Table of Contents - Part II
Total Page:16
File Type:pdf, Size:1020Kb
Table of Contents - Part II Workshop on Software Engineering Processes and Applications (SEPA 2009) Ontology-Based Requirements Conflicts Analysis in Activity Diagrams 1 Chi-Lun Liu Resource Allocation Optimization for GSD Projects 13 Supraja Doma, Larry Gottschalk, Tetsutaro Uehara, and Jigang Liu Verification of Use Case with Petri Nets in Requirement Analysis 29 Jinqiang Zhao and Zhenhua Duan Towards Guidelines for a Development Process for Component-Based Embedded Systems 43 Rikard Land, Jan Carlson, Stig Larsson, and Ivica Crnkovic Effective Project Leadership in Computer Science and Engineering 59 Ferid Cafer and Sanjay Misra Weyuker's Properties, Language Independency and Object Oriented Metrics 70 Sanjay Misra Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009) Lattice Constant Prediction of A2BB'O6 Type Double Perovskites 82 Abdul Majid, Muhammad Farooq Ahmad, and Tae-Sun Choi A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients 93 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Direct Quantum Calculations of Rate Coefficients 104 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Chimère: Ozone Production in Central Italy 115 Antonio Lagana, Stefano Crocchianti, Alessandro Costantini, Monica Angelucci, and Marco Vecchiocattivi Bibliografische Informationen digitalisiert durch http://d-nb.info/994394675 XIV Table of Contents - Part II Workshop on Internet Communication Security (WICS 2009) MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT 130 Sergio Pozo, A.J. Várela-Vaca, and Rafael M. Gasea Testing Topologies for the Evaluation of IPSEC Implementations 145 Fernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, and Amparo Fúster-S'abater Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key 155 Miguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda, and Héctor Plaza López Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009) Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-Server Environment 164 Youngsook Lee and Dongho Won Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords 173 Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, and Ung Mo Kim Smart Card Based AKE Protocol Using Biometrie Information in Pervasive Computing Environments 182 Wansuck Yi, Seungjoo Kim, and Dongho Won A Practical Approach to a Reliable Electronic Election 191 Kwangwoo Lee, Yunho Lee, Seungjoo Kim, and Dongho Won Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key 204 Mijin Kim, Heasuk Jo, Seungjoo Kim, and Dongho Won Workshop on Mobile Communications (MC 2009) Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments 212 Eun Cheol Kim and Jin Young Kim Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System 226 Eun Cheol Kim and Jin Young Kim Table of Contents - Part II XV Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition 237 Bum-Gon Choi, Sueng Jae Bae, Tae-Jin Lee, and Min Young Chung A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System 250 Sueng Jae Bae, Jin Ju Lee, Bum-Gon Choi, Sungoh Kwon, and Min Young Chung Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes 261 Katarzyna Kosek, Marek Natkaniec, and Luca Vollero Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System 276 Jong Sung Lee and Dong In Kim WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up 286 Jung-Hyun Kim, Hyeong-Joon Kwon, and Kwang-Seok Hong Overlay Ring Based Secure Group Communication Scheme for Mobile Agents 302 Hyunsu Jang, Kwang Sun Ko, Young-woo Jung, and Young Ik Eom Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems 314 Dahae Chong, Taeung Yoon, Youngyoon Lee, Chonghan Song, Myungsoo Lee, and Seokho Yoon AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization 325 Youngpo Lee, Youngyoon Lee, Taeung Yoon, Chonghan Song, Sanghun Kim, and Seokho Yoon Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol 335 Jin-Seong Kim and Tae-Jin Lee Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks 345 Seong-Soo Park, Jong-Hyouk Lee, and Tai-Myoung Chung On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors 361 Moonseong Kim and Matt W. Mutka XVI Table of Contents Part II Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code 372 Taekhoon Kim and Dong In Kim Design of an Efficient Multicast Scheint1 for Vehicular Telematics Networks 383 Junghoon Lee, In-Hye Shin. Hye-Jin Kim. M in-Jae Hang, and Sang Joon Kim ODDUGI: Ubiquitous Mobile Agent System 393 SiingJin Choi, Hyunseung Choo, MaengSoon Bnik. HongSoo Kim. and EunJoung Byun Determination of the Optimal Hop Number for Wireless Sensor Networks 408 Jin Wang and Young-Koo Lee Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models 419 Viet-Due Lr. Young-Koo Lee, and Sungyoung Lee A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs 432 Jin Wang and Sungyoung Lee Analysis of Moving Patterns of Moving Objects with the Proposed Framework 443 In-Hye Shin. Gyung-Le.cn Park. Abhijit Sofia. Ho-young Kwak. and Hanil Kim A User-Defined Index for Containment Queries in XML 453 Gap-Joo iVo and Sang- Won Lee On Optimal Placement of the Monitoring Devices on Channels of Communication Network 465 Alexey Rodionov. Olga Sokolova. Anastasia Yurgenson, and Hyunseung Choo Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks 479 Seungtak Oh and Hyunseung Choo A Capacity Aware Data Transport Protocol for Wireless Sensor Network 491 Md. Obaidur Rahman, Muhammad Mostafa Monowar. and Choong Seon Hong Table of Contents - Part II XVII Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs) 503 Abhijit Saha, Gyung-Leen Park, Khi-Jung Ahn, Chul Soo Kim, Bongkyu Lee, and Yoon-Jung Rhee VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems 513 Junwoo Jung, Hoki Baek. and Jaesung Lim Towards Location-Based Real-Time Monitoring Systems in u-LBS 525 MoonBae Song and Hyunseung Choo General Track on Computational Methods, Algorithms and Applications A Fast Approximation Algorithm for the k Partition-Distance Problem 537 Yen Hung Chen A PSO - Line Search Hybrid Algorithm 547 Aiming Liang, Xiang Li, and M. Fikret Ercan Using Meaning of Coefficients of the Reliability Polynomial for Their Faster Calculation 557 Alexey Rodionov, Olga Rodionova, and Hyunseung Choo A Novel Tree Graph Data Structure for Point Datasets 572 Saeed Behzadi, Ali A. Alesheikh. and Mohammad R. Malek Software Dependability Analysis Methodology 580 Beoungil Cho. Hyunsang Youn, and Eunseok Lee New Approach for the Pricing of Bond Option Using the Relation between the HJM Model and the BGM Model 594 Kisoeb Park, Seki Kim, and William T. Shaw Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus 605 Xiaojuan Cai and Yonggen Gu YAO: A Software for Variational Data Assimilation Using Numerical Models 621 Luigi Nardi, Charles Sorror. Fouad Badran. and Sylvie Thiria General Track on High Performance Technical Computing and Networks CNP: A Protocol for Reducing Maintenance Cost of Structured P2P ... 637 Yu Zhang, Yuanda Cao, and Baodong Cheng XVIII Table of Contents - Part II A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control 653 Youqiang Guo, Zijun Zhang, and Xuezhu Pei On-Demand Chaotic Neural Network for Broadcast Scheduling Problem 664 Kushan Ahmadian and Marina Gavrilova General Track on Advanced and Emerging Applications Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones 677 Feng Qian, Qinming He, and Jiangfeng He Computerized Detection of Pulmonary Nodule Based on Two- Dimensional PCA 693 Wook-Jin Choi, Abdul Majid, and Tae-Sun Choi Computational Measurements of the Transient Time and of the Sampling Distance That Enables Statistical Independence in the Logistic Map 703 Adriana Vlad, Adrian Luca, and Madalin Frunzete Future Personal Health Records as a Foundation for Computational Health 719 Robert Steele and Amanda Lo SVM Based Decision Analysis and Its Granular-Based Solving 734 Tian Yang, Xinjie Lu, Zaifei Liao, Wei Liu, and Hongan Wang Fast Object Tracking in Intelligent Surveillance System 749 Ki-Yeol Eom, Tae-Ki Ahn, Gyu-Jin Kim, Gyu-Jin Jang, and Moon-hyun Kim A Reliable Skin Detection Using Dempster-Shafer Theory of Evidence 764 Mohammad Shoyaib, Mohammad Abdullah-Al-Wadud, and Oksam Chae Video Shot Boundary Detection Using Generalized Eigenvalue Decomposition 780 Ali Amiri and Mahmood Fathy Content Quality Assessment Related Frameworks for Social Media 791 Kevin Chai, Vidyasagar Potdar, and Tharam Dillon Weighted Aspect Moment Invariant in Pattern Recognition 806 Rela Puteri Pamungkas and Siti Mariyam Shamsuddin Table of Contents - Part II XIX Multiple Object Types KNN Search Using Network