Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICIS
ICIS 2008
Generate Citations
2008 7th IEEE/ACIS International Conference on Computer and Information Science (ICIS '08)
May 14 2008 to May 16 2008
Portland, OR
Table of Contents
Papers
Conference organizers
Freely available from IEEE.
pp. xvi
Papers
Table of contents
Freely available from IEEE.
pp. v-xiii
Papers
Program Committee
Freely available from IEEE.
pp. xvii-xix
A Rate Control Protocol for High Speed Streaming Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Baosong Shan
,
Xiaogang Yang
,
Yaping Yang
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
A Real -Time Interactive Visualization System for DNS Amplification Attack Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-60
by
Huiming Yu
,
Xiangfeng Dai
,
Tomas Baxley
,
Jinsheng Xu
Papers
Title Page iv - Copyright Page
Freely available from IEEE.
pp. iv
Efficient Complex Event Processing over RFID Data Stream
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-81
by
Xingyi Jin
,
Xiaodong Lee
,
Ning Kong
,
Baoping Yan
Papers
Message from the Conference Chairs
Freely available from IEEE.
pp. xiv
Papers
Message from the Program Chairs
Freely available from IEEE.
pp. xv
Papers
Software Architectures for Task-Oriented Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 3
by
David Garlan
Papers
Issues and Models of Security Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 4
by
C. V. ramamoorthy
(Τ, λ)-Uniqueness: Anonymity Management for Data Publication
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
by
Qiong Wei
,
Yansheng Lu
,
Qiang Lou
Papers
Collaboration between Security Devices toward improving Network Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Meharouech Sourour
,
Bouhoula Adel
,
Abbes Tarek
Papers
Trust Mechanism in Distributed Access Control Model of P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Lei Wang
,
Yanqin Zhu
,
Lanfang Jin
,
Xizhao Luo
Papers
Convergence Analysis of Jacobi Iterative Method Using Logarithmic Number System
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-32
by
Peng Huang
,
Daniel H.-Y. Teng
,
Khan Wahid
,
Seok-Bum Ko
Papers
Effective RTL Method to Develop On-Line Self-Test Routine for the Processors Using the Wavelet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-38
by
Amin Asghari
,
Seied Ahmad Motamedi
,
Sepehr Attarchi
Papers
Comparison between New Quantum Approaches for Finding the Minimum or the Maximum of an Unsorted Set of Integers
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Mir Shahriar Emami
,
Mohammad Reza Fattahi
,
Hossein Keshmiri
Papers
Evaluation on Quantum Computation and Classic Parallel Approaches for Finding Estimation of the Length of Shortest Path in a Weighted Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-54
by
Mir Shahriar Emami
,
Mohammad Reza Fattahi
,
Hossein Keshmiri
Papers
Radix Plus Length Based Insert Sort
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
Yongcheng Zhang
Papers
An Integer Linear Programming Approach for Dedicated Machine Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Huy Nguyen Anh Pham
,
Arthur Shr
,
Peter P. Chen
Papers
Tabu Search Solution for Fuzzy Linear Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-87
by
M. Hadi Mashinchi
,
M. Reza Mashinchi
,
M. Mashinchi
Papers
Temperature Control for the Thermal Cycling of Polymerase Chain Reaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-92
by
Jinhe Wang
,
Nan Zhang
Papers
A Parallel Algorithm for Closed Cube Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-99
by
Jinguo You
,
Jianqing Xi
,
Pingjian Zhang
,
Hu Chen
Region-Based Image Fusion Approach Using Iterative Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-207
by
Yingjie Zhang
,
Liling Ge
Papers
An Efficient Structural Index for Graph-Structured Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-106
by
Yingjie Fan
,
Chenghong Zhang
,
Shuyun Wang
,
Xiulan Hao
,
Yunfa Hu
Papers
(t, λ)-Uniqueness: Anonymity Management for Data Publication
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
by
Qiong Wei
,
Yansheng Lu
,
Qiang Lou
Papers
Autonomic Computing in SQL Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Abdul Mateen
,
Basit Raza
,
Tauqeer Hussain
,
M. M. Awais
Research of English-Chinese Alignment at Word Granularity on Parallel Corpora
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Yang Xu
,
Hou-feng Wang
,
Xue-qiang Lu
Papers
Cross-Channel Customer Mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-126
by
Jayanta Basak
,
Sunil Goyal
Papers
DBPowder-mdl: Mapping Description Language between Applications and Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Tadashi Murakami
Papers
Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information Loss
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-139
by
Duc A. Tran
,
Khanh Vu
Papers
Entropy Based Clustering of Data Streams with Mixed Numeric and Categorical Values
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Shuyun Wang
,
Yingjie Fan
,
Chenghong Zhang
,
HeXiang Xu
,
Xiulan Hao
,
Yunfa Hu
Papers
Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Hemalatha Diwakar
,
Alka Vaidya
Papers
Privacy-Preserving Data Publishing Based on De-clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Qiong Wei
,
Yansheng Lu
,
Qiang Lou
Papers
Schema Versioning in Multi-temporal XML Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-164
by
Zouhaier Brahmia
,
Rafik Bouaziz
Papers
Subspace Clustering of High Dimensional Data Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Shuyun Wang
,
Yingjie Fan
,
Chenghong Zhang
,
HeXiang Xu
,
Xiulan Hao
,
Yunfa Hu
Papers
Synchronizer - A Web-Based Application to Enhance Capabilities of NEESCentral Web Portal
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
Thuy T. Le
,
Syeda Naema Hashmi
,
Kurt McMullin
Papers
A Fast and Accurate Iris Recognition Method Using the Complex Inversion Map and 2DPCA
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-184
by
Sepehr Attarchi
,
Karim Faez
,
Amin Asghari
Papers
A Novel Image Text Extraction Method Based on K-Means Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-190
by
Yan Song
,
Anan Liu
,
Lin Pang
,
Shouxun Lin
,
Yongdong Zhang
,
Sheng Tang
Papers
Attention Model Based SIFT Keypoints Filtration for Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-196
by
Ke Gao
,
Shouxun Lin
,
Yongdong Zhang
,
Sheng Tang
,
Huamin Ren
Papers
Content-Based Classifying Traditional Chinese Calligraphic Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-201
by
Zhong Gao
,
Guanming Lu
,
Daquan Gu
,
Chun He
Papers
Three Dimensional Face Recognition Using SVM Classifier
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-213
by
Mir Hashem Mousavi
,
Karim Faez
,
Amin Asghari
Papers
A Novel Detection Method of Filled Pause in Mandarin Spontaneous Speech
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Yan-Xiong Li
,
Qian-Hua He
,
Tao Li
Efficient Projection for Compressed Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-327
by
Vo Dinh Minh Nhat
,
Duc Vo
,
Subhash Challa
,
SungYoung Lee
Papers
Objective Types for the Valuation of Secure Business Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
by
Thomas Neubauer
,
Johannes Heurix
Papers
On-Line Network Reachability Analysis Using Forward Information Base Emulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-240
by
Young Dae Kim
,
Chan Kyou Hwang
,
Jae Hyoung Yoo
Papers
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
N. R. Sunitha
,
B. B. Amberker
,
Prashant Koulgi
Papers
Verification of Unstructured Workflows via Propositional Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Qianhui Althea Liang
,
J. Leon Zhao
Papers
Agent Based Architecture for Secure Access from Multiple Hospitals
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-258
by
Sun K. Yoo
,
Jun Choe
,
Do Yoon Kim
Papers
P2P Distributed Intrusion Detections by Using Mobile Agents
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-265
by
Dayong Ye
,
Quan Bai
,
Minjie Zhang
,
Zhen Ye
Papers
An Adaptive Index of XML for Frequent Branching Path Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-275
by
Yingjie Fan
,
Chenghong Zhang
,
Shuyun Wang
,
Xiulan Hao
,
Yunfa Hu
Notice of Violation of IEEE Publication Principles: Observations on Liner Prediction Based Blind Source Extraction Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-376
by
Min Gan
,
Hongfa Wang
,
Guoying Yue
,
Nan Xie
,
Haibo Zhang
Papers
Email Categorization Using (2+1)-Tier Classification Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-281
by
M. Rafiqul Islam
,
Wanlei Zhou
,
Morshed U. Chowdhury
Research and Application of Information Granulation Based on Extension Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-381
by
Minghui Wang
,
Yongquan Yu
,
Bi Zeng
Papers
Identity-Based Conference Key Distribution Scheme Using Sealed Lock
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-286
by
Yongquan Cai
,
Xiuying Li
Papers
SIMPA: A SIP-Based Mobile Payment Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
Ge Zhang
,
Feng Cheng
,
Christoph Meinel
Papers
A Document Clustering Method Based on One-Dimensional SOM
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-300
by
Yan Yu
,
Pilian He
,
Yushan Bai
,
Zhenlei Yang
Papers
A Genetic Algorithm for Finding Minimal Multi-homogeneous Bézout Number
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-305
by
Dongshu Yan
,
Jintao Zhang
,
Bo Yu
,
Changtong Luo
,
Shaoliang Zhang
Papers
An Effective Data Classification Algorithm Based on the Decision Table Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-311
by
Hongjie Liu
,
Boqin Feng
,
Jianjie Wei
Papers
An Extensive Empirical Study of Feature Selection for Text Categorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-315
by
Li-Qing Qiu
,
Ru-Yi Zhao
,
Gang Zhou
,
Sheng-Wei Yi
Papers
An Improved Condensing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-321
by
Xiulan Hao
,
Chenghong Zhang
,
Hexiang Xu
,
Xiaopeng Tao
,
Shuyun Wang
,
Yunfa Hu
Papers
Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-333
by
Ricardo Gacitua
,
Pete Sawyer
Papers
Low Dimensional Reproduction Strategy for Real-Coded Evolutionary Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-339
by
Changtong Luo
,
Shaoliang Zhang
,
Bo Yu
Papers
Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity Measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-346
by
Ryutaro Ichise
Papers
Optimizing Text Summarization Based on Fuzzy Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-352
by
Farshad Kyoomarsi
,
Hamid Khosravi
,
Esfandiar Eslami
,
Pooya Khosravyan Dehkordy
,
Asghar Tajoddin
Papers
A Solution Framework on Fundamentals in Model Transformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-360
by
Yucong Duan
,
Kyo-Chul Kang
,
Yuqing Gu
Papers
EESM for IEEE 802.16e: WiMaX
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-366
by
Shahid Mumtaz
,
Atilio Gamerio
,
Jonathan Rodriguez
Papers
Lessons Learned from Implementing WS-Coordination and WS-AtomicTransaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-372
by
Ivan Silva Neto
,
Francisco Reverbel
Papers
Observations on Liner Prediction Based Blind Source Extraction Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-376
by
Min Gan
,
Hongfa Wang
,
Guoying Yue
,
Nan Xie
,
Haibo Zhang
Papers
Sensor Data Collection of the Single Location Surveillance Point System
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-387
by
T. Räty
,
J. Oikarinen
,
M. Nieminen
,
M. Lindholm
Papers
A Novel Enterprise Mobile E-mail System Using the SyncML Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Jing Xie
,
Dan Yu
,
Shilong Ma
Papers
Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-400
by
Meong-hun Lee
,
Ki-bok Eom
,
Hyun-joong Kang
,
Chang-sun Shin
,
Hyun Yoe
Papers
Distributed Detection in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-406
by
Sheng-Tzong Cheng
,
Szu-Yun Li
,
Chia-Mei Chen
Papers
An Empirical Analysis of Intel Thread Checker for Detecting Races in OpenMP Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-414
by
Young-Joo Kim
,
Daeyoung Kim
,
Yong-Kee Jun
Papers
Execution Time Analysis of a Parallel Steiner Tree Algorithm on Server-Client Model of Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-420
by
Rashid Bin Muhammad
Papers
Exponential Integral Methods for Burgers Equation
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Jing-jun Zhao
,
Shu-xin Bao
,
Yu Li
Papers
Finite-State Modeling and Testing of Image Based Authentication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-432
by
Nitin
,
Durg Singh Chauhan
,
Vivek Kumar Sehgal
,
Ankit Mahanot
,
Pallavi Singh
,
Sohit Ahuja
,
Utkarsh Shrivastava
,
Manisha Rana
,
Vineet Punjabi
,
Shivam Vinay
,
Nakul Sharma
Papers
Gauging the OpenSourceMark Benchmark in Measuring CPU Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-438
by
Fadi N. Sibai
Papers
Parallel Sorting on the Biswapped Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-443
by
Wenhong Wei
,
Wenjun Xiao
,
Zhen Zhang
Papers
Predicate Detection Modality and Semantics in Three Partially Synchronous Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-450
by
Chunbo Chu
,
Monica Brockmeyer
Papers
Control Network Programming Illustrated: Solving Problems with Inherent Graph-Like Representation
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-459
by
Kostadin Kratchanov
,
Emilia Golemanova
,
Tzanko Golemanov
Papers
An Effort-Based Approach to Measure Completeness of an Entity-Relationship Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-468
by
Tauqeer Hussain
,
Mian M. Awais
Papers
A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 469-474
by
Youngki Hong
,
Jongmoon Baik
,
In-Young Ko
,
Ho-Jin Choi
Papers
Monitoring Software Projects with Earned Value Analysis and Use Case Point
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-480
by
Jinhua Li
,
Zhibing Ma
,
Huanzhen Dong
Papers
A Mechanical Approach for Deriving Algorithmic Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-487
by
haihe shi
,
jinyun xue
,
dawei du
Papers
Engineering Education - A Great Challenge to Software Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-495
by
Jaroslav Král
,
Michal Žemlicka
Papers
Generating Algorithms plus Loop Invariants by Formal Derivation
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-501
by
Haihe Shi
,
Dawei Du
,
Jinyun Xue
Papers
Manual Specific Testing and Quality Evaluation for Embedded Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-507
by
Seon-Jae Jang
,
Hae-Geun Kim
,
Youn-ky Chung
Papers
Mobile GUI Testing Tool based on Image Flow
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-512
by
Oh-Hyun Kwon
,
Sun-Myung Hwang
Papers
On the Precision and Accuracy of Impact Analysis Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 513-518
by
Lile Hattori
,
Dalton Guerrero
,
Jorge Figueiredo
,
João Brunet
,
Jemerson Damásio
Papers
Quantitative Process Improvement in XP Using Six Sigma Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-524
by
Sajid Ibrahim Hashmi
,
Jongmoon Baik
Papers
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-530
by
Chao Dai
,
Jianmin Pang
,
Rongcai Zhao
,
Xiaojun Ma
Papers
Two-Dimensional Framework for Analyzing Variabilities in Software Product Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-536
by
Mikyeong Moon
,
Heung Seok Chae
,
Junseok Park
,
Keunhyuk Yeom
Papers
Reconstructing Control Flow in Modulo Scheduled Loops
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-544
by
Miao Wang
,
Rongcai Zhao
,
Jianmin Pang
,
Guoming Cai
Papers
Recovering Variable-Argument Functions from Binary Executables
Full-text access may be available. Sign in or learn about subscription options.
pp. 545-550
by
Wen Fu
,
Rongcai Zhao
,
Jianmin Pang
,
Jingbo Zhang
Papers
A New Operational Framework for Benchmarking the SAN Products
Full-text access may be available. Sign in or learn about subscription options.
pp. 553-560
by
Prabu D.
,
Devi Prasad B.
,
Lakshminarayana Prasad K.
,
Kishor Arumilli
Papers
A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMM
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-566
by
Hoyeon Ryu
,
Dong-Kuk Ryu
,
Jongmoon Baik
Papers
Enhancing Data Flow Testing of Classes through Design by Contract
Full-text access may be available. Sign in or learn about subscription options.
pp. 567-574
by
Yogesh Singh
,
Anju Saha
Showing 100 out of 122
Load More
Load All