


default search action
8th ACIS-ICIS 2009: Shanghai, China
- Huaikou Miao, Gongzhu Hu:

8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China. IEEE Computer Society 2009, ISBN 978-0-7695-3641-5
Agent Based Systems
- Ching-seh Wu, Wei-chun Chang, Ishwar K. Sethi

:
A Metric-Based Multi-Agent System for Software Project Management. 3-8 - Qing Xue, Yang Wei, Zhiwu Tang, Guohui Zhang:

A Research of Cognitive Models for CGF in Tank Member. 9-14 - Wei Weng, Shigeru Fujimura:

Distributed Feedback Mechanism for Just-In-Time Scheduling Problem. 15-20 - Jie Zhou, Yixiang Chen:

Modeling Instability in a New Framework of Interval Valued Process Algebra. 21-26
Algorithms
- Shu Wang, Changjia Chen:

A Heuristic Address Assignment Algorithm Based on Probability in a Network. 29-33 - Habib Seifzadeh, Ali Asghar Pourhaji Kazem

, Mehdi Kargahi, Ali Movaghar-Rahimabadi
:
A Method for Dynamic Software Updating in Real-Time Systems. 34-38 - Hongtu Ma, Rongcai Zhao, Ling Liang, Xun Li:

A Multi-variable Algorithm for Placing Phi-nodes. 39-43 - Xiaoping Chen, Rongle Kang:

Searching Algorithm with Granularity Changing and the GNSS Integer Ambiguity Estimation. 44-47 - Wei Chen, Zhenkun Zhai, Xiong Li, Jing Guo:

Analysis and Design of an Improved R-learning. 48-52 - Yang Wang:

Effects of Suffix Repetition Rates of a String on the Performance of String Matching Algorithms. 53-58 - Atieh Mirshahvalad, Majid Noorhosseini:

Improving and Extending SMR Technique for Solving Monotonic Problems. 59-64 - Ali Asghar Pourhaji Kazem

, Habib Seifzadeh, Mehdi Kargahi, Ali Movaghar-Rahimabadi
, Shahriar Lotfi
:
Maximizing the Accrued Utility of an Isochronal Soft Real-Time System Using Genetic Algorithms. 65-69 - Yujun Bao, Hong Jiang, Yu Qing Huang, Rongchun Hu:

Multi-objective Optimization of Power Control and Resource Allocation for Cognitive Wireless Networks. 70-74
Artificial Intelligence
- Yuan Yao, Kailong Zhang, Xingshe Zhou:

A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design. 77-81 - Wang Yi-tao, Li Jin-jun:

A Route Planning Optimization Model Based on Improved Ant Colony Algorithm. 82-86 - Robson da Silva Lopes, Márcia Aparecida Fernandes:

Adaptative Instructional Planning Using Workflow and Genetic Algorithms. 87-92 - Jianzhou Chen, Jin Zhang, Chen Fang, Lijuan Zhao, Hans Liljenström:

On Color Texture Generating Based on Simplified KIII Model. 93-96 - Jinghui Ma, Hong Jiang, Yongchun Hu, Yujun Bao:

Optimal Design of Cognitive Radio Wireless Parameters based on Non-dominated Neighbor Distribution Genetic Algorithm. 97-101 - Yanghe Feng, Chaofan Dai:

Research of Knowledge-based Automatic Model Selection Strategy. 102-106 - Xiaohui Ji, Feifei Ma, Jian Zhang:

Solving Global Unconstrained Optimization Problems by Symmetry-Breaking. 107-111
Bioinformatics and Geoinformatics
- Dacheng Xu, Bailiang Li, Anton Nijholt

:
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning. 115-119 - Wenfeng Shen, Weijia Lu, Daming Wei, Weimin Xu, Xin Zhu

, Shizhong Yuan:
A Parallel Algorithm for Computer Simulation of Electrocardiogram Based on MPI. 120-123 - Feng Yang, Ke Zhi Mao

:
Entropy-based Criteria Dealing with the Ties Problem in Gene Selection. 124-129 - MingJie Tang, Yuanchun Zhou, Peng Cui, Haiting Zhang, Liang Hu, YuanSheng Hou, Baoping Yan:

Exploring the Spatial Distribution of Bird Habitat with Cluster Analysis. 130-135 - Fei Luo, Lin Chen:

Parallelizing the Protein Threading Problem in a Hybrid Peer-to-Peer Based High Performance Computing Platform. 136-141 - Buzhou Tang, Xuan Wang, Xiaolong Wang:

Protein Secondary Structure Prediction Using Large Margin Methods. 142-146
Communication Systems & Networks
- Baohua Fan, Heying Zhang, Wenhua Dou:

A Max-plus Network Calculus. 149-154 - Sunil Bhooshan, Vinay Kumar, Gaurav Gayawar, Sah Geetansh Krishna, Kapil Sachdeva:

A New Suggestion for Data Clustering. 155-160 - Bo Wang, Xiangmin Wen, Sun Yong, Zhen Wei:

A Novel NAT Traversal Mechanism in the Heterogeneous Environment. 161-165 - Jingjing Song, Jiguo Yu

, Zhaojun Xiang:
An Efficient Search Algorithm for REIK Overlay Network. 166-170 - Hui Xu, Debao Xiao, Zheng Wu:

Application of Security Ontology to Context-Aware Alert Analysis. 171-176 - Jia Zhu, Baoyu Zheng:

Detection Probability Analysis of Cooperative Spectrum Sensing in Rayleigh Fading Channels. 177-182 - Hailong Ma, Yunfei Guo, Jianwei Zhang:

Fast Reroute upon Multi-homed Domains Link Failures. 183-187 - Rui Zhang:

HPRP: Hierarchical Probabilistic Routing Protocol for Wireless Mesh Network. 188-193 - Yong-Min Liu, Xin-Hua Jiang, Xiao-Hong Nian, Wu-Yi Lu:

Improved DCCP Congestion Control for Wireless Sensor Networks. 194-198 - Xu Zhang

, Chuang Lin, Xiangzhen Kong:
Model-Driven Dependability Analysis of Virtualization Systems. 199-204 - Xiaowei Qin, Leixin Mai, Xuchu Dai:

Modeling of Hybrid-service in Broadband Wireless Communication System. 205-209 - Wencai Du, Feng Du:

New Smith Predictor and FRBF Neural Network Control for Networked Control Systems. 210-215 - Min Zhang, Shengming Jiang

, Gang Wei, Hongjiang Wang:
Performance Analysis of Cognitive Radio Networks against Secondary User's Policies. 216-221 - Liying Xie, Gang Wei, Hongjiang Wang, Zaijin Xie:

Performance Analysis of IEEE 802.11 DCF in Multi-hop Ad Hoc Networks. 222-227 - Jiaqing Huang, Liang Wang, Wenqing Cheng, Hui Li:

Polynomial Time Construction Algorithm of BCNC for Network Coding in Cyclic Networks. 228-233 - Kai Wang, Chuang Lin, Fangqin Liu:

Quality of Protection with Performance Analysis in IP Multimedia Subsystem. 234-239 - Chang-you Xing, Ming Chen:

Research on Optimizing Embedding Space Dimension in Network Coordinate System. 240-245
Computer Architecture and VLSI
- Xingyun Qi, Quanyou Feng, Yongran Chen, Qiang Dou, Wenhua Dou:

A Fault Tolerant Bufferless Optical Interconnection Network. 249-254 - Minghua Tang, Xiaola Lin

:
A New Adaptive Flow Control for Mesh-based Network-on-Chip (NoC). 255-260 - Wu Jigang, Ting Lei, Thambipillai Srikanthan

:
Efficient Approximate Algorithm for Hardware/Software Partitioning. 261-265 - Tao Li, Wu Jigang, Siew Kei Lam, Thambipillai Srikanthan, Xicheng Lu:

Efficient Heuristic Algorithm for Rapid Custom-Instruction Selection. 266-270 - Linsheng Zhang, Yan Zhang, Wenbiao Zhou:

Floating-point to Fixed-point Transformation Using Extreme Value Theory. 271-276 - Maman Abdurohman, Kuspriyanto, Sarwono Sutikno

, Arif Sasongko
:
Transaction Level Modeling for Early Verification on Embedded System Design. 277-282
Computer Security
- Fanping Zeng, Kaitao Yin, Minghui Chen, Xufa Wang:

A New Anomaly Detection Method Based on Rough Set Reduction and HMM. 285-289 - Kanokwan Kanyamee, Chanboon Sathitwiriyawong:

High-Availability Decentralized Multi-Agent Key Recovery System. 290-294 - Jing Sun, Huiqun Zhao, Huibing Xiao, Gongzhu Hu:

Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONS. 295-300 - Quan Qian

, Rui Zhang, Hongyi Che:
Object-oriented Case Representation and Its Application in IDS. 301-306 - Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee:

Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. 307-312 - Watcharee Tantikittipisut, Nol Premasathian:

Strongly Unforgeable Signature Scheme without One-Time Key. 313-316 - Yichun Zhang, Jinliang Wan:

Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation Consideration. 317-322 - Tao Qin, Xiaohong Guan, Yi Long, Wei Li:

Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. 323-328
Data Mining & Knowledge Discovery
- Yun Li

, Xin Guo, Yunhao Yuan, Jia Wu, Ling Chen:
An Efficient Algorithm to Mine Unordered Trees. 331-336 - Chengli Zhao, Xue Zhang, Dongyun Yi:

A General Framework: Combining Statistical Models and Network Structure for Deep Content Mining. 337-341 - Chengyu Wu, Xiaoying Tai:

Application of Gray Level Variation Statistic in Gastroscopic Image Retrieval. 342-346 - Malik Muhammad Saad Missen, Mohand Boughanem, Guillaume Cabanac

:
Challenges for Sentence Level Opinion Detection in Blogs. 347-351 - Jing Qiu, Lejian Liao:

Extracting Relations from Chinese Web Documents Using Kernel Methods. 352-356 - Jianwen Xie, Jianhua Wu, Qingquan Qian:

Feature Selection Algorithm Based on Association Rules Mining Method. 357-362 - Mohsen Jafari Asbagh, Hassan Abolhassani

:
Feature-Based Data Stream Clustering. 363-368 - Hao Wu

, Yijian Pei, Jiang Yu:
Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata Corpus. 369-374 - Vasudha Bhatnagar, Sharanjit Kaur

, Neelima Gupta:
Identifying Structures with Informative Dimensions in Streams. 375-382 - Phimphaka Taninpong, Sudsanguan Ngamsuriyaroj:

Incremental Naïve Bayesian Spam Mail Filtering and Variant Incremental Training. 383-387 - Roman Y. Shtykh, Qun Jin:

Integrating Search and Sharing: User-Centric Collaborative Information Seeking. 388-393 - Md. Rafiqul Islam, Wanlei Zhou

, Morshed U. Chowdhury
:
MVGL Analyser for Multi-classifier Based Spam Filtering System. 394-399 - Weijiang Li, Tiejun Zhao, Wenmao Zang:

PLSA-Based Query Expansion. 400-405 - Zheng-Hua Qi, Geng Yang, Xun-Yi Ren:

Radius-Distance Based Semi-Supervised Algorithm. 406-410 - Yuelong Zhu, Jihong Qian, Qingsong Fan, Dingsheng Wan, Li Shijin Li:

Study on Hydrology Time Series Prediction Based on Wavelet-neural Networks. 411-415 - Aihua Zheng, Jixin Ma

, Bin Luo
, Miltos Petridis, Sulan Zhai, Jin Tang:
Temporal Pattern Recognition in Video Clips Detection. 416-421 - Jochen Hollmann, Per Stenström:

Using Hoarding to Increase Availability in Shared File Systems. 422-429 - Yuxiang Mao, Daming Wei:

Weight Balanced Linear Programming SVM on Skewed Distribution and its Evaluation. 430-435
Database, Data Warehousing, Data Engineering
- Basit Raza

, Abdul Mateen, Tauqeer Hussain, Mian M. Awais:
Autonomic Success in Database Management Systems. 439-444 - Abdul Mateen, Basit Raza

, Tauqeer Hussain, Mian M. Awais:
Autonomicity in Universal Database DB2. 445-450 - Jieping Wang, Xiaoyong Du:

Cluster Based Partition for Multi-dimensional Range Query in DAS Model. 451-456 - Xiaoshuang Xu, Yucai Feng, Feng Wang:

Efficient Processing of XML Twig Queries with All Predicates. 457-462 - Areerat Trongratsameethong, Jarernsri L. Mitrpanont:

Exhaustive Greedy Algorithm for Optimizing Intermediate Result Sizes of Join Queries. 463-468 - Jie Shi, Hong Zhu

, Ge Fu, Tao Jiang:
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs. 469-474 - Jinpeng Wang, Zhuang Miao, Yafei Zhang, Bo Zhou:

Querying Heterogeneous Relational Database using SPARQL. 475-480
Distributed Computing
- Chenting Zhao, Zhenhua Duan, Man Zhang:

A Model-Driven Approach for Generating Business Processes and Process Interaction Semantics. 483-488 - Mehdi Nikkhah, Mohammad Hosein Yektaie, Amir Masoud Rahmani

, Mohammad Nikkhah:
A Novel Fault-tolerant Particle Swarm Optimization Scheduler for Scheduling Independent Task in Grid Computing Environment. 489-493 - Changsong Ding, Yi Fu, Zhigang Hu, Peng Xiao:

A Novel Trust Model Based on Bayesian Network for Service-Oriented Grid. 494-499 - Cho-Chin Lin, Chih-Hsuan Hsu:

Algorithms for Scheduling Distributed Tasks of Ordered Communication on a Realistic Model of Heterogeneous Grids. 500-505 - M. Shahbaz Memon, Morris Riedel

, A. Shiraz Memon
, Achim Streit, Felix Wolf:
Enabling Grid Interoperability by Extending HPC-driven Job Management with an Open Standard Information Model. 506-511 - Ning Li, Jinqiang Hu:

Scientific Workflow Model for Provenance Analysis Based on Many-sorted High-Level Nets. 512-515 - Haroon-Ur-Rashid Khan, Shi Feng, Weixing Ji:

Triplet Based Multi-core Interconnection Network and its Computational Efficiency. 516-521
Economic and Financial Systems
- Tetsuya Takaishi:

Bayesian Inference on QGARCH Model Using the Adaptive Construction Scheme. 525-529 - Sang-Hong Lee, Dong-Kun Shin, Zhenxing Zhang, Joon S. Lim:

Comparing the Feature Selection Using the Distributed Non-overlap Area Measurement Method with Principal Component Analysis. 530-534 - Fabio Mulazzani, Barbara Russo

, Giancarlo Succi
:
ERP Systems Development: Enhancing Organization's Strategic Control through Monitoring Agents. 535-542 - Jan-Helge Deutscher, Carsten Felden:

Model Concept to Determine the Optimal Maturity of IT Service Management Processes. 543-548 - Thomas Neubauer, Christian Hartl:

On the Singularity of Valuating IT Security Investments. 549-556
Image Processing & Pattern Recognition
- Hui-Cheng Lian:

A Max Modular Support Vector Machine and Its Variations for Pattern Classification. 559-564 - Lijie Zhang, Haili Yin:

A Method for Removing the Impulse in Image Processing. 565-567 - Zhi Liu

, Hongbo Yan, Liquan Shen, Yongfang Wang, Zhaoyang Zhang:
A Motion Attention Model Based Rate Control Algorithm for H.264/AVC. 568-573 - Gang Chen, Xiaoyong Guo, Tai Hu:

A Noise Insensitive Cluster Validity Measure for Pattern Classification. 574-578 - Fangchao Wang, Sen Bai, Guibin Zhu, Zhenghui Song:

An Image Encryption Algorithm Based on N-Dimension Affine Transformation. 579-585 - Gopalakrishnan Sethumadhavan

, Srinivasan Sankaran:
Border Detection and Cancer Propagation on Spectral Bands of Malignant Melanoma Using Six Sigma Threshold. 586-592 - Aree Ali Mohammed, Jamal Ali Hussein

:
Efficient Video Watermarking Using Motion Estimation Approach. 593-598 - Shaoqiu Xu:

Dynamic Background Modeling for Foreground Segmentation. 599-604 - Chi Ma, Hongyun Zhang, Duoqian Miao, XueDong Zhang:

Fingerprint Skeleton Extraction Based on Improved Principal Curve. 605-610 - Zhongmin Han, Zhi Liu

, Zhaoyang Zhang, Yu Lu, Weiwei Li, Hongbo Yan:
Salient Object Extraction Based on Region Saliency Ratio. 611-615 - Preecha Tangkraingkij, Chidchanok Lursinsap, Siripun Sanguansintukul, Tayard Desudchit:

Selecting Relevant EEG Signal Locations for Personal Identification Problem Using ICA and Neural Network. 616-621 - Ran Li, Weiguang Xu, Jianjiang Lu, Yafei Zhang, Zining Lu:

Technique of Large-scale Image Set Construction Based on Web Image Searching Engine. 622-626 - Osama Hosam

, Xingming Sun:
Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique. 627-632
Information Science and Systems
- Zhengjun Cao, Lihua Liu:

A General Attack against Several Group Signatures. 635-640 - Wu Jigang, Baofang Chang, Thambipillai Srikanthan

:
A Hybrid Branch-and-Bound Strategy for Hardware/Software Partitioning. 641-644 - Lijuan Chen, Aiqing Wang, Mingzhu Li:

A Note on the Upper Bound of Dimension of Bivariate Spline Space over Triangulation. 645-649 - Jinyuan Yang, Xinhan Huang, Min Wang:

An Efficient Fusion Algorithm on Conflicting Evidence. 650-654 - Wei Shi, Zheng Zhao:

Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network. 655-659 - Jakarin Smitaveja, Kingkarn Sookhanaphibarn, Chidchanok Lursinsap:

Facial Metrical and Caricature-Pattern-Based Learning in Neural Network System for Face Recognition. 660-665 - Zuoxian Nie, Xin-hua Jiang, Jian-cheng Liu, Haiyan Yang:

Performance Analysis of Generalized Well-formed Workflow. 666-671 - Quan Shan, Yan Chen:

Research on Numerical Module Identification Approaches. 672-676 - Bin Wang, Zhimin Li, Silian Sui, Yuhua Qin:

The Game Analysis of Price Competition on Different Rationality. 677-679
Intelligent Control Systems
- Lijie Yang, Xiaoshan Li:

Animating the Brush-writing Process of Chinese Calligraphy Characters. 683-688 - Xin Li, Zhiping Jia, Xinjie Lu, Haiyang Wang:

Rule-Based Publish-Subscribe Mechanism for Real-time Applications. 689-694 - Toshiyuki Maeda:

Spatial Navigation with Consistency Maintenance System. 695-700 - Minghui Wang, Yongquan Yu, Bi Zeng:

Study of Intelligent Control System for Ship Autopilot Design. 701-705 - Ming Xu, Liangyu Chen, Zhi-bin Li:

Symbolic Reachability Computation of a Class of Nonlinear Systems. 706-710
Internet Technology and Applications, e-Commerce
- Pan Liu, Huaikou Miao, Qing Li:

A Common Acquaintance Immunization Strategy for Complex Network. 713-717 - Kexiao Liao, Peter Kisuule, John Ehrlinger

, Jie Dai:
Autogeneration of Database Applications from XML Metadata for Web-Based Data Entry. 718-723 - Sérgio Raymundo Loest, Marcelo Cheminn Madruga, Carlos Alberto Maziero, Lau Cheuk Lung:

BackupIT: An Intrusion-Tolerant Cooperative Backup System. 724-729 - Hsiu-Ju Chen:

Bloggers' Social Presence Framing and Blog Visitors' Responses. 730-735 - Shizhan Chen, Zhiyong Feng, Hui Wang, Tao Wang:

Building the Semantic Relations-Based Web Services Registry through Services Mining. 736-743 - Ling Shang, Zhijian Wang, Xiaohong Zhang, Junjie Wang, Zhizhong Liu:

Research on Fault-tolerant Mechanism of Integrating Water-Domain Oriented Computing Resources. 744-749 - Lassi Lehikoinen, Tomi Räty:

Monitoring End-to-End Quality of Service in a Video Streaming System. 750-754 - Kurban Ubul, Askar Hamdulla, Winira Musajan, Abdiryim Raxidin, Patigul Mamat:

The Design and Realization of Unicode Based Minorities Character Online Processing System. 755-760
Mobile/Wireless Computing
- Kefei Lu, Xiaodong Cai, Xudong Wang:

A MAC Protocol for Cooperative Wireless Networks. 763-768 - Xin Sun, Kan Li, Yushu Liu:

An Efficient Replica Location Method in Hierarchical P2P Networks. 769-774 - Zheng Guan, Dongfeng Zhao:

An Energy Efficient MAC Protocol for WSNs. 775-779 - Jun Yang, Deyun Zhang, Yunyi Zhang:

An Energy-Efficient Data Gathering Protocol for Wireless Sensor Networks. 780-785 - Moon Jeong Kim, Young Ik Eom:

Cross-Layer Service Discovery Using Multi-Path for Wireless Environments. 786-790 - Xu Huang:

Degradation of MIMO UWB-IR Transceiver in Poisson Models. 791-796 - Liang He, Jingdong Xu, Yuntao Yu, Miao Li, Wenyao Zhao:

Genetic Algorithm Based Length Reduction of a Mobile BS Path in WSNs. 797-802 - Muhammad Asim Mubarik, Shoab Ahmad Khan, Syed Ayad Hassan, Naveed Sarfraz:

Implementation of Geocast Enhanced AODV-UU in Linux Testbed. 803-807 - Changhyeon Chae, Hyunae Min, Junho Kim, Taejin Jung:

New Delay Optimum Quasi-Othogonal Space-Time Block Codes with Full Spatial Diversity. 808-811 - Xu Huang, Shirantha Wijesekera, Dharmendra Sharma

:
Novel Protocol and Its Implementation QKD in Wi-Fi Networks. 812-817 - Marjan Naderan Tahan, Amir Darehshoorzadeh, Mehdi Dehghan

:
ODMRP-LR: ODMRP with Link Failure Detection and Local Recovery Mechanism. 818-823 - Fenghua You, Wei Zhang, Jun Xiao:

Packet Loss Pattern and Parametric Video Quality Model for IPTV. 824-828 - Xiaohui Chen, Weidong Wang, Guo Wei:

Reducing Web Latency in Mobile Network. 829-833 - Fangqin Liu, Chuang Lin, Hao Wen, Peter D. Ungsunan:

Throughput Analysis of Wireless Multi-hop Chain Networks. 834-839 - Ruonan Rao, Jiankun Wu, Dejun Wang, Linpeng Huang:

Transaction of Service Composition in Pervasive Computing and Its Correctness Analysis Based on ASM. 840-845 - Antero Metso, Petri Pulli, Seamus Hickey, Xiaosong Zheng:

Ubiquitous Services for Senior Citizens - Living Process Detection and Middleware. 846-851 - Nastooh Taheri Javan

, Reza Kiaeifar, Bahram Hakhamaneshi, Mehdi Dehghan
:
ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks. 852-857
Parallel and Distributed Computing & Systems
- Houguang Yue:

An Eliminating Causal Ambiguity Approach to Reactive Systems. 861-866 - Mi-Young Park, Sang-Hwa Chung:

Detecting Race Conditions in One-Sided Communication of MPI Programs. 867-872 - Youlin Ruan, Gan Liu, Jianjun Han:

Fair Slack-Reclamation for Scheduling Periodic Tasks. 873-875 - Akiyoshi Wakatani:

Implementation of Recurrence Calculation on a Heterogeneous Multicore Processor. 876-881 - Xiaofei Liao, Yifan Yue, Hai Jin, Haikun Liu:

LAOVM: Lightweight Application-Oriented Virtual Machine for Thread Migration. 882-887
Software Engineering and Information Engineering
- Cheng Zeng, Keqing He, Bing Li:

A Framework to Support Interoperability among Web Service Registries. 891-896 - Daisuke Horie, Toshio Kasahara, Yuichi Goto

, Jingde Cheng:
A New Model of Software Life Cycle Processes for Consistent Design, Development, Management, and Maintenance of Secure Information Systems. 897-902 - Xiaopeng Deng, Chunxiao Xing

:
A QoS-oriented Optimization Model for Web Service Group. 903-909 - Peizhou He, Xiangming Wen, Wei Zheng:

A Simple Method for Filtering Image Spam. 910-913 - K. Velmurugan, M. A. Maluk Mohamed:

An Empirical Performance Metrics Measurement and Analysis of Software Platforms for Implementation of Web Services. 914-920 - Hazleen Aris

, Faridah Hani Mohamed Salleh, Zailani Ibrahim, Siti Salwah Salim
:
Current Practice, Problems and Factors in COSD Application - A Component Users Perspective. 921-926 - Junyan Qian

, Lingzhong Zhao, Guoyong Cai, Tianlong Gu:
Automatic Construction of Complete Abstraction by Abstract Interpretation. 927-932 - Hironori Washizaki

, Kazuhiro Fukaya, Atsuto Kubo, Yoshiaki Fukazawa:
Detecting Design Patterns Using Source Code of Before Applying Design Patterns. 933-938 - Carla L. Pacheco, Iván A. García:

Effectiveness of Stakeholder Identification Methods in Requirements Elicitation: Experimental Results Derived from a Methodical Review. 939-942 - Namfon Assawamekin

, Thanwadee Sunetnanta
, Charnyote Pluempitiwiriyawej:
MUPRET: An Ontology-Driven Traceability Tool for Multiperspective Requirements Artifacts. 943-948 - Dapeng Liu, Shaochun Xu:

MuTT: A Multi-Threaded Tracer for Java Programs. 949-954 - Chunyan Hou, Gang Cui, Hongwei Liu, Xiaozong Yang:

Reliability Analysis of Component Software Based on Testing Data Transformation. 955-960 - Fanping Zeng, Ling Li, Juan Li, Xufa Wang:

Research on Test Suite Reduction Using Attribute Relevance Analysis. 961-966 - Young-Mi Kim, Choong-Heui Jeong, A-Rang Jeong, Hyeon Soo Kim

:
Risky Module Estimation in Safety-Critical Software. 967-970 - JiDong Ge, Hao Hu, Jian Lu:

Service Discovery and Substitution According to Inheritance of Behavior with Invariant Analysis. 971-976 - Shikun Chen, Zhoujun Li:

Simplifying Buffer Overflow Detection Using Site-Safe Expressions. 977-982 - Fengyu Zhao, Xin Peng, Wenyun Zhao:

Software Development Process Monitoring Based on Nominal Transformation. 983-988 - Dalju Lee, Jongmoon Baik, Ju-Hwan Shin:

Software Reliability Assurance Using a Framework in Weapon System Development: A Case Study. 989-995 - Tao Wu, Yanling Wan, Yishan Xi, Chuanbo Chen:

Study on the Automatic Test Framework Based on Three-tier Data Driven Mechanism. 996-1001
Software Reuse, Design Patterns
- Raphael Pereira de Oliveira

, Antônio Francisco do Prado, Wanderley Lopes de Souza, Mauro Biajiz:
Development Based on MDA, of Ubiquitous Applications Domain Product Lines. 1005-1010
Software Testing and Tools
- Lixiao Zheng, Haiming Chen:

A Systematic Framework for Grammar Testing. 1013-1019 - Ling Yin, Liu Jing, Xiaoshan Li:

Validating Requirements Model of a B2B System. 1020-1025
Techniques for Specification, Verification and Validation
- Zuohua Ding, Mingyue Jiang, Jing Liu:

Model Checking Service Component Composition by SPIN. 1029-1034 - Dong Xu, Huaikou Miao, Nduwimfura Philbert:

Model Checking UML Activity Diagrams in FDR. 1035-1040 - Ping Gong, Keqing He:

On the Capability Compliance of Annotated Process Model. 1041-1046
UML, OO Modeling & Simulation
- Yingpan Wu, Lixin Yu, Wei Zhuang, Jianyong Wang:

A Coverage-Driven Constraint Random-Based Functional Verification Method of Pipeline Unit. 1049-1054 - Lei Wang, Xianliang Lu:

A Study of Matrix Data on Reading and Writing Method in Simulation. 1055-1060
Visual and Multimedia Computing
- Xianyong Fang

, Bin Luo
, Haifeng Zhao, Yiwen Zhang:
A 5-Parameter Bundle Adjustment Method for Image Mosaic. 1063-1067 - Jiacheng Li, Gengliang Wang, Yue Chen:

A Framework for Real-time Local Free-Form Deformation. 1068-1073 - Jing Wang, Zhi Lin:

A General 3D Campus Navigator System. 1074-1078 - Teruhisa Hochin, Hiroki Nomiya

:
A Logical and Graphical Operation of a Graph-Based Data Model. 1079-1084 - Kan Chang

, Bo Yang, Juan Luo:
A Novel Rate Control Scheme for H.264/AVC Based on Scene Change. 1085-1089 - Ravin Sachdeva, Sumit Johar, Emiliano Mario Piccinelli:

Adding SVC Spatial Scalability to Existing H.264/AVC Video. 1090-1095 - Hua Zhang, Xiangming Wen, Peizhou He, Wei Zheng:

Dealing with Telephone Fraud Using CAPTCHA. 1096-1099 - Wei Zeng, Hongming Zhang:

Depth Adaptive Video Stitching. 1100-1105 - Jintao Ma, Ya Zhou, Qun Hao, Yang Zhang:

Efficient Estimation of Multiple Illuminant Directions Using C-means Clustering and Self-correction for Augmented Reality. 1106-1110 - Ranran Zhang, Youdong Ding, Shuhan Wei:

Image Inpainting Algorithm Based on Successive Elimination. 1111-1114 - Wei Zeng, Guibin Zhu, Yao Li:

Point Matching Estimation for Moving Object Tracking Based on Kalman Filter. 1115-1119 - Pushpa Kumar, Nary Subramanian, Kang Zhang:

SaViT: Technique for Visualization of Digital Home Safety. 1120-1125 - Gentao Liu, Xiangming Wen, Wei Zheng, Peizhou He:

Shot Boundary Detection and Keyframe Extraction Based on Scale Invariant Feature Transform. 1126-1130 - Mingliang Hou, CunHua Li, Yong Zhang:

Texture Retrieval by Scale and Rotation Invariant Directional Empirical Mode Decomposition. 1131-1135
Web Engineering & Applications
- Jianguo Pan, Bofeng Zhang, Gengfeng Wu:

A SAM-Based Evolution Model of Ontological User Model. 1139-1143 - Junhuai Li

, Yile Wang, Jing Zhang, Zhuobin Zhang:
A Web Service Adapter with Contract-Oriented Methodology. 1144-1149 - Tao He, Huaikou Miao, Liping Li:

A Web Service Composition Method Based on Interface Matching. 1150-1154 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:

Analyzing Reliability of Time Constrained Service Composition. 1155-1160 - Lailei Huang, Zhengyou Xia:

Measuring User Prestige and Interaction Preference on Social Network Site. 1161-1166 - Ei Chaw Htoon, Thi Thi Soe Nyunt:

M-Filter: Semantic XML Data Filtering System for Multiple Queries. 1167-1171 - Mingjie Sun, Bixin Li, Pengcheng Zhang:

Monitoring BPEL-Based Web Service Composition Using AOP. 1172-1177 - Fengyu Zhao, Xin Peng, Wenyun Zhao:

Multi-Tier Security Feature Modeling for Service-Oriented Application Integration. 1178-1183 - Dongmei Liu, Zhiqing Shao, Caizhu Yu, Guisheng Fan:

A Heuristic QoS-Aware Service Selection Approach to Web Service Composition. 1184-1189 - Xiaohui Chen, Weidong Wang, Guo Wei:

Performance of Web Caching in High Density Mobile Networks. 1190-1193 - Xiaojie Yuan, Huibin Zhang, ZongYun Yang, Yanlong Wen:

Understanding the Search Interfaces of the Deep Web Based on Domain Model. 1194-1199 - Bin Zhu, Huaikou Miao, Bo Song:

User-interface Design of Web Application Using Object-Z. 1200-1204 - Zijing Tan:

Validating XML Constraints Using Automata. 1205-1210

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














