By Topic

2009 Fourth International Conference on Internet Computing for Science and Engineering

21-22 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 75
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (259 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • A Memory-Efficient Multi-pattern Matching Algorithm Based on the Bitmap

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    The Aho-Corasick algorithm is an efficient multiple pattern matching algorithm for large scale pattern sets. However, it consumes too much memory. A new efficient space optimization algorithm (AC-Bitmap) is proposed, which is based on the data structure of the bitmap. It divides all the states in the automata into two groups by their depths in the dictionary tree of all the patterns, and reduces t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-Based Plant Growth Modeling

    Publication Year: 2009, Page(s):6 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Introducing Agent theory is an efficient way to solve the limitation of the method that constructing plant growth modeling in the virtual plant research, based on the definition and features of Agent and introduction of the virtual plant's significance and present situation. A new system of plant growth modeling is proposed, which is applied in soybean growth system, according to the features of p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Operational Semantics for UML RT-Statechart in Model Checking Context

    Publication Year: 2009, Page(s):12 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Model checking UML statechart can detect various errors and inconsistencies of current system design in the early process of development. However, because of classic statechart lacking of real-time operational semantics, it can not be directly used to verify real-time property of current system. This paper introduces related definition of clock to extend UML statechart to real-time UML statechart,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Method for Verifying Production Knowledge Base

    Publication Year: 2009, Page(s):19 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    The most important thing of using model checking technology to verify production knowledge base is to build system model from rule set. It is a fundamental but time-consuming job. This paper presents an efficient formal method to verify production knowledge base. Two main contributions of this paper are as follows. Firstly, we propose a dynamic modeling method to build system model of knowledge ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Preserving Association Rules Mining Based on Data Disturbance and Inquiry Limitation

    Publication Year: 2009, Page(s):24 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Privacy is an important issue in data mining and knowledge discovery. In this paper, we use the randomized response technology to conduct association rule mining. We propose a privacy preserving association rule mining algorithm which is called DDIL based on data disturbance and inquiry limitation. Applying DDIL on the data set, the original data can be disturbed and hidden and the degree of priva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain Knowledge-Driven Association Pattern Mining Algorithm on Medical Images

    Publication Year: 2009, Page(s):30 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    The content of data of medical images are quite rich and include a large amount of hidden knowledge and patterns which is difficult for users to discover. In order to solve this problem, this paper firstly clusters the region of interest (ROI) extracted from the medical images and marks these images using these clustered ROI. Then we present Diff_FP-growth algorithm with the guidance of medical do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Evolution Method Considering Software Historical Behavior

    Publication Year: 2009, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    The goal of software evolution research is to use the history of a software system to analyze its present state and to predict its future development, which made people can better use and management software In this paper, a process of changing normal software into autonomic software is described, which add autonomic attribute in software. Relationship and operation of components for software evol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approach of Stitching VRML Clips Together

    Publication Year: 2009, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Stitching multiple animate or video clips together is a widely used technique in multimedia processing area. From digital video editing to scene generator in Text-to-Scene conversion system, it usually has its usage. Currently, many general or specific software were developed aiming to complete such task. However, few of them stitch VRML clips together. In this paper, we proposed an approach of st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-clock Domain SoC Test Scheduling Based on Ant Colony Optimization Algorithm

    Publication Year: 2009, Page(s):47 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    This paper presents a variant test scheduling for multi-clock domain SoC. Test resources are allocated reasonably by using ant colony optimization, and test application time is minimized. Experimental results demonstrate that the proposed method improves test application time on previous methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation Model of Software Cost Estimation Methods Based on Fuzzy-Grey Theory

    Publication Year: 2009, Page(s):52 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Correct software cost estimation is important in software engineering. So it is significant to reasonably evaluate current lots of software cost estimation methods and subsequently select the most suitable one. The evaluation framework of software cost estimation methods is brought forward. The framework summarizes all aspects that should be considered by estimation methods. Fuzzy-Grey comprehensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Variants of the Backward-Oracle-Marching Algorithm

    Publication Year: 2009, Page(s):56 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This study focuses on the faster exact single pattern string matching algorithms. In all solutions, two variants of BOM, EBOM and FBOM are very efficient. We improved them and presented two algorithms named Simplified-EBOM and Simplified-FBOM through removing the unnecessary branches and accomplishing the core calculation of the algorithm in a 1-dimensional array. The experimental results indicate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Mesh Simplification Algorithm

    Publication Year: 2009, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted approach. The new algorithm can improve simplification rationality in procedure and preserve important features after simplification. In an addition, we do some experiments with comparing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The New Development of PRISM for Probabilistic Model Checking

    Publication Year: 2009, Page(s):64 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    This paper gives a brief overview of version 3.3 of PRISM, a tool for the automatic formal verification of probabilistic systems, and some of the case studies to which it has already been applied to date. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Recognition Based on Modified Modular Principal Component Analysis

    Publication Year: 2009, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    The technology of face recognition has been widely applied to many fields such as identity authentication. A New Improvement for Face Recognition Using MMPCA is presented in this paper. The proposed algorithm when compared with conventional modular PCA algorithm is different in the computation of image mean value and the recognition process. Comparison of the two algorithms in different face datab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Model of Web Users Based on Multi-chains Hidden Markov Models

    Publication Year: 2009, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and the normal ones in application layer. To this end, the paper conducts modeling on Web users' access behaviors based on hidden Markov model(HMM) with multiple chains and puts forward a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Media Retrieval Method Based on Temporal-spatial Clustering and Multimodal Fusion

    Publication Year: 2009, Page(s):78 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Aiming at the problem of the "semantic gap" and the "dimensionality curse", this paper discussed the model of cross-media retrieval. The methods of feature extraction and fusion of multimedia were given for processing high-dimensional data, and a nonlinear hybrid classifier based on support vector hidden Markov models was design for implementation semantic mapping and learning. According to Shanno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CasAB: Building Precise Bitmap Indices via Cascaded Bloom Filters

    Publication Year: 2009, Page(s):85 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Bitmap indices are widely used in massive and read-mostly datasets such as data warehouses and scientific databases. Recently, Bloom filters were used to encode bitmap indices into approximate bitmaps(AB). The salient advantage of this technique is that bitmaps can be directly accessed without decompression, and the query time is proportional in the size of the region being queried. This technique... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.