


default search action
ICCSA 2007: Kuala Lumpur, Malaysia
- Osvaldo Gervasi, Marina L. Gavrilova:

Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III. Lecture Notes in Computer Science 4707, Springer 2007, ISBN 978-3-540-74482-5
Workshop on CAD/CAM and Web Based Collaboration (CADCAM 07)
- Bo Hyun Kim, Sung Bum Park, Gyu-Bong Lee, So Young Chung:

Framework of Integrated System for the Innovation of Mold Manufacturing Through Process Integration and Collaboration. 1-10 - Yong Ju Cho, Kwang Yeol Ryu, Seok Woo Lee:

A Study on Automated Design System for a Blow Mould. 11-19 - Yong Ju Cho, Sung Hee Lee:

Development of an Evaluation System of the Informatization Level for the Mould Companies in Korea. 20-32 - Chang Ho Lee, Yong Ju Cho:

Framework of a Collaboration-Based Engineering Service System for Mould Industry. 33-44
Workshop on Component Based Software Engineering and Software Process Model (CBSE 07)
- Mohamed Bouhdadi, Youssef Balouki

, El maati Chabbar:
Meta-modelling Syntax and Semantics of Structural Concepts for Open Networked Enterprises. 45-54 - Jay Walter Larson, Boyana Norris

:
Component Specification for Parallel Coupling Infrastructure. 55-68 - Lu Xu, Liguo Zhang, Yangzhou Chen:

Real-Time Navigation for a Mobile Robot Based on the Autonomous Behavior Agent. 69-80 - Liangtie Dai, Wanwu Guo:

Concurrent Subsystem-Component Development Model (CSCDM) for Developing Adaptive E-Commerce Systems. 81-91 - Chengying Mao

:
A Quantitative Approach for Ranking Change Risk of Component-Based Software. 92-103 - Rogelio N. Limón Cordero, Isidro Ramos Salavert:

Relating Software Architecture Views by Using MDA. 104-114
Workshop on Distributed Data and Storage System Managemnt (DDSM 07)
- Mohammed Radi

, Ali Mamat, Mustafa Mat Deris, Hamidah Ibrahim, Subramaniam Shamala:
Update Propagation Technique for Data Grid. 115-127 - Mohd Shafry Mohd Rahim, Abdul Rashid Mohamed Shariff, Shattri Mansor, Ahmad Rodzi Mahmud, Daut Daman:

A Spatiotemporal Database Prototype for Managing Volumetric Surface Movement Data in Virtual GIS. 128-139 - Ngot Phu Bui, SeungGwan Lee, TaeChoong Chung:

Query Distributed Ontology over Grid Environment. 140-153
Workshop on Embedded Systems for Ubiquitous Computing (ESUC 07)
- Lilian Janin, Doug Edwards:

CSP Transactors for Asynchronous Transaction Level Modeling and IP Reuse. 154-168 - Junghoon Lee, Mikyung Kang, Gyung-Leen Park, In-Hye Shin, Hanil Kim, Sang-Wook Kim:

A Robust Real-Time Message Scheduling Scheme Capable of Handling Channel Errors in Wireless Local Area Networks. 169-178 - Junghoon Lee, Eui-young Kang, Gyung-Leen Park:

Design and Implementation of a Tour Planning System for Telematics Users. 179-189
General Track
- Nipon Theera-Umpon:

Ionospheric F-Layer Critical Frequency Estimation from Digital Ionogram Analysis. 190-200 - ByungRae Cha, Kyungjun Kim, Dongseob Lee:

Study of Digital License Search for Intellectual Property Rights of S/W Source Code. 201-212 - Ilya Valuev, Alexei Deinega, A. Knizhnik, B. Potapkin:

Creating Numerically Efficient FDTD Simulations Using Generic C++ Programming. 213-226 - Song Han, Vidyasagar M. Potdar, Elizabeth Chang

:
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. 227-238 - Pantelis Georgiadis

, Dionisis A. Cavouras, Ioannis Kalatzis
, Antonis Daskalakis, George C. Kagadis, Koralia Sifaki, Menelaos Malamas, George Nikiforidis, Ekaterini Solomou:
Non-linear Least Squares Features Transformation for Improving the Performance of Probabilistic Neural Networks in Classifying Human Brain Tumors on MRI. 239-247 - Moutaz Saleh Mustafa

, Zulaiha Ali Othman:
Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based Simulation. 248-261 - David Garcia Rosado

, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Defining Security Architectural Patterns Based on Viewpoints. 262-272 - Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li

:
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. 273-284 - Hartmut Schwandt:

Two-Stage Interval Krawczyk-Schwarz Methods with Applications to Nonlinear Parabolic PDE. 285-297 - Jumat Sulaiman, Mohamed Othman, Mohammad Khatim Hasan:

Red-Black EDG SOR Iterative Method Using Triangle Element Approximation for 2D Poisson Equations. 298-308 - Muhammet Fikret Ercan, Yu-Fai Fung:

Performance of Particle Swarm Optimization in Scheduling Hybrid Flow-Shops with Multiprocessor Tasks. 309-318 - Krzysztof Walkowiak

:
Branch-and-Bound Algorithm for Anycast Flow Assignment in Connection-Oriented Networks. 319-329 - Michal Przewozniczek

, Krzysztof Walkowiak
:
Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks. 330-342 - Przemyslaw Ryba, Andrzej Kasprzak:

An Exact Algorithm for the Minimal Cost Gateways Location, Capacity and Flow Assignment Problem in Two-Level Hierarchical Wide Area Networks. 343-352 - Ying Zhang, Gen Li, Xuejun Yang:

Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream Processor. 353-366 - Farshad Safaei, Mahmood Fathy, Ahmad Khonsari, N. Talebanfard:

On Disconnection Node Failure and Stochastic Static Resilience of P2P Communication Networks. 367-378 - David Semé, Sidney Youlou:

An Efficient Sequence Alignment Algorithm on a LARPBS. 379-387 - Omar Ramadan:

An Effective Unconditionally Stable Algorithm for Dispersive Finite Difference Time Domain Simulations. 388-397 - Mohammad Sadegh Talebi, Fahimeh Jafari, Ahmad Khonsari, Mohammad Hossien Yaghmaee:

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization. 398-409 - Maged Marghany, Mazlan Hashim, Arthur P. Cracknell:

3D Bathymetry Reconstruction from Airborne Topsar Polarized Data. 410-420 - Omar Ramadan:

A Parallel FDTD Algorithm for the Solution of Maxwell's Equations with Nearly PML Absorbing Boundary Conditions. 421-430 - Shih-Lin Lin

, Pi-Cheng Tung:
Application of Modified ICA to Secure Communications in Chaotic Systems. 431-444 - Mihai Mitrea, Octavian Dumitru, Françoise J. Prêteux, Adriana Vlad:

Zero Memory Information Sources Approximating to Video Watermarking Attacks. 445-459 - Adriana Vlad, Adrian Luca, Bogdan Badea:

On Statistical Independence in the Logistic Map: A Guide to Design New Chaotic Sequences Useful in Cryptography. 460-474 - Günter Bärwolff:

FVM- and FEM-Solution of Elliptical Boundary Value Problems in Different Coordinate Systems. 475-485 - Murali Subramaniyam, Sangho Park, Sung-il Choi, Seokho Jang, Joon-Yub Song:

Digital Simulation for Micro Assembly Arranged at Rectangular Pattern in Micro Factory. 486-494 - Ali Amiri, Mahmood Fathy, Mahmood Amintoosi

, Hadi Sadoghi Yazdi:
A New Quantized Input RLS, QI-RLS, Algorithm. 495-506 - Yaohang Li, Michael Mascagni, Andrey Gorin:

Decentralized Replica Exchange Parallel Tempering: An Efficient Implementation of Parallel Tempering Using MPI and SPRNG. 507-519 - Yen Hung Chen, Gwo-Liang Liao, Chuan Yi Tang:

Approximation Algorithms for 2-Source Minimum Routing Cost k -Tree Problems. 520-533 - Alexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo:

On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable Network. 534-543 - Amparo Fúster-Sabater, Pino Caballero-Gil:

Linearization of Stream Ciphers by Means of Concatenated Automata. 544-554 - Antonis Daskalakis, Dionisis A. Cavouras, Panagiotis Bougioukos, Spiros Kostopoulos

, Pantelis Georgiadis
, Ioannis Kalatzis
, George C. Kagadis, George Nikiforidis:
Effective Quantification of Gene Expression Levels in Microarray Images Using a Spot-Adaptive Compound Clustering-Enhancement-Segmentation Scheme. 555-565 - Panagiotis Bougioukos, Dionisis A. Cavouras, Antonis Daskalakis, Ioannis Kalatzis

, George Nikiforidis, Anastasios Bezerianos:
Biomarker Selection, Employing an Iterative Peak Selection Method, and Prostate Spectra Characterization for Identifying Biomarkers Related to Prostate Cancer. 566-574 - Manuel Aguilar R., Héctor J. Fraire H., Laura Cruz-Reyes, Juan Javier González Barbosa, Graciela Mora Guadalupe Castilla V., Claudia Gómez-Santillán:

Classic Cryptanalysis Applied to Exons and Introns Prediction. 575-584 - Dong Hoi Kim, Saangyong Uhmn, Young Woong Ko, Sung Won Cho, Jae Youn Cheong, Jin Kim:

Chronic Hepatitis and Cirrhosis Classification Using SNP Data, Decision Tree and Decision Rule. 585-596 - Slobodan Petrovic, Amparo Fúster-Sabater:

Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis. 597-610 - Masri Ayob, Ariff Md. Ab. Malik, Salwani Abdullah, Abdul Razak Hamdan, Graham Kendall, Rong Qu:

Solving a Practical Examination Timetabling Problem: A Case Study. 611-624 - Ying-Chin Ho, Hui-Ming Wee, Hsiao Ching Chen:

A Geometric Design of Zone-Picking in a Distribution Warehouse. 625-636 - Jin Myoung Kim, Tae Ho Cho:

Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. 637-648 - Jianmin Zhang, ShengYu Shen, Sikun Li:

A Heuristic Local Search Algorithm for Unsatisfiable Cores Extraction. 649-659 - Burcu Yildiz

, Silvia Miksch:
ontoX - A Method for Ontology-Driven Information Extraction. 660-673 - Joaquín Pérez Ortega, Rodolfo A. Pazos Rangel, Laura Cruz-Reyes, Gerardo Reyes Salgado, Rosy Basave T., Héctor J. Fraire H.:

Improving the Efficiency and Efficacy of the K-means Clustering Algorithm Through a New Convergence Condition. 674-682 - Raymond Chiong

:
Modelling Agent Strategies in Simulated Market Using Iterated Prisoner's Dilemma. 683-696 - Marco Antonio Cruz-Chavez, Rafael Rivera-López

:
A Local Search Algorithm for a SAT Representation of Scheduling Problems. 697-709 - José Santa

, Andrés Muñoz
, Antonio Fernandez Gómez-Skarmeta
:
A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture. 710-723 - Kevin Chai, Vidyasagar M. Potdar, Elizabeth Chang

:
A Survey of Revenue Models for Current Generation Social Software's Systems. 724-738 - Jongmyung Choi

:
Context-Driven Requirements Analysis. 739-748 - Eric Pardede, J. Wenny Rahayu, David Taniar, Ramanpreet Kaur Aujla:

Performance Analysis of Child/Descendant Queries in an XML-Enabled Database. 749-762 - Rohaya Latip, Hamidah Ibrahim, Mohamed Othman, Md Nasir Sulaiman, Azizol Abdullah

:
Diagonal Data Replication in Grid Environment. 763-773 - Appanah Rao Appadu

, Muhammad Zaid Dauhoo, S. D. D. V. Rughooputh:
Efficient Shock-Capturing Numerical Schemes Using the Approach of Minimised Integrated Square Difference Error for Hyperbolic Conservation Laws. 774-789 - Tae-Eun Kim, Chin Hyun Chung, Jin Ok Kim:

Improvement on Real-Time Face Recognition Algorithm Using Representation of Face and Priority Order Matching. 790-797 - Zelmar Echegoyen, Alicia D'Anjou, Manuel Graña:

Modeling a Legged Robot for Visual Servoing. 798-810 - Jorge Ropero, Ariel Gómez, Carlos León

, Alejandro Carrasco:
Information Extraction in a Set of Knowledge Using a Fuzzy Logic Based Intelligent Agent. 811-820 - Yanmin Luo, Hanxiong Chen, Kazutaka Furuse

, Nobuo Ohbo:
Efficient Methods in Finding Aggregate Nearest Neighbor by Projection-Based Filtering. 821-833 - Jong-Ki Kim, Kisoeb Park, Moonseong Kim:

On Multicast Routing Based on Route Optimization in Network Mobility. 834-843 - Hun-Soon Lee, Seung-Il Jin:

An Effective XML-Based Sensor Data Stream Processing Middleware for Ubiquitous Service. 844-857 - Ca Van Phan

, Kikyung Baek, Jeong Geun Kim:
Opportunistic Transmission for Wireless Sensor Networks Under Delay Constraints. 858-871 - Péter Kacsuk, Zoltán Farkas, Gabor Hermann:

Workflow-Level Parameter Study Support for Production Grids. 872-885 - Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim:

Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. 886-899 - Min-Jae Park, Kwanghoon Pio Kim

:
XWELL: A XML-Based Workflow Event Logging Mechanism and Language for Workflow Mining Systems. 900-909 - Jae-Kang Won, Kwanghoon Pio Kim

:
Workcase-Oriented Workflow Enactment Components for Very Large Scale Workflows. 910-919 - Hyung-Jin Ahn, Kwanghoon Pio Kim

:
A Workcase-Based Distributed Workflow Architecture and Its Implementation Using Enterprize Java Beans Framework. 920-928 - Junghwa Chae:

Building Web Application Fragments Using Presentation Framework. 929-940 - Siham Tabik, Luis F. Romero, Ester M. Garzón, Inmaculada García, Juan I. Ramos:

Three-Dimensional Bursting Simulation on Two Parallel Systems. 941-949 - Myung-Sun Baek, Sang-Tae Kim, Young-Hwan You, Hyoung-Kyu Song:

PAR Reduction Scheme for Efficient Detection of Side Information in OFDM-BLAST System. 950-957 - Min Seok Jie, Eun Jong Mo, Kang Woong Lee:

Fuzzy PI Controller for Turbojet Engine of Unmanned Aircraft. 958-967 - SooCheol Lee, Daesub Yoon, Oh-Cheon Kwon, Eenjun Hwang:

Implementation of QoS-Aware Dynamic Multimedia Content Adaptation System. 968-977 - Jung-Soo Han, Gui-Jung Kim:

Experience of Efficient Data Transformation Solution for PCB Product Automation. 978-986 - Jung-Soo Han:

Performance Evaluation for Component Retrieval. 987-996 - Gui-Jung Kim, Jung-Soo Han:

The Clustering Algorithm of Design Pattern Using Object-Oriented Relationship. 997-1006 - Wookey Lee, Seungkil Lim, Taesoo Lim:

Modeling Parametric Web Arc Weight Measurement. 1007-1016 - Jeong Geun Kim, Woo Jin Shin, Ji Ho Yoo:

Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol. 1017-1026 - Mohamed Ali Aloulou, Christian Artigues:

Worst-Case Evaluation of Flexible Solutions in Disjunctive Scheduling Problems. 1027-1036 - Tiancheng Li, Ian Robinson:

The Search for a Good Lattice Augmentation Sequence in Three Dimensions. 1037-1045 - Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi:

Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods. 1046-1055 - Jiawan Zhang, Yang Gao, Jizhou Sun, Zhou Jin:

Rendering of Translucent Objects Based Upon PRT Techniques. 1056-1065 - Hengfu Yang, Xingming Sun, Bin Wang, Zheng Qin:

An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. 1066-1075 - Keon-Jun Park, Sung-Kwun Oh, Hyun-Ki Kim, Witold Pedrycz, Seong-Whan Jang:

Identification of Fuzzy Set-Based Fuzzy Systems by Means of Data Granulation and Genetic Optimization. 1076-1085 - Dalia Khader:

Public Key Encryption with Keyword Search Based on K-Resilient IBE. 1086-1095 - Qianhong Wu, Willy Susilo

, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. 1096-1105 - Jianqin Wang, Yong Xue, Yincui Hu, Chaolin Wu, Jianping Guo

, Lei Zheng, Ying Luo, Ruizhi Sun, Guangli Liu, YunLing Liu:
Study on Grid-Based Special Remotely Sensed Data Processing Node. 1106-1113 - Ashot Gevorkyan, Gabriel G. Balint-Kurti, Alexander V. Bogdanov, Gunnar Nyman:

Novel Algorithms for Quantum Simulation of 3 D Atom-Diatom Reactive Scattering. 1114-1123 - Todd J. Kosloff, Brian A. Barsky:

An Algorithm for Rendering Generalized Depth of Field Effects Based on Simulated Heat Diffusion. 1124-1140 - Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi:

Fingerprint Template Protection Using Fuzzy Vault. 1141-1151 - Yumin Chen, Jianya Gong, Chenchen Wu:

Design and Application of Optimal Path Service System on Multi-level Road Network. 1152-1164 - Jae-Woo Chang, Rabindra Bista

, Young-Chang Kim, Yong-Ki Kim:
Spatio-temporal Similarity Measure Algorithm for Moving Objects on Spatial Networks. 1165-1178 - Mi Young Choi, Hyung-Il Choi:

Efficient Text Detection in Color Images by Eliminating Reflectance Component. 1179-1186 - Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom:

Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. 1187-1196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














