Default Cover Image

Data Storage and Data Engineering, International Conference on

Feb. 9 2010 to Feb. 10 2010

Bangalore, India

ISBN: 978-0-7695-3958-4

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-ix
Papers
PrefaceFreely available from IEEE.pp. x-xi
Papers
Organizing CommitteeFreely available from IEEE.pp. xii
Papers
list-reviewerFreely available from IEEE.pp. xiii-xiv
Papers
Amalgamtion of Internet for Supervisory Control and Data Acquisition System (SCADA) Encompassing Security IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
Approximation of the Node-Pair Reliability of Data Communication NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 5-9
Papers
Random Access OFDMA Network with Dynamic Resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Papers
Comparison of Load Balancing Algorithms in a GridFull-text access may be available. Sign in or learn about subscription options.pp. 20-23
Papers
Implementation of Relational Algebra Interpreter Using Another Query LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 24-28
Papers
A Survey of Algorithms in FCIMFull-text access may be available. Sign in or learn about subscription options.pp. 29-33
Papers
TC-GXML - A Transcoder for HTML to XML GrammarFull-text access may be available. Sign in or learn about subscription options.pp. 34-38
Papers
A DWT Based Approach for Steganography Using BiometricsFull-text access may be available. Sign in or learn about subscription options.pp. 39-43
Papers
Optimization of Detected Deadlock Views of Distributed DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 44-48
Papers
Preserving Location Privacy in Peer-to-Peer EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 49-53
Papers
Binary Classification Using Linear SVM Pyramidal TreeFull-text access may be available. Sign in or learn about subscription options.pp. 54-58
Papers
A Novel Structural Similarity with High DistinguishabilityFull-text access may be available. Sign in or learn about subscription options.pp. 59-62
Papers
Application of Data Mining in Predicting Cell Phones Subscribers Behavior Employing the Contact PatternFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Papers
Research on Fault Tree Based Complex Electronic Device Fault Diagnosis Expert SystemFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Papers
Enterprise Storage Architecture for Optimal Business ContinuityFull-text access may be available. Sign in or learn about subscription options.pp. 73-77
Papers
A Comparative Study of View Update ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 83-89
Purpose Based Access Control for Privacy Protection in Object Relational Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 90-94
Papers
Clustering of Evolving Data Stream with Multiple Adaptive Sliding WindowFull-text access may be available. Sign in or learn about subscription options.pp. 95-100
Papers
Multimedia Distribution over IPTV and its Integration with IMSFull-text access may be available. Sign in or learn about subscription options.pp. 101-105
Papers
Implementation of an IMS Testbed for Wired and Wireless ClientsFull-text access may be available. Sign in or learn about subscription options.pp. 106-110
Papers
Design of Data Replication System on FreeBSDFull-text access may be available. Sign in or learn about subscription options.pp. 111-115
Papers
Optimization and Implementation of LBM Benchmark on Multithreaded GPUFull-text access may be available. Sign in or learn about subscription options.pp. 116-122
Papers
Research on Evaluation of Digital LibraryFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Papers
IT Service Support Process Meta-Modeling Based on ITILFull-text access may be available. Sign in or learn about subscription options.pp. 127-131
Papers
A Personalized Search Engine Using Ontology-Based Fuzzy Concept NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 137-141
Papers
A New Requirement Prioritization Model for Market Driven Products Using Analytical Hierarchical ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 142-149
Papers
Automated CAD for Lung Nodule Detection using CT ScansFull-text access may be available. Sign in or learn about subscription options.pp. 150-153
Papers
A Novel Classification Method for Diagnosis of Diabetes Mellitus Using Artificial Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 159-163
Papers
An Application of Multi-Person Decision-Making Model for Negotiating and Prioritizing Requirements in Agent-Oriented ParadigmFull-text access may be available. Sign in or learn about subscription options.pp. 164-168
Papers
An Efficient Feature Extraction Method for Classification of Image Spam Using Artificial Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 169-172
Papers
Generating Distributed Query Processing Plans Using Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 173-177
Papers
Increasing Packet Delivery Ratio in GPSR Using Buffer Zone Based Greedy Forwarding StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 178-182
Papers
E GovernanceFull-text access may be available. Sign in or learn about subscription options.pp. 183-186
Papers
Study of Medical Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 192-196
Papers
Noise Load Adaptive Filter Using Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
Papers
Investigation and Research on Physical Education Informationization in Higher InstitutionsFull-text access may be available. Sign in or learn about subscription options.pp. 212-215
Papers
Web Usage Data Clustering Using Dbscan Algorithm and Set SimilaritiesFull-text access may be available. Sign in or learn about subscription options.pp. 220-224
Web Site Mining Using Entropy EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 225-229
Papers
More on Elicitation of Software Requirements and Prioritization Using AHPFull-text access may be available. Sign in or learn about subscription options.pp. 230-234
Papers
Aligning Raw Image to Real-time Coordinate SystemFull-text access may be available. Sign in or learn about subscription options.pp. 235-239
Papers
DDCSP: Constraint Satisfaction Problem Used for Rule-Based SystemFull-text access may be available. Sign in or learn about subscription options.pp. 240-244
Papers
Web Data Visualization Based on the Function and Implementaion DimensionFull-text access may be available. Sign in or learn about subscription options.pp. 245-249
Papers
An Effective Clustering Algorithm for Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
Papers
XLight, An Efficient Relational Schema to Store and Query XML DataFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Papers
A New Replica Creation and Placement Algorithm for Data Grid EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 265-269
Papers
A Layered Architecture for Checking Rewriting Attacks in Resource Constrained NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 270-274
Papers
Determining Robust Solutions in Supply Chain Using Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 275-277
Papers
Raid 5 for Secured Storage VirtualisationFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
Papers
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with BiometricsFull-text access may be available. Sign in or learn about subscription options.pp. 283-286
Papers
Agile Disk Replacement Strategy for Data Cloud Environment Using Evolutionary AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 287-291
Papers
A Coplanar Waveguide Power Divider and It's Neural Network ModelFull-text access may be available. Sign in or learn about subscription options.pp. 292-295
Papers
Autonomicity in Oracle Database Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
Papers
Discuss on the Researching and Using Geo-Spatial Technology In the History Changing of the Silk RoadFull-text access may be available. Sign in or learn about subscription options.pp. 301-304
Papers
Correction and Interpolation of Noise Corrupted Voice Using Markov Chain Detection TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 305-309
Papers
Author IndexFreely available from IEEE.pp. 310-312
Papers
[Publisher's information]Freely available from IEEE.pp. 314
Showing 68 out of 68