2007 International Conference on Computational Science and its Applications (ICCSA 2007)最新文献

筛选
英文 中文
A Tabu Search Algorithm using the Voronoi Diagram for the Capacitated Vehicle Routing Problem 基于Voronoi图的禁忌搜索算法求解有能力车辆路径问题
Yong-Ju Kwon, Jun-Gyu Kim, Jeongyeon Seo, Dong-Ho Lee, Deok-Soo Kim
{"title":"A Tabu Search Algorithm using the Voronoi Diagram for the Capacitated Vehicle Routing Problem","authors":"Yong-Ju Kwon, Jun-Gyu Kim, Jeongyeon Seo, Dong-Ho Lee, Deok-Soo Kim","doi":"10.1109/ICCSA.2007.11","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.11","url":null,"abstract":"We consider the capacitated vehicle routing problem that determines the routes of vehicles in such a way that each customer can be visited exactly once by one vehicle, starting and terminating at the depot while the vehicle capacity and the travel time constraints must be satisfied. The objective is to minimize the total traveling cost. Due to the complexity of the problem, we suggest a tabu search algorithm that combines the features of the exiting local search heuristics. In particular, our tabu search algorithm incorporates the method to reduce the neighborhoods using the proximity information of the Voronoi diagram corresponding to each problem instance. Computational experiments are done on the benchmark problems and the test results are reported.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"77 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120843011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Design and Implementation of Security Structure for Interactive Web Environment 交互式Web环境安全结构的设计与实现
Kyong-Ho Choi, Dong Hwi Lee, Kuinam J. Kim
{"title":"Design and Implementation of Security Structure for Interactive Web Environment","authors":"Kyong-Ho Choi, Dong Hwi Lee, Kuinam J. Kim","doi":"10.1109/ICCSA.2007.84","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.84","url":null,"abstract":"In the rapid development of information technology, today's internet environment has been changing dynamically including various technologies and services while reinforcing the interaction between Web and users more than before. But in the change of this Web service environment, the matter of security of common Web application can happen: Moreover, additional matters of security are to happen in the process to draw the applications to the web platform which makes it possible to execute them anywhere in order to provide the dynamic service reinforced with its interaction, which has become a serious threat to the information security. Therefore, this study suggested the security structure applicable in the interaction-reinforced web environment while designing and inspecting vicious attack detection system which detects the aggressive contents by using Whitebox approach, real-time Web traffic monitoring, and deep packet inspection.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133746257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Example of a Potential Grid technology Application in Shipbuilding 网格技术在造船中的潜在应用实例
A. Bogdanov, A. Degtyarev, E. Stankova
{"title":"Example of a Potential Grid technology Application in Shipbuilding","authors":"A. Bogdanov, A. Degtyarev, E. Stankova","doi":"10.1109/ICCSA.2007.36","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.36","url":null,"abstract":"The paper is dedicated to the potential application of the grid technology for the modeling of spatial- temporal wave and wind field characteristics (wave climate modeling). With reference to shipbuilding wave climate knowledge is necessary while ship and engineering offshore construction development and operation. Software complex for wave climate calculations represents a set of physical- mathematical models, describing wave and wind frequency- directional spectra, including input meteorological data pre-processing and post-processing of the output data. The technology of the distributed calculations, grid technology, will provide simulation of the complex problems using remote heterogeneous computational resources, with the simultaneous visualization of the large volumes of the scientific data. Distributed data processing and analyses will provide interconnection of the scientific tools with remote computers and data bases.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constructing a Cluster-Based M-Learning Architecture in Mobile Ad Hoc Networks Using MPEG-21 基于MPEG-21构建移动自组织网络中基于集群的移动学习体系结构
Hua-Yi Lin, Zhi-Ren Qiu, De-Jun Pan, Xin-Xiang Zha
{"title":"Constructing a Cluster-Based M-Learning Architecture in Mobile Ad Hoc Networks Using MPEG-21","authors":"Hua-Yi Lin, Zhi-Ren Qiu, De-Jun Pan, Xin-Xiang Zha","doi":"10.1109/ICCSA.2007.9","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.9","url":null,"abstract":"Nowadays, owing to the convenience of mobile devices in our surroundings such as the PDA (personal digital assistant), cell phones, and laptops, there is a tendency toward m-learning (mobile learning) in anywhere. However, m-learning has many constraints including the computing power of mobile devices, network quality of services, and suitable learning tools. Especially, how to provide an effective and convenient platform on different mobile devices is a troublesome problem. In this paper, we propose a cluster-based m-learning architecture to achieve dynamic learning groups, and exploit MPEG-21 methods to carry out the goal.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116675943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Difficulties of Using Design Patterns among Novices: An Exploratory Study 新手使用设计模式的困难:一项探索性研究
M. Jalil, S. Noah
{"title":"The Difficulties of Using Design Patterns among Novices: An Exploratory Study","authors":"M. Jalil, S. Noah","doi":"10.1109/ICCSA.2007.32","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.32","url":null,"abstract":"Elements of design patterns have been incorporated in computer science syllabus. Most of these efforts have been motivated by the benefits offered by patterns as well as positive feedback from the industry and software community. Despite various techniques and approaches suggested by researchers and educators to ensure effective learning of patterns, there is no formal reports on the actual difficulties encountered by these novices when applying patterns. Thus, we have conducted an exploratory study to identify the difficulties they have in using patterns.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Quantum vs Semiclassical Dynamics Approaches from highly symmetric to asymmetric reactions 从高度对称到非对称反应的量子与半经典动力学方法
N. F. Lago, A. Laganà, F. Huarte-Larrañaga
{"title":"Quantum vs Semiclassical Dynamics Approaches from highly symmetric to asymmetric reactions","authors":"N. F. Lago, A. Laganà, F. Huarte-Larrañaga","doi":"10.1109/ICCSA.2007.35","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.35","url":null,"abstract":"The theoretical and computational machinery of a code based on the semiclassical initial value representation approach has been revisited to introduce the possibility of dealing with asymmetric systems and using non commercial routines. To validate the code a comparison of the cumulative reaction probability with quantum calculations by considering as a case study the H + H2 prototype reaction has been performed.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time Rendering of Multi-View Images from a Single Image with Depth 从具有深度的单个图像中实时渲染多视图图像
Kyoungsu Oh, Hyowon Kim, Chulhan Lee, Hyunwoo Ki
{"title":"Real-Time Rendering of Multi-View Images from a Single Image with Depth","authors":"Kyoungsu Oh, Hyowon Kim, Chulhan Lee, Hyunwoo Ki","doi":"10.1109/ICCSA.2007.47","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.47","url":null,"abstract":"Image reprojection is a technique to generate novel images by projecting a reference image of an arbitrary view. Previous image reprojection methods often run on the CPU, but these approaches take high-cost for rendering. We present a real-time image reprojection method using the GPU entirely. From given a reference image and its depth image of the scene prerendered, we generate novel images at arbitrary view points without the original geometry data. We render a simple plane at a novel view, and for each pixel being rendered, we make a ray that faces the opposite direction of the view. Then, we transform the ray to reference image space and trace the ray through a depth image to find an intersection, using a recently proposed method. In our experience, we archived tens of frames per second and it was independent from the complexity of the scene.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125157626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Formal Model for Security-Aware dynamic Web Services Composition 安全感知动态Web服务组合的形式化模型
Dong-Hong Xu, Yong Qi, Di Hou, Ying Chen, Liang Liu
{"title":"A Formal Model for Security-Aware dynamic Web Services Composition","authors":"Dong-Hong Xu, Yong Qi, Di Hou, Ying Chen, Liang Liu","doi":"10.1109/ICCSA.2007.23","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.23","url":null,"abstract":"Recently, there are imminent requirements to security policies in dynamic Web services composition, so there appear many security specifications. The requirements of security characters are not always constant and the security specifications will need to modify according to the security requirements, however, there is no a uniform formal foundation to support numerous security specifications, it will block the application of these security policies, which have not been deeply investigated so far. To solve these problems, in this paper, we advocate to apply Spi calculus to describe and reason the security properties, for convenience describe and reason we separate security into security enhancing capability and security limiting constraint. Meanwhile we find the original Spi calculus can't completely to solve the properties in security-aware Web service composition. In success, we extend the syntax and semantic of Spi calculus, named SpiWeb calculus, to adapt the security-aware dynamic web service composition. Finally as a case study, the online banking system, we apply the SpiWeb calculus to describe and analysis the security features of this system.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Facial Expression Recognition using KCCA with Combining Correlation Kernels and Kansei Information 结合相关核和感性信息的KCCA面部表情识别
Yoshimasa Horikawa
{"title":"Facial Expression Recognition using KCCA with Combining Correlation Kernels and Kansei Information","authors":"Yoshimasa Horikawa","doi":"10.1109/ICCSA.2007.78","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.78","url":null,"abstract":"Kernel canonical correlation analysis (kCCA) with combining correlation kernels of multiple-orders and Kansei information is applied to facial expression recognition. Any explicit feature extraction is done and spatial correlation features of image data are implicitly incorporated in the correlation kernels. Further, Kansei information is included as the second feature in kCCA. Classification experiments with JAFFE database show that, although the use of Kansei information in itself gives lower classification performance than class indicators optimal for classification tasks, combining Kansei information with them makes the classification performance higher than the only use of the indicators.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128383078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Time evolution of perturbed solitons of modified Kadomtsev-Petviashvili equations 修正Kadomtsev-Petviashvili方程摄动孤子的时间演化
S. Phibanchon, M. A. Allen
{"title":"Time evolution of perturbed solitons of modified Kadomtsev-Petviashvili equations","authors":"S. Phibanchon, M. A. Allen","doi":"10.1109/ICCSA.2007.71","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.71","url":null,"abstract":"We solve the (2+1)-dimensional Schamel-Kadomtsev- Petviashvili equations with negative and positive dispersion numerically with one or two perturbed plane solitons as initial conditions. In the negative dispersion case, the plane soliton is stable and retains its identity. For the equation with positive dispersion, the plane solitons decay into two- dimensional lump solitons. We show that in contrast to one- dimensional solitons, collisions between two lump solitons are far from elastic. We also demonstrate that the solitons emerging from the collision can be very sensitive to the alignment of the solitons prior to collision.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信