Default Cover Image

2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

Oct. 10 2010 to Oct. 12 2010

Huangshan, China

ISBN: 978-0-7695-4235-5

Table of Contents

Papers
Keynote speakersFull-text access may be available. Sign in or learn about subscription options.pp. xix-xxiii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xi
Papers
WelcomeFreely available from IEEE.pp. xii
Papers
Message from the Organizing Committee ChairFreely available from IEEE.pp. xiii
Papers
Message from the Technical Program ChairsFreely available from IEEE.pp. xiv-xv
Papers
Organizing and Program CommitteesFreely available from IEEE.pp. xvi-xvii
Papers
list-reviewerFreely available from IEEE.pp. xviii
Papers
A Distributed Text Mining System for Online Web Textual Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
Credibility Evaluation and Results with Leader-Weight in Opinion MiningFull-text access may be available. Sign in or learn about subscription options.pp. 5-8
Papers
Local Query Generation for Distributed XQuery QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 9-12
Papers
Performance Evaluation of Transparent Persistence Layer in Java ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 21-26
Mining Non-redundant Rules for Redescription Datasets Based on FCAFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Papers
Standard Additive Model in Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 27-32
Papers
Unordered Tree Matching and Strict Unordered Tree Matching: The Evaluation of Tree Pattern QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 33-41
Papers
A Cluster-Based MDS Scheme for Range-Free Localization in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Papers
A Fire Monitoring System in ZigBee Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 48-51
Papers
A New AP-Selection Strategy for High Density IEEE802.11 WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 52-58
Papers
A Precise 2-D Wireless Localization Technique Using Smart AntennaFull-text access may be available. Sign in or learn about subscription options.pp. 59-63
Papers
A Robust and Effienct Neighborhood-Based Security Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 64-70
Papers
A Study on Test Platform for Verifying New Wireless Networking Technologies via Hardware-in-Loop SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Papers
Adaptive Routing in Delay-Tolerant Mobile Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Papers
An IPv6-Based Traffic Balancing Scheme for Multiple Mobile Data Collectors in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 87-93
Papers
Constructing a Cluster-Based Multi-hop Tree for Object Tracking in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 101-107
Papers
Is Mobility Always Harmful to Routing Protocol Performance of MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 108-112
Papers
M&M: A Multi-channel MAC Protocol with Multiple Channel Reservation for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 113-120
Papers
Multiple Sink Dynamic Destination Geographic Routing in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 121-124
Papers
Network Initialization for Wireless Distributed Beaconing NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 125-128
Papers
Orthogonal Modulation Based Cross-Layer Approach for Energy Efficiency in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Papers
Providing SMS Notification with Less InterruptionFull-text access may be available. Sign in or learn about subscription options.pp. 135-141
Papers
Toward an Integrative Model for Consumer Behavior regarding Mobile Commerce AdoptionFull-text access may be available. Sign in or learn about subscription options.pp. 142-149
Papers
Using Packet Size Distribution to Identify P2P-TV TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Papers
WSN Design and Implementation in a Tea Plantation for Drought MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 156-159
Papers
An Improved Mobile Object Tracking Scheme Combining Range-Hybrid Localizations and Prediction MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 160-167
Papers
An Overlay-Based Approach for Replacing Failed Sensors by Mobile RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 168-175
Papers
Femtocell Frequency Planning Scheme in Cellular Networks Based on Soft Frequency ReuseFull-text access may be available. Sign in or learn about subscription options.pp. 176-180
Papers
Location-Based Mobile Multimedia Push SystemFull-text access may be available. Sign in or learn about subscription options.pp. 181-184
Papers
A Dynamic Network Robustness Evaluation Method in Cyberspace Based on Perron-Frobenius EigenvalueFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Papers
A Parallel Strategy for Measuring Network BandwidthFull-text access may be available. Sign in or learn about subscription options.pp. 189-192
Papers
A Study on Recommendation Features for an RSS ReaderFull-text access may be available. Sign in or learn about subscription options.pp. 193-198
Papers
Internet Gateway Routing for MANETFull-text access may be available. Sign in or learn about subscription options.pp. 199-204
Papers
Clock Synchronization of Wireless Distributed System Based on IEEE 1588Full-text access may be available. Sign in or learn about subscription options.pp. 205-209
Papers
Distributed Cluster-Based Fault-Tolerant Topology Control for Space Information NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 210-217
Papers
Modified Least Cost Method for Grid Resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 218-225
Papers
Redundant Design of Parallel MLFMA Distributed Levels on a Cluster with Distributed MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
Papers
3D Fuzzy Vault Based on PalmprintFull-text access may be available. Sign in or learn about subscription options.pp. 230-234
Papers
Discouraging Improper Exploitation against Seeds in BitTorrent SwarmsFull-text access may be available. Sign in or learn about subscription options.pp. 235-242
Papers
Fast Scalar Multiplication for Elliptic Curve Cryptography in Sensor Networks with Hidden Generator PointFull-text access may be available. Sign in or learn about subscription options.pp. 243-249
Papers
Internet Key Exchange Protocol Simulation of HAIPE in Security NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
Papers
New ID-Based Signcryption Scheme and Its Applications in Key Update Protocols of MANETFull-text access may be available. Sign in or learn about subscription options.pp. 254-258
Papers
Scenario-Based Approach for Blackbox Load Testing of Online Game ServersFull-text access may be available. Sign in or learn about subscription options.pp. 259-265
Papers
Security Authentication and an Undeniable Billing Protocol for WMNsFull-text access may be available. Sign in or learn about subscription options.pp. 266-269
Papers
Swarm-Based Knowledge Discovery for Intrusion Behavior DiscoveringFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Papers
A Hierarchical Diffusion Algorithm for Community Detection in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 276-283
Papers
A High Performance, Low-Cost Network Architecture for Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 284-287
Papers
A High-Performance Scalable Computing System on the RapidIO Interconnect ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 288-292
Papers
A New Top-Down Algorithm for Tree InclusionFull-text access may be available. Sign in or learn about subscription options.pp. 293-300
Papers
A Study on Topology Model and Data Contribution Strategy of PPLiveFull-text access may be available. Sign in or learn about subscription options.pp. 301-304
Papers
An Adaptive Bandwidth-Aware Overlay for the Maximum Throughput in the Unstructured Peer-to-PeerFull-text access may be available. Sign in or learn about subscription options.pp. 305-310
Papers
An Algorithm Based on Directed GraphFull-text access may be available. Sign in or learn about subscription options.pp. 311-317
Papers
An Attempt to Find NeighborsFull-text access may be available. Sign in or learn about subscription options.pp. 318-320
Papers
An Efficient Algorithm of Hot Events Detection in Text StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 321-326
Papers
An Efficient CQI Feedback Reduction Scheme for Multi-user OFDMA Network with AMC ModeFull-text access may be available. Sign in or learn about subscription options.pp. 327-330
Papers
An Efficient Tree-Based Geocast Routing Algorithm for Connecting Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 331-338
Papers
Analysis on Community Charactristics of Online Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 339-345
Papers
Decoding of the (47, 24, 11) Quadratic Residue Code with Hash TableFull-text access may be available. Sign in or learn about subscription options.pp. 346-351
Papers
Effect of Finite State AMC on the Practicality of Dual Feedback Bandwidth Request ControlFull-text access may be available. Sign in or learn about subscription options.pp. 352-356
Papers
Heuristic Methods for Filtering Newly Coined Profanities Using Phylogenetic AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 357-360
Papers
Hierarchical Copy Algorithm for Xen Live MigrationFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
Papers
Improving Cooperative Spectrum Sensing under Correlated Log-Normal ShadowingFull-text access may be available. Sign in or learn about subscription options.pp. 365-370
Papers
Joint PAPR Reduction Method Base on ACE POCS and Peak ClippingFull-text access may be available. Sign in or learn about subscription options.pp. 371-375
Papers
Location-Based Routing Algorithms for Mobile Ad Hoc Networks with HolesFull-text access may be available. Sign in or learn about subscription options.pp. 376-379
Papers
Parallel ISODATA Clustering of Remote Sensing Images Based on MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 380-383
Papers
Parallel MLFMA Performance Analysis Using Performance Analysis ToolsetsFull-text access may be available. Sign in or learn about subscription options.pp. 384-389
Performance Analysis and Simulation of SAE J1939 Protocol with DSPN ModelFull-text access may be available. Sign in or learn about subscription options.pp. 390-395
Papers
Research of an Improved Weighted Centroid Localization Algorithm and Anchor DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 400-405
Papers
Research of BD_UCD_VBLAST for MU_MIMO Precoding TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 406-409
Papers
WORM-Based Data Protection ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 410-416
Papers
A PCDA-Based Critical Exception Management System in Semiconductor IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 417-420
Papers
An Ambient Service Model for Providing Structured Web Information Based on User-ContextsFull-text access may be available. Sign in or learn about subscription options.pp. 421-428
Papers
An Implementation of AODV Routing Protocol with Multi-MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 429-432
Papers
Automatic Construction of Domain Concept HierarchyFull-text access may be available. Sign in or learn about subscription options.pp. 433-436
Papers
Beamforming for Sonar Based on Highlight ModelFull-text access may be available. Sign in or learn about subscription options.pp. 437-440
Papers
Comment on an Improved Signature without Using One-Way Hash FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 441-443
Papers
LZpack: A Cluster File System BenchmarkFull-text access may be available. Sign in or learn about subscription options.pp. 444-447
Papers
Design and Implementation of a Relaxable Web Service Composition SystemFull-text access may be available. Sign in or learn about subscription options.pp. 448-455
Papers
Detecting and Visualizing the Dispute Structure of the Replying Comments in the Internet Forum SitesFull-text access may be available. Sign in or learn about subscription options.pp. 456-463
Papers
Exchanging Course Content Mechanism for Moodle LMSFull-text access may be available. Sign in or learn about subscription options.pp. 464-467
Papers
Method and System of Performance Monitoring to Detect VDSL Service DegradationFull-text access may be available. Sign in or learn about subscription options.pp. 468-475
Papers
Entities Identification on the Deep Web Using Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 476-479
Papers
Recognition of Facial Expression Using Centroid Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 480-485
Papers
Residue Amending Combined BP Prediction ModelFull-text access may be available. Sign in or learn about subscription options.pp. 486-489
Papers
Towards Automated Generation of User-Specific Eclipse WizardFull-text access may be available. Sign in or learn about subscription options.pp. 490-497
Papers
Unsupervised Learning Approaches for the Finite Mixture Models: EM versus MCMCFull-text access may be available. Sign in or learn about subscription options.pp. 498-501
Papers
A Web Services Status Monitoring Technology for Distributed System Management in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 502-505
Showing 100 out of 104