By Topic

2007 22nd international symposium on computer and information sciences

7-9 Nov. 2007

Filter Results

Displaying Results 1 - 25 of 80
  • 2007 22nd International symposium on computer and information sciences

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • 2007 22nd International symposium on computer and information sciences

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Organization

    Publication Year: 2007, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Research issues in Peer-to-Peer data management

    Publication Year: 2007, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Data management in peer-to-peer (P2P) systems is a complicated and challenging issue due to the scale of the network and highly transient population of peers. In this paper, we identify important research problems in P2P data management, and describe briefly some methods that have appeared in the literature addressing those problems. We also discuss some open research issues and directions regardi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Dynamic-BrickR access method for mobile objects

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The database storage and organization of data describing the evolution of mobile objects is an open challenge. Data must be managed in efficient structures with respect to both the storage space consumed and the data access through the means of these structures. We introduce in this paper a new indexing method that improves the data access and, consequently, the queries processing efficiency. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to adaptive encoding data using self-organizing data structures

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    This paper demonstrates how techniques applicable for defining and maintaining a special case of binary search trees (BSTs) can be incorporated into "traditional" compression techniques to yield enhanced superior schemes. We, specifically, demonstrate that the newly introduced data structure, the Fano Binary Search Tree (FBST) can be maintained adaptively and in a self-organizing manner. The corre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced semantic operations for web service composition

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    In service composition, service discovery and combining suitable services through determination of interoperability among different services are important operations. Utilizing semantics improves the quality and facilitates automation of these operations. There are several previous approaches for semantic service discovery and service matching. In this work, we exploit and extend these semantic ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIRC, a multiple isolation level protocol for middleware-based data replication

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    One of the weaknesses of database replication protocols, compared to centralized DBMSs, is that they are unable to manage concurrent execution of transactions at different isolation levels. In the last years, some theoretical works related to this research line have appeared but none of them has proposed and implemented a real replication protocol with support to multiple isolation levels. This pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database Fusion Using Atom

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    This paper describes a database fusion infrastructure that produces a local database consisting of aggregated information that is selected from multiple remote databases and is transformed into a common table format and data representation in the local database. The database fusion infrastructure provides reliable data distribution (RDD), consistent data replication (CDR), and database aggregation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced grouping algorithm for vertical partitioning problem in DDBs

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Distribution design involves making decisions on the fragmentation and allocation of data across the sites of a computer network. Vertical partitioning is the process of subdividing the attributes of a relation to generate fragments. In this paper, we propose an enhancement to our previous work for vertical partitioning algorithm using grouping approach. This algorithm starts from the attribute af... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of methods for semantic photo annotation suggestion

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    In this work we describe a general framework for semi-automated semantic digital photo annotation though the use of suggestions. We compare context-based methods with Latent Semantic Indexing, a linear algebra approach to information retrieval. Through experiments on real data sets containing up to 13,705 semantically annotated photos, we show that a carefully chosen combination of context-based m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving quality of code generated from OCL expressions

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    In this paper, we briefly describe existing principles and stages for generating code from OCL expressions pointing out the drawbacks that cause inefficiencies of the resulting code. The proposed improvement of the transformation is based on extended abstract syntax trees (AST) with context-specific attributes. Principles for defining such attributes on AST trees and an example of transformation i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An inspection approach for conceptual models in notations derived from UML: A case study

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    This paper presents an overview of a proposed framework for improving the quality of conceptual models developed in notations derived from UML. To this aim, wellness properties of a UML model are described shortly. Through a case study, we show that an ad hoc inspection process in accordance with this framework can be defined and performed depending on the conceptual modeling notation and typical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solution of large-scale scattering problems with the multilevel fast multipole algorithm parallelized on distributed-memory architectures

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    We present the solution of large-scale scattering problems involving three-dimensional closed conducting objects with arbitrary shapes. With an efficient parallelization of the multilevel fast multipole algorithm on relatively inexpensive computational platforms using distributed-memory architectures, we perform the iterative solution of integral-equation formulations that are discretized with ten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for the management of distributed systems based on SNMP

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    The traditional task of managing and monitoring a network has never been a trivial one. With recent changes in computing and networking, the area of distributed systems management faces new challenges and increasing complexity. Research in the relevant field reveals that, while there are many research and commercial solutions available, some of them are based on proprietary standards. Others focus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heading-based sectional hierarchy identification for HTML documents

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    Most of the documents found on the Web are prepared in HTML format which was basically designed for presentation of data. As a result, some limitations are encountered when these documents are accessed automatically for a semantic interpretation of their content. One such inadequacy is in representing the sectional hierarchy (i.e. sections and subsections) of these documents and the headings in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using learning automata to model the “learning process” of the teacher in a tutorial-like system

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    Unlike the field of Tutorial systems, where a real-life student interacts and learns from a software system, our research focuses on a new philosophy in which no entity need be a real-life individual. Such systems are termed as Tutorial-like systems, and research in this field endeavours to model every component of the system using an appropriate learning model (in our case, a Learning Automaton (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial agent society simulations in an encounter-based normative action environment

    Publication Year: 2007, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    The purpose of the study is to investigate potential relationship between agents' socialness and society's behavior predictability in an encounter-based normative action environment. For this purpose, we proposed a hypothesis and tested it against different simulation setups in the context of classical single source shortest path problem. By the end of simulations, it is observed that the hypothes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Off-line signature verification with PSO-NN algorithm

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Analysis of signature is a widely used and developed area of research for personal verification. A typical signature verification system generally consists of four components: data acquisition, pre-processing, feature extraction and verification. This paper presents a novel technique for off-line signature verification (SV). The technique is based on a neural network (NN) approach trained with par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restoration of damaged slices in images using matrix pseudo inversion

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    A matrix pseudo inversion based method is developed for coding of images in real field in a way that at the receiver, one can restore the lost portions of the images. The proposed solution is similar to channel coding techniques, but it is done before source coding at the transmitter and after decoding of the compressed data at the receiver. Experiments show the effectiveness of the proposed solut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganography using block-based adaptive threshold

    Publication Year: 2007, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information-hiding capacity. In this paper, we proposed a new method of the adaptive steganography using complexity on bit planes of color image. Applying fixing threshold and variabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and simulation of a General Regression Neural Network using hardware description language

    Publication Year: 2007, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    This study presents the development of a synthesizable VHDL (very high speed integrated circuit hardware description language) model of a general regression neural network (GRNN). The GRNN has a four-layer structure which is comprised of an input layer, a pattern layer, a summation layer and an output layer. The designed system can be used for pattern classification applications. Iris dataset is u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.