By Topic

2009 Fourth International Conference on Systems

1-6 March 2009

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (310 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (59 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Mobile Agents and Their Ontology Serving a Federated Identity Platform

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Like the Web services, federated identity wins gradually businesses. The creation of an infrastructure of federated identity is a viable alternative to current systems.For employees or users, a federated identity leads to a better experience of the Internet, a greater level of customization, more security and a real control of this identity. In this work we will propose choreography for a platform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technologies for the Pseudonymization of Medical Data: A Legal Evaluation

    Publication Year: 2009, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Privacy is one of the fundamental issues in health care today. Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patientspsila privacy, approaches for protecting privacy often do not comply with legal requirements or basic security requirements. This paper highlights research directions currently pursued for p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Important Nonverbal Attributes for Spontaneous Speech Recognition

    Publication Year: 2009, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Understanding human emotions and their nonverbal messages is one of the most necessary and important abilities for making the next generation of human-computer interfaces (HCI) easier, more natural and effective. The main goal of this paper is to compare different methods to combine the results of both classifiers - both paralanguage and facial expressions. A prototype of the dialog system was dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Tasks Scheduling Algorithms in Multi-core and Multi-queuing Environments Using System MESMS2

    Publication Year: 2009, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (805 KB) | HTML iconHTML

    In the paper, an extended version of the computer experimentation system MESMS2 for testing task scheduling algorithms is presented. The system designed and implemented by authors may be used for making comparative analysis of the properties of scheduling algorithms to be applied in managing complex computer systems. Paper presents the properties of the investigated algorithms in created various s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Management for Secure Embedded Systems

    Publication Year: 2009, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    This paper describes principles of an embedded system design propping safety and security using a dedicated architecture. After reviewing a simple specification language deployed, the main attention is focused on hardware architecture, software, and communication services that fit application requirements. The gasoline dispenser controller presents in this case a real-world solution of a safety an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Sensitivity of Deadlines with a Specific Asynchronous Scenario for Harmonic Periodic Tasks scheduled by FP

    Publication Year: 2009, Page(s):29 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    The aim of this paper is to address the problem of correctly dimensioning real-time embedded systems. It is well known that computers which control systems are greatly affected by delays and jitter occurring in the control loop. In the literature, a deadline reduction approach has been considered as one solution to reducing the jitter experienced by a task and therefore obtaining better loop stabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low Cost RT Process Control Using Windows PLC by MATLAB/Simulink Throw the REX Control System by Secured Wireless Network

    Publication Year: 2009, Page(s):38 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    Paper deals with industrial realization of feedback control of demanding applications on theirs control, control algorithms and visualization together with real time control from MATLAB/Simulink Environment. Paper shows direct connection and implementation way of designed control schemas of prepared applications to an industrial WinPLC. Described is a way to produce a permanent solution in control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ideas on System Thinking and Acting: Basic Issues, Aporetic Constructs and Application of the Metanoia Principle

    Publication Year: 2009, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Straightforward thinking in a matter of one-way cause-and-effect approaches has proven to be a valuable concept for hundreds of years especially in Western democracies, where the cultural embeddedness provided fertile soil. However this methodology has also proven to be a misconception when addressing certain "complex" issues. Leaving Aristotelian logic aside and introducing an aporetic view in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IMS Vertical Handover Optimization Based on Network Resources

    Publication Year: 2009, Page(s):49 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Transition to convergent systems built over the IMS architecture should attempt to service availability and mobility requirements in heterogeneous technologies. Mobility solution on IMS should allow operators delivering network resources related to handoff policies beyond triggering only by power strength as done so far. This paper reviews emerging heterogeneous access networks and their integrati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implicit Adaptation of User Preferences in Pervasive Systems

    Publication Year: 2009, Page(s):56 - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    User preferences have an essential role to play in decision making in pervasive systems. However, building up and maintaining a set of user preferences for an individual user is a nontrivial exercise. Relying on the user to input preferences has been found not to work and the use of different forms of machine learning are being investigated. This paper is concerned with the problem of updating a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Saving of Real Time Embedded Sensor for Medical Remote Monitoring

    Publication Year: 2009, Page(s):63 - 67
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    The power saving is one of the important issue in the embedded systems. To reduce the consumption of the microprocessor of such a system, a way is to power down it when it is inactive. Theoretically, the time during which the microprocessor is inactive represents a pure gain of energy. But practically, we must consider that this time comprises a slot of time during which the clock must be synchron... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified Multi-layer Feedback Delay Network for Auditory Space Simulation

    Publication Year: 2009, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    This paper deals with a feedback delay network that has the feedback implemented with unitary matrix. The main contribution is the description of implementation of modified multi-layer feedback delay networks for computationally effective and high-quality multi-channel simulation of an auditory space. This new reverberation digital system is prepared for real-time processing and it meets the requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Dynamics Based Risk Management for Distributed Information Systems

    Publication Year: 2009, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Networked information systems have not been restricted to closed organizations environments for more than a decade. They are now crucial in supporting operations of infrastructure, ranging from power plants to air-control systems. These networked information systems, essentially forming the current Internet, are thus highly sensitive kinds of infrastructure where security plays a central role. How... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-Based Decision Support for Information Security Risk Management

    Publication Year: 2009, Page(s):80 - 85
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attention to security issues. Risk management provides an effective approach for measuring the security but existing risk management approaches come with major shortcomings such as the demand for very detailed knowledge about the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-sensor Logical Decision Making in the Single Location Surveillance Point System

    Publication Year: 2009, Page(s):86 - 90
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    As demand for surveillance of physical locations increases, automated decision making software can help maintain the rising costs of human monitoring. The variety in different types of sensors is also growing, and making use of their consolidated data can improve the decision making process. Using the constructive research method, we aim to define a design of a surveillance system's decision makin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication and Billing Framework for Service Oriented Architecture

    Publication Year: 2009, Page(s):91 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    The current business environment has become still more demanding in which organizations are under increasing pressure not only to increase revenue but also to respond quickly to changing market conditions. These organizations shall only be successful if they transform themselves and adapt on demand businesses paradigm. There is constant demand for innovation and shorter time to market for products... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated System for Border Surveillance

    Publication Year: 2009, Page(s):96 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Borders are extremely vulnerable and prone to terrorist attacks, smuggling and illegal immigration. To achieve enhanced situation awareness it is necessary to fuse sensor and information data. By automated fusion of referenced and associated data an aggregation of raw sensor data is achieved. Within the project SOBCAH (Surveillance of Borders, Coastlines and Harbors), an architecture was developed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.