Skip to main content
  • Conference proceedings
  • © 2006

Computational Science and Its Applications - ICCSA 2006

International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3982)

Part of the book sub series: Theoretical Computer Science and General Issues (LNTCS)

Conference series link(s): ICCSA: International Conference on Computational Science and Its Applications

Conference proceedings info: ICCSA 2006.

Buying options

eBook USD 139.00
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (129 papers)

  1. Front Matter

  2. Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)

    1. A Security Requirement Management Database Based on ISO/IEC 15408

      • Shoichi Morimoto, Daisuke Horie, Jingde Cheng
      Pages 1-10
    2. C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model

      • Byeongchang Kim, Gary Geunbae Lee
      Pages 21-30
    3. Design and Fabrication of Security and Home Automation System

      • Eung Soo Kim, Min Sung Kim
      Pages 31-37
    4. PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design

      • Byung-kwan Lee, Seung-hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim
      Pages 38-47
    5. Information System Modeling for Analysis of Propagation Effects and Levels of Damage

      • InJung Kim, YoonJung Chung, YoungGyo Lee, Eul Gyu Im, Dongho Won
      Pages 54-63
    6. A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks

      • Youngrag Kim, JaeYoun Jung, Seunghwan Lee, Chonggun Kim
      Pages 64-72
    7. A VLSM Address Management Method for Variable IP Subnetting

      • SeongKwon Cheon, DongXue Jin, ChongGun Kim
      Pages 73-83
    8. SDSEM: Software Development Success Evolution Model

      • Haeng-Kon Kim, Sang-Yong Byun
      Pages 84-92
    9. A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks

      • Mary Wu, SangJoon Jung, Seunghwan Lee, Chonggun Kim
      Pages 93-103
    10. The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks

      • Kyung-Hoon Jung, Seok-Cheol Lee, Hyun-Suk Hwang, Chang-Soo Kim
      Pages 115-124
    11. Ontology-Based Information Search in the Real World Using Web Services

      • Hyun-Suk Hwang, Kyoo-Seok Park, Chang-Soo Kim
      Pages 125-133
    12. An Active Node Set Maintenance Scheme for Distributed Sensor Networks

      • Tae-Young Byun, Minsu Kim, Sungho Hwang, Sung-Eok Jeon
      Pages 134-143
    13. Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector

      • Misun Kim, Minsoo Kim, JaeHyun Seo
      Pages 154-162
    14. Applying Product Line to the Embedded Systems

      • Haeng-Kon Kim
      Pages 163-171
    15. Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold

      • Kwang-Baek Kim, Byung-Kwan Lee, Soon-Ho Kim
      Pages 172-177

About this book

This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 8–11, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA 2006. Computational science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental theore- cal research as well as endeavors in emerging ?elds. Together, these far-reaching scienti?c areas contributed to shaping this conference in the realms of state-- the-art computational science researchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.

Keywords

  • Performance
  • algorithms
  • bioinformatics
  • computational geometry
  • computer
  • computer science
  • data security
  • geometric modelling
  • modeling
  • optimization
  • security
  • visualization

Editors and Affiliations

  • Department of Computer Science, University of Calgary, Calgary, Canada

    Marina Gavrilova

  • Department of Mathematics and Computer Science, University of Perugia, Perugia, Italy

    Osvaldo Gervasi

  • William Norris Professor, Head of the Computer Science and Engineering Department, University of Minnesota, USA

    Vipin Kumar

  • OptimaNumerics Ltd., Belfast, UK

    C. J. Kenneth Tan

  • Clayton School of IT, Monash University, Clayton, Australia

    David Taniar

  • Department of Chemistry, University of Perugia, Perugia, Italy

    Antonio Laganá

  • School of Computing, Soongsil University, Seoul, Korea

    Youngsong Mun

  • School of Information and Communication Engineering, Sungkyunkwan University, Korea

    Hyunseung Choo

Bibliographic Information

Buying options

eBook USD 139.00
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions