By Topic

2009 International Conference on Research Challenges in Computer Science

28-29 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 78
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2455 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Message from ICRCCS 2009 Chair

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (52 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Weaknesses of a Verifier-Based Password-Authenticated Key Exchange Protocol in the Three-Party Setting

    Publication Year: 2009, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Quite recently, Li et al's suggested an efficient verifier-based password-authentication key exchange protocol via elliptic curves. In this paper, we shows that their protocol is still vulnerable to off-line dictionary attack and unknown key-share attack. Through our work, we hope the similar mistakes can be avoided in future designs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of a Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography

    Publication Year: 2009, Page(s):7 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. In this paper, we demonstrate that Yang et al's three-party authenticated protocol is potentially vulnerable to an unknown key-share attack. Thereafter, we suggest a countermeasure to resist our described attacks while the merit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Based on Time Sequence of ARIMA Model in the Application of Short-Term Electricity Load Forecasting

    Publication Year: 2009, Page(s):11 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Short-term electricity load is effected by various factors, It has the certain difficulty to make prediction accurate, but we can improve prediction precise by continuously optimizing forecasting methods. This paper carried out the combination of ARIMA several methods based on the idea of time sequence, to avoid deficiencies in various aspects, perfect forecasting methods, make ARIMA model can con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Look at Schema Instance Recoverability with the Notion of 'Information Carrying'

    Publication Year: 2009, Page(s):15 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    In database schema transformation, whether the instances of a schema may be recovered from those of another is a question, which seems profound., and yet having not been well investigated. We shed some light on it. In the literature, the work that is closest to this question is the notion of `relevant information capacity', which is concerned with whether one schema may replace another without los... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Human-Computer Interaction in 3D Configuration Software

    Publication Year: 2009, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Compared with the 2D configuration software, the user interface become realistic and friendly, and it can reflect the devices running status in the industrial field so realistically of the 3D configuration software. The window information content has a enormous enhancement using 3D user interface. But it has increased the difficulty of the human-computer interaction in the procedures of the config... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on an Effective Approach against DDoS Attacks

    Publication Year: 2009, Page(s):21 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Aiming at the shortage of existing DDoS attacks defense system, this paper puts forward an effective approach against DDoS attacks based on the three-way handshake process, and the key point lies in discarding the aggressive first handshake requests which consume a lot of system resources; thus it ensures that the new normal network request can be dealt with. An efficient defense system against DD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Attribute Decision Making Based on Fuzzy Selected Subset and Linguistic Variables

    Publication Year: 2009, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    This paper focuses on the multiple attribute decision making problems with the attribute values being numeric, uncertain fuzzy selected subset and linguistics variable evaluations. For the fuzzy selected subset attribute values, by calculating the fuzzy preference relation between them and the quantifier guided dominance degrees of them can be obtained as their single-point evaluations. For the li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Linguistic Multiple Attribute Decision Making Based on Superiority Possibility

    Publication Year: 2009, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    This paper focuses on the multiple attribute decision making problems with the attribute values being linguistic variables. The decision matrix is normalized by calculating the superiority possibility of the linguistic attribute values to their corresponding positive ideal ones. Furthermore, a mathematical programming model is set up to figure out the attribute weights with the overall values of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ODS: Ontology Directory Services for Ontology Integration in Semantic Web Services

    Publication Year: 2009, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    With the rapid development of network technology from information interaction to Semantic Web Service and the continuous accumulation of Web Services which are distributed and heterogeneous, the interoperation and uniform management of Web Services have been already extremely urgent. To solve this problem, a novel Ontology Directory Service Framework is proposed and the process of service registra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Defect-Prone Software Modules at Different Logical Levels

    Publication Year: 2009, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Effective software defect estimation can bring cost reduction and efficient resources allocation in software development and testing. Usually, estimation of defect-prone modules is based on the supervised learning of the modules at the same logical level. Various practical issues may limit the availability or quality of the attribute-value vectors extracting from the high-level modules by software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural Relation Sequential Patterns Mining

    Publication Year: 2009, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Structural Relation Patterns (SRPs) mining is proposed for mining relations among sequences, these relations are generally hidden behind sequential patterns. Concurrent Sequential Pattern (CSP) and Exclusive Sequential Pattern (ESP) are two important parts of SRP, called Structural Relation Sequential Pattern (SRSP). Upon the previous researches, the concepts of SRSP are redefined; the properties ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Acquisition and Sentence Alignment for Academic Bilingual Resources Based on Web Paper Libraries

    Publication Year: 2009, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    This paper presents an approach for acquiring academic bilingual resources from the Web paper libraries. By analyzing the structured information of Web pages, we first implement a customized crawler to download these pages including paper details, and then use a parser to transfer them into XML format. Based on the classic statistical method for sentence alignment, we propose an improved approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Personalized Paper Recommendation Approach Based on Web Paper Mining and Reviewer's Interest Modeling

    Publication Year: 2009, Page(s):49 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    In this article a personalized paper recommendation approach based on the reviewer's interest model is presented in order to increase the number of reviews for online papers. To achieve this purpose, we first model the reviewer's interest based on some useful data extracted from the papers in a journal database, such as titles, abstracts, keywords and the Chinese Library Classification Codes (CLCC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Text Clustering Algorithm Combining K-Means and Local Search Mechanism

    Publication Year: 2009, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Text clustering is one of common techniques in mining large scales of document data. The paper presents an improved K-means text clustering algorithm in which a local search mechanism is introduced. By the iteration process of K-means algorithm, our approach can quickly get a local extreme point, and then use the search strategy of local search mechanism to have K-means jump out of that point and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating Culture in Knowledge Management of Second Language Acquisition Based on Internet

    Publication Year: 2009, Page(s):57 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    In the course of deepening college English innovation, it has been observed that non-English majors' being deficient in cultural knowledge turns out to be a failure in English communication. Based on the analysis of some elements that hinder the cultural teaching, this thesis proposes some teaching strategies to improve the unsatisfactory phenomena so as to achieve the ultimate goal of the English... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Force-Based Mesh Division Approach for Bridge Injury Detection

    Publication Year: 2009, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    A simple force-based mesh division approach for the bridge is proposed in this paper. This method finds point position using force equilibrium, distance function and changes the topology by the Delaunay triangulation. The feasibility and accuracy of the proposed approach are confirmed using the simulation experiment of the bridge injury detection and the correct rate increases by 9.4%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commentator's Speech Extraction in Audio Stream of Sports Games

    Publication Year: 2009, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    This paper proposes a method to deal with the problem of extracting commentator's speech in audio stream of live sports games. First, a two-pass metric-based audio segmentation module is developed to segment the audio stream into short ones with homogeneous acoustic features. Then a model-based classification module is adopted to extract the speech segments. For robust audio classification, variou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.