This four-volume set synthesizes the International Conference on Computational Science and Its Applications, ICCSA 2010. Topics include computational methods, algorithms and scientific application, high performance computing and networks, and more.
表中的内容
Workshop on Chemistry and Materials Sciences and Technologies (CMST 2010).- Accurate Quantum Dynamics on Grid Platforms: Some Effects of Long Range Interactions on the Reactivity of N + N2.- Supporting Molecular Modeling Workflows within a Grid Services Cloud.- Distributed and Collaborative Learning Objects Repositories on Grid Networks.- Porting of GROMACS Package into the Grid Environment: Testing of a New Distribution Strategy.- Workshop on Biomathematics, Bioinformatics and Biostatistics (IBBB 2010).- Hashimoto’s Thyroiditis with Petri Nets.- Modelling of the Temporomandibular Joints and the Role of Medical Informatics in Stomatology.- Stability Analysis of an SVLI Epidemic Model.- A New Expert System for Diabetes Disease Diagnosis Using Modified Spline Smooth Support Vector Machine.- Workshop on Human and Information Space Symbiosis (IWHISS 2010).- Information Privacy in Smart Office Environments: A Cross-Cultural Study Analyzing the Willingness of Users to Share Context Information.- Implementation and Evaluation of Agent Interoperability Mechanism among Heterogeneous Agent Platforms for Symbiotic Computing.- B-Dash: Agent Platform for Mutual Cognition between Human and Agents.- An Extraction Method to Get a Municipality Event Information.- Design and Implementation of Adaptive Inter-platform Communication Mechanism for Agent-Based Framework in Ubiquitous Computing Environment.- An Effective Inference Method Using Sensor Data for Symbiotic Healthcare Support System.- 3D Collaboration Environment Based on Real Space and Digital Space Symbiosis.- Workshop on Information Retrieval, Security and Innovative Applications (RSIA 2010).- A Cryptographic Algorithm Based on Hybrid Cubes.- Java Implementation for Pairing-Based Cryptosystems.- On Selecting Additional Predictive Models in Double Bagging Type Ensemble Method.- Personalization of Search Profile Using Ant Foraging Approach.- A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application.- An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services.- Accelerating Video Identification by Skipping Queries with a Compact Metric Cache.- Estimating the Influence of Documents in IR Systems: A Marked Indexing Approach.- String Matching with Mismatches by Real-Valued FFT.- Encryption Methods for Restricted Data Limited in Value Range.- The Research for Spatial Role-Based Access Control Model.- Workshop on Collective Evolutionary Systems (IWCES 2010).- A Bidirectional Heuristic Search Technique for Web Service Composition.- Evolutionary Optimized Networks for Consensus and Synchronization.- Geospatial Analysis of Cooperative Works on Asymmetric Information Environment.- Emergent Stock Market Behaviour from a Multitude of Simple Agents.- A New Neural Network Based Customer Profiling Methodology for Churn Prediction.- General Track on Computational Methods, Algorithms and Applications.- Phonological Recoding in the Second Language Processing.- A Personalized CALL System Considering Users Cognitive Abilities.- Autonomic Resources Management of CORBA Based Systems for Transportation with an Agent.- Performance Evaluation of a Reservoir Simulator on a Multi-core Cluster.- Generating Parallel Random Sequences via Parameterizing EICGs for Heterogeneous Computing Environments.- Efficient Generation of Gray Codes for Reflectable Languages.- Pattern-Unit Based Regular Expression Matching with Reconfigurable Function Unit.- Availability Analysis of an IMS-Based Vo IP Network System.- Hybrid Genetic Algorithm for Minimum Dominating Set Problem.- Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.- Termination of Loop Programs with Polynomial Guards.- Development of Web Based Management Software for Safe Driving.- A Study on Comparative Analysis of the Information Security Management Systems.- Beacon-Based Cooperative Forwarding Scheme for Safety-Related Inter-Vehicle Communications.