default search action
22nd SAC 2007: Seoul, Korea
- Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo:
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007. ACM 2007, ISBN 1-59593-480-4
Advances in spatial and image-based information systems
- Mattias Andersson, Joachim Gudmundsson, Patrick Laube, Thomas Wolle:
Reporting leadership patterns among trajectories. 3-7 - Alexander Kolesnikov, Alexander Akimov:
Distortion-constrained compression of vector maps. 8-12 - Tao Wan, Karine Zeitouni, Xiaofeng Meng:
An OLAP system for network-constrained moving objects. 13-18 - Arianna D'Ulizia, Fernando Ferri, Anna Formica, Patrizia Grifoni, Maurizio Rafanelli:
Structural similarity in geographical queries to improve query answering. 19-23 - Jejung Lee, Yugyung Lee, Sanket Shah, James Geller:
HIS-KCWater: context-aware geospatial data and service integration. 24-29
Agents, interactions, mobility and systems
- Rubens Fernandes Nunes, Creto Augusto Vidal, Joaquim B. Cavalcante Neto:
A flexible representation of controllers for physically-based animation of virtual humans. 30-36 - Camila Nunes, Marcílio Ferreira, Hyggo Oliveira de Almeida:
Applying a component-based framework to develop multi-agent environments: case study. 37-41 - Giuseppe Di Fatta, Giancarlo Fortino:
A customizable multi-agent system for distributed data mining. 42-47 - Guido van 't Noordende, Frances M. T. Brazier, Andrew S. Tanenbaum:
Guarding security sensitive content using confined mobile agents. 48-55 - Vasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes:
A crime simulation model based on social networks and swarm intelligence. 56-57
Artificial intelligence, computational logic, and image analysis
- Khalil Djelloul, Thi-Bich-Hanh Dao, Thom W. Frühwirth:
Toward a first-order extension of Prolog's unification using CHR: a CHR first-order constraint solver over finite or infinite trees. 58-64 - Luciano Caroprese, Irina Trubitsyna, Ester Zumpano:
A framework for prioritized reasoning based on the choice evaluation. 65-70 - Muhammad Sarfraz, Aiman Rashid:
A randomized knot insertion algorithm for outline capture of planar images using cubic spline. 71-75 - Gang Zhang, Zong Min Ma, Zhiping Cai:
Directed filter for dominant direction fuzzy set in content-based image retrieval. 76-77 - ChenGuang Liu, Kazuyuki Tanaka:
Eigen-distribution on assignments for game trees with random properties. 78-79 - Enmin Song, Luan Jiang, Bo Meng, Renchao Jin, Xiangyang Xu, Chih-Cheng Hung:
Mass edge detection in mammography based on plane fitting and dynamic programming. 80-81 - Depei Bao, Zehong Yang, Yixu Song:
Projection function for driver fatigue monitoring with monocular camera. 82-83
Autonomic computing
- Edin Arnautovic, Hermann Kaindl, Jürgen Falb, Roman Popp, Alexander Szep:
Gradual transition towards autonomic software systems based on high-level communication specification. 84-89 - Michael G. Hinchey, Yuan-Shun Dai, James L. Rash, Walt Truszkowski, Manish Madhusoodan:
Bionic autonomic nervous system and self-healing for NASA ANTS-like missions. 90-96 - Yu Zhou, Jian Pan, Xiaoxing Ma, Bin Luo, XianPing Tao, Jian Lu:
Applying ontology in architecture-based self-management applications. 97-103 - Rui Zhang, Steve Moyle, Steve McKeever, Alan Bivens:
Performance problem localization in self-healing, service-oriented systems using Bayesian networks. 104-109 - Shameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque:
Self-healing for autonomic pervasive computing. 110-111
Bioinformatics
- Hee-Jeong Jin, Hwan-Gue Cho:
Hierarchical alignment graph for gene teams finding on whole genomes. 113-117 - Pavithra G. Naidu, Mathew J. Palakal, Shielly Hartanto:
On-the-fly data integration models for biological databases. 118-122 - Kuan-Ming Lin, Jaewoo Kang:
Exploiting inter-gene information for microarray data integration. 123-127 - Fa Zhang, Lin Xu, Zhiyong Liu, Bo Yuan:
Improved structural modeling based on conserved domain clusters and structure-anchored alignments. 128-132 - Xiaoyong Fang, Zhenghua Wang, Zhigang Luo, Bo Yuan, Fan Ding:
The detection and assessment of possible RNA secondary structure using multiple sequence alignment. 133-137 - Yin-Fu Huang, Yi-Chao Jhan, Sing-Wu Liou:
Finding putative core promoter elements with position-dependent consensuses. 138-139 - Xiandong Meng, Vipin Chaudhary:
An adaptive data prefetching scheme for biosequence database search on reconfigurable platforms. 140-141 - Hisham Al-Mubaid, Hoa A. Nguyen:
Semantic distance of concepts within a unified framework in the biomedical domain. 142-143 - Chao-Tung Yang, Tsu-Fen Han, Heng-Chuan Kan:
On construction of a BioGrid platform for parallel bioinformatics applications. 144-145
Computer applications in health care
- Roshan Dharshana Yapa, Harada Koichi:
A connected component labeling algorithm for grayscale images and application of the algorithm on mammograms. 146-152 - Sarah Lopez, Guoqing Lu, Zhengxin Chen:
Modeling miRNA data. 158-162 - Marco de Sá, Luís Carriço, Pedro Antunes:
Defining personalized therapies for handheld devices. 163-164 - David Gil, Antonio Soriano Payá, Daniel Ruiz Fernández, Carlos Alberto Montejo Hernández:
Embedded system for diagnosing dysfunctions in the lower urinary tract. 1695-1699
Computer ethics and human values
- Sabah S. Al-Fedaghi:
How sensitive is your personal information? 165-169
Computer forensics
- Yacine Djemaiel, Noureddine Boudriga:
A global marking scheme for tracing cyber attacks. 170-174 - Ricci S. C. Ieong, H. C. Leung:
Deriving cse-specific live forensics investigation procedures from FORZA. 175-180 - Antonio Savoldi, Paolo Gubian:
SIM and USIM filesystem: a forensics perspective. 181-187 - Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga:
Global intrusion detection and tolerance in networked systems. 188-189 - Lorie M. Liebrock, Nico Marrero, David P. Burton, Ron Prine, E. Cornelius, M. Shakamuri, Vincent Urias:
A preliminary design for digital forensics analysis of terabyte size data sets. 190-191
Computer networks
- Chi-Jen Wu, Ren-Hung Hwang, Jan-Ming Ho:
A scalable overlay framework for internet anycasting service. 193-197 - Xiaolong Jin, Geyong Min:
An analytical model for generalized processor sharing scheduling with heterogeneous network traffic. 198-202 - Paulo Sérgio Sausen, Marco Aurélio Spohn, Antonio Marcus Nogueira de Lima, Angelo Perkusich:
Bounded-distance multi-coverage backbones in wireless sensor networks. 203-208 - Daniel M. Batista, Nelson L. S. da Fonseca, Flávio Keidi Miyazawa:
A set of schedulers for grid networks. 209-213 - Sangmin Kim, VamsiKrishna Vasireddy, Khaled Harfoush:
Scalable coordination for sensor networks in challenging environments. 214-221 - Guillaume Chelius, Antoine Fraboulet, Eric Fleury:
Worldsens: a fast and accurate development framework for sensor network applications. 222-226 - Solange Rito Lima, Pedro Nuno Miranda de Sousa, Paulo Carvalho:
Enhancing QoS metrics estimation in multiclass networks. 227-231 - Yunqi Li, Jiahai Yang, Changqing An, Hui Zhang:
Finding hierarchical heavy hitters in network measurement system. 232-236 - Yu-Chieh Lin, Hsung-Pin Chang:
VA-TCP: a vertical handoff-aware TCP. 237-238
Computer security
- Arie Orlovsky, Danny Raz:
Decentralized enforcement of security policies for distributed computational systems. 241-248 - Yi Mu, Willy Susilo, Huafei Zhu:
Compact sequential aggregate signatures. 249-253 - Xiang Zhou, Min Huang, Zhiyong Peng:
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image. 254-258 - Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour:
RAAS: a reliable analyzer and archiver for snort intrusion detection system. 259-263 - Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das:
Memory-efficient content filtering hardware for high-speed intrusion detection systems. 264-269 - K. H. S. Sabaragamu Koralalage, Mohammad Reza Selim, Junichi Miura, Yuichi Goto, Jingde Cheng:
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism. 270-275 - Anh-Quynh Nguyen, Yoshiyasu Takefuji:
Towards a tamper-resistant kernel rootkit detector. 276-283 - Martin Johns, Christian Beyerlein:
SMask: preventing injection attacks in web applications by approximating automatic data/code separation. 284-291 - Umut Topkara, Mikhail J. Atallah, Mercan Topkara:
Passwords decay, words endure: secure and re-usable multiple password mnemonics. 292-299 - Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti:
Using CP-nets as a guide for countermeasure selection. 300-304
Constraint solving and programming
- Thibaut Feydy, Peter J. Stuckey:
Propagating dense systems of integer linear equations. 306-310 - Mats Petter Pettersson, Radoslaw Szymanek, Krzysztof Kuchcinski:
A CP-LP approach to network management in OSPF routing. 311-315 - Lucas Bordeaux, Horst Samulowitz:
On the stochastic constraint satisfaction framework. 316-320 - Lucas Bordeaux, Lintao Zhang:
A solver for quantified Boolean and linear constraints. 321-325 - Yahia Lebbah, Claude Michel, Michel Rueher:
Using constraint techniques for a safe and fast implementation of optimality-based reduction. 326-331 - Alan Holland:
Injection/withdrawal scheduling for natural gas storage facilities. 332-333 - Kathryn Francis, Peter J. Stuckey:
Constraint propagation for loose constraint graphs. 334-335 - Malek Mouhoub, Amrudee Sukpan:
Solving conditional and composite constraint satisfaction problems. 336-337
Coordination models, languages and applications
- Yingbo Liu, Jianmin Wang, Jiaguang Sun:
A machine learning approach to semi-automating workflow staff assignment. 340-345 - Sun Meng, Farhad Arbab:
Web services choreography and orchestration in Reo and constraint automata. 346-353 - Mirko Viroli, Matteo Casadei, Luca Gardelli:
A self-organising solution to the collective sort problem in distributed tuple spaces. 354-359 - Lyndon J. B. Nixon, Olena Antonechko, Robert Tolksdorf:
Towards Semantic tuplespace computing: the Semantic web spaces system. 360-365 - Kevin Marth, Shangping Ren:
Extending the ARC model with generative coordination. 366-367 - Michael Schumacher, Tim Van Pelt, Ion Constantinescu, Alexandre de Oliveira e Sousa, Boi Faltings:
Federated directories of Semantic web services. 368-369
Data mining
- Grigorios Loukides, Jianhua Shao:
Capturing data usefulness and privacy protection in K-anonymisation. 370-374 - Jun-Lin Lin, Julie Yu-Chih Liu:
Privacy preserving itemset mining through fake transactions. 375-379 - Traian Marius Truta, Alina Campan:
K-anonymization incremental maintenance and optimization techniques. 380-387 - Wang Lian, David W. Cheung, Siu-Ming Yiu:
Maintenance of maximal frequent itemsets in large databases. 388-392 - Ghazi Al-Naymat, Sanjay Chawla, Joachim Gudmundsson:
Dimensionality reduction for long duration and complex spatio-temporal queries. 393-397 - Songbo Tan, Xueqi Cheng:
Using hypothesis margin to boost centroid text classifier. 398-403 - Toon Calders, Bart Goethals, Michael Mampaey:
Mining itemsets in the presence of missing values. 404-408 - Pasquale Rullo, Chiara Cumbo, Veronica L. Policicchio:
Learning rules with negation for text categorization. 409-416 - Jeroen De Knijf:
FAT-miner: mining frequent attribute trees. 417-422 - Youngju Son, Hasan M. Jamil, Farshad Fotouhi:
Exploiting types for improved schema mapping. 423-429 - Jianlong Qi, Jian Tang:
Integrating gene ontology into discriminative powers of genes for feature selection in microarray data. 430-434 - Li Xiong, Subramanyam Chitti, Ling Liu:
Mining multiple private databases using a kNN classifier. 435-440 - Seung-won Hwang, Hwanjo Yu:
Mining and processing category ranking. 441-442 - Céline Hébert, Alain Bretto, Bruno Crémilleux:
Optimizing hypergraph transversal computation with an anti-monotone constraint. 443-444 - Ana Paula Appel, Adriano Arantes Paterlini, Elaine P. M. de Sousa, Agma J. M. Traina, Caetano Traina Jr.:
Biased box sampling - a density-biased sampling for clustering. 445-446
Data streams
- Eduardo Jaques Spinosa, André Carlos Ponce de Leon Ferreira de Carvalho, João Gama:
OLINDDA: a cluster-based approach for detecting novelty and concept drift in data streams. 448-452 - Longbo Zhang, Zhanhuai Li, Yiqiang Q. Zhao, Yu Min, Zhang Yang:
A priority random sampling algorithm for time-based sliding windows over weighted streaming data. 453-456 - Elio Masciari:
RFID data management for effective objects tracking. 457-461 - Marcelo Keese Albertini, Rodrigo Fernandes de Mello:
A self-organizing neural network for detecting novelties. 462-466 - Carlos Pinto, João Gama:
Incremental discretization, application to data with concept drift. 467-468
Database theory, technology, and applications
- Zhenglu Yang, Botao Wang, Masaru Kitsuregawa:
General dominant relationship analysis based on partial order models. 470-474 - Weihai Yu, Jie Yang:
Continuation-passing enactment of distributed recoverable workflows. 475-481 - Nobutaka Suzuki:
An edit operation-based approach to the inclusion problem for DTDs. 482-488 - James J. Lu, Chia-Hsin Huang, Tyng-Ruey Chuang:
Querying and browsing XML and relational data sources. 489-493 - Cristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri, Diogo Tuler Forlani, Agma J. M. Traina, Fernando da Fonseca de Souza:
Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries. 494-499 - Ali Saman Tosun:
Equivalent disk allocations. 500-505 - Gae-won You, Seung-won Hwang:
Personalized ranking: a contextual ranking approach. 506-510 - Ying Qiao, Kang Zhong, Hongan Wang, Xiang Li:
Developing event-condition-action rules in real-time active database. 511-516 - Jongho Nang, Joohyoun Park:
An efficient indexing structure for content based multimedia retrieval with relevance feedback. 517-524 - Guangming Xing, Zhonghang Xia, Andrew Ernest:
Building automatic mapping between XML documents using approximate tree matching. 525-526 - Gisele Busichia Baioco, Agma J. M. Traina, Caetano Traina Jr.:
An effective cost model for similarity queries in metric spaces. 527-528 - Ilias Michalarias, Christian Becker:
Multidimensional querying in wireless ad hoc networks. 529-530
Dependable and adaptive distributed systems
- Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
An adaptive randomized search protocol in peer-to-peer systems. 533-537 - Tiejun Ma, Jane Hillston, Stuart Anderson:
Evaluation of the QoS of crash-recovery failure detection. 538-542 - Michael A. Jaeger, Helge Parzyjegla, Gero Mühl, Klaus Herrmann:
Self-organizing broker topologies for publish/subscribe systems. 543-550 - Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
A new adaptive accrual failure detector for dependable distributed systems. 551-555 - José Enrique Armendáriz-Iñigo, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Hendrik Decker, Francesc D. Muñoz-Escoí:
k-bound GSI: a flexible database replication protocol. 556-560 - Giovanni Aloisio, Massimo Cafaro, Sandro Fiore, Maria Mirto, Salvatore Vadacca:
GReIC data gather service: a step towards P2P production grids. 561-565 - Giovanna Di Marzo Serugendo, John S. Fitzgerald, Alexander B. Romanovsky, Nicolas Guelfi:
A metadata-based architectural model for dynamically resilient systems. 566-572 - Vincent Gramoli, Emmanuelle Anceaume, Antonino Virgillito:
SQUARE: scalable quorum-based atomic memory with local reconfiguration. 574-579 - Dhouha Ayed, Yolande Berbers:
Dynamic adaptation of CORBA component-based applications. 580-585 - Robert John Walters, Peter Henderson, Stephen Crouch:
Selecting a distributed agreement algorithm. 586-587 - Sushanta Karmakar, Arobinda Gupta:
Adaptive broadcast by distributed protocol switching. 588-589 - Piotr Karwaczynski, Dariusz Konieczny, Jaka Mocnik, Marko Novak:
Dual proximity neighbour selection method for peer-to-peer-based discovery service. 590-591
Document engineering
- Georg Vogeler, Stefan Gruner, Benjamin Burkard:
New specialist tools for medieval document XML markup. 594-599 - Sylvain Lamprier, Tassadit Amghar, Bernard Levrat, Frédéric Saubion:
ClassStruggle: a clustering based text segmentation. 600-604