Default Cover Image

2008 International Symposium on Information Science and Engineering (ISISE)

Dec. 20 2008 to Dec. 22 2008

Shanghai

Volume:

Table of Contents

Papers
[Copyright notice - Volume 2]Freely available from IEEE.pp. iv
Papers
Table of contents - Volume 2Freely available from IEEE.pp. v-xv
Papers
Organizing Committee - Volume 2Freely available from IEEE.pp. xvii
Papers
Title Page i - Volume 2Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 2Freely available from IEEE.pp. iii
Papers
ISISE 2008 Message from the Chair's - Volume 2Freely available from IEEE.pp. xvi
Papers
Committee Members - Volume 2Freely available from IEEE.pp. xviii-xix
Papers
WFMS: Web File Management as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
A High Performance Algorithm for Mining Frequent Patterns: LPS-MinerFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Papers
The Implementation and Analysis of the Monitoring Module based on NETCONFFull-text access may be available. Sign in or learn about subscription options.pp. 12-15
Papers
Model and Implementation of Context-Aware Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 16-19
Papers
Design of Security Access Control System of Adaptive Wireless GatewayFull-text access may be available. Sign in or learn about subscription options.pp. 20-23
Papers
Design of Comprehensive Color Feature Vector for Tile Color Online InspectionFull-text access may be available. Sign in or learn about subscription options.pp. 24-27
Novel Metrics for Evaluating Congestion of Autonomous SystemFull-text access may be available. Sign in or learn about subscription options.pp. 93-97
Papers
A Software Function Testing Method Based on Data Flow GraphFull-text access may be available. Sign in or learn about subscription options.pp. 28-31
Papers
Three Level Fuzzy Comprehensive Evaluation based on Grey Relational Analysis and Entropy WeightsFull-text access may be available. Sign in or learn about subscription options.pp. 32-35
Papers
Application of Visualization in Space ScienceFull-text access may be available. Sign in or learn about subscription options.pp. 36-39
Papers
An Edge Detection Method Based on Optimized BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 40-44
Papers
A Study of Urban Traffic Congestion Recognition Based on Pattern Recognition TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 45-48
Papers
Solving AOP Problems with Universal FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 49-52
Papers
The Implementation of a Distributed System Based on a Parallel Algorithm for Self-Similar Network Traffic SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 53-57
Papers
Performance Modeling of Fully Adaptive Wormhole Routing in 2D-Mesh Network-on-Chip with MMPP (2) Input TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 58-62
Papers
DoS and DDoS Attack's Possibility Verification on Streaming Media ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 63-67
Papers
Performance Evaluation of the CPU Scheduler in XENFull-text access may be available. Sign in or learn about subscription options.pp. 68-72
Papers
Tool Support to Deriving Test Scenarios from UML Activity DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
Papers
Network Calculus Using in Real-Time Industrial EthernetFull-text access may be available. Sign in or learn about subscription options.pp. 77-79
A Parallel Self-Similar Network Traffic Simulation Method on a Large Time ScaleFull-text access may be available. Sign in or learn about subscription options.pp. 149-153
Papers
An Effective Codec Adaptation for MIH Based Vertical Handover in Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 80-83
Papers
A Method to Improve the Universality of SiRNA Design Rules Based on siRNA Efficiency DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 84-87
Papers
Multiple Biometrics System based on DavinCi PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 88-92
Papers
An Approach for Reverse Engineering of Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 98-102
Papers
Research of Web QoS Control Model Based on Dynamic Resource Reallocation SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 103-106
Papers
Ontology-Based Framework for Geospatial Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 107-110
Papers
A Quantitative Method for Pulse Strength Classification Based on Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 111-115
Papers
An Agent-Based Context-Aware Middleware for Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 116-119
Papers
Implementation of a Long-Distance Monitor and Automatic Alarm System of Flood Disaster in PoYang Lake AreaFull-text access may be available. Sign in or learn about subscription options.pp. 120-123
Papers
Improved Design of Communication Platform of Distributed Traffic Information Systems Based on SOAFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
Papers
On Workflow Engine Based on Service-Oriented ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 129-132
Papers
Object-Oriented Data Synchronization for Mobile Database over Mobile Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
Papers
Multiple-View Matching AMMGC Model for Three-Line-Array Digital ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Papers
An Online Hand-Drawn Electric Circuit Diagram Recognition System Using Hidden Markov ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Papers
Mutual Model of Multiagent Process in E-learning ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 154-158
Papers
A Watermarking Algorithm by Modifying AC Coefficies in DCT DomainFull-text access may be available. Sign in or learn about subscription options.pp. 159-162
Papers
Dynamic Model Combination Method for Material Service Safety AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 163-166
Papers
Scale Space Histogram of Oriented Gradients for Human DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 167-170
Papers
EKF-Based Adaptive Sensor Scheduling for Target TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 171-174
Papers
Efficiency Evaluation and Comparison of Routing Protocols in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 175-177
Papers
Design and Implementation of a Distributed Conformance Test System based on XMLFull-text access may be available. Sign in or learn about subscription options.pp. 178-182
Papers
Colorful Natural Scenes Retrieval based on Affective Features Hierarchical ModelFull-text access may be available. Sign in or learn about subscription options.pp. 183-187
Papers
A Service-Oriented Framework for Rapid Development of Workflow ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 188-191
Papers
VirtHome: A Web-Like Mobile Personalized Virtual Desktop Computing SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 192-196
Papers
Knowledge Management Strategy and Approach in Multiple Project EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
Papers
Modeling and Performance Analysis of Unstructured P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 201-204
Papers
Improved Generalized Co-occurrence Matrix for Image Retrieval using MPEG-7 Texture EdgeFull-text access may be available. Sign in or learn about subscription options.pp. 205-208
An Algorithm for Natural Phenomena Simulation Based on Video Texture SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 276-279
Papers
A Multiscale Analysis and Modeling of Wireless TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
The Application of Improved BP Algorithm in Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 213-215
Papers
A Flower Growth Simulation based on DeformationFull-text access may be available. Sign in or learn about subscription options.pp. 216-218
On the Convergence Rates of Clonal Selection AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 289-292
Papers
Constructing Online Co-learning System for Computer Technology Education Using Open Source PackageFull-text access may be available. Sign in or learn about subscription options.pp. 219-223
Papers
E-business Processes Composition Based on Pi-Calculus TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 224-227
Papers
An Area Traffic Control Algorithm Based on Multi-group PartitionFull-text access may be available. Sign in or learn about subscription options.pp. 228-231
Papers
Melody Extraction from Polyphonic MIDI Files Based on Melody SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 232-235
Papers
A New Type of Random Number Generator for Software ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 236-238
Papers
Research on Tracking Recognition Algorithm of Steel Pipe Welding Seam ImageFull-text access may be available. Sign in or learn about subscription options.pp. 239-243
The Research of Energy Efficient MAC Protocols in Gas Monitoring System of MineFull-text access may be available. Sign in or learn about subscription options.pp. 316-319
Papers
Web Topic Representation Based on Multi-layer Semantic ModelFull-text access may be available. Sign in or learn about subscription options.pp. 244-247
Papers
A Novel PSO-Inspired Probability-based Binary Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 248-251
Papers
Research on Network Risk Situation Assessment Based on Threat AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
Papers
A Modified Mutation-Dissipation Binary Particle Swarm Optimization Algorithm and Its Application to WFGD ControlFull-text access may be available. Sign in or learn about subscription options.pp. 258-262
Papers
An Automatic Execution System for Web Functional Test Base on Modelling UserFull-text access may be available. Sign in or learn about subscription options.pp. 263-267
Papers
Education IPTV for E-learning in Rural AreaFull-text access may be available. Sign in or learn about subscription options.pp. 268-271
Papers
A IEEE802.11 Rate Control Scheme for Streaming Media Transmission over Wireless Mesh NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 272-275
Automatic Identification of Chinese Chunk Based on BP NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 346-349
Papers
The Study on Agile Supply Chain-based Supplier Selection and EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 280-284
Papers
Building an Efficient Distributed Reputation Scheme for Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 285-288
Papers
An Attribute Reduct and Attribute Significance Algorithm of Continuous Domain Decide TableFull-text access may be available. Sign in or learn about subscription options.pp. 293-296
Papers
A Cluster Based Hybrid Architecture for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 297-302
Papers
Analysis and Prospect on the E-Learning System Instructional DesignFull-text access may be available. Sign in or learn about subscription options.pp. 303-306
Papers
The Pre-Handover of the Overlapping Region based on HMIPv6Full-text access may be available. Sign in or learn about subscription options.pp. 307-310
Papers
Research on Design of a Vocal and Graphic Display System on Temperature DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 311-315
Study of the Optimizing of Distribution Routing of Farm ProduceFull-text access may be available. Sign in or learn about subscription options.pp. 389-391
Papers
Frequency-Domain Extracted IFFT Method for Synthetic Aperture Radar Imaging with Frequency Coded WaveformFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
Intrusion Detection Based on Improved Fuzzy C-means AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 326-329
Papers
A New Robust Method of Singular Point Detection from FingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 330-334
An Efficient Evolutionary ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 401-404
Papers
The Tumor Thermotherapy Fuzzy Control System Based on Interpolation AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 335-337
Papers
Event-Based Soccer Video Retrieval with Interactive Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 338-345
Papers
Research based on the point cloud adaptive algorithm of DelaunayFull-text access may be available. Sign in or learn about subscription options.
Papers
Reconstruction of Human Face for Different Age Based on the Log-gabor WaveletFull-text access may be available. Sign in or learn about subscription options.pp. 354-357
Papers
Operators for Analyzing Software Reliability with Petri NetFull-text access may be available. Sign in or learn about subscription options.pp. 358-361
Papers
Technology of Continuous Query Optimization over Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 362-366
Papers
The Multi-Core CPU Parallel Computation for CFD Simulation of FlowmeterFull-text access may be available. Sign in or learn about subscription options.pp. 367-370
Papers
A Synchronous Audio Watermarking Algorithm Based on Chaotic Encryption in DCT DomainFull-text access may be available. Sign in or learn about subscription options.pp. 371-374
Papers
H-Sim: A Concurrent Discrete-event Driven Sensor Network Simulation PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 375-378
Removal of Interference from FSK Signal Based on Independent Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 452-456
Papers
ROSE: Large-Scale Content-Based Routing for P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 384-388
The Research of Wireless Manufacturing Network Based on Bluetooth TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 457-460
Papers
A Quasi-Human Heuristic Algorithm for the 2D Rectangular Strip Packing ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 392-396
Showing 100 out of 189