By Topic

2008 International Conference on Computer Science and Information Technology

Aug. 29 2008-Sept. 2 2008

Filter Results

Displaying Results 1 - 25 of 203
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (314 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Committee Members

    Publication Year: 2008, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Application of Digital Watermark and Mobile Agent in Copyright Protection System

    Publication Year: 2008, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Digital watermark has been an important technology for copyright protection. However, it is a challenging task to searching watermark from the data over the network. The integration of mobile agent and digital watermark has been intensively investigated in recent years. A framework model is put forward to design copyright protection based on digital watermark and mobile agent. It can reduce the lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent Architecture for Collaborative CAD System

    Publication Year: 2008, Page(s):7 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    In order to improve the features of traditional CAD system, a system architecture based on multi-agent is put forward. The proposed system framework includes three levels, supporting the collaborative product design for different remote users. The user agents are classified as real-time monitoring agent, conflict detection agent, conflict solution agent, user communication agent and knowledge mana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling Algorithm Based on Task Priority in Heterogeneous Computing Environment

    Publication Year: 2008, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    In this paper, a scheduling algorithm suitable for independent heterogeneous tasks on heterogeneous computing has been studied. With the objective to find the best point between matching and load balancing , the concept of task priority has been used to improve the existing algorithm, and the simulation of our algorithm has been performed .The results demonstrated that through prioritizing tasks, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Certificate-Based Signcryption Scheme

    Publication Year: 2008, Page(s):17 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption, which combines traditional pubic key encryption (PKE) with identity-based encryption (IBE) while preserving most of the advantages of each, such as no private key escrow and less PKI infrastructure. In this paper, we propose the security notion of certificate-based signcryption and present a concrete certificate-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Fuzzy Support Vector Machine Method for Named Entity Recognition

    Publication Year: 2008, Page(s):24 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Recognizing and extracting exact name entities, like Persons, Locations, Organizations, Dates and Times are very useful to mining information from electronics resources and text. Learning to extract these types of data is called Named Entity Recognition (NER) task. Proper named entity recognition and extraction is important to solve most problems in hot research area such as Question Answering and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of the Secure Electronic Payment System Based on the SET Protocol

    Publication Year: 2008, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Chinapsilas E-business is still in its infancy and the limitation of financial system has still restricted the development of trans-border transactions. We need to promote more infrastructure construction, and then the E-business can enter the real era of transaction. The electronic payment is the key stage of the E-business and the basis of its development. This paper starts with various payment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hedged Predictions for Traditional Chinese Chronic Gastritis Diagnosis with Confidence Machine

    Publication Year: 2008, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Traditional Chinese chronic gastritis diagnosis focuses on producing an accurate classifier and uncovering the predictive confidence for individual instance. Transductive confidence machine (TCM), which is a novel framework that provides hedged prediction coupled with valid confidence. In the framework of TCM, the efficiency of prediction depends on the nonconformity measure of samples. This paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fade Scene Change Detection using Luminance Histogram Bin

    Publication Year: 2008, Page(s):39 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    Partitioning video sequence is very important for video applications such as video indexing, retrieval or editing. A lot of techniques have been presented based on information such as structures of the image, image histogram and intensity statistics etc. The histogram-based technique is generally used due to computation complexity when compare with other techniques is less, and most of image proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of Entrance Guard & Check on Work Attendance System Based on Face Recognition

    Publication Year: 2008, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    In this paper, the core algorithm is studied, which aiming at developing a robust and practical entrance guard & check on work attendance system based on face recognition, and this system is applied to the logistics management industry. Firstly, this algorithm divides the image into block images, which are also called sub-images. Then the well-known Fisher method is directly employed to the se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multilayer Method of Text Feature Extraction Based on CILIN

    Publication Year: 2008, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    The feature extraction is the most critical technology of text categorization. The method of feature extraction from Chinese text based on CILIN is different from the conventional feature extraction, which uses two feature extraction methods. This method is good at dealing with synonyms and polysemes, and reducing the dimension. Firstly, it uses the method of feature extraction from Chinese text b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model

    Publication Year: 2008, Page(s):53 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy re-encryption schemes have been proposed. However, all of these schemes are only proved secure in the random oracle not in the standard model. In this paper, Based on Waters's identit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking Finite Automata and Formal Methods Enhancing Modeling Power for Complex Systems

    Publication Year: 2008, Page(s):58 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    Automata have various applications and it plays an important role in computer science, particularly, in modeling behavior of systems. Z notation is an ideal one to be used defining state space of a system and then operations over it. Consequently, it requires an integration of automata and Z increasing its modeling power. Further, finite automata may have different implementations therefore if we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-Tolerance Ring Network on Chip without Buffer

    Publication Year: 2008, Page(s):67 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    The paper brings forward a hierarchical ring NoC (network on chip) topology whose links are divided into two groups of rings for fault-tolerance. Each group of ring contains one control-ring and one data ring. Control-ring propagates the information of routing, link error and error control of all nodes using packet switching. Data-ring exchanges data using circuit switching. Three pipeline stages ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Simulation of the Dynamic Complexity of a Host-parasitoid Model

    Publication Year: 2008, Page(s):72 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    In this paper, computer simulation is used to study the dynamic complexities of a host-parasitoid interaction with a Hassell growth function for the host and Holling-type functional response. Many forms of complex dynamic are observed, including quasiperiodic bands with periodic windows, Hopf bifurcation, period-doubling bifurcations, period-halving bifurcations, attractor crisis, intermittent cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network IMC-PID Control of CPE Polymerization Temperature Based on DDE

    Publication Year: 2008, Page(s):79 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (711 KB) | HTML iconHTML

    The production process of chlorinated polyethylene (CPE) is mainly a chemical polymerization. The CPE polymerization temperature has characteristics of time varying, nonlinear and large delay. In order to realize a steady and accurate automatic control system, the neural network IMCPID (NNIMCPID) control is advanced in the article. And base on the DDE technology, the control system can achieve the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instance Assisted Semantic Interoperability for Distributed Digital Museums

    Publication Year: 2008, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    The distribution and heterogeneity of information raise several challenges for systems to search and retrieve information mutually. One critical foundation for coordinated action in multi-systems is the ability to exchange representational objects that can be locally interpreted in ways that make sense. Coherent local interpretation of shared representations is needed to create global semantic coh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an Information Intelligent System based on Web Data Mining

    Publication Year: 2008, Page(s):88 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    How to efficiently use the vast amounts of information on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. In this paper, Web data mining process is introduced from the view of function, an intelligent mining system of network information is built with combining the data mining and artificia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.