By Topic

Computer Network and Multimedia Technology, 2009. CNMT 2009. International Symposium on

Date 18-20 Jan. 2009

Filter Results

Displaying Results 1 - 25 of 337
  • [Title page]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2009, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • List of papers

    Publication Year: 2009, Page(s):vii - xxi
    Request permission for commercial reuse | PDF file iconPDF (420 KB)
    Freely Available from IEEE
  • 3D Face Hierarchical Recognition Based on Geometric and Curvature Features

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1050 KB) | HTML iconHTML

    A method of 3D face hierarchical recognition based on geometric and curvature features is proposed. Firstly, by normalizing the original scattered 3D face point cloud, much less amount of the points is acquired, which still contain the main characteristics of the face. Secondly, by calculating and analyzing the curvatures of pre-processed 3D face profiles, which are extracted from the normalized p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Model Measurement Estimation from Approximation Coefficients of Spherical Harmonics

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Calculation of the relevant measurement properties of 3D model have already been extensively studied in these days. Methods of geometric measurements with their computation and estimation are proposed by the approximation coefficients of 3D model with spherical harmonics representation as well as the difference of two models in the paper. Finally, the numerical tests and future works are listed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cabin Training Simulator Technology Research Based on GL Studio

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Aim to the current situation in research and development of simulation system, it analyzes and discusses the key technologies of building flying training simulation system. Based on the given objectives of system development, it analyzes and illustrates the modeling requirement for flight cabin with specific modeling tool. And it offers the process of modeling complex objects and introduces how to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cluster-Based Peer-to-Peer File Sharing Protocol for Mobile Ad Hoc Networks

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    Reduction of overhead is essential in increasing the scalability and power efficiency of peer-to-peer (P2P) file sharing systems for mobile ad hoc networks (MANET). Previously researchers mainly focused on reducing overhead of query process, and paid little attention to file transfer process. This paper presents a cluster-based P2P file sharing protocol for MANET, focusing on file transfer process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cognition Inference-Based Approach for Learning Object Recommendation in E-Learning

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    There is an increasing need for e-learning sites to provide personalized learning objectives recommendation to learners. This paper proposes a new type of recommendation agent based on cognition inference. This recommendation agent is designed to give personalized suggestions based on cognitive preference of target learner, and common preferences of other learners who own similar cognitive style w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Complex Event Processing Model Based on RFID Network

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    RFID complex event processing technology is the key point of RFID researching in these years. For the trend of great network application of RFID, this paper presents an RFID complex event processing model according to the features of RFID data and the disadvantage of the current models. Besides, the application in real scenario is also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Content-Aware Distortion-Fair Algorithm for H.264 Data Partitioned Video Streaming

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Internet is experiencing explosive growth in video traffic. With limited network bandwidth resources, it is crucial that Internet users are provided with excellent quality video playback. Under the condition of limited network bandwidth resources, a video delivery algorithm approach called content-aware distortion-fair is proposed. It's based on the different characteristics of content in video cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Double Image Watermarking Based on Wavelet Domain and Krawtchouk Moments

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    In order to improve the robustness and invisibility of watermarkings embedded into the images, a novel algorithm is presented, which is based on discrete wavelet transformation (DWT). The original watermarking signal is embedded into the lowest frequency sub-band of the wavelet domain. Combined with the technique of encryption, the extracted Krawtchouk moment invariants of the image are used to es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Route Guidance Algorithm Based on Modified Ant Colony Optimization

    Publication Year: 2009, Page(s):1 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    With the popularity of urban private car, urban road resources become limited. How to enhance the efficiency of road transportation with the existing road resources is one of today's academic research hot spots. To solve this problem, this paper proposes a new algorithm for dynamic route guidance, in order to provide 'the best path' for drivers The algorithm is based on ant colony optimization, us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Scene Matching Algorithm Based on Pixel-Jump Method

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    According to the image matching demands of both the precision and instantaneity, a real-time two-level scene matching algorithm is proposed based on the least trimmed square Hausdorff distance (LTS-HD). In the first level, a coarse match point is obtained using pixel-jump searching through the reference image. In the second level, a point-by-point local searching is performed to get the accurate m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Flexible Grid Computation Platform Based on WSRF.NET and Condor

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    The Web service resource framework (WSRF) announced in January 2004 is a new mechanism to express how web services interact with the stateful resources, and it has achieved the fusion of Web services and grid services. For the grid application development, WSRF.NET is much easier than Globus Toolkit 4 and it is based on Windows. As WSRF.NET doesn't provide an available scheduler, we introduce Cond... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Preferences Method of QoS-Awared Grid Workflow Schedule

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Grid workflow schedule requires sophisticated expertise of domain in order to automate the process of managing workflows and its components. QoS-aware selection and execution of grid workflow can fulfill customer's expectations, a new preference method is proposed to design the grid workflow schedule. The grid workflow matching relation is achieved by mobile agent negotiation based on projection-j... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Dependability Framework for Real-Time Embedded Control Software Design

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    This paper provides a high dependability framework for developing real time embedded control software. Design pattern and behavior generator support hierarchical composition of real-time concurrent component. Hierarchy composition abstraction preserves the properties of different computation model in a real time environment. A simplified real-time embedded control software system is implemented to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A History-Based Handover Prediction for LTE Systems

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Handover prediction has been considered an effective technology for improvement of LTE Handover performance. Although not a few techniques have been proposed to achieve this goal including handover preparation based on cross-layer optimization and mobility prediction, the fact is that their gains are not usually so high as their cost. To overcome such weaknesses, this paper proposes a simple hando... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Honeynet-Based Firewall Scheme with Initiative Security Strategies

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    With the rapid development of network technology, a variety of new attack methods to the network come out endlessly. Traditional firewalls, depending on the static feature data base, have more and more limitations to these attacks. To alleviate this problem, in this paper we propose a honeynet-based firewall scheme with initiative security strategies. In this scheme, the data-analyzing module can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Limited Feedback-Based Block Diagonalization Scheme for Multi-User MIMO-OFDM Systems

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Block diagonalization (BD) is a linear preceding technique for the multi-user MIMO-OFDM systems that involves transmission of multiple data streams to each receiver such that no multi-user interference is experienced at any of the receivers. With perfect channel knowledge at the transmitter, BD can eliminate other users' interference at each receiver. But it is not practical for receiver to feedba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Linear Transceiver Design for MU-MIMO Broadcast Channel

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    In this paper, we propose a linear transceiver design method for multiuser (MU) MIMO broadcast channel. Multiple receive antennas are equipped for each user, allowing multiple data streams for a user. In the proposed method, we first separate data streams for different users, and then we joint design the precoder and receive combiner to minimize the mean squared error (MSE) for each user. Simulati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Local Space Based Watermarking Algorithm for Three Dimensional Meshes

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB)

    Watermarking for 3D models is a challenging topic in the research of watermarking. Difficulties came up on maintaining pretty robustness and implementing blind detection of watermarks in previous related work. In order to enhance the robustness and achieve blind detection, this paper proposed a novel blind watermarking algorithm for 3D models based on the triangular meshes in the local space. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.