By Topic

Computer Science and Computational Technology, 2008. ISCSCT '08. International Symposium on

Date 20-22 Dec. 2008

Go

Filter Results

Displaying Results 1 - 25 of 195
  • [Front cover - Vol 2]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1118 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2008, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • Message from the Symposium Chairs - Volume 2

    Publication Year: 2008, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2008, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Members - Volume 2

    Publication Year: 2008, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Normative Modeling for Personalized Clinical Pathway Using Organizational Semiotics Methods

    Publication Year: 2008, Page(s):3 - 7
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Clinical pathways are widely adopted by many large hospitals around the world in order to provide high-quality patient treatment and reduce the length and cost of hospital stay. However, nowadays most of them are static and non-personalized. Our objective is to capture and represent clinical pathway using organizational semiotics method including Semantic Analysis which determines semantic units i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Aided Analysis of Bifurcation of a Spatial Dynamical System

    Publication Year: 2008, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    In this paper, we investigate the equilibrium and bifurcation of a predator-prey system by means of a computer aided analysis, and obtain the conditions of Hopf and Turing bifurcation in a spatial domain. It will be useful for studying the dynamic complexity of ecosystems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Modulation Classification Based on Bootstrap Technique

    Publication Year: 2008, Page(s):11 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    This paper presents a new method based on bootstrap technique for modulation recognition under the low SNR and multi-path conditions. The bootstrap method is performed when only few samples are available at the receiver. A new neural network is also proposed to select effective features and classifies signals. Extensive simulations show that the new method has preferable performance in low SNR and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token Proxy

    Publication Year: 2008, Page(s):15 - 20
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Along with the thorough development and application for Web services, the security of it has taken people¿s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Normalization for Removing Code Variations in Modular Programs

    Publication Year: 2008, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Code variations are widely believed to impede program analysis. This paper introduces an approach for removing code variations in programs with function calls. Non-recursive programs and recursive programs are handled with different strategies. An inlining algorithm based on system dependence graph is developed to remove the module structure variation in non-recursive programs. Recursive programs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Classification Diagram of Character Identification in Several Different and Similar Structures of Time Series

    Publication Year: 2008, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    On the foundation of the domestic and international research work, we have used recurrence plot and cross recurrence plot to study the different behavioral form of time series with different characters on its responding recurrence plot and cross recurrence plot. When the time series engender the phenomenon of Lorenz system, stable sink, saddle, bifurcation point and Hopf bifurcation the recurrence... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Touched Human Object Segmentation Based on Mean Shift Algorithm

    Publication Year: 2008, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Human objects segmentation is one of key problems of visual analysis. In this paper, a novel touched human objects segmentation based on mean shift algorithm is proposed. At first, video images is preprocessed and foreground objects (BLOB) is obtained, model of human object is built according to statistical characteristics of body surface. Then, a few of points picked equally from BLOB is taken as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • R-Binder: Application of Using Service Binder in R-OSGi

    Publication Year: 2008, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    OSGi is a famous technique based on the concept Service-Oriented Component Model. As far as the application of OSGi is concerned, Service Dependency management and Distribution are two issues that have to be taken into consideration. The Service Binder is a mechanism that adds automatic service dependency management into OSGi, and R-OSGi is a distributed middleware layer on the top of OSGi that al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple and Efficient Edge Detection Algorithm

    Publication Year: 2008, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2288 KB) | HTML iconHTML

    A simple and efficient edge detection algorithm based on wavelet transform and morphology is proposed. Combined with dyadic wavelet transform and image gradient calculation, the smoothing filter operators are introduced. Then to the non-uniform illumination problem, a local thresholding, which determines the edges, can be constructed by the algorithm of maximization of between-class variance (Otsu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Non-iris Region in the Iris Recognition

    Publication Year: 2008, Page(s):45 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    In view of iris disturbance of eyelid, eyelash and reflection spot affect the accuracy of iris recognition, a detection approach of non-iris region in the iris segment is proposed. Based on mathematical morphology knowledge, the proposed method uses the least squares combined with edge detection to determine eyelid occlusion, then, eyelash and reflection spot can be detected with threshold method.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Barrier Coverage of Wireless Sensor Networks Based on Clifford Algebra

    Publication Year: 2008, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    One model for barrier coverage in sensor networks is Maximal Breach Path (MBP). Many proposed methods for searching MBP are just for 0-dimensional point targets. Xie proposed a coverage analysis approach for sensor networks based on Clifford algebra. In a 2-dimensional plane, a homogeneous computational method of distance measures has been provided for points, lines and areas, and a homogeneous co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A P2P Traffic Classification Method Based on SVM

    Publication Year: 2008, Page(s):53 - 57
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    A method to realize the P2P network traffic classification based on the SVM is proposed. This method uses the network traffic statistical characteristic and SVM method that based on the statistical theory to classifies the different P2P traffic application. Mainly research on four kind of network traffic classification, in document sharing BitTorrent, in media flows PPLive, in network telephone Sk... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Graph-Based Workflow Access Control

    Publication Year: 2008, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Using graph transformation as a formalism to specify access control has several advantages, from the intuition provided by the visual aspect to the precise semantics and the systematic verification of constraints. Graph transformations provide a uniform and precise framework for the specification of access control policies. This article presents specification formalisms for workflow access control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Integrated Intelligent Control with Hierarchical Structure

    Publication Year: 2008, Page(s):63 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    The controlled plant can be tackled with intelligent control always a complex system and often can not be easily controlled with traditional control strategy, single intelligent control maybe inadequate for some complex system. So the integrated intelligent control is needed and often can combine with traditional control, with take advantages respectively. And intelligent control is scramble for i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Mining Application in Stellar Spectra

    Publication Year: 2008, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    The current practice of recognition spectra manually is no longer applicable to a large extent. This work is particularly focused on helping astronomers finding their interesting celestial objects. In this paper an efficient hierarchical clustering data mining method based on principal component analysis (PCA) is proposed. Massive stellar spectral data are clustered by improved hierarchical cluste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence Law of Pedestrian WAD in Vehicle/Pedestrian Collisions

    Publication Year: 2008, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    Based on the coupling of PC-Crash and embedded MADYMO, influence laws of pedestrian¿s head WAD involved in a vehicle/pedestrian collision are analyzed by modeling vehicle/pedestrian multi-body system and selecting main factors influencing on pedestrian¿s head contact location on vehicle body surface as independent variables for simulation tests. Various influencing factors and laws of pedestrian... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Improvement of Scheduling Algorithms Based on (m, k)-Firm Constraint

    Publication Year: 2008, Page(s):74 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    On the basis of the definition of WHRT (weakly hard real-time), this paper summarizes the constraint qualifications of the existing WHRT and scheduling algorithms, places emphasis on the discussion of DBP algorithm and E-DBP algorithm, proposes two concepts according to the deficiencies of the two algorithms, namely total distance of entering invalidation and total distance of aborting invalidatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.