Tag G. Kim354024476X, 9783540244769, 9783540305835
Table of contents :
Table of Contents……Page 10
Continuity and Change (Activity) Are Fundamentally Related in DEVS Simulation of Continuous Systems……Page 18
Systems Theory: Melding the AI and Simulation Perspectives……Page 31
Unified Modeling for Singularly Perturbed Systems by Delta Operators: Pole Assignment Case……Page 41
A Disaster Relief Simulation Model of a Building Fire……Page 50
Evaluation of Transaction Risks of Mean Variance Model Under Identical Variance of the Rate of Return Simulation in Artificial Market……Page 59
Association Rule Discovery in Data Mining by Implementing Principal Component Analysis……Page 67
Reorder Decision System Based on the Concept of the Order Risk Using Neural Networks……Page 78
Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System……Page 88
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction……Page 98
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack……Page 107
Recognition of Human Action for Game System……Page 117
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network……Page 126
Describing the HLA Using the DFSS Formalism……Page 134
Proposal of High Level Architecture Extension……Page 145
High Performance Modeling for Distributed Simulation……Page 155
The Hierarchical Federation Architecture for the Interoperability of ROK and US Simulations……Page 164
PPSS: CBR System for ERP Project Pre-planning……Page 174
A Scheduling Analysis in FMS Using the Transitive Matrix……Page 184
Simulation of Artificial Life Model in Game Space……Page 196
An Extensible Framework for Advanced Distributed Virtual Environment on Grid……Page 205
Diffusion of Word-of-Mouth in Segmented Society: Agent-Based Simulation Approach……Page 215
E-mail Classification Agent Using Category Generation and Dynamic Category Hierarchy……Page 224
The Investigation of the Agent in the Artificial Market……Page 232
Plan-Based Coordination of a Multi-agent System for Protein Structure Prediction……Page 241
Using Cell-DEVS for Modeling Complex Cell Spaces……Page 250
State Minimization of SP-DEVS……Page 260
DEVS Formalism: A Hierarchical Generation Scheme……Page 270
Does Rational Decision Making Always Lead to High Social Welfare?……Page 279
Large-Scale Systems Design: A Revolutionary New Approach in Software Hardware Co-design……Page 287
Timed I/O Test Sequences for Discrete Event Model Verification……Page 292
A Formal Description Specification for Multi-resolution Modeling (MRM) Based on DEVS Formalism……Page 302
Research and Implementation of the Context-Aware Middleware Based on Neural Network……Page 312
An Efficient Real-Time Middleware Scheduling Algorithm for Periodic Real-Time Tasks……Page 321
Mapping Cooperating GRID Applications by Affinity for Resource Characteristics……Page 330
Modeling of Policy-Based Network with SVDB……Page 340
Timestamp Based Concurrency Control in Broadcast Disks Environment……Page 350
Active Information Based RRK Routing for Mobile Ad Hoc Network……Page 359
Applying Web Services and Design Patterns to Modeling and Simulating Real-World Systems……Page 368
Ontology Based Integration of Web Databases by Utilizing Web Interfaces……Page 377
A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS Models……Page 387
Automated Cyber-attack Scenario Generation Using the Symbolic Simulation……Page 397
A Discrete Event Simulation Study for Incoming Call Centers of a Telecommunication Service Company……Page 407
Requirements Analysis and a Design of Computational Environment for HSE (Human-Sensibility Ergonomics) Simulator……Page 417
Using a Clustering Genetic Algorithm to Support Customer Segmentation for Personalized Recommender Systems……Page 426
System Properties of Action Theories……Page 433
Identification of Gene Interaction Networks Based on Evolutionary Computation……Page 445
Modeling Software Component Criticality Using a Machine Learning Approach……Page 457
Component Architecture Redesigning Approach Using Component Metrics……Page 466
A Workflow Variability Design Technique for Dynamic Component Integration……Page 477
Measuring Semantic Similarity Based on Weighting Attributes of Edge Counting……Page 487
3D Watermarking Shape Recognition System Using Normal Vector Distribution Modelling……Page 498
DWT-Based Image Watermarking for Copyright Protection……Page 507
Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image Watermarking……Page 515
Data Aggregation for Wireless Sensor Networks Using Self-organizing Map……Page 525
Feasibility and Performance Study of a Shared Disks Cluster for Real-Time Processing……Page 535
A Web Cluster Simulator for Performance Analysis of the ALBM Cluster System……Page 545
Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network Environment……Page 555
Application of Feedforward Neural Network for the Deblocking of Low Bit Rate Coded Images……Page 564
A Dynamic Bandwidth Allocation Algorithm with Supporting QoS for EPON……Page 573
A Layered Scripting Language Technique for Avatar Behavior Representation and Control……Page 582
An Integrated Environment Blending Dynamic and Geometry Models……Page 591
Linux-Based System Modelling for Cyber-attack Simulation……Page 602
A Rule Based Approach to Network Fault and Security Diagnosis with Agent Collaboration……Page 614
Transient Time Analysis of Network Security Survivability Using DEVS……Page 624
A Harmful Content Protection in Peer-to-Peer Networks……Page 634
Security Agent Model Using Interactive Authentication Database……Page 644
Discrete-Event Semantics for Tools for Business Process Modeling in Web-Service Era……Page 652
An Architecture Modelling of a Workflow Management System……Page 662
Client Authentication Model Using Duplicated Authentication Server Systems……Page 672
Dynamic Visualization of Signal Transduction Pathways from Database Information……Page 680
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval……Page 690
CONDOCS: A Concept-Based Document Categorization System Using Concept-Probability Vector with Thesaurus……Page 700
Using DEVS for Modeling and Simulation of Human Behaviour……Page 709
Simulation Semantics for Min-Max DEVS Models……Page 716
K……Page 726
T……Page 727
Z……Page 728
Reviews
There are no reviews yet.