Default Cover Image

2006 Japan-China Joint Workshop on Frontier of Computer Science and Technology

Nov. 17 2006 to Nov. 18 2006

Fukushima

Table of Contents

Analysis And Classification of IPSec Security Policy ConflictsFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Introduction
Message from the Workshop ChairsFreely available from IEEE.pp. viii
Introduction
Program CommitteeFreely available from IEEE.pp. ix
Networking
AR-TCP: Actively Replicated TCP Connections for Cluster of WorkstationsFull-text access may be available. Sign in or learn about subscription options.pp. 3-10
Networking
SADLBoIB: Self-Adaptive Dynamic Load Balance over InfiniBandFull-text access may be available. Sign in or learn about subscription options.pp. 11-17
Networking
Towards a Low Power Virtual Machine forWireless Sensor Network MotesFull-text access may be available. Sign in or learn about subscription options.pp. 18-22
Storage and Cache Management
I/O Scheduling in Huge Object-based Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 39-45
Efficient Concurrency Control for Mobile Real-Time Transactions in Data Broadcast EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
Storage and Cache Management
Storage Active Service: Model, Method and PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Storage and Cache Management
Data Stream Splicing for Web Proxy Cache OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
Storage and Cache Management
SRC-based Cache Coherence Protocol in Chip MultiprocessorFull-text access may be available. Sign in or learn about subscription options.pp. 60-70
Security
A New VPN Solution Based on Asymmetrical SSL TunnelsFull-text access may be available. Sign in or learn about subscription options.pp. 71-78
Security
Network Based Immunization Against Computer VirusFull-text access may be available. Sign in or learn about subscription options.pp. 79-82
Security
A Directed Graph-Based Authentication Protocol Model and Its Security AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Multimedia
Semantic Analysis and Retrieval of Sports VideoFull-text access may be available. Sign in or learn about subscription options.pp. 97-108
Multimedia
"Back-Seat Driver": Spatial Sound for Vehicular Way-Finding and Situation AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 109-115
Multimedia
Parking Simulation and Guidance in a Model EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 116-120
Multimedia
A Picture Language TranslatorFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
Query, Search, and Transactions
An Improved Semantic Search Model Based on Hybrid Fuzzy Description LogicFull-text access may be available. Sign in or learn about subscription options.pp. 139-146
Query, Search, and Transactions
Lowering the Barrier of Query Language Skills within Mobile and Web User Interface EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 147-156
Ubiquitous Computing and Communications
Trie-based Observations on the Routing TablesFull-text access may be available. Sign in or learn about subscription options.pp. 157-163
Ubiquitous Computing and Communications
A Tracking Algorithm in RFID Reader NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 164-171
Ubiquitous Computing and Communications
A Situation-aware Support Model and Its ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
Ubiquitous Computing and Communications
Algorithmic CyberFilm LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 178-188
System Design
Realization of Low-Cost IMU/GPS Integrated Navigation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 189-195
System Design
A Hardware Resource Management System for Adaptive Computing on Dynamically Reconfigurable DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 196-202
System Design
Independent Component Analysis Based on Learning Updating with Forms of Matrix Transformations and the Diagonalization PrincipleFull-text access may be available. Sign in or learn about subscription options.pp. 203-210
Author Index
Author IndexFreely available from IEEE.pp. 211
Showing 32 out of 32