Computational science and its applications --- ICCSA 2004. International conference, Assisi, Italy, May 14--17, 2004. Proceedings, Part I. (Q1890035)

From MaRDI portal





scientific article; zbMATH DE number 2123471
Language Label Description Also known as
English
Computational science and its applications --- ICCSA 2004. International conference, Assisi, Italy, May 14--17, 2004. Proceedings, Part I.
scientific article; zbMATH DE number 2123471

    Statements

    Computational science and its applications --- ICCSA 2004. International conference, Assisi, Italy, May 14--17, 2004. Proceedings, Part I. (English)
    0 references
    17 December 2004
    0 references
    The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1049.68010; Zbl 1049.68009; Zbl 1049.68008). Indexed articles: \textit{Choi, YoungSik; Kim, KiJoo}, Video summarization using fuzzy one-class support vector machine, 49-56 [Zbl 1108.68553] \textit{Kang, KyungWoo}, A study on generating an efficient bottom-up tree rewrite machine for JBurg, 65-72 [Zbl 1108.68478] \textit{Jo, Jang-Wu; Chang, Byeong-Mo}, Constructing control flow graph for Java by decoupling exception flow from normal flow, 106-113 [Zbl 1107.68390] \textit{Kim, ChangKyun; Ha, JaeCheol; Kim, Sung-Hyun; Kim, Seokyu; Yen, Sung-Ming; Moon, SangJae}, A secure and practical CRT-based RSA to resist side channel attacks, 150-158 [Zbl 1107.68416] \textit{Oh, Young-Hwan; Bae, Hae-Young}, MLS/SDM: Multi-level secure spatial data model, 222-229 [Zbl 1107.68419] \textit{Kim, Seonho; Yoon, Miyoun; Shin, Yongtae}, Placement algorithm of web server replicas, 328-336 [Zbl 1108.68331] \textit{You, Young-Hwan; Jang, Tae-Won; Kang, Min-Goo; Lee, Hyung-Woo; Lim, Hwa-Seop; Choi, Yong-Soo; Song, Hyoung-Kyu}, Performance limitation of STBC OFDM-CDMA systems in mobile fading channels, 386-393 [Zbl 1108.68321] \textit{Song, Hyoung-Kyu; Kang, Min-Goo; Lee, Ou-Seb; Joo, Pan-Yuh; Cho, We-Duke; Kim, Mi-Jeong; You, Young-Hwan}, PMEPR reduction algorithms for STBC-OFDM signals, 394-401 [Zbl 1108.94300] \textit{Kwak, JaeMin; Kang, HeeGok; Cho, SungEon; Yoe, Hyun; Koh, JinGwang}, An efficient image transmission system adopting OFDM based sequence reordering method in non-flat fading channel, 402-409 [Zbl 1108.68473] \textit{Park, Sangjoon; Jeong, Eunjoo; Kim, Byunggi}, Reducing link loss in ad hoc networks, 418-425 [Zbl 1108.68315] \textit{Choi, Kee-Hyun; Jang, Kyung-Soo; Shin, Dong-Ryeol}, Delay and collision reduction mechanism for distributed fair scheduling in wireless LANs, 434-441 [Zbl 1108.68335] \textit{Hwang, Yong Ho; Sim, Sang Gyoo; Lee, Pil Joong}, Bit-serial multipliers for exponentiation and division in \(\text{GF}(2^{m})\) using irreducible AOP, 442-450 [Zbl 1108.68628] \textit{Kim, Haeng-Kon; Kim, Tai-Hoon}, Design on mobile secure electronic transaction protocol with component based development, 461-470 [Zbl 1108.68461] \textit{Yum, Dae Hyun; Lee, Pil Joong}, A distributed online certificate status protocol based on GQ signature scheme, 471-480 [Zbl 1108.68471] \textit{Yoo, Hyeong Seon; Lee, Dongryeol}, Computation of multiplicative inverses in \(\text{GF}(2^{n})\) using palindromic representation, 510-516 [Zbl 1108.68629] \textit{Park, IkSu; Park, SeungBae; Oh, ByeongKyun}, User authentication protocol based on human memorable password and using RSA, 527-536 [Zbl 1108.94314] \textit{Park, Yongsu; Lee, Jaeheung; Cho, Yookun}, Intrusion detection using noisy training data, 547-556 [Zbl 1108.68559] \textit{Nam, Junghyun; Cho, Seokhyang; Kim, Seungjoo; Won, Dongho}, Simple and efficient group key agreement based on factoring, 645-654 [Zbl 1108.68464] \textit{Kim, Young-Sin; Huh, Eui-Nam; Hwang, Jun; Lee, Byung-Wook}, An efficient key agreement protocol for secure authentication, 746-754 [Zbl 1108.94313] \textit{Yum, Dae Hyun; Lee, Pil Joong}, Generic construction of certificateless encryption, 802-811 [Zbl 1108.68472] \textit{Lindskog, Stefan; Strandbergh, Johan; Hackman, Mikael; Jonsson, Erland}, A content-independent scalable encryption model, 821-830 [Zbl 1108.68463] \textit{Estévez-Tapiador, Juan M.; García-Teodoro, Pedro; Díaz-Verdejo, Jesús E.}, N3: A geometrical approach for network intrusion detection at the application layer, 841-850 [Zbl 1108.68326] \textit{Sierra, José M.; Hernández, Julio C.; Alcaide, Almudena; Torres, Joaquín}, Validating the use of BAN LOGIC, 851-858 [Zbl 1108.94315] \textit{García Villalba, Luis Javier}, Use of spectral techniques in the design of symmetrical cryptosystems, 859-867 [Zbl 1108.94310] \textit{Kim, Jeeyeon; Kim, Seungjoo; Kwak, Jin; Won, Dongho}, Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords, 895-902 [Zbl 1107.68417] \textit{Mejri, Mohamed}, Chaotic protocols, 938-948 [Zbl 1107.94406] \textit{Hernandez, Julio C.; Sierra, José María; Seznec, Andre}, The SAC test: A new randomness test, with some applications to PRNG analysis, 960-967 [Zbl 1107.65300] \textit{Park, Taehyung; Lee, Sangkeon}, A Bayesian approach for estimating link travel time on urban arterial road network, 1017-1025 [Zbl 1107.90328] \textit{Bang, Young-Cheol; Hong, Inki; Lee, Sungchang; Ahn, Byungjun}, On algorithms for minimum-cost quickest paths with multiple delay-bounds, 1125-1133 [Zbl 1107.68305] \textit{Kim, Hyun Gon; Choi, Doo Ho}, Session key exchange based on dynamic security association for Mobile IP fast handoff, 1151-1158 [Zbl 1107.68318]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references