By Topic

Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on

Date 10-12 Dec. 2010

Filter Results

Displaying Results 1 - 25 of 565
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (189 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • 1-D Barcode Localization in Complex Background

    Publication Year: 2010, Page(s):1 - 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    In recent years, researchers have paid more and more attention to computer vision, pattern recognition and human-computer interaction. Recognizing barcode in real-time video is an embodiment of these techniques. This paper presents an algorithm which can locate barcode region in complex background through region-based image analysis. Being different from traditional region-based image analysis, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Benchmarking Framework for Domain Specific Software

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    With the development of the software engineering, finding the "best-in-class" practice of a specific domain software and locating its position is an urgent task. This paper proposes a systematic, practical and simplified benchmarking framework for domain specific software. The methodology is useful to assess characteristics, sub-characteristics and attributes that influence the domain specific sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Block Motion Compensation Fast Algorithm Designed for RV40 Codec

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    This paper proposed a whole new design for RV40(realvideo40) video decoder from FFmpeg(fast forward Moving Picture Experts Group),which is in lack of the ability to decode smoothly when decoding a period of high bit rate frames within some video streams. The design specially optimized the sub pixel interpolation algorithm, which is the core of motion compensation. The design uses detailed, differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Broker-Based Architecture for Quality-Driven Web Services Composition

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Due to the increasing popularity of Web services technology and the potential of dynamic service selection and integration, many similar services are accessible. Quality of Service (QoS) is the main factor to differentiate similar Web services. In this paper, we propose a broker-based architecture for dynamic web service selection that facilitates the requester to specify his/her non-functional re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Byzantine Fault Tolerant Protocol for Composite Web Services

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    This paper presents a Byzantine fault tolerant protocol for composite Web Services. We extend Castro and Liskov's well-known practical Byzantine fault tolerance method for the server client model and Tadashi Araragi's method for the agent system to a method for the composite Web Services. Different from other Byzantine tolerant methods for single web service, in composite Web Services we have to c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Clustering Query Algorithm Based on Particle Swarm in Wireless Sensor Networks

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    This paper puts a clustering query algorithm based on location, filter values and the ideas of particle swarm according to many querying methods in wireless sensor networks. First, this algorithm partitions regions of the wireless sensors based on location of sensors node, then adopts filtering in the net and node storage, and queries based on the clustering and base station. The algorithm reduced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combined Prediction Method for Network Security Situation

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    In order to improve the precision of network security situation prediction, a combined method for prediction was proposed. For the nonlinearity of network security situation value, the Method predicted the security situation by using ARMA model and Markov model. On this basis, it optimized the predicted results with combined strategy. The analysis of the example indicates that the combined method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Conservative Prefix Delegation Policy for Nested Mobile Networks Based on Paging Mechanism

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Route optimization for nested Mobile Network is an important issue of Network Mobility (NEMO), and prefix delegation is one of the promising optimization schemes. However, the policy of prefix delegation is seldom discussed when this technology is applied in nested NEMO. The problems that may be encountered when applying the basic prefix delegation to nested NEMO are analyzed and identified, and a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Contingency Model for Large Ceremony Based on Petri Net

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    With the research on the emergency disposal, we build a new contingency scheme model based on the Petri net. The model can meet the needs of the emergency disposal of large ceremony. With this model, we can realize the automatic scheduling of the contingency scheme, control according to the feedback and help the commander to make the decision. It will make all people and departments work in harmon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Contour-Based Method on Image Retrieval

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Compared to color and texture, contour is closer to human vision. So contour-based image retrieval has been a hot topic. However, existing methods can't obtain object contour effectively, which makes contour description and matching more difficult. To address these problems, this paper uses KPAC (Kernel-based Parametric Active Contour) to obtain the object contour, and proposes a novel method call... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Countermeasure Study on the Universities' Majors Setup and Reform of Management System

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    This paper indicates many existing problems in majors setup. These problems include: excessive development of some majors; incomplete related management system; lack of majors' transformation and none of the exit mechanism; curriculum system, teaching team development and other issues. To solve these problems and improve the development of the university majors, authors analyze some factors that c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cross-Platform Supported Technique for Embedded Software Generation

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    In this article we introduced cross-platform supported technique for embedded software generation. We propose a two-layer model for design and execution of such embedded systems with the aim of crossing platform for decreasing the complexity in system migration. The virtual SoC and engine are used to efficiently cope with different hardware platforms. The introduced method has been used in lots of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data-Driven Software Testing Tools Integration System

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    We have analyzed problems in the application process of automation testing tool. For the output data formats of the four kinds of open-source automation testing tools, we have given integration solution of testing tools based on the idea of data-driven. We also have explained the functionality and data model of integration system, which should be increased. And have designed a set of complete auto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Digital Fingerprinting Scheme of Digital Image

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    In accordance with collusion attack, a digital fingerprinting scheme of digital images is studied and proposed by this paper. Different binary chaotic sequences produced by Logistic chaotic map and by means of setting different initialization are chosen to act as digital fingerprints of the protected digital images. Drawing lessons from some effective feasible digital watermarking algorithms, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Spatial Data Sharing and Management System for Forest Farms

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Spatial data has been extensively used in forest resource management and decision making in China. But research on spatial data sharing and interoperability in forest farm level is unavailable. This paper proposed an approach to address problems of distributed spatial data management, sharing, integration and interoperability for forest farms using OGC Web Feature Services (WFS), Web Map Service (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Enhanced Trust Model Based on Social Network and Online Behavior Analysis for Recommendation

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    The growth of social network applications makes it possible to incorporate relationship information to reason about trust value as many researchers have done with the trust-aware recommendation systems. But without explicit trust rating, inferring trust relationship among users become hard to accomplish. The contribution of this paper includes: 1) constructs user-oriented trust network based on sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Generalized Predictive Control Algorithm Based on Toeplitz Matrix

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    In order to reduce the computational a novel approach is proposed in which the generalized predictive control (GPC) algorithm is improved based on toeplitz matrix in this paper. The control algorithm proposed is simplified by reconstructing the performance index. This approach has good adaptive ability and robustness with low-cost computation. The effectiveness and rapidity of this algorithm is de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Framework for Fuzzy Data Mining

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Mining association rules is one of the most important tasks in data mining. Several approaches generalizing association rules to fuzzy association rules have been proposed. In this paper we present a general framework for mining fuzzy association rule. Based on apriori algorithm, a new algorithm for mining fuzzy association rules is proposed. Experimental results illustrate the algorithm is more e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Iterative Method Based on the Hybrid Steepest Descent Scheme for Nonexpansive Mappings in Hilbert Spaces

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    Let H be a real Hilbert space.Suppose that T is a nonexpansive mapping on H with a fixed point, G is a L-Lipschitzian mapping on H with coefficient L > 0, and F : H → H is a k- Lipschitzian and η-strongly monotone operator with k > 0, η > O. Let 0 <; μ <; 2η/k2, 0 <; γ <; μ(η - μk2/2)/L = �... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Global Efficiency Optimization Model of Service Evaluation and Selection

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Considering the existing service composition model are almost focused on single service composition efficiency, did not consider about the global efficiency and lack of capability of evaluation of inhibition of malicious evaluation, this paper propose a global efficiency optimization of service composition model based on equivalent hierarchical and design a selection of appropriate policy to solve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Energy Efficiency Link Layer Adaptive Error Control Mechanism for Wireless Sensor Networks

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Wireless sensor networks (WSNs) require simple and facile error control schemes because of the low complexity and high energy efficiency request of sensor nodes. In this paper, we discuss ARQ, FEC, and Chase combing hybrid ARQ (HARQ) schemes using energy efficiency analysis on different communication distances and link layer frame lengths. We proposed a high energy efficiency adaptive error contro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.