Workshop on Parallel and Distributed Computing (PDC 2006).- Resource Demand Prediction-Based Grid Resource Transaction Network Model in Grid Computing Environment.- A CGM Algorithm Solving the Longest Increasing Subsequence Problem.- Computer Assisted Source-Code Parallelisation.- A Template Language for Agent Construction.- Efficient Parallel Processing for K-Nearest-Neighbor Search in Spatial Databases.- An Adaptive Mobile System Using Mobile Grid Computing in Wireless Network.- Comparison of Allocation Algorithms for Mesh Structured Networks with Using Multistage Simulation.- The Election Problem in Asynchronous Distributed Systems with Bounded Faulty Processes.- Improving the Genetic Algorithms Performance in Simple Assembly Line Balancing.- Reformulation and Solution Approaches for an Integrated Scheduling Model.- Safety of a Client-Based Version Vector Consistency Protocol of Session Guarantees.- A New I/O Architecture for Improving the Performance in Large Scale Clusters.- Performance Modeling of a Fully Adaptive and Fault-Tolerant Wormhole Switching Strategy in 2-D Mesh.- Parallelization of Simulations for Various Magnetic System Models on Small-Sized Cluster Computers with MPI.- A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive Computing.- X-Torus: A Variation of Torus Topology with Lower Diameter and Larger Bisection Width.- Feedback Vertex Sets in Rotator Graphs.- Efficient Longest Common Subsequence Computation Using Bulk-Synchronous Parallelism.- Simulation of Internet Transport Protocols for High Bandwidth-Delay Networks.- Performance Evaluation of Parallel Systems Employing Roll-Forward Checkpoint Schemes.- A Purely Distributed Approach for Coupling Scientific and Engineering Applications.- A Monitoring and Visualization Tool and Its Application for a Network Enabled Server Platform.- Parallel Hash Join Algorithms for Dynamic Load Balancing in a Shared Disks Cluster.- Workshop on Security Issues on Grid/Distributed Computing Systems (SIGDCS 2006).- Towards Reliable and Trustworthy Cooperation in Grid: A Pre-evaluating Set Based Trust Model.- A Spreading MIMO-OFDM Transmission Scheme for Wireless Mobile Environment.- A Security Auditing Approach Based on Mobile Agent in Grid Environments.- XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing.- Optimization of a Simulation for 300mm FAB Semiconductor Manufacturing.- Performance Analysis Using the Two Kinds of Receiving Gain of Smart Antenna in IS20001X System.- An Improved Popescu’s Authenticated Key Agreement Protocol.- SVM Based False Alarm Minimization Scheme on Intrusion Prevention System.- Lightweight Wireless Intrusion Detection Systems Against DDoS Attack.- One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity.- Loss Reduction in Distribution Networks Using Cyclic Best First Search.- Short-Term Power Demand Forecasting Using Information Technology Based Data Mining Method.- A Design of the Flexible Mobile Agents Based on Web.- A Sales Agent Using Case-Based Reasoning and Rule-Based Reasoning for E-Commerce System.- A New Ciphering Method Associated with Evolutionary Algorithm.- Power Distribution Automation System Using Information Technology Based Web Active Database.- Workshop on Image Processing and Computer Vision (IPCV 2006).- Alternative Target Density Functions for Radar Imaging.- A Novel Image Restoration Algorithm Based on High-Dimensional Space Geometry.- A Fast Image Retrieval System Based on Color-Space and Color-Texture Features.- Generation of Dynamic Heart Model Based on 4D Echocardiographic Images.- Object-Based Image Retrieval Using Dominant Color Pairs Between Adjacent Regions.- Real-Time Vision Tracking Algorithm.- Efficient Method to Perform Isomorphism Testing of Labeled Graphs.- Camera Motion Parameter Estimation Technique Using 2D Homography and LM Method Based on Projective and Permutation Invariant Features.- Automatic Generation Technique of Three-Dimensional Model Corresponding to Individual Vessels.- Modulating Energy Distribution of Reflected Light Based on Images.- Workshop on Integrated Analysis and Intelligent Design Technology (IAIDT 2006).- Aerodynamic Analysis on the Supersonic Separation of Air-Launching Rocker from the Mother Plane.- Effect of Grid Resolution on the Statistics of Passive Scalar in an Injection-Driven Channel.- Test of Large Eddy Simulation in Complex Flow with High Schmidt Number.- High-End Modeling and Simulation of Cookoff of HMX-Based Energetic Materials.- Multiobjective Optimization Using Adjoint Gradient Enhanced Approximation Models for Genetic Algorithms.- Development of Automated Generation Algorithm for Skipped Surface in Die Design.- Development of Requirement Driven Design Concept Selection Process in Aerospace System.- A TMO-Based Tele-operation Model: Supporting Real-Time Applications in Grid Environments.- Design Trade-Offs and Power Reduction Techniques for High Performance Circuits and System.- Cavitation Flow Analysis of Axisymmetric Bodies Moving in the Water.- Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. B).- Design and Implementation of Semantic Web Search System Using Ontology and Anchor Text.- Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO.- Web Document Classification Using Changing Training Data Set.- Study on Contents Protection in M-Learning Environment.- Design of Security Session Reuse in Content-Based Load Distribution Server.- Design of POC System in Ubiquitous Environment.- The Performance Evaluation of OFDM/HL-16QAM System for Optimizing Image Transmission Quality in Wireless Fading.- Reliable Evaluations of URL Normalization.- Enhanced Misuse Case Model: A Security Requirement Analysis and Specification Model.- An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network.- Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data.- Process Development Methodology for U-Integrated Management System.- A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems.- Optimization of Fuzzy Rules: Integrated Approach for Classification Problems.- A Cooperation Model Using Reinforcement Learning for Multi-agent.- Development of Network Event Analysis Algorithm Applying Association Rule.- A New Secure Oblivious Transfer Protocol.- Analysis of Security Session Reusing in Distribution Server System.- Clustered OFDMA in the Multi-path Fading Channel.- Distribution Antenna Diversity System According to Adaptive Correlation Method for OFDM-DS/CDMA in a Frequency Selective Fading Channel.- General Tracks.- MIDAS: Detection of Non-technical Losses in Electrical Consumption Using Neural Networks and Statistical Techniques.- Hyperbolic Voronoi Diagram.- Effects of Confinement on Chemical Reaction Equilibrium in Nanoporous Materials.- Multi-channel Estimation in Multiple Antenna MB-OFDM UWB System for Home Entertainment Network.- Compiler-Optimized Kernels: An Efficient Alternative to Hand-Coded Inner Kernels.- Noise Subspace Fuzzy C-Means Clustering for Robust Speech Recognition.- Using Box-Muller with Low Discrepancy Points.- A Fast Integration Method and Its Application in a Medical Physics Problem.- Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices.- Survivable Mechanism for IEEE 802.11 WLAN Improvements.- Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases.- Performance Analysis of Dynamic Host Isolation System in Wireless Mobile Networks.- Meta-model Driven Collaborative Object Analysis Process for Production Planning and Scheduling Domain.- Response Against Hacking and Malicious Code in P2P.- Two Efficient and Secure Authentication Schemes Using Smart Cards.- Location-Aware Agent Using Data Mining for the Distributed Location-Based Services.- An Empirical Development Case of a Software-Intensive System Based on the Rational Unified Process.- Color Preference and Personality Modeling Using Fuzzy Reasoning Rule.- The Development of Reliability Verification Tool of RFID Tag for Effective Product Control Systems.- Avoidance of State Explosion Using Dependency Analysis in Model Checking Control Flow Model.- Design and Implementation of Web Usage Mining System Using Page Scroll.- A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.- Rotor Design for the Performance Optimization of Canard Rotor/Wing Aircraft.- Process Decomposition and Choreography for Distributed Scientific Workflow Enactment.- Adaptive Multi-carrier Direct-Sequence CDMA System Using Fast-Frequency-Hopping.- Object Modeling for Mapping XML Document Represented in XML-GDM to UML Class Diagram.- A Two-Phase Local Server Security Model Based on XML Certificate.- Integrated Object Modeling for Web-Based XML Application Documents.- Model of Generating SMIL Document Using Temporal Scripts of Animation Component.- Marginal Bone Destructions in Dental Radiography Using Multi-template Based on Internet Services.- The Band Selection Algorithm in Supervised Classification Using Mixed-Pixels and Canonical Correlation Analysis.- Domain Analysis for Components Based Developments.