default search action
8th ACIS-ICIS 2009: Shanghai, China
- Huaikou Miao, Gongzhu Hu:
8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China. IEEE Computer Society 2009, ISBN 978-0-7695-3641-5
Agent Based Systems
- Ching-seh Wu, Wei-chun Chang, Ishwar K. Sethi:
A Metric-Based Multi-Agent System for Software Project Management. 3-8 - Qing Xue, Yang Wei, Zhiwu Tang, Guohui Zhang:
A Research of Cognitive Models for CGF in Tank Member. 9-14 - Wei Weng, Shigeru Fujimura:
Distributed Feedback Mechanism for Just-In-Time Scheduling Problem. 15-20 - Jie Zhou, Yixiang Chen:
Modeling Instability in a New Framework of Interval Valued Process Algebra. 21-26
Algorithms
- Shu Wang, Changjia Chen:
A Heuristic Address Assignment Algorithm Based on Probability in a Network. 29-33 - Habib Seifzadeh, Ali Asghar Pourhaji Kazem, Mehdi Kargahi, Ali Movaghar-Rahimabadi:
A Method for Dynamic Software Updating in Real-Time Systems. 34-38 - Hongtu Ma, Rongcai Zhao, Ling Liang, Xun Li:
A Multi-variable Algorithm for Placing Phi-nodes. 39-43 - Xiaoping Chen, Rongle Kang:
Searching Algorithm with Granularity Changing and the GNSS Integer Ambiguity Estimation. 44-47 - Wei Chen, Zhenkun Zhai, Xiong Li, Jing Guo:
Analysis and Design of an Improved R-learning. 48-52 - Yang Wang:
Effects of Suffix Repetition Rates of a String on the Performance of String Matching Algorithms. 53-58 - Atieh Mirshahvalad, Majid Noorhosseini:
Improving and Extending SMR Technique for Solving Monotonic Problems. 59-64 - Ali Asghar Pourhaji Kazem, Habib Seifzadeh, Mehdi Kargahi, Ali Movaghar-Rahimabadi, Shahriar Lotfi:
Maximizing the Accrued Utility of an Isochronal Soft Real-Time System Using Genetic Algorithms. 65-69 - Yujun Bao, Hong Jiang, Yu Qing Huang, Rongchun Hu:
Multi-objective Optimization of Power Control and Resource Allocation for Cognitive Wireless Networks. 70-74
Artificial Intelligence
- Yuan Yao, Kailong Zhang, Xingshe Zhou:
A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design. 77-81 - Wang Yi-tao, Li Jin-jun:
A Route Planning Optimization Model Based on Improved Ant Colony Algorithm. 82-86 - Robson da Silva Lopes, Márcia Aparecida Fernandes:
Adaptative Instructional Planning Using Workflow and Genetic Algorithms. 87-92 - Jianzhou Chen, Jin Zhang, Chen Fang, Lijuan Zhao, Hans Liljenström:
On Color Texture Generating Based on Simplified KIII Model. 93-96 - Jinghui Ma, Hong Jiang, Yongchun Hu, Yujun Bao:
Optimal Design of Cognitive Radio Wireless Parameters based on Non-dominated Neighbor Distribution Genetic Algorithm. 97-101 - Yanghe Feng, Chaofan Dai:
Research of Knowledge-based Automatic Model Selection Strategy. 102-106 - Xiaohui Ji, Feifei Ma, Jian Zhang:
Solving Global Unconstrained Optimization Problems by Symmetry-Breaking. 107-111
Bioinformatics and Geoinformatics
- Dacheng Xu, Bailiang Li, Anton Nijholt:
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning. 115-119 - Wenfeng Shen, Weijia Lu, Daming Wei, Weimin Xu, Xin Zhu, Shizhong Yuan:
A Parallel Algorithm for Computer Simulation of Electrocardiogram Based on MPI. 120-123 - Feng Yang, Ke Zhi Mao:
Entropy-based Criteria Dealing with the Ties Problem in Gene Selection. 124-129 - MingJie Tang, Yuanchun Zhou, Peng Cui, Haiting Zhang, Liang Hu, YuanSheng Hou, Baoping Yan:
Exploring the Spatial Distribution of Bird Habitat with Cluster Analysis. 130-135 - Fei Luo, Lin Chen:
Parallelizing the Protein Threading Problem in a Hybrid Peer-to-Peer Based High Performance Computing Platform. 136-141 - Buzhou Tang, Xuan Wang, Xiaolong Wang:
Protein Secondary Structure Prediction Using Large Margin Methods. 142-146
Communication Systems & Networks
- Baohua Fan, Heying Zhang, Wenhua Dou:
A Max-plus Network Calculus. 149-154 - Sunil Bhooshan, Vinay Kumar, Gaurav Gayawar, Sah Geetansh Krishna, Kapil Sachdeva:
A New Suggestion for Data Clustering. 155-160 - Bo Wang, Xiangmin Wen, Sun Yong, Zhen Wei:
A Novel NAT Traversal Mechanism in the Heterogeneous Environment. 161-165 - Jingjing Song, Jiguo Yu, Zhaojun Xiang:
An Efficient Search Algorithm for REIK Overlay Network. 166-170 - Hui Xu, Debao Xiao, Zheng Wu:
Application of Security Ontology to Context-Aware Alert Analysis. 171-176 - Jia Zhu, Baoyu Zheng:
Detection Probability Analysis of Cooperative Spectrum Sensing in Rayleigh Fading Channels. 177-182 - Hailong Ma, Yunfei Guo, Jianwei Zhang:
Fast Reroute upon Multi-homed Domains Link Failures. 183-187 - Rui Zhang:
HPRP: Hierarchical Probabilistic Routing Protocol for Wireless Mesh Network. 188-193 - Yong-Min Liu, Xin-Hua Jiang, Xiao-Hong Nian, Wu-Yi Lu:
Improved DCCP Congestion Control for Wireless Sensor Networks. 194-198 - Xu Zhang, Chuang Lin, Xiangzhen Kong:
Model-Driven Dependability Analysis of Virtualization Systems. 199-204 - Xiaowei Qin, Leixin Mai, Xuchu Dai:
Modeling of Hybrid-service in Broadband Wireless Communication System. 205-209 - Wencai Du, Feng Du:
New Smith Predictor and FRBF Neural Network Control for Networked Control Systems. 210-215 - Min Zhang, Shengming Jiang, Gang Wei, Hongjiang Wang:
Performance Analysis of Cognitive Radio Networks against Secondary User's Policies. 216-221 - Liying Xie, Gang Wei, Hongjiang Wang, Zaijin Xie:
Performance Analysis of IEEE 802.11 DCF in Multi-hop Ad Hoc Networks. 222-227 - Jiaqing Huang, Liang Wang, Wenqing Cheng, Hui Li:
Polynomial Time Construction Algorithm of BCNC for Network Coding in Cyclic Networks. 228-233 - Kai Wang, Chuang Lin, Fangqin Liu:
Quality of Protection with Performance Analysis in IP Multimedia Subsystem. 234-239 - Chang-you Xing, Ming Chen:
Research on Optimizing Embedding Space Dimension in Network Coordinate System. 240-245
Computer Architecture and VLSI
- Xingyun Qi, Quanyou Feng, Yongran Chen, Qiang Dou, Wenhua Dou:
A Fault Tolerant Bufferless Optical Interconnection Network. 249-254 - Minghua Tang, Xiaola Lin:
A New Adaptive Flow Control for Mesh-based Network-on-Chip (NoC). 255-260 - Wu Jigang, Ting Lei, Thambipillai Srikanthan:
Efficient Approximate Algorithm for Hardware/Software Partitioning. 261-265 - Tao Li, Wu Jigang, Siew Kei Lam, Thambipillai Srikanthan, Xicheng Lu:
Efficient Heuristic Algorithm for Rapid Custom-Instruction Selection. 266-270 - Linsheng Zhang, Yan Zhang, Wenbiao Zhou:
Floating-point to Fixed-point Transformation Using Extreme Value Theory. 271-276 - Maman Abdurohman, Kuspriyanto, Sarwono Sutikno, Arif Sasongko:
Transaction Level Modeling for Early Verification on Embedded System Design. 277-282
Computer Security
- Fanping Zeng, Kaitao Yin, Minghui Chen, Xufa Wang:
A New Anomaly Detection Method Based on Rough Set Reduction and HMM. 285-289 - Kanokwan Kanyamee, Chanboon Sathitwiriyawong:
High-Availability Decentralized Multi-Agent Key Recovery System. 290-294 - Jing Sun, Huiqun Zhao, Huibing Xiao, Gongzhu Hu:
Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONS. 295-300 - Quan Qian, Rui Zhang, Hongyi Che:
Object-oriented Case Representation and Its Application in IDS. 301-306 - Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee:
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. 307-312 - Watcharee Tantikittipisut, Nol Premasathian:
Strongly Unforgeable Signature Scheme without One-Time Key. 313-316 - Yichun Zhang, Jinliang Wan:
Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation Consideration. 317-322 - Tao Qin, Xiaohong Guan, Yi Long, Wei Li:
Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. 323-328
Data Mining & Knowledge Discovery
- Yun Li, Xin Guo, Yunhao Yuan, Jia Wu, Ling Chen:
An Efficient Algorithm to Mine Unordered Trees. 331-336 - Chengli Zhao, Xue Zhang, Dongyun Yi:
A General Framework: Combining Statistical Models and Network Structure for Deep Content Mining. 337-341 - Chengyu Wu, Xiaoying Tai:
Application of Gray Level Variation Statistic in Gastroscopic Image Retrieval. 342-346 - Malik Muhammad Saad Missen, Mohand Boughanem, Guillaume Cabanac:
Challenges for Sentence Level Opinion Detection in Blogs. 347-351 - Jing Qiu, Lejian Liao:
Extracting Relations from Chinese Web Documents Using Kernel Methods. 352-356 - Jianwen Xie, Jianhua Wu, Qingquan Qian:
Feature Selection Algorithm Based on Association Rules Mining Method. 357-362 - Mohsen Jafari Asbagh, Hassan Abolhassani:
Feature-Based Data Stream Clustering. 363-368 - Hao Wu, Yijian Pei, Jiang Yu:
Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata Corpus. 369-374 - Vasudha Bhatnagar, Sharanjit Kaur, Neelima Gupta:
Identifying Structures with Informative Dimensions in Streams. 375-382 - Phimphaka Taninpong, Sudsanguan Ngamsuriyaroj:
Incremental Naïve Bayesian Spam Mail Filtering and Variant Incremental Training. 383-387 - Roman Y. Shtykh, Qun Jin:
Integrating Search and Sharing: User-Centric Collaborative Information Seeking. 388-393 - Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
MVGL Analyser for Multi-classifier Based Spam Filtering System. 394-399 - Weijiang Li, Tiejun Zhao, Wenmao Zang:
PLSA-Based Query Expansion. 400-405 - Zheng-Hua Qi, Geng Yang, Xun-Yi Ren:
Radius-Distance Based Semi-Supervised Algorithm. 406-410 - Yuelong Zhu, Jihong Qian, Qingsong Fan, Dingsheng Wan, Li Shijin Li:
Study on Hydrology Time Series Prediction Based on Wavelet-neural Networks. 411-415 - Aihua Zheng, Jixin Ma, Bin Luo, Miltos Petridis, Sulan Zhai, Jin Tang:
Temporal Pattern Recognition in Video Clips Detection. 416-421 - Jochen Hollmann, Per Stenström:
Using Hoarding to Increase Availability in Shared File Systems. 422-429 - Yuxiang Mao, Daming Wei:
Weight Balanced Linear Programming SVM on Skewed Distribution and its Evaluation. 430-435
Database, Data Warehousing, Data Engineering
- Basit Raza, Abdul Mateen, Tauqeer Hussain, Mian M. Awais:
Autonomic Success in Database Management Systems. 439-444 - Abdul Mateen, Basit Raza, Tauqeer Hussain, Mian M. Awais:
Autonomicity in Universal Database DB2. 445-450 - Jieping Wang, Xiaoyong Du:
Cluster Based Partition for Multi-dimensional Range Query in DAS Model. 451-456 - Xiaoshuang Xu, Yucai Feng, Feng Wang:
Efficient Processing of XML Twig Queries with All Predicates. 457-462 - Areerat Trongratsameethong, Jarernsri L. Mitrpanont:
Exhaustive Greedy Algorithm for Optimizing Intermediate Result Sizes of Join Queries. 463-468 - Jie Shi, Hong Zhu, Ge Fu, Tao Jiang:
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs. 469-474 - Jinpeng Wang, Zhuang Miao, Yafei Zhang, Bo Zhou:
Querying Heterogeneous Relational Database using SPARQL. 475-480
Distributed Computing
- Chenting Zhao, Zhenhua Duan, Man Zhang:
A Model-Driven Approach for Generating Business Processes and Process Interaction Semantics. 483-488 - Mehdi Nikkhah, Mohammad Hosein Yektaie, Amir Masoud Rahmani, Mohammad Nikkhah:
A Novel Fault-tolerant Particle Swarm Optimization Scheduler for Scheduling Independent Task in Grid Computing Environment. 489-493 - Changsong Ding, Yi Fu, Zhigang Hu, Peng Xiao:
A Novel Trust Model Based on Bayesian Network for Service-Oriented Grid. 494-499 - Cho-Chin Lin, Chih-Hsuan Hsu:
Algorithms for Scheduling Distributed Tasks of Ordered Communication on a Realistic Model of Heterogeneous Grids. 500-505 - M. Shahbaz Memon, Morris Riedel, A. Shiraz Memon, Achim Streit, Felix Wolf:
Enabling Grid Interoperability by Extending HPC-driven Job Management with an Open Standard Information Model. 506-511 - Ning Li, Jinqiang Hu:
Scientific Workflow Model for Provenance Analysis Based on Many-sorted High-Level Nets. 512-515 - Haroon-Ur-Rashid Khan, Shi Feng, Weixing Ji:
Triplet Based Multi-core Interconnection Network and its Computational Efficiency. 516-521
Economic and Financial Systems
- Tetsuya Takaishi:
Bayesian Inference on QGARCH Model Using the Adaptive Construction Scheme. 525-529 - Sang-Hong Lee, Dong-Kun Shin, Zhen-Xing Zhang, Joon S. Lim:
Comparing the Feature Selection Using the Distributed Non-overlap Area Measurement Method with Principal Component Analysis. 530-534 - Fabio Mulazzani, Barbara Russo, Giancarlo Succi:
ERP Systems Development: Enhancing Organization's Strategic Control through Monitoring Agents. 535-542 - Jan-Helge Deutscher, Carsten Felden:
Model Concept to Determine the Optimal Maturity of IT Service Management Processes. 543-548 - Thomas Neubauer, Christian Hartl:
On the Singularity of Valuating IT Security Investments. 549-556
Image Processing & Pattern Recognition
- Hui-Cheng Lian:
A Max Modular Support Vector Machine and Its Variations for Pattern Classification. 559-564 - Lijie Zhang, Haili Yin:
A Method for Removing the Impulse in Image Processing. 565-567 - Zhi Liu, Hongbo Yan, Liquan Shen, Yongfang Wang, Zhaoyang Zhang:
A Motion Attention Model Based Rate Control Algorithm for H.264/AVC. 568-573 - Gang Chen, Xiaoyong Guo, Tai Hu:
A Noise Insensitive Cluster Validity Measure for Pattern Classification. 574-578 - Fangchao Wang, Sen Bai, Guibin Zhu, Zhenghui Song:
An Image Encryption Algorithm Based on N-Dimension Affine Transformation. 579-585 - Gopalakrishnan Sethumadhavan, Srinivasan Sankaran:
Border Detection and Cancer Propagation on Spectral Bands of Malignant Melanoma Using Six Sigma Threshold. 586-592 - Aree Ali Mohammed, Jamal Ali Hussein:
Efficient Video Watermarking Using Motion Estimation Approach. 593-598 - Shaoqiu Xu:
Dynamic Background Modeling for Foreground Segmentation. 599-604 - Chi Ma, Hongyun Zhang, Duoqian Miao, XueDong Zhang:
Fingerprint Skeleton Extraction Based on Improved Principal Curve. 605-610 - Zhongmin Han, Zhi Liu, Zhaoyang Zhang, Yu Lu, Weiwei Li, Hongbo Yan:
Salient Object Extraction Based on Region Saliency Ratio. 611-615 - Preecha Tangkraingkij, Chidchanok Lursinsap, Siripun Sanguansintukul, Tayard Desudchit:
Selecting Relevant EEG Signal Locations for Personal Identification Problem Using ICA and Neural Network. 616-621 - Ran Li, Weiguang Xu, Jianjiang Lu, Yafei Zhang, Zining Lu:
Technique of Large-scale Image Set Construction Based on Web Image Searching Engine. 622-626 - Osama Hosam, Xingming Sun:
Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique. 627-632
Information Science and Systems
- Zhengjun Cao, Lihua Liu:
A General Attack against Several Group Signatures. 635-640 - Wu Jigang, Baofang Chang, Thambipillai Srikanthan:
A Hybrid Branch-and-Bound Strategy for Hardware/Software Partitioning. 641-644 - Lijuan Chen, Aiqing Wang, Mingzhu Li:
A Note on the Upper Bound of Dimension of Bivariate Spline Space over Triangulation. 645-649 - Jinyuan Yang, Xinhan Huang, Min Wang:
An Efficient Fusion Algorithm on Conflicting Evidence. 650-654 - Wei Shi, Zheng Zhao:
Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network. 655-659 - Jakarin Smitaveja, Kingkarn Sookhanaphibarn, Chidchanok Lursinsap:
Facial Metrical and Caricature-Pattern-Based Learning in Neural Network System for Face Recognition. 660-665 - Zuoxian Nie, Xin-hua Jiang, Jian-cheng Liu, Haiyan Yang:
Performance Analysis of Generalized Well-formed Workflow. 666-671 - Quan Shan, Yan Chen:
Research on Numerical Module Identification Approaches. 672-676 - Bin Wang, Zhimin Li, Silian Sui, Yuhua Qin:
The Game Analysis of Price Competition on Different Rationality. 677-679
Intelligent Control Systems
- Lijie Yang, Xiaoshan Li:
Animating the Brush-writing Process of Chinese Calligraphy Characters. 683-688 - Xin Li, Zhiping Jia, Xinjie Lu, Haiyang Wang:
Rule-Based Publish-Subscribe Mechanism for Real-time Applications. 689-694 - Toshiyuki Maeda:
Spatial Navigation with Consistency Maintenance System. 695-700 - Minghui Wang, Yongquan Yu, Bi Zeng:
Study of Intelligent Control System for Ship Autopilot Design. 701-705 - Ming Xu, Liangyu Chen, Zhi-bin Li:
Symbolic Reachability Computation of a Class of Nonlinear Systems. 706-710
Internet Technology and Applications, e-Commerce
- Pan Liu, Huaikou Miao, Qing Li:
A Common Acquaintance Immunization Strategy for Complex Network. 713-717 - Kexiao Liao, Peter Kisuule, John Ehrlinger, Jie Dai:
Autogeneration of Database Applications from XML Metadata for Web-Based Data Entry. 718-723 - Sérgio Raymundo Loest, Marcelo Cheminn Madruga, Carlos Alberto Maziero, Lau Cheuk Lung:
BackupIT: An Intrusion-Tolerant Cooperative Backup System. 724-729 - Hsiu-Ju Chen:
Bloggers' Social Presence Framing and Blog Visitors' Responses. 730-735 - Shizhan Chen, Zhiyong Feng, Hui Wang, Tao Wang:
Building the Semantic Relations-Based Web Services Registry through Services Mining. 736-743 - Ling Shang, Zhijian Wang, Xiaohong Zhang, Junjie Wang, Zhizhong Liu:
Research on Fault-tolerant Mechanism of Integrating Water-Domain Oriented Computing Resources. 744-749 - Lassi Lehikoinen, Tomi Räty:
Monitoring End-to-End Quality of Service in a Video Streaming System. 750-754 - Kurban Ubul, Askar Hamdulla, Winira Musajan, Abdiryim Raxidin, Patigul Mamat:
The Design and Realization of Unicode Based Minorities Character Online Processing System. 755-760
Mobile/Wireless Computing
- Kefei Lu, Xiaodong Cai, Xudong Wang:
A MAC Protocol for Cooperative Wireless Networks. 763-768 - Xin Sun, Kan Li, Yushu Liu:
An Efficient Replica Location Method in Hierarchical P2P Networks. 769-774 - Zheng Guan, Dongfeng Zhao:
An Energy Efficient MAC Protocol for WSNs. 775-779 - Jun Yang, Deyun Zhang, Yunyi Zhang:
An Energy-Efficient Data Gathering Protocol for Wireless Sensor Networks. 780-785 - Moon Jeong Kim, Young Ik Eom:
Cross-Layer Service Discovery Using Multi-Path for Wireless Environments. 786-790 - Xu Huang:
Degradation of MIMO UWB-IR Transceiver in Poisson Models. 791-796 - Liang He, Jingdong Xu, Yuntao Yu, Miao Li, Wenyao Zhao:
Genetic Algorithm Based Length Reduction of a Mobile BS Path in WSNs. 797-802 - Muhammad Asim Mubarik, Shoab Ahmad Khan, Syed Ayad Hassan, Naveed Sarfraz:
Implementation of Geocast Enhanced AODV-UU in Linux Testbed. 803-807 - Changhyeon Chae, Hyunae Min, Junho Kim, Taejin Jung:
New Delay Optimum Quasi-Othogonal Space-Time Block Codes with Full Spatial Diversity. 808-811 - Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Novel Protocol and Its Implementation QKD in Wi-Fi Networks. 812-817 - Marjan Naderan Tahan, Amir Darehshoorzadeh, Mehdi Dehghan:
ODMRP-LR: ODMRP with Link Failure Detection and Local Recovery Mechanism. 818-823 - Fenghua You, Wei Zhang, Jun Xiao:
Packet Loss Pattern and Parametric Video Quality Model for IPTV. 824-828 - Xiaohui Chen, Weidong Wang, Guo Wei:
Reducing Web Latency in Mobile Network. 829-833 - Fangqin Liu, Chuang Lin, Hao Wen, Peter D. Ungsunan:
Throughput Analysis of Wireless Multi-hop Chain Networks. 834-839 - Ruonan Rao, Jiankun Wu, Dejun Wang, Linpeng Huang:
Transaction of Service Composition in Pervasive Computing and Its Correctness Analysis Based on ASM. 840-845 - Antero Metso, Petri Pulli, Seamus Hickey, Xiaosong Zheng:
Ubiquitous Services for Senior Citizens - Living Process Detection and Middleware. 846-851 - Nastooh Taheri Javan, Reza Kiaeifar, Bahram Hakhamaneshi, Mehdi Dehghan:
ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks. 852-857
Parallel and Distributed Computing & Systems
- Houguang Yue:
An Eliminating Causal Ambiguity Approach to Reactive Systems. 861-866 - Mi-Young Park, Sang-Hwa Chung:
Detecting Race Conditions in One-Sided Communication of MPI Programs. 867-872 - Youlin Ruan, Gan Liu, Jianjun Han:
Fair Slack-Reclamation for Scheduling Periodic Tasks. 873-875 - Akiyoshi Wakatani:
Implementation of Recurrence Calculation on a Heterogeneous Multicore Processor. 876-881 - Xiaofei Liao, Yifan Yue, Hai Jin, Haikun Liu:
LAOVM: Lightweight Application-Oriented Virtual Machine for Thread Migration. 882-887
Software Engineering and Information Engineering
- Cheng Zeng, Keqing He, Bing Li:
A Framework to Support Interoperability among Web Service Registries. 891-896 - Daisuke Horie, Toshio Kasahara, Yuichi Goto, Jingde Cheng:
A New Model of Software Life Cycle Processes for Consistent Design, Development, Management, and Maintenance of Secure Information Systems. 897-902 - Xiaopeng Deng, Chunxiao Xing:
A QoS-oriented Optimization Model for Web Service Group. 903-909 - Peizhou He, Xiangming Wen, Wei Zheng:
A Simple Method for Filtering Image Spam. 910-913 - K. Velmurugan, M. A. Maluk Mohamed:
An Empirical Performance Metrics Measurement and Analysis of Software Platforms for Implementation of Web Services. 914-920 - Hazleen Aris, Faridah Hani Mohamed Salleh, Zailani Ibrahim, Siti Salwah Salim:
Current Practice, Problems and Factors in COSD Application - A Component Users Perspective. 921-926 - Junyan Qian, Lingzhong Zhao, Guoyong Cai, Tianlong Gu:
Automatic Construction of Complete Abstraction by Abstract Interpretation. 927-932 - Hironori Washizaki, Kazuhiro Fukaya, Atsuto Kubo, Yoshiaki Fukazawa:
Detecting Design Patterns Using Source Code of Before Applying Design Patterns. 933-938 - Carla L. Pacheco, Iván A. García:
Effectiveness of Stakeholder Identification Methods in Requirements Elicitation: Experimental Results Derived from a Methodical Review. 939-942 - Namfon Assawamekin, Thanwadee Sunetnanta, Charnyote Pluempitiwiriyawej:
MUPRET: An Ontology-Driven Traceability Tool for Multiperspective Requirements Artifacts. 943-948 - Dapeng Liu, Shaochun Xu:
MuTT: A Multi-Threaded Tracer for Java Programs. 949-954 - Chunyan Hou, Gang Cui, Hongwei Liu, Xiaozong Yang:
Reliability Analysis of Component Software Based on Testing Data Transformation. 955-960 - Fanping Zeng, Ling Li, Juan Li, Xufa Wang:
Research on Test Suite Reduction Using Attribute Relevance Analysis. 961-966 - Young-Mi Kim, Choong-Heui Jeong, A-Rang Jeong, Hyeon Soo Kim:
Risky Module Estimation in Safety-Critical Software. 967-970 - JiDong Ge, Hao Hu, Jian Lu:
Service Discovery and Substitution According to Inheritance of Behavior with Invariant Analysis. 971-976 - Shikun Chen, Zhoujun Li:
Simplifying Buffer Overflow Detection Using Site-Safe Expressions. 977-982 - Fengyu Zhao, Xin Peng, Wenyun Zhao:
Software Development Process Monitoring Based on Nominal Transformation. 983-988 - Dalju Lee, Jongmoon Baik, Ju-Hwan Shin:
Software Reliability Assurance Using a Framework in Weapon System Development: A Case Study. 989-995 - Tao Wu, Yanling Wan, Yishan Xi, Chuanbo Chen:
Study on the Automatic Test Framework Based on Three-tier Data Driven Mechanism. 996-1001
Software Reuse, Design Patterns
- Raphael Pereira de Oliveira, Antônio Francisco do Prado, Wanderley Lopes de Souza, Mauro Biajiz:
Development Based on MDA, of Ubiquitous Applications Domain Product Lines. 1005-1010
Software Testing and Tools
- Lixiao Zheng, Haiming Chen:
A Systematic Framework for Grammar Testing. 1013-1019 - Ling Yin, Liu Jing, Xiaoshan Li:
Validating Requirements Model of a B2B System. 1020-1025
Techniques for Specification, Verification and Validation
- Zuohua Ding, Mingyue Jiang, Jing Liu:
Model Checking Service Component Composition by SPIN. 1029-1034 - Dong Xu, Huaikou Miao, Nduwimfura Philbert:
Model Checking UML Activity Diagrams in FDR. 1035-1040 - Ping Gong, Keqing He:
On the Capability Compliance of Annotated Process Model. 1041-1046
UML, OO Modeling & Simulation
- Yingpan Wu, Lixin Yu, Wei Zhuang, Jianyong Wang:
A Coverage-Driven Constraint Random-Based Functional Verification Method of Pipeline Unit. 1049-1054 - Lei Wang, Xianliang Lu:
A Study of Matrix Data on Reading and Writing Method in Simulation. 1055-1060
Visual and Multimedia Computing
- Xianyong Fang, Bin Luo, Haifeng Zhao, Yiwen Zhang:
A 5-Parameter Bundle Adjustment Method for Image Mosaic. 1063-1067 - Jiacheng Li, Gengliang Wang, Yue Chen:
A Framework for Real-time Local Free-Form Deformation. 1068-1073 - Jing Wang, Zhi Lin:
A General 3D Campus Navigator System. 1074-1078 - Teruhisa Hochin, Hiroki Nomiya:
A Logical and Graphical Operation of a Graph-Based Data Model. 1079-1084 - Kan Chang, Bo Yang, Juan Luo:
A Novel Rate Control Scheme for H.264/AVC Based on Scene Change. 1085-1089 - Ravin Sachdeva, Sumit Johar, Emiliano Mario Piccinelli:
Adding SVC Spatial Scalability to Existing H.264/AVC Video. 1090-1095 - Hua Zhang, Xiangming Wen, Peizhou He, Wei Zheng:
Dealing with Telephone Fraud Using CAPTCHA. 1096-1099 - Wei Zeng, Hongming Zhang:
Depth Adaptive Video Stitching. 1100-1105 - Jintao Ma, Ya Zhou, Qun Hao, Yang Zhang:
Efficient Estimation of Multiple Illuminant Directions Using C-means Clustering and Self-correction for Augmented Reality. 1106-1110 - Ranran Zhang, Youdong Ding, Shuhan Wei:
Image Inpainting Algorithm Based on Successive Elimination. 1111-1114 - Wei Zeng, Guibin Zhu, Yao Li:
Point Matching Estimation for Moving Object Tracking Based on Kalman Filter. 1115-1119 - Pushpa Kumar, Nary Subramanian, Kang Zhang:
SaViT: Technique for Visualization of Digital Home Safety. 1120-1125 - Gentao Liu, Xiangming Wen, Wei Zheng, Peizhou He:
Shot Boundary Detection and Keyframe Extraction Based on Scale Invariant Feature Transform. 1126-1130 - Mingliang Hou, CunHua Li, Yong Zhang:
Texture Retrieval by Scale and Rotation Invariant Directional Empirical Mode Decomposition. 1131-1135
Web Engineering & Applications
- Jianguo Pan, Bofeng Zhang, Gengfeng Wu:
A SAM-Based Evolution Model of Ontological User Model. 1139-1143 - Junhuai Li, Yile Wang, Jing Zhang, Zhuobin Zhang:
A Web Service Adapter with Contract-Oriented Methodology. 1144-1149 - Tao He, Huaikou Miao, Liping Li:
A Web Service Composition Method Based on Interface Matching. 1150-1154 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
Analyzing Reliability of Time Constrained Service Composition. 1155-1160 - Lailei Huang, Zhengyou Xia:
Measuring User Prestige and Interaction Preference on Social Network Site. 1161-1166 - Ei Chaw Htoon, Thi Thi Soe Nyunt:
M-Filter: Semantic XML Data Filtering System for Multiple Queries. 1167-1171 - Mingjie Sun, Bixin Li, Pengcheng Zhang:
Monitoring BPEL-Based Web Service Composition Using AOP. 1172-1177 - Fengyu Zhao, Xin Peng, Wenyun Zhao:
Multi-Tier Security Feature Modeling for Service-Oriented Application Integration. 1178-1183 - Dongmei Liu, Zhiqing Shao, Caizhu Yu, Guisheng Fan:
A Heuristic QoS-Aware Service Selection Approach to Web Service Composition. 1184-1189 - Xiaohui Chen, Weidong Wang, Guo Wei:
Performance of Web Caching in High Density Mobile Networks. 1190-1193 - Xiaojie Yuan, Huibin Zhang, ZongYun Yang, Yanlong Wen:
Understanding the Search Interfaces of the Deep Web Based on Domain Model. 1194-1199 - Bin Zhu, Huaikou Miao, Bo Song:
User-interface Design of Web Application Using Object-Z. 1200-1204 - Zijing Tan:
Validating XML Constraints Using Automata. 1205-1210
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.