Computational Science and Its Applications ICCSA 2003 :
[Book]
International Conference Montreal, Canada, May 18-21, 2003 Proceedings, Part 2.
Gerhard Goos
Berlin/Heidelberg
Springer Berlin Heidelberg
2003
(975 pages)
A Proposal for DoS-Defensive Internet Key Exchange★
Lecture Notes in Computer Science; Computational Science and Its Applications --; ICCSA 2003; Copyright; Preface; Conference Organization; Table of Contents, Part II; Table of Contents, Part I; Table of Contents, Part III; Dynamic Recovery Algorithm for the Multiple Failures in the WDM Based UMTS NetworksDynamic Recovery Algorithm for the Multiple Failures in the WDM Based UMTS Networks; Efficient Queuing Management Scheme with Image/Voice/Data Calls for Reducing Blocking Rate in Multimedia Mobile Networks; Anomaly Detection Scheme Using Data Mining in Mobile Environment. Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking TechnologyMobile Broadcasting Copyrights Model Based on XrML; Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks; Web-Based Object-Oriented Modeling on Internet; Uncertainty Analysis Based on Sensitivities Generated Using Automatic Differentiation; Evaluation of a Computer Model for Wavy Falling Films Using EFCOSS★; Automatic Differentiation for Optimum Design, Applied to Sonic Boom Reduction; An Example of an Automatic Differentiation-Based Modelling System Coupling Tangent-Linear and Adjoint ModelsHierarchical Automatic Differentiation by Vertex Elimination and Source Transformation; An Enhanced Hand-Off Policy to Reduce Blocking Probability in Two-Layer Wireless Systems; On Bandwidth Adjusted Multicast in Pipelined Routing Architecture for Mobile Environment; Cost Effective Location Management Scheme Based on Hierarchical Mobile IPv6★; On Employing Hierarchical Structure in PCS Networks; Design of Mobile IP Extension for Nested Mobile Network*; Dual Transmission Architecture for Mobile Multicasting1 Secure Source Specific Multicast for Networks Including Mobile HostsSecurity Analysis and Applications of Standard Key Agreement Protocols; An Improved Password Authentication Key Exchange Protocol for 802.11 Environment★; A Ticket-Based AAA Security Mechanism in Mobile IP Network; Secure and Scalable Mobile IP Registration Scheme Using PKI★; Secure Session Key Exchange for Mobile IP Low Latency Handoffs; A Coarse-Grained Multicomputer Algorithm for the Longest Repeated Suffix Ending at Each Point in a Word; A Parallel Wavefront Algorithm for Efficient Biological Sequence Comparison★ Mining Multivariate Time Series Models with Soft-Computing Techniques: A Coarse-Grained Parallel Computing Approach★Towards Realistic Implementations of External Memory Algorithms Using a Coarse Grained Paradigm; Designing an Efficient Partitioning Algorithm for Grid Environments with Application to N-body Problems★; Coarse-Grained Parallel Matrix-Free Solution of a Three-Dimensional Elliptic Prototype Problem; Parallel CLUSTAL W for PC Clusters; A Robust Watermarking Technique in Geometric Distortion of Digital Image; Design of Secure Monitor in the Secure Zone Cooperation