Notice
There is currently an issue with the citation download feature. Learn more

2006 Seventh Mexican International Conference on Computer Science

18-22 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 36
  • Seventh Mexican International Conference on Computer Science - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (422 KB)
    Freely Available from IEEE
  • Seventh Mexican International Conference on Computer Science - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Seventh Mexican International Conference on Computer Science - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Seventh Mexican International Conference on Computer Science - Table of contents

    Publication Year: 2006, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Invited Talk Abstracts

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (37 KB) | HTML iconHTML

    Presents abstracts of invited presentations from the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity of the Mixed Postman Problem with Restrictions on the Edges

    Publication Year: 2006, Page(s):3 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    The mixed postman problem consists of finding a minimum cost tour of a connected mixed graph traversing all its vertices, edges, and arcs at least once. We consider the variant of the mixed postman problem where all edges must be traversed exactly once. We prove that the feasibility version of this problem is NP-complete. We introduce a necessary condition for feasibility and show that it can be t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equidistribution algorithm for a two-dimensional phase field model

    Publication Year: 2006, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    An iterative equidistribution algorithm is proposed for solving a two-dimensional phase field model, using the finite element method. The phase field equation is used to model a two-phase fluid inside a tube, where the boundary conditions at the walls define the static contact angle. The numerical solution is found by the finite element method with triangular elements, using a structured mesh gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filtering by Sparsely Connected Networks Under the Presence of Strong Additive Noise

    Publication Year: 2006, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    A new approach to the problem of noise reduction in signals composed by superpositions of basis functions is proposed. The method is based on interpreting the components of signal models as nodes in a sparsely connected network of overlaps (scalar products). Every point in the data sample expresses an overlap. Networks of this kind, in which nodes carry information by means of vectors, define a kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Scheduling of Interrupt Requests over Conventional PC Hardware

    Publication Year: 2006, Page(s):27 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In this paper we analyze the traditional model of interrupt management and its incapacity to incorporate reliability and temporal predictability demanded on realtime systems. As a result of this analysis, we propose a model that integrates interrupts and tasks handling. We make a schedulability analysis to evaluate and distinguish the circumstances under which this integrated model improves the tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical fuzzy control to ensure stable grasping

    Publication Year: 2006, Page(s):37 - 43
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    In many robotic applications, the end effector consists of a gripper which has to execute a stable grasping while the manipulator is moving it in the workspace. Stable grasping is important to ensure the integrity of the object as well as the success of the overall performance. Accordingly, the end effector operation must be insensitive to external disturbances. End effector vertical acceleration ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-robot Motion Coordination based on Swing Propagation

    Publication Year: 2006, Page(s):44 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (697 KB) | HTML iconHTML

    A simple swing propagation mechanism for multi-robot motion coordination is presented. This mechanism is based on local-perception and low-level communication. It is oriented to coordinate situated modular robots. The swing propagation mechanism is divided into two movements: simple following and collective obstacle-avoidance. The first movement is executed when the leader of a robot formation is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Crescent Lab: A smart home lab for students

    Publication Year: 2006, Page(s):55 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Active learning comes from experiencing phenomena; computing and computer technology requires a place for these experiences to occur. A "Smart Home" is a type of intelligent environment that can provide such a place for this experiential learning. Smart Homes continue to entice us with their promise of anticipating and meeting our needs as they unobtrusively adapt to our changing preferences and g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery, Dissemination and Integration of Knowledge in a CSCL System

    Publication Year: 2006, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (469 KB) | HTML iconHTML

    Along with the increase of the educational materials deployed on the Web, an increase in the needs and expectations also exists towards the adoption of Web-based learning systems. In this respect, CSCL provides the technological infrastructure to conduct effective learning methodologies, since it allows the definition of new scenarios of learning as a social endeavor along with the means for their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Node Refinement Collocation Method for Partial Differential Equations

    Publication Year: 2006, Page(s):70 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    In this work, by using the local node refinement technique proposed by Behrens and Iske (2002) and Behrens et al. (2001), and a quad-tree type algorithm (Berger and Jameson, 1985; Keats and Lien, 2004), we built a global refinement technique for Kansa's unsymmetric collocation approach. The proposed scheme is based on a cell by cell data structure, which by using the former local error estimator, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abnormal Events Handling for Dependable Embedded Systems

    Publication Year: 2006, Page(s):81 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    In this paper, we analyze the difficulties of handling abnormal events. We introduce a framework that integrate the concepts of design by contract, exception safety and fault tolerance and from then, obtain a set of criterions for the design of a mechanism that integrate error code, exception and executable assertions for the handling of different types of abnormal events. From these criterions, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Groups: Enhanced Management of Encrypted Data in Databases

    Publication Year: 2006, Page(s):92 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Modern database systems integrate diverse technology to implement data security. One important aspect of the security scheme is about using encryption to protect sensitive information while it remains stored in the database. We first review in this paper the general aspects of data security and analyze how the leading commercial databases address these issues. Then we discuss about applying encryp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Composition Modeling: A Case Study

    Publication Year: 2006, Page(s):101 - 108
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    In the last years the innovation in technologies such as XML, Web services and component-based development has motivated the interest in business processes. For this reason various languages for design and implementation of business processes such as Business Process Execution Language for Web services (BPEL) have arisen. However, a weakness of these languages is the difficulty to be used by busin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Format Web Content Transcoding for Mobile Devices

    Publication Year: 2006, Page(s):109 - 115
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1839 KB) | HTML iconHTML

    The objective of this work is to allow users of mobile devices to visualize Web sites without mattering if Web sites were designed or not specifically for these types of devices; in that way, it is necessary to adapt Web contents to the limitations of each mobile device. In this paper, Web content transcoding mechanism "on-the-flight" is presented. This mechanism works by means of a simple inclusi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey for analyzing transactional behavior in service based applications

    Publication Year: 2006, Page(s):116 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    This paper introduces key dimensions to analyze how transactional behavior is addressed in service based applications. In such applications, transactional behavior cannot be provided in the sense of DBMS ACID transactions. A review of existing concepts and requirements is required for proposing an approach that addresses them. Although several approaches concerning transactional behavior have been... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a new Discretization of the Fourier Transform to Discriminate Voiced From Unvoiced Speech

    Publication Year: 2006, Page(s):127 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    In automatic speech recognition, voice synthesis, speaker identification and identifying laringeal diseases, it is critical to classify speech segments as voiced or unvoiced. Several techniques have been proposed for this issue during the last twenty years, unfortunately, they either have especial cases where the result is unreliable or need to use not only the present segment of speech but the ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.