Default Cover Image

2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST 2007)

Nov. 1 2007 to Nov. 3 2007

Wuhan

Table of Contents

Introduction
Message from the Workshop ChairsFreely available from IEEE.pp. vii
Introduction
Workshop OrganizationFreely available from IEEE.pp. viii
Session 1: Networking and Grid
Designing Piecewise QoS Routing Protocol in Large-Scale MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Session 1: Networking and Grid
Performance Evaluation to Optimize the UMP System Focusing on Network Transmission SpeedFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Session 1: Networking and Grid
Trust Propagation and Aggregation in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Session 1: Networking and Grid
Research on Architecture of Grid-Based Simulation PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
Session 2: Storage System and Technology
A Dynamic Metadata Equipotent Subtree Partition Policy for Mass Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
Session 2: Storage System and Technology
A Prototype for Active Service SystemFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Session 2: Storage System and Technology
High Availability Storage System Based on Two-Level Metadata ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 41-48
Session 2: Storage System and Technology
Probabilistic Access Allocation of Disk Files for Energy-Efficient Server SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
Session 2: Storage System and Technology
A Case Study: Performance Evaluation of a DRAM-Based Solid State DiskFull-text access may be available. Sign in or learn about subscription options.pp. 57-60
Session 3: Security and Scheduling
Improved Policy Database System for Protecting Possession Sensitive Attributes in Automated Trust NegotiationFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
Session 3: Security and Scheduling
A Novel Security Risk Evaluation for Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 67-73
Session 3: Security and Scheduling
Adaptable Scheduling Framework for Window-Based Real-Time ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
Session 3: Security and Scheduling
The Research about Containment the Radial Error Propagation in Self-Servowriting in Hard DiskFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Session 4: Query Scheme
An Outward-Appearance Patent-Image Retrieval Approach Based on the Contour-Description MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 86-89
Session 4: Query Scheme
Executing Query over Encrypted Character Strings in DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Session 4: Query Scheme
A High-Level Query Interface for Web User?s Access to Data ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Session 4: Query Scheme
A User Oriented Query Interface for Web-Based Geographic Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Session 4: Query Scheme
SDBIA: A Novel Approach to Improve the Reading Performance of Large Objects for Object-Based Storage DeviceFull-text access may be available. Sign in or learn about subscription options.pp. 114-118
Session 5: Applications
A New Quasi-Human Algorithm for the Strongly Heterogeneous Container Loading ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Session 5: Applications
Adaptive Image Watermarking Algorithm in Contourlet DomainFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Session 5: Applications
Hybrid Tracking for Augmented Reality GIS RegistrationFull-text access may be available. Sign in or learn about subscription options.pp. 139-145
Session 5: Applications
Face Detection Based on LDA and NNFull-text access may be available. Sign in or learn about subscription options.pp. 146-154
Author Index
Author IndexFreely available from IEEE.pp. 155
Showing 29 out of 29