By Topic

Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on

Date 27-29 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 124
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (15642 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Program Committee members

    Publication Year: 2008, Page(s):6 - 10
    Request permission for commercial reuse | PDF file iconPDF (278 KB)
    Freely Available from IEEE
  • System virtualization method for RFID tag infrastructure network

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is supposed that the various RFID-based services will be provided in the near future. Therefore, it is necessary to study how to construct RFID network system as a social infrastructure like the Internet. This paper proposes the virtualization method of RFID tag network system to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building detection from aerial images using invariant color features and shadow information

    Publication Year: 2008, Page(s):1 - 5
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB) | HTML iconHTML

    Robust detection of buildings is an important part of the automated aerial image interpretation problem. Automatic detection of buildings enables creation of maps, detecting changes, and monitoring urbanization. Due to the complexity and uncontrolled appearance of the scene, an intelligent fusion of different methods gives better results. In this study, we present a novel approach for building det... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of splitting methods in top-down OBB-tree construction

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1594 KB) | HTML iconHTML

    The Oriented Bounding Box trees (OBB-trees) offer efficient means for real-time collision detection between geometric models. The efficiency of the OBB-tree in answering the queries depends mainly on the way the triangles are splitted and distributed to the child nodes. In this paper we examine four different partitioning methods for top-down construction of OBB-trees and compare their performance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient heuristic for placement, scheduling and routing in wireless sensor networks

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    In this paper we consider the differentiated coverage problem for heterogeneous sensor networks over a finite planning horizon consisting of discrete time intervals. The goal is to determine optimal locations of sensors and sinks, activity schedules of the deployed sensors, and sensor-to-sink data routes subject to coverage, flow conservation, energy consumption and budget constraints with the obj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (2,2)-Secret Sharing scheme with improved share randomness

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    Visual secret sharing (VSS) is a method to scatter a secret image into shares of random patterns that have to be stacked together to reconstruct the secret. Since each share is a random pattern of black and white pixels, it is not enough to rebuild the secret from just one share. Stacking two shares reconstructs the first secret whereas rotating the first share by 90deg counterclockwise and stacki... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel constrained-path computation algorithm for failure recovery and CAC in GMPLS optical networks

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1976 KB) | HTML iconHTML

    GMPLS protocol was designed in order to apply label-switching techniques to different network technologies, such as time division multiplexing (TDM), wavelength routing and packet switching networks. Resource reservations are performed all along label switched paths (LSP). This paper proposes a novel constraint-based routing (CBR) algorithm for GMPLS networks. Our solution includes path computatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web image annotation using word co-occurrence and association analysis

    Publication Year: 2008, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    With the popularization of Web and image devices, there are more and more digital images available on the Internet. How to effectively organize and manage these Web images becomes a critical issue. In this paper, a novel approach that employs the relationships between words to achieve Web image annotations is proposed. First, the related textual information associated with Web images is identified... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subspace representation of registration and reconstruction in multi-frame Super-Resolution

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    Multi-frame super-resolution reconstruction (SRR) problem has two bottlenecks; under constrained reconstruction and observation registration. Currently there is no practical solution for these problems, even in domain-specific cases. In this work we suggest solutions for both of these problems. SRR problem is transformed to a reduced space to render an over-constraint problem. Thus significant amo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiresolution techniques for rain rendering in virtual environments

    Publication Year: 2008, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2391 KB) | HTML iconHTML

    Virtual environments often include rain and other atmospheric phenomena which are difficult to simulate in real time. In the field of virtual reality a number of solutions have been proposed which offer realistic but costly rain systems. Our proposal consists in developing a solution to facilitate the creation of rain scenes and to reduce the cost of previous particle systems, while maintaining th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal discretization for high-entropy graphical passwords

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB) | HTML iconHTML

    In click-based graphical password schemes that allow arbitrary click locations on image, a click should be verified as correct if it is close within a predefined distance to the originally chosen location. This condition should hold even when for security reasons the password hash is stored in the system, not the password itself. To solve this problem, a robust discretization method has been propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives of auto-correcting lens distortions in mosaic-based underwater navigation

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB) | HTML iconHTML

    When unmanned underwater vehicles (UUVs) perform missions near the ocean floor, optical sensors can be used to improve local navigation. Video mosaics allow to efficiently process the images acquired by the vehicle, and also to obtain position estimates. We discuss in this paper the role of lens distortions in this context, proving that degenerate mosaics have their origin not only in the selected... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIFT based geometric distortion correction method

    Publication Year: 2008, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB) | HTML iconHTML

    It is very important to cope with geometric distortions especially for robust watermarking systems since these attacks break the synchronization between the watermark and detector. In general, robustness to geometric attacks is considered as a different concept as rotation, scale and translation (RST) invariant watermarking. However, it is inseparable part of a copyright protection system. There a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality-of-service-aware multicast routing in heterogeneous networks with ad hoc extensions

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (897 KB) | HTML iconHTML

    A growing number of users communicate on the move with each other utilising wireless network technologies. The heterogeneity level of networks is increasing with various wired and wireless parts as well as access technologies. Mobile ad hoc communications can fill the connectivity gaps in such networks. However, the increasing amount of multimedia content shared over the wireless medium makes qual... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for Threat Evaluation and Weapon Assignment problem, hybrid learning with multi-agent coordination

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (630 KB) | HTML iconHTML

    The use of intelligent agents is one of the popular topics in defense industry. Agent usage would be beneficial for defense industry especially in decision making phase of the domain procedures. In Threat Evaluation Weapon Assignment System (TEWAS), we tried to develop learning agents working in coordination for the decision process of command and control systems. This paper describes all details ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new way of calculating the recovery line through eliminating useless checkpoints in distributed systems

    Publication Year: 2008, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (614 KB) | HTML iconHTML

    Uncoordinated checkpointing protocol is a simple protocol used in many distributed systems for fault tolerance. In this paper, we discuss on the size of rollback it has in the presence of failures. In order to determining the recovery line in checkpoint-based recovery, we first study to common approaches: dependency graph and checkpoint graph and provide some algorithms for these approaches. Then ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Cross-lingual Information Retrieval

    Publication Year: 2008, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    Cross lingual Information Retrieval (CLIR) refers to the information retrieval activities in which the query and/or documents may appear in different languages. Dictionary-based query translation has been a common method in CLIR systems. In these methods we face with the problem of translation ambiguity in which a single word in one language has more than one translation in the other language. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matchbook a web based recommendation system for matchmaking

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    In todaypsilas world, many systems and approaches make it possible for us to be guided by the recommendations they provide. Personalization, which intends to resolve the problems caused by the huge amount of information around, is the main goal to be achieved by these systems. In this paper, we represent the Web based recommendation system that we have developed by using personalization techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern recognition in cognitive communication

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (674 KB) | HTML iconHTML

    A cognitive communication method based on recognition of continuous signal patterns respecting to digital data streams is proposed in this study. Digital signals to be transferred are first converted to optimally chosen patterns from a pre-defined glossary with respect to bandwidth requirement and medium conditions. Receivers recognize the patterns from the chosen frequency band of the spectrum vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving aggregation behavior for robot swarms: A cost analysis for distinct fitness functions

    Publication Year: 2008, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    Evolving behaviors for swarm robotic systems offers interesting emerged strategies which may be complex and unpredictable by an explicit behavioral controller design. However, even in the evolutionary case, there are critical choices regarding the design of the evolutionary algorithm that a roboticist should take into account to achieve desired goal with a reasonable efficiency. Among these design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining adaptive tests

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    Adaptive test cases are often used when a specification permits several possible correct outputs from an implementation under test for a given input. In this paper, we propose an algorithm to apply such adaptive test cases which is optimal in terms of the number of inputs and is more efficient than previously published algorithm for executing the tests. Our solution comes at a cost, a pre-processi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Palmprint recognition using kernel PCA of Gabor features

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    This paper presents a new method for automatic palmprint recognition based on kernel PCA method by integrating the Gabor wavelet representation of palm images. Gabor wavelets are first applied to derive desirable palmprint features. The Gabor transformed palm images exhibit strong characteristics of spatial locality, scale, and orientation selectivity. These images can produce salient features tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.