Default Cover Image

Computer and Information Technology, IEEE 8th International Conference on

July 8 2008 to July 11 2008

ISBN: 978-0-7695-3242-4

Table of Contents

Papers
Table of contentsFreely available from IEEE.pp. v-xiii
Papers
[Publisher's information]Freely available from IEEE.pp. 712
A Robust Bagging Method Using Median as a Combination RuleFull-text access may be available. Sign in or learn about subscription options.pp. 55-60
Papers
Title Page iFreely available from IEEE.pp. i
Application Research of Dominance Relation Rough Set on Seismology DataFull-text access may be available. Sign in or learn about subscription options.pp. 61-65
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Title Page iv - Copyright PageFreely available from IEEE.pp. iv
CRFP: A Novel Adaptive Replacement Policy Combined the LRU and LFU PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 72-79
Papers
Message from the ChairsFreely available from IEEE.pp. xiv
Papers
Committee OrganizationFreely available from IEEE.pp. xv-xx
Papers
Website Data Storage Management during Data Lifecycle Taking into Account of Time EffectFull-text access may be available. Sign in or learn about subscription options.pp. 3-7
Papers
A Strategy for Attributes Selection in Cost-Sensitive Decision Trees InductionFull-text access may be available. Sign in or learn about subscription options.pp. 8-13
Papers
Identification of Chinese Event and Their Argument RolesFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Papers
High Indexing Compression for Spatial DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Papers
Association Rule Algorithms for Logical Equality RelationshipsFull-text access may be available. Sign in or learn about subscription options.pp. 26-30
Papers
The Control of Symmetric Data Interpolation SurfaceFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Papers
An Efficient Algorithm for Mining Closed Frequent Itemsets in Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 37-42
Papers
CUZ: An Improved Clustering AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 43-48
Papers
Robot Task Planning for Mixed-Initiative Human Robot Interaction in Home Service RobotFull-text access may be available. Sign in or learn about subscription options.pp. 49-54
Papers
Exploring the Influence of Sampling on Pattern Support DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 66-71
Papers
Finding Dependency Trees from Binary DataFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Papers
On Defining Keys for XMLFull-text access may be available. Sign in or learn about subscription options.pp. 86-91
Papers
An HRV Patterns Discovering Neural Network for Mobile Healthcare ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 92-97
Papers
Robot with Emotion for Triggering Mixed-Initiative Interaction PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 98-103
An Approach to Solving Problem of Non-transitive Connectivity in P2P Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Papers
Search Results Clustering in Chinese Context Based on a New Suffix TreeFull-text access may be available. Sign in or learn about subscription options.pp. 110-115
Papers
Comparative Study on Applicability of WEBMO in Web Application Cost Estimation within Klang Valley in MalaysiaFull-text access may be available. Sign in or learn about subscription options.pp. 116-121
Papers
An Analysis of Data Mining Applications in Crime DomainFull-text access may be available. Sign in or learn about subscription options.pp. 122-126
Effective Linguistic Steganography DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 224-229
Papers
From Good to Bad Ones: Making Spam Detection EasierFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Source Tracing and Pursuing of Network VirusFull-text access may be available. Sign in or learn about subscription options.pp. 230-235
Papers
Sustaining Learners in WBT Environments through Service-Oriented Formative AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 135-138
Papers
Query Processing for Heterogeneous XML StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 139-144
Papers
Addressing Effective Hidden Web Search Using Iterative Deepening Search and Graph TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 145-149
Papers
Prediction-Based Dynamic Thread Pool Scheme for Efficient Resource UsageFull-text access may be available. Sign in or learn about subscription options.pp. 159-164
Papers
One-Sided Message Passing Programming Model for Unstructured Peer-to-Peer Computing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
Papers
Optimized FPGA Realization of Digital Matched Filter in Spread Spectrum Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 173-176
Papers
Packet Combining Scheme with Bit Oriented XORed of All Bits of Packet: An IdeaFull-text access may be available. Sign in or learn about subscription options.pp. 177-181
Papers
Reliable WiMAX Multicast ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
Papers
An Adaptive Policy-Based Vertical Handoff Algorithm for Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 188-193
Papers
Packets Delay Analysis Based on Simplified Scheduling Theoretical Model for Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 194-197
A Virus Prevention Model Based on Static Analysis and Data Mining MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 288-293
Papers
Practical Performance Evaluation of Peer-to-Peer Internet Telephony Using SIPFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Papers
Efficient Geocast Utilizing Topology Information DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
Papers
Constraints for Permission-Based DelegationsFull-text access may be available. Sign in or learn about subscription options.pp. 216-223
Using Semantic Web Technologies in Visualizing Medicinal VocabulariesFull-text access may be available. Sign in or learn about subscription options.pp. 325-329
Papers
Encryption Based Data Hiding Architecture with Text Pattern Authentication and VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
Papers
An ISMS (Im)-Maturity Capability ModelFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
Papers
Performance of Iris Based Hard Fuzzy VaultFull-text access may be available. Sign in or learn about subscription options.pp. 248-253
Papers
A User-Centric Privacy Authorization Model Based on Role and Session in the Context-Aware HomeFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
Papers
Integrated Confusion-Diffusion Mechanisms for Chaos Based Image EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 260-263
Papers
Protecting Information Systems from DDoS Attack Using Multicore MethodologyFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Papers
Investigation of Information Security Management Practices in Indian Pubic Sector BanksFull-text access may be available. Sign in or learn about subscription options.pp. 276-281
Papers
A Vulnerability and Exploit Independent Approach for Attack Path PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 282-287
Papers
Agent Verification Protocol in Agent-Based IDSFull-text access may be available. Sign in or learn about subscription options.pp. 294-299
Papers
Virtual Worlds: The Next Generation for Solving Engineering ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Papers
The Effect of MIMO Antenna Modes and Vehicle Speed on Channel Throughput of Mobile WiMAX for Multimedia ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Papers
Adaptive Similarity Measurement Using Relevance FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 314-318
Papers
Hybrid Segment-Based Transcoding Proxy Caching of Multimedia StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
Papers
Optimized Geometric Hermite Curve Based on Curve Length MinimizationFull-text access may be available. Sign in or learn about subscription options.pp. 330-335
Papers
CINETOON: A Semi-automated System for Rendering Black/White Comic Books from Video StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
Papers
Quadric Polynomial Interpolation Based on Minimum Local Stretching EnergyFull-text access may be available. Sign in or learn about subscription options.pp. 342-347
Papers
Combining Face Detection and Novelty to Identify Important Events in a Visual LifelogFull-text access may be available. Sign in or learn about subscription options.pp. 348-353
Papers
Behavourial Modeling in MammographyFull-text access may be available. Sign in or learn about subscription options.pp. 357-361
Papers
Classification for Breast MRI Using Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 362-367
Papers
An Independent Component Analysis Approach for Enhancing Camera Based Low Quality Text ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 368-373
Papers
A New Visual Attention Model Using Texture and Object FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 374-378
Papers
Cover Selection Steganography Method Based on Similarity of Image BlocksFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Papers
An Effective Error Concealment for H.264/AVCFull-text access may be available. Sign in or learn about subscription options.pp. 385-390
Papers
Hierarchical Integer Pixel and Adaptive Fractional Pixel Motion EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 391-395
The Spatial-Temporal Channel for Information FusionFull-text access may be available. Sign in or learn about subscription options.pp. 483-487
Papers
Anisotropic Diffusion Transform Based on Directions of EdgesFull-text access may be available. Sign in or learn about subscription options.pp. 396-400
Papers
Novel Robust and Invariant Feature Extraction by Spatio-temporal Decomposition of ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 401-405
Papers
Investigation of Distortion Revision and Binarization of Each Lane on DNA FingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 406-410
Papers
Experimental Studies on Dynamics Performance of Lateral and Longitudinal Control for Autonomous Vehicle Using Image ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 411-416
Papers
Advanced Binarization Method for Music Score Recognition Using Local ThresholdsFull-text access may be available. Sign in or learn about subscription options.pp. 417-420
Papers
A Framework for Intelligent Video SurveillanceFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
Papers
Fire Surveillance System Using an Omni-directional Camera for??Remote MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 427-432
Papers
Action Recognition Unrestricted by Location and Viewpoint VariationFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
Papers
The Segmentation and Visualization of Human Organs Based on Adaptive Region Growing MethodFull-text access may be available. Sign in or learn about subscription options.pp. 439-443
Papers
Design of a Novel Protein Feature and Enzyme Function ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 450-455
A High Efficient Flash Storage System for Two-Way Cable ModemFull-text access may be available. Sign in or learn about subscription options.pp. 551-556
Papers
Clustering Microarray Data by Using a Stochastic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 456-461
Papers
A Key Management Protocol for Securing Stability of an Intermediate Node in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 471-476
Papers
Secure Fault Tolerance in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 477-482
Papers
Context Reasoning Using Contextual GraphFull-text access may be available. Sign in or learn about subscription options.pp. 488-493
Papers
A Ubiquitous Learning System Using Co-learning Ubiquitous Pet for Enhancing Educational EffectFull-text access may be available. Sign in or learn about subscription options.pp. 494-500
Papers
Continuous Sensor Data Mining Model and System DesignFull-text access may be available. Sign in or learn about subscription options.pp. 501-506
Papers
A Practical Low Limit on Energy Spent on Processing of One Bit of DataFull-text access may be available. Sign in or learn about subscription options.pp. 509-514
Papers
Towards a Ternary Sigma-Delta Modulated Processor: Adder and IntegratorFull-text access may be available. Sign in or learn about subscription options.pp. 515-520
Papers
Applying Particle Swarm Optimization to Prioritizing Test Cases for Embedded Real Time Software RetestingFull-text access may be available. Sign in or learn about subscription options.pp. 527-532
Papers
IXIV VMM: A VMM on 2-Level Ring ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 533-538
Papers
Codec System Design for Continuous Color Barcode SymbolsFull-text access may be available. Sign in or learn about subscription options.pp. 539-544
Papers
Voltage Emergence Prevention for Energy-Efficient Real-Time Task SynchronizationFull-text access may be available. Sign in or learn about subscription options.pp. 545-550
Showing 100 out of 125