


Остановите войну!
for scientists:


default search action
8th ACIS-ICIS 2009: Shanghai, China
- Huaikou Miao, Gongzhu Hu:
8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China. IEEE Computer Society 2009, ISBN 978-0-7695-3641-5
Agent Based Systems
- Ching-seh Wu, Wei-chun Chang, Ishwar K. Sethi
:
A Metric-Based Multi-Agent System for Software Project Management. 3-8 - Qing Xue, Yang Wei, Zhiwu Tang, Guohui Zhang:
A Research of Cognitive Models for CGF in Tank Member. 9-14 - Wei Weng, Shigeru Fujimura:
Distributed Feedback Mechanism for Just-In-Time Scheduling Problem. 15-20 - Jie Zhou, Yixiang Chen:
Modeling Instability in a New Framework of Interval Valued Process Algebra. 21-26
Algorithms
- Shu Wang, Changjia Chen:
A Heuristic Address Assignment Algorithm Based on Probability in a Network. 29-33 - Habib Seifzadeh, Ali Asghar Pourhaji Kazem
, Mehdi Kargahi, Ali Movaghar-Rahimabadi
:
A Method for Dynamic Software Updating in Real-Time Systems. 34-38 - Hongtu Ma, Rongcai Zhao, Ling Liang, Xun Li:
A Multi-variable Algorithm for Placing Phi-nodes. 39-43 - Xiaoping Chen, Rongle Kang:
Searching Algorithm with Granularity Changing and the GNSS Integer Ambiguity Estimation. 44-47 - Wei Chen, Zhenkun Zhai, Xiong Li, Jing Guo:
Analysis and Design of an Improved R-learning. 48-52 - Yang Wang:
Effects of Suffix Repetition Rates of a String on the Performance of String Matching Algorithms. 53-58 - Atieh Mirshahvalad, Majid Noorhosseini:
Improving and Extending SMR Technique for Solving Monotonic Problems. 59-64 - Ali Asghar Pourhaji Kazem
, Habib Seifzadeh, Mehdi Kargahi, Ali Movaghar-Rahimabadi
, Shahriar Lotfi
:
Maximizing the Accrued Utility of an Isochronal Soft Real-Time System Using Genetic Algorithms. 65-69 - Yujun Bao, Hong Jiang, Yu Qing Huang, Rongchun Hu:
Multi-objective Optimization of Power Control and Resource Allocation for Cognitive Wireless Networks. 70-74
Artificial Intelligence
- Yuan Yao, Kailong Zhang, Xingshe Zhou:
A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design. 77-81 - Wang Yi-tao, Li Jin-jun:
A Route Planning Optimization Model Based on Improved Ant Colony Algorithm. 82-86 - Robson da Silva Lopes, Márcia Aparecida Fernandes:
Adaptative Instructional Planning Using Workflow and Genetic Algorithms. 87-92 - Jianzhou Chen, Jin Zhang, Chen Fang, Lijuan Zhao, Hans Liljenström:
On Color Texture Generating Based on Simplified KIII Model. 93-96 - Jinghui Ma, Hong Jiang, Yongchun Hu, Yujun Bao:
Optimal Design of Cognitive Radio Wireless Parameters based on Non-dominated Neighbor Distribution Genetic Algorithm. 97-101 - Yanghe Feng, Chaofan Dai:
Research of Knowledge-based Automatic Model Selection Strategy. 102-106 - Xiaohui Ji, Feifei Ma, Jian Zhang:
Solving Global Unconstrained Optimization Problems by Symmetry-Breaking. 107-111
Bioinformatics and Geoinformatics
- Dacheng Xu, Bailiang Li, Anton Nijholt
:
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning. 115-119 - Wenfeng Shen, Weijia Lu, Daming Wei, Weimin Xu, Xin Zhu
, Shizhong Yuan:
A Parallel Algorithm for Computer Simulation of Electrocardiogram Based on MPI. 120-123 - Feng Yang, Ke Zhi Mao
:
Entropy-based Criteria Dealing with the Ties Problem in Gene Selection. 124-129 - MingJie Tang, Yuanchun Zhou, Peng Cui, Haiting Zhang, Liang Hu, YuanSheng Hou, Baoping Yan:
Exploring the Spatial Distribution of Bird Habitat with Cluster Analysis. 130-135 - Fei Luo, Lin Chen:
Parallelizing the Protein Threading Problem in a Hybrid Peer-to-Peer Based High Performance Computing Platform. 136-141 - Buzhou Tang, Xuan Wang, Xiaolong Wang:
Protein Secondary Structure Prediction Using Large Margin Methods. 142-146
Communication Systems & Networks
- Baohua Fan, Heying Zhang, Wenhua Dou:
A Max-plus Network Calculus. 149-154 - Sunil Bhooshan, Vinay Kumar, Gaurav Gayawar, Sah Geetansh Krishna, Kapil Sachdeva:
A New Suggestion for Data Clustering. 155-160 - Bo Wang, Xiangmin Wen, Sun Yong, Zhen Wei:
A Novel NAT Traversal Mechanism in the Heterogeneous Environment. 161-165 - Jingjing Song, Jiguo Yu
, Zhaojun Xiang:
An Efficient Search Algorithm for REIK Overlay Network. 166-170 - Hui Xu, Debao Xiao, Zheng Wu:
Application of Security Ontology to Context-Aware Alert Analysis. 171-176 - Jia Zhu, Baoyu Zheng:
Detection Probability Analysis of Cooperative Spectrum Sensing in Rayleigh Fading Channels. 177-182 - Hailong Ma, Yunfei Guo, Jianwei Zhang:
Fast Reroute upon Multi-homed Domains Link Failures. 183-187 - Rui Zhang:
HPRP: Hierarchical Probabilistic Routing Protocol for Wireless Mesh Network. 188-193 - Yong-Min Liu, Xin-Hua Jiang, Xiao-Hong Nian, Wu-Yi Lu:
Improved DCCP Congestion Control for Wireless Sensor Networks. 194-198 - Xu Zhang, Chuang Lin, Xiangzhen Kong:
Model-Driven Dependability Analysis of Virtualization Systems. 199-204 - Xiaowei Qin, Leixin Mai, Xuchu Dai:
Modeling of Hybrid-service in Broadband Wireless Communication System. 205-209 - Wencai Du, Feng Du:
New Smith Predictor and FRBF Neural Network Control for Networked Control Systems. 210-215 - Min Zhang, Shengming Jiang
, Gang Wei, Hongjiang Wang:
Performance Analysis of Cognitive Radio Networks against Secondary User's Policies. 216-221 - Liying Xie, Gang Wei, Hongjiang Wang, Zaijin Xie:
Performance Analysis of IEEE 802.11 DCF in Multi-hop Ad Hoc Networks. 222-227 - Jiaqing Huang, Liang Wang, Wenqing Cheng, Hui Li:
Polynomial Time Construction Algorithm of BCNC for Network Coding in Cyclic Networks. 228-233 - Kai Wang, Chuang Lin, Fangqin Liu:
Quality of Protection with Performance Analysis in IP Multimedia Subsystem. 234-239 - Chang-you Xing, Ming Chen:
Research on Optimizing Embedding Space Dimension in Network Coordinate System. 240-245
Computer Architecture and VLSI
- Xingyun Qi, Quanyou Feng, Yongran Chen, Qiang Dou, Wenhua Dou:
A Fault Tolerant Bufferless Optical Interconnection Network. 249-254 - Minghua Tang, Xiaola Lin
:
A New Adaptive Flow Control for Mesh-based Network-on-Chip (NoC). 255-260 - Wu Jigang, Ting Lei, Thambipillai Srikanthan
:
Efficient Approximate Algorithm for Hardware/Software Partitioning. 261-265 - Tao Li, Wu Jigang, Siew Kei Lam, Thambipillai Srikanthan, Xicheng Lu:
Efficient Heuristic Algorithm for Rapid Custom-Instruction Selection. 266-270 - Linsheng Zhang, Yan Zhang, Wenbiao Zhou:
Floating-point to Fixed-point Transformation Using Extreme Value Theory. 271-276 - Maman Abdurohman, Kuspriyanto, Sarwono Sutikno, Arif Sasongko:
Transaction Level Modeling for Early Verification on Embedded System Design. 277-282
Computer Security
- Fanping Zeng, Kaitao Yin, Minghui Chen, Xufa Wang:
A New Anomaly Detection Method Based on Rough Set Reduction and HMM. 285-289 - Kanokwan Kanyamee, Chanboon Sathitwiriyawong:
High-Availability Decentralized Multi-Agent Key Recovery System. 290-294 - Jing Sun, Huiqun Zhao, Huibing Xiao, Gongzhu Hu:
Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONS. 295-300 - Quan Qian
, Rui Zhang, Hongyi Che:
Object-oriented Case Representation and Its Application in IDS. 301-306 - Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee:
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. 307-312 - Watcharee Tantikittipisut, Nol Premasathian:
Strongly Unforgeable Signature Scheme without One-Time Key. 313-316 - Yichun Zhang, Jinliang Wan:
Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation Consideration. 317-322 - Tao Qin, Xiaohong Guan, Yi Long, Wei Li:
Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. 323-328
Data Mining & Knowledge Discovery
- Yun Li, Xin Guo, Yunhao Yuan, Jia Wu, Ling Chen:
An Efficient Algorithm to Mine Unordered Trees. 331-336 - Chengli Zhao, Xue Zhang, Dongyun Yi:
A General Framework: Combining Statistical Models and Network Structure for Deep Content Mining. 337-341 - Chengyu Wu, Xiaoying Tai:
Application of Gray Level Variation Statistic in Gastroscopic Image Retrieval. 342-346 - Malik Muhammad Saad Missen, Mohand Boughanem, Guillaume Cabanac
:
Challenges for Sentence Level Opinion Detection in Blogs. 347-351 - Jing Qiu, Lejian Liao:
Extracting Relations from Chinese Web Documents Using Kernel Methods. 352-356 - Jianwen Xie, Jianhua Wu, Qingquan Qian:
Feature Selection Algorithm Based on Association Rules Mining Method. 357-362 - Mohsen Jafari Asbagh, Hassan Abolhassani:
Feature-Based Data Stream Clustering. 363-368 - Hao Wu
, Yijian Pei, Jiang Yu:
Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata Corpus. 369-374 - Vasudha Bhatnagar, Sharanjit Kaur
, Neelima Gupta:
Identifying Structures with Informative Dimensions in Streams. 375-382 - Phimphaka Taninpong, Sudsanguan Ngamsuriyaroj:
Incremental Naïve Bayesian Spam Mail Filtering and Variant Incremental Training. 383-387 - Roman Y. Shtykh, Qun Jin:
Integrating Search and Sharing: User-Centric Collaborative Information Seeking. 388-393 - Md. Rafiqul Islam, Wanlei Zhou
, Morshed U. Chowdhury
:
MVGL Analyser for Multi-classifier Based Spam Filtering System. 394-399 - Weijiang Li, Tiejun Zhao, Wenmao Zang:
PLSA-Based Query Expansion. 400-405 - Zheng-Hua Qi, Geng Yang, Xun-Yi Ren:
Radius-Distance Based Semi-Supervised Algorithm. 406-410 - Yuelong Zhu, Jihong Qian, Qingsong Fan, Dingsheng Wan, Li Shijin Li:
Study on Hydrology Time Series Prediction Based on Wavelet-neural Networks. 411-415 - Aihua Zheng, Jixin Ma
, Bin Luo
, Miltos Petridis, Sulan Zhai, Jin Tang:
Temporal Pattern Recognition in Video Clips Detection. 416-421 - Jochen Hollmann, Per Stenström:
Using Hoarding to Increase Availability in Shared File Systems. 422-429 - Yuxiang Mao, Daming Wei:
Weight Balanced Linear Programming SVM on Skewed Distribution and its Evaluation. 430-435
Database, Data Warehousing, Data Engineering
- Basit Raza
, Abdul Mateen, Tauqeer Hussain, Mian M. Awais:
Autonomic Success in Database Management Systems. 439-444 - Abdul Mateen, Basit Raza
, Tauqeer Hussain, Mian M. Awais:
Autonomicity in Universal Database DB2. 445-450 - Jieping Wang, Xiaoyong Du:
Cluster Based Partition for Multi-dimensional Range Query in DAS Model. 451-456 - Xiaoshuang Xu, Yucai Feng, Feng Wang:
Efficient Processing of XML Twig Queries with All Predicates. 457-462 - Areerat Trongratsameethong, Jarernsri L. Mitrpanont:
Exhaustive Greedy Algorithm for Optimizing Intermediate Result Sizes of Join Queries. 463-468 - Jie Shi, Hong Zhu
, Ge Fu, Tao Jiang:
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs. 469-474 - Jinpeng Wang, Zhuang Miao, Yafei Zhang, Bo Zhou:
Querying Heterogeneous Relational Database using SPARQL. 475-480
Distributed Computing
- Chenting Zhao, Zhenhua Duan, Man Zhang:
A Model-Driven Approach for Generating Business Processes and Process Interaction Semantics. 483-488 - Mehdi Nikkhah, Mohammad Hosein Yektaie, Amir Masoud Rahmani
, Mohammad Nikkhah:
A Novel Fault-tolerant Particle Swarm Optimization Scheduler for Scheduling Independent Task in Grid Computing Environment. 489-493 - Changsong Ding, Yi Fu, Zhigang Hu, Peng Xiao:
A Novel Trust Model Based on Bayesian Network for Service-Oriented Grid. 494-499 - Cho-Chin Lin, Chih-Hsuan Hsu:
Algorithms for Scheduling Distributed Tasks of Ordered Communication on a Realistic Model of Heterogeneous Grids. 500-505 - M. Shahbaz Memon, Morris Riedel
, A. Shiraz Memon
, Achim Streit, Felix Wolf:
Enabling Grid Interoperability by Extending HPC-driven Job Management with an Open Standard Information Model. 506-511 - Ning Li, Jinqiang Hu:
Scientific Workflow Model for Provenance Analysis Based on Many-sorted High-Level Nets. 512-515 - Haroon-Ur-Rashid Khan, Shi Feng, Weixing Ji:
Triplet Based Multi-core Interconnection Network and its Computational Efficiency. 516-521
Economic and Financial Systems
- Tetsuya Takaishi:
Bayesian Inference on QGARCH Model Using the Adaptive Construction Scheme. 525-529 - Sang-Hong Lee, Dong-Kun Shin, Zhen-Xing Zhang, Joon S. Lim:
Comparing the Feature Selection Using the Distributed Non-overlap Area Measurement Method with Principal Component Analysis. 530-534 - Fabio Mulazzani, Barbara Russo
, Giancarlo Succi
:
ERP Systems Development: Enhancing Organization's Strategic Control through Monitoring Agents. 535-542 - Jan-Helge Deutscher, Carsten Felden:
Model Concept to Determine the Optimal Maturity of IT Service Management Processes. 543-548 - Thomas Neubauer, Christian Hartl:
On the Singularity of Valuating IT Security Investments. 549-556
Image Processing & Pattern Recognition
- Hui-Cheng Lian:
A Max Modular Support Vector Machine and Its Variations for Pattern Classification. 559-564 - Lijie Zhang, Haili Yin:
A Method for Removing the Impulse in Image Processing. 565-567 - Zhi Liu
, Hongbo Yan, Liquan Shen, Yongfang Wang, Zhaoyang Zhang:
A Motion Attention Model Based Rate Control Algorithm for H.264/AVC. 568-573 - Gang Chen, Xiaoyong Guo, Tai Hu:
A Noise Insensitive Cluster Validity Measure for Pattern Classification. 574-578 - Fangchao Wang, Sen Bai, Guibin Zhu, Zhenghui Song:
An Image Encryption Algorithm Based on N-Dimension Affine Transformation. 579-585 - Gopalakrishnan Sethumadhavan
, Srinivasan Sankaran:
Border Detection and Cancer Propagation on Spectral Bands of Malignant Melanoma Using Six Sigma Threshold. 586-592 - Aree Ali Mohammed, Jamal Ali Hussein
:
Efficient Video Watermarking Using Motion Estimation Approach. 593-598 - Shaoqiu Xu:
Dynamic Background Modeling for Foreground Segmentation. 599-604 - Chi Ma, Hongyun Zhang, Duoqian Miao, XueDong Zhang:
Fingerprint Skeleton Extraction Based on Improved Principal Curve. 605-610 - Zhongmin Han, Zhi Liu
, Zhaoyang Zhang, Yu Lu, Weiwei Li, Hongbo Yan:
Salient Object Extraction Based on Region Saliency Ratio. 611-615 - Preecha Tangkraingkij, Chidchanok Lursinsap, Siripun Sanguansintukul, Tayard Desudchit:
Selecting Relevant EEG Signal Locations for Personal Identification Problem Using ICA and Neural Network. 616-621 - Ran Li, Weiguang Xu, Jianjiang Lu, Yafei Zhang, Zining Lu:
Technique of Large-scale Image Set Construction Based on Web Image Searching Engine. 622-626 - Osama Hosam, Xingming Sun:
Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique. 627-632
Information Science and Systems
- Zhengjun Cao, Lihua Liu:
A General Attack against Several Group Signatures. 635-640 - Wu Jigang, Baofang Chang, Thambipillai Srikanthan
:
A Hybrid Branch-and-Bound Strategy for Hardware/Software Partitioning. 641-644 - Lijuan Chen, Aiqing Wang, Mingzhu Li:
A Note on the Upper Bound of Dimension of Bivariate Spline Space over Triangulation. 645-649 - Jinyuan Yang, Xinhan Huang, Min Wang:
An Efficient Fusion Algorithm on Conflicting Evidence. 650-654 - Wei Shi, Zheng Zhao:
Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network. 655-659 - Jakarin Smitaveja, Kingkarn Sookhanaphibarn, Chidchanok Lursinsap:
Facial Metrical and Caricature-Pattern-Based Learning in Neural Network System for Face Recognition. 660-665 - Zuoxian Nie, Xin-hua Jiang, Jian-cheng Liu, Haiyan Yang:
Performance Analysis of Generalized Well-formed Workflow. 666-671 - Quan Shan, Yan Chen:
Research on Numerical Module Identification Approaches. 672-676 - Bin Wang, Zhimin Li, Silian Sui, Yuhua Qin:
The Game Analysis of Price Competition on Different Rationality. 677-679
Intelligent Control Systems
- Lijie Yang, Xiaoshan Li:
Animating the Brush-writing Process of Chinese Calligraphy Characters. 683-688 - Xin Li, Zhiping Jia, Xinjie Lu, Haiyang Wang:
Rule-Based Publish-Subscribe Mechanism for Real-time Applications. 689-694 - Toshiyuki Maeda:
Spatial Navigation with Consistency Maintenance System. 695-700