Default Cover Image

Computer Science and Engineering, International Workshop on

Oct. 28 2009 to Oct. 30 2009

Qingdao, China

ISBN: 978-0-7695-3881-5

Volume:

Table of Contents

Papers
Title Page i - Volume 1Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 1Freely available from IEEE.pp. iii
Papers
Copyright Page - Volume 1Freely available from IEEE.pp. iv
Papers
Table of Contents - Volume 1Freely available from IEEE.pp. v-xiii
Papers
Message from the Symposium Chairs - Volume 1Freely available from IEEE.pp. xiv
Papers
WCSE 2009 and IISA 2009 Organizing Committee - Volume 1Freely available from IEEE.pp. xv-xvi
Papers
WCSE 2009 and IISA 2009 Committee Members - Volume 1Freely available from IEEE.pp. xvii-xviii
Papers
Reviewers - Volume 1Freely available from IEEE.pp. xix-xxi
Papers
A New Intrusion Prediction Method Based on Feature ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 7-10
Papers
Design of Two-Way One-Time-Password Authentication Scheme Based on True Random NumbersFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Papers
Study of the De-noising Method Based on Wavelet and FractalFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Papers
A Method of Building the Fault Propogation Model of Distributed Application Systems Based on Bayesian NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 20-24
Papers
An Improved DEA Approach and Its Application on Fresh Farm Produce Logistics Performance MeasurementFull-text access may be available. Sign in or learn about subscription options.pp. 25-28
Papers
An Enhanced Approach for Investment Risk Forecasting of Electric Power ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 29-32
Papers
Complex Dynamics of a Harvesting Holling-Type II Predation-Diffusion ModelFull-text access may be available. Sign in or learn about subscription options.pp. 33-37
Papers
On the Quick Construction of All Edge-Balance Index Sets of H(n)Full-text access may be available. Sign in or learn about subscription options.pp. 38-41
Papers
Research of Information Filtering Based on Vector Space ModelFull-text access may be available. Sign in or learn about subscription options.pp. 42-46
Papers
Research of 3-Phase Reversible Rectifier Based on Current Hysteresis RegulatorFull-text access may be available. Sign in or learn about subscription options.pp. 47-50
Papers
Error Mensuration of Temperature Coefficient between Formation Flying Small Satellites TT&C EquipmentFull-text access may be available. Sign in or learn about subscription options.pp. 51-54
Papers
Security Analysis of Two RSA-Based Fair Document Exchange ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 55-59
Papers
ALAGA-RBF for Fault Diagnosis in a Continuous Tubular ReactorFull-text access may be available. Sign in or learn about subscription options.pp. 60-64
Papers
Comparison of Two Methods for Texture Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 65-68
Papers
The Scheduling Model for Disabilitise Transfer in AirportsFull-text access may be available. Sign in or learn about subscription options.pp. 74-78
Papers
A Symbiotic Evolutionary Algorithm for Flexible Job Scheduling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 79-83
Papers
A Real-Time Driving Fatigue Monitoring DSP Device Based on Computing Complexity of Binarized ImageFull-text access may be available. Sign in or learn about subscription options.pp. 84-88
Papers
A Novel Method for Detecting Small Target in Infrared ClutterFull-text access may be available. Sign in or learn about subscription options.pp. 89-92
Papers
Optimization of Web Service Composition Using Factored Markov Decision ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 93-96
Papers
Logistic Distribution Vehicle Scheduling Research in E-Commerce EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 97-100
Papers
PPSpider: Towards an Efficient and Robust Topic-Specific Crawler Based on Peer-to-Peer NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 101-105
Papers
The Research of Power Grid Data Integration and Sharing Platform Based on SOAFull-text access may be available. Sign in or learn about subscription options.pp. 106-109
Papers
An Improved Evidence Theory Based on Random SetFull-text access may be available. Sign in or learn about subscription options.pp. 110-113
Papers
Research on a New Development Framework for Mobile GamesFull-text access may be available. Sign in or learn about subscription options.pp. 114-118
Papers
The Research on Forensic Model Based NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 119-122
Papers
Study on the Photogrammetric Application to the Fuel Cell Engine Vibration TestingFull-text access may be available. Sign in or learn about subscription options.pp. 123-127
Papers
Just-in-Time Learning Theory-Based Study on the Dynamic Model of Fuel Cell Engine SystemFull-text access may be available. Sign in or learn about subscription options.pp. 128-132
Papers
Research on the Embedded Security Architecture Based on the Control Flow SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 133-137
Papers
High-Rate Complex Orthogonal Space-Time Block Codes for Multiple Transmit AntennasFull-text access may be available. Sign in or learn about subscription options.pp. 138-141
Papers
An Algorithm for Mining Association Rules Based on Sets OperationFull-text access may be available. Sign in or learn about subscription options.pp. 142-145
Papers
Research on Building Ocean Domain OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
Papers
IP Traceback Based Probabilistic Packet Marking and Randomized Network CodingFull-text access may be available. Sign in or learn about subscription options.pp. 151-154
Papers
Damage Detection for Truss Structures Using Incomplete ModesFull-text access may be available. Sign in or learn about subscription options.pp. 155-158
Papers
The Architecture of Strict Nash Networks of Network Formation Games with One-Way Flow Inside and Two-Way Flow OutsideFull-text access may be available. Sign in or learn about subscription options.pp. 159-163
Papers
Computer Simulation and Recognition of Foundation Loading Based on Differential Evolution Algorithm and Finite Element MethodFull-text access may be available. Sign in or learn about subscription options.pp. 164-168
Papers
The Services Composition Algorithm in Incomplete Visible and Dynamic EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 169-171
Papers
A Trust-Based Message Encryption Scheme for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 172-176
Papers
Increasing Endowment Assurance Policy Actuarial Model under Random Rates of InterestFull-text access may be available. Sign in or learn about subscription options.pp. 177-181
Papers
A Method of Part Recognition Based on Robot Vision and HSV SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 182-185
Papers
The Research on Grid Spatial Database Simulation ModelFull-text access may be available. Sign in or learn about subscription options.pp. 186-189
Papers
Fuzzy Evaluation on Campus Network Security Based on Membership Degree Transformation New AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 190-194
Papers
Fuzzy Evaluation on the Operational Performance of E-commerce Websites Based on Membership Degree Transformation New AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 195-199
Papers
System Integration and Application of PDM CAPP and MES Based on Multi-views Management of BOMFull-text access may be available. Sign in or learn about subscription options.pp. 200-203
Papers
A New GEP Algorithm Based on Multi-phenotype ChromosomesFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Papers
Binary Tree and Energy Weighted Application to Three-Channel SEMG Artificial HandFull-text access may be available. Sign in or learn about subscription options.pp. 210-214
Papers
Analysis of Analog Circuit Subnet Tearing and MensurabilityFull-text access may be available. Sign in or learn about subscription options.pp. 215-218
Papers
Coordination Traffic Control under the Framework of Multi-agent TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 219-222
Papers
Analysis of Improved Routing Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 223-226
Papers
An Heuristic Genetic Algorithm Solve Test Point Selecting with Unreliable TestFull-text access may be available. Sign in or learn about subscription options.pp. 227-232
Papers
Design and Application of Remote Fault Maintenance Solution Based on IRL and CheckpointingFull-text access may be available. Sign in or learn about subscription options.pp. 233-237
Papers
Organ Texture Synthesis for Virtual Reality-Based Surgical SimulatorsFull-text access may be available. Sign in or learn about subscription options.pp. 238-241
Papers
Low Complexity Transcoder for MPEG2 to H.264Full-text access may be available. Sign in or learn about subscription options.pp. 242-245
Papers
Short-Term Power Load Forecasting Using Least Squares Support Vector Machines(LS-SVM)Full-text access may be available. Sign in or learn about subscription options.pp. 246-250
Papers
Authentication Based on Signaling Token PiggybackingFull-text access may be available. Sign in or learn about subscription options.pp. 251-254
Papers
A Method of TTCN Test Case Generation Based on TP DescriptionFull-text access may be available. Sign in or learn about subscription options.pp. 255-258
Papers
A Query-Dependent Ranking Approach for Search EnginesFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
Papers
HS-LS-CD Hybrid Conjugate Gradient Algorithm for Unconstrained OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 264-268
Papers
An Artificial Immune System Model Based on SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 269-273
Papers
Research and Implementation of the Platform for Analyzing Data QualityFull-text access may be available. Sign in or learn about subscription options.pp. 274-278
Papers
Study on Fast Fixed-Codebook Search Algorithm in G.729 Speech CodingFull-text access may be available. Sign in or learn about subscription options.pp. 279-282
Papers
Research on Information Hiding Technology Based on Chaotic Map and Image FusionFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
Papers
Image-Based Rendering Using Unstructured Image SetFull-text access may be available. Sign in or learn about subscription options.pp. 288-292
Papers
Elasticity Mechanics Computation of Throttle-Slice for Twin-Tubes Shock AbsorberFull-text access may be available. Sign in or learn about subscription options.pp. 293-296
Papers
Research on Vector-Control System of PMSM Based on Internal Model Control of Current LoopFull-text access may be available. Sign in or learn about subscription options.pp. 297-301
Papers
Real-Time Realistic Rendering of Tissue Surface with Mucous LayerFull-text access may be available. Sign in or learn about subscription options.pp. 302-306
Papers
UMFP: Update Mining Frequency Paths in RFID SystemFull-text access may be available. Sign in or learn about subscription options.pp. 307-311
Papers
Optimum Design of Throttle-Valves Parameters for Shock Absorber Based on Velocity CharacteristicFull-text access may be available. Sign in or learn about subscription options.pp. 312-316
Papers
Research of Game of Supply Chain Coordination in the Condition of the Uncertain DeliveryFull-text access may be available. Sign in or learn about subscription options.pp. 317-321
Papers
The Strategy of Java Class File's ModificationFull-text access may be available. Sign in or learn about subscription options.pp. 322-326
Papers
Ultraviolet Image Processing Method in Corona DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 327-331
Papers
Design of the Classified File Management and Control SystemFull-text access may be available. Sign in or learn about subscription options.pp. 332-336
Papers
Digital Oil Field Data Management Based on Data GridFull-text access may be available. Sign in or learn about subscription options.pp. 337-342
Papers
Research on Three-Dimensional Measurement Using Color-Coding Structured LightFull-text access may be available. Sign in or learn about subscription options.pp. 343-346
Papers
Moving Object Detection Algorithm Based on Variance AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 347-350
Papers
Research on Fuzzy Evaluation in Coal Enterprises Logistic SystemFull-text access may be available. Sign in or learn about subscription options.pp. 351-354
Papers
A PLL Control with RBF NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 355-358
Papers
Probabilistic Dense Coding for Multi-communications with Non-maximally Entangled StateFull-text access may be available. Sign in or learn about subscription options.pp. 359-361
Papers
Extending UML for Aspect-Oriented Architecture ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 362-366
Papers
A Memory Access Scheduling Method for Multi-core ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 367-371
Papers
A Stereo Matching Method Based on Chain Code VectorFull-text access may be available. Sign in or learn about subscription options.pp. 372-375
Papers
The Design of Information Flow Control in the Trust Domain Based on the Trusted TerminalFull-text access may be available. Sign in or learn about subscription options.pp. 376-380
Papers
Research on Credit Evaluation System of E-Commerce Transactions in Automobile Spare Parts IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 381-384
Papers
The Parabolic KS Function for the Structural Topology OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 385-387
Papers
Intelligent Restoration Algorithm to Line Similar Pixels in Noisy ImageFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
Papers
Short-Term Load Prediction Based on Ant Colony Clustering-Elman Neural Network ModelFull-text access may be available. Sign in or learn about subscription options.pp. 394-397
Papers
A Comparison Study of Developed Buffer Mechanism in P2P Living Streaming SystemFull-text access may be available. Sign in or learn about subscription options.pp. 398-402
Papers
The Cascade of the Reversible Gate Network-Based the Dynamic Binary Spanning TreeFull-text access may be available. Sign in or learn about subscription options.pp. 403-407
Papers
Address Filtering Based Wu-Manber Multiple Patterns Matching AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 408-412
Papers
Resident Set Management and RealizeFull-text access may be available. Sign in or learn about subscription options.pp. 413-416
Papers
A Plan for the Temporary Mini Supermarket Network of Beijing Olympic GamesFull-text access may be available. Sign in or learn about subscription options.pp. 417-420
Papers
A Survey on Peer-to-Peer Streaming System's Neighbor NumberFull-text access may be available. Sign in or learn about subscription options.pp. 421-424
Showing 100 out of 144