


default search action
7th ACIS-ICIS 2008: Portland, Oregon, USA
- Roger Y. Lee:

7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA. IEEE Computer Society 2008, ISBN 978-0-7695-3131-1
Keynotes
- David Garlan:

Software Architectures for Task-Oriented Computing. 3 - C. V. Ramamoorthy:

Issues and Models of Security Oriented Systems. 4
Communication Systems and Networks Track
- Xiaogang Yang, Baosong Shan

, Yaping Yang:
A Rate Control Protocol for High Speed Streaming Video. 7-12 - Sourour Meharouech, Adel Bouhoula

, Tarek Abbes:
Collaboration between Security Devices toward improving Network Defense. 13-18 - Lei Wang, Yanqin Zhu, Lanfang Jin, Xizhao Luo:

Trust Mechanism in Distributed Access Control Model of P2P Networks. 19-24
Computer Architecture and VLSI Track
- Peng Huang, Daniel H.-Y. Teng, Khan A. Wahid, Seok-Bum Ko

:
Convergence Analysis of Jacobi Iterative Method Using Logarithmic Number System. 27-32 - Amin Asghari, Seied Ahmad Motamedi

, Sepehr Attarchi:
Effective RTL Method to Develop On-Line Self-Test Routine for the Processors Using the Wavelet Transform. 33-38
Computer Science, Information Science, and Information
- Mir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri:

Comparison between New Quantum Approaches for Finding the Minimum or the Maximum of an Unsorted Set of Integers. 41-46 - Mir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri:

Evaluation on Quantum Computation and Classic Parallel Approaches for Finding Estimation of the Length of Shortest Path in a Weighted Graph. 47-54 - Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu

:
A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges. 55-60 - Yongcheng Zhang:

Radix Plus Length Based Insert Sort. 61-66
Control Systems, Intelligent System Track
- Huy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Chen:

An Integer Linear Programming Approach for Dedicated Machine Constraint. 69-74 - Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan:

Efficient Complex Event Processing over RFID Data Stream. 75-81 - M. Hadi Mashinchi, M. Reza Mashinchi, Mashaallah Mashinchi:

Tabu Search Solution for Fuzzy Linear Programming. 82-87 - Jinhe Wang, Nan Zhang:

Temperature Control for the Thermal Cycling of Polymerase Chain Reaction. 88-92
Data Mining, Data Warehousing, and Database Track
- Jinguo You, Jianqing Xi, Pingjian Zhang, Hu Chen:

A Parallel Algorithm for Closed Cube Computation. 95-99 - Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu:

An Efficient Structural Index for Graph-Structured Data. 100-106 - Qiong Wei, Yansheng Lu, Qiang Lou:

(t, lambda)-Uniqueness: Anonymity Management for Data Publication. 107-112 - Abdul Mateen, Basit Raza

, Tauqeer Hussain, Mian M. Awais:
Autonomic Computing in SQL Server. 113-118 - Jayanta Basak, Sunil Goyal:

Cross-Channel Customer Mapping. 119-126 - Tadashi Murakami:

DBPowder-mdl: Mapping Description Language between Applications and Databases. 127-132 - Duc A. Tran

, Khanh Vu:
Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information Loss. 133-139 - Shuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu:

Entropy Based Clustering of Data Streams with Mixed Numeric and Categorical Values. 140-145 - Hemalatha Diwakar, Alka Vaidya:

Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks. 146-151 - Qiong Wei, Yansheng Lu, Qiang Lou:

Privacy-Preserving Data Publishing Based on De-clustering. 152-157 - Zouhaier Brahmia

, Rafik Bouaziz
:
Schema Versioning in Multi-temporal XML Databases. 158-164 - Shuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu:

Subspace Clustering of High Dimensional Data Streams. 165-170 - Thuy T. Le, Syeda Naema Hashmi, Kurt McMullin:

Synchronizer - A Web-Based Application to Enhance Capabilities of NEESCentral Web Portal. 171-176
Image Processing and Pattern Recognition Track
- Sepehr Attarchi, Karim Faez, Amin Asghari:

A Fast and Accurate Iris Recognition Method Using the Complex Inversion Map and 2DPCA. 179-184 - Yan Song, Anan Liu, Lin Pang, Shouxun Lin, Yongdong Zhang, Sheng Tang:

A Novel Image Text Extraction Method Based on K-Means Clustering. 185-190 - Ke Gao, Shouxun Lin, Yongdong Zhang, Sheng Tang, Huamin Ren:

Attention Model Based SIFT Keypoints Filtration for Image Retrieval. 191-196 - Zhong Gao, Guanming Lu, Daquan Gu, Chun He:

Content-Based Classifying Traditional Chinese Calligraphic Images. 197-201 - Yingjie Zhang, Liling Ge:

Region-Based Image Fusion Approach Using Iterative Algorithm. 202-207 - Mir Hashem Mousavi, Karim Faez, Amin Asghari:

Three Dimensional Face Recognition Using SVM Classifier. 208-213
Image, Acoustic, Speech and Signal Processing Track
- Yanxiong Li, Qianhua He, Tao Li:

A Novel Detection Method of Filled Pause in Mandarin Spontaneous Speech. 217-222 - Yang Xu, Houfeng Wang, Xue-qiang Lü:

Research of English-Chinese Alignment at Word Granularity on Parallel Corpora. 223-228
Information Management Systems and Management Track
- Thomas Neubauer, Johannes Heurix:

Objective Types for the Valuation of Secure Business Processes. 231-236 - Young Dae Kim, Chan Kyou Hwang, Jae-Hyoung Yoo:

On-Line Network Reachability Analysis Using Forward Information Base Emulation. 237-240 - N. R. Sunitha

, B. B. Amberker, Prashant Koulgi:
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. 241-246 - Qianhui Althea Liang, J. Leon Zhao:

Verification of Unstructured Workflows via Propositional Logic. 247-252
Intelligent Agent Technology, Agent Based Systems Track
- Sun K. Yoo, Jun Choe, Do Yoon Kim:

Agent Based Architecture for Secure Access from Multiple Hospitals. 255-258 - Dayong Ye

, Quan Bai
, Minjie Zhang
, Zhen Ye:
P2P Distributed Intrusion Detections by Using Mobile Agents. 259-265
Internet Technology and Applications, E-commerce Track
- Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu:

An Adaptive Index of XML for Frequent Branching Path Queries. 269-275 - Md. Rafiqul Islam

, Wanlei Zhou
, Morshed U. Chowdhury
:
Email Categorization Using (2+1)-Tier Classification Algorithms. 276-281 - Yongquan Cai, Xiuying Li:

Identity-Based Conference Key Distribution Scheme Using Sealed Lock. 282-286 - Ge Zhang, Feng Cheng, Christoph Meinel:

SIMPA: A SIP-Based Mobile Payment Architecture. 287-292
Knowledge Discovery, Artificial Intelligence, Neural Networks Track
- Yan Yu, Pilian He, Yushan Bai, Zhenlei Yang:

A Document Clustering Method Based on One-Dimensional SOM. 295-300 - Dongshu Yan, Jintao Zhang, Bo Yu, Changtong Luo, Shaoliang Zhang:

A Genetic Algorithm for Finding Minimal Multi-homogeneous Bézout Number. 301-305 - Hongjie Liu, Boqin Feng, Jianjie Wei:

An Effective Data Classification Algorithm Based on the Decision Table Grid. 306-311 - Li-Qing Qiu, Ru-Yi Zhao, Gang Zhou, Sheng-Wei Yi:

An Extensive Empirical Study of Feature Selection for Text Categorization. 312-315 - Xiulan Hao, Chenghong Zhang, Hexiang Xu, Xiaopeng Tao, Shuyun Wang, Yunfa Hu:

An Improved Condensing Algorithm. 316-321 - Vo Dinh Minh Nhat, Duc Vo, Subhash Challa, Sungyoung Lee:

Efficient Projection for Compressed Sensing. 322-327 - Ricardo Gacitúa, Peter Sawyer:

Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition Techniques. 328-333 - Changtong Luo

, Shaoliang Zhang, Bo Yu:
Low Dimensional Reproduction Strategy for Real-Coded Evolutionary Algorithms. 334-339 - Ryutaro Ichise:

Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity Measures. 340-346 - Farshad Kyoomarsi

, Hamid Khosravi, Esfandiar Eslami, Pooya Khosravyan Dehkordy, Asghar Tajoddin:
Optimizing Text Summarization Based on Fuzzy Logic. 347-352
Middleware Architectures and Techniques Track
- Yucong Duan, Kyo Chul Kang, Yuqing Gu:

A Solution Framework on Fundamentals in Model Transformation. 355-360 - Shahid Mumtaz

, Atílio Gameiro, Jonathan Rodriguez
:
EESM for IEEE 802.16e: WiMaX. 361-366 - Ivan Silva Neto, Francisco Reverbel:

Lessons Learned from Implementing WS-Coordination and WS-AtomicTransaction. 367-372 - (Withdrawn) Observations on Liner Prediction Based Blind Source Extraction Algorithms. 373-376

- Minghui Wang, Yongquan Yu, Bi Zeng:

Research and Application of Information Granulation Based on Extension Method. 377-381 - Tomi Räty, Johannes Oikarinen, Mikko Nieminen, Mikko Lindholm:

Sensor Data Collection of the Single Location Surveillance Point System. 382-387
Mobile/Wireless Computing Track
- Jing Xie, Dan Yu, Shilong Ma:

A Novel Enterprise Mobile E-mail System Using the SyncML Protocol. 391-396 - Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Chang-Sun Shin, Hyun Yoe:

Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses. 397-400 - Sheng-Tzong Cheng, Szu-Yun Li, Chia-Mei Chen:

Distributed Detection in Wireless Sensor Networks. 401-406
Parallel and Distributed Computing and Systems Track
- Young-Joo Kim, Daeyoung Kim, Yong-Kee Jun:

An Empirical Analysis of Intel Thread Checker for Detecting Races in OpenMP Programs. 409-414 - Rashid Bin Muhammad

:
Execution Time Analysis of a Parallel Steiner Tree Algorithm on Server-Client Model of Computation. 415-420 - Jing-jun Zhao, Shu-xin Bao, Yu Li:

Exponential Integral Methods for Burgers Equation. 421-426 - Nitin

, Durg Singh Chauhan, Vivek Kumar Sehgal
, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Finite-State Modeling and Testing of Image Based Authentication System. 427-432 - Fadi N. Sibai

:
Gauging the OpenSourceMark Benchmark in Measuring CPU Performance. 433-438 - Wenhong Wei, Wenjun Xiao, Zhen Zhang:

Parallel Sorting on the Biswapped Network. 439-443 - Chunbo Chu, Monica Brockmeyer:

Predicate Detection Modality and Semantics in Three Partially Synchronous Models. 444-450
Programming Languages, Compilers, and Operating Systems Track
- Kostadin Kratchanov, Emilia Golemanova, Tzanko Golemanov:

Control Network Programming Illustrated: Solving Problems with Inherent Graph-Like Representation. 453-459
Software Metrics and Project Management Track
- Tauqeer Hussain, Mian M. Awais:

An Effort-Based Approach to Measure Completeness of an Entity-Relationship Model. 463-468 - Youngki Hong, Jongmoon Baik, In-Young Ko, Ho-Jin Choi:

A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics. 469-474 - Jinhua Li, Zhibing Ma, Huangzhen Dong:

Monitoring Software Projects with Earned Value Analysis and Use Case Point. 475-480
Software Engineering and Information Engineering Track
- Haihe Shi, Jinyun Xue, Dawei Du:

A Mechanical Approach for Deriving Algorithmic Programs. 483-487 - Jaroslav Král, Michal Zemlicka

:
Engineering Education - A Great Challenge to Software Engineering. 488-495 - Haihe Shi, Dawei Du, Jinyun Xue:

Generating Algorithms plus Loop Invariants by Formal Derivation. 496-501 - Seon-Jae Jang, Hae-Geun Kim, Youn-Ky Chung:

Manual Specific Testing and Quality Evaluation for Embedded Software. 502-507 - Oh-Hyun Kwon, Sun-Myung Hwang:

Mobile GUI Testing Tool based on Image Flow. 508-512 - Lile Hattori, Dalton Serey Guerrero, Jorge C. A. de Figueiredo, João Brunet, Jemerson Damásio:

On the Precision and Accuracy of Impact Analysis Techniques. 513-518 - Sajid Ibrahim Hashmi, Jongmoon Baik:

Quantitative Process Improvement in XP Using Six Sigma Tools. 519-524 - Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma:

Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. 525-530 - Mikyeong Moon, Heung Seok Chae, Junseok Park, Keunhyuk Yeom:

Two-Dimensional Framework for Analyzing Variabilities in Software Product Lines. 531-536
Software Reuse, Design Patterns Track
- Miao Wang, Rongcai Zhao, Jianmin Pang, Guoming Cai:

Reconstructing Control Flow in Modulo Scheduled Loops. 539-544 - Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang:

Recovering Variable-Argument Functions from Binary Executables. 545-550
Software Testing and Tools Track
- Prabu Dorairaj, Devi Prasad Bhukya, Lakshminarayana Prasad Kantam, Kishor Arumilli:

A New Operational Framework for Benchmarking the SAN Products. 553-560 - Hoyeon Ryu, Dong-Kuk Ryu, Jongmoon Baik:

A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMM. 561-566 - Yogesh Singh, Anju Saha:

Enhancing Data Flow Testing of Classes through Design by Contract. 567-574 - Nitin

, Durg Singh Chauhan, Vivek Kumar Sehgal
, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. 575-580 - Izzat Alsmadi

:
The Utilization of User Sessions in Testing. 581-585
UML, OO Modeling, and Simulation Track
- Jiuzhen Jin, Jianmin Pang, Zheng Shan, Rongcai Zhao:

Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS. 589-594
Visual and Multimedia Track
- Duc A. Tran

, S. R. Pamidimukkala, Phuong Nguyen:
Relevance-Feedback Image Retrieval Based on Multiple-Instance Learning. 597-602
Web Engineering and Applications Track
- Minhyuk Oh, Jongmoon Baik, Sungwon Kang, Ho-Jin Choi:

An Efficient Approach for QoS-Aware Service Selection Based on a Tree-Based Algorithm. 605-610 - Yongwang Zhao, Dianfu Ma, Min Liu, Chunyang Hu:

Coordination Behavioral Structure: A Web Services Coordination Model in Dynamic Environment. 611-617 - Jim Lau

, Lau Cheuk Lung, Joni da Silva Fraga, Giuliana Santos Veronese:
Designing Fault Tolerant Web Services Using BPEL. 618-623 - Rujuan Liu, Changjun Hu, Chongchong Zhao, Zhong Gao:

Verification for Time Consistency of Web Service Flow. 624-629 - Ya-mei Xia, Jun-Liang Chen, Xiang-wu Meng:

On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones. 630-635
Workshop on E-activity Track
- Yoshihito Saito, Takayuki Fujimoto

, Tokuro Matsuo:
A New Negotiation Mechanism for Agent-Based Lecture Allocation Systems. 639-644 - Jungmin Shin, Joachim Hammer, Herman Lam:

RDF-Based Approach to Data Transform Composition. 645-648 - Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee:

Building a Service-Oriented Ontology for Wireless Sensor Networks. 649-654 - Dukyun Nam

, June Hawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim:
Research Process Support with Organizational Flow in e-Science. 655-660 - Takayuki Fujimoto

, Muhammad Dzulqarnain bin Muhammad Nasir, Tokuro Matsuo:
A Design on Collaborative-Cooperative Document Edit System Based on Cognitive Analyses. 661-666 - Hamidreza Amouzegar, Shahriar Mohammadi, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji:

A New Approach on Interactive SOA Security Model Based on Automata. 667-671 - Jin-Suk Kang, Yonghee You, Mee Young Sung, Taikyeong T. Jeong, Jong-An Park:

Mobile Mapping Service Using Scalable Vector Graphics on the Human Geographic. 672-677 - HaiBo Zhu, Ying Zou:

Analysis of E-bank Innovation in China Using a Hypercube Model. 678-683 - Sabina Jeschke

, Helmut Vieritz, Olivier Pfeiffer:
Developing Accessible Applications with User-Centered Architecture. 684-689 - Pyungkwan Ko, Sanggil Kang, Harshit Kumar:

Web Page Dependent Vision Based Segementation for Web Sites. 690-694 - Himanshu Agrawal, Andrew Jennings, Mark A. Gregory

, Daud Channa:
Robust Routing. 695-700

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














