Default Cover Image

2008 7th IEEE/ACIS International Conference on Computer and Information Science (ICIS '08)

May 14 2008 to May 16 2008

Portland, OR

Table of Contents

Papers
Conference organizersFreely available from IEEE.pp. xvi
Papers
Table of contentsFreely available from IEEE.pp. v-xiii
Papers
Program CommitteeFreely available from IEEE.pp. xvii-xix
A Rate Control Protocol for High Speed Streaming VideoFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
A Real -Time Interactive Visualization System for DNS Amplification Attack ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 55-60
Papers
Title Page iv - Copyright PageFreely available from IEEE.pp. iv
Efficient Complex Event Processing over RFID Data StreamFull-text access may be available. Sign in or learn about subscription options.pp. 75-81
Papers
Message from the Conference ChairsFreely available from IEEE.pp. xiv
Papers
Message from the Program ChairsFreely available from IEEE.pp. xv
Papers
Software Architectures for Task-Oriented ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 3
Papers
Issues and Models of Security Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 4
(Τ, λ)-Uniqueness: Anonymity Management for Data PublicationFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Papers
Collaboration between Security Devices toward improving Network DefenseFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Papers
Trust Mechanism in Distributed Access Control Model of P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
Papers
Convergence Analysis of Jacobi Iterative Method Using Logarithmic Number SystemFull-text access may be available. Sign in or learn about subscription options.pp. 27-32
Papers
Effective RTL Method to Develop On-Line Self-Test Routine for the Processors Using the Wavelet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 33-38
Papers
Radix Plus Length Based Insert SortFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
Papers
An Integer Linear Programming Approach for Dedicated Machine ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
Papers
Tabu Search Solution for Fuzzy Linear ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 82-87
Papers
Temperature Control for the Thermal Cycling of Polymerase Chain ReactionFull-text access may be available. Sign in or learn about subscription options.pp. 88-92
Papers
A Parallel Algorithm for Closed Cube ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
Region-Based Image Fusion Approach Using Iterative AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
Papers
An Efficient Structural Index for Graph-Structured DataFull-text access may be available. Sign in or learn about subscription options.pp. 100-106
Papers
(t, λ)-Uniqueness: Anonymity Management for Data PublicationFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Papers
Autonomic Computing in SQL ServerFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Research of English-Chinese Alignment at Word Granularity on Parallel CorporaFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Papers
Cross-Channel Customer MappingFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
Papers
DBPowder-mdl: Mapping Description Language between Applications and DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
Papers
Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information LossFull-text access may be available. Sign in or learn about subscription options.pp. 133-139
Papers
Entropy Based Clustering of Data Streams with Mixed Numeric and Categorical ValuesFull-text access may be available. Sign in or learn about subscription options.pp. 140-145
Papers
Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian BanksFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Papers
Privacy-Preserving Data Publishing Based on De-clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Papers
Schema Versioning in Multi-temporal XML DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 158-164
Papers
Subspace Clustering of High Dimensional Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
Papers
Synchronizer - A Web-Based Application to Enhance Capabilities of NEESCentral Web PortalFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Papers
A Fast and Accurate Iris Recognition Method Using the Complex Inversion Map and 2DPCAFull-text access may be available. Sign in or learn about subscription options.pp. 179-184
Papers
A Novel Image Text Extraction Method Based on K-Means ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 185-190
Papers
Attention Model Based SIFT Keypoints Filtration for Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 191-196
Papers
Content-Based Classifying Traditional Chinese Calligraphic ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 197-201
Papers
Three Dimensional Face Recognition Using SVM ClassifierFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
Papers
A Novel Detection Method of Filled Pause in Mandarin Spontaneous SpeechFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Efficient Projection for Compressed SensingFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Papers
Objective Types for the Valuation of Secure Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 231-236
Papers
On-Line Network Reachability Analysis Using Forward Information Base EmulationFull-text access may be available. Sign in or learn about subscription options.pp. 237-240
Papers
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
Papers
Verification of Unstructured Workflows via Propositional LogicFull-text access may be available. Sign in or learn about subscription options.pp. 247-252
Papers
Agent Based Architecture for Secure Access from Multiple HospitalsFull-text access may be available. Sign in or learn about subscription options.pp. 255-258
Papers
P2P Distributed Intrusion Detections by Using Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 259-265
Papers
An Adaptive Index of XML for Frequent Branching Path QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 269-275
Papers
Email Categorization Using (2+1)-Tier Classification AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 276-281
Research and Application of Information Granulation Based on Extension MethodFull-text access may be available. Sign in or learn about subscription options.pp. 377-381
Papers
Identity-Based Conference Key Distribution Scheme Using Sealed LockFull-text access may be available. Sign in or learn about subscription options.pp. 282-286
Papers
SIMPA: A SIP-Based Mobile Payment ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 287-292
Papers
A Document Clustering Method Based on One-Dimensional SOMFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
Papers
A Genetic Algorithm for Finding Minimal Multi-homogeneous Bézout NumberFull-text access may be available. Sign in or learn about subscription options.pp. 301-305
Papers
An Effective Data Classification Algorithm Based on the Decision Table GridFull-text access may be available. Sign in or learn about subscription options.pp. 306-311
Papers
An Extensive Empirical Study of Feature Selection for Text CategorizationFull-text access may be available. Sign in or learn about subscription options.pp. 312-315
Papers
An Improved Condensing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Papers
Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 328-333
Papers
Low Dimensional Reproduction Strategy for Real-Coded Evolutionary AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Papers
Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 340-346
Papers
Optimizing Text Summarization Based on Fuzzy LogicFull-text access may be available. Sign in or learn about subscription options.pp. 347-352
Papers
A Solution Framework on Fundamentals in Model TransformationFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
Papers
EESM for IEEE 802.16e: WiMaXFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
Papers
Lessons Learned from Implementing WS-Coordination and WS-AtomicTransactionFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
Papers
Observations on Liner Prediction Based Blind Source Extraction AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 373-376
Papers
Sensor Data Collection of the Single Location Surveillance Point SystemFull-text access may be available. Sign in or learn about subscription options.pp. 382-387
Papers
A Novel Enterprise Mobile E-mail System Using the SyncML ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
Papers
Design and Implementation of Wireless Sensor Network for Ubiquitous Glass HousesFull-text access may be available. Sign in or learn about subscription options.pp. 397-400
Papers
Distributed Detection in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 401-406
Papers
An Empirical Analysis of Intel Thread Checker for Detecting Races in OpenMP ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 409-414
Papers
Execution Time Analysis of a Parallel Steiner Tree Algorithm on Server-Client Model of ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 415-420
Papers
Exponential Integral Methods for Burgers EquationFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
Papers
Gauging the OpenSourceMark Benchmark in Measuring CPU PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
Papers
Parallel Sorting on the Biswapped NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 439-443
Papers
Predicate Detection Modality and Semantics in Three Partially Synchronous ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 444-450
Papers
Control Network Programming Illustrated: Solving Problems with Inherent Graph-Like RepresentationFull-text access may be available. Sign in or learn about subscription options.pp. 453-459
Papers
An Effort-Based Approach to Measure Completeness of an Entity-Relationship ModelFull-text access may be available. Sign in or learn about subscription options.pp. 463-468
Papers
A Value-Added Predictive Defect Type Distribution Model Based on Project CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 469-474
Papers
Monitoring Software Projects with Earned Value Analysis and Use Case PointFull-text access may be available. Sign in or learn about subscription options.pp. 475-480
Papers
A Mechanical Approach for Deriving Algorithmic ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 483-487
Papers
Engineering Education - A Great Challenge to Software EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 488-495
Papers
Generating Algorithms plus Loop Invariants by Formal DerivationFull-text access may be available. Sign in or learn about subscription options.pp. 496-501
Papers
Manual Specific Testing and Quality Evaluation for Embedded SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 502-507
Papers
Mobile GUI Testing Tool based on Image FlowFull-text access may be available. Sign in or learn about subscription options.pp. 508-512
Papers
On the Precision and Accuracy of Impact Analysis TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 513-518
Papers
Quantitative Process Improvement in XP Using Six Sigma ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 519-524
Papers
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional JumpsFull-text access may be available. Sign in or learn about subscription options.pp. 525-530
Papers
Two-Dimensional Framework for Analyzing Variabilities in Software Product LinesFull-text access may be available. Sign in or learn about subscription options.pp. 531-536
Papers
Reconstructing Control Flow in Modulo Scheduled LoopsFull-text access may be available. Sign in or learn about subscription options.pp. 539-544
Papers
Recovering Variable-Argument Functions from Binary ExecutablesFull-text access may be available. Sign in or learn about subscription options.pp. 545-550
Papers
A New Operational Framework for Benchmarking the SAN ProductsFull-text access may be available. Sign in or learn about subscription options.pp. 553-560
Papers
A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMMFull-text access may be available. Sign in or learn about subscription options.pp. 561-566
Papers
Enhancing Data Flow Testing of Classes through Design by ContractFull-text access may be available. Sign in or learn about subscription options.pp. 567-574
Showing 100 out of 122