Skip to main content
  • Conference proceedings
  • © 2005

Computational Science and Its Applications - ICCSA 2005

International Conference, Singapore, May 9-12, 2005, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3481)

Part of the book sub series: Theoretical Computer Science and General Issues (LNTCS)

Conference series link(s): ICCSA: International Conference on Computational Science and Its Applications

Conference proceedings info: ICCSA 2005.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (137 papers)

  1. Approaches or Methods of Security Engineering Workshop

    1. An Authenticated Key Exchange Mechanism Using One-Time Shared Key

      • Yonghwan Lee, Eunmi Choi, Dugki Min
      Pages 187-194
    2. Creation of Soccer Video Highlight Using the Caption Information

      • Oh-Hyung Kang, Seong-Yoon Shin
      Pages 195-204
    3. The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent

      • Jaeseon Ko, Bobby D. Gerardo, Jaewan Lee, Jae-Jeong Hwang
      Pages 205-214
    4. An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification

      • Minsoo Kim, Jae-Hyun Seo, Seung-Yong Lee, Bong-Nam Noh, Jung-Taek Seo, Eung-Ki Park et al.
      Pages 225-234
    5. A New Stream Cipher Using Two Nonlinear Functions

      • Mi-Og Park, Dea-Woo Park
      Pages 235-244
    6. New Key Management Systems for Multilevel Security

      • Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park
      Pages 245-253
    7. Security Risk Vector for Quantitative Asset Assessment

      • Yoon Jung Chung, InJung Kim, NamHoon Lee, Taek Lee, Hoh Peter In
      Pages 274-283
    8. A Remote Video Study Evaluation System Using a User Profile

      • Seong-Yoon Shin, Oh-Hyung Kang
      Pages 284-294
    9. HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment

      • Byung-kwan Lee, Am-Sok Oh, Eun-Hee Jeong
      Pages 322-331
    10. A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security

      • Chang-Dae Yoon, Seung-Yeon Lee, Myong-Chul Shin, Ho-Sung Jung, Jae-Sang Cha
      Pages 332-340
    11. Distribution Data Security System Based on Web Based Active Database

      • Sang-Yule Choi, Myong-Chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-hoon Kim, Jae-Sang Cha
      Pages 341-352
    12. Efficient DoS Resistant Multicast Authentication Schemes

      • JaeYong Jeong, Yongsu Park, Yookun Cho
      Pages 353-362
    13. Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets

      • Jaesang Cha, Kyungsup Kwak, Changdae Yoon, Chonghyun Lee
      Pages 373-380

About this book

The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size of many challenges in computational science, the use of supercomputing, parallel processing, and - phisticated algorithms is inevitable and becomes a part of fundamental t- oretical research as well as endeavors in emerging ?elds. Together, these far reaching scienti?c areas contribute to shape this Conference in the realms of state-of-the-art computational science research and applications, encompassing the facilitating theoretical foundations and the innovative applications of such results in other areas.

Editors and Affiliations

  • Department of Mathematics and Computer Science, University of Perugia, Perugia, Italy

    Osvaldo Gervasi

  • Department of Computer Science, University of Calgary, Calgary, Canada

    Marina L. Gavrilova

  • William Norris Professor, Head of the Computer Science and Engineering Department, University of Minnesota, USA

    Vipin Kumar

  • Department of Chemistry, University of Perugia, Perugia, Italy

    Antonio Laganà

  • Institute of High Performance Computing, IHCP, Singapore

    Heow Pueh Lee

  • School of Computing, Soongsil University, Seoul, Korea

    Youngsong Mun

  • Clayton School of IT, Monash University, Clayton, Australia

    David Taniar

  • OptimaNumerics Ltd, Belfast, United Kingdom

    Chih Jeng Kenneth Tan

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access