By Topic

Computer and Management (CAMAN), 2011 International Conference on

Date 19-21 May 2011

Filter Results

Displaying Results 1 - 25 of 182
  • CAMAN11 [Title page]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • CAMAN11 Copyright statement

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • CAMAN11 Welcome Message

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • CAMAN11 Conference Committee

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • CAMAN11 Reviewers

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Notice of Retraction
    A Brief Analysis on Emergency Management Capabilities of Logistics Enterprises in China

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cellular Automaton Model for Two Competitive Populations with Allee Effect and Overcrowding Effect

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Cellular automata (CA) have shown to be a valuable approach in ecological modeling, in particular when dealing with local interactions between species and their environment. In CA model, a global spatial pattern emerges through the evolution of interaction at a local scale. A cellular automata model for two competitive populations with overcrowding effect and Allee effect in a patchy environment h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cloud Storage Architecture Model for Data-Intensive Applications

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Scalability and I/O efficiency are two of the biggest challenges in building cloud storage system, especially to the data-intensive applications that will run on cloud. To cloud computing, constructing a suitable architecture for every kind of cloud service is the key to succeed. But very little work has been done to create a valid and standard cloud storage architecture. In this paper, a four-lay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Communication-Efficient Threshold Monitoring Method for Distributed Systems

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    This paper considers the problem of how to reduce communication cost over threshold monitoring in distributed system. An Event-based Threshold Dynamically Assign (ETDA) method is proposed in this paper, which considers the situation in reality that the data distribution in remote monitor nodes changes dynamically. Therefore, we set different threshold value in each remote monitor node based on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Curriculum Scheduling System Based on Pooling Algorithm

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Curriculum scheduling is an important and complicated work in schools. It's a complex problem to be resolved with multiple constraints. So to solve the problem is of great importance for teaching programming. In this paper, we mainly discussed the timetable problem of middle and high schools in teaching management. Investigated and studied the algorithm existed. Deserted the complex algorithm does... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Diagnosis Method for Water-Steam System of Power Plant Based on Credibility Theory

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    In view of the uncertain relationship between faults and symptoms in the water-steam system of power plant, this paper proposed a fault diagnosis method based on credibility theory. A fuzzy diagnosis model which is practical and effective was constructed by describing the issues of knowledge representation, choice of control mechanism and construction of uncertain algorithm. Simultaneously, in ord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Management of Massive Remote Sensor Data Using Open Source Software

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    The efficient organization and access method of massive remote sensor images face great challenges for the sending of more satellites. The hybrid way to manage massive images by using RDBMS and DFS is proposed, which integrates the computing and data management facilities on open source software. The architecture is introduced and system is developed. Some applications on the system are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Approach for Part-of-Speech Tagging of Burmese Texts

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    In Myanmar to English language translation system, in order to provide meaningful sentence from one language to another is non-trivial task. POS tagging is used as an early stage of linguistic text analysis in many applications. POS tagging is a process of assigning correct syntactic categories to each word. Tagsets and word disambiguation rules are fundamental parts of any POS tagger. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Group Decision Making with Multi-Granularity Interval Reciprocal Linguistic Judgment Matrix

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    With respect to the group decision making problem with multi-granularity interval reciprocal linguistic judgment matrix, a method based on 2-tuple linguistic judgment matrix is proposed. In this method, the 2-tuple linguistic representation model and interval reciprocal linguistic judgment matrix are given. Then, a transformation function is given to uniform the multi-granularity linguistic terms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm for Stable Communication in Wireless Emergency Network

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Emergency communication has been intensively investigated for solving suddenly-occurred events of public safety. Wireless network can play an important role of information acquisition and command decision-making in disaster areas, so a new Wireless Emergency Communication (WEC) algorithm is proposed in this paper. This algorithm possesses the characteristics of quick, stability, low energy and hig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Three-Dimensional Earth Model Visualization

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1711 KB) | HTML iconHTML

    This paper presents a new method for three-dimensional earth model visualization. This method models the velocity structure of seismic waves with the combination of cuboids and quad-prisms. And it is simpler than the traditional scientific visualization method in computational complexity. Using this method, we have constructed a visualization model for the CRUST5.1, a global 3D velocity model of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Node Sleeping Algorithm for WSNs Based on the Minimum Hop Routing Protocol

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    Designing an energy efficient algorithm is one of the most important challenges in wireless sensor networks (WSNs). In this paper, we present a node sleeping algorithm based on the minimum hop routing protocol to minimize energy consumption. The proposed scheme divides all the nodes except the sink node into terminal nodes and intermediate nodes according to their different functions. Terminal nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Extended Algorithm for Network Security Situation Awareness

    Publication Year: 2011, Page(s):1 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Network security situational awareness (NSSA) technology as a new research area in network security plays an important role in changing network security defense model from passive type to active. In order to enhance the capability of perceiving status the network stays in and emergency responding capability, it is especially important to design an index system for large scale NSSA and a situation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method for Capturing Healthy Image Data in Hospital Legacy Systems

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    In hospitals, there are usually many legacy equipments and software systems, which may not provide standard interface for integration or even do not have its own API for outside accessing. This makes it very hard to integrate those legacy systems with health information system. It becomes a big challenge for health information integration if you want to provide a total Health Information System fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Risk Assessment Model for Software Projects

    Publication Year: 2011, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    This paper presents a novel risk assessment model for software projects. Traditional software risk assessment models lack the capability of classifying risk events based on their (in)dependence and statistical (in)dependence. The proposed risk assessment model relies on a scheme to classify the risk events of the software project based on their (in)dependence to occur and statistical (in)dependenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Optimisation Algorithm with Data Analysis and Control Platform

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Current optimisation methods, especially stochastic methods, are short of intermediate data analysis and control. Moreover the intermediate data has rarely been interpreted into the knowledge useful for either optimisation itself or industry productions. In this paper, we proposed a new optimisation method featuring on the capability of intermediate data analysis and control without setting any co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy Preserving Algorithm for Mining Distributed Association Rules

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    For resolving the problem that the existing protocol of secure two-party vector dot product computation has the low efficiency and may disclose the privacy data, a method which is effective to find frequent item sets on vertically distributed data is put forward. The method uses semi-honest third party to participate in the calculation, put the converted data of the parties to a third party to cal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Prototype of Emergency Management Information System Using GIS Technologies

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Emergency management information system is one kind of information systems that concentrates its functions on assisting emergency response tasks with the integration of computer science and geographical information science technologies. This paper proposes and demonstrates the functions of a prototype of the emergency management information system, including the system architecture, data sources, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Request Skew Aware Heterogeneous Distributed Storage System Based on Cassandra

    Publication Year: 2011, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    many distributed storage systems have been proposed to provide high scalability and high availability for modern web applications. However, most of those applications only aware data skew while actually request skew is also widely exist and needed to be considered as well. In this paper, we present a request skew aware heterogeneous distributed storage system based on Cassandra-a famous NoSQL data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research to Data Management in Savant Based on Data Grid

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Internet of things (IoT) has been researched in recently years. The Savant as a midware provides the data collecting and pre-processing for the IoT applications. Data grid can aggregate the resources in the IoT. Using data grid to build the Savant enables the Savant manage large scale data and optimizes the efficiency of the resources in IoT. In this paper, the data in the IoT is classified, and a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.