By Topic

2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing

6-8 Aug. 2008

Filter Results

Displaying Results 1 - 25 of 172
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (8090 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2008, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2008, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (24 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xx - xxiv
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xxv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Hosting and Sponsoring Organizations

    Publication Year: 2008, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2008, Page(s): xxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB) | HTML iconHTML

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2008, Page(s): xxix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB) | HTML iconHTML

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier

    Publication Year: 2008, Page(s):3 - 7
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    As digital contents are increasingly used on mobile devices, digital rights management(DRM) application will become a core component of mobile terminals. OMA DRM, invented by the open mobile alliance (OMA), is the most widely available mobile DRM standard. Following a general description about OMA DRM 2.0, this paper gives a detailed analysis about cryptographic operations and Rights Objects acqui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of Facial Expression Using SVM for Emotion Care Service System

    Publication Year: 2008, Page(s):8 - 12
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    This paper presents a real-time approach to classify facial expression from a sequence of input images to provide emotion care service in developing a wellbeing life care system. The facial expression recognition from video images is useful to handle with sequential changes of facial expression. However, it needs more cost in training images and constructing database rather than using a still imag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of the Mechanisms of the Zigbee's Indoor Localization Algorithm

    Publication Year: 2008, Page(s):13 - 18
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Localization has been an important issue along with the development of context-aware systems applicable to dynamic mobile environment. ZigBee is very cheap and less power consuming wireless techniques comparing to other types such as RFID, infrared and ultrasound. Thus this paper compares conventional techniques for predicting mobile objectpsilas location by combining estimates drawn from received... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Quality Level for Developing Information Security System Adopting QFD

    Publication Year: 2008, Page(s):19 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    An increase in internet threats forces organizations to integrate information security system into their fundamental systems. Developers who work in this area should focus on both functionality and quality aspects because a malfunctioned system can endanger organizationpsilas most critical information. Although several approaches to solve a resource distribution problem have been proposed, little ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidisciplinary Design Approach Using Repetitive Response Surface Enhancement and Global Optimization

    Publication Year: 2008, Page(s):25 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    In this study, repetitive response surface enhancement technique (RRSET) is proposed as a new system approximation method for the efficient multidisciplinary design and optimization (MDO). In order to represent the highly nonlinear behavior of the response with second order polynomials, RRSET introduces a design space transformation using stretching functions and repetitive response surface improv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling Frequency

    Publication Year: 2008, Page(s):29 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    We have used neural network water level trend prediction (NNWLTP) in support of a water level sensing project. The NNWLTP approach allows dynamic change in water level sampling frequency, which will reduce power consumption and extend battery life in energy constrained devices. This paper deals primarily with the NNWLTP, which would allow sampling frequency change commands to be transmitted to the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method for All Solutions SAT Problem

    Publication Year: 2008, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    All-solution Boolean satisfiability (SAT) solver has been widely used throughout the EDA industry fields, such as formal verification, circuit synthesis and automatic test pattern generation. Exploiting structure information especially observability donpsilat cares(ODCs) of circuits can improve the efficiency of SAT solvers. The authors converted the ODC property of signal to clauses of CNF formul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Tabu Search and Ant Colony System Approach for the Capacitated Location-Routing Problem

    Publication Year: 2008, Page(s):46 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    In this article we study the capacitated location routing problem (CLRP) which is defined as a combination of two problems: the facility location problem (FLP) and the vehicle routing problem (VRP). The CLRP is not just a purely academic construct; it has many applications in the practice. We propose a hybrid approach based on a tabu search algorithm combined with an improved ant colony system to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Performance Management Method for Failure Detection

    Publication Year: 2008, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    Failure detection is an essential part to build high dependable distributed real-time embedded systems. However, the performance degradation of production work due to the execution of failure detection cannot be omitted. We present an adaptive performance management method for failure detection based on feedback control theory. This method is autonomous and thus allows the system to self-manage th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combined Fuzzy State Q-learning Algorithm to Predict Context Aware User Activity under Uncertainty in Assistive Environment

    Publication Year: 2008, Page(s):57 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    In an assistive environment (AE), where dependant users are living together, predicting future user activity is a challenging task and in the same time useful to anticipate critical situation and provide on time assistance. The present paper analyzes prerequisites for user-centred prediction of future activities and presents an algorithm for autonomous context aware user activity prediction, based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Approaches for Software Watermarking by Register Allocation

    Publication Year: 2008, Page(s):63 - 68
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    QP and QPS algorithms for software watermarking add extra edges to an interference graph of a program and then color the graph to embed a message by allocation of registers to variables. QP algorithm has a drawback that the embedded message is not always retrievable. QPS algorithm has a drawback that it can embed the shorter messages only. In this study, we present two new algorithms color change ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Placing a Liaison between Two Members of the Same Level in an Organization Structure of a Complete Binary Tree

    Publication Year: 2008, Page(s):69 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    This paper proposes a model of placing a liaison which forms relations to two members of the same level in a pyramid organization structure such that the communication of information between every member in the organization becomes the most efficient. For the model of adding a node of liaison which gets adjacent to two nodes with the same depth N in a complete binary tree of height H which can des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Ontology Partition Based on Ant Colony Algorithm

    Publication Year: 2008, Page(s):73 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Ontology is an effective method to express knowledge. Some ontologies are large usually. The large scale of ontology brings a new problem in maintenance, release etc. Ontology can be divided into some small ontologies through ontology partition. It leads to easy use of ontology. Ontology partition method based on ant colony algorithm is presented in the paper. Not only hierarchy relations, but als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.