default search action
10. CIT 2010: Bradford, West Yorkshire, UK
- 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4108-2
Computer and System Architecture (1)
- Jian Zou, Chuancai Liu:
Texture Classification by Matching Co-occurrence Matrices on Statistical Manifolds. 1-7 - Ali Safari Mamaghani, Mostafa Mahi, Mohammad Reza Meybodi:
A Learning Automaton Based Approach for Data Fragments Allocation in Distributed Database Systems. 8-12 - Jie Sun, Yongping Zhang, Kejia He:
Providing Context-awareness in the Smart Car Environment. 13-19 - Zhengwei Qiu, Cathal Gurrin, Aiden R. Doherty, Alan F. Smeaton:
Term Weighting Approaches for Mining Significant Locations from Personal Location Logs. 20-25 - Taehoon Kim, Sungwoo Tak:
Experience with Hardware-Software Codesign of Network Protocol Stacks Supporting Real-Time Inter-Task Communication. 26-32 - Andreas Loos, Michael Schmidt, Dietmar Fey, Jens Grobel:
Dynamically Programmable Image Processor for Compact Vision Systems. 33-40 - Samad S. Kolahi, Burjiz K. Soorty, Navneet Chand, Zhang Qu:
Performance Comparison of IPv4 and IPv6 in Peer-Peer and Client Server Local Area Networks. 41-45
Computer and System Architecture (2)
- Menghui Yang, Zhituo Li, Weikang Yang, Tonghong Li:
Analysis of Software Rejuvenation in Clustered Computing System with Dependency Relation between Nodes. 46-53 - Man Cao, Bin Xin, Fuming Qiao, Qingsong Shi, Tianzhou Chen, Like Yan:
Distributed Memory Management Units Architecture for NoC-based CMPs. 54-61 - Jie Yang, Like Yan, Lihan Ju, Yuan Wen, Shaobin Zhang, Tianzhou Chen:
Homogeneous NoC-based FPGA: The Foundation for Virtual FPGA. 62-67 - Claudia Canali, Michele Colajanni, Riccardo Lancellotti:
Adaptive Algorithms for Efficient Content Management in Social Network Services. 68-75 - Andre Lage Freitas, Jean-Louis Pazat:
A Self-Adaptable Approach for Easing the Development of Grid-Oriented Services. 76-82 - Matteo Mordacchini, Ranieri Baraglia, Patrizio Dazzi, Laura Ricci:
A P2P REcommender System based on Gossip Overlays (PREGO). 83-90 - Jie Song, Yubin Bao, Jingang Shi:
A Triggering and Scheduling Approach for ETL in a Real-time Data Warehouse. 91-98 - Jie Cui, Xue Chen, Yongmei Lei, Weimin Xu:
Improving the Efficiency of Scheduling and Placement in FPGA by Small-world Model Based Genetic Algorithm. 99-106
High Performance Computing
- Sunwook Kim, Eutteum Jo, Hyungshin Kim:
Low Power Branch Predictor for Embedded Processors. 107-114 - You Li, Kaiyong Zhao, Xiaowen Chu, Jiming Liu:
Speeding up K-Means Algorithm by GPUs. 115-122 - Ismail Ababneh, Wail Mardini, Hilal Alawneh, Mohammad Hamed, Saad Bani-Mohammad:
Effects of Allocation Request Shape Changes on Performance in 2D Mesh-Connected Multicomputers. 123-130 - Chuanfu Xu, Yonggang Che, Jianbin Fang, Zhenghua Wang:
Optimizing Adaptive Synchronization in Parallel Simulators for Large-scale Parallel Systems and Applications. 131-138 - Tao Tang, Xinhai Xu, Yisong Lin:
A Data Communication Scheduler for Stream Programs on CPU-GPU Platform. 139-146 - Yamin Li, Shietung Peng, Wanming Chu:
Collective Communication in Recursive Dual-Net: An Interconnection Network for High-Performance Parallel Computer Systems of the Next Generation. 147-154 - Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:
A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. 155-162 - Chao Wang, Bin Xie, Jiexiang Kang, Tianzhou Chen, Wei Hu, Zhenwei Zheng:
On-Chip Operating System Design for NoC-Based CMP. 163-170 - Wei Hu, Xingsheng Tang, Bin Xie, Tianzhou Chen, Dazhou Wang:
An Efficient Power-Aware Optimization for Task Scheduling on NoC-based Many-core System. 171-178
Utility Computing/Could Computing/Ubiquitous Computing
- Yaqiong Li, Yongbing Huang:
TMemCanal: A VM-oblivious Dynamic Memory Optimization Scheme for Virtual Machines in Cloud Computing. 179-186 - Ranieri Baraglia, Patrizio Dazzi, Gabriele Capannini, Giancarlo Pagano:
A Multi-criteria Job Scheduling Framework for Large Computing Farms. 187-194 - Fei Teng, Frédéric Magoulès:
Resource Pricing and Equilibrium Allocation Policy in Cloud Computing. 195-202 - Lai Yang, Zhongzhi Shi:
An Efficient Data Mining Framework on Hadoop using Java Persistence API. 203-209 - Matthew Woitaszek, Henry M. Tufo:
Developing a Cloud Computing Charging Model for High-Performance Computing Resources. 210-217 - Haosong Gou, Younghwan Yoo:
Distributed Bottleneck Node Detection in Wireless Sensor Network. 218-224 - Pablo G. S. Tiburcio, Marco Aurélio Spohn:
Ad hoc Grid: An Adaptive and Self-Organizing Peer-to-Peer Computing Grid. 225-232
Software Engineering
- Iván García, I. Andrea:
Using the Software Process Improvement approach for Defining a Methodology for Embedded Systems Development using the CMMI-DEV v1.2. 233-240 - Sajjad Mahmood:
The Impact of Acceptance Tests on Analyzing Component-Based Systems Specifications: An Experimental Evaluation. 241-248 - Mohammad Azzeh, Peter I. Cowling, Daniel Neagu:
Software Stage-Effort Estimation Based on Association Rule Mining and Fuzzy Set Theory. 249-256 - Federico Maggi:
A Recognizer of Rational Trace Languages. 257-264 - Mohamed Zouari, Maria-Teresa Segarra, Françoise André:
A Framework for Distributed Management of Dynamic Self-adaptation in Heterogeneous Environments. 265-272
Computer Networks (1)
- Rabindra Bista, Hee-Dae Kim, Jae-Woo Chang:
A New Private Data Aggregation Scheme for Wireless Sensor Networks. 273-280 - Wei Peng, Baokang Zhao, Wanrong Yu, Chunqing Wu, Xiaorong Yan:
Ferry Route Design with Delay Bounds in Delay-Tolerant Networks. 281-288 - Yongming Xie, Guojun Wang, Jie Wu:
Fuzzy Location Service for Mobile Ad Hoc Networks. 289-296 - Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Analysis of Anomalies on a Virtualized Network Testbed. 297-304 - Pattana Wannawilai, Chanboon Sathitwiriyawong:
AOMDV with Sufficient Bandwidth Aware. 305-312 - Yousef E. M. Hamouda, Chris I. Phillips:
Metadata-Based Adaptive Sampling for Energy-Efficient Collaborative Target Tracking in Wireless Sensor Networks. 313-320
Computer Networks (2)
- Turki A. AlGhamdi, Mike E. Woodward:
QoS Algorithm for Localised Routing Based on Bandwidth as the Dominant Metric for Candidate Path Selection. 321-328 - Mosleh M. Abu-Alhaj, Manjur S. Kolhar, Lingeswari V. Chandra, Omar Amer Abouabdalla, Ahmed M. Manasrah:
Delta-Multiplexing: A Novel Technique to Improve VoIP Bandwidth Utilization between VoIP Gateways. 329-335 - Liang Zhao, Ahmed Yassin Al-Dubai, Imed Romdhani:
Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. 336-342 - Sivanantharasa Panchadcharam, Qiang Ni, Gareth A. Taylor:
Evaluation of QoS Parameters for Real-time Rich Media Applications Using a Test-bed Implementation. 343-348 - Xiaoqun Yuan, Hao Yin, Xuening Liu, Changlai Du, Geyong Min:
Server Placement for Peer-to-Peer Live Streaming Systems. 349-355 - Taehoon Kim, Bora Kang, Sungwoo Tak:
A Sofrware Framework for Robust Packet Delivery in Wireless Multi-hop Networks. 356-363 - Jaehyun Choi, Seungwok Han, Chang Hoon Lyu, Hee Yong Youn:
Enhanced Packet Buffering for DiffServ in Fast Handover Mobile IP. 364-370
Computer Networks (3)
- Zhe Yang, Lingzhi Li, Zhihao Wang, Linqing Li:
Active Analysis of BT with a Modified Azureus Client. 371-376 - Jing Liu, Xinming Ye, Jun Li:
Analyzing Performance for Complex Protocol using Validated CP-nets Models. 377-384 - Fuad Bajaber, Irfan Awan:
Distributed Energy Balanced Clustering for Wireless Sensor Networks. 385-392 - Loubna Mekouar, Youssef Iraqi, Raouf Boutaba:
Impact of Peers' Similarity on Recommendations in P2P Systems. 393-399 - Magnus Eriksson, Arif Mahmud:
Dynamic Single Frequency Networks in Wireless Multihop Networks - Energy Aware Routing Algorithms with Performance Analysis. 400-406 - Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh, Pallab Dasgupta:
A Query based Formal Security Analysis Framework for Enterprise LAN. 407-414 - Wei Yuan, Xiaolei Cui, Ignas G. Niemegeers:
Distributed Adaptive Interference-Avoidance Multi-channel MAC Protocol for ZigBee Networks. 415-419 - Charilaos C. Zarakovitis, Ilias G. Nikolaros, Dionysios Skordoulis, Marios G. Hadjinicolaou, Qiang Ni:
A Comparative Study on Iterative Methods Regarding Cross-Layer Optimization for OFDMA Systems. 420-425
Artificial Intelligence
- Kazuhiko Yamashita, Goutam Chakraborty, Hiroshi Mabuchi, Masafumi Matsuhara:
An Efficient Method to Set RBF Network Paramters Based on SOM Training. 426-431 - Huan Liu, Shuang Zhang, Shixiong Zhang:
Fuzzy Expert System Based Intelligent Website Assessment System. 432-437 - Zahra Khanmirzaei:
Training Recurrent Neuro-Fuzzy System Using Two Novel Population-Based Algorithms for Temperature Forecasting. 438-445 - Mohammad-Reza Feizi-Derakhshi, Masood R. P. Derakhshan:
Intelligent Recognition of Gearbox Status by Wavelet Packet Decomposition. 446-450 - Cheng Hua Li, Iker Gondra:
A Novel Neural Network-Based Approach for Multiple Instance Learning. 451-456 - Shasha Feng, Dantong Ouyang, Yonggang Zhang:
The Logical Difference for Fuzzy Ontologies. 457-463 - Marcos L. P. Bueno, Gina M. B. Oliveira:
Multiobjective Evolutionary Algorithms and a Combined Heuristic for Route Reconnection Applied to Multicast Flow Routing. 464-471 - Luiz G. A. Martins, Luiz H. A. Monteiro:
A Model of Intelligent Controller for Hypothyroidism Treatment. 472-479 - Nabila Kazmi, M. Alamgir Hossain, Roger M. Phillips:
Intelligent Modelling for Benign Tumour Growth with Cell-Cell and Cell-Matrix Adhesion and Movement. 480-486
Computer Graphics/Image Processing
- Jian Wu, Hengjun Yue, Zhiming Cui, Jianming Chen:
Moving Object Tracking Method Based on Adaptive On-line Clustering and Prediction-based Cross-correlation. 487-494 - Andres Solis Montero, Milos Stojmenovic, Amiya Nayak:
Robust Detection of Corners and Corner-line Links in Images. 495-502 - Qing Liu, Sun'an Wang, Xiaohui Zhang, Yun Hou:
Flame Recognition Algorithm Research under Complex Background. 503-510 - Lihong Zheng, Xiangjian He, Bijan Samali, Laurence Tianruo Yang:
Accuracy Enhancement for License Plate Recognition. 511-516 - J. H. Park, G. S. Lee, W. H. Cho, N. Toan, S. H. Kim, S. Y. Park:
Moving Object Detection based on Clausius Entropy. 517-521 - Masakatsu Ohta:
Non-negative Matrix Factorization for Inferring Implicit Preference of Potential Customer. 522-528 - Toan Nguyen Dinh, Jonghyun Park, Gueesang Lee:
Voting Based Text Line Segmentation in Handwritten Document Images. 529-535 - Jun Ma, Long Zheng, Yuichi Yaguchi, Mianxiong Dong, Ryuichi Oka:
Object Recognition using Full Pixel Matching. 536-543 - Min Li, Huibin Wang, Xijun Yan, Lizhong Xu:
An Extraction Method of Moving Object Based on Visual Cognition Mechanism. 544-551
Information Visualization
- Jong-Woo Kim, Woo-Keun Chung, Seon-Yeong Kim, Hwan-Gue Cho:
Detecting the Orientation of N-gonal Cropped Sub-images and Its Application. 552-559 - Dong-Sung Ryu, Seon-Yeong Kim, Hwan-Gue Cho:
A Photo Visualization System Considering Region of Interest. 560-566
Information Security
- Basit Qureshi, Geyong Min, Demetres D. Kouvatsos:
A Framework for Building Trust Based Communities in P2P Mobile Social Networks. 567-574 - Monis Akhlaq, Faeiz Alserhani, Ahsan Subhan, Irfan-Ullah Awan, John Mellor, Pravin Mirchandani:
High Speed NIDS using Dynamic Cluster and Comparator Logic. 575-581 - Flavius Opritoiu, Mircea Vladutiu, Mihai Udrescu, Lucian Prodan:
Concurrent Error Detection for Multiplicative Inversion of Advanced Encryption Standard. 582-588 - Yunchuan Guo, Lihua Yin, Yuan Zhou, Binxing Fang:
Quantifying Information Leakage for Fully Probabilistic Systems. 589-595 - Qiongxiao Wang, Jiwu Jing, Jingqiang Lin:
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms. 596-603 - Michele Colajanni, Mirco Marchetti, Michele Messori:
Selective and Early Threat Detection in Large Networked Systems. 604-611 - Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene:
Enforcing Access Control to Web Databases. 612-619
Management of Data and Database Systems
- Yong-Ki Kim, Hye-Kyeom Yoo, Jae-Woo Chang:
New GML Storage Schema Models for Spatial and Non-spatial Information. 620-626 - Guohui Li, Ping Fan, Yanhong Li, Jianqiang Du:
An Efficient Technique for Continuous K-Nearest Neighbor Query Processing on Moving Objects in a Road Network. 627-634 - Guohui Li, Pei Zhao, Sheng Gao, Jianqiang Du:
F-KDB: An K-D-B Tree Implementation over Flash Memory. 635-642 - Taijin Yoon, Sun-Young Park, Hwan-Gue Cho:
A Smart Filtering System for Newly Coined Profanities by Using Approximate String Alignment. 643-650 - Dexi Liu, Changxuan Wan, Naixue Xiong, Laurence Tianruo Yang, Lei Chen:
Two Novel Semantics of Top-k Queries Processing in Uncertain Database. 651-659 - Baichen Chen, Geyong Min:
Robust Top-k Query Evaluation in Wireless Sensor Networks. 660-667 - Noraziah Ahmad, Mohammad Fadel Jamil Klaib, Roslina Mohd Sidek:
Failure Semantic of Neighbour Replication Grid Transaction Model. 668-673
New Web Technology and Applications
- Yun-Jung Lee, Sung-Min Yoon, Jeong-Hoon Ji, Hwan-Gue Cho, Gyun Woo:
How to Apply the Skip List to the Management of a Massive Set of Replying Comments in Web Bulletins by Exploiting the Power-Law Distribution. 674-681 - Xiaofei Liao, Fan Zhang, Hai Jin, Linchen Yu:
iDARE: Proactive Data Replication Mechanism for P2P VoD System. 682-689 - Patricio Galeas, Ralph Kretschmer, Bernd Freisleben:
Information Retrieval via Truncated Hilbert Space Expansions. 690-697 - Subrata Saha, Atul Sajjanhar, Shang Gao, Robert Dew, Ying Zhao:
Delivering Categorized News Items Using RSS Feeds and Web Services. 698-702
IT for Biomedicine
- Jun Shi, Booma Devi Sekar, Ming-Chui Dong, Wai Kei Lei:
Fuzzy Neural Networks to Detect Cardiovascular Diseases Hierarchically. 703-708
IntelNet-2010: The 2010 International Workshop on Intelligent Sensor and Wireless Networks
Wireless Sensor Networks
- Vasilis Michopoulos, Lin Guan, Iain W. Phillips:
A New Congestion Control Mechanism for WSNs. 709-714 - Yasir Fayyaz, Mehwish Nasim, Muhammad Younus Javed:
Maximal Weight Topology Discovery in Ad hoc Wireless Sensor Networks. 715-722 - Takuya Iwai, Naoki Wakamiya, Masayuki Murata:
Error-Tolerant Coverage Control based on Bio-inspired Attractor Selection Model for Wireless Sensor Networks. 723-729 - José Vicente Martí Avilés, Raúl Marín Prades:
Pattern Recognition Comparative Analysis Applied to Fingerprint Indoor Mobile Sensors Localization. 730-736 - Matthias Andree, Alexander Gebel, Holger Karl:
Concept and Prototype for a Real-Time Enabled Publish/Subscribe System. 737-742 - Ning Sun, Nai-bin Su, Sang-Ho Lee:
A Lifetime Extended Routing Protocol Based on Data Threshold in Wireless Sensor Networks. 743-748
Mobile Computing and Wireless Networks
- Muneer O. Bani Yassein, Osama Al Oqaily, Geyong Min, Wail Mardini, Yaser M. Khamayseh, Saher S. Manaseer:
Enhanced Fibonacci Backoff Algorithm for Mobile Ad-Hoc Network. 749-754 - Ghaidaa Al-Sultany, Maozhen Li, Sadaqat Jan, Hamed S. Al-Raweshidy:
Facilitating Mobile Communication with Annotated Messages. 755-760 - Byung Jun Lee, Kyung Tae Kim, Hyung Do Lee, Hee Yong Youn:
A SIP Signaling Retransmission Scheme for Efficient Mobile IPTV Service over 3G Wireless Networks. 761-766 - Laith Al-Jobouri, Martin Fleury, Salah S. Al-Majeed, Mohammed Ghanbari:
Effective Video Transport over WiMAX with Data Partitioning and Rateless Coding. 767-772 - Muhammad Bilal, Pauline M. L. Chan, Prashant Pillai:
Fastest-Vehicle Multi-hop Routing in Vehicular Ad hoc Networks. 773-778 - Damien Martin-Guillerez, Jean Fanchon:
Discrete-Time Simulator for Wireless Mobile Agents. 779-784 - Michel F. Randrianandrasana, Xueyong Wei, David Lowe:
Collective Behaviour in a Square Lattice of Driven Duffing Resonators Coupled to van der Pol Oscillators. 785-790 - Lexi Xu, Yue Chen, Yue Gao:
Self-organizing Load Balancing for Relay Based Cellular Networks. 791-796
TSP-2010: The Third International Symposium on Trust, Security and Privacy for Emerging Applications
Metrics, Architectures, and Models
- Feng Shen, Chonglei Mei, Hai Jiang, Zhiqian Xu:
Towards Secure and Reliable Data Storage with Multi-coefficient Secret Sharing. 797-802 - Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan:
A Model of Security Information Flow on Entities for Trust Computation. 803-808 - Wolfgang Boehmer:
Toward a Target Function of an Information Security Management System. 809-816 - Lusha Wang, Raquel Hill:
Trust Model for Open Resource Control Architecture. 817-823 - Federico Maggi:
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. 824-831 - Ayman Tajeddine,