ACIS International Conference on Computer and Information Science 2008 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


7th ACIS-ICIS 2008: Portland, Oregon, USA

jump to- Keynotes
- Computer Architecture and VLSI Track
- Control Systems, Intelligent System Track
- Image Processing and Pattern Recognition Track
- Information Management Systems and Management Track
- Internet Technology and Applications, E-commerce Track
- Middleware Architectures and Techniques Track
- Parallel and Distributed Computing and Systems Track
- Software Metrics and Project Management Track
- Software Reuse, Design Patterns Track
- UML, OO Modeling, and Simulation Track
- Web Engineering and Applications Track

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Roger Y. Lee:
7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA. IEEE Computer Society 2008, ISBN 978-0-7695-3131-1
Keynotes

David Garlan:
Software Architectures for Task-Oriented Computing. 3
C. V. Ramamoorthy:
Issues and Models of Security Oriented Systems. 4
Communication Systems and Networks Track

Xiaogang Yang, Baosong Shan
, Yaping Yang:
A Rate Control Protocol for High Speed Streaming Video. 7-12
Sourour Meharouech, Adel Bouhoula
, Tarek Abbes:
Collaboration between Security Devices toward improving Network Defense. 13-18
Lei Wang, Yanqin Zhu, Lanfang Jin, Xizhao Luo:
Trust Mechanism in Distributed Access Control Model of P2P Networks. 19-24
Computer Architecture and VLSI Track

Peng Huang, Daniel H.-Y. Teng, Khan A. Wahid, Seok-Bum Ko
:
Convergence Analysis of Jacobi Iterative Method Using Logarithmic Number System. 27-32
Amin Asghari, Seied Ahmad Motamedi
, Sepehr Attarchi:
Effective RTL Method to Develop On-Line Self-Test Routine for the Processors Using the Wavelet Transform. 33-38
Mir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri:
Comparison between New Quantum Approaches for Finding the Minimum or the Maximum of an Unsorted Set of Integers. 41-46
Mir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri:
Evaluation on Quantum Computation and Classic Parallel Approaches for Finding Estimation of the Length of Shortest Path in a Weighted Graph. 47-54
Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu
:
A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges. 55-60
Yongcheng Zhang:
Radix Plus Length Based Insert Sort. 61-66
Control Systems, Intelligent System Track

Huy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Chen:
An Integer Linear Programming Approach for Dedicated Machine Constraint. 69-74
Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan:
Efficient Complex Event Processing over RFID Data Stream. 75-81
M. Hadi Mashinchi, M. Reza Mashinchi, Mashaallah Mashinchi:
Tabu Search Solution for Fuzzy Linear Programming. 82-87
Jinhe Wang, Nan Zhang:
Temperature Control for the Thermal Cycling of Polymerase Chain Reaction. 88-92
Data Mining, Data Warehousing, and Database Track

Jinguo You, Jianqing Xi, Pingjian Zhang, Hu Chen:
A Parallel Algorithm for Closed Cube Computation. 95-99
Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu:
An Efficient Structural Index for Graph-Structured Data. 100-106
Qiong Wei, Yansheng Lu, Qiang Lou:
(t, lambda)-Uniqueness: Anonymity Management for Data Publication. 107-112
Abdul Mateen, Basit Raza
, Tauqeer Hussain, Mian M. Awais:
Autonomic Computing in SQL Server. 113-118
Jayanta Basak, Sunil Goyal:
Cross-Channel Customer Mapping. 119-126
Tadashi Murakami:
DBPowder-mdl: Mapping Description Language between Applications and Databases. 127-132
Duc A. Tran
, Khanh Vu:
Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information Loss. 133-139
Shuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu:
Entropy Based Clustering of Data Streams with Mixed Numeric and Categorical Values. 140-145
Hemalatha Diwakar, Alka Vaidya:
Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks. 146-151
Qiong Wei, Yansheng Lu, Qiang Lou:
Privacy-Preserving Data Publishing Based on De-clustering. 152-157
Zouhaier Brahmia
, Rafik Bouaziz
:
Schema Versioning in Multi-temporal XML Databases. 158-164
Shuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu:
Subspace Clustering of High Dimensional Data Streams. 165-170
Thuy T. Le, Syeda Naema Hashmi, Kurt McMullin:
Synchronizer - A Web-Based Application to Enhance Capabilities of NEESCentral Web Portal. 171-176
Image Processing and Pattern Recognition Track

Sepehr Attarchi, Karim Faez, Amin Asghari:
A Fast and Accurate Iris Recognition Method Using the Complex Inversion Map and 2DPCA. 179-184
Yan Song, Anan Liu, Lin Pang, Shouxun Lin, Yongdong Zhang, Sheng Tang:
A Novel Image Text Extraction Method Based on K-Means Clustering. 185-190
Ke Gao, Shouxun Lin, Yongdong Zhang, Sheng Tang, Huamin Ren:
Attention Model Based SIFT Keypoints Filtration for Image Retrieval. 191-196
Zhong Gao, Guanming Lu, Daquan Gu, Chun He:
Content-Based Classifying Traditional Chinese Calligraphic Images. 197-201
Yingjie Zhang, Liling Ge:
Region-Based Image Fusion Approach Using Iterative Algorithm. 202-207
Mir Hashem Mousavi, Karim Faez, Amin Asghari:
Three Dimensional Face Recognition Using SVM Classifier. 208-213
Image, Acoustic, Speech and Signal Processing Track

Yanxiong Li, Qianhua He, Tao Li:
A Novel Detection Method of Filled Pause in Mandarin Spontaneous Speech. 217-222
Yang Xu, Houfeng Wang, Xue-qiang Lü:
Research of English-Chinese Alignment at Word Granularity on Parallel Corpora. 223-228
Information Management Systems and Management Track

Thomas Neubauer, Johannes Heurix:
Objective Types for the Valuation of Secure Business Processes. 231-236
Young Dae Kim, Chan Kyou Hwang, Jae-Hyoung Yoo:
On-Line Network Reachability Analysis Using Forward Information Base Emulation. 237-240
N. R. Sunitha
, B. B. Amberker, Prashant Koulgi:
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. 241-246
Qianhui Althea Liang, J. Leon Zhao:
Verification of Unstructured Workflows via Propositional Logic. 247-252
Intelligent Agent Technology, Agent Based Systems Track
Internet Technology and Applications, E-commerce Track

Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu:
An Adaptive Index of XML for Frequent Branching Path Queries. 269-275
Md. Rafiqul Islam
, Wanlei Zhou
, Morshed U. Chowdhury
:
Email Categorization Using (2+1)-Tier Classification Algorithms. 276-281
Yongquan Cai, Xiuying Li:
Identity-Based Conference Key Distribution Scheme Using Sealed Lock. 282-286
Ge Zhang, Feng Cheng, Christoph Meinel:
SIMPA: A SIP-Based Mobile Payment Architecture. 287-292
Knowledge Discovery, Artificial Intelligence, Neural Networks Track

Yan Yu, Pilian He, Yushan Bai, Zhenlei Yang:
A Document Clustering Method Based on One-Dimensional SOM. 295-300
Dongshu Yan, Jintao Zhang, Bo Yu, Changtong Luo, Shaoliang Zhang:
A Genetic Algorithm for Finding Minimal Multi-homogeneous Bézout Number. 301-305
Hongjie Liu, Boqin Feng, Jianjie Wei:
An Effective Data Classification Algorithm Based on the Decision Table Grid. 306-311
Li-Qing Qiu, Ru-Yi Zhao, Gang Zhou, Sheng-Wei Yi:
An Extensive Empirical Study of Feature Selection for Text Categorization. 312-315
Xiulan Hao, Chenghong Zhang, Hexiang Xu, Xiaopeng Tao, Shuyun Wang, Yunfa Hu:
An Improved Condensing Algorithm. 316-321
Vo Dinh Minh Nhat, Duc Vo, Subhash Challa, Sungyoung Lee:
Efficient Projection for Compressed Sensing. 322-327
Ricardo Gacitúa, Peter Sawyer:
Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition Techniques. 328-333
Changtong Luo
, Shaoliang Zhang, Bo Yu:
Low Dimensional Reproduction Strategy for Real-Coded Evolutionary Algorithms. 334-339
Ryutaro Ichise:
Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity Measures. 340-346
Farshad Kyoomarsi
, Hamid Khosravi, Esfandiar Eslami, Pooya Khosravyan Dehkordy, Asghar Tajoddin:
Optimizing Text Summarization Based on Fuzzy Logic. 347-352
Middleware Architectures and Techniques Track

Yucong Duan, Kyo Chul Kang, Yuqing Gu:
A Solution Framework on Fundamentals in Model Transformation. 355-360
Shahid Mumtaz
, Atílio Gameiro, Jonathan Rodriguez
:
EESM for IEEE 802.16e: WiMaX. 361-366
Ivan Silva Neto, Francisco Reverbel:
Lessons Learned from Implementing WS-Coordination and WS-AtomicTransaction. 367-372
(Withdrawn) Observations on Liner Prediction Based Blind Source Extraction Algorithms. 373-376
Minghui Wang, Yongquan Yu, Bi Zeng:
Research and Application of Information Granulation Based on Extension Method. 377-381
Tomi Räty, Johannes Oikarinen, Mikko Nieminen, Mikko Lindholm:
Sensor Data Collection of the Single Location Surveillance Point System. 382-387
Mobile/Wireless Computing Track

Jing Xie, Dan Yu, Shilong Ma:
A Novel Enterprise Mobile E-mail System Using the SyncML Protocol. 391-396
Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Chang-Sun Shin, Hyun Yoe:
Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses. 397-400
Sheng-Tzong Cheng, Szu-Yun Li, Chia-Mei Chen:
Distributed Detection in Wireless Sensor Networks. 401-406
Parallel and Distributed Computing and Systems Track

Young-Joo Kim, Daeyoung Kim, Yong-Kee Jun:
An Empirical Analysis of Intel Thread Checker for Detecting Races in OpenMP Programs. 409-414
Rashid Bin Muhammad
:
Execution Time Analysis of a Parallel Steiner Tree Algorithm on Server-Client Model of Computation. 415-420
Jing-jun Zhao, Shu-xin Bao, Yu Li:
Exponential Integral Methods for Burgers Equation. 421-426
Nitin
, Durg Singh Chauhan, Vivek Kumar Sehgal
, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Finite-State Modeling and Testing of Image Based Authentication System. 427-432
Fadi N. Sibai
:
Gauging the OpenSourceMark Benchmark in Measuring CPU Performance. 433-438
Wenhong Wei, Wenjun Xiao, Zhen Zhang:
Parallel Sorting on the Biswapped Network. 439-443
Chunbo Chu, Monica Brockmeyer:
Predicate Detection Modality and Semantics in Three Partially Synchronous Models. 444-450
Programming Languages, Compilers, and Operating Systems Track

Kostadin Kratchanov, Emilia Golemanova, Tzanko Golemanov:
Control Network Programming Illustrated: Solving Problems with Inherent Graph-Like Representation. 453-459
Software Metrics and Project Management Track

Tauqeer Hussain, Mian M. Awais:
An Effort-Based Approach to Measure Completeness of an Entity-Relationship Model. 463-468
Youngki Hong, Jongmoon Baik, In-Young Ko, Ho-Jin Choi:
A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics. 469-474
Jinhua Li, Zhibing Ma, Huangzhen Dong:
Monitoring Software Projects with Earned Value Analysis and Use Case Point. 475-480
Software Engineering and Information Engineering Track

Haihe Shi, Jinyun Xue, Dawei Du:
A Mechanical Approach for Deriving Algorithmic Programs. 483-487
Jaroslav Král, Michal Zemlicka
:
Engineering Education - A Great Challenge to Software Engineering. 488-495
Haihe Shi, Dawei Du, Jinyun Xue:
Generating Algorithms plus Loop Invariants by Formal Derivation. 496-501
Seon-Jae Jang, Hae-Geun Kim, Youn-Ky Chung:
Manual Specific Testing and Quality Evaluation for Embedded Software. 502-507
Oh-Hyun Kwon, Sun-Myung Hwang:
Mobile GUI Testing Tool based on Image Flow. 508-512
Lile Hattori, Dalton Serey Guerrero, Jorge C. A. de Figueiredo, João Brunet, Jemerson Damásio:
On the Precision and Accuracy of Impact Analysis Techniques. 513-518
Sajid Ibrahim Hashmi, Jongmoon Baik:
Quantitative Process Improvement in XP Using Six Sigma Tools. 519-524
Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma:
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. 525-530
Mikyeong Moon, Heung Seok Chae, Junseok Park, Keunhyuk Yeom:
Two-Dimensional Framework for Analyzing Variabilities in Software Product Lines. 531-536
Software Reuse, Design Patterns Track

Miao Wang, Rongcai Zhao, Jianmin Pang, Guoming Cai:
Reconstructing Control Flow in Modulo Scheduled Loops. 539-544
Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang:
Recovering Variable-Argument Functions from Binary Executables. 545-550
Software Testing and Tools Track

Prabu Dorairaj, Devi Prasad Bhukya, Lakshminarayana Prasad Kantam, Kishor Arumilli:
A New Operational Framework for Benchmarking the SAN Products. 553-560
Hoyeon Ryu, Dong-Kuk Ryu, Jongmoon Baik:
A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMM. 561-566
Yogesh Singh, Anju Saha:
Enhancing Data Flow Testing of Classes through Design by Contract. 567-574
Nitin
, Durg Singh Chauhan, Vivek Kumar Sehgal
, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. 575-580
Izzat Alsmadi
:
The Utilization of User Sessions in Testing. 581-585
UML, OO Modeling, and Simulation Track

Jiuzhen Jin, Jianmin Pang, Zheng Shan, Rongcai Zhao:
Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS. 589-594
Visual and Multimedia Track

Duc A. Tran
, S. R. Pamidimukkala, Phuong Nguyen:
Relevance-Feedback Image Retrieval Based on Multiple-Instance Learning. 597-602
Web Engineering and Applications Track

Minhyuk Oh, Jongmoon Baik, Sungwon Kang, Ho-Jin Choi:
An Efficient Approach for QoS-Aware Service Selection Based on a Tree-Based Algorithm. 605-610
Yongwang Zhao, Dianfu Ma, Min Liu, Chunyang Hu:
Coordination Behavioral Structure: A Web Services Coordination Model in Dynamic Environment. 611-617
Jim Lau
, Lau Cheuk Lung, Joni da Silva Fraga, Giuliana Santos Veronese:
Designing Fault Tolerant Web Services Using BPEL. 618-623
Rujuan Liu, Changjun Hu, Chongchong Zhao, Zhong Gao:
Verification for Time Consistency of Web Service Flow. 624-629
Ya-mei Xia, Jun-Liang Chen, Xiang-wu Meng:
On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones. 630-635
Workshop on E-activity Track

Yoshihito Saito, Takayuki Fujimoto
, Tokuro Matsuo:
A New Negotiation Mechanism for Agent-Based Lecture Allocation Systems. 639-644
Jungmin Shin, Joachim Hammer, Herman Lam:
RDF-Based Approach to Data Transform Composition. 645-648
Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee:
Building a Service-Oriented Ontology for Wireless Sensor Networks. 649-654
Dukyun Nam
, June Hawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim:
Research Process Support with Organizational Flow in e-Science. 655-660
Takayuki Fujimoto
, Muhammad Dzulqarnain bin Muhammad Nasir, Tokuro Matsuo:
A Design on Collaborative-Cooperative Document Edit System Based on Cognitive Analyses. 661-666
Hamidreza Amouzegar, Shahriar Mohammadi, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji:
A New Approach on Interactive SOA Security Model Based on Automata. 667-671
Jin-Suk Kang, Yonghee You, Mee Young Sung, Taikyeong T. Jeong, Jong-An Park:
Mobile Mapping Service Using Scalable Vector Graphics on the Human Geographic. 672-677
HaiBo Zhu, Ying Zou:
Analysis of E-bank Innovation in China Using a Hypercube Model. 678-683
Sabina Jeschke
, Helmut Vieritz, Olivier Pfeiffer:
Developing Accessible Applications with User-Centered Architecture. 684-689
Pyungkwan Ko, Sanggil Kang, Harshit Kumar:
Web Page Dependent Vision Based Segementation for Web Sites. 690-694
Himanshu Agrawal, Andrew Jennings, Mark A. Gregory
, Daud Channa:
Robust Routing. 695-700

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







