Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISISE
ISISE 2008
Generate Citations
2008 International Symposium on Information Science and Engineering (ISISE)
Dec. 20 2008 to Dec. 22 2008
Shanghai
Volume:
1
2
Table of Contents
Papers
[Copyright notice - Volume 2]
Freely available from IEEE.
pp. iv
Papers
Table of contents - Volume 2
Freely available from IEEE.
pp. v-xv
Papers
Organizing Committee - Volume 2
Freely available from IEEE.
pp. xvii
Papers
Title Page i - Volume 2
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 2
Freely available from IEEE.
pp. iii
Papers
ISISE 2008 Message from the Chair's - Volume 2
Freely available from IEEE.
pp. xvi
Papers
Committee Members - Volume 2
Freely available from IEEE.
pp. xviii-xix
Papers
WFMS: Web File Management as a Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Quansong Deng
,
Yong Zhang
,
Chunxiao Xing
Papers
A High Performance Algorithm for Mining Frequent Patterns: LPS-Miner
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Xiaoyun Chen
,
Huiling Liu
,
Pengfei Chen
,
Longjie Li
Papers
The Implementation and Analysis of the Monitoring Module based on NETCONF
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-15
by
Rui Wang
,
Bin Zhang
,
Guohui Li
,
Yan Li
,
Xuesong Gao
Papers
Model and Implementation of Context-Aware Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-19
by
ZhiGang Li
,
XingShe Zhou
,
Huaifeng Qing
,
Shining Li
Papers
Design of Security Access Control System of Adaptive Wireless Gateway
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-23
by
Pei-qiang Zhang
,
Xue-jie Liu
,
Lu Tao
Papers
Design of Comprehensive Color Feature Vector for Tile Color Online Inspection
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-27
by
Weiqing Li
,
Chengbiao Wang
,
Qun Wang
,
Guangshe Chen
Novel Metrics for Evaluating Congestion of Autonomous System
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-97
by
Ye-kui Qian
,
Chen Ming
Papers
A Software Function Testing Method Based on Data Flow Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-31
by
Cao Wenjing
,
Xu Shenghong
Papers
Three Level Fuzzy Comprehensive Evaluation based on Grey Relational Analysis and Entropy Weights
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-35
by
Liu Xu-lin
,
Song Bao-wei
Papers
Application of Visualization in Space Science
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-39
by
He Huan
,
Meng Xin
Papers
An Edge Detection Method Based on Optimized BP Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-44
by
Weiqing Li
,
Chengbiao Wang
,
Qun Wang
,
Guangshe Chen
Papers
A Study of Urban Traffic Congestion Recognition Based on Pattern Recognition Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-48
by
Yin Zhu
,
Junli Wang
,
Huapu Lu
Papers
Solving AOP Problems with Universal Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-52
by
Li Zhou
,
Qing Wang
,
Yong Zhang
,
Chunxiao Xing
Papers
The Implementation of a Distributed System Based on a Parallel Algorithm for Self-Similar Network Traffic Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-57
by
Zhang Huachuan
,
Tian Jie
,
Xu Jing
Papers
Performance Modeling of Fully Adaptive Wormhole Routing in 2D-Mesh Network-on-Chip with MMPP (2) Input Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-62
by
Yonghui Li
,
Huaxi Gu
,
Peibo Xie
,
Keqiang He
Papers
DoS and DDoS Attack's Possibility Verification on Streaming Media Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-67
by
Chen Lei
,
Ye Dejian
Papers
Performance Evaluation of the CPU Scheduler in XEN
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-72
by
Xianghua Xu
,
Peipei Shan
,
Jian Wan
,
Yucheng Jiang
Papers
Tool Support to Deriving Test Scenarios from UML Activity Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-76
by
Dong Xu
,
Wei Liu
,
Zongtian Liu
,
Nduwimfura Philbert
Papers
Network Calculus Using in Real-Time Industrial Ethernet
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-79
by
Guitang Wang
,
Jun Liu
A Parallel Self-Similar Network Traffic Simulation Method on a Large Time Scale
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-153
by
Jie Tian
,
Jing Xu
,
Hua Chuan Zhang
Papers
An Effective Codec Adaptation for MIH Based Vertical Handover in Heterogeneous Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-83
by
BumWook Kim
,
SungHoon Seo
,
JooSeok Song
Papers
A Method to Improve the Universality of SiRNA Design Rules Based on siRNA Efficiency Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-87
by
Dongfang Wang
,
Xiang Chen
,
Fa Zhang
,
Peizhuo Zhang
,
Guohua Liu
,
Xin Guo
Papers
Multiple Biometrics System based on DavinCi Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-92
by
Yuefeng Huang
,
Xinyu Ao
,
Yongping Li
,
Chengbo Wang
Papers
An Approach for Reverse Engineering of Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-102
by
Sun Weijun
,
Li Shixian
,
Liu Xianming
Papers
Research of Web QoS Control Model Based on Dynamic Resource Reallocation Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-106
by
Junhuai Li
,
Yile Wang
,
Jing Zhang
Papers
Ontology-Based Framework for Geospatial Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-110
by
Wu Shanming
,
Shen Jianjing
Papers
A Quantitative Method for Pulse Strength Classification Based on Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-115
by
Huiyan Wang
Papers
An Agent-Based Context-Aware Middleware for Pervasive Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-119
by
Zhiqiang Wei
,
Nana Wang
,
Mijun Kang
,
Wei Zhou
Papers
Implementation of a Long-Distance Monitor and Automatic Alarm System of Flood Disaster in PoYang Lake Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-123
by
Youliang Chen
,
Zhaoru Wang
Papers
Improved Design of Communication Platform of Distributed Traffic Information Systems Based on SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-128
by
Jian Lee
,
Yuanhua Jia
,
Zhiqiang Shu
,
Xiaodong Zhu
Papers
On Workflow Engine Based on Service-Oriented Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Guo Xiaofeng
,
Shen Jianjing
,
Wu Shanming
Papers
Object-Oriented Data Synchronization for Mobile Database over Mobile Ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Yang Li
,
Xuejie Zhang
,
Yun Gao
Papers
Multiple-View Matching AMMGC Model for Three-Line-Array Digital Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
Chenguang Dai
,
Song Ji
,
Yongsheng Zhang
Papers
An Online Hand-Drawn Electric Circuit Diagram Recognition System Using Hidden Markov Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-148
by
Yingmin Zhang
,
Christian Viard-Gaudin
,
Liming Wu
Papers
Mutual Model of Multiagent Process in E-learning Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-158
by
Tianding Chen
Papers
A Watermarking Algorithm by Modifying AC Coefficies in DCT Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-162
by
Zhao Rui-mei
,
Lian Hua
,
Pang Hua-wei
,
Hu Bo-ning
Papers
Dynamic Model Combination Method for Material Service Safety Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-166
by
Peng Shi
,
Changjun Hu
,
Lianhong Ding
Papers
Scale Space Histogram of Oriented Gradients for Human Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-170
by
Ning He
,
Jiaheng Cao
,
Lin Song
Papers
EKF-Based Adaptive Sensor Scheduling for Target Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-174
by
Yang Liu
,
Zhendong Sun
Papers
Efficiency Evaluation and Comparison of Routing Protocols in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-177
by
Qingting Wei
,
Hong Zou
Papers
Design and Implementation of a Distributed Conformance Test System based on XML
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-182
by
Hua Li
,
Xingming Ye
,
Min Zeng
,
Lingling Wang
Papers
Colorful Natural Scenes Retrieval based on Affective Features Hierarchical Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-187
by
Huang Kun
Papers
A Service-Oriented Framework for Rapid Development of Workflow Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-191
by
Weiqiang Guo
,
Hailing Huang
,
Yu Zhang
Papers
VirtHome: A Web-Like Mobile Personalized Virtual Desktop Computing Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-196
by
Yanwen Ju
,
Yuebin Bai
,
Cong Xu
Papers
Knowledge Management Strategy and Approach in Multiple Project Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
Wenfa Hu
,
Xinhua He
Papers
Modeling and Performance Analysis of Unstructured P2P Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-204
by
JunPeng Mao
,
YanLi Cui
,
JianHua Huang
,
JianBiao Zhang
Papers
Improved Generalized Co-occurrence Matrix for Image Retrieval using MPEG-7 Texture Edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-208
by
Wei Pianpian
,
Wang Beizhan
,
Qu Cheng
,
Chen Liyan
An Algorithm for Natural Phenomena Simulation Based on Video Texture Synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-279
by
Cheng Li
,
Dan Xu
,
Wen-hua Qian
Papers
A Multiscale Analysis and Modeling of Wireless Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Hong Fei
,
Bai Yu
Papers
The Application of Improved BP Algorithm in Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-215
by
Minwei He
,
Xuewei Ma
Papers
A Flower Growth Simulation based on Deformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-218
by
Ling Lu
,
Lei Wang
,
Xue Dong Yang
On the Convergence Rates of Clonal Selection Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-292
by
Hong Lu
Papers
Constructing Online Co-learning System for Computer Technology Education Using Open Source Package
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-223
by
Bin Xu
Papers
E-business Processes Composition Based on Pi-Calculus Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-227
by
Zhilin Feng
,
Jianwei Yin
,
Jianan Zhou
Papers
An Area Traffic Control Algorithm Based on Multi-group Partition
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-231
by
Lilin Zang
,
Xiangxu Meng
Papers
Melody Extraction from Polyphonic MIDI Files Based on Melody Similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-235
by
Liu Li
,
Cai Junwei
,
Wang Lei
,
Ma Yan
Papers
A New Type of Random Number Generator for Software Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-238
by
Yang Yang
,
Zeng Guang
Papers
Research on Tracking Recognition Algorithm of Steel Pipe Welding Seam Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-243
by
Wang Li-ming
,
Gai Xiuqing
,
Yan Xiao-Ling
The Research of Energy Efficient MAC Protocols in Gas Monitoring System of Mine
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-319
by
He Si Yuan
Papers
Web Topic Representation Based on Multi-layer Semantic Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-247
by
Peng Shi
,
Changjun Hu
,
Ruopeng Zhao
,
Lianhong Ding
Papers
A Novel PSO-Inspired Probability-based Binary Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-251
by
LanLan Zhen
,
Ling Wang
,
Xiuting Wang
,
Ziyuan Huang
Papers
Research on Network Risk Situation Assessment Based on Threat Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-257
by
Lv Huiying
,
Cao Yuanda
Papers
A Modified Mutation-Dissipation Binary Particle Swarm Optimization Algorithm and Its Application to WFGD Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-262
by
Hongxing Li
,
Ling Wang
,
LanLan Zhen
,
Ziyuan Huang
Papers
An Automatic Execution System for Web Functional Test Base on Modelling User
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-267
by
Jia Li
,
Xu Jing
,
Tian He
Papers
Education IPTV for E-learning in Rural Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-271
by
Zhu Xiao Liang
,
Liu Quan
,
Yin Jie
,
Song Xiao Juan
Papers
A IEEE802.11 Rate Control Scheme for Streaming Media Transmission over Wireless Mesh Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-275
by
Zhu Xiao Liang
,
Liu Quan
,
Yin Jie
,
Song Xiao Juan
Automatic Identification of Chinese Chunk Based on BP Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-349
by
Xiaohua Wang
,
Linghui Chen
,
Rongbo Wang
Papers
The Study on Agile Supply Chain-based Supplier Selection and Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-284
by
Jiaju Wu
,
Gang Liu
,
Chuanyu Xi
Papers
Building an Efficient Distributed Reputation Scheme for Peer-to-Peer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-288
by
Chunqi Tian
,
Jiujun Cheng
Papers
An Attribute Reduct and Attribute Significance Algorithm of Continuous Domain Decide Table
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-296
by
Liu Wenjun
Papers
A Cluster Based Hybrid Architecture for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-302
by
Yao Ye
,
Vincent Hilaire
,
Abder Koukam
,
Cai Wandong
Papers
Analysis and Prospect on the E-Learning System Instructional Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-306
by
Chen Huandong
,
Wu Shulei
,
Song Chunhui
,
Yu Xianchuan
,
Luo Ye
Papers
The Pre-Handover of the Overlapping Region based on HMIPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-310
by
Xue Jian Sheng
,
Feng Dong Hui
,
Liu Jian
,
Liu Ning
Papers
Research on Design of a Vocal and Graphic Display System on Temperature Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-315
by
Hou Jin-biao
Study of the Optimizing of Distribution Routing of Farm Produce
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-391
by
Hou Wen Ying
,
Dong Shao Hua
,
Qin Chi Yue
Papers
Frequency-Domain Extracted IFFT Method for Synthetic Aperture Radar Imaging with Frequency Coded Waveform
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-325
by
Yin Can-bin
,
Jia Xin
,
Qin Wei-dong
Papers
Intrusion Detection Based on Improved Fuzzy C-means Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-329
by
Wei Jiang
,
Min Yao
,
Jun Yan
Papers
A New Robust Method of Singular Point Detection from Fingerprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-334
by
Yilong Yin
,
Dawei Weng
,
Hao Li
,
Wenji Ma
An Efficient Evolutionary Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-404
by
Dou Ji
,
Xiang-jun Wang
Papers
The Tumor Thermotherapy Fuzzy Control System Based on Interpolation Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-337
by
Peng Xuange
,
Liu Yong
,
Huang Chunying
,
Li Peipei
Papers
Event-Based Soccer Video Retrieval with Interactive Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-345
by
Guangsheng Zhao
Papers
Research based on the point cloud adaptive algorithm of Delaunay
Full-text access may be available. Sign in or learn about subscription options.
by
Zhenghong Peng
,
Yan Yang
Papers
Reconstruction of Human Face for Different Age Based on the Log-gabor Wavelet
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-357
by
Jian-Ming Zhang
,
Li-Jing Fan
,
Yong-Zhao Zhan
,
Ping Sheng
Papers
Operators for Analyzing Software Reliability with Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-361
by
Yu Ruiqiang
,
Huang Zhiqiu
Papers
Technology of Continuous Query Optimization over Data Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-366
by
Feng Weibing
,
Li Zhanhuai
Papers
The Multi-Core CPU Parallel Computation for CFD Simulation of Flowmeter
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-370
by
Chen Jian-zhen
,
Li Bin
,
Shen Dan-ping
Papers
A Synchronous Audio Watermarking Algorithm Based on Chaotic Encryption in DCT Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-374
by
Wang Yongqi
,
Yang Yang
Papers
H-Sim: A Concurrent Discrete-event Driven Sensor Network Simulation Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-378
by
Jinbao Li
,
Di Xue
,
Shouling Ji
,
Hui Xu
Papers
Study of Respirable Coal Mine Dust Concentration Detecting Method Based on Curve Fitting and Volume Calculation Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-383
by
Cheng Xue-zhen
,
Hao Hai-tao
,
Li Liang-bao
,
Cao Mao-yong
Removal of Interference from FSK Signal Based on Independent Component Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-456
by
Xiao-dong Chai
,
Hui-ming Yao
Papers
ROSE: Large-Scale Content-Based Routing for P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-388
by
Dong Biao
,
Chen Jin-hui
,
Ruan Feng
,
Sun Ya-min
The Research of Wireless Manufacturing Network Based on Bluetooth Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-460
by
Yu Hai Peng
Papers
A Quasi-Human Heuristic Algorithm for the 2D Rectangular Strip Packing Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-396
by
Duanbing Chen
,
Yan Fu
,
Mingsheng Shang
,
Wenqi Huang
Showing 100 out of 189
Load More
Load All