default search action
7th ACIS-ICIS 2008: Portland, Oregon, USA
- Roger Y. Lee:
7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA. IEEE Computer Society 2008, ISBN 978-0-7695-3131-1
Keynotes
- David Garlan:
Software Architectures for Task-Oriented Computing. 3 - C. V. Ramamoorthy:
Issues and Models of Security Oriented Systems. 4
Communication Systems and Networks Track
- Xiaogang Yang, Baosong Shan, Yaping Yang:
A Rate Control Protocol for High Speed Streaming Video. 7-12 - Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Collaboration between Security Devices toward improving Network Defense. 13-18 - Lei Wang, Yanqin Zhu, Lanfang Jin, Xizhao Luo:
Trust Mechanism in Distributed Access Control Model of P2P Networks. 19-24
Computer Architecture and VLSI Track
- Peng Huang, Daniel H.-Y. Teng, Khan A. Wahid, Seok-Bum Ko:
Convergence Analysis of Jacobi Iterative Method Using Logarithmic Number System. 27-32 - Amin Asghari, Seied Ahmad Motamedi, Sepehr Attarchi:
Effective RTL Method to Develop On-Line Self-Test Routine for the Processors Using the Wavelet Transform. 33-38
Computer Science, Information Science, and Information
- Mir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri:
Comparison between New Quantum Approaches for Finding the Minimum or the Maximum of an Unsorted Set of Integers. 41-46 - Mir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri:
Evaluation on Quantum Computation and Classic Parallel Approaches for Finding Estimation of the Length of Shortest Path in a Weighted Graph. 47-54 - Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu:
A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges. 55-60 - Yongcheng Zhang:
Radix Plus Length Based Insert Sort. 61-66
Control Systems, Intelligent System Track
- Huy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Chen:
An Integer Linear Programming Approach for Dedicated Machine Constraint. 69-74 - Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan:
Efficient Complex Event Processing over RFID Data Stream. 75-81 - M. Hadi Mashinchi, M. Reza Mashinchi, Mashaallah Mashinchi:
Tabu Search Solution for Fuzzy Linear Programming. 82-87 - Jinhe Wang, Nan Zhang:
Temperature Control for the Thermal Cycling of Polymerase Chain Reaction. 88-92
Data Mining, Data Warehousing, and Database Track
- Jinguo You, Jianqing Xi, Pingjian Zhang, Hu Chen:
A Parallel Algorithm for Closed Cube Computation. 95-99 - Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu:
An Efficient Structural Index for Graph-Structured Data. 100-106 - Qiong Wei, Yansheng Lu, Qiang Lou:
(t, lambda)-Uniqueness: Anonymity Management for Data Publication. 107-112 - Abdul Mateen, Basit Raza, Tauqeer Hussain, Mian M. Awais:
Autonomic Computing in SQL Server. 113-118 - Jayanta Basak, Sunil Goyal:
Cross-Channel Customer Mapping. 119-126 - Tadashi Murakami:
DBPowder-mdl: Mapping Description Language between Applications and Databases. 127-132 - Duc A. Tran, Khanh Vu:
Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information Loss. 133-139 - Shuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu:
Entropy Based Clustering of Data Streams with Mixed Numeric and Categorical Values. 140-145 - Hemalatha Diwakar, Alka Vaidya:
Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks. 146-151 - Qiong Wei, Yansheng Lu, Qiang Lou:
Privacy-Preserving Data Publishing Based on De-clustering. 152-157 - Zouhaier Brahmia, Rafik Bouaziz:
Schema Versioning in Multi-temporal XML Databases. 158-164 - Shuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu:
Subspace Clustering of High Dimensional Data Streams. 165-170 - Thuy T. Le, Syeda Naema Hashmi, Kurt McMullin:
Synchronizer - A Web-Based Application to Enhance Capabilities of NEESCentral Web Portal. 171-176
Image Processing and Pattern Recognition Track
- Sepehr Attarchi, Karim Faez, Amin Asghari:
A Fast and Accurate Iris Recognition Method Using the Complex Inversion Map and 2DPCA. 179-184 - Yan Song, Anan Liu, Lin Pang, Shouxun Lin, Yongdong Zhang, Sheng Tang:
A Novel Image Text Extraction Method Based on K-Means Clustering. 185-190 - Ke Gao, Shouxun Lin, Yongdong Zhang, Sheng Tang, Huamin Ren:
Attention Model Based SIFT Keypoints Filtration for Image Retrieval. 191-196 - Zhong Gao, Guanming Lu, Daquan Gu, Chun He:
Content-Based Classifying Traditional Chinese Calligraphic Images. 197-201 - Yingjie Zhang, Liling Ge:
Region-Based Image Fusion Approach Using Iterative Algorithm. 202-207 - Mir Hashem Mousavi, Karim Faez, Amin Asghari:
Three Dimensional Face Recognition Using SVM Classifier. 208-213
Image, Acoustic, Speech and Signal Processing Track
- Yanxiong Li, Qianhua He, Tao Li:
A Novel Detection Method of Filled Pause in Mandarin Spontaneous Speech. 217-222 - Yang Xu, Houfeng Wang, Xue-qiang Lü:
Research of English-Chinese Alignment at Word Granularity on Parallel Corpora. 223-228
Information Management Systems and Management Track
- Thomas Neubauer, Johannes Heurix:
Objective Types for the Valuation of Secure Business Processes. 231-236 - Young Dae Kim, Chan Kyou Hwang, Jae-Hyoung Yoo:
On-Line Network Reachability Analysis Using Forward Information Base Emulation. 237-240 - N. R. Sunitha, B. B. Amberker, Prashant Koulgi:
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. 241-246 - Qianhui Althea Liang, J. Leon Zhao:
Verification of Unstructured Workflows via Propositional Logic. 247-252
Intelligent Agent Technology, Agent Based Systems Track
- Sun K. Yoo, Jun Choe, Do Yoon Kim:
Agent Based Architecture for Secure Access from Multiple Hospitals. 255-258 - Dayong Ye, Quan Bai, Minjie Zhang, Zhen Ye:
P2P Distributed Intrusion Detections by Using Mobile Agents. 259-265
Internet Technology and Applications, E-commerce Track
- Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu:
An Adaptive Index of XML for Frequent Branching Path Queries. 269-275 - Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
Email Categorization Using (2+1)-Tier Classification Algorithms. 276-281 - Yongquan Cai, Xiuying Li:
Identity-Based Conference Key Distribution Scheme Using Sealed Lock. 282-286 - Ge Zhang, Feng Cheng, Christoph Meinel:
SIMPA: A SIP-Based Mobile Payment Architecture. 287-292
Knowledge Discovery, Artificial Intelligence, Neural Networks Track
- Yan Yu, Pilian He, Yushan Bai, Zhenlei Yang:
A Document Clustering Method Based on One-Dimensional SOM. 295-300 - Dongshu Yan, Jintao Zhang, Bo Yu, Changtong Luo, Shaoliang Zhang:
A Genetic Algorithm for Finding Minimal Multi-homogeneous Bézout Number. 301-305 - Hongjie Liu, Boqin Feng, Jianjie Wei:
An Effective Data Classification Algorithm Based on the Decision Table Grid. 306-311 - Li-Qing Qiu, Ru-Yi Zhao, Gang Zhou, Sheng-Wei Yi:
An Extensive Empirical Study of Feature Selection for Text Categorization. 312-315 - Xiulan Hao, Chenghong Zhang, Hexiang Xu, Xiaopeng Tao, Shuyun Wang, Yunfa Hu:
An Improved Condensing Algorithm. 316-321 - Vo Dinh Minh Nhat, Duc Vo, Subhash Challa, Sungyoung Lee:
Efficient Projection for Compressed Sensing. 322-327 - Ricardo Gacitúa, Peter Sawyer:
Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition Techniques. 328-333 - Changtong Luo, Shaoliang Zhang, Bo Yu:
Low Dimensional Reproduction Strategy for Real-Coded Evolutionary Algorithms. 334-339 - Ryutaro Ichise:
Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity Measures. 340-346 - Farshad Kyoomarsi, Hamid Khosravi, Esfandiar Eslami, Pooya Khosravyan Dehkordy, Asghar Tajoddin:
Optimizing Text Summarization Based on Fuzzy Logic. 347-352
Middleware Architectures and Techniques Track
- Yucong Duan, Kyo Chul Kang, Yuqing Gu:
A Solution Framework on Fundamentals in Model Transformation. 355-360 - Shahid Mumtaz, Atílio Gameiro, Jonathan Rodriguez:
EESM for IEEE 802.16e: WiMaX. 361-366 - Ivan Silva Neto, Francisco Reverbel:
Lessons Learned from Implementing WS-Coordination and WS-AtomicTransaction. 367-372 - (Withdrawn) Observations on Liner Prediction Based Blind Source Extraction Algorithms. 373-376
- Minghui Wang, Yongquan Yu, Bi Zeng:
Research and Application of Information Granulation Based on Extension Method. 377-381 - Tomi Räty, Johannes Oikarinen, Mikko Nieminen, Mikko Lindholm:
Sensor Data Collection of the Single Location Surveillance Point System. 382-387
Mobile/Wireless Computing Track
- Jing Xie, Dan Yu, Shilong Ma:
A Novel Enterprise Mobile E-mail System Using the SyncML Protocol. 391-396 - Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Chang-Sun Shin, Hyun Yoe:
Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses. 397-400 - Sheng-Tzong Cheng, Szu-Yun Li, Chia-Mei Chen:
Distributed Detection in Wireless Sensor Networks. 401-406
Parallel and Distributed Computing and Systems Track
- Young-Joo Kim, Daeyoung Kim, Yong-Kee Jun:
An Empirical Analysis of Intel Thread Checker for Detecting Races in OpenMP Programs. 409-414 - Rashid Bin Muhammad:
Execution Time Analysis of a Parallel Steiner Tree Algorithm on Server-Client Model of Computation. 415-420 - Jing-jun Zhao, Shu-xin Bao, Yu Li:
Exponential Integral Methods for Burgers Equation. 421-426 - Nitin, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Finite-State Modeling and Testing of Image Based Authentication System. 427-432 - Fadi N. Sibai:
Gauging the OpenSourceMark Benchmark in Measuring CPU Performance. 433-438 - Wenhong Wei, Wenjun Xiao, Zhen Zhang:
Parallel Sorting on the Biswapped Network. 439-443 - Chunbo Chu, Monica Brockmeyer:
Predicate Detection Modality and Semantics in Three Partially Synchronous Models. 444-450
Programming Languages, Compilers, and Operating Systems Track
- Kostadin Kratchanov, Emilia Golemanova, Tzanko Golemanov:
Control Network Programming Illustrated: Solving Problems with Inherent Graph-Like Representation. 453-459
Software Metrics and Project Management Track
- Tauqeer Hussain, Mian M. Awais:
An Effort-Based Approach to Measure Completeness of an Entity-Relationship Model. 463-468 - Youngki Hong, Jongmoon Baik, In-Young Ko, Ho-Jin Choi:
A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics. 469-474 - Jinhua Li, Zhibing Ma, Huangzhen Dong:
Monitoring Software Projects with Earned Value Analysis and Use Case Point. 475-480
Software Engineering and Information Engineering Track
- Haihe Shi, Jinyun Xue, Dawei Du:
A Mechanical Approach for Deriving Algorithmic Programs. 483-487 - Jaroslav Král, Michal Zemlicka:
Engineering Education - A Great Challenge to Software Engineering. 488-495 - Haihe Shi, Dawei Du, Jinyun Xue:
Generating Algorithms plus Loop Invariants by Formal Derivation. 496-501 - Seon-Jae Jang, Hae-Geun Kim, Youn-Ky Chung:
Manual Specific Testing and Quality Evaluation for Embedded Software. 502-507 - Oh-Hyun Kwon, Sun-Myung Hwang:
Mobile GUI Testing Tool based on Image Flow. 508-512 - Lile Hattori, Dalton Serey Guerrero, Jorge C. A. de Figueiredo, João Brunet, Jemerson Damásio:
On the Precision and Accuracy of Impact Analysis Techniques. 513-518 - Sajid Ibrahim Hashmi, Jongmoon Baik:
Quantitative Process Improvement in XP Using Six Sigma Tools. 519-524 - Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma:
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. 525-530 - Mikyeong Moon, Heung Seok Chae, Junseok Park, Keunhyuk Yeom:
Two-Dimensional Framework for Analyzing Variabilities in Software Product Lines. 531-536
Software Reuse, Design Patterns Track
- Miao Wang, Rongcai Zhao, Jianmin Pang, Guoming Cai:
Reconstructing Control Flow in Modulo Scheduled Loops. 539-544 - Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang:
Recovering Variable-Argument Functions from Binary Executables. 545-550
Software Testing and Tools Track
- Prabu Dorairaj, Devi Prasad Bhukya, Lakshminarayana Prasad Kantam, Kishor Arumilli:
A New Operational Framework for Benchmarking the SAN Products. 553-560 - Hoyeon Ryu, Dong-Kuk Ryu, Jongmoon Baik:
A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMM. 561-566 - Yogesh Singh, Anju Saha:
Enhancing Data Flow Testing of Classes through Design by Contract. 567-574 - Nitin, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. 575-580 - Izzat Alsmadi:
The Utilization of User Sessions in Testing. 581-585
UML, OO Modeling, and Simulation Track
- Jiuzhen Jin, Jianmin Pang, Zheng Shan, Rongcai Zhao:
Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS. 589-594
Visual and Multimedia Track
- Duc A. Tran, S. R. Pamidimukkala, Phuong Nguyen:
Relevance-Feedback Image Retrieval Based on Multiple-Instance Learning. 597-602
Web Engineering and Applications Track
- Minhyuk Oh, Jongmoon Baik, Sungwon Kang, Ho-Jin Choi:
An Efficient Approach for QoS-Aware Service Selection Based on a Tree-Based Algorithm. 605-610 - Yongwang Zhao, Dianfu Ma, Min Liu, Chunyang Hu:
Coordination Behavioral Structure: A Web Services Coordination Model in Dynamic Environment. 611-617 - Jim Lau, Lau Cheuk Lung, Joni da Silva Fraga, Giuliana Santos Veronese:
Designing Fault Tolerant Web Services Using BPEL. 618-623 - Rujuan Liu, Changjun Hu, Chongchong Zhao, Zhong Gao:
Verification for Time Consistency of Web Service Flow. 624-629 - Ya-mei Xia, Jun-Liang Chen, Xiang-wu Meng:
On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones. 630-635
Workshop on E-activity Track
- Yoshihito Saito, Takayuki Fujimoto, Tokuro Matsuo:
A New Negotiation Mechanism for Agent-Based Lecture Allocation Systems. 639-644 - Jungmin Shin, Joachim Hammer, Herman Lam:
RDF-Based Approach to Data Transform Composition. 645-648 - Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee:
Building a Service-Oriented Ontology for Wireless Sensor Networks. 649-654 - Dukyun Nam, June Hawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim:
Research Process Support with Organizational Flow in e-Science. 655-660 - Takayuki Fujimoto, Muhammad Dzulqarnain bin Muhammad Nasir, Tokuro Matsuo:
A Design on Collaborative-Cooperative Document Edit System Based on Cognitive Analyses. 661-666 - Hamidreza Amouzegar, Shahriar Mohammadi, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji:
A New Approach on Interactive SOA Security Model Based on Automata. 667-671 - Jin-Suk Kang, Yonghee You, Mee Young Sung, Taikyeong T. Jeong, Jong-An Park:
Mobile Mapping Service Using Scalable Vector Graphics on the Human Geographic. 672-677 - HaiBo Zhu, Ying Zou:
Analysis of E-bank Innovation in China Using a Hypercube Model. 678-683 - Sabina Jeschke, Helmut Vieritz, Olivier Pfeiffer:
Developing Accessible Applications with User-Centered Architecture. 684-689 - Pyungkwan Ko, Sanggil Kang, Harshit Kumar:
Web Page Dependent Vision Based Segementation for Web Sites. 690-694 - Himanshu Agrawal, Andrew Jennings, Mark A. Gregory, Daud Channa:
Robust Routing. 695-700
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.