Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CITWORKSHOPS
CITWORKSHOPS 2008
Generate Citations
Computer and Information Technology, IEEE 8th International Conference on
July 8 2008 to July 11 2008
ISBN: 978-0-7695-3242-4
Table of Contents
Papers
Table of contents
Freely available from IEEE.
pp. v-xiii
Papers
[Publisher's information]
Freely available from IEEE.
pp. 712
A Robust Bagging Method Using Median as a Combination Rule
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-60
by
Faisal Zaman
,
Hideo Hirose
Papers
Title Page i
Freely available from IEEE.
pp. i
Application Research of Dominance Relation Rough Set on Seismology Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-65
by
Shaochun Wu
,
Yinyin Li
,
Minfu Fang
,
Mingjun Xin
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Title Page iv - Copyright Page
Freely available from IEEE.
pp. iv
CRFP: A Novel Adaptive Replacement Policy Combined the LRU and LFU Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-79
by
Zhan-sheng Li
,
Da-wei Liu
,
Hui-juan Bi
Papers
Message from the Chairs
Freely available from IEEE.
pp. xiv
Papers
Committee Organization
Freely available from IEEE.
pp. xv-xx
Papers
Website Data Storage Management during Data Lifecycle Taking into Account of Time Effect
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-7
by
Zenggui Ou
Papers
A Strategy for Attributes Selection in Cost-Sensitive Decision Trees Induction
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-13
by
Shichao Zhang
,
Li Liu
,
Xiaofeng Zhu
,
Chen Zhang
Papers
Identification of Chinese Event and Their Argument Roles
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-19
by
Hongye Tan
,
Tiejun Zhao
,
Jiaheng Zheng
Papers
High Indexing Compression for Spatial Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-25
by
Hung-Yi Lin
,
Shih-Ying Chen
Papers
Association Rule Algorithms for Logical Equality Relationships
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-30
by
Chyuan-Meei Chen
,
Shu-Hsien Liao
Papers
The Control of Symmetric Data Interpolation Surface
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Yunfeng Zhang
,
Shanshan Gao
,
Shilong Li
,
Caiming Zhang
Papers
An Efficient Algorithm for Mining Closed Frequent Itemsets in Data Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
Fujiang Ao
,
Jing Du
,
Yuejin Yan
,
Baohong Liu
,
Kedi Huang
Papers
CUZ: An Improved Clustering Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-48
by
Timos Aslanidis
,
Dora Souliou
,
Katerina Polykrati
Papers
Robot Task Planning for Mixed-Initiative Human Robot Interaction in Home Service Robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-54
by
Dongyeop Kang
,
Ho-Jin Choi
Papers
Exploring the Influence of Sampling on Pattern Support Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-71
by
Luofeng Xu
,
Stephen Marsland
,
Ruili Wang
Papers
Finding Dependency Trees from Binary Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Chaofeng Sha
,
Dao Tao
,
Aoying Zhou
,
Weining Qian
Papers
On Defining Keys for XML
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Md. Sumon Shahriar
,
Jixue Liu
Papers
An HRV Patterns Discovering Neural Network for Mobile Healthcare Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-97
by
Thi Hong Nhan Vu
,
Jun Wook Lee
,
Yongmi Lee
,
Hiseok Kim
,
Keun Ho Ryu
Papers
Robot with Emotion for Triggering Mixed-Initiative Interaction Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
Mar?aJos? Acosta
,
Dongyeop Kang
,
Ho-Jin Choi
An Approach to Solving Problem of Non-transitive Connectivity in P2P Overlay Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Guo-yan Yang
,
Guo-yin Zhang
,
Xiang-hui Wang
Papers
Hashed Multiple Lists: A Stream Filter for Processing Continuous Query with Multiple Attributes in Geosensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-109
by
Dong Gyu Lee
,
Young Jin Jung
,
Young Wook Lee
,
Keun Ho Ryu
Papers
Search Results Clustering in Chinese Context Based on a New Suffix Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-115
by
Jiangning Wu
,
Zhijiang Wang
Papers
Comparative Study on Applicability of WEBMO in Web Application Cost Estimation within Klang Valley in Malaysia
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-121
by
Tan Chin Hooi
,
Yunus Yusoff
,
Zainuddin Hassan
Papers
An Analysis of Data Mining Applications in Crime Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-126
by
P. Thongtae
,
S. Srisuk
Effective Linguistic Steganography Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-229
by
Xue-ling Zhao
,
Zhi-li Chen
,
Liu-sheng Huang
,
Zhen-shan Yu
,
Xue-ling Zhao
Papers
From Good to Bad Ones: Making Spam Detection Easier
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-134
by
Li Zhao
,
Qiancheng Jiang
,
Yan Zhang
Source Tracing and Pursuing of Network Virus
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-235
by
Lansheng Han
,
Shuxia Han
,
Qingmei Deng
,
Junqing Yu
,
Yunfeng He
Papers
Sustaining Learners in WBT Environments through Service-Oriented Formative Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-138
by
I-Ching Chen
,
Shueh-Cheng Hu
,
Dong-Her Shih
Papers
Query Processing for Heterogeneous XML Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-144
by
Weidong Yang
,
Xiaodong Yang
,
Bowen Yuan
Papers
Addressing Effective Hidden Web Search Using Iterative Deepening Search and Graph Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-149
by
Ahmad Ibrahim
,
Syed Ahsan Fahmi
,
Sajid Ibrahim Hashmi
,
Ho-Jin Choi
Papers
Analysis of Pattern Recognition Algorithms Using Associative Memory Approach: A Comparative Study between the Hopfield Network and Distributed Hierarchical Graph Neuron (DHGN)
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-158
by
A. H. Muhamad Amin
,
R. A. Raja Mahmood
,
A. I. Khan
Papers
Prediction-Based Dynamic Thread Pool Scheme for Efficient Resource Usage
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-164
by
DongHyun Kang
,
Saeyoung Han
,
SeoHee Yoo
,
Sungyong Park
Papers
One-Sided Message Passing Programming Model for Unstructured Peer-to-Peer Computing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Hai Jin
,
Fei Luo
,
Qin Zhang
,
Xiaofei Liao
,
Hao Zhang
Papers
Optimized FPGA Realization of Digital Matched Filter in Spread Spectrum Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-176
by
Yuxi Wang
,
Yebing Shen
Papers
Packet Combining Scheme with Bit Oriented XORed of All Bits of Packet: An Idea
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-181
by
Chandan T. Bhunia
Papers
Reliable WiMAX Multicast Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Jiann-Liang Chen
,
Kung-Cheng Wang
Papers
An Adaptive Policy-Based Vertical Handoff Algorithm for Heterogeneous Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Navid Mirmotahhary
,
Yasser Mafinejad
,
Faramarz Atbaei
,
Abbas Kouzani
Papers
Packets Delay Analysis Based on Simplified Scheduling Theoretical Model for Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-197
by
Yan Li
,
Guangxi Zhu
,
Fei Gao
,
Tianqi Xu
A Virus Prevention Model Based on Static Analysis and Data Mining Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-293
by
Tzu-Yen Wang
,
Chin-Hsiung Wu
,
Chu-Cheng Hsieh
Papers
Practical Performance Evaluation of Peer-to-Peer Internet Telephony Using SIP
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Benjamin Meyer
,
Marius Portmann
Papers
Efficient Geocast Utilizing Topology Information Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Songmin Kim
,
Younghwan Jung
,
Sangbin Lee
,
Eunsook Lee
,
Sunshin An
Papers
Constraints for Permission-Based Delegations
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-223
by
Qinghua Shang
,
Xingang Wang
Using Semantic Web Technologies in Visualizing Medicinal Vocabularies
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-329
by
Juha Puustjärvi
,
Leena Puustjärvi
Papers
Encryption Based Data Hiding Architecture with Text Pattern Authentication and Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-241
by
Ankur Dauneria
,
Kumari Indu
Papers
An ISMS (Im)-Maturity Capability Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-247
by
Steven Woodhouse
Papers
Performance of Iris Based Hard Fuzzy Vault
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
E. Srinivasa Reddy
,
I. Ramesh Babu
Papers
A User-Centric Privacy Authorization Model Based on Role and Session in the Context-Aware Home
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Hyangchang Choi
,
Yonghoon Yi
Papers
Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-263
by
Sai Charan Koduru
,
V. Chandrasekaran
Papers
Embedded Architectural Design Using Protection Logics to Defend Attack of Buffer Overflow and Unauthorized Access of Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-269
by
C. H. Yau
,
Y. Y. Tan
,
Anthony S. Fong
,
P. L. Mok
Papers
Protecting Information Systems from DDoS Attack Using Multicore Methodology
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Ashley Chonka
,
Wanlei Zhou
,
Keith Knapp
,
Yang Xiang
Papers
Investigation of Information Security Management Practices in Indian Pubic Sector Banks
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-281
by
Hemalatha Diwakar
,
Atul Naik
Papers
A Vulnerability and Exploit Independent Approach for Attack Path Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-287
by
Samresh Malhotra
,
Somak Bhattacharya
,
S. K. Ghosh
Papers
Agent Verification Protocol in Agent-Based IDS
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-299
by
LuqmanulHakim Mohd Nasir
,
Kamaruzzaman Seman
,
Madihah Mohd Saudi
Papers
Virtual Worlds: The Next Generation for Solving Engineering Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Manjit Singh Sidhu
,
Ramesh Singh
Papers
The Effect of MIMO Antenna Modes and Vehicle Speed on Channel Throughput of Mobile WiMAX for Multimedia Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-313
by
Jeich Mar
,
Chin-Chung Ko
,
Shao-En Chen
,
Chung-Hao Li
Papers
Adaptive Similarity Measurement Using Relevance Feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-318
by
Chu-Hui Lee
,
Meng-Feng Lin
Papers
Hybrid Segment-Based Transcoding Proxy Caching of Multimedia Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-324
by
Yoohyun Park
,
Yongju Lee
,
Hagyoung Kim
,
Kyongsok Kim
Papers
Optimized Geometric Hermite Curve Based on Curve Length Minimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-335
by
Jing Chi
,
Yunfeng Zhang
,
Caiming Zhang
Papers
CINETOON: A Semi-automated System for Rendering Black/White Comic Books from Video Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Dong-Sung Ryu
,
Soo-Hyun Park
,
Jeong-won Lee
,
Do-Hoon Lee
,
Hwan-Gue Cho
Papers
Quadric Polynomial Interpolation Based on Minimum Local Stretching Energy
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-347
by
Shanshan Gao
,
Jing Chi
,
Caiming Zhang
Papers
Combining Face Detection and Novelty to Identify Important Events in a Visual Lifelog
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-353
by
Aiden R. Doherty
,
Alan F. Smeaton
Papers
Behavourial Modeling in Mammography
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-361
by
Brian A. Hope
Papers
Classification for Breast MRI Using Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-367
by
Chuin-Mu Wang
,
Xiao-Xing Mai
,
Geng-Cheng Lin
,
Chio-Tan Kuo
Papers
An Independent Component Analysis Approach for Enhancing Camera Based Low Quality Text Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-373
by
Atishay Jain
,
Shashikala Tapaswi
,
Utpal Garain
Papers
A New Visual Attention Model Using Texture and Object Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-378
by
Hsuan-Ying Chen
,
Jin-Jang Leou
Papers
Cover Selection Steganography Method Based on Similarity of Image Blocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-384
by
Hedieh Sajedi
,
Mansour Jamzad
Papers
An Effective Error Concealment for H.264/AVC
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-390
by
Namrye Son
,
Senator Jeong
Papers
Hierarchical Integer Pixel and Adaptive Fractional Pixel Motion Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-395
by
Hyosun Yoon
,
Hyesuk Kim
,
Miyoung Kim
,
Lai Thi Anh Nga
,
Gueesang Lee
The Spatial-Temporal Channel for Information Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-487
by
Weihua Li
,
Xiaodong Fu
Papers
Anisotropic Diffusion Transform Based on Directions of Edges
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-400
by
Hye Suk Kim
,
Hyo Sun Yoon
,
Nguyen Dinh Toan
,
Guee Sang Lee
Papers
Novel Robust and Invariant Feature Extraction by Spatio-temporal Decomposition of Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-405
by
Shiva Kumar Korikana
,
V. Chandrasekaran
Papers
Investigation of Distortion Revision and Binarization of Each Lane on DNA Fingerprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-410
by
In Seop Na
,
Tae Ho Han
,
Soo Hyung Kim
,
Byeoung Hun Shin
,
Eui-Chul Kim
Papers
Experimental Studies on Dynamics Performance of Lateral and Longitudinal Control for Autonomous Vehicle Using Image Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Khalid Isa
Papers
Advanced Binarization Method for Music Score Recognition Using Local Thresholds
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-420
by
JaeMyeong Yoo
,
Nguyen Dinh Toan
,
DeokJai Choi
,
HyukRo Park
,
Gueesang Lee
Papers
A Framework for Intelligent Video Surveillance
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Frank Ekpar
Papers
Fire Surveillance System Using an Omni-directional Camera for??Remote Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-432
by
ByoungChul Ko
,
Hyun-Jae Hwang
,
In-Gyu Lee
,
Jae-Yeal Nam
Papers
Action Recognition Unrestricted by Location and Viewpoint Variation
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-438
by
Feiyue Huang
,
Guangyou Xu
Papers
The Segmentation and Visualization of Human Organs Based on Adaptive Region Growing Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-443
by
Jian Wu
,
Feng Ye
,
Jian-Lin Ma
,
Xiao-Ping Sun
,
Jing Xu
,
Zhi-Ming Cui
Papers
Identifying Unknown Adverse Drug Reaction Signal Pairs in Postmarketing Surveillance Using an Active Multi-agent System Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-449
by
Yanqing Ji
,
Hao Ying
,
Margo S. Farber
,
John Yen
,
Peter Dews
,
Richard E. Miller
,
R. Michael Massanari
Papers
Design of a Novel Protein Feature and Enzyme Function Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-455
by
Bum Ju Lee
,
Heon Gyu Lee
,
Keun Ho Ryu
A High Efficient Flash Storage System for Two-Way Cable Modem
Full-text access may be available. Sign in or learn about subscription options.
pp. 551-556
by
Chong Li
,
Qin Wang
,
Lei Wang
Papers
Clustering Microarray Data by Using a Stochastic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-461
by
Ho Sun Shon
,
Sunshin Kim
,
Seung Jung Shin
,
Keun Ho Ryu
Papers
An Integrated Approach Using Automatic Seed Generation and Hybrid Classification for the Detection of Red Lesions in Digital Fundus Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-467
by
Sandip Pradhan
,
S. Balasubramanian
,
V. Chandrasekaran
Papers
A Key Management Protocol for Securing Stability of an Intermediate Node in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-476
by
Yoon-Su Jeong
,
Ki-Soo Kim
,
Yong-Tae Kim
,
Gil-Cheol Park
,
Sang-Ho Lee
Papers
Secure Fault Tolerance in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-482
by
Ting Yuan
,
Shiyong Zhang
Papers
Context Reasoning Using Contextual Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-493
by
Tam Van Nguyen
,
Deokjai Choi
Papers
A Ubiquitous Learning System Using Co-learning Ubiquitous Pet for Enhancing Educational Effect
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-500
by
Xianzhi Ye
,
Lei Jing
,
Zixue Cheng
Papers
Continuous Sensor Data Mining Model and System Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-506
by
Duck Jin Chai
,
Long Jin
,
Kyoung Ho Bae
,
Buhyun Hwang
,
Keun Ho Ryu
Papers
A Practical Low Limit on Energy Spent on Processing of One Bit of Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 509-514
by
Jacek Izydorczyk
,
Ludwig Cionaka
Papers
Towards a Ternary Sigma-Delta Modulated Processor: Adder and Integrator
Full-text access may be available. Sign in or learn about subscription options.
pp. 515-520
by
Amin Z Sadik
,
Peter J. O'Shea
Papers
The Checkpoint Interval Optimization of Kernel-Level Rollback Recovery Based on the Embedded Mobile Computing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 521-526
by
Zhan Zhang
,
De-cheng Zuo
,
Yi-wei Ci
,
Xiao-zong Yang
Papers
Applying Particle Swarm Optimization to Prioritizing Test Cases for Embedded Real Time Software Retesting
Full-text access may be available. Sign in or learn about subscription options.
pp. 527-532
by
Khin Haymar Saw Hla
,
YoungSik Choi
,
Jong Sou Park
Papers
IXIV VMM: A VMM on 2-Level Ring Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 533-538
by
Shingo Aoyagi
,
Shuichi Oikawa
Papers
Codec System Design for Continuous Color Barcode Symbols
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-544
by
Songwen Pei
,
Guobo Li
,
Baifeng Wu
Papers
Voltage Emergence Prevention for Energy-Efficient Real-Time Task Synchronization
Full-text access may be available. Sign in or learn about subscription options.
pp. 545-550
by
Ya-Shu Chen
,
Tay-Jyi Lin
Showing 100 out of 125
Load More
Load All