Default Cover Image

2009 Fourth International Conference on Frontier of Computer Science and Technology

Dec. 17 2009 to Dec. 19 2009

Shanghai, China

ISBN: 978-0-7695-3932-4

Table of Contents

Papers
Conference organizationFreely available from IEEE.pp. xvi-xvii
Papers
Keynote Speech AbstractsFull-text access may be available. Sign in or learn about subscription options.pp. xxxiv-xxxix
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xiii
Papers
Technical Program CommitteeFreely available from IEEE.pp. xviii-xxiii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
PrefaceFreely available from IEEE.pp. xiv-xv
Papers
Message from the FCST 2009 Workshop ChairsFreely available from IEEE.pp. xxiv
Papers
Workshop Executive and Program CommitteesFreely available from IEEE.pp. xxx-xxxiii
Papers
One Multi-level Data Acquisition Strategy for Parallel Pre-stack Kirchhoff Depth MigrationFull-text access may be available. Sign in or learn about subscription options.pp. 3-8
Papers
A Study on the Preprocessing of MLFMA Parallel ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 9-13
Papers
A Systemic Strategy for Tuning Intra-node Collective Communication on Multicore SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 14-21
Papers
Formal Approach for Performance Analysis Oriented Parallel System DesignFull-text access may be available. Sign in or learn about subscription options.pp. 22-26
Papers
Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 27-32
Papers
A Program Behavior Study of Block Cryptography Algorithms on GPGPUFull-text access may be available. Sign in or learn about subscription options.pp. 33-39
Papers
A Resource-Efficient System for Measuring Flow Length DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 40-44
Papers
A Distributed Algorithm to Enumerate All Maximal Cliques in MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 45-51
Papers
Infiniband-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 52-58
Papers
A Heuristic Approach with Branch Cut to Service Substitution in Service OrchestrationFull-text access may be available. Sign in or learn about subscription options.pp. 59-67
Papers
Communication Latency Tolerant Parallel Algorithm for Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 68-74
Papers
High Performance and Parallel Model for LU Decomposition on FPGAsFull-text access may be available. Sign in or learn about subscription options.pp. 75-79
Papers
A Random-Walk-Based Dynamic Tree Evolution Algorithm with Exponential Speed of Convergence to Optimality on Regular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Papers
Performance Evaluation of Mobile Service Design Paradigm in Ubiquitous Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 89-95
Papers
An Improved Approach to Tag Reduction on Low Power CMP with Trade-Off of Energy and PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 96-102
Papers
Research on Hierarchical P2P Based RFID Code Resolution Network and Its SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 103-111
Papers
A Decentralized Cooperative Autonomic Management Model in Grid SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 112-118
Papers
A Markov Chain Based Resource Prediction in Computational GridFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Papers
ScudOSGi: Enabling Facility-Involved Task Migration in OSGi FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 125-131
Papers
The Application of the Adaptive Multi-mode Interactive Interface Based on Embedded EquipmentsFull-text access may be available. Sign in or learn about subscription options.pp. 156-160
Papers
Emergency Software Maintenance for Individual Industrial EquipmentsFull-text access may be available. Sign in or learn about subscription options.pp. 161-167
Papers
Efficient VLSI Architecture for Fuzzy C-Means Clustering in Reconfigurable HardwareFull-text access may be available. Sign in or learn about subscription options.pp. 168-174
Papers
Mining Interesting Rules by Association and Classification AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 177-182
Papers
Optimization of Data Retrievals in Processing Data Integration QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 183-189
Papers
A Tree-Based Hierarchy Framework for RFID Data RepositoryFull-text access may be available. Sign in or learn about subscription options.pp. 190-196
Papers
Reputation-Aware Scheduling for Storage Systems in Data GridsFull-text access may be available. Sign in or learn about subscription options.pp. 197-202
Papers
CWC: Compressed Write Cache for Improving Storage System PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 203-209
Papers
Combinatorial Auctions Based Network Resource Allocation Mechanism with High WelfareFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Papers
Automatic Data Extraction from Web Discussion ForumsFull-text access may be available. Sign in or learn about subscription options.pp. 219-225
Papers
Flexible Data Collecting over Distributed Sensors on Enterprise Service BusFull-text access may be available. Sign in or learn about subscription options.pp. 226-230
Papers
Analysis of the Availability of Composite Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 231-237
Papers
Wavelet Image Restoration and Regularization Parameters SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 241-247
Papers
Shearlet-Based Adaptive Bayesian Estimator for Image DenoisingFull-text access may be available. Sign in or learn about subscription options.pp. 248-253
Papers
Image Denoising Algorithm Using Adaptive Shrinkage Threshold Based on Shearlet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Papers
A Depth-Based TDMA Scheduling for Clustering Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 261-266
Papers
Notice of Violation of IEEE Publication PrinciplesImmune Selection Algorithm-Based User Authentication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 377-381
Notice of Violation of IEEE Publication Principles: Immune Selection Algorithm-Based User Authentication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 377-381
Papers
A Storage Node Placement Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 267-271
Papers
TCLA: A Triangular Cross-Layer Architecture for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 272-278
Papers
Optimizing the Path-Points Identification for Data Mules in Mobile WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 279-284
Papers
Mobile Robot Position Identification with Specially Designed LandmarksFull-text access may be available. Sign in or learn about subscription options.pp. 285-291
Papers
A Realistic Interference Model in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Papers
An Improved Path-Based Reliability Prediction Model for Component-Based Embedded SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 301-307
Papers
CURRF: A Code-Based Framework for Faithful Replay Distributed ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 308-316
Papers
A Chu Spaces Semantics of BPEL-Like Fault HandlingFull-text access may be available. Sign in or learn about subscription options.pp. 317-323
Papers
Intrusion Detection Using Geometrical StructureFull-text access may be available. Sign in or learn about subscription options.pp. 327-333
Papers
Analysis and Research on the Security Key Technology of GridFull-text access may be available. Sign in or learn about subscription options.pp. 334-338
Papers
Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for GridFull-text access may be available. Sign in or learn about subscription options.pp. 339-345
Papers
Indirect Disclosures in Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
Papers
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6Full-text access may be available. Sign in or learn about subscription options.pp. 351-355
Papers
Optimizing Method for Analog Circuit Design Using Adaptive Immune Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 359-363
Papers
The Application of Genetic Algorithm into Membership Function FLC Used Floating PointFull-text access may be available. Sign in or learn about subscription options.pp. 364-370
Papers
A Fuzzy Clustering Algorithm with Effectiveness FactorFull-text access may be available. Sign in or learn about subscription options.pp. 371-376
Papers
Mining Data of Buffalo and Cow Production in EgyptFull-text access may be available. Sign in or learn about subscription options.pp. 382-387
Papers
Comparison of Heuristic Algorithms to Solving Mesh Network Path Finding ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 388-392
Papers
A Chinese Health Care Reform Simulation Method Based on Mechanism DesignFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Papers
A Local Algorithm for Checking Probabilistic BisimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 401-407
Papers
A Framework for Formalizing UML Models with Formal Language RcosFull-text access may be available. Sign in or learn about subscription options.pp. 408-416
Papers
Analyzing UML Sequence Diagrams with UTPFull-text access may be available. Sign in or learn about subscription options.pp. 417-423
Papers
Automatic Refinement of Platform Independent Models Using Graph Transformation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 424-428
Papers
Modeling Software Testing Process Using HTCPNFull-text access may be available. Sign in or learn about subscription options.pp. 429-434
Papers
Return Instruction Analysis and Optimization in Dynamic Binary TranslationFull-text access may be available. Sign in or learn about subscription options.pp. 435-440
Papers
Structure and Parameter Learning of CDHMM Based on ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 441-445
Papers
A Graph Transformation-Based Approach for Applying MDA to SOAFull-text access may be available. Sign in or learn about subscription options.pp. 446-451
Papers
Research & Implementation of Lightweight ESB with Microsoft .NETFull-text access may be available. Sign in or learn about subscription options.pp. 455-459
Papers
Design and Implementation of DSL via Category Theoretic ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 460-466
Papers
Design and Implementation of Integrated Transport Network Planning Evaluation System Based on GISFull-text access may be available. Sign in or learn about subscription options.pp. 467-472
Papers
Signal Integrity Research of High Speed Circuit of Embedded SystemFull-text access may be available. Sign in or learn about subscription options.pp. 473-477
Papers
An Embedded Software Architecture for Robot with Variable StructuresFull-text access may be available. Sign in or learn about subscription options.pp. 478-484
Papers
The Self-Adaptive Routing Evolution Model's Research about Internetware of Architecture-centric SystemFull-text access may be available. Sign in or learn about subscription options.pp. 485-491
Papers
A General Fuzzy Modeling Approach to Detection Decision FusionFull-text access may be available. Sign in or learn about subscription options.pp. 495-501
Papers
A Multi-scale Based Algorithm for Sub-pixel Measurements of Circular PartsFull-text access may be available. Sign in or learn about subscription options.pp. 502-509
Papers
A New Recursive Approach for Reconstructing Metabolic Networks from KEGGFull-text access may be available. Sign in or learn about subscription options.pp. 510-515
Papers
A Case Study on Human Learning of Four-Dimensional Objects in Virtual Reality: Passive Exploration and Display TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 519-523
Papers
Extending BPEL to Model Business Processes Involving Human ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 524-529
Papers
Design and Implementation of Online Classroom Real-Time Generating and On-Demand SystemFull-text access may be available. Sign in or learn about subscription options.pp. 530-536
Papers
Remote Operation System Detection Base on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 539-542
Papers
An Algorithm for Unsplittable Flow Problem in Flexible Reconfigurable NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 543-547
Papers
EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 548-552
Papers
An Exact Model for Active P2P Worms PropagationFull-text access may be available. Sign in or learn about subscription options.pp. 553-558
Papers
Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 559-564
Papers
A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 565-570
Showing 100 out of 130