By Topic

2008 International Multi-symposiums on Computer and Computational Sciences

18-20 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 51
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1499 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (244 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s):ix - xi
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Evolutionary Conservation and Interacting Preference for Identifying Protein-DNA Interactions

    Publication Year: 2008, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (866 KB) | HTML iconHTML

    Protein-DNA interactions play a central role in many genetic processes of cells. With the growing crystal structures of protein-DNA complexes, the computational approaches are becoming more and more useful for modeling protein-DNA interactions. This paper proposes template-based alignment with a new scoring function which combined the evolutionary conservation and protein-DNA interacting scores of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Addressing Bio-sequence and Bio-structure Problems

    Publication Year: 2008, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    In computational biology, many fundamental bio-sequence and bio-structure problems are computationally intractable, which call for the development of algorithmic techniques and complexity analysis methods in theory of computing. This paper presents a review of our work on developing novel algorithmic techniques and new complexity analysis methodology and applying them to address bio-sequence and b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded Gene Selection for Imbalanced Microarray Data Analysis

    Publication Year: 2008, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Most of microarray data sets are imbalanced, i.e. the number of positive examples is much less than that of negative, which will hurt performance of classifiers when it is used for tumor classification. Though it is critical, few previous works paid attention to this problem. Here we propose embedded gene selection with two algorithms i.e. EGSEE (Embedded Gene Selection for EasyEnsemble) and EGSIE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Rough Reducts Based SVM Ensemble for SAR of the Ethofenprox Analogous of Pesticide

    Publication Year: 2008, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Neural networks ensemble is a promising tool in the field of structure-activity relationship (SAR). Based on support vector machine (SVM), a new method called RRSE (rough reducts based SVM ensemble) is employed to discriminate between high and low activities of ethofenprox analogous based on the molecular descriptors. By using RRSE, individual SVMs of ensemble model are constructed by projection o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Relational Approach for Pathway Analysis

    Publication Year: 2008, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    The relationship between interacting proteins can be represented using graphical network models. Comparison of models of similar protein networks can reveal important information about conserved protein interactions. The problem of determining conserved pathways between protein interaction networks are challenging and for large protein interaction networks are very computationally intensive. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Microarray Sample Size Using Bootstrap Data Combination

    Publication Year: 2008, Page(s):37 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    Microarray technology has enabled us to simultaneously measure the expression of thousands of genes. Using this high-throughput technology, we can examine subtle genetic changes between biological samples and build predictive models for clinical applications. Although microarrays have dramatically increased the rate of data collection, sample size is still a major issue when selecting features. Pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental Tumor Diagnosis Algorithm Using New Unlabeled Microarray

    Publication Year: 2008, Page(s):45 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    This paper presents an implementation of incremental tumor diagnosis algorithm (ITDA) on microarray data for improving diagnostic accuracy of tumor. A classifier (BP or KNN) was used in the algorithm to estimate confidences of a new unlabeled sample in different classes. When one confidence is higher than the threshold, the sample will be labeled; otherwise, the sample will be diagnosed by medical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Shape Measures in Malignant Risk Assessment for Breast Tumor on Sonography

    Publication Year: 2008, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (802 KB) | HTML iconHTML

    Malignant and benign breast tumors have different shape characteristics associated with their growth ways on sonography. Through analyzing the tumor shape pattern on the clinical images and the experimental results, we find that the tumor shape can be characterized on three aspects: convexity, ellipticity, and symmetry. In this paper, the shape measures are quantified using the polygonal approxima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Flooding Strategy for Data Delivery in Mobile Sensor Networks

    Publication Year: 2008, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    In mobile sensor networks (MSN), MSN may have a high rate of communication failure since the routing path can be broken when some nodes on the path move to other position. So, MSN has to provide a means for low-cost and low-power routing to support mobility of sensor nodes. In this paper, a limited flooding scheme for routing in MSN is proposed to allow efficient energy utilization without requiri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load Balancing for Efficient Routing in Wireless Sensor Networks

    Publication Year: 2008, Page(s):62 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (661 KB) | HTML iconHTML

    Congestion is generated by buffer overflow and generally is considered in transport layer. However, there is almost no considered one about existing routing protocols of sensor network because it is difficult to apply congestion control in transport layer of WSNs (wireless sensor networks) that have limited resources such as energy, buffer, and bandwidth of sensor nodes. Therefore, routing protoco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-NORS: A Repair Scheme for Energy-Efficient Network Organization in Wireless Sensor Networks

    Publication Year: 2008, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    The unstable nature of wireless communication makes it hard to maintain a reliable network organization in Wireless Sensor Networks (WSNs). Therefore, network organization repair scheme is highly required for reliability. Because of the high energy efficiency requirement, the network organization repair scheme for WSNs differs from that for traditional networks. However, existing WSN network organ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Redundant Multipath Routing for Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):75 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    Multipath routing provides more advantages for mobile ad hoc networks. We address the issue of enhancing route survivability and fault tolerance for packet reliable transmission, and propose the k-redundant multipath model which constructs multiple disjoint primary routes from the source to the destination and meanwhile provides the route redundancy among primary routes. We present the k-RMR proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks

    Publication Year: 2008, Page(s):83 - 90
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network (e.g., wireless sensor networks). The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiiKey: An Innovative Smartphone Based Wi-Fi Application

    Publication Year: 2008, Page(s):91 - 97
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    Many mobile applications such as email, calendar and web browser make use of smartphones technology. WiiKey, a proposed smart application, aims to extend the current smartphone capabilities to allow users to control the next generation Wi-Fi enabled devices found in some cars or home appliances. In this paper, Wi-Fi standards and their applications are first reviewed, and then the design and devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified Improved Alternating Combination Trilateration Algorithm with a Variable m

    Publication Year: 2008, Page(s):98 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    In most applications of wireless sensor network, the acquired information is useful only when their locations are known. Compared with ACT (alternating combination trilateration), IACT (improved alternating combination trilateration) has reduced its calculation overhead greatly. In IACT, The value of m, which determines how many triangles are used in calculations, is static. In this paper, the val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Power and Coverage Algorithm in WSNs

    Publication Year: 2008, Page(s):102 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    An efficient power and coverage algorithm called EPCA is proposed that puts redundant sensor nodes to sleep mode to save energy while maintain the sensing field covered. EPCA includes three algorithms: the node checking algorithm, the blind point avoidance algorithm and the sleeping nodes turning on algorithm. Detailed simulation results and compared to existed schemes prove the proposed EPCA algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Slow Start over Wireless Networks

    Publication Year: 2008, Page(s):106 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    In wired networks, congestion is the main reason for most of the packet losses and the original TCP is the best option to implement. However, in wireless networks, these losses will arise for reasons other than congestion. TCPW has been proved to work better in performance and bandwidth utilization than Reno and New Reno in wireless networks. Our research mainly focuses on the slow-start phase of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.