Scheduled System Maintenance
On Tuesday, February 28, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (18:00-22:00 UTC).
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

International Symposium on Computer Science and its Applications

13-15 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 83
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (5712 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Title page iv - Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chairs

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (117 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the Program Chairs

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • An Analytical Survey of "On-Site Customer" Practice in Extreme Programming

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Extreme programming (XP) is one of the most frequently used methodologies in Agile Software Development. According to various reports it had a significant effect on the software projects that use XP. In this paper, one of the main practices of XP, called "on-site customer" is considered, in detail. Also, various important cases and problems related to its implementation are considered. In each cas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication Based QoS Using Bandwidth Limitation

    Publication Year: 2008, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB) | HTML iconHTML

    In this paper, we present a method for providing quality of service using bandwidth limitation. In practical demonstration of the idea, we have used an algorithm for packet queuing, a technique applicable in a setup where the systems are connected to the Internet through a server and the server receives and distributes all the packets requested from the all the users in the network. The idea basic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Self-Managing Properties in Virtual Organizations

    Publication Year: 2008, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Emergence of enterprise modeling, and high integration of supply chains, virtual enterprises (VEs), virtual organizations (VOs), virtual government, agent programming, and autonomous systems represent a major trend in which organizations and enterprises seek joint organizations that allow them to participate in competitive business opportunities in new markets for innovative developments. An the v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quadtree and Hash Table Based Index Structure for Indexing the Past, Present and Future Positions of Moving Objects

    Publication Year: 2008, Page(s):17 - 21
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Traditional index structures do not work well on moving objects because of the need of frequently updating the index which leads to the poor performance. This paper presents a novel index structure based on the improved Quadtree and Hash table, namely the QH-index which can index the past, present and future positions of moving objects and can support moving objects' range queries and point querie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Prefetching Strategy Based on Access Density in Linux

    Publication Year: 2008, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    This paper presents a new access-density-based prefetching strategy to improve prefetching for the access patterns that have not been dealt with in the current Linux read-ahead algorithm. These access patterns include: reading file data backwards, reading files in a stridden way (leaving holes in between two adjacent references), alternating references between multiple file regions and reading fil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)

    Publication Year: 2008, Page(s):28 - 31
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    In order to conceal malware, malware authors use the packing and encryption techniques. If the malware is packed or encrypted, then it is very difficult to analyze. Therefore, to prevent the harmful effects of malware and to generate signatures for malware detection, the packed and encrypted executable codes must initially be unpacked. The first step of unpacking is to detect the packed executable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Transport Framework for Web Services

    Publication Year: 2008, Page(s):32 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    In this paper, we present an adaptive transport framework which addresses multiple message exchange patterns (MEPs) and transparent switching between multiple transports for Web services. In the framework, we separate the transportation process into transport input stage and transport output stage by using pipelined pattern. Moreover, we introduce a set of abstractions, such as transport protocol,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WRP: Weighting Replacement Policy to Improve Cache Performance

    Publication Year: 2008, Page(s):38 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    As the performance gap between memory systems and processors has increased, virtual memory management plays an important role in system performance. Different caching policies have different effects on the system performance. This paper studies an adaptive replacement policy which has low overhead on system and is easy to implement. Simulations show that our algorithm performs better than least-re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control Policy Model for Implementing Network Based Authorization Framework

    Publication Year: 2008, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    One of the major threats that an enterprise information system networks are facing today is the internal threat. In this paper we develop a formal network access control model as per ISO/IEC security evaluation criteria - common criteria to provide a formal framework for implementing an Internal threat protection security solution in network computing environment. We used network interpretation of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic Semantic Term-Network Construction System

    Publication Year: 2008, Page(s):48 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    An automatic semantic term-network construction system is implemented in this research. This system uses the statistical values of the terms appeared in a document corpus. The term to term relationships in the term-network are decided by the similarities between term and term vectors. In order to measure the performance of our system, a standard data collection set, Reuters-21578, is used and abou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NPASA: A Noble Path Selection Algorithm

    Publication Year: 2008, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    As the network is growing exponentially, challenges and issues also increases. They affect the performance of the network. Many factors contribute to improve the performance of the network. One such factor is finding the path quickly. In this paper, we are going to find a shortest path faster compared to Dijkstra's shortest path algorithm. We have introduced new ideas in building the end-to-end pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Method for Mining Generalized Frequent Itemsets Based on the Correlation between Items

    Publication Year: 2008, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Mining generalized association rules is closely related to the taxonomy(is-a hierarchy) data which exists widely in retail, geography, biology and financial domains. If we use traditional method to mine the generalized association rules, it becomes inefficient because the itemsets will be huge along with the items and levels of taxonomy increasing, and it also wastes lots of time to calculate the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Breadth-First Search Algorithm for Mining Generalized Frequent Itemsets Based on Set Enumeration Tree

    Publication Year: 2008, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Mining generalized association rules is one of important research area in data mining. If we use the traditional methods, it will meet two basic problems, the first is low efficiency in generating generalized frequent itemsets with the items and levels of taxonomy increasing, and the second is that too much redundant itemsets' support are counted. This paper proposes an improved Breadth-First Sear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Power Quality Events Using DOST-Based Support Vector Machines

    Publication Year: 2008, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    This paper presents a method based on discrete orthogonal S-transform (DOST) and support vector machines (SVM) for detection and classification of power quality events. DOS-transform is mainly used to extract features of power quality events and support vector machines are mainly used to construct a multi-class classifier which can classify power quality events according to the extracted features.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Surface Reconstruction Approach with a Rotated Camera

    Publication Year: 2008, Page(s):72 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    The applications of 3D information acquisition and 3D solid surface reconstruction are increasing in the last years. This paper presents a solution of capturing 3D information from 2D image sequence, which captures 3D information with a rotated camera. Solutions for 3D information acquisition are briefly reviewed first, and current work on 3D information acquisition from 2D image sequence is descr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Zero/One Matrix-Vector Multiplication Based on Cache

    Publication Year: 2008, Page(s):78 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    This article describes a new method which we have used for computing matrix-vector products. Matrix-vector multiplication is the core of black-box algorithm, which is effective when we analyze the properties of sparse or structured matrix. Hence it is very useful to optimize the calculation. Here we design an algorithm for large-sized sparse zero-one matrix-vector products based on the theory of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP Traceback Using DNS Logs against Bots

    Publication Year: 2008, Page(s):84 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (607 KB) | HTML iconHTML

    Source IP spoofing attacks are critical issues to the Internet. These attacks are considered to be sent from bot infected hosts. There has been active research on IP traceback technologies. However, the traceback from an end victim host to an end spoofing host has not yet been achieved, due to the lack of traceback probes installed on each routing path. There is a need to replace alternative probe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.