Default Cover Image

Dependable, Autonomic and Secure Computing, IEEE International Symposium on

Dec. 12 2009 to Dec. 14 2009

Chengdu, China

ISBN: 978-0-7695-3929-4

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xvi
Papers
PICom-09 Organizing CommitteeFreely available from IEEE.pp. xxiii-xxvii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the DASC 2009 ChairsFreely available from IEEE.pp. xvii-xviii
Papers
DASC 2009 Organizing CommitteeFreely available from IEEE.pp. xix
Papers
DASC 2009 Program CommitteeFreely available from IEEE.pp. xx
Papers
Message from the PICom-09 ChairsFreely available from IEEE.pp. xxi-xxii
Papers
Message from the UbiSafe-09 ChairsFreely available from IEEE.pp. xxviii
Papers
UbiSafe-09 Organizing CommitteeFreely available from IEEE.pp. xxix-xxxi
Papers
Message from the Routing-09 Program ChairsFreely available from IEEE.pp. xxxii
Papers
Routing-09 Organizing CommitteeFreely available from IEEE.pp. xxxiii-xxxiv
Papers
Message from the SocialNet-09 Program ChairsFreely available from IEEE.pp. xxxv
Papers
SocialNet-09 Organizing CommitteeFreely available from IEEE.pp. xxxvi-xxxvii
Papers
Message from the ACI-09 ChairsFreely available from IEEE.pp. xxxviii
Papers
ACI-09 Organizing CommitteeFreely available from IEEE.pp. xxxix
Papers
Message from the SCC-09 ChairsFreely available from IEEE.pp. xl
Papers
SCC-09 Organzing CommitteeFreely available from IEEE.pp. xli-xlii
Papers
Message from the RIPWASS-09 ChairsFreely available from IEEE.pp. xliii
Papers
Message from the MMASN-09 ChairsFreely available from IEEE.pp. xliv
Papers
MMASN-09 Organizing CommitteeFreely available from IEEE.pp. xlv-xlvi
Papers
Message from the SmarTel-09 General ChairsFreely available from IEEE.pp. xlvii
Papers
SmarTel-09 Organizing CommitteeFreely available from IEEE.pp. xlviii-xlvix
Papers
Message from the IISHCI-09 Program ChairsFreely available from IEEE.pp. l
Papers
IISHCI-09 Organizing CommitteeFreely available from IEEE.pp. li
Papers
Message from the TMUPS-09 Program ChairsFreely available from IEEE.pp. lii
Papers
TMUPS-09 Organizing CommitteeFreely available from IEEE.pp. liii
Papers
Adaptive Dimensioning of Cloud Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 5-10
Papers
Formal Analysis of Fault Recovery in Self-Organizing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Papers
Dependability Analysis for AADL Models by PVSFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
Papers
Behavioral Study of UNIX Commands in a Faulty EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 25-30
Papers
Verification of a Lock-Free Implementation of Multiword LL/SC ObjectFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Papers
Policy Description Language for Dynamic Access Control ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 37-42
Papers
Reliability and Dependability Modeling and Analysis of Dynamic Aspects in Complex SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 43-48
Real Hardware Verification by Software for Bootstrap Using TSCFull-text access may be available. Sign in or learn about subscription options.pp. 149-152
Papers
TCBC: Trap Caching Bounds Checking for CFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
Papers
A Rare Feature Recognition Approach Based on Fuzzy ART Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 57-62
Papers
A Utility-Based Adaptive Resource Allocation Policy in Virtualized EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Papers
Achieving Information Security in Network Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 71-77
Papers
Securing Session Initiation Protocol in Voice over IP DomainFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
Papers
Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPAFull-text access may be available. Sign in or learn about subscription options.pp. 84-89
Papers
Composition Planning for Networked AppliancesFull-text access may be available. Sign in or learn about subscription options.pp. 90-94
Papers
A Dynamic Protection System of Web Server in Virtual Cluster Using Live MigrationFull-text access may be available. Sign in or learn about subscription options.pp. 95-102
Papers
Replica Placement in Multi-tier Data GridFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Papers
Grey Prediction Control of Adaptive Resources Allocation in Virtualized Computing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Papers
Security Analysis of NSSK Protocol and its ImprovementFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
Papers
Evolutionary Design of Relatively Large Combinational Circuits with an Extended Stepwise Dimension ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Papers
Research on Secure and Reconfigurable Architecture Based on Embedded HardwareFull-text access may be available. Sign in or learn about subscription options.pp. 127-131
Papers
Low Power Embedded Speech Enhancement System Based on a Fixed-Point DSPFull-text access may be available. Sign in or learn about subscription options.pp. 132-136
Papers
A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-SwappingFull-text access may be available. Sign in or learn about subscription options.pp. 137-142
Papers
Energy-Efficient Cluster-Based Scheme for Handling Node Failure in Real-Time Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Papers
Solving Aircraft-Sequencing Problem Based on Bee Evolutionary Genetic Algorithm and Clustering MethodFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
Papers
Generating an Approximately Optimal Detector Set by Evolving Random SeedsFull-text access may be available. Sign in or learn about subscription options.pp. 162-168
Papers
Learning Navigation Map on OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 169-174
Papers
Semantic Web Services Composition Model Based on Domain Ontology Cost GraphFull-text access may be available. Sign in or learn about subscription options.pp. 175-178
Papers
An Approach to Multi-issue Active Negotiation Control Algorithm in Multi-stagesFull-text access may be available. Sign in or learn about subscription options.pp. 179-182
Papers
A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 183-187
Papers
Robust and Fast Keypoint Recognition Based on SE-FASTFull-text access may be available. Sign in or learn about subscription options.pp. 188-193
Papers
Pattern Matching with Independent Wildcard GapsFull-text access may be available. Sign in or learn about subscription options.pp. 194-199
Papers
Toward an Understanding of User-Defined Conditional PreferencesFull-text access may be available. Sign in or learn about subscription options.pp. 203-208
Papers
Design and Implementation of a High Resolution Localization System for In-Vivo Capsule EndoscopyFull-text access may be available. Sign in or learn about subscription options.pp. 209-214
Papers
Adaptive Fuzzy Control with Modulated Membership Function Applies to Path Tracking Based on Location SystemFull-text access may be available. Sign in or learn about subscription options.pp. 215-220
Papers
Design of a Rule Based System Using Structured Query LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Papers
Intelligent Context-Based Adaptation for Spatial Routing Applications in Dynamic EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
Papers
Blog Hotness Evaluation Model Based on Text Opinion AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
Papers
A Web Text Filter Based on Rough Set Weighted BayesianFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
Papers
Measuring the Probability of Correctness of Contextual Information in Context Aware SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 246-253
Papers
Cooperative Alert Topic Detection Model in Distributed EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
Papers
A Comparison of Social Service Selection TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 260-265
Papers
A Software Agent Based Simulation Model for Systems with Decision UnitsFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Papers
A Novel Variable-Boundary-Coded Quantum Genetic Algorithm for Function OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 279-285
Papers
On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
Papers
Cryptanalysis of Two Identity Based Signcryption SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 292-294
An Adaptive Low Latency Cross-Layer MAC Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 389-393
Papers
Cyber-I: Vision of the Individual's Counterpart on CyberspaceFull-text access may be available. Sign in or learn about subscription options.pp. 295-302
Papers
Performance Study of RFID Localisation in a Challenging Indoor EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 311-316
Papers
A Mobile Health Monitoring System Using RFID Ring-Type Pulse SensorFull-text access may be available. Sign in or learn about subscription options.pp. 317-322
Papers
Similarity Computation Using Reconfigurable Embedded HardwareFull-text access may be available. Sign in or learn about subscription options.pp. 323-329
Papers
A Memetic Algorithm Based on P Systems for IIR Digital Filter DesignFull-text access may be available. Sign in or learn about subscription options.pp. 330-334
Papers
Key Techniques of Interoperable DRM on Linux PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 335-338
Papers
VDE: Seamless Mobility on Desktop EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 339-344
Papers
Mobile Phones as 3-DOF Controllers: A Comparative StudyFull-text access may be available. Sign in or learn about subscription options.pp. 345-349
Papers
Modeling Reputation Scheme in P2P File-Sharing by Stochastic Activity NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 353-358
Papers
Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 359-363
Papers
On-demand Query Processing in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 364-368
People Reidentification in a Camera NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 461-466
Papers
A New Method for Coverage in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 369-372
Papers
A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
Papers
Multi-objective Optimization of Cross-Layer Configuration for Cognitive Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 379-383
Papers
A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 384-388
Research on Parallelization of Aspect-Oriented ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 478-482
Papers
A New Approach to Secure Aggregation of Private Data in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 394-399
Papers
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 400-404
Papers
Automatic Segmentation in Tongue Image by Mouth Location and Active Appearance ModelFull-text access may be available. Sign in or learn about subscription options.pp. 413-417
Papers
A General Framework of Brain-Computer Interface with Visualization and Virtual Reality FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 418-423
Papers
Salmon: Precise 3D Contours in Real TimeFull-text access may be available. Sign in or learn about subscription options.pp. 424-429
Showing 100 out of 186