By Topic

6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)

Date 11-13 July 2007

Filter Results

Displaying Results 1 - 25 of 198
  • 6th IEEE/ACIS International Conference on Computer and Information Science - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • 6th IEEE/ACIS International Conference on Computer and Information Science-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • 6th IEEE/ACIS International Conference on Computer and Information Science-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • 6th IEEE/ACIS International Conference on Computer and Information Science - TOC

    Publication Year: 2007, Page(s):v - xx
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2007, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2007, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2007, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Meta-Learning: From Classification to Forecasting, to Optimization, and Beyond

    Publication Year: 2007, Page(s): 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (113 KB) | HTML iconHTML

    Summary form only given: The goal of meta-learning is to model the relationships between the performance of various learning algorithms and the characteristics of problems being learned. In this sense, we are focused on learning about learning. Under what conditions can we expect a certain algorithm to perform well? The field of meta-learning has been very well developed in the machine learning co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2D Barcode and Augmented Reality Supported English Learning System

    Publication Year: 2007, Page(s):5 - 10
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1008 KB) | HTML iconHTML

    This study aims to construct a 2D barcode handheld augmented reality supported learning system called HELLO (handheld english language learning organization), to improve students' English level. The HELLO integrates the 2D barcodes, the Internet, augmented reality, mobile computing and database technologies. The proposed system consists of two subsystems: an English learning management system and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Answering English Queries in Automatically Transcribed Arabic Speech

    Publication Year: 2007, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    There are several well-known approaches to parsing Arabic text in preparation for indexing and retrieval. Techniques such as stemming and stopping have been shown to improve search results on written newswire dispatches, but few comparisons are available on other data sources. In this paper, we apply several alternative stemming and stopping approaches to Arabic text automatically extracted from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum Message Length Clustering of Spatially-Correlated Data with Varying Inter-Class Penalties

    Publication Year: 2007, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    We present here some applications of the minimum message length (MML) principle to spatially correlated data. Discrete valued Markov random fields are used to model spatial correlation. The models for spatial correlation used here are a generalisation of the model used in (Wallace 1998) for unsupervised classification of spatially correlated data (such as image segmentation). We discuss how our wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Growing the Pipeline: Restructuring an Introductory Computer Programming Course

    Publication Year: 2007, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    New data show that students' interest in computer science is declining. It has been noted that lower enrollment may be due to the bust of the "dot com " industry, to the perception that computer science jobs have been outsourced, and to the way that the discipline is being introduced and taught to a group of students who have grown up using the computer. The current research is an exploratory stud... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear?

    Publication Year: 2007, Page(s):29 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Worms and other forms of malware have been considered by IT Security firms and large companies for many years as one of the leading threats to the integrity of their data and security. However, several researchers over recent years have been working on creating worms which, instead of causing harm to machines which they infect, or the networks on which the machines reside, actually aid the network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated Technique for Video Watermarking

    Publication Year: 2007, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    The major goal of this study is to embed watermarks into a video file. The proposed scheme embeds watermarks into image block which contains features with high intensity, high texture, and fast motion, and improves the robustness of the embedded watermarks based on spatial domain. Since human visual system can't sense the variations of these feature regions within the video frames, an adaptive wat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chip Design of LPC-cepstrum for Speech Recognition

    Publication Year: 2007, Page(s):43 - 47
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    This paper proposed an ASIC of LPC-cepstrum (LPCC) for speech recognition. The proposed ASIC of LPCC can reduce the calculation load of processor in the speech recognition system. In addition, the resource sharing method is adopted into our design in order to reduce the chip size. Hence, it does not give an emphasis on sophistication but on high- performance and low-cost solution. Finally, we did ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CMOS Schmitt Trigger Circuit with Controllable Hysteresis Using Logical Threshold Voltage Control Circuit

    Publication Year: 2007, Page(s):48 - 53
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    A simple logical threshold voltage control circuit is proposed. It can be implemented using normal conventional CMOS inverters. The proposed circuit is able to control a logical threshold voltage of a gate linearly and continuously over a range of a power supply voltage. Applications to the Schmitt trigger circuit with controllable hysteresis and a window comparator are shown to demonstrate practi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Local and Global History Hashing in Perceptron Branch Prediction

    Publication Year: 2007, Page(s):54 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    As the instruction issue rate and depth of pipelining increase, branch prediction is considered as a performance hurdle for modern processors. Extremely high branch prediction accuracy is essential to deliver their potential performance. Many perceptron branch predictors have been investigated to improve the dynamic branch prediction in recent years. This paper introduces combining local history h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Limitations of Compilers to Exploit Thread-Level Parallelism in Embedded Applications

    Publication Year: 2007, Page(s):60 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    With the growing acceptance of multi-core architectures by the industry, devising novel techniques to extract thread-level parallelism from sequential programs has become a fundamental need. The role of compiler along with programming model and architectural innovation is of utmost importance to fully realize the potential performance benefits of the multi-core architectures. This paper evaluates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain Identification Algorithm for Personalised Query Expansion with Contextual Information

    Publication Year: 2007, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Human communications are quite successful and seem to be very easy. Human communication is more successful when there is an implicit understanding of everyday situations of others who take part in the communication. Similar to human communication, if an automated system could keep or capture the contextual information related to a user and the query, then it could use this information to process t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance analysis of page and object retrieval using HTTP-MPLEX in symmetric network environments

    Publication Year: 2007, Page(s):73 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    HTTP-MPLEX is a header compression and response encoding scheme for HTTP. It is designed to compress traditional HTTP requests and multiplex any number of responses to a single stream, thus improving application use of TCP, reducing the number of competing parallel connections and improving the time required to retrieve responses from a server. HTTP 1.1 is limited to transmitting one response per ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Oriented Architecture for Legal Web Portal

    Publication Year: 2007, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    This paper examines a legal portal which encompasses all information from the start of a matter to its completion and which also includes workflows of information and integration to application databases. It also presents a solution for a legal portal system (LPS) that manages the production and storage of documents, e-mails, legal precedent, financials and case management, with a collaborative ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards A Two-Layered Framework for Managing Web Services Interaction

    Publication Year: 2007, Page(s):87 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    This paper discusses the use of a framework for analyzing the interactions that arise between Web services engaged in composition. For the sake of achieving better coordination and avoiding conflicts, this framework assigns interactions to two layers known as business logic and support. The business-logic layer comprises control and transactional flows, whereas the support layer comprises exceptio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Agent Based Web Service

    Publication Year: 2007, Page(s):93 - 99
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Web service (WS) technology represents a fundamental shift in the way web applications are developed for e-business. It is becoming the next paradigm to deploy business services on the Web. Developing WS is a new challenge due to the complexity of various business processes and different communication protocols. In this paper, we propose a methodology to efficiently develop Web Services by wrappin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Relevance Feedback Strategies in CBIR

    Publication Year: 2007, Page(s):100 - 105
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB) | HTML iconHTML

    Relevance feedback (RF) is considered to be very useful in reducing semantic gap and thus enhancing accuracy of a Content-Based Image Retrieval system. In this paper, we have given a brief overview of research done in this area with an emphasis on feature re-weighting approach, a popular RF technique. We have also discussed an instance-based approach that has been introduced very recently. We cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.