By Topic

Intensive Applications and Services, 2009. INTENSIVE '09. First International Conference on

Date 20-25 April 2009

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (312 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xiii - xvi
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Dynamic Policy Conflict Analysis in Operational Intensive Trust Services for Cross-Domain Federations

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Management of trust for federation activities requires intensive monitoring and reconfiguration services to accommodate dynamic trust behaviors across trust domains. To detect and control potential conflicts between these behaviors, trust services in federation systems need to be able to perform dynamic conflict analysis. Policy analysis provides a way to detect potential conflicts in system behav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating K-Means on the Graphics Processor via CUDA

    Publication Year: 2009, Page(s):7 - 15
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    In this paper an optimized k-means implementation on the graphics processing unit (GPU) is presented. NVIDIApsilas compute unified device architecture (CUDA), available from the G80 GPU family onwards, is used as the programming environment. Emphasis is placed on optimizations directly targeted at this architecture to best exploit the computational capabilities available. Additionally drawbacks an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Allocation of Heterogeneous Banks' Automated Teller Machines

    Publication Year: 2009, Page(s):16 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    The business of setting up automated teller machines (ATMs) for banks depends on many factors such as the price of buying or leasing an ATM, cost of deployment, cost of operation, and ATM characteristics to be deployed. ATM deployment is an intensive computational problem since it is analogous to file server placement, which is known to be as NP-complete problem. Also, ATM maintenance is an intens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Images to Schemas

    Publication Year: 2009, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (766 KB) | HTML iconHTML

    In content based image retrieval (CBIR), images are segmented to synthesize image information. Among several characteristics like color or edges, texture is useful for segmenting. This paper proposes an intensive multiresolution approach to texture segmentation based on a wavelet transform. The technique delivers schematic descriptions of images. That is to say, it provides the main regions of int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service for Data-Intensive Computations on Virtual Clusters

    Publication Year: 2009, Page(s):28 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Digital preservation deals with the long-term storage, access, and maintenance of digital data objects. In order to prevent a loss of information, digital libraries and archives are increasingly faced with the need to electronically preserve vast amounts of data while having limited computational resources in-house. However, due to the potentially immense data sets and computationally intensive ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Data Processing Based on EDMA to Save the Processing Power of a T-DMB Software Baseband Receiver Running on a Digital Signal Processor

    Publication Year: 2009, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Unlike symbol decoding and channel decoding, which perform a variety of computationally simple or complex algorithms in the T-DMB baseband receiver, time de-interleaving simply moves data between two buffers according to a specified rule. Nonetheless, such simple data movement consumes considerable processing power if the T-DMB baseband receiver is implemented in software running on a digital sign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-evaluating Multicast Streaming Using Large-Scale Network Simulation

    Publication Year: 2009, Page(s):39 - 46
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3387 KB) | HTML iconHTML

    Internet-based media streaming services are replacing more traditional broadcast services, resulting in increased demand for network resources. Multicast techniques may be used to improve bandwidth utilisation by servicing one or more clients with each network stream. In this paper, we re-evaluate the performance of the existing multicast patching technique. In particular, we build on the original... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SemMed: Applying Semantic Web to Medical Recommendation Systems

    Publication Year: 2009, Page(s):47 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    The systematic method used to identify diseases is a called differential diagnosis (DDx). It is mostly used by healthcare professionals to diagnose a specific disease in a patient. If the disease is diagnosed, the method could be used to recommend the medications in order to receive treatment. The goal of the current paper is to design a system based on semantic Web technologies to a system with t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subjective Evaluation of Video on Demand Systems Using Different Network Connections

    Publication Year: 2009, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Nowadays, society makes use of new technologies as they appear. Due to this boom, the use of resources via Web is increasing notably. In of training and education cases, companies such as universities are offering tele-learning platforms to complement and facilitate the learning process. Some of these called e-learning platforms can have explanatory videos as a resource for training. For the codif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Services Orchestration with Continuation-Passing Messaging

    Publication Year: 2009, Page(s):59 - 64
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Services orchestration is typically supported with the traditional centralized workflow technology. The central engine becomes an intensive resource when the number of services to be orchestrated becomes large. Existing decentralized approaches, being primarily based on static process partitioning, exhibit some other shortcomings such as in resource utilization and fault handling. We present an ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Modeling for Evaluation and Planning of Electronic Funds Transfer Systems with Bursty Arrival Traffic

    Publication Year: 2009, Page(s):65 - 70
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    As business enterprisers are increasingly becoming dependent on using online transactions, the demand for high-end and efficient transaction monitor systems becomes a serious issue. Hence, the performance evaluation of electronic funds transfer (EFT) systems has an enormous importance for companies that implement this service, since the computing resources must be used efficiently in order to ensu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Connection Pooling Persistence Systems

    Publication Year: 2009, Page(s):71 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Server-sided applications often use a persistence system for storing and managing their data in a database. Such a system has become complex and includes but is not limited to a database system, drivers, connection pools, query languages, the mapping between application logic and a database data model and it involves the optimization of resources. One important resource is the connection from appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2009, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2009, Page(s): 80
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE