EurAsia-ICT 2002: Information and Communication Technology: First EurAsian Conference, Shiraz, Iran, October 29-31, 2002, Proceedings (Lecture Notes in Computer Science, 2510) 3540000283, 9783540000280

We welcomed participants to the 1st EurAsian Conference on Advances in Information and Communication Technology (EurAsia

118 16 28MB

English Pages 1028 [1043] Year 2002

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
EurAsia-ICT 2002: Information and Communication Technology
Preface
Program Committee
Table of Contents
Speaker Model and Decision Threshold Updating in Speaker Verification
Introduction
Speech Database
3 Sphericity Measure
4 Decision Threshold
Equal Error Rate Method (EER)
Linear Regression Method (LR)
Best Match Decision Rule (BMDR)
Experiments
Conclusion
References
Application of Constraint Hierarchy to Timetabling Problems
1 Introduction
2 Over-Constraint Systems and Constraint Hierarchy
3 Problem Description and System Inputs
4 Search and Constraint Solver
4.1 Building a Constraint Graph
4.2 Ordering of the Variables
4.3 Search
4.4 Results and Performance
5 Conclusions and Future Work
References
An Intelligent System for Therapy Control in a Distributed Organization
1 Introduction
2 Integrated Production Quality Standard
3 Distributed Multi-agent Architecture
3.1 Phytosanitary Information Management Agent
3.2 Phytosanitary Strategy Selection Agent
3.3 Therapy Planning Agent
4 Conclusions and Future Work
Acknowledgments. We gratefully acknowledge the collaboration of the Provincial Delegation of the Ministry of Agriculture and Fishing of Almería and its Plant Health Services.
References
Discovering Local Patterns from Multiple Temporal Sequences
1 Introduction
2 Problem Description
3 Index Structure
4 Method and Discussion
5 Experimental Results
6 Conclusion
References
The Geometric Framework for Exact and Similarity Querying XML Data
Introduction
Geometric Framework
Vector Spaces
Metric Spaces
The Vector Model for Indexing and Querying XML Data
Indexing Path Contents and XML Structure
Indexing Paths
Similarity Queries
M-Tree
Indexing XML Data with M-Tree
Testing with M-Tree
Conclusions and Outlook
References
A Mobile System for Extracting and Visualizing Protein-Protein Interactions
1 Introduction
2 The Problem
3 Extracting Protein Interaction Data
4 Visualizing Protein Interaction Networks
5 Implementation and Experimental Results
6 Conclusion and Future Work
References
Discovering Temporal Relation Rules Mining from Interval Data
1 Introduction
2 Mining Problem Definition
2.1 Temporal Relation
2.2 Generalization of Temporal Interval
2.3 Temporal Relation Rule
3 Mining Temporal Relation Rules
3.1 Preprocessing Algorithm
3.2 Temporal Relation Algorithm
4 Experimental Results
5 Conclusion
References
An Abstract Image Representation Based on Edge Pixel Neighborhood Information (EPNI)
Introduction
Edge Pixel Neighborhood Information(EPNI)
Similarity Measure
Search Space
Evaluation Method
Experimental Results
Conclusion
Motion Estimation Based on Temporal Correlations
Introduction
Motion Estimation Algorithms
The Proposed Algorithm
Simulation Result
Conclusion
References
A New Boundary Matching Algorithm Based on Edge Detection
Introduction
Related Works
Boundary Matching Algorithm (BMA)
A Modified BMA
Edge Detection Based BMA (EBMA): Proposed Approach
Simulation Results
Conclusion
References
Lookmark: A 2.5D Web Information Visualization System
Introduction
Related Work
Motivation of Information Visualization
Information Visualization Methods
Lookmark Design
Idea
User Interface Design
User Interaction
Implementation
Software Development Environment
Visual Interaction Modeling
Conclusion
References
Different Local Search Algorithms in STAGE for Solving Bin Packing Problem
1 Introduction
2 Background
2.1 Bin-Packing Problem
2.2 STAGE Algorithm
3 Cost Surface Structure of Bin-Packing Problem
4 Different Local Search Algorithms in STAGE
5 Conclusions and Future Works
References
A Prototype for Functionality Based Network Management System
Introduction
Segregation Based on Functionalities
Uniqueness of our Prototype
Architecture
Design
Top Level Manager
Middle Level Manager
Agents
Common Modules
Implementation
Deviations from SNMP
Conclusions
References
Coaching a Soccer Simulation Team in RoboCup Environment
Introduction
The Coach Client
Algorithms Used in Arvand-Coach
Using Heterogeneous Players
Recognizing the Skills of Players
Processing Referee Messages
Gathering Game Statistics
Modifying the Formation of Players
Evaluating the Coach
Conclusion and Future Work
References
Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme
1 Introduction
2 Optimal Uniquely Decodable, Optimal Maximal, and Huffman Codes
3 Application to Data Compression
4 Breaking an Optimal Maximal Code
5 Conclusion
References
A New Scheme Based on Semiconductor Lasers with Phase-Conjugate Feedback for Cryptographic Communications
Introduction
The Based-on-Lasers Communication System
Choice of the Laser and Its Components
Determination of the Laser Parameters
Choice of Some Accessible Parameter for Chaoticity
Synchronization of the Chaotic Transmitter and Receiver Systems
Applications to Cryptographic Communication
Conclusions and Further Remarks
Parallel Algorithm and Architecture for Public-Key Cryptosystem
1 Introduction
2 Background
2.1 Cellular Automata
2.2 Finite Fields
3 Parallel Algorithm
3.1 Modular Multiplication Algorithm
3.2 Algorithm for Two Modular Multiplications
4 Cellular Automata Architecture
4.1 CA Multiplier
4.2 CA Architecture for Two Multiplications
5 Conclusion
References
Specification and Verification of Security Policies in Firewalls
1 Introduction
2 Motivation and Related Work
2.1 Formal Methods
2.2 Related Work
3 Security Policy Speci .cation Language
3.1 Syntax of the Language
3.2 Semantics of the Language
4 Analysis and Veri .cation of Security Policy
4.1 Translation of Security Propositions
4.2 Consistency in Security Policy
4.3 Coverage among Security Propositions
4.4 Querying on the Security Policy
5 Conclusion and Future Works
References
Image Segmentation Based on Shape Space Modeling
1 Introduction
2 Shape Space Model
2.1 B-Spline Curve
2.2 Shape Matrix
2.3 Projection onto Column Space of Shape Matrix
2. 4 Estimate of Desired Curve
3 Left Null Space of Shape Matrix
3.1 Static Cost
3.2 Dynamic Cost
4 Experimental Results
5 Conclusions
References
HERMES: File System Support for Multimedia Streaming in Information Home Appliance
1 Introduction
1.1 Motivation
1.2 Related Works
2 Synopsis: Unix File System
3 HERMES: Multimedia File System
4 Operating System Support for Streaming Operation
4.1 VFS and HERMES
4.2 Interface for Multimedia Streaming
5 Performance Experiment
6 Conclusion
References
Motion Vector Recovery for Error Concealment Based on Macroblock Distortion Modeling
1 Introduction
2 MPEG-2 Video Codec
3 MBDistortion Models for P-frame
4 Error Concealment Techniques
5 Simulation Results
6ÿ Conclusion
References
A Memory Copy Reduction Scheme for Networked Multimedia Service in Linux Kernel
1 Introduction
2 Related Works
3 Direct I/O
3.1 Direct I/O Implementation
3.1.1 Scenario of Direct I/O
3.1.2 Direct_rw()
4 One-Copy
4.1 One-Copy Implementation
5 Experiment Results
6 Concluding Remarks
References
Hidden Markov Model and Neural Network Hybrid
1 Introduction
2 Maximum Likelihood Neural Networks
3 Mean Transformation MLNNs
4 Variance Transformation MLNNs
5 Experimental Results
6 Conclusions
References
Neural Network Based Algorithms for IP Lookup and Packet Classification
Introduction
Background
IP Lookup and Back Propagation
Implementation Issues
Conclusion and Future Work
References
Non-linear Prediction of Speech Signal Using Artificial Neural Nets
1 Introduction
2 Artificial Neural Nets and Non-linear Prediction
3 Non-linear Prediction of the Speech Residual Signal
4 The Back Propagation Training Algorithm and Its Generalization
4.1 The Selection of the Best Training Algorithm
4.2 Initialization
4.3 Overtraining and the Ways to Avoid It
5 Post-regression Analysis of Results
6 The Data-Base
7 The Experimental Results
7.1 Determining the Network Structure and Dimension
7.2 The Effect of Bit Resolution
7.3 The Effect of Sampling Frequency
7.4 Comparison of Linear and Non-linear Prediction of Speech
7.5 The Generalization of the Net
7.6 Results with Recurrent Networks
8 Conclusion
References
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
1 Introduction
2 Access Control Using Embedded RBAC Units
2.1 Embedded RBAC Unit to Access Control
2.2 Web Document Storage Structure
2.3 Web Document View Control According to User Access Permission
2.4 Access to Multiple Web Servers in the Same Domain
3 Implementing Multiple Web Server Access Control in the Same
4 Conclusions
References
Development of UML Descriptions with USE
Introduction
Running Example: The Crossing System
Use of USE
Syntax Check
System State Generation
Object Diagrams
Invariants
Pre- and Postconditions
Sequence Diagrams
Querying
Further Windows
Conclusion
FPGA Implementation of Digital Chaotic Cryptography
1 Digital Chaotic Cryptography
2 Quantization Size on Fixed Point Realisation
3 FPGA Implementation
4 Experiment Result
5 Statistical Analysis
5.1 Probability Mass Function
5.2 Autocorrelation
5.3 Power Spectral Density
6 Conclusions
References
Stereo for Recovering Sharp Object Boundaries
1 Introduction
2 The Algorithm
2.1 New Multiple Windows
2.2 Similarity Measure
2.3 Proposed Algorithm
3 Experimental Results
4 Conclusions
References
Priority Vantage Points Structures for Similarity Queries in Metric Spaces
1 Introduction
2 Proposed Methods
2.1 Tree Based Methods
2.2 Vantage Points Methods
3 Prioritized Vantage Points
3.1 Prioritizing Vantage Points
3.2 Kvp Structure
4 Conclusions
References
A High Performance Image Coding Using Uniform Morphological Sampling, Residues Classifying, and Vector Quantization
1 Introduction
2 Proposed Algorithm
3 Hierarchical Structure
4 Experimental Results
5 Conclusions
References
A Genetic Algorithm for Steiner Tree Optimization with Multiple Constraints Using Prüfer Number
1 Introduction
2 Problem Description and Formulation
3 The Proposed GA-Based Algorithms
3.1 Genotype: Modified Prüfer Numbers
3.2 Pre-processing Phase
3.3 Initial Population
3.4 Fitness Function
3.5 Selection
3.6 Crossover
3.7 Mutation
4 Experimental Results
5 Conclusions
References
A New Technique for Participation of Non-CORBA Independent Persistent Objects in OTS Transactions
1 Introduction
2 CORBA Object Transaction Service
3 Proposed Technique
3.1 Creating IPO Objects
3.2 Receiving Prepare Message
3.3 Receiving Commit Message
4 Prototype Description
5 Comparison with Other OTS-Based Implementations
6 Conclusion
References
Compositional Modelling of Workflow Processes
1 Introduction
2 Coloured Petri Nets
3 Process Modelling Requirements
4 The Workflow Components
4.1 The Atomic Activity Component
4.2 Components forNNon-parallel Workflows
4.3 Modelling the Milestone
4.4 Components for Parallel Execution of Workflows
5 Model Validation
6 Summary
References
EDMIS: Metadata Interchange System for OLAP
1 Introduction
2 Related Research
3 Design of the Metadata Interchange System
3.1 OLAP Metadata Model
3.2 An XML-Based OLAP Metadata Interchange Model
3.2.1 Model Design
3.2.2 Model Application Methodologies
4 System Implementation
5 Conclusion
References
An Efficient Method for Controlling Access in Object-Oriented Databases
1 Introduction
2 Related Works
3 The Proposed Scheme
4 The Proof of Correctness of the Proposed Scheme
5 Conclusions and Further Work
References
Extracting Information from XML Documents by Reverse Generating a DTD
1 Introduction
2 Structuring XML Information
2.1 Data Structures
2.2 Tree Construction Algorithm
3 An Example of Tree Construction and DTD Extraction
3.1 An Example of Tree Construction
3.2 DTD Extraction
4 Conclusion
References
Mapping XML-Schema to Relational Schema
1 Introduction
2 Extend E-R Models to EER
3 Formal Descriptions for XML-Schema: FD-XML
4 From FD-XML to EER
5 Simplify EER
6 From EER to General Relational Schema
7 Test Result and Conclusion
References
Flexible Modification of Relational Schema by X2RMap in Storing XML into Relations
1 Introduction
2 Related Works
3 Flexible Modification of Relational Schema
3.1 Table Merge about Parts with the Same Subtree Structure on DTD
3.2 Maintaining the Extent of Recursion
3.3 Using Replication
4 X2RMap
5 Some Experiments
5.1 Experiment 1
5.2 Experiment 2
6 Conclusions and Future Works
References
B2B Integration - Aligning ebXML and Ontology Approaches
1 Introduction
2 Related Work
4 Summary
References
An Agent Based Service Discovery Architecture for Mobile Environments
Introduction
Analysis of Existing Service Discovery Mechanisms
Service Discovery with Agents ΠThe Chaplet Architecture
Design Goals
Overview of the Chaplet System
The Service Discovery Procedure
System Design and Implementation
Query Representation
System Architecture
Conclusions
References
Location Management Using Multicasting HLR in Mobile Networks
Introduction
MHLR Scheme
Analytic Models
Numerical Results
Conclusions
References
Packet Error Probability of Multi-carrier CDMA System in Fast/Slow Correlated Fading Plus Interference Channel
1 Introduction
2 Analysis Model of Multi-carrier CDMA System
2.1 Multi-carrier CDMA System Model
2.2 Nakagami Fading Channel Model
2.3 Diversity Reception of Correlated Fading Signal
3 Performance Evaluation of Multi-carrier CDMA System
3.1 Probability of Packet Error for Multi-carrier CDMA System
4 Numerical Results and Discussion
5 Conclusion
References
A Distributed Low-Cost Dynamic Multicast Routing Algorithm with Delay Constraints
Introduction
Network Model and Problem Definition
Related Work
The Proposed Algorithm
DDUR Algorithm
DDMR Algorithm
Simulation
Concluding Remarks
References
A New Bandwidth Reduction Method for Distributed Rendering Systems
Introduction
Geometric Redundancy
Data Distribution Scheme in WireGL
Redundancy of the Geometry Data
Geometry Tracking
Geometry Tracking Algorithm
Implementation on WireGL
Experimental Results
Conclusion
References
Neural Networks Based Mesh Generation Method in 2-D
1 Introduction
2 Discretization of Boundary Curves
3 The Use of Neural Networks for Mesh Generation
4 Conclusion
References
Image Denoising Using Hidden Markov Models
1 Introduction
2 Hidden Markov Modeling of Images
2.1 Image Restoration Using HMM Method
2.2 Reduced Computational Algorithm
3 Simulation
4 Conclusions
References
Anaphoric Definitions in Description Logic
Introduction and Motivation
The Existential Fragment
Undecidability
Conclusion
References
Storage and Querying of High Dimensional Sparsely Populated Data in Compressed Representation
Introduction
Related Work
Storage Options
Dictionary Organization
Processing Queries on Compressed Data
Results and Discussion
Conclusion
References
The GlobData Fault-Tolerant Replicated Distributed Object Database
1 Introduction
2 Copla System Architecture
3 Strong Consistency Protocols
3.1 Interaction among Components
3.2 The Non-voting Protocol
3.3 The Voting Protocol
4 Node Recovery
5 Related Work
6 Conclusion
References
A Levelized Schema Extraction for XML Document Using User-Defined Graphs
1 Introduction
2 Related Work
3 Preliminaries
3.1 Edge-Labeled Graph
3.2 Graphs for Schema Extraction
3.3 Schema Extraction Using Bitmap Indexing
3.4 Graph and Operation for Schema Extraction
4 Schema Extraction Model
4.1 Structure of Schema Extraction Model
4.2 Example of DTD and XML Documents
4.3 Data Graph and Schema Graph
4.4 Label Path
4.5 Schema Extraction Using the Frequency of Label Path
4.6 Graph Projection
5 Experiments
6 Conclusion
References
Extracting, Interconnecting, and Accessing Heterogeneous Data Sources: An XML Query Based Approach
1 Introduction
2 Related Work
3 Contributions
4 System Architecture
5 Experimental Results
6 Conclusion
References
Call Admission Control in Cellular Mobile Networks: A Learning Automata Approach
Introduction
The Uniform Fractional Guard Channel Policy
The Blocking Performance of UFG
Finding of Optimal Parameter of UFG Policy
Learning Automata
LA Based CAC Strategy
Simulation Results
Conclusions
An Adaptive Flow Control Scheme for Improving TCP Performance in Wireless Internet
1 Introduction
2 Description of Virtual Host Model
3 Adaptive-TCP Behaviors
4 Performance Study of A-TCP Protocol
5 Conclusion
References
An Adaptive TCP Protocol for Lossy Mobile Environment
1 Introduction
2 Problems of TCP over Lossy Links
3 Strengths and Drawbacks of Existing Solutions
4 Our Proposed Solution: Extended TCP HACK
4.1 Requirements for Enhancing the Performance of TCP
4.2 Our Proposal: Extended TCP HACK
4.3 Drawbacks of Our Proposal
4.4 Performance Evaluation
5 Conclusions and Future Works
References
Design and Implementation of Application-Level Multicasting Services over ATM Networks*
Introduction
Overview of ACS Architecture
ACS Group Communication Services
Multicasting Protocol
Benchmarking Results
Primitive Performance
BPNN Learning Algorithm
Conclusion
References
Bon: The Persian Stemmer
Introduction
Persian Words
Bon Algorithm
Experiments
Conclusion
References
Current and Future Features of Digital Journals
1 Introduction and Overview
2 Overall System Structure and Features
2.1 Browsing
2.2 Searching
2.3 Refinding and Organizing Content
3 Content Related Features
3.1 Format of an Article
3.2 Features Using Content
4 Conclusion and Future Work
References
Solving Language Problems in a Multilingual Digital Library Federation
Introduction
System Architecture
Ontologies and Dictionaries
Description of the Query Process
Conclusions and Future Work
References
Performing IP Lookup on Very High Line Speed
1 Introduction
2 Related Work
3 DMP-Tree
4 Implementation
4.1 Overall Design
4.2 Node Structures
4.3 Search Module
5 IP Version 6
6 Conclusion
References
A Study of Marking Aggregated TCP and UDP Flows Using Generalized Marking Scheme
1 Introduction
2 Generalized Marking Scheme for Assured Service
3 Performance Study
3.1 Test of Intra-SLA Unfairness
3.2 Test of Inter-SLA Unfairness
4 Conclusion
References
Towards the Global Information Society: The Enactment of a Regulatory Framework as a Factor of Transparency and Social Cohesion
1 Introduction
2 The Formation of a Unified Statutory Framework
3 The Need to Construct a Modern Regulatory Framework
4 Conclusions
References
On the Application of the Semantic Web Concepts to Adaptive E-learning
Introduction
Adaptive Learning
The E-learning Standardization Process
Educational Metadata
Learning Resources Organization and Packaging
Student Profiles
Interim Conclusions
Semantic Web
Semantic Web Concepts in E-learning
Conclusions
References
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm
1 Introduction
2 Overview of the Programming Environment
3 Empirical Study
4 Conclusions
References
The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU
1 Introduction
2 Current Trends
3 Technical Innovation
4 Web Accessibility, Special Educational Needs, and Disability Act 2001
5 Web Content Accessibility Guidelines
5.1 Images and Background, Text and Colours
5.2 Frames, Links, and Navigation
5.3 PDF Documents
5.4 Shockwave, Scrolling Text, JavaScript, Plug-Ins, etc.
5.5 Tables and User Interaction
5.6 Testing
6 Practical Application of Accessible Design
7 The University of East London Model
8 Conclusions
References
Monte Carlo Soft Handoff Modeling
Introduction
Modeling Assumptions
The Probability Distribution for the Sojourn Time
Distribution of a Mobile Speed
Model Parameters
Simulation Results
Conclusions
References
A QoS Provision Architecture for Mobile IPv6 over MPLS Using HMAT
1 Introduction
2 Related Works
3 Proposed Scheme
3.1 QoS Object Option (QOO)
3.2 Hierarchical Mobile Agents Tree (HMAT)
3.3 Mobile IPv6 Support in MPLS Core Network
3.4 QoS Support Using HMAT
4 Simulation Results
5 Conclusions
References
A New Propagation Model for Cellular Mobile Radio Communications in Urban Environments Including Tree Effects
1 Introduction
2 Applied Diffraction Coefficient
3 UTD-Based Enhanced Model for Multiple Diffractions by Buildings
3.1 Multiple Building Diffraction Loss
3.2 Excess Path Loss
4 Including Effects of Trees in the UTD-Based Enhanced Model
4.1 Multiple Building Diffraction Loss
4.2 Excess Path Loss
5 Results and Discussion
6 Conclusion
References
A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme
Introduction
Design of the Security Protocol for Mobile Agent Systems
Registration (Agent-Server Registration and Key Distribution)
CreateAgent
ExecuteAgent
TransferAgent
AuditAgent
Analysis of the Proposed Protocol
Conclusions
References
Transmission Time Analysis of WAP over CDMA System Using Turbo Code Scheme
1 Introduction
2 WAP Architecture
2.1 WAP Model
2.2 WAP Protocol Stack
3 Transmission Time for WAP over CDMA
3.1 SAR (Segmentation and Reassembly)
3.2 Turbo Code Scheme
3.3 Rician Fading Channel Model
4 Simulation of Packet Transmission Time using Turbo Code Scheme
4.1 Simulation Model of WAP Packet
4.2 Analysis of Transmission Time for WAP Packet
5 Conclusion
References
On the Use of New Technologies in Health Care
Introduction
The Previous Situation in the Galician Health Care System
A WWW/WAP-Based Solution
Advantages over the Previous System
Functional Description
Patients
Doctors
Administrative Staff
Conclusions and Work for the Future
References
Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless Networks
Introduction
Related Work
Hybrid Queuing Strategy
Numerical Results
Conclusions
References
A Dynamic Backoff Scheme to Guarantee QoS over IEEE 802.11 Wireless Local Area Networks
Introduction
IEEE 802.11 Backoff Scheme
Dynamic Backoff Scheme
Performance Evaluation
Conclusions
References
Performance Evaluation of Serial/Parallel Block Coded CDMA System with Complex Spreading in Near/Far Multiple-Access Interference and Multi-path Nakagami Fading Channel
1 Introduction
2 System Model
2.1 Transmitter Model
2.2 Channel Model and Receiver Structure
3 Performance Evaluation
3.1 Effect of Channel Estimation
3.2 Effect of Multiple-Access Near/Far Interference
3.3 Serial/Parallel Concatenate Block Coding
3.4 Multi-path Intensity Nakagami Fading Model
4 Numerical Results
References
A Learning Automata Based Dynamic Guard Channel Scheme
Introduction
The Blocking Performance of Guard Channel Policy
Learning Automata
LA Based Dynamic Guard Channel Policy
Simulation Results
Conclusions
References
Dynamic System Simulation on the Web
1 Introduction
2 Literature Review
3 Overviews of SimDynamic
4 The Design
4.1 NodePack
4.2 UIPack
5 How It Works
6 Comparison of SimDynamic with Simulink
7 Conclusions and Future Work
References
Using Proximity Information for Load Balancing in Geographically Distributed Web Server Systems
1 Introduction
2 Related Work
3 Load Balancing Using Proximity Information
3.1 Using Proximity Metrics for Cluster Selection
4 Implementation
5 Experiments
5.1 Setup
5.2 Experimental Results
6 Conclusions
References
Strategie Tool for Assessment of the Supply and Demand Relationship between ASPs and SMEs for Competitive Advantage
Application Service Provider
Case Study
A Tool for Assessing the Necessity for an ASP
Strategy (S) and Expectation (E)
Results (R) and Action(A)
Delivery (D)
Location (L)
Security (S)
Reliability (R)
Summary
References
Trust and Commitment in Dynamic Logic
Introduction
Trust and Commitment in Strategic Decisions
A Dynamic Logic of Trust and Commitment
The Pennies Pinching Example in Dynamic Logic
Some Properties of the Operators
Concluding Remarks
References
Modelling Heterogeneity in Multi Agent Systems
Introduction
The Multilayered Multi-agent Situated System Model
Heterogeneous Communities
Heterogeneous Interactions
Heterogeneous Agents
MMASS Application
References
Pricing Agents for a Group Buying System
1 Introduction
2 Reserve Pricing Agent
2.1 Similarity Measure
2.2 Generating the Reserve Price
3 Bid Pricing Agent
3.1 Cost Equation
3.2 Generating the Bid Price
4 Experimental Evaluation
5 Implementation of an XML-Based Group Buying System
6 Conclusions
References
Evolution of Cooperation in Multiagent Systems
1 Reciprocal Altruism Game
2 Strategies in the Reciprocal Altruism Game
3 Results
4 Analysis of Altruism Game Experiments
5 Conclusions
References
A Dynamic Window-Based Approximate Shortest Path Re-computation Method for Digital Road Map Databases in Mobile Environments
1 Introduction
2 A* and OTO Shortest Path Algorithms
3 Analyses of Update Effects on the Shortest Paths
3.1 Measuring the Degree of Path Similarities
3.2 Correlation between the Search Spaces and DPS
4 A Dynamic Window-Based Approximate Shortest Path
5 Conclusions
References
Web-Based Process Control Systems: Architectural Patterns, Data Models, and Services
1 Introduction
2 TPC-IS in the Kharkiv Region Gas Production Enterprise
3 Architectural Design Patterns
4 Node Database Concept and Domain-Dependent Data Presentation
5 Advanced Services Collection
6 Some Implementation Issues
7 Conclusions
References
A Comparison of Techniques to Estimate Response Time for Data Placement
1 Introduction
2 Linear Regression
3 Queuing Models
4 SEER
5 Discussions and Future Research Directions
References
Using a Real-Time Web-Based Pattern Recognition System to Search for Component Patterns Database
1 Introduction
2 System Calculation and Phase Analysis
2.1 Storage Phase
2.2 Retrieval Phase
3 Storage Capacity Analysis and Improvement
4 Implementing the Web-Based Pattern Recognition System
5 Cooperative Example
6 Conclusions and Future Work
References
An Adaptive Call Admission Control to Support Flow Handover in Wireless Ad Hoc Networks
Introduction
Flow Handover
The Proposed Adaptive CAC Scheme
Model for the Proposed CAC Scheme
The Proposed Adaptive CAC Scheme
Simulation Results
Conclusions
References
Design of Optimal LA in Personal Communication Services Network Using Simulated Annealing Technique
1 Introduction
2 System and Model Description
3 Problem Formulation
4 Simulated Annealing
4.1 Configuration Space
4.2 Colling Schedule
4.3 Simulated Annealing Algorithm Developed for Constrained Optimization Problem (P)
5 Performance Analysis
5.1 Model Validation
5.2 Results on Optimiuation of (P)
6 Conclusion
References
Secure Bluetooth Piconet Using Non-anonymous Group Key
1 Introduction
2 Standard Method of Bluetooth
2.1 The Analysis of Weakness of Bluetooth
A. Actual Bluetooth Is Applied
Bugging communication between ciphered devices or attacking PIN
B. Analysis of the Weaknesses of Bluetooth Technical Specifications
Wiretaps and camouflaged attacks
3 The New Proposed Scheme
3.1 System Parameters
3.2 Secure Protocol of a Bluetooth Piconet by Using a Open Group Key
Preliminary stage 2: Creation of a signature for a central server and a personal computer
Stage 1: The mutual authentication between a central server and an personal computer.
Stage 2 : A communicative stage between a Bluetooth master and the slave
Stage 3 : The mutual authentication between a Bluetooth master and a slave
Stage 4 : The exchange of signature values and the creation of a group key.
Step 5 : The closing step of an event
3.3 Piconet Protocol
A. Request for Connection from a Slave Within the Piconet (When There Is No Authentication between Masters)
B. The Request for the Connection of the Slave Included in a Piconet (After It Is Authenticated by Masters)
4 Discussion and Security Analysis
Conclusion
References
Differentiated Bandwidth Allocation and Power Saving for Wireless Personal Area Networks
1 Introduction
2 Bluetooth
3 Efficient Bandwidth Allocation
4 Simulation Results
5 Conclusion
References
Combining Extreme Programming with ISO 9000*
Introduction
XP Overview
Software Development in an ISO 9000 Company
Product Realization: Modified XP Practices
Customer Relationship Management
Product Quality Assurance
Pair Programming
Monitoring and Measurement
Conclusions
References
The Class Cohesion Using the Reference Graph G1 and G2
Introduction
Background
Type1-Measures
Type2-Measures
Reference Graph G1 and G2
Experiment and Results
Using the Reference Graph G2 in Type1-Measures
Using the Reference Graph G2 in Type2-Measures
Conclusion
References
Process-Oriented Interactive Simulation of Software Acquisition Projects
1 Background and Overview
2 GARP: An Acquisition Process Model
3 Promoting, Training, and Understanding Acquisition Processes
4 Past Research in Interactive Simulation and Our Needs
5 A Process-Oriented Interactive Simulation Framework
5.1 Process Description for Interactive Simulation
5.2 Designing a Process-Oriented Interactive Simulation
6 Detailed Simulation Design Using Best Practice Information
7 Discussion and Future Work
References
Automatic Design Patterns Identification of C++ Programs
1 Introduction
2 Design Patterns
3 Automatic Design Patterns Identification
Canonical Model for the Representation of Design Patterns
3.2 Tool DEPAIC++
3.2.1 Module for Transformation of the C++ Code to the Canonical Form
3.2.2 Module for Recognition of Design Patterns
4 Related Work
5 Conclusions and Further Work
References
Specifying the Merging of Desires into Goals in the Context of Beliefs
Introduction
Specifying the Merging of Desires into Goals
BGI$_{unhbox voidb @x hbox {relax fontsize {7}{8}selectfont CTL}}$
BDGI$_{unhbox voidb @x hbox {relax fontsize {7}{8}selectfont CTL}}$
Logical Relations between Desires, Goals, and Beliefs
Belief Merging
Merging Operators Defined on Situation Structures
Desire Merging Operators
Summary
References
The Illegal Copy Protection Using Hidden Agent
1 Introduction
2 Outline of Agents
3 Elements of DRM and Analysis of Existing Model
3.1 Elements of DRM
3.2 Analysis of Existing Models
4 Proposal Scheme
4.1 Terms Desired of the Proposal Scheme
4.2 Illegal Copies of Contents
4.3 Whole System Model
4.4 Constituents
4.5 System Parameters
4.6 Explanation for Each Stage of Protocols
4.6.1 Contents Offering Stage
4.6.2 Verification Stage of Contents Illegally Copied
5 Inquiry into Proposed System
5.1 Analysis and Compare with Existing Method
6 Conclusion
References
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System
1 Introduction
2 Related Works
3 Misuse Intrusion Detection Rule Propagation System Design
4 Conclusion and Future Works
References
H-Colorings of Large Degree Graphs*
Introduction
Exact Thresholds
Threshold Bounds
Almost $alpha $-Dense Graphs
References
Hyper-Star Graph: A New Interconnection Network Improving the Network Cost of the Hypercube
Introduction
Topological Properties of Hyper-Star Graph
Scalability
Connectivity
Routing Algorithm and Diameter
Routing Algorithm
Diameter
Folded Hyper-Star Graph
Definition and Topological Properties
Routing Algorithm
Conclusion
References
Sequential Consistency as Lazy Linearizability
Introduction
The Consistent Shared Memory Abstraction
An $OO$-Constraint-Based SC Protocol
Underlying System
$OO$-Constraint and Legality
Control Variables
Behavior of an Object Manager
Behavior of a Process
References
Embedding Full Ternary Trees into Recursive Circulants
1 Introduction
2 Preliminaries
3 Embedding F T T into R C
4 Conclusion
References
A Handoff Priority Scheme for TDMA/FDMA-Based Cellular Networks
1 Introduction
2 Proposed Handoff Scheme
3 Performance Evaluation
4 Conclusions
References
On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies
1 Introduction
2 Related Work
3 Performance of Limited Service Scheduling
4 Performance Analysis of the Piconet under the Exhaustive Service Policy
5 Performance Comparison
6 Concluding Remarks
References
Intelligent Paging Strategy in 3G Personal Communication Systems
Introduction
System Model
Analytical Model
RWM Model
Model for Sectored Sequential Paging
Performance Evaluation
Conclusion
References
Experience from Mobile Application Service Framework in WIP
Introduction
2 Overview of the Wireless Internet Platform (WIP)
2.1 The Requirement Analysis
2.2 The Architecture of the Wireless Internet Platform (WIP)
2.3 The Service Profile of the Wireless Internet Platform (WIP)
3 Proposed Framework
3.1 Design Problems
3.2 Basic API Set
3.3 API Manager, Application Manager, and Extended API Set
4 Conclusions
References
An Efficient Approach to Improve TCP Performance over Wireless Networks
Introduction
TCP Issue over Wireless Links
Related Works
Snoop Scheme
Delayed Duplicate ACKs Scheme
Our Scheme
New End-to-End Flow Control: TCP Identification & Revivable Window
Identification
Window Revival
Evaluation
Cellular Networks
Satellite Networks
Conclusion
Extended Hexagonal Constellations as a Means of Multicarrier PAPR Reduction
Introduction
OFDM Transmission
Proposed Method
Simulation Results
Conclusion
References
Adaptive Application-Centric Management in Meta-computing Environments
Introduction
Overview of APAMS Architecture
Adaptive Fault Management
Conclusion
References
The Weakest Failure Detector for Solving Election Problems in Asynchronous Distributed Systems
1 Introduction
2 Motivations and Related Works
3 Model and Definitions
3.1 Processes
3.2 Failure Detector Classes
3.3 Reducibility and Transformation
3.4 The Election Problem
3.5 The Consensus Problem
Impossibility of Solving the Election Problem with Unreliable
Failure Detectors
5 The Weakest Failure Detector for Solving the Election Problem
6 Concluding Remarks
References
From Lens to Flow Structure
1 Introduction
2 Proposing an Extremely Fine Grained Model
2.1 Introducing the ”Lens” model
2.2 Writing Our Model with Java
2.3 Diagram
2.4 Why the ”Lens” Term
3 Flow in the Program Structure
3.1 Tree Composition
3.2 A More Complete Example
3.3 Structure Is Function
3.4 Let Us Identify ”Flows”
4 Related Work
5 Conclusion
References
ADML: A Language for Automatic Generation of Migration Plans
1. Introduction
2. A Data Migration Language (ADML) and the Patterns Used to Capture Migration Features
2.1. A Data Migration Language (ADML)
2.2. Generation of Migration Expressions
3. Related Work
4. Conclusion and Future Work
Bibliography
Considerations for Using Domain-Specific Modeling in the Analysis Phase of Software Development Process
Introduction
Characteristics of Analysis Phase
Domain-Specific Modeling in Logical Design
Summary
References
Organizations and Normative Agents
Introduction
Agents Societies
Organizational Model
Agent Model
Social Model
Example Revisited
Conclusion
References
A Framework for Agent-Based Software Development
Introduction
Knowledgeability in MAS
Cognitive Capabilities
Interaction in MAS
The Agent-SE Approach
Organization
Assumptions
Modeling
Reasoning Rules
Computational OI
Example: Cooperation
Example: Coordination
Conclusions
References
Application of Agent Technologies in Extended Enterprise Production Planning
Introduction
ExPlanTech Architecture
2.1 Intra-Enterprise Agents
Extra-Enterprise Agents
Extended Enterprise
Interaction among the Agents
Extra-Enterprise Access
Enterprise-to-Enterprise Connection
Conclusions
References
Zamin: An Artificial Ecosystem
Introduction
The Base Model
ERL
Weaknesses of ERL for Project Zamin
The Zamin Model
Design Considerations
Differences between Zamin and ERL
Implementation Results
Conclusion and Further Works
References
Author Index

EurAsia-ICT 2002: Information and Communication Technology: First EurAsian Conference, Shiraz, Iran, October 29-31, 2002, Proceedings (Lecture Notes in Computer Science, 2510)
 3540000283, 9783540000280

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers