21. ISCIS 2006:
Istanbul,
Turkey
Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy, Yücel Saygin (Eds.):
Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings.
Lecture Notes in Computer Science 4263 Springer 2006, ISBN 3-540-47242-8
Invited Papers and Talks
Invited Talks
- Jacques G. Verly, Martin Kavec, Lara M. Vigneron, Christophe Phillips, Romain Boman, Vincent Libertiaux, Jean-Philippe Ponthot, Serge Cescotto, Pierre Robe, Didier Martin, David Wikler, Marc Levivier, Jacques Brotchi:
Problems and Challenges of Image-Guided Neurosurgical Navigation and Intervention.
35
- Eric Badiqué:
Information and Communication Technologies in the EU's Seventh Framework Programme.
36
Algorithms and Theory
- Deniz Yuret, Michael de la Maza:
The Greedy Prepend Algorithm for Decision List Induction.
37-46
- Fatih Gelgi, Melih Onus:
Heuristics for Minimum Brauer Chain Problem.
47-54
- Mehmet Bayram Yildirim, Ekrem Duman, Dilek Duman:
Dispatching Rules for Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards.
55-64
- Byung Tech Kim, Young Hoon Lee:
Heuristic Approach to Schedule Crew for a Regional Airline.
65-74
- Marcin Ciecholewski, Krzysztof Debski:
Automatic Segmentation of the Liver in CT Images Using a Model of Approximate Contour.
75-84
- Erik Lilienblum, Bernd Michaelis:
Unambiguous 3D Measurements by a Multi-period Phase Shift Method.
85-94
- Demet Ayvaz, Haluk Topcuoglu, Fikret S. Gürgen:
Hybrid Techniques for Dynamic Optimization Problems.
95-104
- Mohammad Abdullah-Al-Wadud, Oksam Chae:
Minimizing the Search Space for Shape Retrieval Algorithms.
105-114
- Gürdal Ertek, Kemal Kilic:
Decision Support for Packing in Warehouses.
115-124
- Jong-Nam Kim, Tae-Kyung Ryu, Yongjae Jeong:
A Fast Partial Distortion Elimination Algorithm Using Selective Matching Scan.
125-133
- Zülal Sevkli, Fatih Erdogan Sevilgen:
Variable Neighborhood Search for the Orienteering Problem.
134-143
Bioinformatics
- Osman N. Yogurtçu, Engin Erzin, Attila Gürsoy:
Extracting Gene Regulation Information from Microarray Time-Series Data Using Hidden Markov Models.
144-153
- Osman Abul, Reda Alhajj, Faruk Polat:
Asymptotical Lower Limits on Required Number of Examples for Learning Boolean Networks.
154-164
- Galip Gürkan Yardimci, Alper Küçükural, Yücel Saygin, Osman Ugur Sezerman:
Modified Association Rule Mining Approach for the MHC-Peptide Binding Problem.
165-173
- Bekir Ergüner, Özgün Erdogan, Osman Ugur Sezerman:
Prediction and Classification for GPCR Sequences Based on Ligand Specific Features.
174-181
- Abanish Singh, Nikola Stojanovic:
An Efficient Algorithm for the Identification of Repetitive Variable Motifs in the Regulatory Sequences of Co-expressed Genes.
182-191
Computational Intelligence
- Hak-Jin Kim, Wooju Kim, Jungmyong Kim:
An Intelligent Shopping Agent for Optimal Purchasing Decision on the Semantic Web.
192-201
- Övünç Öztürk, Tugba Özacar, Murat Osman Ünalir, Ata Önal:
Adapting the Pyramid Technique for Indexing Ontological Data.
202-211
- M. Fatih Amasyali, Mert Bal, Ugur B. Çelebi, Serkan Ekinci, U. Kasif Boyaci:
Comparison of Different Neural Networks Performances on Motorboat Datasets.
212-220
- In-Cheol Kim:
Dynamic Role Assignment for Multi-agent Cooperation.
221-229
- A. Cüneyd Tantug, Esref Adali, Kemal Oflazer:
Lexical Ambiguity Resolution for Turkish in Direct Transfer Machine Translation Models.
230-238
- Emre Akbas, Fatos T. Yarman-Vural:
Design of a Feature Set for Face Recognition Problem.
239-247
Computer Architecture
Computer Graphics
- Sukhyun Lim, Byeong-Seok Shin:
PARM: Data Structure for Efficient Volume Ray Casting.
296-305
- Alpaslan Duysak:
Triangle Propagation for Mass-Spring Chain Algorithm.
306-315
- Hyun-Duk Chang, Byeong-Seok Shin:
Hardware Acceleration of Terrain Visualization Using ef-Buffers.
316-324
- Hakan Özdemir, Güngör Baser:
Computer Simulation of Woven Fabric Defects Based on Faulty Yarn Photographs.
325-333
- Sukhyun Lim, Byeong-Seok Shin:
Bidirectional Distancemap for Efficient Volume Ray Casting.
334-342
- Olcay Sertel, Cem Ünsalan:
Segmenting Free-Form 3D Objects by a Function Representation in Spherical Coordinates.
343-352
- Yi Li, Weidong Chen, Dongming Lu, Lei Zhao:
Applying Natural Neighbor Coordinates for Electromagnetic Tracker Calibration.
353-362
- Engin Deniz Diktas, Ali Vahit Sahiner:
Minkowski Sum Based Octree Generation for Triangular Meshes.
363-373
- Cristina Rebollo, Inmaculada Remolar, Miguel Chover, Jesús Gumbau:
Hardware-Oriented Visualisation of Trees.
374-383
- Ingu Kang, Young Ik Eom, JungHyun Han:
A Multi-resolution Technique for Real-time Animation of Large Crowds.
384-393
- Can Ozmen, Selim Balcisoy:
A Framework for Working with Digitized Cultural Heritage Artifacts.
394-400
Computer Networks
- Ke Xu, Jiangchuan Liu, Lizheng Fu, Chunyu Liu:
On the Stability of Application-Layer Multicast Tree.
401-412
- JongMin Jeong, Goo Yeon Lee, Sang-Jae Moon:
Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks.
413-423
- Krzysztof Walkowiak:
A New Function for Optimization of Working Paths in Survivable MPLS Networks.
424-433
- Attila Altay Yavuz, Fatih Alagöz, Emin Anarim:
HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes.
434-444
- Hai Jin, Minghu Zhang, Pengliu Tan:
Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time Communication.
445-454
- Jung Ha Hong, Oleg Gusak, Neal Oliver, Khosrow Sohraby:
A Model of a Packet Aggregation System.
455-463
- Melike Erol, Tayfun Akgul, Sema F. Oktug, Suleyman Baykut:
On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network Traffic.
464-473
- Süheyla Ikiz, Y. Murat Erten:
Throughput Analysis of UDP and VPN Traffic in 802.11g Networks.
474-482
- Burak Kantarci, Sema F. Oktug:
Path Loss Rate Driven Burst Assembly in OBS Networks.
483-492
Computer Vision
- M. Kemal Güllü, Oguzhan Urhan, Sarp Ertürk:
Pixel Domain Spatio-temporal Denoising for Archive Videos.
493-502
- Orhan Akbulut, Oguzhan Urhan, Sarp Ertürk:
Fast Sub-pixel Motion Estimation by Means of One-Bit Transform.
503-510
- Syng-Yup Ohn:
Neighborhood Decomposition of Convex Structuring Elements for Mathematical Morphology on Hexagonal Grid.
511-521
- Begüm Demir, Sarp Ertürk:
Block Motion Estimation Using Modified Two-Bit Transform.
522-531
- Fadi Dornaika, Angel Domingo Sappa:
3D Face Tracking Using Appearance Registration and Robust Iterative Closest Point Algorithm.
532-541
- Tatiana Evreinova, Grigori E. Evreinov, Roope Raisamo:
Video as Input: Spiral Search with the Sparse Angular Sampling.
542-552
- Erhan AliRiza Ince, Syed Amjad Ali:
An Adept Segmentation Algorithm and Its Application to the Extraction of Local Regions Containing Fiducial Points.
553-562
- Samy Ait-Aoudia, Fatma-Zohra Benhamida, Mohamed-Azzeddine Yousfi:
Lossless Compression of Volumetric Medical Data.
563-571
- Ali Iskurt, Sema Candemir, Yusuf Sinan Akgul:
Identification of Luminal and Medial Adventitial Borders in Intravascular Ultrasound Images Using Level Sets.
572-582
Data Mining
Databases
- Konstantina Stoupa, Zisis Simeoforidis, Athena Vakali:
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources.
603-612
- Yonglei Yao, Fangchun Yang, Sen Su:
Evaluating Proposals in Web Services Negotiation.
613-621
- Abdullah Uz Tansel, Canan Eren Atay:
Nested Bitemporal Relational Algebra.
622-633
- José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, Hendrik Decker, J. R. Juárez-Rodríguez, José Ramón González de Mendívil:
A Protocol for Reconciling Recovery and High-Availability in Replicated Databases.
634-644
- Özgür Yürekten, Kivanç Dinçer, Berk Akar, Müberra Sungur, Elif Kurtaran Özbudak:
Migrating a Hierarchical Legacy Database Application onto an XML-Based Service-Oriented Web Platform.
645-654
Embedded Systems
- Gürhan Küçük, Can Basaran:
Power-Aware Processors for Wireless Sensor Networks.
655-664
- Andaç T. Samiloglu, Veysel Gazi, A. Bugra Koku:
Effects of Asynchronism and Neighborhood Size on Clustering in Self-propelled Particle Systems.
665-676
- Hyojun Kim, Jihyun In, DongHoon Ham, SongHo Yoon, Dongkun Shin:
Virtual-ROM: A New Demand Paging Component for RTOS and NAND Flash Memory Based Mobile Devices.
677-686
- Ji Chan Maeng, Dongjin Na, Yongsoon Lee, Minsoo Ryu:
Model-Driven Development of RTOS-Based Embedded Software.
687-696
Information Retrieval
- Cemal Köse, Özcan Özyurt:
A Target Oriented Agent to Collect Specific Information in a Chat Medium.
697-706
- Ismail Sengör Altingövde, Fazli Can, Özgür Ulusoy:
Algorithms for Within-Cluster Searches Using Inverted Files.
707-716
- Berkant Barla Cambazoglu, Aytul Catal, Cevdet Aykanat:
Effect of Inverted Index Partitioning Schemes on Performance of Query Processing in Parallel Text Retrieval Systems.
717-725
- Vincenza Carchiolo, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia:
Exploiting Social Networks Dynamics for P2P Resource Organisation.
726-734
- Joan Josep Piles, José Luis Salazar, José Ruíz, José María Moreno-Jiménez:
Security Considerations in e-Cognocracy.
735-744
Mobile Computing
- Ping Wang, Yunze Cai, Jinjie Huang, Xiaoming Xu:
A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol Performance.
745-754
- Yong-Bin Kang, Yusuf Pisan:
A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing.
755-764
- Tolga K. Çapin, Antonio Haro, Vidya Setlur, Stephen Wilkinson:
Camera-Based Virtual Environment Interaction on Mobile Devices.
765-773
- Wonik Choi, Jinseok Chae, Nam-Joong Kim, Mee Young Sung:
A Cost Model for an Adaptive Cell-Based Index Structure.
774-782
- Nam-koo Ha, Kijun Han:
Positioning Method for Outdoor Systems in Wireless Sensor Networks.
783-792
Parallel and Distributed Computing
- Omid Bushehrian, Saeed Parsa:
Formal Description of a Runtime Infrastructure for Automatic Distribution of Programs.
793-802
- Su-Hong Min, Dong-Sub Cho:
Super-Peer Selection Based Framework Using Dynamic Capacity and Similarity.
803-812
- Aleksandar Trifunovic, William J. Knottenbelt:
A General Graph Model for Representing Exact Communication Volume in Parallel Sparse Matrix-Vector Multiplication.
813-824
- Jerzy Brzezinski, Anna Kobusinska, Jacek Kobusinski:
Safety of Rollback-Recovery Protocol Maintaining WFR Session Guarantee.
825-833
- Oyku Akaydin, Omar Ramadan:
3-D Parallel Implementation of the Wave-Equation PML Algorithm Using Distributed System.
834-843
- Dan Li, Jianping Wu, Yong Cui, Jiangchuan Liu, Ke Xu:
Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM.
844-853
- Andrea D'Ambrogio, Daniele Gianni, Giuseppe Iazeolla:
jEQN a Java-Based Language for the Distributed Simulation of Queueing Networks.
854-865
- Öznur Özkasap, Emine Sule Yazici, Selda Küçükçifçi, Mine Çaglar:
Exact Performance Measures for Peer-to-Peer Epidemic Information Diffusion.
866-876
- Amirhasan Amintabar, Alexander Kostin, Ljudmila Ilushechkina:
A Leader Election Protocol for Timed Asynchronous Distributed Systems.
877-886
Performance Evaluation
Security and Cryptography
- Zhongxue Yang, Adem Karahoca:
An Anomaly Intrusion Detection Approach Using Cellular Neural Networks.
908-917
- Imran Erguler, Emin Anarim:
A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers.
918-923
- Attila Altay Yavuz, Emin Anarim, Fatih Alagöz:
Improved Merkle Cryptosystem (IMC).
924-934
- Kamer Kaya, Ali Aydin Selçuk, Zahir Tezcan:
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing.
935-942
- Hüseyin Acan, Kamer Kaya, Ali Aydin Selçuk:
Capture Resilient ElGamal Signature Protocols.
943-951
- Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee:
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks.
952-962
- Amir Akhavan, Hadi Mahmodi, Afshin Akhshani:
A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps.
963-971
- Feiyu Lei, Wen Chen, Kefei Chen:
A Non-committing Encryption Scheme Based on Quadratic Residue.
972-980
- Alisher Kholmatov, Berrin A. Yanikoglu:
Biometric Cryptosystem Using Online Signatures.
981-990
- Selçuk Baktir, Berk Sunar:
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography.
991-1001
- Yuan Yumin:
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity.
1002-1010
- Candelaria Hernández-Goya, Amparo Fúster-Sabater:
Deterministic Analysis of Balancedness in Symmetric Cryptography.
1011-1020
Software Engineering
Copyright © Fri Mar 12 17:17:02 2010
by Michael Ley (ley@uni-trier.de)