By Topic

Computational Science and Its Applications, 2009. ICCSA '09. International Conference on

Date June 29 2009-July 2 2009

Filter Results

Displaying Results 1 - 25 of 44
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (261 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Conference Information

    Publication Year: 2009, Page(s):viii - xi
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Finding Frequent Structures in XML Stream Data

    Publication Year: 2009, Page(s):3 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    The XML data of continuous stream type are popular in network application through the Internet. And also there are researches related to query processing for streaming XML data. As a basic research to efficiently query, we propose not only a labeled ordered tree model representing the XML but also a mining method to extract frequent structures from streaming XML data. That is, XML data to continuo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyclic Entropy Optimization of Social Networks Using an Evolutionary Algorithm

    Publication Year: 2009, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (774 KB) | HTML iconHTML

    We design and apply a Genetic Algorithm that maximizes the cyclic-entropy of a social network model, hence optimizing its robustness to failures. Our algorithm was applied on three types of social networks: scale-free, small-world and random networks. The three types of networks were generated using Barabasi and Albertpsilas generative model, Watts and Strogatzpsilas model and Erdos-Renyipsilas mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contemporary Classification on Medical Data based on Non-Linear Feature Extraction

    Publication Year: 2009, Page(s):17 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    High dimensional data in several applications seriously spoils classification computation of several types of learning. In order to relieve the difficulties of such a high dimension, this paper proposes the classification computation, which refers to a modified neural network: the neural network with weights optimized by particle swarm intelligence. The contemporary is placed on the combination of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal of Service System for Ubiquitous Learning System on Adaptive Instructional System

    Publication Year: 2009, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB) | HTML iconHTML

    The purpose of this study addresses service model for enhancement u-learning systempsilas utilization on adaptive instruction system. Proposed service model include two systems. The one is the U-book system and the other is the preWBI system. Proposed service model should be able to retrieve information without ubiquitous computing technology and to access on line contents unless location of them.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Handover for Mobile IPv6 over IEEE 802.16e Networks

    Publication Year: 2009, Page(s):29 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    IEEE 802.16e adds mobility support to the IEEE 802.16 standard so that terminals can move while receiving services and preserve ongoing IP sessions during handover. IP layer handover for MSs is handled by MIPv6. The cross-layer scheme supports seamless handover by exploiting the link layer handover indicator and designing interleaving scheme of the 802.16e and the FMIPv6 handover procedures. We pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis for FMIPv6 Considering Probability of Predictive Mode Failure

    Publication Year: 2009, Page(s):34 - 38
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Mobile IPv6 (MIPv6) is a protocol to support mobility for IPv6. Fast Handovers for MIPv6 (FMIPv6) have been studied, since in MIPv6 handover latency is long, and all packets are lost during handover. FMIPv6 provides seamless handover by minimizing handover latency, and prevents packet loss through buffering and tunneling. FMIPv6 uses anticipation based on layer 2 trigger information, and consists ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Fast Handovers for Proxy Mobile IPv6

    Publication Year: 2009, Page(s):39 - 43
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    The Internet Engineering Task Force (IETF) has standardized Proxy Mobile IPv6 (PMIPv6). Fast Handovers for Proxy Mobile IPv6 (PFMIPv6) was studied by mipshop working group to reduce packet loss in PMIPv6. PFMIPv6 is fast handover extension of PMIPv6. PFMIPv6 handover latency is longer than PMIPv6, although it reduces packet loss in PMIPv6. In this paper, we propose Enhanced PFMIPv6 to reduce hando... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Cloud Market Infrastructure for Trading Service

    Publication Year: 2009, Page(s):44 - 50
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    In this paper, we present a novel combinatorial auction (CA) based trading infrastructure to enable the supply and demand of Cloud services from different Cloud providers (CP). We propose a new auction policy that considers the relationship among CPs (mutual business relationship) in bidding mechanism. In our new auction-based market model, we allow the group of service providers to publish their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process Mining Based on Specification Slicing for Dynamic Reconfiguration

    Publication Year: 2009, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (887 KB) | HTML iconHTML

    Companies faced with rapid changes in market environment and uncertain demands of consumers are actively making investments in the information system and it is expediting the growth of the market for workflow which automates the work process. The concept of workflow mining is required for designing and supporting the business process focusing on productivity enhancement. The existing workflow mini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Path Indexes to Answer Complex Queries in Ontology Repository

    Publication Year: 2009, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    The ontology repository has widely been used for storing and querying over ontology data. Recently the ontology repository gets more attentions as a component of ubiquitous systems. This paper describes use of the path index to answer complex queries in ontology repository. Studies show that two types of queries namely chain queries and star queries frequently occur in SPARQL queries. Instead of u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Handover Scheme Based on Mobile Locations for IEEE 802.16e Networks

    Publication Year: 2009, Page(s):62 - 67
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    The IEEE 802.16 is developed for fixed broadband wireless technology with wider coverage, higher data transmission speeds and excellent quality of services (QoS). IEEE 802.16e is an amendment to the IEEE 802.16 that corporates the handover process to support mobility under high speeds. The mobility user basically conducts hard handover process after the MS terminates the connection with the servin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental and SQL-Based Data Grid Mining Algorithm for Mobility Prediction of Mobile Users

    Publication Year: 2009, Page(s):71 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    In this paper, we propose a new SQL based incremental distributed algorithm for predicting the next location of a mobile user in a mobile Web environments. Parallel and distributed data mining algorithm is applied on moving logs stored in geographically distributed data grid to generate the mobility pattern, which provides various location based services to the mobile users. One of the existing wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Networking Virtualization for Cluster File Systems

    Publication Year: 2009, Page(s):79 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    An effective network layer which reduces cluster file system complexity is definitely needed in cluster computing environments where more than thousands of nodes are connected on a variety of different networks. Therefore, widely used cluster file systems such as Lustre, PVFS2, and GlusterFS provide networking virtualization layer. Through networking virtualization layer, each node accesses other ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Demand Paging Performance of Compressed Filesystem with NAND Flash Memory

    Publication Year: 2009, Page(s):84 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Demand paging with NAND flash memory is an attractive memory management technique for embedded system because of its cost efficiency. However, demand paging has the page fault handling latency. To overcome this drawback, most operating systems take advantage of kernel-level read-ahead. On the contrary, in the compressed filesystem, kernel-level read-ahead degrades performance of demand paging. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective Context Switching on Flash Memory

    Publication Year: 2009, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Flash memory prevails as a mobile storage device because it offers a fast read access time and better shock resistance compared to a hard disk. However, generic operating systems such as Linux do not take advantages of the hardware performance of flash memory because they do not change the architectures which are optimized for hard disks. The existing operation systems switch contexts to handle re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Super Nonlinear Motion of a Simple Pendulum and its Generalization

    Publication Year: 2009, Page(s):97 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Two identically charged simple pendulums are dropped symmetrically about their common pivot in a vertical plane. For a set of parameters associated with each pendulum namely {mass,charge, and length} we evaluate the critical angle at which the forces acting on each pendulum are null resulting a static equilibrium. We then consider two dynamic non-equilibrium cases. In the absence of friction we an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Degeneracy Conditions for Tri-modular Simple K3 Singularities

    Publication Year: 2009, Page(s):104 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    Defining equations of tri-modular simple K3 singularities are 7 types. The defining equations of simple K3 singularities are polynomials with parameter coefficients. We can obtain degeneracy conditions of these singularities by using computer algebra system. The forms of Groebner bases generated by polynomials depend on the values of parameters, and those calculations are not easy. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a Graphical User Interface for LaTeX Plotting Software KETpic

    Publication Year: 2009, Page(s):109 - 114
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    KETpic is a macro package for computer algebra system (CAS) to convert plot data created by CAS to LaTeX picture data. We are able to draw fine pictures in LaTeX documents with aid of KETpic. At the present stage, KETpic packages for Maple, Mathematica, Scilab and Maxima are opened to the public and the number of people who gain benefits of KETpic is increasing. However the only way to produce LaT... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of ImplicitPlot in Drawing Surfaces Embedded into LATEX Documents

    Publication Year: 2009, Page(s):115 - 122
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    KETpic is a macro package of computer algebra systems(CAS) that allows us to insert figures easily into LATEX documents. As such, KETpic can also be used to generate surfaces. But because surfaces appear flat both on the screen and in printed form, shading is often used to emphasize their inherent three-dimensional nature. Unfortunately, this solution is no longer valid in KETpic, as it generates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.