Sciweavers

ICCSA
2005
Springer
13 years 10 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das
ICCSA
2005
Springer
13 years 10 months ago
On URL Normalization
Since syntactically different URLs could represent the same resource in WWW, there are on-going efforts to define the URL normalization in the standard communities. This paper cons...
Sang Ho Lee, Sung Jin Kim, Seok-Hoo Hong
ICCSA
2005
Springer
13 years 10 months ago
Flipping to Robustly Delete a Vertex in a Delaunay Tetrahedralization
We discuss the deletion of a single vertex in a Delaunay tetrahedralization (DT). While some theoretical solutions exist for this problem, the many degeneracies in three dimensions...
Hugo Ledoux, Christopher M. Gold, George Baciu
ICCSA
2005
Springer
13 years 10 months ago
An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices
Requests for application services that require large data space such as multimedia, game and database[1] have greatly increased. Nowadays those requests locomote for various servic...
Daegeun Kim, MinHwan Ok, Myong-Soon Park
ICCSA
2005
Springer
13 years 10 months ago
Variability Design and Customization Mechanisms for COTS Components
Component-Based Development (CBD) is gaining popularity as an effective reuse technology. Components in CBD are mainly for interorganizational reuse, rather than intra-organization...
Soo Dong Kim, Hyun Gi Min, Sung Yul Rhew
ICCSA
2005
Springer
13 years 10 months ago
A Systematic Process to Design Product Line Architecture
Product Line Engineering is being accepted as a representative software reuse methodology by using core assets and product line architecture is known as a key element of core asset...
Soo Dong Kim, Soo Ho Chang, Hyun Jung La
ICCSA
2005
Springer
13 years 10 months ago
Parallel Feature-Preserving Mesh Smoothing
Abstract. We present a parallel approach for optimizing surface meshes by redistributing vertices on a feature-aware higher-order reconstruction of a triangulated surface. Our meth...
Xiangmin Jiao, Phillip J. Alexander
ICCSA
2005
Springer
13 years 10 months ago
Improved Location Management Scheme Based on Autoconfigured Logical Topology in HMIPv6
Abstract. Though some studies involving general micro-mobility exist, micromobility research concerning a mobile node (MN) moving between Mobile Anchor Points (MAP) is lacking. In ...
Jongpil Jeong, Hyunsang Youn, Hyunseung Choo, Euns...
ICCSA
2005
Springer
13 years 10 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
ICCSA
2005
Springer
13 years 10 months ago
On AAA with Extended IDK in Mobile IP Networks
Mobile IP proposed by IETF supports continuous services for a mobile node (MN) based on its capability to roam around foreign domains [1]. Recently the rapid growth of wireless tec...
Hoseong Jeon, Min Young Chung, Hyunseung Choo