· pdf fileekin koc, nur ersoy, ali andac, zelal seda camlidere, ibrahim cereci and hurevren...
TRANSCRIPT
Contents
Search Computing: Addressing Complex Search on the Web . . . . . . . 1Stefano Ceri and Marco Brambilla
Part I Web Computing and Search
Hypergraph-Theoretic Partitioning Models forParallel Web Crawling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Ata Turk, B. Barla Cambazoglu and Cevdet Aykanat
Web Service Discovery: A Service Oriented, Peer-to-Peer Approachwith Categorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Mustafa Onur Özorhan and Nihan Kesim Cicekli
Finding High Order Dependencies in Data . . . . . . . . . . . . . . . . . . . . . 35Rosa Meo and Leonardo D’Ambrosi
Heuristic Algorithms for Real-Time Unsplittable DataDissemination Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Mustafa Müjdat Atanak and Atakan Dogan
Automatic Categorization of Ottoman Literary Textsby Poet and Time Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Ethem F. Can, Fazli Can, Pinar Duygulu and Mehmet Kalpakli
An Empirical Study About Search-Based Refactoring UsingAlternative Multiple and Population-Based Search Techniques . . . . . . 59Ekin Koc, Nur Ersoy, Ali Andac, Zelal Seda Camlidere,Ibrahim Cereci and Hurevren Kilic
vii
Part II Data Engineering
Unsupervised Morphological Analysis Using Tries . . . . . . . . . . . . . . . 69Koray Ak and Olcay Taner Yildiz
A Novel Approach to Morphological Disambiguation for Turkish . . . . 77Onur Görgün and Olcay Taner Yildiz
A Small Footprint Hybrid Statistical and Unit SelectionText-to-Speech Synthesis System for Turkish . . . . . . . . . . . . . . . . . . . 85Ekrem Guner and Cenk Demiroglu
Enhancing Incremental Feature Subset Selectionin High-Dimensional Databases by Adding a Backward Step . . . . . . . 93Pablo Bermejo, Luis de La Ossa, Jose A. Gamez and Jose M. Puerta
Memory Resident Parallel Inverted Index Construction . . . . . . . . . . . 99Tayfun Kucukyilmaz, Ata Turk and Cevdet Aykanat
Dynamic Programming with Ant Colony Optimization Metaheuristicfor Optimization of Distributed Database Queries . . . . . . . . . . . . . . . 107Tansel Dökeroglu and Ahmet Cosar
Part III Green ICT
Energy Cost Model for Frequent Item Set Discoveryin Unstructured P2P Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Emrah Cem, Ender Demirkaya, Ertem Esiner, Burak Ozaydinand Oznur Ozkasap
Towards a Fairer Energy Consumption in WirelessAd hoc Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125Maurizio D’Arienzo
Energy Efficient Resource Allocation Strategyfor Cloud Data Centres . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Dang Minh Quan, Robert Basmadjian, Hermann De Meer, Ricardo Lent,Toktam Mahmoodi, Domenico Sannelli, Federico Mezza,Luigi Telesca and Corenten Dupont
A Survey of Recent Work on Energy Harvesting Networks . . . . . . . . 143H. Erkal, F. M. Ozcelik, M. A. Antepli, B. T. Bacinogluand E. Uysal-Biyikoglu
viii Contents
Distributed Energy-Aware Routing Protocol. . . . . . . . . . . . . . . . . . . . 149Erol Gelenbe and Toktam Mahmoodi
Part IV Wireless Networks
A Distributed Scheme to Detect Wormhole Attacks inMobile Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Oya Simsek and Albert Levi
Cross-Layer Optimization with Two-Group Loadingfor Ad hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165Hadhrami Ab Ghani, Mustafa Gurcan and Zhenfeng He
Algorithms for Sink Mobility in Wireless Sensor Networksto Improve Network Lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Metin Koç and Ibrahim Körpeoglu
A Hybrid Interference-Aware Multi-Path Routing Protocolfor Mobile Ad hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Phu Hung Le and Guy Pujolle
Providing Automated Actions in Wireless Multimedia SensorNetworks via Active Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185Hakan Öztarak, Kemal Akkaya and Adnan Yazici
File Transfer Application For Sharing Femto Access . . . . . . . . . . . . . 191Mariem Krichen, Johanne Cohen and Dominique Barth
Part V Computer Networks
Time Parallel Simulation and hv-Monotonicity . . . . . . . . . . . . . . . . . . 201J. M. Fourneau, I. Kadi and F. Quessette
A Prediction Based Mobility Extension for eHIP Protocol . . . . . . . . . 209Zeynep Gurkas Aydin, A. Halim Zaim, Hakima Chaouchiand Tulin Atmaca
Performance Evaluation of a Multiuser InteractiveNetworking System: A Comparison of Modelling Methods . . . . . . . . . 215Tadeusz Czachórski, Krzysztof Grochla, Adam Jozefiok,Tomasz Nycz and Ferhan Pekergin
Contents ix
Auction-Based Admission Control for Self-Aware Networks . . . . . . . . 223Georgia Sakellari, Timothy Leung and Erol Gelenbe
Complexity Reduction for Multi-hop Network End-to-EndDelay Minimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Mustafa Gurcan, Irina Ma, Hadhrami Ab Ghani and Zhenfeng He
Performance Improvement of an Optical Network ProvidingServices Based on Multicast. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Vincent Reinhard, Johanne Cohen, Joanna Tomasik, Dominique Barthand Marc-Antoine Weisser
Part VI Discovery Science
FLIP-CPM: A Parallel Community Detection Method . . . . . . . . . . . . 249Enrico Gregori, Luciano Lenzini, Simone Mainardi and Chiara Orsini
G-Network Modelling Based Abnormal Pathway Detectionin Gene Regulatory Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Haseong Kim, Rengul Atalay and Erol Gelenbe
DeDALO: A Framework for Distributed Systems DependenciesDiscovery and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265Emiliano Casalicchio, Antonello Paoletti and Salvatore Tucci
A Content-Based Social Network Study of Evliyâ Çelebi’sSeyahatnâme-Bitlis Section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271Ceyhun Karbeyaz, Ethem F. Can, Fazli Can and Mehmet Kalpakli
On the Parameterised Complexity of Learning Patterns . . . . . . . . . . . 277Frank Stephan, Ryo Yoshinaka and Thomas Zeugmann
Using SVM to Avoid Humans: A Case of a Small AutonomousMobile Robot in an Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283Emi Matsumoto, Michèle Sebag and Einoshin Suzuki
Part VII Computer Vision and Image Processing
Palmprint Verification Using SIFT Majority Voting . . . . . . . . . . . . . . 291H. Pasindu Abeysundera and M. Taner Eskil
x Contents
3D Object Exploration Using Viewpoint and MeshSaliency Entropies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299Ekrem Serin, Candemir Doger and Selim Balcisoy
Boundary Descriptors for Visual Speech Recognition . . . . . . . . . . . . . 307Deepika Gupta, Preety Singh, V. Laxmi and Manoj S. Gaur
Semi-Automatic Adaptation of High-Polygon Wireframe FaceModels Through Inverse Perspective Projection . . . . . . . . . . . . . . . . . 315Kristin S. Benli, Didem Agdogan, Mete Özgüz and M. Taner Eskil
A Fuzzy Metric in GPUs: Fast and Efficient Methodfor the Impulsive Image Noise Removal . . . . . . . . . . . . . . . . . . . . . . . 323María G. Sánchez, Vicente Vidal, Jordi Bataller and Josep Arnal
Improved Secret Image Sharing Method By EncodingShared Values With Authentication Bits . . . . . . . . . . . . . . . . . . . . . . 331Guzin Ulutas, Mustafa Ulutas and Vasif Nabiyev
Part VIII Agent Based Systems
Intelligent Navigation Systems for Building Evacuation . . . . . . . . . . . 339Gokce Gorbil, Avgoustinos Filippoupolitis and Erol Gelenbe
Automatic Population of Scenarios with Augmented Virtuality . . . . . . 347Oscar Ripolles, Jose Simo and Roberto Vivo
Support for Resilient Communications in FutureDisaster Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355V. M. Jones, G. Karagiannis and S. M. Heemstra de Groot
Agent-Based Modeling of a Price Information Trading Business . . . . . 361Saad Ahmad Khan and Ladislau Bölöni
Modeling Lane Preferences in Agent-Based Multi-LaneHighway Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369Yi Luo and Ladislau Bölöni
Chromosome Coding Methods in Genetic Algorithmfor Path Planning of Mobile Robots . . . . . . . . . . . . . . . . . . . . . . . . . . 377Adem Tuncer and Mehmet Yildirim
Contents xi
Part IX Security and Safety
Client-Based CardSpace-OpenID Interoperation. . . . . . . . . . . . . . . . . 387Haitham S. Al-Sinani and Chris J. Mitchell
An Artificial Immune Classifier Using Pseudo-Ellipsoid Rules . . . . . . . 395Aris Lanaridis and Andreas Stafylopatis
Contextually Learnt Detection of Unusual Motion-Based Behaviourin Crowded Public Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403Ognjen Arandjelovic
Grid Security Loopholes with Proposed Countermeasures . . . . . . . . . 411Nureni Ayofe Azeez, Tiko Iyamu and Isabella M. Venter
Detection of Broken Link Fraud in DSDV Routing. . . . . . . . . . . . . . . 419Rajbir Kaur, Vijay Laxmi and Manoj Singh Gaur
Strategies for Risk Facing in Work Environments . . . . . . . . . . . . . . . 425MariaGrazia Fugini, Claudia Raibulet and Filippo Ramoni
Part X Modelling and Simulation
Numerical Integration Methods for Simulationof Mass-Spring-Damper Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435Mete Özgüz and M. Taner Eskil
Multi-Layered Simulation Architecture: A Practical Approach . . . . . . 439Okan Topçu and Halit Oguztüzün
Variable Threshold Based Cutting Method for VirtualSurgery Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445Ömer Çakir, Fatih Çakir and Oguzhan Çakir
Model Based Approach to the Federation Object ModelIndependence Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451Mehmet Fatih Uluat and Halit Oguztüzün
xii Contents
Part XI Architecture and Systems
Secondary Bus Performance in Retiring CacheWrite-Backs to Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463John W. O’Farrell, Rakshith Thambehalli Venkateshand Sanjeev Baskiyar
Runtime Verification of Component-Based Embedded Software . . . . . 471Hasan Sözer, Christian Hofmann, Bedir Tekinerdoganand Mehmet Aksit
Model-Based Software Integration for Flexible Designof Cyber-Physical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479K. Ravindran
Generating Preset Distinguishing Sequences Using SAT . . . . . . . . . . . 487Canan Güniçen, Uraz Cengiz Türker, Hasan Ural and Hüsnü Yenigün
A Decision-Making Ontology for Analytical RequirementsElicitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495Fahmi Bargui, Hanene Ben-Abdallah and Jamel Feki
Part XII Maching Learning
Spatio-Temporal Pattern and Trend Extractionon Turkish Meteorological Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Isil Goler, Pinar Senkul and Adnan Yazici
Contrastive Learning in Random Neural Networksand its Relation to Gradient-Descent Learning . . . . . . . . . . . . . . . . . . 511Alexandre Romariz and Erol Gelenbe
A Genetic Algorithms Based Classifier for Object Classificationin Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519Turgay Yilmaz, Yakup Yildirim and Adnan Yazici
Two Alternate Methods for Information Retrieval fromTurkish Radiology Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527Kerem Hadımlı and Meltem Turhan Yöndem
Scaled On-line Unsupervised Learning Algorithm fora SOM-HMM Hybrid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533Christos Ferles, Georgios Siolas and Andreas Stafylopatis
Contents xiii
Sequential Pattern Knowledge in Multi-Relational Learning . . . . . . . . 539Carlos Abreu Ferreira, João Gama and Vítor Santos Costa
Part XIII Algorithms
Zoom-In/Zoom-Out Algorithms for FCAwith Attribute Granularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Radim Belohlavek, Bernard De Baets and Jan Konecny
A Hyper-Heuristic Based on Random Gradient, Greedyand Dominance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557Ender Özcan and Ahmed Kheiri
A Class of Methods Combining L-BFGS and Truncated Newton. . . . . 565Lennart Frimannslund and Trond Steihaug
Adaptation and Fine-Tuning of the Weighted Sum Methodon Personnel Assignment Problem with Hierarchical Orderingand Team Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571Yılmaz Arslanoglu and Ismail Hakki Toroslu
An Option Pricing Model Calibration UsingAlgorithmic Differentiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577Emmanuel M. Tadjouddine and Yi Cao
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
xiv Contents