Default Cover Image

Computer Science-Technology and Applications, International Forum on

Dec. 25 2009 to Dec. 27 2009

Chongqing, China

ISBN: 978-0-7695-3930-0

Volume:

Table of Contents

Papers
[Publisher's information - Volume 2]Freely available from IEEE.pp. 482
Papers
[Copyright notice - Volume 2]Freely available from IEEE.pp. iv
Papers
Table of contents - Volume 2Freely available from IEEE.pp. v-xii
Papers
list-reviewerFreely available from IEEE.pp. xv-xvi
Papers
Title Page i - Volume 2Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 2Freely available from IEEE.pp. iii
A Novel Stream Cipher for Video Compressed by H.264Full-text access may be available. Sign in or learn about subscription options.pp. 54-56
Mining Safety Information Management System Based on B/S and C/S Mixed CodeFull-text access may be available. Sign in or learn about subscription options.pp. 61-65
Papers
Welcome Message from the General Chair - Volume 2Freely available from IEEE.pp. xiii
Papers
Organization and Program Committees - Volume 2Freely available from IEEE.pp. xiv
Papers
An Improved Support Vector Machine Based on Rough Set for Construction Cost PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
Study on Location-Selection of B2C E-Commerce Logistics Distribution CenterFull-text access may be available. Sign in or learn about subscription options.pp. 7-10
Papers
The Realization of the CRC Arithmetic Which is Based on DSPFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Papers
Load Distribution of Thermal Power Plant Based on Adaptive Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 15-18
Papers
Research on Database Storage of Large-Scale Terrestrial LIDAR DataFull-text access may be available. Sign in or learn about subscription options.pp. 19-23
Papers
The Design and Implementation of Passwords Management System Based on Blowfish Cryptographic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 24-28
Papers
The Networking Technology within Smart Home System - ZigBee TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 29-33
Papers
A Line Segments Approximation Algorithm of Grating LinesFull-text access may be available. Sign in or learn about subscription options.pp. 34-37
Papers
Research on Detection Technique of Multiple Moving Pedestrians in Sequence ImageFull-text access may be available. Sign in or learn about subscription options.pp. 38-41
Papers
Application for Web Text Categorization Based on Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 42-45
Papers
Secure Routing Protocol Base on Secure Path in Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Papers
Customization of Test Case Selection Based on Filtering Mechanism in JUnitFull-text access may be available. Sign in or learn about subscription options.pp. 57-60
Papers
A Decision Support System Based on Support Vector Machine for Hard Landing of Civil AircraftFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
Papers
Improvement of Real-Time Performance of Linux 2.6 Kernel for Embedded ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 71-74
Papers
Motion Planning of Multi-joint Underactuated Manipulator Based on Trigonometric Function InputFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Papers
Registration for 3d Cadastre in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 79-82
Papers
A Stable and Unstable States Detection Method for Service DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Papers
Design and Implementation of Interactive 3D Scenes Based on VirtoolsFull-text access may be available. Sign in or learn about subscription options.pp. 87-89
Papers
The Realization of Google Suggest in Mis System by Using AjaxFull-text access may be available. Sign in or learn about subscription options.pp. 93-96
Papers
An Enterprise Computing System Based on Software-Enrollment StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 97-100
Papers
Design and Full-Vehicle Tests of EPS Control SystemFull-text access may be available. Sign in or learn about subscription options.pp. 101-104
Papers
A Remote Data Displaying System Based on uCLinux and S3C44B0XFull-text access may be available. Sign in or learn about subscription options.pp. 105-108
Papers
Study on the Application of Extenics in Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 109-112
Papers
Study and Realization of Generic Mechanism for Dynamic Loading Model Components in Simulation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 113-116
Papers
A ROC Curve Method for Performance Evaluation of Support Vector Machine with Optimization StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 117-120
Papers
The Design of EPA Wireless BridgeFull-text access may be available. Sign in or learn about subscription options.pp. 121-123
Papers
Design and Development of Interactive Web-Based Voice Broadcasting SystemFull-text access may be available. Sign in or learn about subscription options.pp. 124-126
Papers
Wireless Mesh Network Structural Design on Modern CampusFull-text access may be available. Sign in or learn about subscription options.pp. 127-129
Papers
Packet-Level Data Aggregation for Energy Constrain in WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 130-135
Papers
Research and Implementation of Mobile OA System Based on 3GFull-text access may be available. Sign in or learn about subscription options.pp. 136-139
Papers
Study of Services Development and Control Mechanism in NGNFull-text access may be available. Sign in or learn about subscription options.pp. 140-144
Papers
Exploration of Moodle-Based Collaborative Learning for the DeafFull-text access may be available. Sign in or learn about subscription options.pp. 145-147
Papers
Computer-Aided Design of the Pass on the Fitness Devices Tube with Unequal FilletFull-text access may be available. Sign in or learn about subscription options.pp. 148-151
Papers
Roll Pass Design in CATIA ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 152-154
Papers
Cold-Formed Steel Truck with the Computer-Aided Roll Pass DesignFull-text access may be available. Sign in or learn about subscription options.pp. 155-158
Papers
Study on the Periscope Training Simulation System Based on VR TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 159-162
Papers
ELVM: A LVM-Based Remote Replication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 163-166
Papers
An Improved Iterated Local Search Algorithm for Invest Strongly Correlated 0/1 Knapsack ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 167-171
Papers
Net Devise Drive Program's Research and Implement in Embedded Linux Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 172-174
Papers
Interests-Based Spyware DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 175-178
Papers
Universal Image Steganalysis Based on Wavelet Packet Decomposition and Empirical Transition Matrix in Wavelet DomainFull-text access may be available. Sign in or learn about subscription options.pp. 179-182
Papers
Design and Implement of Missile Equipments Circuit Level Virtual Maintenance Training SystemFull-text access may be available. Sign in or learn about subscription options.pp. 183-186
Papers
Research of Chinese Text Classification Methods Based on Semantic Vector and Semantic SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 187-190
Papers
A Novel Parallel Ant Colony Optimization Algorithm with Dynamic Transition ProbabilityFull-text access may be available. Sign in or learn about subscription options.pp. 191-194
Papers
New Certificate Status Verification Scheme Based on OCSP for Wireless EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 195-198
Papers
A Trademark Retrieval Method Based on Support Vector Machines Self-LearningFull-text access may be available. Sign in or learn about subscription options.pp. 199-202
Papers
Research and Design on MAC Architecture of Digital Home NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 203-206
Papers
Application of Fault Tree in Software Safety AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 207-208
Papers
The Update Version Development of "Wiki Message Linking" System - Integrated Ajax with MVC ModelFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
Evolution of Reference Networks with Fitness InheritanceFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Papers
Study on Wide Range's Traffic Control System Information Platform Based on Mobile AgentFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
Flexible PID Control Design in Assistance Condition of Automotive EPS SystemFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Papers
A Control Flow Graph Reconstruction Method from Binaries Based on XMLFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
Papers
Design and Implementation of a General Data Link Layer Interface for Embedded WEB ServerFull-text access may be available. Sign in or learn about subscription options.pp. 230-233
Papers
A Research on Recognition of Tibetan Speakers Based on MFCC and Delta FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 234-238
Papers
Overview of the Intelligent Tools Selection in Manufacturing ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 239-242
Papers
The Study of Uygur Handwriting Recognizing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 243-245
Papers
A Remote Sensing Images Fusion Based on the NLEMD and Local ContrastFull-text access may be available. Sign in or learn about subscription options.pp. 246-249
Papers
Research and Design of Secure Communication Model Base on the Active NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 250-252
Papers
A Proposed Security Subsystem for Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 253-256
Papers
A Distributed Data Integration Framework Based on Web Services and LDAPFull-text access may be available. Sign in or learn about subscription options.pp. 257-259
Papers
Design and Implementation of Virtual Fishing System Based on C8051 and VirtoolsFull-text access may be available. Sign in or learn about subscription options.pp. 260-264
Papers
On the Linkability of Two Schnorr Type ID-Based Blind Signature SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 265-269
Papers
Collaborative Filtering Algorithm Based on Adaptive AiNetFull-text access may be available. Sign in or learn about subscription options.pp. 270-273
Papers
Research and Implementation of Ancient Architecture Roaming System Based on VRMLFull-text access may be available. Sign in or learn about subscription options.pp. 274-277
Papers
Research and Realization of Mobile IPv6 Protocol Software Based on VxworksFull-text access may be available. Sign in or learn about subscription options.pp. 278-281
Papers
Distributed Multimedia Content Processing Based on Web ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 282-285
Papers
The Design of IIR Digital Notch FiltersFull-text access may be available. Sign in or learn about subscription options.pp. 286-288
Papers
Computer Fast Implementation of Digital System DesignFull-text access may be available. Sign in or learn about subscription options.pp. 289-290
Papers
A Smart Home Security System Based on 3GFull-text access may be available. Sign in or learn about subscription options.pp. 291-294
Papers
Research and Design on Vehicle-Mounted Wireless Transmission TerminalFull-text access may be available. Sign in or learn about subscription options.pp. 295-298
Papers
Research on the Realization of Substation Virtual Equipment Based on 3D EngineFull-text access may be available. Sign in or learn about subscription options.pp. 299-302
Papers
Data Communication Research Based on the Wireless Computing Platform Sun SPOTFull-text access may be available. Sign in or learn about subscription options.pp. 303-306
Papers
A Study on the Construction Method for Orthogonal Complementary Set Group Based on Complementary SetsFull-text access may be available. Sign in or learn about subscription options.pp. 307-310
Papers
An Improvement to Predicative Embedded Zero-Tree Wavelet Decoding AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 311-313
Papers
The Design of Real-Time Database in the Data Fusion SystemFull-text access may be available. Sign in or learn about subscription options.pp. 314-317
Papers
A Low-Complexity Layered Decoding Algorithm for LDPC CodesFull-text access may be available. Sign in or learn about subscription options.pp. 318-320
Papers
Research on the Parallelism of Security Vulnerability Detection of Logic-Unknown PLDFull-text access may be available. Sign in or learn about subscription options.pp. 321-325
Papers
Research on Materialized View Selection Algorithm in Data WarehouseFull-text access may be available. Sign in or learn about subscription options.pp. 326-329
Papers
Research on Adaptive Speaker Identification Based on GMMFull-text access may be available. Sign in or learn about subscription options.pp. 330-332
Papers
Construction of Public Logistics Information Platform Based on Grid ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 333-336
Papers
GPS Receiver Feasibility Study Based on PCI BusFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
Papers
A New Algorithm for Solving the Intruder Deduction ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 343-346
Papers
Forecasting 802.11 Traffic Using Seasonal ARIMA ModelFull-text access may be available. Sign in or learn about subscription options.pp. 347-350
Papers
An Empirical Study on the Stability and Time Variation of Betas in Shenzhen Stock MarketFull-text access may be available. Sign in or learn about subscription options.pp. 351-354
Papers
The Numerical Simulation of Air Helical Flow Outside of Upright TubeFull-text access may be available. Sign in or learn about subscription options.pp. 355-358
Papers
Consideration of Multimedia Teaching Technology and Art Based on Digital AgeFull-text access may be available. Sign in or learn about subscription options.pp. 359-362
Papers
Development of Monitoring System of Building Energy ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 363-366
Showing 100 out of 128