


default search action
ICCSA 2004: Assisi, Italy
- Antonio Laganà, Marina L. Gavrilova, Vipin Kumar, Youngsong Mun, Chih Jeng Kenneth Tan, Osvaldo Gervasi:

Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV. Lecture Notes in Computer Science 3046, Springer 2004, ISBN 3-540-22060-7
Track on Numerical Methods and Algorithms
- Weidong Shen, Shulin Yang:

New Techniques in Designing Finite Difference Domain Decomposition Algorithm for the Heat Equation. 1-10 - Ju-Hyun Lee, Sungkwon Kang, Hoo-Kyun Choi:

A Fast Construction Algorithm for the Incidence Matrices of a Class of Symmetric Balanced Incomplete Block Designs. 11-19 - Tzu-Yi Chen:

ILUTP Mem: A Space-Efficient Incomplete LU Preconditioner. 20-28 - Jin-Geol Kim, SangHo Choi, Ki heon Park:

Optimal Gait Control for a Biped Locomotion Using Genetic Algorithm. 29-38 - Edward Puchala:

A Bayes Algorithm for the Multitask Pattern Recognition Problem - Direct and Decomposed Independent Approaches. 39-45 - Hyung-Wook Yoon, Bo-Hyeong Lee, Tae-Jin Lee, Min Young Chung:

Energy Efficient Routing with Power Management to Increase Network Lifetime in Sensor Networks. 46-55 - Moonseong Kim, Young-Cheol Bang, Hyunseung Choo:

New Parameter for Balancing Two Independent Measures in Routing Path. 56-65 - Deok-Gyu Lee, Im-Yeong Lee:

A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. 66-76
Track on Parallel and Distributed Computing
- Joaquín Pérez Ortega, Rodolfo A. Pazos, Juan Frausto Solís

, Guillermo Rodríguez, Laura Cruz-Reyes
, Graciela Mora O., Héctor J. Fraire H.:
Self-Tuning Mechanism for Genetic Algorithms Parameters, an Application to Data-Object Allocation in the Web. 77-86 - Nam-Yeun Kim, Kee-Young Yoo:

Digit-Serial AB2 Systolic Array for Division in GF(2m). 87-96 - Sangman Moh, Chansu Yu, Dongsoo Han

:
Design and Experiment of a Communication-Aware Parallel Quicksort with Weighted Partition of Processors. 97-105 - Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong:

A Linear Systolic Array for Multiplication in GF(2m) for High Speed Cryptographic Processors. 106-116 - Chunlin Li, Zhengding Lu, Layuan Li:

Price Driven Market Mechanism for Computational Grid Resource Allocation. 117-126 - Xinyu Yang, Ming Zeng, Rui Zhao, Yi Shi:

A Novel LMS Method for Real-Time Network Traffic Prediction. 127-136 - Víctor Jesús Sosa Sosa, Juan Gabriel González Serna, Xochitl Landa Miguez, Francisco Verduzco Medina, Manuel A. Valdés Marrero:

Dynamic Configuration between Proxy Caches within an Intranet. 137-146 - Tan Tien Ping, Gian Chand Sodhy

, Chan Huah Yong, Fazilah Haron, Rajkumar Buyya:
A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System. 147-157 - Hyontai Sug:

Reducing on the Number of Testing Items in the Branches of Decision Trees. 158-166 - Ki-Hyung Kim, Won-Seok Kang

:
CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical One. 167-176 - Jesús Acosta Elías, Ulises Pineda Rico, Jose Martin Luna-Rivera, Enrique Stevens-Navarro

, Isaac Campos-Cantón, Leandro Navarro-Moldes
:
The Effects of Network Topology on Epidemic Algorithms. 177-184 - Tae-Wan Ryu, Christoph F. Eick:

A Systematic Database Summary Generation Using the Distributed Query Discovery System. 185-195 - Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo:

Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. 196-205 - Sung Baik, Jerzy W. Bala:

A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection. 206-212 - Sam Jin Jeong:

Maximizing Parallelism for Nested Loops with Non-uniform Dependences. 213-222 - Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila

, Llorenç Huguet i Rotger:
Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. 223-232 - ChaYoung Kim, JinHo Ahn, Chong-Sun Hwang:

Gossip Based Causal Order Broadcast Algorithm. 233-242
Track on Signal Processing
- Chaohui Lu, Ping An, Zhaoyang Zhang:

Intermediate View Synthesis from Stereoscopic Videoconference Images. 243-250 - Chang-Gyu Choi, Yongseok Chang, Jung Hyun Cho, Sung-Ho Kim:

Extract Shape from Clipart Image Using Modified Chain Code - Rectangle Representation. 251-260 - Boguslaw Cyganek, Jan Borgosz:

Control Messaging Channel for Distributed Computer Systems. 261-270 - Uk-Chul Choi, Yoon-Hee Choi, Dae-Chul Kim, Tae-Sun Choi:

Scene-Based Video Watermarking for Broadcasting Systems. 271-280 - Byong-Won Hwang, Tae-Ha Kang, Tae-Seung Lee:

Distortion-Free of General Information with Edge Enhanced Error Diffusion Halftoning. 281-290 - Tanzeem Muzaffar, Tae-Sun Choi

:
Enhanced Video Coding with Error Resilience Based on Macroblock Data Manipulation. 291-300 - Myung Eui Lee, Pyung Soo Kim:

Filtering of Colored Noise for Signal Enhancement. 301-310 - Jihun Park

, Sunghun Park, Jake K. Aggarwal:
Model-Based Human Motion Tracking and Behavior Recognition Using Hierarchical Finite State Automata. 311-320 - Won-Hyuck Choi, Hye-jin Shim, Jung-Sun Kim:

Effective Digital Watermarking Algorithm by Contour Detection. 321-328 - Kook-Yeol Yoo:

New Packetization Method for Error Resilient Video Communications. 329-337 - Yoon-Hee Choi, Yeong Kyeong Seong, Joo-Young Kim, Tae-Sun Choi

:
A Video Mosaicking Technique with Self Scene Segmentation for Video Indexing. 338-347 - Kyung-Pyo Kang, Yoon-Hee Choi, Tae-Sun Choi

:
Real-Time Video Watermarking for MPEG Streams. 348-358 - Jong-Un Yang, Jeong-Hyun Cho, Sang-Hyun Bae, In-Ho Ra:

A TCP-Friendly Congestion Control Scheme Using Hybrid Approach for Reducing Transmission Delay of Real-Time Video Stream. 359-368 - Jihun Park, Sunghun Park:

Object Boundary Edge Selection Using Level-of-Detail Canny Edges. 369-378 - Monia Discepoli, Ivan Gerace:

Inverse Dithering through IMAP Estimation. 379-388 - Fevzullah Temurtas, Ali Gülbag

, Nejat Yumusak:
A Study on Neural Networks Using Taylor Series Expansion of Sigmoid Activation Function. 389-397 - Fevzullah Temurtas, Cihat Tasaltin, Hasan Temurtas, Nejat Yumusak, Zafer Ziya Öztürk:

A Study on Neural Networks with Tapped Time Delays: Gas Concentration Estimation. 398-405 - Mingli Song, Chun Chen, Jiajun Bu, Mingyu You:

Speech Emotion Recognition and Intensity Estimation. 406-413 - Liran Shen, Xueyao Li, Huiqiang Wang, Rubo Zhang:

Speech Hiding Based on Auditory Wavelet. 414-420 - Sung-kwan Je, Jae-Hyun Cho, Eui-Young Cha:

Automatic Selecting Coefficient for Semi-blind Watermarking. 421-430
Track on Telecommunications
- Olga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo:

Network Probabilistic Connectivity: Optimal Structures. 431-440 - Myung-Sub Lee, Chang-Hyeon Park, Young-Ho Sohn:

Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load Balancing. 441-450 - Kwang-Jae Lee, Won-Hyuck Choi, Jung-Sun Kim:

Adaptive CBT/Anycast Routing Algorithm for Multimedia Traffic Overload. 451-459 - SungKee Noh, YoungHa Hwang, Ki-Il Kim, Sang-Ha Kim:

Achieving Fair New Call CAC for Heterogeneous Services in Wireless Networks. 460-470
Track on Visualization and Virtual and Augmented Reality
- Zhiqiang Ma, Anthony Watson, Wanwu Guo:

Application of MCDF Operations in Digital Terrain Model Processing. 471-478 - Kesaraporn Techapichetvanich, Amitava Datta

:
Visual Mining of Market Basket Association Rules. 479-488 - Sung Baik, Jerzy W. Bala, Sung Ahn:

Visualizing Predictive Models in Decision Tree Generation. 489-495
Track on Software Engineering
- José Daniel García, Jesús Carretero

, José María Pérez, Félix García:
A Model for Use Case Priorization Using Criticality Analysis. 496-505 - Hugo Estrada, Oscar Pastor, Alicia Martínez, Jose Torres-Jimenez:

Using a Goal-Refinement Tree to Obtain and Refine Organizational Requirements. 506-513 - Jan Broeckhove, Kurt Vanmechelen:

Using C++ Functors with Legacy C Libraries. 514-523 - Hoon-Joon Kouh, Ki-Tae Kim, Sun-Moon Jo, Weon-Hee Yoo:

Debugging of Java Programs Using HDT with Program Slicing. 524-533 - Olivia Graciela Fragoso Diaz, René Santaolaya Salgado, Isaac M. Vásquez Mendez, Manuel A. Valdés Marrero:

Frameworks as Web Services. 534-542 - Olena Daly, David Taniar:

Exception Rules Mining Based on Negative Association Rules. 543-552 - Juan Frausto Solís

, Marco Antonio Cruz-Chavez:
A Reduced Codification for the Logical Representation of Job Shop Scheduling Problems. 553-562 - Alfredo Milani, Valentina Poggioni:

Action Reasoning with Uncertain Resources. 563-573
Track on Security Engineering
- Khin Mi Mi Aung, Jong Sou Park:

Software Rejuvenation Approach to Security Engineering. 574-583 - Myung-Kyu Yi, Chong-Sun Hwang:

A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. 584-593 - Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang:

Design and Implementation of High-Performance Intrusion Detection System. 594-602 - Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo:

An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. 603-610 - Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim:

A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. 611-616 - Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo:

Efficient Password-Based Authenticated Key Agreement Protocol. 617-626 - Sung-Keun Song, Hee Yong Youn, Chang-Won Park:

A Two-Public Key Scheme Omitting Collision Problem in Digital Signature. 627-636 - Sung Jin Choi, Hee Yong Youn:

A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition. 637-646 - Youngjoo Cho, ChangKyun Chi, Ilyong Chung:

An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block Design. 647-654 - Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im:

Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. 655-664 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:

Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. 665-671 - Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo:

ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. 672-680 - Jin S. Yang, Young-Ju Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myung Chung, Jung C. Na:

A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. 681-688 - Seung-Hyun Seo

, Sang-Ho Lee:
A Secure and Flexible Multi-signcryption Scheme. 689-697 - IkSu Park, Seung Bae Park, ByeongKyun Oh:

User Authentication Protocol Based on Human Memorable Password and Using RSA. 698-707 - Heeran Lim, Manpyo Hong:

Effective Packet Marking Approach to Defend against DDoS Attack. 708-716 - Tai-Hoon Kim, Haeng-Kon Kim:

A Relationship between Security Engineering and Security Evaluation. 717-724 - Hae-ki Lee, Jae-sun Shim, Seung Lee, Jong-bu Kim:

A Relationship of Configuration Management Requirements between KISEC and ISO/IEC 15408. 725-734
Track on Information Systems and Information Technology
- Seung-Shik Kang:

Term-Specific Language Modeling Approach to Text Categorization. 735-742 - Won-Sung Sohn, Teuk-Seob Song, Jae-Kyung Kim, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Bong Yang, Francis Neelamkavil:

Context-Based Proofreading of Structured Documents. 743-753 - Jeong-Hoon Shin, Kwang-Seok Hong, Sung-Kyun Eom:

Implementation of New CTI Service Platform Using Voice XML. 754-762 - Min Jin, Byung-Joo Shin:

Storing Together the Structural Information of XML Documents in Relational Databases. 763-771 - Won-Sung Sohn, Myeong-Cheol Ko, Hak-Keun Kim, Soon-Bum Lim, Yoon-Chul Choy:

Annotation Repositioning Methods in the XML Documents: Context-Based Approach. 772-782 - Alicia Martínez, Oscar Pastor, Hugo Estrada:

Isolating and Specifying the Relevant Information of an Organizational Model: A Process Oriented Towards Information System Generation. 783-790 - Ho Joon Kim, Tae-Wan Ryu, Thai T. Nguyen, Joon Shik Lim, Sudhir Gupta:

A Weighted Fuzzy Min-Max Neural Network for Pattern Classification and Feature Extraction. 791-798 - Yongsu Park, Yookun Cho:

The eSAIDA Stream Authentication Scheme. 799-807 - René Santaolaya Salgado, Olivia Graciela Fragoso Diaz, Manuel A. Valdés Marrero, Isaac M. Vásquez Mendez, Sheila L. Delfín Lara:

An Object-Oriented Metric to Measure the Degree of Dependency Due to Unused Interfaces. 808-817 - Eun-Ju Ha, Byeong-Soo Yun:

End-to-End QoS Management for VoIP Using DiffServ. 818-827 - Dae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun:

Multi-modal Biometrics System Using Face and Signature. 828-837
Track on Information Retrieval
- SooCheol Lee, Eenjun Hwang, YangKyoo Lee:

Using 3D Spatial Relationships for Image Retrieval by XML Annotation. 838-848 - Byung-Joo Shin, Min Jin:

Association Inlining for Mapping XML DTDs to Relational Tables. 849-858 - Seungmin Rho, SooCheol Lee, Eenjun Hwang, YangKyoo Lee:

XCRAB: A Content and Annotation-Based Multimedia Indexing and Retrieval System. 859-868 - Jeong Min Shim, Seok Il Song, Young Soo Min, Jae Soo Yoo:

An Efficient Cache Conscious Multi-dimensional Index Structure. 869-876
Track on Image Processing
- Muhammad Bilal Ahmad

, Min Hyuk Chang, Seung-Jin Park, Jong-An Park, Tae-Sun Choi
:
Tracking of Moving Objects Using Morphological Segmentation, Statistical Moments, and Radon Transform. 877-886 - Fernando Pardo, Jose Antonio Boluda, Esther de Ves

:
Feature Extraction and Correlation for Time-to-Impact Segmentation Using Log-Polar Images. 887-895 - Dong Joong Kang, Jong-Eun Ha, In-Mo Ahn:

Object Mark Segmentation Algorithm Using Dynamic Programming for Poor Quality Images in Automated Inspection Process. 896-905 - Tae-Jung Lho, Dong Joong Kang, Jong-Eun Ha:

A Line-Based Pose Estimation Algorithm for 3-D Polyhedral Object Recognition. 906-914 - Jong-Eun Ha, Dong Joong Kang:

Initialization Method for the Self-Calibration Using Minimal Two Images. 915-923 - Hyoun-Joo Go, Keun Chang Kwak, Sung-Suk Kim, Myung-Geun Chun:

Face Recognition for Expressive Face Images. 924-932 - Eugene Demidenko:

Kolmogorov-Smirnov Test for Image Comparison. 933-939 - Sung Kwan Kang, Muhammad Bilal Ahmad

, Jong-Hun Chun, Pan-Koo Kim, Jong-An Park:
Modified Radius-Vector Function for Shape Contour Description. 940-947 - Seung-Jin Park, Muhammad Bilal Ahmad

, Seung-Hak Rhee, Seung Jo Han, Jong-An Park:
Image Corner Detection Using Radon Transform. 948-955 - Yinghua Lu, Wanwu Guo:

Analytical Comparison of Conventional and MCDF Operations in Image Processing. 956-963 - Jin Ok Kim, Jin-Soo Kim, Young Ro Seo, Bum Ro Lee, Chin Hyun Chung, Key Seo Lee, Wha Young Yim, Sang Hyo Lee:

On Extraction of Facial Features from Color Images. 964-973
Track on Networking
- Dohyeon Kim, Beongku An:

An Architecture for Mobility Management in Mobile Computing Networks. 974-982 - Jongwoo Chae, Ghita Kouadri Mostéfaoui, Mokdong Chung:

An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics. 983-993 - Hae-Joung Lee, Kyu-Yeop Song, Won-Ho So, Jing Zhang, Debasish Datta, Biswanath Mukherjee, Young-Chon Kim:

A Hybrid Restoration Scheme Based on Threshold Reaction Time in Optical Burst-Switched Networks. 994-1004

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














