Default Cover Image

Innovative Computing ,Information and Control, International Conference on

June 18 2008 to June 20 2008

Dalian, Liaoning China

ISBN: 978-0-7695-3161-8

Table of Contents

Frontiers of Information Technology
LiNeS: Virtual Network Environment for Network Administrator EducationFull-text access may be available. Sign in or learn about subscription options.pp. 1
Frontiers of Information Technology
Astronomy Teaching Resources Management System for Curators Using Information TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 2
Frontiers of Information Technology
Design of a Web Community for Female ResearchersFull-text access may be available. Sign in or learn about subscription options.pp. 3
Frontiers of Information Technology
Sketch RR-Tree: A Spatio-Temporal Aggregation Index for Network-Constrained Moving ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 4
Frontiers of Information Technology
Primary Content Block Detection from Web Page Clusters through Entropy and Semantic DistanceFull-text access may be available. Sign in or learn about subscription options.pp. 5
Frontiers of Information Technology
Educational Application and Evaluation of Medical Dialogue Visualization MethodFull-text access may be available. Sign in or learn about subscription options.pp. 6
Frontiers of Information Technology
Frame Registration of In-Vehicle Normal Camera with Omni-Directional Camera for Self-Position EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 7
Frontiers of Information Technology
Authentication Protocols for Mobile IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 8
Frontiers of Information Technology
The Research of Real-Time Database Technique Used in Power System Dispatcher Training SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 9
Frontiers of Information Technology
Research on Histogram Algorithm for Low Voltage Electrical Apparatus Switching Arc's Image EnhancementFull-text access may be available. Sign in or learn about subscription options.pp. 10
Frontiers of Information Technology
The Model and Simulation of Enterprise Competition Research Based on CASFull-text access may be available. Sign in or learn about subscription options.pp. 11
Frontiers of Information Technology
The Design of Long-Distance Steam Turbine Generator Rotor Windings Inter-Turn Short Circuit Fault Diagnose System Based on VB.NetFull-text access may be available. Sign in or learn about subscription options.pp. 12
Frontiers of Information Technology
Integrated Local/Global Traffic Network Analysis in a GISBased SystemFull-text access may be available. Sign in or learn about subscription options.pp. 13
Frontiers of Information Technology
Ubiquitous Experience Media for Computer-Mediated CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 14
Frontiers of Information Technology
Generating Bird's Eye View Images Depending on Vehicle Positions by View InterpolationFull-text access may be available. Sign in or learn about subscription options.pp. 16
Innovation in Information Hiding Technology
An Information Hiding Scheme Using SudokuFull-text access may be available. Sign in or learn about subscription options.pp. 17
Innovation in Information Hiding Technology
Feature-Based Image Watermarking Resisting Geometric AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 18
Innovation in Information Hiding Technology
An Adaptive Implementation for DCT-Based Robust Watermarking with Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 19
Innovation in Information Hiding Technology
DCT-Based Watermarking By Quotient-Embedding AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 20
Innovation in Information Hiding Technology
Gray-Image Encryption Using Multiplex Encoding MethodFull-text access may be available. Sign in or learn about subscription options.pp. 21
Innovation in Information Hiding Technology
A Novel Robust Watermarking Algorithm Based on Error Correction CodingFull-text access may be available. Sign in or learn about subscription options.pp. 22
Innovation in Information Hiding Technology
A Blind Watermark Algorithm in Mixed Transform Domain Based on Chaotic Sequence LocatingFull-text access may be available. Sign in or learn about subscription options.pp. 23
Innovation in Information Hiding Technology
Reversible Data Hiding Scheme for Color Image Protection Based on Palette Color ReplacementFull-text access may be available. Sign in or learn about subscription options.pp. 24
Innovation in Information Hiding Technology
Data Hiding in Image Size Invariant Visual CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 25
Innovation in Information Hiding Technology
An Error Resilient Technique Using Reversible Data Embedding in H.264/AVCFull-text access may be available. Sign in or learn about subscription options.pp. 26
Innovation in Information Hiding Technology
High Capacity Information Hiding Using Interpolation TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 27
Innovation in Information Hiding Technology
An Effective Data Embedding for Error ConcealmentFull-text access may be available. Sign in or learn about subscription options.pp. 28
Particle Swarm Optimization: Theories and Applications
A Modified Particle Swarm Optimization Based on a Chinese ArchaismFull-text access may be available. Sign in or learn about subscription options.pp. 29
Particle Swarm Optimization: Theories and Applications
A Particle Swarm Optimization Based on Improved Multi-Swarm and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 30
Particle Swarm Optimization: Theories and Applications
Improved Particle Swarm Optimization and Its ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 31
Particle Swarm Optimization: Theories and Applications
Practical Stability Analysis of Stochastic SwarmsFull-text access may be available. Sign in or learn about subscription options.pp. 32
Particle Swarm Optimization: Theories and Applications
Affine Transformation for Swarm Formations by Generalized Ant Colony OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 33
Particle Swarm Optimization: Theories and Applications
A Thermodynamical Selection Rule for the Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 34
Particle Swarm Optimization: Theories and Applications
A Bee Swarm Genetic Algorithm for the Optimization of DNA EncodingFull-text access may be available. Sign in or learn about subscription options.pp. 35
Particle Swarm Optimization: Theories and Applications
A Flexible Tracking PSO Algorithm for Non-Stationary Optimal SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 36
Particle Swarm Optimization: Theories and Applications
PSO-BPNN-Based Prediction of Network Security SituationFull-text access may be available. Sign in or learn about subscription options.pp. 37
Particle Swarm Optimization: Theories and Applications
Invariant Topology Snakes Driven by Particle Swarm OptimizerFull-text access may be available. Sign in or learn about subscription options.pp. 38
Quantitative Management of Technology
A Decision Making Approach on Strategic Alliance of Photovoltaic Industry Based on DEA and GMFull-text access may be available. Sign in or learn about subscription options.pp. 39
Quantitative Management of Technology
An Approach on Alliance for Online Game IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 40
Quantitative Management of Technology
The Role of Information Seeking Behavior in Newcomers' Organizational SocializationFull-text access may be available. Sign in or learn about subscription options.pp. 41
Quantitative Management of Technology
Applying Orthogonal Arrays Method to Solve Fuzzy Interval for Fuzzy Weighted AverageFull-text access may be available. Sign in or learn about subscription options.pp. 42
Quantitative Management of Technology
A Study of Relationships Among Social Learning, Social Norms and Pro-Environmental BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 43
Face Recognition System with Distorted Principal Component Analysis and Fuzzy-Gaussian Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 59-59
Quantitative Management of Technology
Object-Oriented Case-Based Reasoning System for Collaborative New Product DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 44
Quantitative Management of Technology
Case-Based Reasoning System for Forging Process DesignFull-text access may be available. Sign in or learn about subscription options.pp. 45
Quantitative Management of Technology
Vendor Managed Inventory Dynamics Using the Weakest t-Norm Based on Fuzzy Number Arithmetic OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 46
Quantitative Management of Technology
Analysis on Optimal Ordering Policies in Response to a Temporary SaleFull-text access may be available. Sign in or learn about subscription options.pp. 47
Quantitative Management of Technology
Evaluating Supply Chain Performance Based on Delivery Performance Analysis Chart ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 48
Quantitative Management of Technology
Lifetime-Based Supplier Selection for the Exponential Model with Censored and Imprecise InformationFull-text access may be available. Sign in or learn about subscription options.pp. 49
3-D Sound Source Detection by Binaural Model Using Self Organizing MapFull-text access may be available. Sign in or learn about subscription options.pp. 66-66
Advanced Image Recognition and Retrieval
Novel Search Engine: Combination of Link and Popularity Rank for Multimedia RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 50
Advanced Image Recognition and Retrieval
Retrieval of Three-Dimensional Image from Compound-Eye Imaging with Defocus Using Ray TracingFull-text access may be available. Sign in or learn about subscription options.pp. 51
Advanced Image Recognition and Retrieval
Robust Detection and Segmentation of Images with ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 52
Advanced Image Recognition and Retrieval
Recognition and Textual Description of Human Activities by Mobile RobotFull-text access may be available. Sign in or learn about subscription options.pp. 53
On Construction of Chinese Medicine Ontology Concept's Description ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 70-70
Advanced Image Recognition and Retrieval
Mechanism of Formation of Vision Based on Learning of Correlation between Sensation and MotionFull-text access may be available. Sign in or learn about subscription options.pp. 54
Advanced Image Recognition and Retrieval
Measurement of 3D Distance between Artificial Cement-Type Cup and Head After THRFull-text access may be available. Sign in or learn about subscription options.pp. 55
Advanced Image Recognition and Retrieval
Hierarchical Attention Focusing and a Display Method for Small Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 56
Advanced Image Recognition and Retrieval
Flatbed-Type Three-Dimensional Display System as a Tool for Cooperation WorkingFull-text access may be available. Sign in or learn about subscription options.pp. 57
Advanced Image Recognition and Retrieval
Design and Development of a Tactile Shape Display by Optical SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 58
Computer Technologies for Intelligent Systems
Feature Extraction of EEG Waves Based on Morphological Multiresolution AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 60
Computer Technologies for Intelligent Systems
Study on the Visualization of the Impression of Button SoundsFull-text access may be available. Sign in or learn about subscription options.pp. 61
Computer Technologies for Intelligent Systems
Construction of Speech Support System Using Body-Conducted Speech Recognition for DisordersFull-text access may be available. Sign in or learn about subscription options.pp. 62
Computer Technologies for Intelligent Systems
Inspection of Smooth Metallic Surface Using Complex Discrete Wavelet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 63
Computer Technologies for Intelligent Systems
Neurofuzzy Force-Based Control in an Ethernet-Based Application. A Case Study on a Drilling ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 64
Computer Technologies for Intelligent Systems
A Virtual Prototype Design Approach of the Embedded Hybrid SystemFull-text access may be available. Sign in or learn about subscription options.pp. 65
Computer Technologies for Intelligent Systems
Implementations of Robot Visual Servo by LearningFull-text access may be available. Sign in or learn about subscription options.pp. 67
Computer Technologies for Intelligent Systems
A Knowledge Based Video Quality Guarantee MethodFull-text access may be available. Sign in or learn about subscription options.pp. 68
Computer Technologies for Intelligent Systems
Creating Depth Map from 2D Scene ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 69
Information Sharing and Data/Text Mining and Discover
Manuscript Status Control Algorithm in Electronic PeriodicalsFull-text access may be available. Sign in or learn about subscription options.pp. 71
Information Sharing and Data/Text Mining and Discover
The Algorithmic Research on the Acquisition of Multiplex Pulse PeriodFull-text access may be available. Sign in or learn about subscription options.pp. 72
Information Sharing and Data/Text Mining and Discover
Sequential Pattern Mining for Chinese E-mail Authorship IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 73
Information Sharing and Data/Text Mining and Discover
Mining Rules from Stamping Die DesignsFull-text access may be available. Sign in or learn about subscription options.pp. 74
Information Sharing and Data/Text Mining and Discover
Mining the URLs: An Approach to Measure the Similarities between Named-EntitiesFull-text access may be available. Sign in or learn about subscription options.pp. 75
Information Sharing and Data/Text Mining and Discover
Mining Closed Frequent Itemsets in Sliding Window over Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 76
A New Multi-Classification Method Based on Binary Tree Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 77-77
Information Sharing and Data/Text Mining and Discover
A Block-Structured Mining Approach from Audit LogsFull-text access may be available. Sign in or learn about subscription options.pp. 78
Information Sharing and Data/Text Mining and Discover
Problem Solving with Unstructured InformationFull-text access may be available. Sign in or learn about subscription options.pp. 79
Novel Approaches to Pervasive Applications
Simulation and Implementation of High-Performance Collision Warning System for Motor Vehicle Safety Using Embedded ANFIS PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 80
Novel Approaches to Pervasive Applications
Sophisticated Computation of Hardware-Software Partition for Embedded Multiprocessor FPGA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 81
Novel Approaches to Pervasive Applications
A Fuzzy-Rough Set Based Semantic Similarity Measure Between Cross-Lingual DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 82
Novel Approaches to Pervasive Applications
General Model of Multiple Weights Fuzzy Appraisal SystemFull-text access may be available. Sign in or learn about subscription options.pp. 83
Novel Approaches to Pervasive Applications
Scheduling Sporadic, Hard Real-Time Tasks with ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 84
Novel Approaches to Pervasive Applications
Multiclass Least Squares Auto-Correlation Wavelet Support Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 85
Novel Approaches to Pervasive Applications
A Lightweight, Fault-Tolerant, Load Balancing Service Discovery and Invocation Algorithm for Pervasive Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 86
Novel Approaches to Pervasive Applications
Towards Automation for Pervasive Network Security Management Using an Integration of Ontology-Based and Policy-Based ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 87
Novel Approaches to Pervasive Applications
An Expectation Trust Benefit Driven Algorithm for Resource Scheduling in Grid ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 88
Models and Algorithms for Optimization
Uplink Spatial Division Multiple Access (SDMA) Optimization of Smart Antennas by Phase-Amplitude Perturbations Based on Memetic AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 89
Models and Algorithms for Optimization
The Users' Privacy Protecting Scheme Based on Knapsack ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 90
A Real-Time Exhaust Monitoring System Based on NDIR and ZIGBEEFull-text access may be available. Sign in or learn about subscription options.pp. 106-106
Models and Algorithms for Optimization
Using A Priori Information to Reduce the Computational Complexity of RBF-Assisted Turbo EqualizationFull-text access may be available. Sign in or learn about subscription options.pp. 92
Models and Algorithms for Optimization
A Full Connection and Less Memory Usage Scheme for Distributed Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 93
Models and Algorithms for Optimization
Object Localization Based on Global Structure Constraint Model and Optimal AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 94
Models and Algorithms for Optimization
Test Paper Problem Solved by Binary Ant Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 95
Models and Algorithms for Optimization
Improved Minimum-Range Approach to Blind Extraction of Bounded SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 96
Models and Algorithms for Optimization
Optimization Matching of Sensor and Weapon System Based on Geometric ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 97
Models and Algorithms for Optimization
The Learning System of Intuitionistic Optimum Based on Hesitancy SetFull-text access may be available. Sign in or learn about subscription options.pp. 98
Information Networking and Applications
Simulation Based Analysis of Queueing Property for Continuous Self-Similar TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 99
Showing 100 out of 606