Sciweavers

ICCSA
2007
Springer
13 years 11 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
ICCSA
2007
Springer
13 years 11 months ago
An Effective Visualization and Analysis Method for Edge Measurement
The terminology burr defines undesirable result of plastic deformation formed in machining process causing degradation of the accuracy and functionality of the product and its asse...
Andrey Toropov
ICCSA
2007
Springer
13 years 11 months ago
On Dynamic Multicast Trees for Stormless Binding Update in Network Mobility
Mobile IP (MIP) is designed for supporting mobile nodes. The technology does not sufficiently handle NEtwork MObility (NEMO). The NEMO Basic Support (NBS) [1] ensures session conti...
Moonseong Kim, Sungchang Lee, Hyunseung Choo
ICCSA
2007
Springer
13 years 11 months ago
Modeling Origami for Computational Construction and Beyond
Computational origami is the computer assisted study of origami as a branch of science of shapes. The origami construction is a countably finite sequence of fold steps, each consi...
Tetsuo Ida, Hidekazu Takahashi, Mircea Marin, Fado...
ICCSA
2007
Springer
13 years 11 months ago
Solving a Practical Examination Timetabling Problem: A Case Study
This paper presents a Greedy-Least Saturation Degree (G-LSD) heuristic (which is an adaptation of the least saturation degree heuristic) to solve a real-world examination timetabli...
Masri Ayob, Ariff Md. Ab. Malik, Salwani Abdullah,...
ICCSA
2007
Springer
13 years 11 months ago
Low-Complexity Unequal Packet Loss Protection for Real-Time Video over Ubiquitous Networks
Ubiquitous multimedia services are emerging to be available at anytime and anywhere using a variety of computing devices. In this paper, we propose a low-complexity unequal loss pr...
Hojin Ha, Changhoon Yim, Young Yong Kim
ICCSA
2007
Springer
13 years 11 months ago
FRASH: Hierarchical File System for FRAM and Flash
Abstract. In this work, we develop novel file system, FRASH, for byteaddressable NVRAM (FRAM[1]) and NAND Flash device. Byte addressable NVRAM and NAND Flash is typified by the DRA...
Eun-ki Kim, Hyungjong Shin, Byung-gil Jeon, Seokhe...
ICCSA
2007
Springer
13 years 11 months ago
ontoX - A Method for Ontology-Driven Information Extraction
Information Extraction (IE) is an important research field within the Artificial Intelligence community, for it tries to extract relevant information out of vast amounts of data....
Burcu Yildiz, Silvia Miksch
ICCSA
2007
Springer
13 years 11 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
ICCSA
2007
Springer
13 years 11 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader