Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FCST
FCST 2009
Generate Citations
2009 Fourth International Conference on Frontier of Computer Science and Technology
Dec. 17 2009 to Dec. 19 2009
Shanghai, China
ISBN: 978-0-7695-3932-4
Table of Contents
Papers
Conference organization
Freely available from IEEE.
pp. xvi-xvii
Papers
Keynote Speech Abstracts
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxiv-xxxix
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xiii
Papers
Technical Program Committee
Freely available from IEEE.
pp. xviii-xxiii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Preface
Freely available from IEEE.
pp. xiv-xv
Papers
Message from the FCST 2009 Workshop Chairs
Freely available from IEEE.
pp. xxiv
Papers
Message from the Organizers of the 2009 International Workshop on Security Virtual Computing Environment
Freely available from IEEE.
pp. xxv
Papers
Message from the Organizers of the First International Workshop on Security Engineering Environment
Freely available from IEEE.
pp. xxvi
Papers
Message from the Organizers of the 2009 International Workshop on Wireless Computing and Networking
Freely available from IEEE.
pp. xxvii
Papers
Message from the Organizers of the International Workshop on Pervasive Service Computing and Applications
Freely available from IEEE.
pp. xxviii
Papers
Message from the Organizers of the 2009 International Workshop on Frontier of Secure Networks
Freely available from IEEE.
pp. xxix
Papers
Workshop Executive and Program Committees
Freely available from IEEE.
pp. xxx-xxxiii
Papers
One Multi-level Data Acquisition Strategy for Parallel Pre-stack Kirchhoff Depth Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-8
by
Jianjiang Li
,
Lin Yan
,
Dan Hei
,
Lei Zhang
Papers
A Study on the Preprocessing of MLFMA Parallel Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-13
by
Wang Xingang
,
Hu Yue
,
Cheng Bin
,
Tong Weiqin
Papers
A Systemic Strategy for Tuning Intra-node Collective Communication on Multicore Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-21
by
Zhiqiang Liu
,
Junqiang Song
,
Kaijun Ren
,
Fen Xu
,
Xiaoling Qu
Papers
Formal Approach for Performance Analysis Oriented Parallel System Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-26
by
Bin Cheng
,
Xingang Wang
,
Ying Li
,
Weiqing Tong
Papers
Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-32
by
Yaobin Wang
,
Hong An
,
Jie Yan
,
Qi Li
,
Wenting Han
,
Li Wang
,
Gu Liu
Papers
A Program Behavior Study of Block Cryptography Algorithms on GPGPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-39
by
Gu Liu
,
Hong An
,
Wenting Han
,
Guang Xu
,
Ping Yao
,
Mu Xu
,
Xiurui Hao
,
Yaobin Wang
Papers
A Resource-Efficient System for Measuring Flow Length Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-44
by
Weijiang Liu
,
Wenyu Qu
,
Hong Ye
,
Zhaobin Liu
,
Keqiu Li
Papers
A Distributed Algorithm to Enumerate All Maximal Cliques in MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-51
by
Bin Wu
,
Shengqi Yang
,
Haizhou Zhao
,
Bai Wang
Papers
Infiniband-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-58
by
Xiaoshuang Xia
,
Yi Liu
,
Yunbin Wang
,
Tengfei Mu
Papers
A Heuristic Approach with Branch Cut to Service Substitution in Service Orchestration
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-67
by
Jinbo Du
,
Haopeng Chen
,
Can Zhang
Papers
Communication Latency Tolerant Parallel Algorithm for Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-74
by
Bo Li
,
Koichi Wada
Papers
High Performance and Parallel Model for LU Decomposition on FPGAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-79
by
Yi Shao
,
Liehui Jiang
,
Qiuxia Zhao
,
Yuliang Wang
Papers
A Random-Walk-Based Dynamic Tree Evolution Algorithm with Exponential Speed of Convergence to Optimality on Regular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Keqin Li
Papers
Performance Evaluation of Mobile Service Design Paradigm in Ubiquitous Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-95
by
Songqiao Han
,
Yong Zhang
Papers
An Improved Approach to Tag Reduction on Low Power CMP with Trade-Off of Energy and Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-102
by
Long Zheng
,
Mianxiong Dong
,
Hai Jin
,
Minyi Guo
,
Li Li
Papers
Research on Hierarchical P2P Based RFID Code Resolution Network and Its Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-111
by
Wen Zhao
,
Xueyang Liu
,
Xinpeng Li
,
Dianxing Liu
,
Shikun Zhang
Papers
A Decentralized Cooperative Autonomic Management Model in Grid Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-118
by
Jiangfeng Li
,
Chenxi Zhang
Papers
A Markov Chain Based Resource Prediction in Computational Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Shi Lili
,
Yang Shoubao
,
Guo Liangmin
,
Wu Bin
Papers
ScudOSGi: Enabling Facility-Involved Task Migration in OSGi Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-131
by
Yuqiong Xu
,
Shijian Li
,
Gang Pan
Papers
Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part One
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-141
by
Tomohiro Sugahara
,
Masato Honda
,
Arata Shinozaki
,
Takayuki Nakatomi
,
Mitsunori Kubo
,
Minyi Guo
Papers
Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part Two
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-148
by
Tatsuya Sakuma
,
Masato Honda
,
Tomohiro Sugahara
,
Arata Shinozaki
,
Takayuki Nakatomi
,
Mitsunori Kubo
,
Minyi Guo
Papers
Network-Based Data Flow Processing System with Variable Data Granularity for Inter-module Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-155
by
Masayuki Moriguchi
,
Arata Shinozaki
,
Takayuki Nakatomi
,
Mitsunori Kubo
,
Minyi Guo
Papers
The Application of the Adaptive Multi-mode Interactive Interface Based on Embedded Equipments
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-160
by
Ying Li
,
Chengchen Ge
,
Weiqin Tong
,
Bin Cheng
,
Xiaoli Zhi
Papers
Emergency Software Maintenance for Individual Industrial Equipments
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-167
by
Lianlai Wang
,
Peitao Wang
,
Yujun Zheng
Papers
Efficient VLSI Architecture for Fuzzy C-Means Clustering in Reconfigurable Hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-174
by
Hui-Ya Li
,
Cheng-Tsun Yang
,
Wen-Jyi Hwang
Papers
Mining Interesting Rules by Association and Classification Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-182
by
Willy Yanthy
,
Takayuki Sekiya
,
Kazunori Yamaguchi
Papers
Optimization of Data Retrievals in Processing Data Integration Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-189
by
Jia Liu
,
Yongwei Wu
,
Guangwen Yang
Papers
A Tree-Based Hierarchy Framework for RFID Data Repository
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-196
by
Youyou Lu
,
Zhuzhong Qian
,
Sanglu Lu
Papers
Reputation-Aware Scheduling for Storage Systems in Data Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-202
by
Wei Liu
,
Wei Du
Papers
CWC: Compressed Write Cache for Improving Storage System Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-209
by
Suzhen Wu
,
Dan Feng
,
Bo Mao
Papers
Combinatorial Auctions Based Network Resource Allocation Mechanism with High Welfare
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-218
by
Tingting Wang
,
Jinkui Xie
,
Bei Jin
,
Zongyuan Yang
Papers
Automatic Data Extraction from Web Discussion Forums
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-225
by
Suke Li
,
Liyong Tang
,
Jianbin Hu
,
Zhong Chen
Papers
Flexible Data Collecting over Distributed Sensors on Enterprise Service Bus
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-230
by
Jing Cao
Papers
Analysis of the Availability of Composite Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-237
by
Tao Hu
,
Song Guo
,
Minyi Guo
,
Feilong Tang
,
Mianxiong Dong
Papers
Wavelet Image Restoration and Regularization Parameters Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-247
by
Leming Qu
Papers
Shearlet-Based Adaptive Bayesian Estimator for Image Denoising
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
Chengzhi Deng
,
Hui Sun
,
Xi Chen
Papers
Image Denoising Algorithm Using Adaptive Shrinkage Threshold Based on Shearlet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Xi Chen
,
Hui Sun
,
Chengzhi Deng
Papers
A Depth-Based TDMA Scheduling for Clustering Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-266
by
Zusheng Zhang
,
Fengqi Yu
,
Baoli Zhang
Papers
Notice of Violation of IEEE Publication PrinciplesImmune Selection Algorithm-Based User Authentication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-381
Notice of Violation of IEEE Publication Principles: Immune Selection Algorithm-Based User Authentication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-381
by
Jun Tang
,
Xiaojuan Zhao
Papers
A Storage Node Placement Algorithm in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-271
by
Yang Wang
,
Xiong Fu
,
Liusheng Huang
Papers
TCLA: A Triangular Cross-Layer Architecture for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-278
by
Daidi Lin
,
Shining Li
Papers
Optimizing the Path-Points Identification for Data Mules in Mobile WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-284
by
Liang He
,
Jingdong Xu
,
Yuntao Yu
,
Boxing Liu
Papers
Mobile Robot Position Identification with Specially Designed Landmarks
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-291
by
Huakang Li
,
Long Zheng
,
Jie Huang
,
Chunlei Zhao
,
Qunfei Zhao
Papers
A Realistic Interference Model in Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Yao Shen
,
Feilong Tang
,
Minyi Guo
,
Song Guo
Papers
An Improved Path-Based Reliability Prediction Model for Component-Based Embedded Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-307
by
Changde Li
,
Xingshe Zhou
,
Yuying Wang
,
Yunwei Dong
Papers
CURRF: A Code-Based Framework for Faithful Replay Distributed Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-316
by
Nan Wang
,
Jizhong Han
,
Yonghao Zhou
,
Jinyun Fang
Papers
A Chu Spaces Semantics of BPEL-Like Fault Handling
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-323
by
Xutao Du
,
Chunxiao Xing
,
Lizhu Zhou
Papers
Intrusion Detection Using Geometrical Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-333
by
Aruna Jamdagni
,
Zhiyuan Tan
,
Priyadarsi Nanda
,
Xiangjian He
,
Ren Liu
Papers
Analysis and Research on the Security Key Technology of Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-338
by
Zhang Longjun
Papers
Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-345
by
Junfeng Tian
,
Peng Yuan
,
Yuzhen Lu
Papers
Indirect Disclosures in Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Renren Dong
,
Ray Kresman
Papers
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Ilsun You
,
Kouichi Sakurai
,
Yoshiaki Hori
Papers
Optimizing Method for Analog Circuit Design Using Adaptive Immune Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-363
by
Haiqin Xu
,
Yongsheng Ding
Papers
The Application of Genetic Algorithm into Membership Function FLC Used Floating Point
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-370
by
Ismail Yusuf
,
Nanna Suryana Herman
,
Siti Maryam Hj Shamsuddin
Papers
A Fuzzy Clustering Algorithm with Effectiveness Factor
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-376
by
Dao-Lei Liang
,
Jian Jin
,
Guo-Xing Huang
Papers
Mining Data of Buffalo and Cow Production in Egypt
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-387
by
Laila Mohamed El Fangary
Papers
Comparison of Heuristic Algorithms to Solving Mesh Network Path Finding Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-392
by
Jacek Kubacki
,
Leszek Koszalka
,
Iwona Pozniak-Koszalka
,
Andrzej Kasprzak
Papers
A Chinese Health Care Reform Simulation Method Based on Mechanism Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-398
by
Guanqun Liang
,
Huanye Sheng
Papers
A Local Algorithm for Checking Probabilistic Bisimilarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-407
by
Yuxin Deng
,
Wenjie Du
Papers
A Framework for Formalizing UML Models with Formal Language Rcos
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-416
by
Jing Yang
Papers
Analyzing UML Sequence Diagrams with UTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-423
by
Jing Yang
Papers
Automatic Refinement of Platform Independent Models Using Graph Transformation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-428
by
Sattar Hashemi
,
M. R. ZadMiralvad
Papers
Modeling Software Testing Process Using HTCPN
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-434
by
Lizhi Cai
,
Weiqin Tong
,
Bin Zhu
,
Juan Zhang
Papers
Return Instruction Analysis and Optimization in Dynamic Binary Translation
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-440
by
Sun Tingtao
,
Yang Yindong
,
Yang Hongbo
,
Guan Haibing
,
Liang Alei
Papers
Structure and Parameter Learning of CDHMM Based on Reduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-445
by
A. Vafaei
,
M. Miralipoor
Papers
A Graph Transformation-Based Approach for Applying MDA to SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-451
by
F. Taghizadeh
,
S. R. Taghizadeh
Papers
Research & Implementation of Lightweight ESB with Microsoft .NET
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-459
by
Li JiZhe
,
Yuan YongJun
Papers
Design and Implementation of DSL via Category Theoretic Computations
Full-text access may be available. Sign in or learn about subscription options.
pp. 460-466
by
Haifeng Ling
,
Xianzhong Zhou
,
Yujun Zheng
Papers
Design and Implementation of Integrated Transport Network Planning Evaluation System Based on GIS
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-472
by
Dong Li
,
Youli Lu
Papers
Signal Integrity Research of High Speed Circuit of Embedded System
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-477
by
Kaihua Xu
,
Jun Zhou
,
Yuhua Liu
,
Shuyun Dong
Papers
An Embedded Software Architecture for Robot with Variable Structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-484
by
Chorng-Shiuh Koong
,
Hung-Jui Lai
,
Kuan-Chou Lai
Papers
The Self-Adaptive Routing Evolution Model's Research about Internetware of Architecture-centric System
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-491
by
Xiaona Xia
,
Baoxiang Cao
,
Jiguo Yu
Papers
A General Fuzzy Modeling Approach to Detection Decision Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-501
by
Li Bicheng
,
Huang Jie
,
Yin Hujun
Papers
A Multi-scale Based Algorithm for Sub-pixel Measurements of Circular Parts
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-509
by
Bing Sun
,
Guohui Zhou
Papers
A New Recursive Approach for Reconstructing Metabolic Networks from KEGG
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-515
by
Tingting Zhou
,
Samuel K.F. Yung
,
Zhenghua Wang
,
Yunping Zhu
Papers
A Case Study on Human Learning of Four-Dimensional Objects in Virtual Reality: Passive Exploration and Display Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-523
by
Ranxiao Frances Wang
Papers
Extending BPEL to Model Business Processes Involving Human Activities
Full-text access may be available. Sign in or learn about subscription options.
pp. 524-529
by
Jia Chunxin
,
Lu Chaojun
Papers
Design and Implementation of Online Classroom Real-Time Generating and On-Demand System
Full-text access may be available. Sign in or learn about subscription options.
pp. 530-536
by
Dong Li
,
Youli Lu
Papers
Remote Operation System Detection Base on Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-542
by
Bofeng Zhang
,
Tiezheng Zou
,
Yongjun Wang
,
Baokang Zhang
Papers
An Algorithm for Unsplittable Flow Problem in Flexible Reconfigurable Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 543-547
by
Yuxiang Hu
,
Julong Lan
,
Chengwei Wan
Papers
EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 548-552
by
Yanxiang He
,
Tao Liu
,
Hai Zhong
,
Qi Xiong
Papers
An Exact Model for Active P2P Worms Propagation
Full-text access may be available. Sign in or learn about subscription options.
pp. 553-558
by
Weimin Luo
,
Jing Liu
,
Jingbo Liu
,
Chengyu Fan
Papers
Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 559-564
by
Yongsheng Liu
,
Jie Li
Papers
A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 565-570
by
Huang Lu
,
Jie Li
,
Guojun Wang
Showing 100 out of 130
Load More
Load All