security Requirement Management Database Based on ISO/IEC 15408. 1-10 - A. Sermet Anagun:

Development of Committee Neural Network for Computer Access Security System. 11-20 - Byeongchang Kim, Gary Geunbae Lee:

C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model. 21-30 - Eung Soo Kim, Min Sung Kim:

Design and Fabrication of Security and Home Automation System. 31-37 - Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim:

PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. 38-47 - ManKi Ahn, Hoon-Jae Lee:

Experiments and Hardware Countermeasures on Power Analysis Attacks. 48-53 - InJung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won:

Information System Modeling for Analysis of Propagation Effects and Levels of Damage. 54-63 - Youngrag Kim, JaeYoun Jung, Seunghwan Lee, Chonggun Kim:

A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks. 64-72 - SeongKwon Cheon, Dongxue Jin, ChongGun Kim:

A VLSM Address Management Method for Variable IP Subnetting. 73-83 - Haeng-Kon Kim, Sang-Yong Byun:

SDSEM: Software Development Success Evolution Model. 84-92 - Mary Wu, Sangjoon Jung, Seunghwan Lee, Chonggun Kim:

A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks. 93-103 - Hae Geun Kim:

Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications. 104-114 - Kyung-Hoon Jung, Seok-Cheol Lee, Hyun-Suk Hwang, Chang Soo Kim:

The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks. 115-124 - Hyun-Suk Hwang, Kyoo-Seok Park, Chang Soo Kim:

Ontology-Based Information Search in the Real World Using Web Services. 125-133 - Tae Young Byun, Min-Su Kim, Sung-Ho Hwang, Sung-Eok Jeon:

An Active Node Set Maintenance Scheme for Distributed Sensor Networks. 134-143 - Subong Yi, Bobby D. Gerardo

, Young-Seok Lee, Jaewan Lee:
Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment. 144-153 - Misun Kim, Minsoo Kim, Jae-Hyun Seo:

Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector. 154-162 - Haeng-Kon Kim:

Applying Product Line to the Embedded Systems. 163-171 - Kwang-Baek Kim, Byung-Kwan Lee, Soon-Ho Kim:

Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold. 172-177 - Romeo Mark A. Mateo, Jaewan Lee, Hyunho Yang:

Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents. 178-187 - Hyung-Su Jeon, Hye-Min Noh, Cheol-Jung Yoo, Ok-Bae Chang:

Design of H.264/AVC-Based Software Decoder for Mobile Phone. 188-197 - Haeng-Kon Kim, Youn-Ky Chung:

Transforming a Legacy System into Components. 198-205 - Injoo Jang, Hyeong Seon Yoo:

Pseudorandom Number Generator Using Optimal Normal Basis. 206-212 - Wenbo Shi, Hyeong Seon Yoo:

Efficient Nonce-Based Authentication Scheme Using Token-Update. 213-221 - Seong-Man Choi, Cheol-Jung Yoo, Ok-Bae Chang:

An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool. 222-233 - Sangjoon Jung, Chonggun Kim, Younky Chung:

A Prediction Method of Network Traffic Using Time Series Models. 234-243 - Youngchul Bae, Malrey Lee, Thomas M. Gatton:

An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions. 244-250 - Chang-Sun Shin, Dong-In Ahn, Hyun Yoe, Su-Chong Joo:

Intersection Simulation System Based on Traffic Flow Control Framework. 251-260 - Byung kwan Lee, Chang-Min Kim, Dae-won Shin, Seung Hae Yang:

A HIICA(Highly-Improved Intra CA) Design for M-Commerce. 261-268 - Hoon-Jae Lee:

Highly Reliable Synchronous Stream Cipher System for Link Encryption. 269-278 - Kwang-Baek Kim, Hwang-Kyu Yang, Sang-Ho Ahn:

Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network. 279-286 - Oh-Hyung Kang, Ji-Hyun Lee, Yang-Won Rhee:

Hybrid Image Mosaic Construction Using the Hierarchical Method. 287-297
Workshop on Applied Cryptography and Information Security (ACIS 2006)
- Dalia Khader:

Public Key Encryption with Keyword Search Based on K-Resilient IBE. 298-308 - Jin Li, Yuen-Yan Chan, Yanming Wang:

A Generic Construction of Secure Signatures Without Random Oracles. 309-317 - David Galindo

:
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. 318-326 - He Ge, Stephen R. Tate:

Traceable Signature: Better Efficiency and Beyond. 327-337 - Marc Joye, Hung-Mei Lin:

On the TYS Signature Scheme. 338-344 - Qianhong Wu, Willy Susilo

, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. 345-354 - Jens-Matthias Bohli:

A Framework for Robust Group Key Agreement. 355-364 - Yuen-Yan Chan, Jin Li:

BGN Authentication and Its Extension to Convey Message Commitments. 365-374 - Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung:

New Security Problem in RFID Systems "Tag Killing". 375-384 - Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee:

A Model for Security Vulnerability Pattern. 385-394 - Kaouthar Blibech, Alban Gabillon:

A New Timestamping Scheme Based on Skip Lists. 395-405 - Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai:

A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. 406-415 - Khoongming Khoo, Swee-Huay Heng:

New Constructions of Universal Hash Functions Based on Function Sums. 416-425 - Martin Stanek:

Analysis of Fast Blockcipher-Based Hash Functions. 426-435 - Sourav Mukhopadhyay, Palash Sarkar:

Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. 436-445 - Changhoon Lee

, Jongsung Kim, Jaechul Sung
, Seokhie Hong, Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. 446-455 - Ignacio Algredo-Badillo

, Claudia Feregrino-Uribe, René Cumplido:
Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture. 456-465
Workshop on Internet Communications Security (WICS 2006)
- Jiqiang Lu:

Security Weaknesses in Two Proxy Signature Schemes. 466-475 - Byung Ryong Kim, Ki-Chang Kim:

A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. 476-485 - Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung:

Comparative Analysis of IPv6 VPN Transition in NEMO Environments. 486-496 - Namhi Kang, Younghan Kim:

A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream. 497-506 - Yuen-Yan Chan:

Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO. 507-516 - Youngsook Lee, Junghyun Nam, Dongho Won:

An Inter-domain Key Agreement Protocol Using Weak Passwords. 517-526 - Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano

:
A Practical Solution for Distribution Rights Protection in Multicast Environments. 527-536 - Francesco Palmieri

, Ugo Fiore
:
Audit-Based Access Control in Nomadic Wireless Environments. 537-545
Workshop on Optimization: Theories and Applications (OTA 2006)
- Morteza Bagherpour, Siamak Noori, Seyed Jafar Sadjadi

:
Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems. 546-553 - Liliana Capacho, Rafael Pastor

:
The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution. 554-563 - Kap Hwan Kim, Jong-Sool Lee:

Satisfying Constraints for Locating Export Containers in Port Container Terminals. 564-573 - Seyed Jafar Sadjadi

, Mohsen Ziaee:
A Price Discrimination Modeling Using Geometric Programming. 574-580 - Byounghak Yang:

Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation. 581-589 - Seung-Hyun Son, Jae-Yearn Kim:

Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning. 590-599 - Jeong Hun Lee, Il Kyeong Moon:

Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain. 600-609 - Shu-Hsing Chung, Chun-Ying Huang, Amy Hsin-I Lee:

Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area. 610-620 - Mario Vanhoucke

:
Scheduling an R&D Project with Quality-Dependent Time Slots. 621-630 - Yen Hung Chen, Chuan Yi Tang:

The Bottleneck Tree Alignment Problems. 631-637 - Gerrit Färber, Anna M. Coves Moreno:

Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers. 638-648 - Chung-Hsing Yeh

, Yu-Hern Chang:
Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment. 649-658 - Guoli Liu, Lixin Tang:

Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex. 659-667 - Kung-Jeng Wang, Wen-Hai Chih, Ken Hwang:

A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment. 668-677 - A. Sermet Anagun, T. Sarac:

Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method. 678-687 - Andrew Lim

, Hong Ma, Zhaowei Miao:
Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks. 688-697 - In-Jae Jeong:

An Entropy Based Group Setup Strategy for PCB Assembly. 698-707 - Sandra Duni Eksioglu, Mingzhou Jin:

Cross-Facility Production and Transportation Planning Problem with Perishable Inventory. 708-717 - Ho Woo Lee, Se Won Lee

, Won Ju Seo, Sahng Hoon Cheon, Jongwoo Jeon:
A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload. 718-727 - Sang-Il Kim, Hyun-Seon Choi, Dong-Ho Lee

:
Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times. 728-737 - Cédric Bentz:

The Maximum Integer Multiterminal Flow Problem. 738-747 - Mingzhou Jin

, Kai Liu, Burak Eksioglu
:
Routing with Early Ordering for Just-In-Time Manufacturing Systems. 748-756 - Eugenio Mijangos

:
A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks. 757-766 - Soo-Tae Kwon:

On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers. 767-776 - Wanmo Kang, Kyungsik Lee:

Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk. 777-784 - Byung-Cheon Choi

, Sung-Pil Hong:
Two-Server Network Disconnection Problem. 785-792 - Vladimir G. Deineko, Alexandre Tiskin

:
One-Sided Monge TSP Is NP-Hard. 793-801 - Wlodzimierz Ogryczak

, Tomasz Sliwinski:
On Direct Methods for Lexicographic Min-Max Optimization. 802-811 - Alex Y. D. Siem, Dick den Hertog, Aswin L. Hoffmann:

Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing. 812-821 - Guillermo Gallego

, Woonghee Tim Huh, Wanmo Kang, Robert Phillips
:
Linear Convergence of Tatônnement in a Bertrand Oligopoly. 822-831 - Hak-Soo Mok, Chang-Hyo Han, Chan-Hyoung Lim, John-Hee Hong, Jong-Rae Cho:

Design for Using Purpose of Assembly-Group. 832-840 - Manuel L. Esquível:

A Conditional Gaussian Martingale Algorithm for Global Optimization. 841-851 - Hyunsoo Kim, Hee Yong Youn:

Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks. 852-861 - Hui-Ming Wee, Chun-Jen Chung:

A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process. 862-874 - Jinho Lee

, Young Hoon Lee, Yun Ho Lee:
Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem. 875-884 - Hui-Ming Wee, Jonas C. P. Yu, Kung-Jeng Wang:

An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations. 885-897 - Jong-Sub Lee, Maing-Kyu Kang:

A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps. 898-907 - Panos Parpas

, Berç Rustem:
Global Optimization of the Scenario Generation and Portfolio Selection Problems. 908-917 - E. Ertugrul Karsak

:
A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation. 918-927 - Seungwoo Kwon

, Kyungdo Park, Chulung Lee
, Sung-Shick Kim, Hak-Jin Kim, Zhong Liang:
Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers. 928-933 - Shan He, Q. H. Wu, Jon R. Saunders:

A Group Search Optimizer for Neural Network Training. 934-943 - Kuo-Hwa Chang, Huifen Chen, Ching-Fen Lin:

Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem. 944-953
General Tracks
- Sulyun Sung, Yuhwa Seo, Yongtae Shin:

Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks. 954-963 - Miguel Gutiérrez, Alfonso Durán

, Pedro Cocho:
An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling. 964-973 - Jiang Guo, Yuehong Liao, Raj Pamula:

Static Analysis Based Software Architecture Recovery. 974-983 - Angélica Caro

, Coral Calero
, Ismael Caballero
, Mario Piattini
:
A First Approach to a Data Quality Model for Web Portals. 984-993 - Hak-Soo Mok, Jong-Rae Cho, Kwang-Sup Moon:

Design for Environment-Friendly Product. 994-1003 - Thomas J. Wollinger, Guido Bertoni

, Luca Breveglieri
, Christof Paar:
Performance of HECC Coprocessors Using Inversion-Free Formulae. 1004-1012 - Carlos Villarrubia, Eduardo Fernández-Medina

, Mario Piattini
:
Metrics of Password Management Policy. 1013-1023 - Rodolfo Villarroel

, Emilio Soler
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Using UML Packages for Designing Secure Data Warehouses. 1024-1034 - Pino Caballero-Gil

, Amparo Fúster-Sabater:
Practical Attack on the Shrinking Generator. 1035-1043 - Daniel Mellado, Eduardo Fernández-Medina

, Mario Piattini
:
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. 1044-1053 - Kisoeb Park, Moonseong Kim, Seki Kim:

Stochastic Simulation Method for the Term Structure Models with Jump. 1054-1063 - Yu Xia:

The Ellipsoidal lp Norm Obnoxious Facility Location Problem. 1064-1072 - J. Samuel Baixauli

, Susana Alvarez:
On the Performance of Recovery Rate Modeling. 1073-1080 - Michael Lazzareschi, Tzu-Yi Chen:

Using Performance Profiles to Evaluate Preconditioners for Iterative Methods. 1081-1089 - Moonseong Kim, Young-Cheol Bang, Hyunseung Choo:

Multicast omega-Trees Based on Statistical Analysis. 1090-1099 - Przemyslaw Ryba, Andrzej Kasprzak:

The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results. 1100-1109 - Gye Hang Hong, Sung Ho Ha:

Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management. 1110-1118 - Marcin Markowski, Andrzej Kasprzak:

The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks. 1119-1128 - Moonseong Kim, Young-Cheol Bang, Jong S. Yang, Hyunseung Choo:

An Efficient Multicast Tree with Delay and Delay Variation Constraints. 1129-1136 - Inbok Lee, Raphaël Clifford

, Sung-Ryul Kim:
Algorithms on Extended (delta, gamma)-Matching. 1137-1142 - Ana Isabel González, Alicia D'Anjou, M. Teresa García-Sebastián, Manuel Graña:

SOM and Neural Gas as Graduated Nonconvexity Algorithms. 1143-1152 - James R. Gattiker

, Earl Lawrence
, David Higdon:
Analysis of Multi-domain Complex Simulation Studies. 1153-1162 - Dong Joong Kang, Jong-Eun Ha, Tae-Jung Lho:

A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance. 1163-1171 - Jaechoon Chon, Hyongsuk Kim

:
Robust Fault Matched Optical Flow Detection Using 2D Histogram. 1172-1179 - Mohammadreza Noruzi, Mansour Vafadoost, Mohammad Shahram Moin

:
Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform. 1180-1189 - Eun Mi Kim, Cherl Soo Pahk, Jong Gu Lee:

Optimal Edge Detection Using Perfect Sharpening of Ramp Edges. 1190-1199 - Eun Yi Kim

, Sin Kuk Kang:
Eye Tracking Using Neural Network and Mean-Shift. 1200-1209 - Marek Kurzynski, Edward Puchala:

The Optimal Feature Extraction Procedure for Statistical Pattern Recognition. 1210-1215 - Murat Ekinci:

A New Approach for Human Identification Using Gait Recognition. 1216-1225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














