By Topic

2008 IEEE International Conference on Signal Image Technology and Internet Based Systems

Nov. 30 2008-Dec. 3 2008

Filter Results

Displaying Results 1 - 25 of 116
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (363 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (1277 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (1332 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • SITIS 2008 Foreword

    Publication Year: 2008, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (125 KB) | HTML iconHTML
    Freely Available from IEEE
  • SITIS 2008 Conference Objectives

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (139 KB) | HTML iconHTML
    Freely Available from IEEE
  • SITIS 2008 Keynotes and Tutorials

    Publication Year: 2008, Page(s):xv - xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SITIS 2008 Committees

    Publication Year: 2008, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • IMRT Track Committee

    Publication Year: 2008, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • WITDS Track Committee

    Publication Year: 2008, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • SIT Track Committee

    Publication Year: 2008, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • OSSDS Track Committee

    Publication Year: 2008, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • SePTIS Track Committee

    Publication Year: 2008, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • KARE Worskhop Committee

    Publication Year: 2008, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • WOSOC Worskhop Committee

    Publication Year: 2008, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • SITIS 2008 Editorial Messages

    Publication Year: 2008, Page(s):xxix - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • Core Labeling: A New Way to Compress Transitive Closure

    Publication Year: 2008, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    A graph reachability query, as one of the primary tasks in numerous applications, is to find whether two given data objects, u and v, are related in any way in a large and complex dataset. Formally, the query is about to find if v is reachable from u in a directed graph which is large in size. In this paper, we focus ourselves on building a reachability labeling for large directed graphs, in order... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Transformation of Object Oriented-Based Systems to Component-Based Systems

    Publication Year: 2008, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    The aim of this paper is to present a framework that allows the generation of component-based software from object-oriented based software. The generation process is achieved via several steps starting from a transformation of the input software codes to their related UML designs; then creating the corresponding graphs whose nodes are elements such as classes and interfaces and the edges are the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Approaches to XML Schema Inference

    Publication Year: 2008, Page(s):16 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    In this paper we focus on the problem of automatic inferring of an XML schema for a given sample set of XML documents. We provide an overview and analysis of existing approaches and compare their key advantages. We conclude the text with a discussion of open issues and problems to be solved as well as their possible solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Twig Pattern Queries Based on Ordered Tree Matching

    Publication Year: 2008, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    In this paper, we study the evaluation of twig pattern queries based on the ordered tree matching. Different from the query evaluation based on the unordered tree matching, by which the order between siblings is not significant, the ordered tree matching takes the order between siblings into account and is useful for some applications such as tree-bank query evaluation. A new algorithm for this pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority Assignment for Multimedia Packets Scheduling in MANET

    Publication Year: 2008, Page(s):32 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    We propose a new scheme for multiclass packet scheduling which is a variant of EDF (earliest deadline first). The model corrects EDF domino effect in a nearly-overloaded system. Simulations results show that the proposed model performs better than classical EDF by enhancing QoS for soft-real time traffic without significant degradation of less constrained traffic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Ontology Based Document Feature Vector Modification Using Fuzzy Tree Transducer

    Publication Year: 2008, Page(s):38 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    Recently, an emphasis has been placed on the content based Information Retrieval Systems (IRS). Finding documents based on content similarity using background knowledge is becoming an increasingly important task. This paper aims for two main tasks in order to high quality document retrieval; first, we present our formulation of fuzzy ontology and then, by this formulation, propose a method which u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Multiple News Sites by Contrasting Articles

    Publication Year: 2008, Page(s):45 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    Today, there is access to large numbers of news sites in different countries, and there are several experimental systems, such as Newsblaster and NewsExplorer, that integrate news articles about a particular event from multiple news sites. These systems enable a good understanding of particular events by using multiple news sites, but they ignore the characteristics of the various news sites. To c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Videos Broadcasting Scheme for Near Video-on-Demand Services

    Publication Year: 2008, Page(s):52 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (877 KB) | HTML iconHTML

    This work proposes a multiple-video broadcasting scheme to reduce the subscriber startup latency by applying the finite bandwidth. The basic concept is taking the harmonic serious permutation, and popularizing to the multiple videos consider. The performance of the proposed method is better than the previous VOD broadcasting schemes in terms of startup latency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.