default search action
8. CIT 2008: Sydney, Australia
- Qiang Wu, Xiangjian He, Quang Vinh Nguyen, Wenjing Jia, Mao Lin Huang:
Proceedings of 8th IEEE International Conference on Computer and Information Technology, CIT 2008, Sydney, Australia, July 8-11, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-2357-6 - David Suter:
Keynote I: High dimensional data analysis in Computer Vision. 1 - Laurence Tianruo Yang:
Keynote II: Ubiquitous/pervasive intelligence: Visions and challenges. 2 - Wanlei Zhou:
Keynote III: Detection and traceback of DDoS attacks. 3 - Albert Y. Zomaya:
Keynote IV: Dynamic mobility management. 4 - Qiuer Xu, Xiuzi Ye, Sanyuan Zhang, Yin Zhang:
Linear mesh deformation with snake constraint. 5-11 - Yuanfeng Zhou, Caiming Zhang, Pengbo Bo, Weitao Li:
Triangulation of Implicit Surfaces Based on Particle System. 12-17 - Zenghai Hu, Caiming Zhang, Yuanfeng Zhou:
A new volume-data resampling method for shear-warp rendering algorithm. 18-23 - Wei Lai:
A software environment for practical graph applications. 24-29 - RongHua Gao, Baocai Yin, Dehui Kong, Yong Zhang, Huilin Si:
An improved method of parallax mapping. 30-34 - Shaaban Mahran, Khaled Mahar:
Using grid for accelerating density-based clustering. 35-40 - Shih-Chang Hsia, Po-Yi Hong:
Fast variable block motion estimation based on adaptive search for H.264/AVC system. 41-46 - Ken-ichi Fukui, Kazumi Saito, Masahiro Kimura, Masayuki Numao:
Sequence-based SOM: Visualizing transition of dynamic clusters. 47-52 - Shin-ichi Minato:
A fast algorithm for cofactor implication checking and its application for knowledge discovery. 53-58 - Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius Truta, Ping Li:
(p+, α)-sensitive k-anonymity: A new enhanced privacy protection model. 59-64 - Te-Ming Chang, Wen-Feng Hsiao:
A hybrid approach to automatic text summarization. 65-70 - Cheong Hee Park:
Dimension reduction using least squares regression in multi-labeled text categorization. 71-76 - Panida Songram, Veera Boonjing:
Mining top-k closed itemsets using best-first search. 77-82 - Kiyoung Park, Sungwon Jung:
An extended exponential index scheme for Multi-disk broadcast in a single wireless channel. 83-88 - Yanzhong Dang, Zhaoguo Xuan, Li Chen:
The analysis of research fields of chinese natural science funds based on text classification. 89-94 - Yujuan Cao, Zhendong Niu, Weiqiang Wang, Kun Zhao:
The study on Detecting Near-Duplicate WebPages. 95-100 - Jaewoo Chang, Ahreum Lee:
Parallel high-dimensional index structure for content-based information retrieval. 101-106 - Ahreum Lee, Ahreum Kim, Jaewoo Chang:
Materialization-based query processing algorithms on road networks. 107-112 - Kosuke Sugai, Masahide Sugiyama:
A new implementation of similar segment search in an arbitrary number of time-series. 113-118 - Chang-Keon Ryu, Hyong-Jun Kim, Seung-Hyun Ji, Gyun Woo, Hwan-Gue Cho:
Detecting and tracing plagiarized documents by reconstruction plagiarism-evolution tree. 119-124 - Chaofeng Sha, Xipeng Qiu, Aoying Zhou:
KLNCC: A new nonlinear correlation clustering algorithm based on KL-divergence. 125-130 - Zhenxing Qin, Shichao Zhang, Li Liu, Tao Wang:
Cost-sensitive semi-supervised classification using CS-EM. 131-136 - Junqiang Liu, Xiaoling Guan:
Dynamic information integration using object deputy model. 137-142 - Yoonsik Tak, Eenjun Hwang:
An indexing scheme for efficient camera angle invariant image retrieval. 143-148 - Heon Gyu Lee, Bum Ju Lee, Jin-Ho Shin, Long Jin, Cheng Hao Jin, Keun Ho Ryu:
Application of calendar-based temporal classification to forecast customer load patterns from load demand data. 149-154 - Soumya Burugu, Praveen Madiraju, Hamidah Ibrahim:
Constraint optimization for a system of relational databases. 155-160 - Xuhui Li, Mengchi Liu:
Design issues of XTQ language. 161-166 - Ibrahim Mohammad Dweib, Ayman Awadi, Seif Elduola Fath Elrhman, Joan Lu:
Schemaless approach of mapping XML document into Relational Database. 167-172 - Raoul Pascal Pein, Milton Amador, Joan Lu, Wolfgang Renz:
Using CBIR and semantics in 3D-model retrieval. 173-178 - Raoul Pascal Pein, Joan Lu, Wolfgang Renz:
An extensible query language for content based image retrieval based on Lucene. 179-184 - Wenfei Fan:
Extending dependencies with conditions for data cleaning. 185-190 - Yo-Ping Huang, Li-Jen Kao, Frode Eika Sandnes:
Identifying insightful salinity and temperature variations in ocean data. 191-196 - Lizhen Wang, Yuzhen Bao, Joan Lu, Jim Yip:
A new join-less approach for co-location pattern mining. 197-202 - Yi Jiang, Yan Chen, Zhimin Zeng, Xiangjian He:
A bank customer credit evaluation based on the decision tree and the simulated annealing algorithm. 203-206 - Hideki Oshima, Ryotaro Kobayashi, Kazuki Shimura, Toshio Shimada:
Power consumption reduction scheme focusing on the Depth of Speculative Execution. 207-212 - Xiaotong Zhang, Peiya Li, Qin Wang, Chong Li:
A multi-service Token Bucket Algorithm for MAC QoS system in HFC access network. 213-217 - Ohhoon Kwon, Hyokyung Bahn, Kern Koh:
FARS: A page replacement algorithm for NAND flash memory based embedded systems. 218-223 - Jie Yu, Xuehai Zhou:
A new reliability evaluation method for embedded system. 224-230 - Eigo Okada, Xiaojin Sun, Mitsuko Sato, Yukikazu Nakamoto:
Implementation and evaluation of an on-device customizable user interface for smart devices. 231-236 - Douglas L. Maskell, A. Prasad Vinod:
Efficient multiplierless channel filters for multi-standard SDR. 237-242 - Li Lo, Liang-Teh Lee, Huang-Yuan Chang:
A modified interactive oriented scheduler for GUI-based embedded systems. 243-248 - Xiao Zheng, Shiyong Zhang:
Learn adaptive dynamic policy under mixed multi-agent environment. 249-254 - Toshiaki Miyazaki, Yusuke Nomoto, Yuka Sato, Stanislav G. Sedukhin:
Array processor featuring an effective FIFO-based data stream management. 255-260 - Mi-Young Park, Sang-Hwa Chung:
Detection of first races for debugging message-passing programs. 261-266 - Jing Du, Yuhua Tang, Fujiang Ao, Tao Tang, Xuejun Yang:
Model-guided strip size selection for minimal execution time on imagine stream processor. 267-272 - Zhenghua Xue, Xiaoshe Dong, Shengqun Fan:
Novel management architecture for large-scale server cluster. 273-278 - Chao-Chin Wu, Lien Fu Lai, Yu-Shuo Chang:
Using MPI to execute a FuzzyCLIPS application in parallel in heterogeneous computing systems. 279-284 - Hyunsik Choi, Kwonyong Lee, Sungyong Park:
A flow-based prediction scheme to manage resources in enterprise data centers. 285-290 - Ana Balevic, Lars Rockstroh, Wenbin Li, Jürgen Hillebrand, Sven Simon, Andreas Tausendfreund, Stefan Patzelt, Gert Goch:
Acceleration of a finite-difference method with general purpose GPUs - Lesson learned. 291-294 - Cho-Chin Lin, Chun-Wei Shih:
An efficient scheduling algorithm for grid computing with periodical resource reallocation. 295-300 - Hsien-Huang P. Wu, Soon-Lin Chen, Ping-Kuo Weng, Ying-Yih Wu:
Analysis of planar mirror catadioptric stereo systems based on epipolar geometry. 301-306 - In Seop Na, Sang-Cheol Park, Ji Woong Kim, Soo-Hyung Kim:
A multiple expert algorithm for the binarization of Korean Identity card images. 307-311 - Wenhao Zhu, Yanyun Wang, Baogang Wei:
Nose detection based feature extraction on both normal and abnormal 3D faces. 312-316 - Yintang Dai, Shiyong Zhang:
A performance study on deterministic label graph matching algorithm. 317-320 - Chunhua Du, Qiang Wu, Jie Yang, Zheng Wu:
SVM based ASM for facial landmarks location. 321-326 - Hisato Aota, Yuichi Yaguchi, Ryuichi Oka:
Feature detection of electrical feeder lines with galloping motion. 327-332 - Toan Nguyen Dinh, Jonghyun Park, Gueesang Lee:
Low-complexity text extraction in Korean signboards for mobile applications. 333-337 - Atul Sajjanhar, Guojun Lu, Dengsheng Zhang, Wanlei Zhou, Yi-Ping Phoebe Chen:
Image retrieval based on semantics of intra-region color properties. 338-343 - Chunli Wang, Dapeng Chai, Rui Ma, Xiaohui Lin, Chun Wang:
Sand grains tracking in dense grain image sequences. 344-349 - Olivier Lézoray, Abderrahim Elmoataz, Vinh-Thong Ta:
Learning graph neighborhood topological order for image and manifold morphological processing. 350-355 - Caiqing Zhang, Caiming Zhang, Xuemei Li:
A new method for image resizing. 356-360 - Xiaochao Yang, Tianhao Zhang, Yue Zhou, Jie Yang:
Gabor phase embedding of Gait Energy Image for identity recognition. 361-366 - Shujing Lu, Xiao Tu, Yue Lu:
An improved two-layer SOM classifier for handwritten numeral recognition. 367-371 - Lihong Zheng, Xiangjian He, Qiang Wu, Wenjing Jia, Bijan Samali, Marimuthu Palaniswami:
A hierarchically combined classifier for license plate recognition. 372-377 - Ning Li, Shun-Zheng Yu:
Periodic hidden Markov model-based workload clustering and characterization. 378-383 - Brian K. Lien, Chao-Yi Chang:
Watermarking of ordered dither halftone images by bit interleaving. 384-389 - Min Li, Hua Wang:
ABDM: An extended flexible delegation model in RBAC. 390-395 - Thair Attallah Al-Dala'in, Suhuai Luo, Peter F. Summons:
Using a mobile device to enhance customer trust in the security of remote transactions. 396-401 - Julian Jang, Surya Nepal, John Zic:
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries. 402-407 - Peter White:
Identity Management Architecture: A new direction. 408-413 - Fangyong Hou, Dawu Gu, Nong Xiao, Yuhua Tang:
Data privacy and integrity appropriate for disk protection. 414-419 - ByungRae Cha, Kyungjun Kim, HyunShik Na:
Random password generation of OTP system using changed location and angle of fingerprint features. 420-425 - Mohd Afizi Mohd Shukran:
Developing an effective watermarking algorithm for video retrieval. 426-431 - Mohd Fadzli Marhusin, David Cornforth, Henry Larkin:
An overview of recent advances in intrusion detection. 432-437 - Dong Chan An, Seog Park:
Efficient labeling scheme of XML data considering update operations. 438-443 - Chen-Tung Chen, Hui-Ling Cheng:
Group decision making based on computing with linguistic variables and an example in information system selection. 444-449 - Takuto Yanagida, Hidetoshi Nonaka:
Architecture for migratory adaptive user interfaces. 450-455 - Zhihua Zhang:
Modeling and knowledge representation of machine element design for intelligent design support systems. 456-461 - Fahim Akhter:
Gender and cultural differences in adoption of e-business infrastructure in UAE. 462-465 - Juha Puustjärvi:
Concurrency control in Web service orchestration. 466-472 - Jia-heng Zheng, Li-xia Wei, Hongye Tan:
A new method on the detection of near-replicas of web pages. 473-478 - Lidong Bing, Yexin Wang, Yan Zhang, Hui Wang:
Primary content extraction with Mountain Model. 479-484 - Yun Zhang, Boqin Feng:
Tag-based user modeling using formal concept analysis. 485-490 - Henry Larkin:
Object oriented regular expressions. 491-496 - Munakata Satoshi, Kunio Saito, Masahiro Hiji:
A new session management method for efficient mobile access to web applications. 497-502 - Prakash Kadel, Ji-Ae Shin, Ho-Jin Choi:
A semantic approach for more robust and efficient service discovery. 503-508 - Yongrui Qin, Weiwei Sun, Ping Yu, Zhuoyao Zhang:
Optimizations for query index updating in finite automaton based XML stream filtering systems. 509-514 - Manabu Kanzawa, Naru Hirata, Hirohide Demura, Noriaki Asada:
Online conference system for collaborative work to make thematic maps. 515-519 - Kwang Su Jung, Nam Hee Yu, Seung-Jung Shin, Keun Ho Ryu:
A compressing method for genome sequence cluster using sequence alignment. 520-525 - Giri Babu Kande, Satya Savithri Tirumala, P. Venkata Subbaiah:
Extraction of exudates and blood vessels in digital fundus images. 526-531 - Kwang Su Jung, Ki Jin Yu, Yong Je Chung, Keun Ho Ryu:
Investigating the binding area of protein surface using MCL algorithm. 532-537 - Motoki Sakai, Daming Wei:
Wavelet shrinkage applications of EEG-ECG-based human-computer interface. 538-543 - Bofeng Zhang, Ke Yan, Susu Jiang, Daming Wei:
Walking stability analysis by age based on Dynamic Time Warping. 544-548 - Jung-Shan Chien, Sheng-Ching Lin, Ray-I Chang, Chia-Hui Wang:
Priority-based R2CP for multipoint-to-point video streaming. 549-554 - Ohhoon Kwon, Hyokyung Bahn, Kern Koh:
Popularity and prefix aware interval caching for multimedia streaming servers. 555-560 - Chia-Yu Chang, Jin-Jang Leou, Shyi-Shiun Kuo, Hsuan-Ying Chen:
A new computation-aware scheme for motion estimation in H.264. 561-565 - Xinggong Zhang, Yan Pang, Zongming Guo:
Low latency overlay construction for peer-to-peer live streaming. 566-570 - Chang Hoon Son, Seong Mo Park, Young Min Kim:
An embedded compression algorithm integrated with Motion JPEG2000 system for reduction of off-chip video memory bandwidth. 571-576 - Rui Wang, Xiangyu Wang:
Here and there: Experiencing co-presence through mixed reality-mediated collaborative design system. 577-582 - Yuichi Yaguchi, Keitaro Naruse, Ryuichi Oka:
Fast spotter: An approximation algorithm for continuous dynamic programming. 583-588 - Cheng-Han Yang, Hui-Yu Huang, Wen-Hsing Hsu:
An adaptive video watermarking technique based on DCT domain. 589-594 - Abdel Ejnioui, Paul Bao:
A parallel architecture for GFA modeling in video coding. 595-600 - Jie Wu, ZhiHui Lu, Bisheng Liu, Shiyong Zhang:
PeerCDN: A novel P2P network assisted streaming content delivery network scheme. 601-606 - Jae-Young Pyun, Ho-Jin Choi:
TCP-friendly streaming video system with error-resilient coding over wireless vertical handover environment. 607-612 - Guo-Fang Dong, Fei Gao, Jing Fan, Zi-bin Zhao:
Enhancement of PAPR reduction using dynamic PTS algorithm in multiple antennas system. 613-617 - Shivanajay Marwaha, Jadwiga Indulska, Marius Portmann:
Challenges and recent advances in QoS provisioning in wireless mesh networks. 618-623 - Jing Fan, Fei Gao, Wan-Sheng Wang, Guo-Fang Dong:
Performance analysis of an adaptive backoff scheme for Ad Hoc networks. 624-629 - Rachod Patachaianand, Kumbesan Sandrasegaran:
Performance study of video streaming in commercial UMTS network. 630-633 - Ghasem Mirjalily, Mohammad Hadi Karimi Tafti, Fazlollah Adibniya, Shahram Rajai:
An approach to select the best spanning tree in Metro Ethernet networks. 634-639 - Nan Hao, Jae-Kark Choi, Sang-Jo Yoo:
Cooperative channel operation MAC protocol for WLAN based indoor cognitive radio network systems. 640-645 - Jae-Kark Choi, Nan Hao, Sang-Jo Yoo:
Fast group scanning scheme with dynamic neighbor base station list in IEEE 802.16e networks. 646-651 - Abul Rahman, Paul J. Kennedy, Andy Simmonds, Jenny Edwards:
Fuzzy logic based modelling and analysis of network traffic. 652-657 - Ines Doghri, Hella Kaffel-Ben Ayed:
Towards fair P2P auctions over MANETs. 658-663 - Li Zheng, Doan B. Hoang:
Applying graph coloring in resour ce coordination for a high-density wireless environment. 664-669 - Byung-Joon Lee, Hyun-Ju Jung, Gyun Woo, Sung-Youb Jung, Joon-Key Jeon:
Pyro implementation of swarm-bots exploring target objects in an area with irregular barriers. 670-675 - Wei-Tsong Lee, Fong-Hao Liu, Hsiang-Fu Lo:
Improving the performance of MPEG-4 transmission in IEEE 802.15.3 WPAN. 676-681 - Daisuke Senzaki, Goutam Chakraborty:
Mobility management using movement feature for next generation cellular networks. 682-687 - Fahad Aijaz, Bilal Hameed, Bernhard Walke:
Asynchronous mobileweb services: Concept and architecture. 688-693 - Dong-Hong Xu, Yong Qi, Di Hou, Gong-Zhen Wang, Ying Chen:
A novel formal framework for secure dynamic services composition. 694-699 - Ganesh R. Naik, Dinesh Kant Kumar, Marimuthu Palaniswami:
Multi run ICA and surface EMG based signal processing system for recognising hand gestures. 700-705 - Ashley Chonka, Wanlei Zhou, Yang Xiang:
Protecting web services with Service Oriented Traceback Architecture. 706-711 - Tianyin Xu, Baoliu Ye, Mitsunori Kubo, Arata Shinozaki, Sanglu Lu:
A Gnutella inspired ubiquitous service discovery framework for pervasive computing environment. 712-717 - Chengying Mao, Xiaohua Hu, Yansheng Lu:
Towards a software diagnosis method based on rough set reasoning. 718-723 - Suphak Suwanya, Werasak Kurutach:
An analysis of software process improvement for sustainable development in Thailand. 724-729 - Young Jin Ro, Ho-Jin Choi, Danhyung Lee, In-Young Ko:
Dynamic pull-down menu organization in run-time by analyzing menu selection behaviors. 730-735 - Sima Emadi, Fereidoon Shams:
An approach to non-functional requirements analysis at software architecture level. 736-741 - Anastasis A. Sofokleous:
Software usability architectures. 742-747 - Marini Othman, Abdullah Mohd Zin, Abdul Razak Hamdan:
Constructing a chaos proofing pre-development framework to manage chaos in a chaos-prone systems development environment. 748-753 - Weiqiang Kong, Kazuhiro Ogata, Jian Cheng, Kokichi Futatsugi:
Trace anonymity in the OTS/CafeOBJ method. 754-759 - Woo-Seok Choi, Sungwon Kang, Ho-Jin Choi, Jongmoon Baik:
Automated generation of product use case scenarios in product line development. 760-765 - Basem Suleiman, Vladimir Tosic, Eldar Aliev:
Non-functional property specifications for WRIGHT ADL. 766-771 - Jung Ho Bae, Heung Seok Chae:
UMLSlicer: A tool for modularizing the UML metamodel using slicing. 772-777 - Rajesh Prasad, Suneeta Agarwal:
A new parameterized string matching algorithm by combining bit-parallelism and suffix automata. 778-783 - Jaejeong Lee, Jinhan Kim, Byungjeong Lee, Chisu Wu:
Utilizing semantic Web 2.0 for self-reconfiguration of SOA based agent applications in Intelligent Service Robots. 784-789 - Taeho Kim, In-Young Ko, Sungwon Kang, Danhyung Lee:
Extending ATAM to assess product line architecture. 790-797 - Tao Chen, Qing Gu, Shusen Wang, Xiaoan Chen, Daoxu Chen:
Module-based large-scale software evolution based on complex networks. 798-803 - Ching-Lung Chang, Jing-Chao Yang:
The Research of zero packet loss hand-off mechanism in SIP-based wireless networks. 804-808 - Luo Sun, Peng Dai, Linmi Tao, Guangyou Xu:
A context representation and management mechanism towards ubiquitous intelligence. 809-814 - Hang Qin, Zhongbo Wu:
Analysis and improvement of the Dynamic Load Balancing of Overlay-based WSN. 815-820 - Yi Wang, Jun Yang, Xinyu Yang, Deyun Zhang:
MTT-Mobicast : Maneuvering Target Tracking Mobicast protocol for wireless ad hoc sensor networks. 821-826 - Jun Yang, Yi Wang, Deyun Zhang:
Prediction revision strategies for data transmission in wireless sensor networks. 827-832 - Yang Koo Lee, Ling Wang, Young Jin Jung, Hi-Seok Kim, Keun Ho Ryu:
Time-based insertion methods for monitoring sensor data. 833-838 - Fenglei Yang, Yue Lu, Ye Duan:
Combining hierarchical segmentation and shape context based recognition. 839-844 - Anh-Nga Lai, Hyo Sun Yoon, Gueesang Lee:
Robust background extraction scheme using histogram-wise for real-time tracking in urban traffic video. 845-850 - Min-Jung Bae, Jeong-Hoon Ji, Gyun Woo:
A visualization system of source codes using FOL. 851-856 - Sam Schauland, Jörg Velten, Anton Kummert:
Motion-based object detection using 3D wave digital filters. 857-861 - Loic Merckel, Toyoaki Nishida:
Evaluation of a method to solve the perspective-two-point problem using a three-axis orientation sensor. 862-867 - Truong Quang Vinh, Ju Hyun Park, Young-Chul Kim, Kwang-Ok Kim:
An FPGA implementation of 30Gbps security module for GPON systems. 868-872 - Shigeru Yamashita, Shin-ichi Minato, D. Michael Miller:
An efficient verification of quantum circuits under a practical restriction. 873-879 - Chia-Chun Tsai, Wei-Shi Lin, Jan-Ou Wu, Chung-Chieh Kuo, Trong-Yen Lee:
Layer assignment considering manufacturability in X-architecture clock tree. 880-885 - Kaai Kojima, Yuichi Okuyama, Kenichi Kuroda:
Arithmetic precision of the Generalized Hebbian Algorithm for hardware implementation. 886-890 - Daisuke Ohwada, Yuichi Okuyama, Kenichi Kuroda:
Implementation of a combined autocorrelation method for real-time tissue elasticity imaging on FPGA. 891-897
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.