Computer and Information Sciences - ISCIS 2006, 2006
21th International Symposium Istanbul, Turkey, Novenber 1-3, 2006, Proceedings

Coll. Theoretical Computer Science and General Issues

Coordinators: Levi Albert, Savas Erkay, Yenigün Hüsnü, Balcisoy Selim, Saygin Yücel

Language: French

116.00 €

Subject to availability at the publisher.

Add to cartAdd to cart
Publication date:
1088 p. · 15.5x23.5 cm · Paperback

This book constitutes the refereed proceedings of the 21st International Symposium on Computer and Information Sciences, ISCIS 2006, held in Istanbul, Turkey in October 2006.

The 106 revised full papers presented together with five invited lectures were carefully reviewed and selected from 606 submissions.

Invited Papers and Talks.- Analysis of Automated Auctions.- Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications.- Requirements Engineering as a Key to Holistic Software Quality.- Invited Talks.- Problems and Challenges of Image-Guided Neurosurgical Navigation and Intervention.- Information and Communication Technologies in the EU’s Seventh Framework Programme.- Algorithms and Theory.- The Greedy Prepend Algorithm for Decision List Induction.- Heuristics for Minimum Brauer Chain Problem.- Dispatching Rules for Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards.- Heuristic Approach to Schedule Crew for a Regional Airline.- Automatic Segmentation of the Liver in CT Images Using a Model of Approximate Contour.- Unambiguous 3D Measurements by a Multi-period Phase Shift Method.- Hybrid Techniques for Dynamic Optimization Problems.- Minimizing the Search Space for Shape Retrieval Algorithms.- Decision Support for Packing in Warehouses.- A Fast Partial Distortion Elimination Algorithm Using Selective Matching Scan.- Variable Neighborhood Search for the Orienteering Problem.- Bioinformatics.- Extracting Gene Regulation Information from Microarray Time-Series Data Using Hidden Markov Models.- Asymptotical Lower Limits on Required Number of Examples for Learning Boolean Networks.- Modified Association Rule Mining Approach for the MHC-Peptide Binding Problem.- Prediction and Classification for GPCR Sequences Based on Ligand Specific Features.- An Efficient Algorithm for the Identification of Repetitive Variable Motifs in the Regulatory Sequences of Co-expressed Genes.- Computational Intelligence.- An Intelligent Shopping Agent for Optimal Purchasing Decision on the Semantic Web.- Adapting the Pyramid Technique for Indexing Ontological Data.- Comparison of Different Neural Networks Performances on Motorboat Datasets.- Dynamic Role Assignment for Multi-agent Cooperation.- Lexical Ambiguity Resolution for Turkish in Direct Transfer Machine Translation Models.- Design of a Feature Set for Face Recognition Problem.- Computer Architecture.- Low-Cost Microarchitectural Techniques for Enhancing the Prediction of Return Addresses on High-Performance Trace Cache Processors.- Recovery Logics for Speculative Update Global and Local Branch History.- An ILP Formulation for Task Scheduling on Heterogeneous Chip Multiprocessors.- Hardware Designs for Local Alignment of Protein Sequences.- A New Model of BAM: Alpha-Beta Bidirectional Associative Memories.- Computer Graphics.- PARM: Data Structure for Efficient Volume Ray Casting.- Triangle Propagation for Mass-Spring Chain Algorithm.- Hardware Acceleration of Terrain Visualization Using ef-Buffers.- Computer Simulation of Woven Fabric Defects Based on Faulty Yarn Photographs.- Bidirectional Distancemap for Efficient Volume Ray Casting.- Segmenting Free-Form 3D Objects by a Function Representation in Spherical Coordinates.- Applying Natural Neighbor Coordinates for Electromagnetic Tracker Calibration.- Minkowski Sum Based Octree Generation for Triangular Meshes.- Hardware-Oriented Visualisation of Trees.- A Multi-resolution Technique for Real-time Animation of Large Crowds.- A Framework for Working with Digitized Cultural Heritage Artifacts.- Computer Networks.- On the Stability of Application-Layer Multicast Tree.- Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks.- A New Function for Optimization of Working Paths in Survivable MPLS Networks.- HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes.- Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time Communication.- A Model of a Packet Aggregation System.- On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network Traffic.- Throughput Analysis of UDP and VPN Traffic in 802.11g Networks.- Path Loss Rate Driven Burst Assembly in OBS Networks.- Computer Vision.- Pixel Domain Spatio-temporal Denoising for Archive Videos.- Fast Sub-pixel Motion Estimation by Means of One-Bit Transform.- Neighborhood Decomposition of Convex Structuring Elements for Mathematical Morphology on Hexagonal Grid.- Block Motion Estimation Using Modified Two-Bit Transform.- 3D Face Tracking Using Appearance Registration and Robust Iterative Closest Point Algorithm.- Video as Input: Spiral Search with the Sparse Angular Sampling.- An Adept Segmentation Algorithm and Its Application to the Extraction of Local Regions Containing Fiducial Points.- Lossless Compression of Volumetric Medical Data.- Identification of Luminal and Medial Adventitial Borders in Intravascular Ultrasound Images Using Level Sets.- Data Mining.- Prediction of Moving Object Location Based on Frequent Trajectories.- A Framework for Visualizing Association Mining Results.- Databases.- Credential-Based Policies Management in an Access Control Framework Protecting XML Resources.- Evaluating Proposals in Web Services Negotiation.- Nested Bitemporal Relational Algebra.- A Protocol for Reconciling Recovery and High-Availability in Replicated Databases.- Migrating a Hierarchical Legacy Database Application onto an XML-Based Service-Oriented Web Platform.- Embedded Systems.- Power-Aware Processors for Wireless Sensor Networks.- Effects of Asynchronism and Neighborhood Size on Clustering in Self-propelled Particle Systems.- Virtual-ROM: A New Demand Paging Component for RTOS and NAND Flash Memory Based Mobile Devices.- Model-Driven Development of RTOS-Based Embedded Software.- Information Retrieval.- A Target Oriented Agent to Collect Specific Information in a Chat Medium.- Algorithms for Within-Cluster Searches Using Inverted Files.- Effect of Inverted Index Partitioning Schemes on Performance of Query Processing in Parallel Text Retrieval Systems.- Exploiting Social Networks Dynamics for P2P Resource Organisation.- Security Considerations in e-Cognocracy.- Mobile Computing.- A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol Performance.- A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing.- Camera-Based Virtual Environment Interaction on Mobile Devices.- A Cost Model for an Adaptive Cell-Based Index Structure.- Positioning Method for Outdoor Systems in Wireless Sensor Networks.- Parallel and Distributed Computing.- Formal Description of a Runtime Infrastructure for Automatic Distribution of Programs.- Super-Peer Selection Based Framework Using Dynamic Capacity and Similarity.- A General Graph Model for Representing Exact Communication Volume in Parallel Sparse Matrix–Vector Multiplication.- Safety of Rollback-Recovery Protocol Maintaining WFR Session Guarantee.- 3-D Parallel Implementation of the Wave-Equation PML Algorithm Using Distributed System.- Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM.- jEQN a Java-Based Language for the Distributed Simulation of Queueing Networks.- Exact Performance Measures for Peer-to-Peer Epidemic Information Diffusion.- A Leader Election Protocol for Timed Asynchronous Distributed Systems.- Performance Evaluation.- Computing the Steady-State Distribution of G-networks with Synchronized Partial Flushing.- Worst-Case Analysis of Router Networks with Rival Queueing Models.- Security and Cryptography.- An Anomaly Intrusion Detection Approach Using Cellular Neural Networks.- A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers.- Improved Merkle Cryptosystem (IMC).- Threshold Cryptography Based on Asmuth-Bloom Secret Sharing.- Capture Resilient ElGamal Signature Protocols.- A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks.- A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps.- A Non-committing Encryption Scheme Based on Quadratic Residue.- Biometric Cryptosystem Using Online Signatures.- Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography.- A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity.- Deterministic Analysis of Balancedness in Symmetric Cryptography.- Test Suite Reduction Based on Dependence Analysis.- Realism in Project-Based Software Engineering Courses: Rewards, Risks, and Recommendations.- Problems of Adiabatic Quantum Program Design.- Modified Cognitive Complexity Measure.- Coverage-Based, Prioritized Testing Using Neural Network Clustering.- Component Oriented Design Based on Axiomatic Design Theory and COSEML.