Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DASC
DASC 2009
Generate Citations
Dependable, Autonomic and Secure Computing, IEEE International Symposium on
Dec. 12 2009 to Dec. 14 2009
Chengdu, China
ISBN: 978-0-7695-3929-4
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xvi
Papers
PICom-09 Organizing Committee
Freely available from IEEE.
pp. xxiii-xxvii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the DASC 2009 Chairs
Freely available from IEEE.
pp. xvii-xviii
Papers
DASC 2009 Organizing Committee
Freely available from IEEE.
pp. xix
Papers
DASC 2009 Program Committee
Freely available from IEEE.
pp. xx
Papers
Message from the PICom-09 Chairs
Freely available from IEEE.
pp. xxi-xxii
Papers
Message from the UbiSafe-09 Chairs
Freely available from IEEE.
pp. xxviii
Papers
UbiSafe-09 Organizing Committee
Freely available from IEEE.
pp. xxix-xxxi
Papers
Message from the Routing-09 Program Chairs
Freely available from IEEE.
pp. xxxii
Papers
Routing-09 Organizing Committee
Freely available from IEEE.
pp. xxxiii-xxxiv
Papers
Message from the SocialNet-09 Program Chairs
Freely available from IEEE.
pp. xxxv
Papers
SocialNet-09 Organizing Committee
Freely available from IEEE.
pp. xxxvi-xxxvii
Papers
Message from the ACI-09 Chairs
Freely available from IEEE.
pp. xxxviii
Papers
ACI-09 Organizing Committee
Freely available from IEEE.
pp. xxxix
Papers
Message from the SCC-09 Chairs
Freely available from IEEE.
pp. xl
Papers
SCC-09 Organzing Committee
Freely available from IEEE.
pp. xli-xlii
Papers
Message from the RIPWASS-09 Chairs
Freely available from IEEE.
pp. xliii
Papers
Message from the MMASN-09 Chairs
Freely available from IEEE.
pp. xliv
Papers
MMASN-09 Organizing Committee
Freely available from IEEE.
pp. xlv-xlvi
Papers
Message from the SmarTel-09 General Chairs
Freely available from IEEE.
pp. xlvii
Papers
SmarTel-09 Organizing Committee
Freely available from IEEE.
pp. xlviii-xlvix
Papers
Message from the IISHCI-09 Program Chairs
Freely available from IEEE.
pp. l
Papers
IISHCI-09 Organizing Committee
Freely available from IEEE.
pp. li
Papers
Message from the TMUPS-09 Program Chairs
Freely available from IEEE.
pp. lii
Papers
TMUPS-09 Organizing Committee
Freely available from IEEE.
pp. liii
Papers
Adaptive Dimensioning of Cloud Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-10
by
Wenhong Tian
Papers
Formal Analysis of Fault Recovery in Self-Organizing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-18
by
Jan Calta
,
Miroslaw Malek
Papers
Dependability Analysis for AADL Models by PVS
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Geng Chen
,
Lei Luo
,
Rong Gong
,
Shenglin Gui
Papers
Behavioral Study of UNIX Commands in a Faulty Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Cássio Martini Martins Pereira
,
Rodrigo Fernandes de Mello
Papers
Verification of a Lock-Free Implementation of Multiword LL/SC Object
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Hui Gao
,
Yan Fu
,
Wim H. Hesselink
Papers
Policy Description Language for Dynamic Access Control Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
Masaki Hashimoto
,
Mira Kim
,
Hidenori Tsuji
,
Hidehiko Tanaka
Papers
Reliability and Dependability Modeling and Analysis of Dynamic Aspects in Complex Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-48
by
Salvatore Distefano
Real Hardware Verification by Software for Bootstrap Using TSC
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-152
by
Kunio Miyamoto
,
Hidehiko Tanaka
Papers
TCBC: Trap Caching Bounds Checking for C
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-56
by
Yoshitaka Arahori
,
Katsuhiko Gondow
,
Hideo Maejima
Papers
A Rare Feature Recognition Approach Based on Fuzzy ART Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Jun Zha
,
Cong Lu
,
HongGuang Lv
Papers
A Utility-Based Adaptive Resource Allocation Policy in Virtualized Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Jian Wan
,
Peipei Shan
,
Xianghua Xu
Papers
Achieving Information Security in Network Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-77
by
Vincenzo D. Cunsolo
,
Salvatore Distefano
,
Antonio Puliafito
,
Marco Scarpa
Papers
Securing Session Initiation Protocol in Voice over IP Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Iyad Alsmairat
,
Rajan Shankaran
,
Mehmet Orgun
,
Eryk Dutkiewicz
Papers
Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-89
by
Hongwu Lv
,
Huiqiang Wang
,
Qian Zhao
,
Chunguang Ma
Papers
Composition Planning for Networked Appliances
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-94
by
Chatchawin Namman
,
Anirach Mingkhwan
Papers
A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-102
by
Ruo Ando
,
Zong-Hua Zhang
,
Youki Kadobayashi
,
Yoichi Shinoda
Papers
Replica Placement in Multi-tier Data Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Qaisar Rasool
,
Jianzhong Li
,
Shuo Zhang
Papers
Grey Prediction Control of Adaptive Resources Allocation in Virtualized Computing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-114
by
Xianghua Xu
,
Yanna Yan
,
Jian Wan
Papers
Security Analysis of NSSK Protocol and its Improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-118
by
Liao Junguo
,
Zhu Bin
,
He Yong
Papers
Evolutionary Design of Relatively Large Combinational Circuits with an Extended Stepwise Dimension Reduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Zhifang Li
,
Wenjian Luo
,
Lihua Yue
,
Xufa Wang
Papers
Research on Secure and Reconfigurable Architecture Based on Embedded Hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-131
by
Zhiqiang Zhu
,
Mingdi Xu
,
Huanguo Zhang
Papers
Low Power Embedded Speech Enhancement System Based on a Fixed-Point DSP
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-136
by
Yu Cai
,
Jianping Yuan
,
Xiaochuan Ma
,
Chaohuan Hou
Papers
A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-142
by
Huiqiang Wang
,
Xikun Dong
,
Haifeng Wang
Papers
Energy-Efficient Cluster-Based Scheme for Handling Node Failure in Real-Time Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-148
by
Hamid Karimi
,
Mehdi Kargahi
,
Nasser Yazdani
Papers
Solving Aircraft-Sequencing Problem Based on Bee Evolutionary Genetic Algorithm and Clustering Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-161
by
Siliang Wang
Papers
Generating an Approximately Optimal Detector Set by Evolving Random Seeds
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-168
by
Jie Zhang
,
Wenjian Luo
,
Baoliang Xu
Papers
Learning Navigation Map on Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-174
by
Tianying Chen
,
Hongguang Fu
Papers
Semantic Web Services Composition Model Based on Domain Ontology Cost Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-178
by
Chongyun Wu
,
Jun Wen
Papers
An Approach to Multi-issue Active Negotiation Control Algorithm in Multi-stages
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-182
by
Lipeng Wang
,
Mingjun Xin
Papers
A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-187
by
My Chau Tu
,
Dongil Shin
,
Dongkyoo Shin
Papers
Robust and Fast Keypoint Recognition Based on SE-FAST
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Xueting Tan
,
Xubo Yang
,
Shuangjiu Xiao
Papers
Pattern Matching with Independent Wildcard Gaps
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Fan Min
,
Xindong Wu
,
Zhenyu Lu
Papers
Toward an Understanding of User-Defined Conditional Preferences
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-208
by
Zhiyong Yu
,
Zhiwen Yu
,
Xingshe Zhou
,
Yuichi Nakamura
Papers
Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-214
by
Jinlong Hou
,
Yongxin Zhu
,
Le Zhang
,
Yuzhuo Fu
,
Feng Zhao
,
Li Yang
,
Guoguang Rong
Papers
Adaptive Fuzzy Control with Modulated Membership Function Applies to Path Tracking Based on Location System
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-220
by
Wei-Jun Pan
,
Chih-Chun Lin
,
Leehter Yao
Papers
Design of a Rule Based System Using Structured Query Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Umair Abdullah
,
Mohammad Jamil Sawar
,
Aftab Ahmed
Papers
Intelligent Context-Based Adaptation for Spatial Routing Applications in Dynamic Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Dejian Meng
,
Stefan Poslad
,
Yide Zhang
Papers
Blog Hotness Evaluation Model Based on Text Opinion Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Jianjiang Li
,
Xuechun Zhang
,
Yu Weng
,
Changjun Hu
Papers
A Web Text Filter Based on Rough Set Weighted Bayesian
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-245
by
Yu Wu
,
Kun She
,
Williams Zhu
,
Xiaojun Yue
,
Huiqiong Luo
Papers
Measuring the Probability of Correctness of Contextual Information in Context Aware Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-253
by
Nermin Brgulja
,
Rico Kusber
,
Klaus David
,
Matthias Baumgarten
Papers
Cooperative Alert Topic Detection Model in Distributed Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Jianjiang Li
,
Chengxiu Xue
,
Yu Weng
,
Changjun Hu
Papers
A Comparison of Social Service Selection Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-265
by
Elodie Billionniere
,
David Greiman
,
Kinnis Gosha
Papers
Synthesis and Analysis in Artificial Intelligence: The Role of Theory in Agent Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-269
by
Roxanne B. Raine
,
Rieks op den Akker
,
Zhiqiang Cai
,
Arthur C. Graesser
,
Danielle S. McNamara
Papers
A Software Agent Based Simulation Model for Systems with Decision Units
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Yuan Miao
Papers
A Novel Variable-Boundary-Coded Quantum Genetic Algorithm for Function Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-285
by
Hegen Xiong
,
Kai Xiong
,
Qiuhua Tang
Papers
On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Jianhong Zhang
,
Hua Chen
,
Shengnan Gao
Papers
Cryptanalysis of Two Identity Based Signcryption Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-294
by
Qi Xia
,
Chunxiang Xu
An Adaptive Low Latency Cross-Layer MAC Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-393
by
Zhenzhou Tang
,
Qian Hu
Papers
Cyber-I: Vision of the Individual's Counterpart on Cyberspace
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-302
by
Jie Wen
,
Kai Ming
,
Furong Wang
,
Benxiong Huang
,
Jianhua Ma
Papers
Multidimensional Pervasive Adaptation into Ambient Intelligent Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Yacine Bellik
,
Achilles Kameas
,
Christos Goumopoulos
,
Hani Hagras
,
Tobias Heinroth
,
Gaëtan Pruvost
,
Apostolos Meliones
,
Dimitris Economou
,
Wolfgang Minker
,
Michael Gardner
Papers
Performance Study of RFID Localisation in a Challenging Indoor Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-316
by
Siok Kheng Tan
,
Zhong Fan
Papers
A Mobile Health Monitoring System Using RFID Ring-Type Pulse Sensor
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-322
by
Yu-Chi Wu
,
Pei-Fan Chen
,
Zhi-Huang Hu
,
Chao-Hsu Chang
,
Gwo-Chuan Lee
,
Wen-Ching Yu
Papers
Similarity Computation Using Reconfigurable Embedded Hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-329
by
Darshika G. Perera
,
Kin Fun Li
Papers
A Memetic Algorithm Based on P Systems for IIR Digital Filter Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-334
by
Chunxiu Liu
,
Gexiang Zhang
,
Xuebai Zhang
,
Hongwen Liu
Papers
Key Techniques of Interoperable DRM on Linux Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-338
by
Yulin Wang
,
Xuebin Liu
Papers
VDE: Seamless Mobility on Desktop Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-344
by
Xiaofei Liao
,
Xianwen Chen
,
Hai Jin
,
Zongfen Han
Papers
Mobile Phones as 3-DOF Controllers: A Comparative Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-349
by
Nicholas Katzakis
,
Masahiro Hori
Papers
Modeling Reputation Scheme in P2P File-Sharing by Stochastic Activity Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-358
by
Peiqing Zhang
,
Bjarne E. Helvik
Papers
Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-363
by
Chun-mei Chen
,
Hong Jiang
,
Shi-en Yang
Papers
On-demand Query Processing in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-368
by
Longjiang Li
,
Supeng Leng
,
Yuming Mao
People Reidentification in a Camera Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-466
by
Icaro Oliveira de Oliveira
,
José Luiz de Souza Pio
Papers
A New Method for Coverage in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-372
by
Nima Attarzadeh
,
Ali Barati
,
Ali Movaghar
Papers
A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-378
by
Ke Liu
,
Supeng Leng
,
Huirong Fu
,
Longjiang Li
Papers
Multi-objective Optimization of Cross-Layer Configuration for Cognitive Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-383
by
Hong Jiang
,
Yujun Bao
,
Qiang Li
,
Yuqing Huang
Papers
A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-388
by
Chen Hao
,
Guo Yajun
Research on Parallelization of Aspect-Oriented Program
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-482
by
Tengfei He
,
Xiaoguang Mao
Papers
A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-399
by
Rabindra Bista
,
Kyoung-Jin Jo
,
Jae-Woo Chang
Papers
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-404
by
Chunguang Ma
,
Xiangjun Lin
,
Hongwu Lv
,
Huiqiang Wang
Papers
An Improved Method to Reduce Over-Segmentation of Watershed Transformation and its Application in the Contour Extraction of Brain Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-412
by
Hui Zhu
,
Bofeng Zhang
,
Anping Song
,
Wu Zhang
Papers
Automatic Segmentation in Tongue Image by Mouth Location and Active Appearance Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-417
by
Xiuqin Zhong
,
Hongguang Fu
,
Junhua Yang
,
Weiming Wang
Papers
A General Framework of Brain-Computer Interface with Visualization and Virtual Reality Feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-423
by
Gufei Sun
,
Kuangda Li
,
Xiaoqiang Li
,
Bofeng Zhang
,
Shizhong Yuan
,
Gengfeng Wu
Papers
Salmon: Precise 3D Contours in Real Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-429
by
Tariq Khan
,
John Morris
,
Khurram Javed
,
Georgy Gimelfarb
Showing 100 out of 186
Load More
Load All