Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CCCM
CCCM 2008
Generate Citations
Computing, Communication, Control and Management, ISECS International Colloquium on
Aug. 3 2008 to Aug. 4 2008
ISBN: 978-0-7695-3290-5
Volume:
1
2
2
Table of Contents
Papers
[Copyright notice - Volume 1]
Freely available from IEEE.
pp. iv
Papers
Table of contents - Volume 1
Freely available from IEEE.
pp. v-xv
Papers
[Publisher's information - Volume 1]
Freely available from IEEE.
pp. 790
Papers
Organizing Committee - Volume 1
Freely available from IEEE.
pp. xvii-xviii
Papers
Title Page i - Volume 1
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 1
Freely available from IEEE.
pp. iii
Papers
Message from the CCCM 2008 Colloquium Chairs - Volume 1
Freely available from IEEE.
pp. xvi
Papers
Committee Members - Volume 1
Freely available from IEEE.
pp. xix-xx
Papers
Feedforward Neural Network Based on Convex Optimization Theory and Its Application on Urban Information Extraction from Remote Sensing Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-7
by
Wenchen Jia
,
Shiwei Ye
,
Juanle Wang
,
Cheng Wang
,
Xiangyun Jia
,
Fuyin Li
Papers
Hybrid Ant Colony Algorithm for the Vehicle Routing with Time Windows
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-12
by
Tong Zhen
,
Qiuwen Zhang
,
Wenshuai Zhang
,
Zhi Ma
Papers
A Positive Preprocessing Framework for Mapping Traditional Replica Selection Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-17
by
Jianhua Jiang
,
Gaochao Xu
,
Xiaohui Wei
,
Ruihong Zhou
Research of Parameter Adjustable Harmonic Signal Generator Based on DDS
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-91
by
Wei Li
,
Jinbo Zhang
Papers
A Game-Theoretic Resource Allocation Strategy with Purification Approach for Computational Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-22
by
Hang Qin
,
Lin Qiu
Papers
A New Data Assignment Mechanism Based on Genetic Algorithm in P2PVoD System
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-26
by
Fang Xia
,
Xingwei Liu
,
Hui Zhao
Papers
Reducing the Complexity of Tone Injection Scheme by Suboptimum Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-31
by
Nima Reisi
,
Mahmoud Ahmadian
Papers
The Optimization of the Parameters and the Application of GM (1,1) Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-36
by
Dahong Hu
,
Yong Wei
Papers
Research on Hybrid Applications of Intelligent Techniques with Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-41
by
Luo Zhong
,
Cuicui Guo
,
Huazhu Song
Papers
Neural Network Based Parameters Whiten Method Study of Gray Differential Equations
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-46
by
Luo Zhong
,
Cuicui Guo
,
Huazhu Song
Papers
A Background Reconstruction Algorithm Based on Modified Basic Sequential Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-51
by
Mei Xiao
,
Lei Zhang
Papers
A Framework for Time Series Forecasts
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-56
by
Dongqing Zhang
,
Yubing Han
,
Xuanxi Ning
,
Xueni Liu
Papers
Solution to Traveling Agent Problem Based on Improved Ant Colony Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Jun Ma
,
Yu Zhang
,
Jianpei Zhang
,
Lili Cheng
Papers
Computing the Tenacity of Network Based on Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-65
by
Yue Wang
,
WanDong Cai
,
Qi Duan
Papers
Application of Wavelet Packet and Support Vector Machine to Leak Detection in Pipeline
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-69
by
Liu Na
,
Zhao Yanyan
Papers
Research of Velocity Detection Based on the Adaptive Weighted Average Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-73
by
Cao Jie
,
Xu Wei
Papers
An Algorithm for Eliminating Duplicate Labels of a Labelled Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-78
by
K. S. Cheung
Papers
Composition of Augmented Marked Graphs and Its Application to System Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
K. S. Cheung
Papers
Research on Road Recognition Algorithm Based on Structure Environment for ITS
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-87
by
You Feng
,
Wang Rong-ben
,
Zhang Rong-hui
Papers
A Novel Approach for Segmenting and Classifying Shadow Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-95
by
Rao Bin
,
Ci Shenggui
,
Chen Tiemin
,
Zheng Gang
Double-Loop Hypercube: A New Scalable Interconnection Network for Massively Parallel Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-174
by
Youyao Liu
,
Jungang Han
Papers
Rice Recognition Using Multi-temporal and Dual Polarized Synthetic Aperture Radar Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-100
by
Henglin Chen
,
Huiguo Li
Papers
Radiation Knowledge Based Gaussian Shadow Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-104
by
Chunyu Yu
,
Xing Zhang
,
Yong Zhao
Papers
Vehicle Detection Algorithm Based on Shadow Feature
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-109
by
Shaohua Xu
,
Yong Zhao
,
Chunyu Yu
,
Ling Shen
Papers
Gabor Wavelets for Image Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-114
by
Wei Jiang
,
Ting-Zhi Shen
,
Jian Zhang
,
Yu Hu
,
Xin-Yi Wang
Papers
Enhanced Fractal-Wavelet Image Denoising
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-119
by
Jian Lu
,
Yuru Zou
,
Zhongxing Ye
Papers
Image Inpainting Algorithm Based on Partial Differential Equation
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-124
by
Zhongyu Xu
,
Xiaoli Lian
,
Lili Feng
Papers
Method of Image Retrieval Based on Fan-Shaped Isometric Division of The Target Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-128
by
Cheng Jie
,
Zhao Jingxiu
Papers
An Approach of Color Image Edge Detection Based on Triangle Similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Han Junjun
,
Zhao Jingxiu
,
Wang Mian
A Resource-Centric P2P Network Model for Grid Resource Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-214
by
Xiu-Ying Zheng
,
Gui-Ran Chang
,
Li Zhen
,
Wang Jian
Papers
Three-Dimensional Computational Integral Imaging Reconstruction by Use of Pixel Blocks Interpolation
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
Yu Wang
,
Dianren Chen
,
Yan Piao
Papers
The Sonar Image Denosing Method of Surfacelet Based on Sample Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-141
by
Dandan Liu
Papers
An Improved Adaptive Image Denoising Method Based on Multi-wavelet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-146
by
Bo Zhu
,
Hongzhi Wang
,
Liangliang Huang
Papers
Texture-Energy-Analysis-Based Image Recognition Algorithm for Identifying the Early Stage Tumor
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-151
by
Yuanlie He
,
Ping Chen
,
Yangchun Chen
Papers
Edge-Based Image Completing Guided by Region Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-156
by
Minqin Wang
,
Guoqiang Han
,
Yongqiu Tu
Papers
Lossless Image Compression Based on DPCM-IWPT
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-160
by
Hua Li
,
Yiming Zhu
Papers
Fault-Tolerance Mechanism of Computation Grid Service System Based on Mobile Agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-165
by
Zhirou Zhang
,
Ying Li
Papers
Generalized Data Center Architecture Based on Network Storage and Backup
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-169
by
Zhirou Zhang
,
Xiaohua Zhang
Papers
Improved Distributed Tree Algorithm and It Application in CSCW-Based Group Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-178
by
Qu Zhiming Qu
,
Lijun Jiao
,
Libo Liu
Papers
A New Topology Aggregation Algorithm in Hierarchical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-183
by
Jingjun Zhang
,
Yuanbin Han
,
Liguo Wang
Papers
Mechanism of a Resource Location Approach in Power-Law Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-187
by
Jing Li
A Fast Algorithm for Gene Expressing Data Biclustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-269
by
Wei Liu
,
Ling Chen
,
Ling Qin
Papers
Design and Implementation of IP-SAN Based on Third Party Transfer Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-192
by
MingHua Jiang
,
Ming Hu
,
Jingli Zhou
,
Tao Peng
A Reflective Information Model for Reusing Software Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Peng Ye
,
Shi Ying
,
Xiang-Yang Jia
,
Jun-Feng Yao
,
Ju-Bo Luo
,
Wen-Jie Yuan
Papers
ftNoC: A New Architecture of Network on Chip with Fault-Tolerance
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-197
by
Liguo Zhang
,
Huimin Du
,
Jungang Han
Papers
Research on Node Coding and Routing Algorithm for Network on Chip
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Xiaoqiang Yang
,
Huimin Du
,
Jungang Han
Papers
The GJCode(s, t): A Scalable Hypercube Based on the Combination Gray Code with Johnson Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Xiaoqiang Yang
,
Huimin Du
,
Jungang Han
Papers
A JXTA-Based Communication Model for OSGi Framework with Extension to P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-219
by
Chuan Zhu
,
Guiran Chang
Papers
Collaborative Post-IDS Alert Analysis Based on Network Management Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-224
by
Hui Xu
,
Debao Xiao
,
Xue Xia
,
Zheng Wu
Papers
Spatial Data Grid Framework Based on Super-Peer Network Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-229
by
Lingkui Meng
,
Wenjun Xie
,
Changqing Huang
Papers
Research on the Application of Immune Network Theory in Risk Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-235
by
Cai Shuqin
,
Wang Ge
,
Cai Hong
Papers
A Load Balance Algorithm for Hybrid P2P Network Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-239
by
Fu Xiao-ling
,
Xu Ying
Papers
A New Enhanced Differentiated Services Protection Algorithm in WDM Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-244
by
Xiaobing Zheng
,
Lei Guo
,
Xingwei Wang
,
Yu Zhang
,
Xuekui Wang
Papers
Comprehensive Evaluation & Research on Development of the Highway Network Based on DEA Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-249
by
Li Li
,
Jie Wan
Papers
Weighted Support Vector Regression Algorithm Based on Data Description
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-254
by
Weimin Huang
,
Leping Shen
Papers
Image Semantic Information Retrieval Based on Parallel Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-259
by
Yun Ling
,
Yi Ouyang
Papers
A Method for Multi-criteria Decision Making with Linguistic Preference Information on Criteria and Alternatives
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-264
by
Quan Li
Papers
Research of Synchronization Robustness in Video Digital Watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-279
by
Xiao-shi Zheng
,
Yan-ling Zhao
,
Na Li
,
Guang-qi Liu
,
Wei Zhou
Papers
Perfusion-Ventilation Lung SPECT Image Analysis System Based on Minimum Cross-Entropy Threshold and Watershed Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-284
by
Yuanlie He
,
Ping Chen
,
Yangchun Chen
Papers
Objects Detecting Based on Adaptive Background Models and Multiple Cues
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-289
by
Yuan Chen
,
Shengsheng Yu
,
Weiping Sun
,
Hongxing Li
Papers
Differential Media Delivering Strategy for Loss Tolerant Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-294
by
Shengsheng Yu
,
Rongtao Liao
,
Jingli Zhou
,
Jing Yu
Papers
Constrained 2D Sketch Generation Based on Image Contour Detect
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-298
by
Shen Ying
,
Chen Zhiyang
,
Cai Zhiyong
Papers
Image Retrieval Using Spatial Multi-color Coherence Vectors Mixing Location Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-302
by
Liuying Wen
,
Guoxin Tan
Papers
Research on Semantic Retrieval System for High-Speed Railway Knowledge Based on Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Ziyu Liu
,
Lei Huang
,
Dongyun Xu
Papers
An Information Filtering Algorithm Based on Text and Complexion Detecting
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-311
by
JianYing Xiong
,
LeiYue Yao
Papers
A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-316
by
Lin Zhang
,
Fengyong Qian
,
Yi Gao
,
Yuesheng Zhu
Papers
An Improvement of Face Detection Using AdaBoost with Color Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-321
by
Yan-Wen Wu
,
Xue-Yi Ai
Papers
Construction and Realization of a New Class M-Sequence
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-326
by
Hong Lv
,
Min Xu
,
Gang Xu
,
Jun-chu Fang
Papers
Digital Image Processing Technique for Improvement in Triaxial Test and Numerical Modeling of Geomaterial
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-331
by
Cheng Tao
,
Yan Ke-qin
Papers
Close Shot Photogrammetry for Measuring Wind-Drifted Snow Distribution on Stepped Flat Roofs
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-335
by
Keqin Yan
,
Tao Cheng
Papers
Research and Design of Drawings Retrieval System Based on Spatial Relationships and Shape
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-340
by
Haiyu Song
,
Pengjie Wang
,
Xiongfei Li
,
Houjie Li
Papers
A Multi-agent and Data Mining Model for TCM Cases Knowledge Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-346
by
Zhengxiang Zhu
,
Wuqi Song
,
Jifa Gu
Papers
Extensible Land Use Classification Framework Based on Remotely Sensed Image Facing to Data Integration, Exchange and Sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-351
by
Wang Juanle
,
Jia Wenchen
Papers
An Approach to Incremental SVM Learning Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-354
by
Yuanzhi Wang
,
Fei Zhang
,
Liwei Chen
Papers
A New Method for Medical Image Registration Based on Wavelet Multi-scale Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-359
by
Jingquan Xie
,
Zaihe Chen
,
Guilin Xu
Papers
A Weighted Fuzzy Clustering Algorithm for Data Stream
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-364
by
Renxia Wan
,
Xiaoya Yan
,
Xiaoke Su
Papers
Fast Mining and Updating Frequent Itemsets
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-368
by
Chaohui Liu
,
Jiancheng An
Papers
An Efficient Algorithm for the Least Areas Path Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-373
by
Gaojun Fan
,
Shiyao Jin
Papers
Research on Collaborative Ontology Development Method Based on Lock Granularity
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-378
by
Xia Shixiong
,
Deng Zhiwen
,
Zhang Lei
,
Yuan Guan
Papers
Modeling and Verification of SCTP Association Management Based on Colored Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-383
by
Jizeng Wang
,
Shengcai Zhang
,
Fan Chen
Papers
Adaptive Spam Filtering Based on Fingerprint Vectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-388
by
Weihong Liu
,
Weidong Fang
Papers
A Background Reconstruction Algorithm Based on Two-Threshold Sequential Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-393
by
Mei Xiao
,
Lei Zhang
Papers
New Value for Partial Cooperative Game with Generalized Simple Coalition Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-399
by
Hong-wei Gao
,
Ye-ming Dai
,
Han Qiao
,
Xiao-xiao Li
Papers
Study on Simulation System for Turn-Milling Centre Based on VR Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-404
by
L. D. Zhu
,
C. Su
,
J. M. Hou
,
Y. Y. Su
,
W. S. Wang
Papers
A Novel Network Security Defence Mechanism Based on Multi-SoftMan
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-408
by
Zhanfei Ma
,
Xuefeng Zheng
Papers
A Design of Time-Varying Auto-Adaptive Tracker
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-413
by
Xianfang Wang
,
Zhiyong Du
,
Feng Pan
Application of Intelligent Compensation to Engine Health Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-489
by
Feng Lu
,
Jin-quan Huang
Papers
A Combined Grid Security Approach Based on Web Services Security Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-418
by
Zhongping Zhang
,
Kunbo Wang
,
Jianfeng Luan
Papers
A Modified Remote User Authentication and Key Agreement Scheme Using Smart Cards
Full-text access may be available. Sign in or learn about subscription options.
pp. 419-423
by
Lijiang Zhang
,
Puwen Wei
Papers
Revisiting Trust and Reputation in Multi-agent Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-429
by
Hongbing Huang
,
Guiming Zhu
,
Shiyao Jin
Papers
Scheme to Prevent Denial of Service Attacks on UPnP
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-433
by
Jiahui Wang
,
Liang He
,
Zili Zhou
Papers
Intelligent Security System Design Based on Multi-agent Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-437
by
Bing Wang
,
Chunhua Ju
Showing 100 out of 172
Load More
Load All