Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FCST
FCST 2008
Generate Citations
2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology
Dec. 27 2008 to Dec. 28 2008
Nagasahi
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from Workshop Chairs
Freely available from IEEE.
pp. viii
Papers
Organization Committee
Freely available from IEEE.
pp. ix
Papers
Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-9
by
Hassen Redwan
,
Ki-Hyung Kim
Papers
Privacy-Preserving Practical Convex Hulls Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-16
by
Youwen Zhu
,
Liusheng Huang
,
Wei Yang
,
Zhili Chen
,
Lingjun Li
,
Zhenshan Yu
,
Yonglong Luo
Papers
A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Dong Li
,
Liusheng Huang
,
Wei Yang
,
Youwen Zhu
,
Yonglong Luo
,
Zhili Chen
,
Lingjun Li
,
Yun Ye
Papers
Dynamic Spectrum Allocation MAC Protocol Based on Cognitive Radio for QoS Support
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Inwhee Joe
,
Seonbong Son
Papers
An Energy Efficient Weight-Clustering Algorithm in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
Lu Cheng
,
Depei Qian
,
Weiguo Wu
Papers
Tracking and Repairing Damaged Databases Using Before Image Table
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Meiyi Xie
,
Hong Zhu
,
Yucai Feng
,
Guanrong Hu
Papers
Access Graph Based Risk Assessment Model for Network Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-48
by
Huan Wang
,
Gendu Zhang
Papers
A Distributed Workflow Management System Model and Its Scheduling Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-58
by
Ding Changsong
,
Hu Zhoujun
,
Hu Zhigang
,
Li Xi
Papers
Evolutionary Testing of Unstructured Programs Using a Testability Transformation Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-66
by
Sheng Jiang
,
Yansheng Lu
Papers
MP-Templates Operating Toolkit in Movie-Based Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-74
by
Dmitry Vazhenin
,
Alexander Vazhenin
Papers
Design of General User Interface for Automatic Web Service Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Haruhiko Takada
,
Incheon Paik
Papers
Spatial Data Compression Techniques for GML
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-84
by
Yuzhen Li
,
Takashi Imaizumi
,
Jihong Guan
Papers
An Energy Efficient, Low Cost, Hybrid Storage System Based on Utility
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-95
by
Lingfang Zeng
,
Dan Feng
,
Bharadwaj Veeravalli
,
Qingsong Wei
Papers
TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-102
by
Jingning Liu
,
Tianming Yang
,
Zuoheng Li
,
Ke Zhou
Papers
Study and Optimize the Process of Batch Small Files Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-111
by
Liang Xiao
,
Qiang Cao
,
Changsheng Xie
,
Chuanwen Wu
Papers
A Duplicate-Aware Data Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
Zhu Jianfeng
,
Qin Leihua
,
Zeng Dong
,
Zhou Jinli
Author's index
Freely available from IEEE.
pp. 226-227
Papers
[Roster]
Freely available from IEEE.
pp. 228
Papers
A Novel Hybrid system for Large-Scale Chinese Text Classification Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-124
by
Zhong Gao
,
Guanming Lu
,
Daquan Gu
Papers
An Approach to Implementing an Intelligent Web Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Vitaly Klyuev
Papers
A Schema Matching Method Based on Partial Functional Dependencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-138
by
Li Guo-Hui
,
Du Xiao-Kun
,
Hu Fang-Xiao
,
Du Jian-Qiang
Papers
The Axiomatic Semantics of PDFD
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-146
by
Gao Xiaolei
,
Huaikou Miao
Papers
XenLR: Xen-based Logging for Deterministic Replay
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-154
by
Haikun Liu
,
Hai Jin
,
Xiaofei Liao
,
Zhengqiu Pan
Papers
VNIX: Managing Virtual Machines on Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-162
by
Xuanhua Shi
,
Haoyu Tan
,
Song Wu
,
Hai Jin
Papers
Hand Tracking by Particle Filtering with Elite Particles Mean Shift
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-167
by
Shengtong Zhong
,
Fei Hao
Papers
A New Technique of Modeling Acoustic Echo and its Implementation Using FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-180
by
Amin Mohamed Nassar
,
Ashraf Mohamed Ali
Papers
Towards Better Content Visibility in Video Recommender Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-185
by
Nalin Chakoo
,
Rahul Gupta
,
Jayaprada Hiremath
Papers
Optimizing Two-Dimensional Continuous Dynamic Programming for Cell Broadband Engine Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
Takahiro Machino
,
Shin-ya Iwazaki
,
Yuichi Okuyama
,
Junji Kitamichi
,
Ken-ichi Kuroda
,
Ryuichi Oka
Papers
Economical Solution for an Easy to Use Interactive Whiteboard
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-203
by
Zhixun Wang
,
James Louey
Papers
A Segment Extraction Algorithm Based on Polygonal Approximation for On-Line Chinese Character Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-207
by
Xinqiao Lu
,
Xiaojuan Liu
,
Guoqiang Xiao
,
Enmin Song
,
Ping Li
,
Qiaoling Luo
Papers
An Invariant Pattern Recognition System Using the Bayesian Inference on Hierarchical Sequences with Pre-processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-213
by
Zunyi Tang
,
Wenlong Liu
,
Shuxue Ding
Papers
Head Pose Recognition with NNC-Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-219
by
Jie Ji
,
Kei Sato
,
Naoki Tominaga
,
Qiangfu Zhao
Papers
Inducing NNTrees Suitable for Hardware Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-225
by
Hirotomo Hayashi
,
Qiangfu Zhao
Showing 39 out of 39