Scheduled System Maintenance
On Tuesday, August 23, IEEE Xplore will undergo scheduled maintenance from 12:00-7:00 PM ET (16:00-23:00 UTC).
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

2008 International Symposium on Information Science and Engineering

Date 20-22 Dec. 2008

Go

Filter Results

Displaying Results 1 - 25 of 190
  • [Front cover - Vol 2]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1089 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2008, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • ISISE 2008 Message from the Chair's - Volume 2

    Publication Year: 2008, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (21 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2008, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Committee Members - Volume 2

    Publication Year: 2008, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • WFMS: Web File Management as a Service

    Publication Year: 2008, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    Generally, every Website provides its own resource upload and download modules for users to share resources. However, the resources uploaded to Websites' servers are often lack of unified and professional management. Whatpsilas more, when the amount of user using the upload and download modules increases, it will put a big pressure on the Websitepsilas server in term of bandwidth. To solve these p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Performance Algorithm for Mining Frequent Patterns: LPS-Miner

    Publication Year: 2008, Page(s):7 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    In this paper, we present a novel frequent pattern mining algorithm, called LPS-Miner, which bases the pattern growth principle and uses two new data structures, LPS-FP-Tree (Light Partial-Support FP-Tree) and LPS-Forest (Light Partial-Support FP-Tree Forest) to present the database. LPS-FP-Tree is a variation of FP-Tree with lighter unidirectional nodes and the mining process depends on the parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implementation and Analysis of the Monitoring Module based on NETCONF

    Publication Year: 2008, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    As network grows in complexity, types of management data become so diverse that the SNMP protocol exceeds the demands of network management. Therefore, the NETCONF protocol appears, which is a network configuration protocol, making use of XML in encoding. Under these circumstances, we have developed an open experimental platform environment for NETCONF protocol, BUPT-NEP (BUPT NETCONF Experimental... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model and Implementation of Context-Aware Sensor Networks

    Publication Year: 2008, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Adaptive capabilities such as self-configuration and self-management were required by applications of wireless sensor networks (WSNs). We integrate the theory of context-aware computing with WSNs and propose a model of context-aware sensor networks (CASN). Based on their capability, sensor nodes in CASN can get information of environment. This information, together with other information collected... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Security Access Control System of Adaptive Wireless Gateway

    Publication Year: 2008, Page(s):20 - 23
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    In this paper, we analyze the 802.1x access control protocol and the firewall packet filtering strategy, as well as elaborated how to design the security access control system of the adaptive wireless gateway in the aspect of the port control, bi-directional user certificate authentication and packet filtering. Furthermore, the experimental results showed that this system has higher security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Comprehensive Color Feature Vector for Tile Color Online Inspection

    Publication Year: 2008, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    This paper proposed a comprehensive color feature vector for tile online color consistency inspection. Non-uniform color quantitative method that was based on main color and human vision was put forward and the result accord with the human vision and the speed meet the requirement of tile online inspection. In order to synchronously meet the demand of tile global and local color difference inspect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Software Function Testing Method Based on Data Flow Graph

    Publication Year: 2008, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Main task of function testing is to verify software function. Completion of graphic user interface (GUI) software function includes complicated human-machine interactions. Current function testing methods usually consider interface of software and environment, while ignoring software requirement and function completion process. With these testing methods, testing process may be disordered. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three Level Fuzzy Comprehensive Evaluation based on Grey Relational Analysis and Entropy Weights

    Publication Year: 2008, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    In a complex system, schemes are affected by lots of factors. The evaluation must take all the factors into account. The nature of the factors are fuzzy and grey, this paper apply grey relational analysis and entropy weights into fuzzy design theory, and solve the problem of three levels structure fuzzy comprehensive evaluation. A practical example of torpedo is showed to prove the validity of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Visualization in Space Science

    Publication Year: 2008, Page(s):36 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    Computer science and technology are constantly changing, which results in the changing interface between computers and people. The integration of space science and computer science make space scientists gain some form of higher-level insight into massive data sets. So it is crucial to develop technology that supports presenting space data effectively. Scientific visualizationpsilas role in present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Edge Detection Method Based on Optimized BP Neural Network

    Publication Year: 2008, Page(s):40 - 44
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (702 KB) | HTML iconHTML

    The precision of tile image edge detection has great influence on the dimension detection and defect detection of tile. A parallel model of Back-Propagation (BP) neural network for edge detection of binary image was proposed in this paper, and it was applied to edge detection of gray image. It solved the problem that the convergence speed was too slow to meet the need of training if the BP neural ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Urban Traffic Congestion Recognition Based on Pattern Recognition Technology

    Publication Year: 2008, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    In this paper the traffic congestion recognition method is studied deeply based on the pattern recognition technology which is well integrates the fuzziness and randomness of linguistic concepts in a unified way, and makes the transforms between qualitative concepts and their quantitative expressions much easier and interchangeable. Moreover, the feasibility and effectiveness of that new method wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving AOP Problems with Universal Framework

    Publication Year: 2008, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    During the development of programming languages, there always have some problems such as the AOP in the procedure-oriented languages and object-oriented languages. These problems appear frequently in software and are difficult to be coped with. Many problems are due to the limitation of theoretical foundations of these programming languages, thus they cannot be solved by simply applying some speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implementation of a Distributed System Based on a Parallel Algorithm for Self-Similar Network Traffic Simulation

    Publication Year: 2008, Page(s):53 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    With the development of Web application, network traffic is constantly increasing. In order to do the performance testing of Web applications, a precise simulation of network traffic is necessary. However, traditional traffic model based on Poisson process can not characterize the behavior of real network traffic. Measurements of network traffic show that the property of the self-similarity is ubi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Modeling of Fully Adaptive Wormhole Routing in 2D-Mesh Network-on-Chip with MMPP (2) Input Traffic

    Publication Year: 2008, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Analytical models for fully adaptive wormhole routing in k-ary n-cubes interconnection networks have been widely reported in the literature. However, there are few performance models for 2D-mesh network-on-chip. Most current models assume Poisson traffic, but studies reveal that network traffic shows peculiar types of behavior, such as long-range dependence and self-similarity. An analytical model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DoS and DDoS Attack's Possibility Verification on Streaming Media Application

    Publication Year: 2008, Page(s):63 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks make great impacts on various applications of the Internet. It disrupts the service provided by the target through consuming the target's CPU, memory or network bandwidth. In this paper, we give a brief summary on traditional DoS, DDoS attacks and defense schemes first. Then, we point out the possibility of DoS, DDoS attacks ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of the CPU Scheduler in XEN

    Publication Year: 2008, Page(s):68 - 72
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Virtual machines with advances in software and architectural support have emerged as the basis for enterprises to allocate resources recently. One main benefit of virtual machine is server consolidation. However, flexible and complex consolidation results in some unpredictable performance problems and introduces new requirements, such as proper configurations for scheduler and reasonable arrangeme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool Support to Deriving Test Scenarios from UML Activity Diagrams

    Publication Year: 2008, Page(s):73 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Among attempts to extract test scenarios from UML activity diagrams (ADs), little work has focused on dealing with some more complex structures in UML ADs, such as exception handlers, expansion and interruptible activity regions. A novel testing approach proposed in this paper presents some improvements and extensions upon the previous work in the derivation of test scenarios (TSs) from ADs and ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.