Default Cover Image

2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology

Dec. 27 2008 to Dec. 28 2008

Nagasahi

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-vii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from Workshop ChairsFreely available from IEEE.pp. viii
Papers
Organization CommitteeFreely available from IEEE.pp. ix
Papers
Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 3-9
Papers
Privacy-Preserving Practical Convex Hulls ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 10-16
Papers
A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
Papers
Dynamic Spectrum Allocation MAC Protocol Based on Cognitive Radio for QoS SupportFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Papers
An Energy Efficient Weight-Clustering Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 30-35
Papers
Tracking and Repairing Damaged Databases Using Before Image TableFull-text access may be available. Sign in or learn about subscription options.pp. 36-41
Papers
Access Graph Based Risk Assessment Model for Network Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 42-48
Papers
A Distributed Workflow Management System Model and Its Scheduling AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 51-58
Papers
Evolutionary Testing of Unstructured Programs Using a Testability Transformation ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 59-66
Papers
MP-Templates Operating Toolkit in Movie-Based ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 67-74
Papers
Design of General User Interface for Automatic Web Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Papers
Spatial Data Compression Techniques for GMLFull-text access may be available. Sign in or learn about subscription options.pp. 79-84
Papers
An Energy Efficient, Low Cost, Hybrid Storage System Based on UtilityFull-text access may be available. Sign in or learn about subscription options.pp. 87-95
Papers
TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 96-102
Papers
Study and Optimize the Process of Batch Small Files ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 103-111
Papers
A Duplicate-Aware Data ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Author's indexFreely available from IEEE.pp. 226-227
Papers
[Roster]Freely available from IEEE.pp. 228
Papers
A Novel Hybrid system for Large-Scale Chinese Text Classification ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 121-124
Papers
An Approach to Implementing an Intelligent Web SearchFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Papers
A Schema Matching Method Based on Partial Functional DependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
Papers
The Axiomatic Semantics of PDFDFull-text access may be available. Sign in or learn about subscription options.pp. 139-146
Papers
XenLR: Xen-based Logging for Deterministic ReplayFull-text access may be available. Sign in or learn about subscription options.pp. 149-154
Papers
VNIX: Managing Virtual Machines on ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 155-162
Papers
Hand Tracking by Particle Filtering with Elite Particles Mean ShiftFull-text access may be available. Sign in or learn about subscription options.pp. 163-167
Papers
A New Technique of Modeling Acoustic Echo and its Implementation Using FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 168-180
Papers
Towards Better Content Visibility in Video Recommender SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
Papers
Economical Solution for an Easy to Use Interactive WhiteboardFull-text access may be available. Sign in or learn about subscription options.pp. 197-203
Papers
An Invariant Pattern Recognition System Using the Bayesian Inference on Hierarchical Sequences with Pre-processingFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
Papers
Head Pose Recognition with NNC-TreesFull-text access may be available. Sign in or learn about subscription options.pp. 214-219
Papers
Inducing NNTrees Suitable for Hardware ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Showing 39 out of 39