Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CYBERC
CYBERC 2010
Generate Citations
2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
Oct. 10 2010 to Oct. 12 2010
Huangshan, China
ISBN: 978-0-7695-4235-5
Table of Contents
Papers
Keynote speakers
Full-text access may be available. Sign in or learn about subscription options.
pp. xix-xxiii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xi
Papers
Welcome
Freely available from IEEE.
pp. xii
Papers
Message from the Organizing Committee Chair
Freely available from IEEE.
pp. xiii
Papers
Message from the Technical Program Chairs
Freely available from IEEE.
pp. xiv-xv
Papers
Organizing and Program Committees
Freely available from IEEE.
pp. xvi-xvii
Papers
list-reviewer
Freely available from IEEE.
pp. xviii
Papers
A Distributed Text Mining System for Online Web Textual Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Bin Zhou
,
Yan Jia
,
Chunyang Liu
,
Xu Zhang
Papers
Credibility Evaluation and Results with Leader-Weight in Opinion Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-8
by
Kyung Soo Cho
,
Joon-Suk Ryu
,
Jae-Ho Jeong
,
Young-Hee Kim
,
Ung-Mo Kim
Papers
Local Query Generation for Distributed XQuery Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-12
by
Jong-Hyun Park
,
Ji-Hoon Kang
Papers
Performance Evaluation of Transparent Persistence Layer in Java Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-26
by
Zhiyu Zhou
,
Zhiang Chen
Mining Non-redundant Rules for Redescription Datasets Based on FCA
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-20
by
Yuanyuan Wei
,
Min Wei
Papers
Standard Additive Model in Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-32
by
Do-Thanh Sang
,
Dong-Min Woo
,
Dong-Chul Park
Papers
Unordered Tree Matching and Strict Unordered Tree Matching: The Evaluation of Tree Pattern Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-41
by
Yangjun Chen
,
Donovan Cooke
Papers
A Cluster-Based MDS Scheme for Range-Free Localization in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Minhan Shon
,
Wook Choi
,
Hyunseung Choo
Papers
A Fire Monitoring System in ZigBee Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
Tu Defeng
,
Liu Shixing
,
Xie Wujun
,
Zhang Yongming
Papers
A New AP-Selection Strategy for High Density IEEE802.11 WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-58
by
Xin Wan
,
Xingming Wang
,
Ung Heo
,
Jaeho Choi
Papers
A Precise 2-D Wireless Localization Technique Using Smart Antenna
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-63
by
Zhu Xiaorong
,
Wang Yong
,
Zhu Hongbo
Papers
A Robust and Effienct Neighborhood-Based Security Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-70
by
Di Zhang
,
Yi Zhao
,
Xingming Wang
,
Jaeho Choi
Papers
A Study on Large-Scale Wireless Mesh Networks Cooperating with High-Speed External Networks - Improvement of Performance Deterioration Due to Increasing Network Scale
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-74
by
Kiyotaka Imai
,
Hisao Yamamoto
Papers
A Study on Test Platform for Verifying New Wireless Networking Technologies via Hardware-in-Loop Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Lijun Zu
,
Ping Wang
,
Jing Han
,
Fuqiang Liu
,
Qing Ai
,
Yusheng Ji
Papers
Adaptive Routing in Delay-Tolerant Mobile Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-86
by
BaiJun Wu
,
Feng Lin
,
JiLiu Zhou
Papers
An IPv6-Based Traffic Balancing Scheme for Multiple Mobile Data Collectors in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-93
by
Wanming Luo
,
Baoping Yan
,
Jiliang Wu
Papers
Combination of Relative Neighborhood Graph and Forbidden Set in the Design of Distributed Broadcast Algorithms for Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-100
by
Hwang-Cheng Wang
,
Jia-Bao Lin
,
Fang-Chang Kuo
,
Kuo-Chang Ting
Papers
Constructing a Cluster-Based Multi-hop Tree for Object Tracking in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-107
by
Yahong Guo
,
Qianqian Ren
,
Desheng Zhang
,
Yu Wang
,
Li Hui
Papers
Is Mobility Always Harmful to Routing Protocol Performance of MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-112
by
Xi Hu
,
J. K. Wang
,
C. R. Wang
,
Cong Wang
Papers
M&M: A Multi-channel MAC Protocol with Multiple Channel Reservation for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-120
by
Jinbao Li
,
Desheng Zhang
Papers
Multiple Sink Dynamic Destination Geographic Routing in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-124
by
Chen Xu
,
Lei Cao
,
Wei Shao
Papers
Network Initialization for Wireless Distributed Beaconing Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-128
by
Youngmi Baek
,
Youngil Kim
,
Byunghwa Lee
,
Jilong Lee
,
Jeongbae Yun
,
Qin Shu
,
Seungyong Oh
,
Kijun Han
Papers
Orthogonal Modulation Based Cross-Layer Approach for Energy Efficiency in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-134
by
Qiuling Tang
,
Huan Wen
,
Changyin Sun
,
Li Deng
Papers
Providing SMS Notification with Less Interruption
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-141
by
Tiantian Gao
,
Zhiqiang Yang
,
Heng Wang
Papers
Toward an Integrative Model for Consumer Behavior regarding Mobile Commerce Adoption
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-149
by
M. L. Tang
,
C. W. Kuo
Papers
Using Packet Size Distribution to Identify P2P-TV Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Li Jin
,
Zhang Xin
,
Zuo Xiao-Liang
,
Wang Hui
Papers
WSN Design and Implementation in a Tea Plantation for Drought Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-159
by
Daozong Sun
,
Sheng Jiang
,
Weixing Wang
,
Jingchi Tang
Papers
An Improved Mobile Object Tracking Scheme Combining Range-Hybrid Localizations and Prediction Mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-167
by
Jaebok Park
,
Gihwan Cho
Papers
An Overlay-Based Approach for Replacing Failed Sensors by Mobile Robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-175
by
Jian Wang
,
Xiumei Wu
,
Na Guo
,
Carsten Ullrich
,
Heng Luo
Papers
Femtocell Frequency Planning Scheme in Cellular Networks Based on Soft Frequency Reuse
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-180
by
Yeonjune Jeong
,
Ju Yong Lee
,
Min Young Chung
,
Tae-Jin Lee
,
Hyunseung Choo
Papers
Location-Based Mobile Multimedia Push System
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-184
by
Chu-Sing Yang
,
Pang-Wei Tsai
,
Ming-Yi Liao
,
Chun-Chia Huang
,
C. Eugene Yeh
Papers
A Dynamic Network Robustness Evaluation Method in Cyberspace Based on Perron-Frobenius Eigenvalue
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Yin Wang
,
ZhiYu Huang
Papers
A Parallel Strategy for Measuring Network Bandwidth
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-192
by
Lexiao Wang
,
Yanyuan Zhang
,
Xiao Zhang
,
Bo Wang
,
Xin Li
Papers
A Study on Recommendation Features for an RSS Reader
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-198
by
Cansheng Ji
,
Jingyu Zhou
Papers
Internet Gateway Routing for MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-204
by
Babu Kaji Baniya
,
Xingming Wang
,
Ung Heo
,
Jaeho Choi
Papers
Clock Synchronization of Wireless Distributed System Based on IEEE 1588
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-209
by
Li Li
,
Benliang Li
,
Houjun Wang
Papers
Distributed Cluster-Based Fault-Tolerant Topology Control for Space Information Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-217
by
Ning Ye
,
Zhiliang Zhu
,
Jun Liu
,
Jiping Shi
Papers
Modified Least Cost Method for Grid Resource Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-225
by
Syed Nasir Mehmood Shah
,
Ahmad Kamil Bin Mahmood
,
Alan Oxley
Papers
Redundant Design of Parallel MLFMA Distributed Levels on a Cluster with Distributed Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-229
by
Yanbao Cui
,
Weiqin Tong
,
Yue Hu
,
Liangliang Cai
Papers
3D Fuzzy Vault Based on Palmprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-234
by
Hailun Liu
,
Dongmei Sun
,
Ke Xiong
,
Zhengding Qiu
Papers
Discouraging Improper Exploitation against Seeds in BitTorrent Swarms
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-242
by
Jian Wang
,
Xiumei Wu
,
Na Guo
,
Carsten Ullrich
,
Heng Luo
Papers
Fast Scalar Multiplication for Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-249
by
Xu Huang
,
Pritam Gajkumar Shah
,
Dharmendra Sharma
Papers
Internet Key Exchange Protocol Simulation of HAIPE in Security Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Chuan-fu Zhang
,
Jiang Yu
,
Wan-zhong Sun
,
Jin-hai Su
Papers
New ID-Based Signcryption Scheme and Its Applications in Key Update Protocols of MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-258
by
Zhang Chuanrong
,
Liu Weijiang
Papers
Scenario-Based Approach for Blackbox Load Testing of Online Game Servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-265
by
Chang-Sik Cho
,
Dong-Chun Lee
,
Kang-Min Sohn
,
Chang-Joon Park
,
Ji-Hoon Kang
Papers
Security Authentication and an Undeniable Billing Protocol for WMNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-269
by
Ji Qi
,
Yi Zhao
,
Xingming Wang
,
Jaeho Choi
Papers
Swarm-Based Knowledge Discovery for Intrusion Behavior Discovering
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Xiaohui Cui
,
Justin Beaver
,
Thomas Potok
Papers
A Hierarchical Diffusion Algorithm for Community Detection in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-283
by
Keyi Shen
,
Li Song
,
Xiaokang Yang
,
Wenjun Zhang
Papers
A High Performance, Low-Cost Network Architecture for Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-287
by
Cong Wang
,
Cuirong Wang
,
Ying Yuan
Papers
A High-Performance Scalable Computing System on the RapidIO Interconnect Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-292
by
Yong Zhang
,
Yong Wang
,
Ping Zhang
Papers
A New Top-Down Algorithm for Tree Inclusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-300
by
Yangjun Chen
,
Yibin Chen
Papers
A Study on Topology Model and Data Contribution Strategy of PPLive
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-304
by
Qing Ye
,
Changjia Chen
Papers
An Adaptive Bandwidth-Aware Overlay for the Maximum Throughput in the Unstructured Peer-to-Peer
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-310
by
Guofu Feng
,
Yuxing Sun
,
WenZhong Li
,
Sanglu Lu
Papers
An Algorithm Based on Directed Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-317
by
Zhixin Sun
,
Yadang Chen
,
Zhixin Sun
Papers
An Attempt to Find Neighbors
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-320
by
Yong Shi
,
Ryan Rosenblum
Papers
An Efficient Algorithm of Hot Events Detection in Text Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Junliang Bai
,
Jun Guo
,
Guang Chen
,
Weiran Xu
,
Gang Du
Papers
An Efficient CQI Feedback Reduction Scheme for Multi-user OFDMA Network with AMC Mode
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-330
by
Xiong Xiong
Papers
An Efficient Tree-Based Geocast Routing Algorithm for Connecting Heterogeneous Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-338
by
Yi Zhao
,
Xingming Wang
,
Ung Heo
,
Jaeho Choi
Papers
Analysis on Community Charactristics of Online Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-345
by
Yang Yang
,
Yuchun Guo
,
Yanni Ma
Papers
Decoding of the (47, 24, 11) Quadratic Residue Code with Hash Table
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-351
by
Yan-Haw Chen
,
Sai Lui
,
C. H. Huang
,
C. C. Chien
Papers
Effect of Finite State AMC on the Practicality of Dual Feedback Bandwidth Request Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-356
by
Nguyen Quoc Tuan
,
Dinh-Thong Nguyen
Papers
Heuristic Methods for Filtering Newly Coined Profanities Using Phylogenetic Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-360
by
Taijin Yoon
,
Sun-Young Park
,
WooKeun Chung
,
Hwan-Gue Cho
Papers
Hierarchical Copy Algorithm for Xen Live Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-364
by
Zhaobin Liu
,
Wenyu Qu
,
Tao Yan
,
Haitao Li
,
Keqiu Li
Papers
Improving Cooperative Spectrum Sensing under Correlated Log-Normal Shadowing
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-370
by
Dinh Thi Thai Mai
,
Trang Cong Chung
,
Nguyen Quoc Tuan
,
Dinh-Thong Nguyen
Papers
Joint PAPR Reduction Method Base on ACE POCS and Peak Clipping
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-375
by
Qingwen Han
,
Xiaoping Zeng
,
Lingqiu Zeng
,
Tao Wang
Papers
Location-Based Routing Algorithms for Mobile Ad Hoc Networks with Holes
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-379
by
Jipeng Zhou
,
Jianzhu Lu
,
Shuqiang Huang
,
Zuzhi Fan
Papers
Parallel ISODATA Clustering of Remote Sensing Images Based on MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-383
by
Bo Li
,
Hui Zhao
,
ZhenHua Lv
Papers
Parallel MLFMA Performance Analysis Using Performance Analysis Toolsets
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-389
by
Cai Liang Liang
,
Tong Weiqin
,
Hu Yue
,
Cui Yanbao
Performance Analysis and Simulation of SAE J1939 Protocol with DSPN Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-395
by
Liang-xue Ding
,
Yi Shen
Papers
Performance Analysis of Beamforming Algorithm for Noise Cancellation with Respect to the Arrival Angles of Interference Signal
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-399
by
Md. Zahangir Alom
,
Hyo Jong Lee
Papers
Research of an Improved Weighted Centroid Localization Algorithm and Anchor Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-405
by
Qingru Kong
,
Xinyu Yang
,
Xiangjun Dai
Papers
Research of BD_UCD_VBLAST for MU_MIMO Precoding Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-409
by
Liu Jun
,
Wang Yanwen
Papers
WORM-Based Data Protection Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-416
by
Jinsun Suk
,
Jaechun No
Papers
A PCDA-Based Critical Exception Management System in Semiconductor Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-420
by
Yung-Wei Kao
,
Chia-Feng Lin
,
Kun-Yao Cheng
,
Shyan-Ming Yuan
,
Ching-Tsorng Tsai
Papers
An Ambient Service Model for Providing Structured Web Information Based on User-Contexts
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-428
by
Kyung-Seok Seo
,
Yong-Hee Jang
,
Yong-Jin Kwon
,
Ryong Lee
Papers
An Implementation of AODV Routing Protocol with Multi-Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-432
by
Jangkyu Yun
,
Seungyong Oh
,
Junhyung Kim
,
Keuchul Cho
,
Honggil Lee
,
Icksoo Lee
,
Minho Park
,
Sukgyu Lee
,
Kijun Han
Papers
Automatic Construction of Domain Concept Hierarchy
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-436
by
Sun Qiao
,
Zhang Chunhui
,
Chen Zhibo
Papers
Beamforming for Sonar Based on Highlight Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-440
by
Sheng Liu
,
Bing Li
,
Xucheng Chang
Papers
Comment on an Improved Signature without Using One-Way Hash Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-443
by
Luxiong Xu
,
Chenglian Liu
,
Na Wang
Papers
LZpack: A Cluster File System Benchmark
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-447
by
Xin Li
,
Zhanhuai Li
,
Xiao Zhang
,
Lexiao Wang
Papers
Design and Implementation of a Relaxable Web Service Composition System
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-455
by
Ruey-Kai Sheu
,
Win-Tsung Lo
,
Chia-Feng Lin
,
Shyan-Ming Yuan
Papers
Detecting and Visualizing the Dispute Structure of the Replying Comments in the Internet Forum Sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-463
by
Yun-Jung Lee
,
Jung-Min Shim
,
Hwan-Gue Cho
,
Gyun Woo
Papers
Exchanging Course Content Mechanism for Moodle LMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-467
by
Ching-Tsorng Tsai
,
Hsien-Tang Lin
,
Ming-Hung Hung
,
Chia-Feng Lin
,
Shyan-Ming Yuan
Papers
Method and System of Performance Monitoring to Detect VDSL Service Degradation
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-475
by
Charlie Chen-Yui Yang
,
Chi-Ming Chen
,
David Lu
,
Xidong Wu
,
Raj Savoor
Papers
Entities Identification on the Deep Web Using Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-479
by
Baohua Qiang
,
Chunming Wu
,
Long Zhang
Papers
Recognition of Facial Expression Using Centroid Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-485
by
Dong-Chul Park
,
Huynh Thuy
,
Dong-Min Woo
,
Yunsik Lee
Papers
Residue Amending Combined BP Prediction Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-489
by
Wang Zhe
,
Zhong-Hua Wang
,
Li-Fang Kong
Papers
Towards Automated Generation of User-Specific Eclipse Wizard
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-497
by
Nuyun Zhang
,
Ning Jiang
,
Ying Zhang
,
Gang Huang
Papers
Unsupervised Learning Approaches for the Finite Mixture Models: EM versus MCMC
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-501
by
Weifeng Liu
Papers
A Web Services Status Monitoring Technology for Distributed System Management in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-505
by
Chia-Feng Lin
,
Ruey-Shyang Wu
,
Shyan-Ming Yuan
,
Ching-Tsorng Tsai
Showing 100 out of 104
Load More
Load All