By Topic

2009 Mexican International Conference on Computer Science

21-25 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 61
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (546 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Foreword

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Acknowledgments

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Invited Talks

    Publication Year: 2009, Page(s):xix - xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Study of the Robust Bayesian Regularization Technique for Remote Sensing Imaging in Geophysical Applications

    Publication Year: 2009, Page(s):3 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB) | HTML iconHTML

    In this paper, a performance study of a methodology for reconstruction of high-resolution remote sensing imagery is presented. This method is the robust version of the Bayesian regularization (BR) technique, which performs the image reconstruction as a solution of the ill-conditioned inverse spatial spectrum pattern (SSP) estimation problem with model uncertainties via unifying the Bayesian minimu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing Implementations of a Calculator for Exact Real Number Computation

    Publication Year: 2009, Page(s):13 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    As one of the first theoretical programming languages for exact real number computation, Real PCF showed to be impractical due to the parallel construct needed for even basic operations. Later, Marcial et al. proposed a variant of Real PCF avoiding the parallelism by introducing a non-deterministic constructor into the language. This language is called LRT. In this paper we present an implementati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial Delaunay Triangulations Based Data-Centric Storage and Routing with Guaranteed Delivery in Wireless Ad Hoc and Sensor Networks

    Publication Year: 2009, Page(s):24 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    Existing memory-less greedy-face-greedy (GFG) routing algorithm can guarantee the delivery in wireless ad hoc networks modeled by a connected unit disk graph. The FACE mode in GFG routing is a recovery mode used when no neighbor closer to destination exists. Face mode requires extracting a planar sub graph out of the unit disk graph. In this paper, we propose to apply partial Delaunay triangulatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Possibilistic Stratified Minimal Model Semantics

    Publication Year: 2009, Page(s):33 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    In this paper, we introduce a recursive construction of a possibilistic logic programming semantics that we call Possibilistic Stratified Minimal Model Semantics. We show that this semantics has some interesting properties such as it is always defined and satisfies relevance. One of the main implications of satisfying relevance by this semantics is that it will allow performing top-down queries fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Privacy Service for Structured P2P Systems

    Publication Year: 2009, Page(s):45 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB) | HTML iconHTML

    Online peer-to-peer (P2P) communities such as professional ones (e.g., medical or research) are becoming popular due to increasing needs on data sharing. P2P environments offer valuable characteristics but limited guarantees when sharing sensitive or confidential data. They can be considered as hostile because data can be accessed by everyone (by potentially untrustworthy peers) and used for every... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis between HSDPA and EVDO with Mobile Clients

    Publication Year: 2009, Page(s):57 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    This work presents a real-case scenario with mobile clients. The main goal of this work is to evaluate the performance of the two most popular third generation technologies (EVDO and HSDPA). The tests were performed at three speeds (60 km/h, 80 km/h and 100 km/h). The tests were conducted in the most careful effort to have the most accurate results. The performance evaluation was based on the thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Approach to Modeling and Extracting Information from Semantic Web Based on Microformats

    Publication Year: 2009, Page(s):65 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    The lowercase semantic web consists of web pages enriched with semantic special tags which are called microformats, and it is considered a pragmatic path to the Semantic Web. In this work, we present a practical approach for modeling (microformat based) semantic relations between web pages by means of classical graph like data structures, such as semantic networks. In order to provide categorizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architecture for Asynchronous Indexing of Media Assets

    Publication Year: 2009, Page(s):75 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    Multimedia documents, though rich in content, generally lack structured and descriptive metadata that would allow indexing, searching, and cross-linking. Since the field of Multimedia Information Retrieval has been working on solving the problem of multimedia content analyzing and indexing for a number of years, several existing components could be integrated into a final solution, as well as inco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP Extension to Send Traffic Simultaneously through Multiple Heterogeneous Network Interfaces

    Publication Year: 2009, Page(s):89 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Wireless technologies has become very popular in recent years because allows users to be connected all the time without the need of a physical medium to transport data. Many mobile devices are equipped with multiple network interfaces to be connected. However, there is no mechanism to allow the use of these multiple network interfaces simultaneously. The use of a single network interface at the ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently Coordinating Services for Querying Data in Dynamic Environments

    Publication Year: 2009, Page(s):95 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    In this paper we present our vision, and discuss the main research problems along with prospective solutions, on the evaluation of queries over data available and processable through services. In particular, we address queries in dynamic environments concerning aspects such as mobility and continuous data. These queries entail the potential of offering users ubiquitous access to relevant informati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query Optimization Using Case-Based Reasoning in Ubiquitous Environments

    Publication Year: 2009, Page(s):107 - 118
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    Query optimization is a widely studied problem, a variety of query optimization techniques have been suggested. These approaches are presented in the framework of classical query evaluation procedures that rely upon cost models heavily dependent on metadata (e.g. statistics and cardinality estimates) and that typically are restricted to execution time estimation. There are computational environmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Model for a Mobile Image Query Service

    Publication Year: 2009, Page(s):119 - 126
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    Photographic observations of the night sky can best be presented using a data model that conveys the observations, analysis, objects contained with the observations, and results of analysis pertaining to those objects. Such a model is proposed in this paper and it is referred to as the internet Flexible Image Transport System (iFITS), along with a mapping function to transform instances of the Slo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query an Image Database by Segmentation and Content

    Publication Year: 2009, Page(s):127 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (807 KB) | HTML iconHTML

    The Recent advances on image databases have been developed and most of them consider several methods to query image, the amount of information stored is so big that it is a must to use a combination of different techniques such as image segmentation in order to reduce the dimensionality of the search space. Taking advantage of an image pictographic expressiveness together with the soundness of ima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.