


Остановите войну!
for scientists:
16th CSE 2013: Sydney, Australia
- 16th IEEE International Conference on Computational Science and Engineering, CSE 2013, December 3-5, 2013, Sydney, Australia. IEEE Computer Society 2013, ISBN 978-0-7695-5096-1
- Mourad Elhadef:
Nonlinear Support Vector Machines for Solving the PMC-Based System-Level Fault Diagnosis Problem. 1-8 - Khaled M. Khan, Mahboob Shaheen:
Secure Cloud Services: Matrix Multiplication Revisited. 9-14 - Yu Zhuang, R. Rajagopalan, William L. Hase
, Upakarasamy Lourderaj:
A Load-Balancing Force Decomposition Scheme for Parallel Simulation of Chemical Dynamics with Multiple Inter-atomic Force Models. 15-19 - Abhishek Awasthi, Oliver Kramer, Jörg Lässig:
Aircraft Landing Problem: An Efficient Algorithm for a Given Landing Sequence. 20-27 - Andres Ojamaa, Vahur Kotkas
, Margarita Spichakova
, Jaan Penjam:
Developing a Lean Mass Customization Based Manufacturing. 28-33 - Udaya Kiran Tupakula, Vijay Varadharajan
:
Securing Mobile Devices from DoS Attacks. 34-41 - Omar U. Florez, Curtis E. Dyreson
, Junaith Shahabdeen:
What to Reuse?: A Probabilistic Model to Transfer User Annotations in a Surveillance Video. 42-49 - Tyng-Yeu Liang, Jyun-Kai Wu, Yu-Chih Chen:
An Acceleration Toolkit of MATLAB Based on Hybrid CPU/GPU Clusters. 50-57 - Xiaoguang Ren, Xinhai Xu, Yuhua Tang, Xudong Fang, Ye Sen:
An Application-Level Synchronous Checkpoint-Recover Method for Parallel CFD Simulation. 58-65 - Maxim Schnjakin, Tobias Metzke, Christoph Meinel:
Applying Erasure Codes for Fault Tolerance in Cloud-RAID. - Patricia Alves de Freitas, Everson Andrade dos Reis, Wanderson Senra Michel, Mauro Edson Gronovicz, Marcio Alexandre De Macedo Rodrigues:
Aspects of Data Quality That Cause Impact on Business Intelligence Systems. 76-80 - David A. Richie, James A. Ross, Song Jun Park, Dale R. Shires:
Ray-Tracing-Based Geospatial Optimization for Heterogeneous Architectures Enhancing Situational Awareness. 81-86 - Everson Andrade dos Reis, Plácida Leopoldina V. A. da Costa Santos:
Technologies for Information Management of Life Cycle Inventories of the Product and Service Supply Chain in the Brazilian Industry. 87-91 - Stephen Herbein
, Michael Matheny, Matthew Wezowicz, Jaron T. Krogel
, Jeremy Logan, J. Kim, Scott Klasky, Michela Taufer
:
Performance Impact of I/O on QMCPack Simulations at the Petascale and Beyond. 92-99 - Hyeon Gyu Kim:
A Structure for Sliding Window Equijoins in Data Stream Processing. 100-103 - Wenqi Ma, Qingbo Wu, Yusong Tan, Chunguang Wang, Quanyuan Wu, Huaping Hu:
Using All-or-Nothing Encryption to Enhance the Security of Searchable Encryption. 104-108 - Hatem M. El-Boghdadi:
Dynamic-Width Reconfigurable Parallel Prefix Circuits. 109-116 - Boyu Zhang, Trilce Estrada
, Pietro Cicotti, Michela Taufer
:
On Efficiently Capturing Scientific Properties in Distributed Big Data without Moving the Data: A Case Study in Distributed Structural Biology Using MapReduce. 117-124 - ChingShun Lin, Zong Chao Cheng, DongLiang Shih:
Music Enhancement Using Nonnegative Matrix Factorization with Penalty Masking. 125-129 - Mohammed A. Alzain
, Ben Soh, Eric Pardede
:
A Byzantine Fault Tolerance Model for a Multi-cloud Computing. 130-137 - Vaise Patu, Shuichiro Yamamoto:
Identifying and Implementing Security Patterns for a Dependable Security Case - From Security Patterns to D-Case. 138-142 - Timothy Chuang, Munehiro Fukuda:
A Parallel Multi-agent Spatial Simulation Environment for Cluster Systems. 143-150 - Richard K. Lomotey, Yiding Chai, Kazi A. Ahmed, Ralph Deters
:
Web Services Mobile Application for Geographically Dispersed Crop Farmers. 151-158 - Kento Aida, Omar Abdul-Rahman
, Eisaku Sakane, Kazutaka Motoyama
:
Evaluation on the Performance Fluctuation of Hadoop Jobs in the Cloud. 159-166 - Ricardo Ryoiti Sugawara Junior, Liria Matsumoto Sato:
The Use of Locality Information on Data Intensive Parallel File Systems. 167-173 - Daisuke Takahashi
:
Implementation of Parallel 1-D FFT on GPU Clusters. 174-180 - W. Vilwock, Praveen Madiraju, Sheikh Iqbal Ahamed:
A System Implementation of Interruption Management for Mobile Devices. - Huadong Xia, Jiangzhuo Chen, Madhav V. Marathe, Henning S. Mortveit, Marcel Salathé:
Synthesizing Social Proximity Networks by Combining Subjective Surveys with Digital Traces. 188-195 - Sajid Hussain, Samuel Adeogun, Bright Dotu, Laurence T. Yang:
Intelligent and Efficient Web-Based Middleware for Data Management in Motif Finding in Gene Regulation. 196-201 - Yuxiang Li, Yinliang Zhao, Bin Liu:
Similarity Assessment of Program Samples Based on Theory of Fuzzy. 202-207 - Hyun-Ho Shin, Seungjin Lee, Byung-Seo Kim:
Performance Improvement Using Self-Link-Breakage Announcement in Wireless Ad-hoc Networks. 208-212 - Wenfeng Shen, Lianqiang Sun, Daming Wei, Weimin Xu, Xin Zhu
, Shizhong Yuan:
Load-Prediction Scheduling for Computer Simulation of Electrocardiogram on a CPU-GPU PC. 213-218 - Chang-Seok Ock, Sung-Hwan Kim, Haesung Tak, Hwan-Gue Cho:
A Fast Searching for Similar Text Using Genomic Read Mapping Method. 219-226 - Seyed Ali Bahrainian, Andreas Dengel:
Sentiment Analysis and Summarization of Twitter Data. 227-234 - Zheng Huang, Weidong Kou, Kefei Chen:
Secure and Oblivious Information Hiding in Binary Image. 235-239 - Sungwon Kang, Jihyun Lee:
A Systematic Product Line Test Derivation from Activity Diagrams. 240-247 - Yongkai Zhou, Zhi Xue, Chong Fu, Jianhua Li, Yue Wu, Yi Yuan, Yun Zhu, Yong Shi:
A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network. 248-251 - Yanliang Liu, Shanshan Lu, Yonghe Liu:
Routing Design and Analysis of Place Based Opportunistic Networks. 252-259 - Alexsandro Melo, Eduardo Tavares
, Marcelo Marinho
, Erica Sousa, Bruno C. S. Nogueira
, Paulo R. M. Maciel:
Development Risk Assessment in Software Projects Using Dependability Models. 260-267 - Waqar Haque, Andrew Toms, Aaron Germuth:
Dynamic Load Balancing in Real-Time Distributed Transaction Processing. 268-274 - Xiaodan Chen, Li Li, Lei Li, Hongtao Ling:
Spectrum Allocation Allowed for Total Transmission Rate and Fairness. 275-279 - Chan-I Ku, Guo-Heng Luo, Che-Pin Chang, Shyan-Ming Yuan
:
File Deduplication with Cloud Storage File System. 280-287 - Xiaozhuo Gu, Yongming Wang, Weihua Zhou:
A Key Tree Merge Algorithm in Multi-privileged Groups. 288-294 - Peng Luo, Huiyun Li, Guoqing Xu, Lei Peng:
Threat on Physical Layer Security: Side Channel vs. Wiretap Channel. - Maryam Eslamichalandar, Kamel Barkaoui, Hamid Reza Motahari-Nezhad:
Dynamic Adapter Reconfiguration in the Context of Business Protocol Evolution. 301-308 - Elisa Margareth Sibarani
, M. Nadial, Evy Panggabean, S. Meryana:
A Study of Parsing Process on Natural Language Processing in Bahasa Indonesia. 309-316 - André L. M. dos Santos, Joaquim Celestino Júnior, Vincent Scarlata, Anderson C. Lima, Inacio C. Alves, Davi di C. Sampaio:
SACM: Stateful Access Control Model a More Detailed Approach. 317-324 - Tony Tsang:
Nonbinary LDPC Decoder Design and Implementation on FPGA Platform. 325-329 - Victor Lira, Eduardo Tavares
, Stenio F. L. Fernandes, Paulo Romero Martins Maciel, Ricardo M. A. Silva:
Virtual Network Resource Allocation Considering Dependability Issues. 330-337 - Asad Masood Khattak, Nabeel Ahmad, Jibran Mustafa, Zeeshan Pervez
, Khalid Latif
, Sungyoung Lee:
Context-Aware Search in Dynamic Repositories of Digital Documents. 338-345 - Ahmed Sherif, Maha Elsabrouty, Amin A. Shoukry
:
A Novel Taxonomy of Black-Hole Attack Detection Techniques in Mobile Ad-hoc Network (MANET). 346-352 - Cristiano R. Cervi, Renata Galante, José Palazzo Moreira de Oliveira:
Comparing the Reputation of Researchers Using a Profile Model and Scientific Metrics. 353-359 - Kyung Hwan Oh, Hyung Ku Kang, Jong Chang Park, Hee Yong Youn:
WAGE: Weighting with AHP, Grey Numbers, and Entropy for Multiple-Criteria Group Decision Making Problem. 360-367 - Johannes Ulrich Herrmann
, Sieteng Soh
:
Digital Channel Capacity Calculation Using Augmented Ordered Binary Decision Diagrams. 368-373 - Sungryul Kim, Younghwan Yoo:
High-Precision and Practical Localization Using Seawater Movement Pattern and Filters in Underwater Wireless Networks. 374-381 - Md. Abdulla Al Mamun, M. A. Hannan
, Aini Hussain, Hassan Basri:
Wireless Sensor Network Prototype for Solid Waste Bin Monitoring with Energy Efficient Sensing Algorithm. 382-387 - Wuqiang Shen, Shaohua Tang, Lingling Xu:
IBUOV, A Provably Secure Identity-Based UOV Signature Scheme. 388-395 - Jinbang Chen, Wei Zhang, Guillaume Urvoy-Keller:
The Impact of the Buffer Unit on the Performance in 802.11 Wireless LANs. 396-402 - Jinpeng Yue, Wei Zhang, Hong Hu, Zhongzhi Shi:
Efficient Locality Sensitive Clustering in Multimedia Retrieval. 403-408 - Hongyu Pei Breivold, Anton Jansen, Kristian Sandström, Ivica Crnkovic
:
Virtualize for Architecture Sustainability in Industrial Automation. 409-415 - Hwi Ahn, Sungwon Kang, Jihyun Lee:
A Case Study Comparison of Variability Representation Mechanisms with the HeRA Product Line. 416-423 - Matheus Araujo Aguiar, Rita Maria da Silva Julia:
SDM-Go: An Agent for Go with an Improved Search Process Based on Monte-Carlo Tree Search and Sparse Distributed Memory. 424-431 - Tejy Kinattukara, Brijesh K. Verma
:
Hierarchical Segment Learning Method for Road Objects Extraction and Classification. 432-438 - Satoru Ohta, Hiroki Makita:
Anycast Routing Based on the Node Degree for Ad Hoc and Sensor Networks. 439-446 - Sungmin Yi, Hyoseok Ryu, Yon Dohn Chung:
Load Balancing for Real-Time, Location-Based Event Processing on Cloud Systems. 447-454 - Chien-Yuan Chiu, Brijesh K. Verma
:
Effect of Varying Hidden Neurons and Data Size on Clusters, Layers, Diversity and Accuracy in Neural Ensemble Classifier. 455-459 - Young-Ho Suh, Kang-Woo Lee, Eun-Sun Cho
:
A Device Abstraction Framework for the Robotic Mediator Collaborating with Smart Environments. 460-467 - Yang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu:
Finding High-Influence Leader Based on Local Metrics. 468-475 - Silvio Roberto Martins Amarante, Filipe Maciel Roberto, André Ribeiro Cardoso, Joaquim Celestino Jr.:
Using the Multiple Knapsack Problem to Model the Problem of Virtual Machine Allocation in Cloud Computing. 476-483 - Feng Xiang, Lai Tu, Benxiong Huang, Xiaojun Yin:
Region Partition Using User Mobility Patterns Based on Topic Model. 484-489 - Yong Xu, Yue Yuan, Huabing Dong, Yuhui Quan:
An Effective Method of 1-D Bar Code Image Identification. 490-494 - Martin Balík, Ivan Jelínek:
Generic Ontology-Based Model for Adaptive Web Environments: A Revised Formal Description Explained within the Context of Its Implementation. 495-500 - Khoa Anh Tran, Vo Quang Nhat, Gueesang Lee:
Maximum Likelihood Estimation of Gaussian Mixture Models Using PSO for Image Segmentation. 501-507 - R. Kousik Sankar, Aneesh Krishna
:
Customer Requirement Patterns for Software Vendors. 508-514 - Volkan Gunes, Steffen Peter, Tony Givargis:
Modeling and Mitigation of Faults in Cyber-physical Systems with Binary Sensors. 515-522 - Gohar Ali, SeokYoon Kang, Kyong Hoon Kim, Ki-Il Kim
:
Towards Cluster-Based Real-Time Flow Scheduling in Interference-Aware Wireless Sensor Networks. 523-530 - Gustavo Tonini, Frank Siqueira:
A Distributed Data Allocation Algorithm for Biological Databases. 531-537 - Nicolás Rojas
, María Cristina Riff, Xavier Bonnaire, Elizabeth Montero
:
New Components with On-Line Control to Improve Harmony Search. 538-544 - Zhong Yuan Li, Jong Chang Park, Byung Jun Lee, Hee Yong Youn:
Situation Awareness Based on Dempster-Shafer Theory and Semantic Similarity. 545-552 - Yang Liu, Nazanin Borhan, Xiangfeng Luo, Hui Zhang, Xiang He:
Association Link Network Based Core Events Discovery on the Web. 553-560 - Anna Ceguerra
, Peter V. Liddicoat, Simon P. Ringer
, Wojtek Goscinski
, Steve G. Androulakis:
A Tool for Scientific Provenance of Data and Software. 561-565 - Adrian Johannes, Nazanin Borhan, Chang Liu, Rajiv Ranjan
, Jinjun Chen:
A User Demand Uncertainty Based Approach for Cloud Resource Management. 566-571 - Xiao Chen, Jun Zhang
, Yang Xiang
, Wanlei Zhou
:
Traffic Identification in Semi-known Network Environment. 572-579 - Zheng Xu, Xiangfeng Luo, Xiao Wei, Lin Mei:
Investigating the Impact Factors for Event Detection Using Web Search Engines. 580-587 - Bingqing Xu, Lichen Zhang:
Specifying Time Constraints of Cyber Physical Systems Based on Clock Theory. 588-594 - Lichen Zhang:
Multi-view Approach to Specify and Model Aerospace Cyber-physical Systems. 595-602 - Lichen Zhang:
Specifying and Modeling Automotive Cyber Physical Systems. 603-610 - Lichen Zhang:
Specifying and Modeling Railway Cyber Physical Systems by the Extension of AADL. 611-618 - Ran Zhang, Hui Guo:
Evaluation of Multi-threaded Processor Designs for Energy Efficient Embedded Systems. 619-626 - Kazuki Abe, Myungryun Yoo, Takanori Yokoyama:
Aspect-Oriented Customization of the Scheduling Algorithm and the Resource Access Protocol of a Real-Time Operating System. 627-634 - Steffen Peter, Tony Givargis:
Utilizing Intervals in Component-Based Design of Cyber Physical Systems. 635-642 - Jian-Hong Liu, Jing Chen, Yi-Li Wu, Pei-Li Wang:
AASMP - Android Application Server for Mobile Platforms. 643-650 - Yuki Nagahara, Hiroshi Oyama, Takuya Azumi, Nobuhiko Nishio:
Distributed Intent: Android Framework for Networked Devices Operation. 651-658 - Jeik Kim, Kyung-Sik Kim, Aman Deep:
Priority Based USB Communication: Dual Endpoint between Smart TV and Set-Back Box. 659-666 - Pawani Porambage, Pardeep Kumar, Corinna Schmitt, Andrei V. Gurtov
, Mika Ylianttila
:
Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks. 667-674 - Bongkarn Homnan, Watit Benjapolakul
:
Intermediate Inverse Image Histogram. 675-679 - Qiang Wang, Gang Yang, Xingshe Zhou, Yalei Yang:
Behavior Modeling of Cyber-physical System Based on Discrete Hybrid Automata. 680-684 - Noriaki Suzuki, Hyoseung Kim
, Dionisio de Niz, Björn Andersson, Lutz Wrage, Mark H. Klein, Ragunathan Rajkumar:
Coordinated Bank and Cache Coloring for Temporal Protection of Memory Accesses. 685-692 - Tsung-Han Lin, Hitoshi Mitake, Tatsuo Nakajima:
Improving GPOS Real-Time Responsiveness Using vCPU Migration in an Embedded Multicore Virtualization Platform. 693-700 - Yingying Sheng, Renfa Li, Yan Liu:
3D Adjacency: A Communication-Aware Online Scheduling Algorithm for 2D Partially Reconfigurable Devices. 701-705 - Daniel Münch, Ole Isfort, Kevin Mueller, Michael Paulitsch, Andreas Herkersdorf:
Hardware-Based I/O Virtualization for Mixed Criticality Real-Time Systems Using PCIe SR-IOV. 706-713 - Falou Ndoye, Yves Sorel:
Monoprocessor Real-Time Scheduling of Data Dependent Tasks with Exact Preemption Cost for Embedded Systems. 714-721 - Long Li, Renfa Li, Lida Huang, Renfei Wu, Lining Zeng:
A New RTA Based Scheduling Algorithm for Mixed-Criticality Systems. 722-729 - John Burger, Matthew Burdett, Jeffrey Hall:
Sipping from the Firehose: How to "Grok" Gigabytes of Trace Debug Data. 730-733 - Younghun Han, Sungwon Kang, Jinhyun Kim:
ExCHARON: Improved Modeling Language for Cyber-physical Systems Based on CHARON. 734-741 - Ning Li, Tatsuo Nakajima:
Local-Memory-Based Integrity Checking for Embedded Systems. 742-750 - Kailong Zhang, Arnaud de La Fortelle, Dafang Zhang, Xiao Wu:
Analysis and Modeled Design of One State-Driven Autonomous Passing-Through Algorithm for Driverless Vehicles at Intersections. 751-757 - Ehsan Ullah Warriach, Kenji Tei:
Fault Detection in Wireless Sensor Networks: A Machine Learning Approach. 758-765 - Xiaoping Huang, Jianfeng An:
A Novel Architecture to Identify the Microprocessor Chips by Implanting Timing-Fault Execution Unit. 766-769 - Heng Yu
, Bharadwaj Veeravalli, Yajun Ha, Shaobo Luo:
Dynamic Scheduling of Imprecise-Computation Tasks on Real-Time Embedded Multiprocessors. 770-777 - Chia-Hao Hsu, Sheng-De Wang:
An Embedded NIDS with Multi-core Aware Packet Capture. 778-785 - She-I Chang
, Jung-Jei Su, Hsing-Jung Li:
Risk Assessment Mechanism for Personal Information Operations - Case Study by Hospital. 786-793 - Michael Opoku Agyeman
, Ali Ahmadinia:
Optimised Application Specific Architecture Generation and Mapping Approach for Heterogeneous 3D Networks-on-Chip. 794-801 - Zheng Xu, Lin Mei, Yunhuai Liu, Chuanping Hu:
Video Structural Description: A Semantic Based Model for Representing and Organizing Video Surveillance Big Data. 802-809 - Rong Hu, Wanchun Dou, Jianxun Liu:
Clustering-Based Collaborative Filtering Approach for Mashups Recommendation over Big Data. 810-817 - Ramzi A. Haraty
, Georges Stephan:
Relational Database Design Patterns. 818-824 - Danan Thilakanathan, Rafael A. Calvo, Shiping Chen
, Surya Nepal
:
Secure and Controlled Sharing of Data in Distributed Computing. 825-832 - Meong-hun Lee, Jeong-Hwan Hwang, Hyun Yoe:
Agricultural Production System Based on IoT. 833-837 - Taotao Wu, Shaoqian Zhang, Xiaotong Wu
, Wanchun Dou:
A Consumer-Oriented Service Selection Method for Service-Based Applications in the Cloud. 838-845 - Shunmei Meng, Xu Tao, Wanchun Dou:
A Preference-Aware Service Recommendation Method on Map-Re