By Topic

Computer Science and Service System (CSSS), 2011 International Conference on

Date 27-29 June 2011

Filter Results

Displaying Results 1 - 25 of 1069
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (576 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Table of content

    Publication Year: 2011, Page(s):1 - 50
    Request permission for commercial reuse | PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2011, Page(s):1 - 28
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Research on clustering algorithm for space information networks

    Publication Year: 2011, Page(s):1595 - 1599
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB)

    Space information networks, which have become a popular research focus, are a new type of self-organizing net work constituted by information systems of land, sea, air and space. A clustering algorithm for space information networks was proposed to enhance network scalability. Analytic hierarchy process (AHP) was used to select cluster heads, and then non overlapping k-hop clusters could be formed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of competitiveness of value-net enterprise based on game theory

    Publication Year: 2011, Page(s):1110 - 1114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The value-net is the product of the rapid development of information economy. It is a new business design that uses digital supply chain concepts to achieve both superior customer satisfaction and company profitability, and coordinates member firms within the value-net, and extracts the core capabilities of the value creation. This paper introduces the concept and model of value-net. According to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the forecast method of water inrush in mine based on AHP

    Publication Year: 2011, Page(s):688 - 690
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    It is essential to forecast water inrush area by processing the rich amount of information for hydrogeology in the mine. In this paper, we commence the study from the controlling factors of water inrush. Then we study the fitting process between AHP (Analytic Hierarchy Process) model and GIS normalization information after determining the controlling factors of water inrush level. Finally, we esta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hydro-generator units operating condition forecasting and fault diagnosis based on BP neural network

    Publication Year: 2011, Page(s):1315 - 1317
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    In this paper, from the Angle to predict , take hydro generating operation condition parameters (head, power) as input sample, take vibration, shaft waggling and pulse pressure, bearings temperature and so on parameter as output sample, create neural network prediction model. Train the established models, through comparing a different designs scheme, chose one smaller error model. Predict through ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy aware adaptive directed diffusion algorithm of wireless sensor networks

    Publication Year: 2011, Page(s):385 - 388
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    For the unbalanced energy consumption problem in Directed Diffusion and Energy Aware Directed Diffusion in heterogeneous networks, we propose the EAADD: Energy Aware Adaptive Directed Diffusion for Wireless Sensor Networks. This protocol changes the way of building reinforced path : flrst, we consider about the correlations of node available energy between adjacent rounds, then we use the adaptive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of rotating dynamics of table tennis

    Publication Year: 2011, Page(s):3038 - 3041
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    In table tennis, spinning ball is the mostly used skill by the sportsmen and the key to defeat the rival. How to serve the spinning ball based on the actual situation of the rival to achieve the final victory is a necessary skill which every excellent sportsman should have. The article mainly use the theory of biomechanics to reveal the mystery, find the mechanism of spinning ball, and provide a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TS flow analysis and design in IPTV performance testing instruments based on triple-play

    Publication Year: 2011, Page(s):918 - 921
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    This article mainly described the contradiction between the existing test equipment and the surge of network data quantity and expounded the network data transmission principle and transmission mode of the TS flow which based on the development of triple-play. In the meantime, it analyzed the data of TS flow and designed the IPTV performance test equipment according to the IPTV performance test in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on international tacit knowledge in frontier domains in visualized information

    Publication Year: 2011, Page(s):1615 - 1618
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1022 KB)

    Through using visualization technology and mapping knowledge domains, the paper explores the present situation and frontier domains of tacit knowledge. The data that the study used are downloaded from Web of Science and indexed by the topic word "tacit knowledge". Three results were obtained in the paper. First, more and more scholars especially from business management are focusing on research of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The construction research on the environmental cost management model of resource-enterprises in Inner Mongolia

    Publication Year: 2011, Page(s):1773 - 1776
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    This paper analyzes the characteristics of resource-based enterprises in Inner Mongolia, points out that it still need to go through a phase of resource consumption for Inner Mongolia. This paper studies and brings about an environmental cost management model of resource-enterprises in Inner Mongolia. The author points out that such kind of enterprises should procure cost information with activity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High speed IPv6 intrusion detection system based on MMDB

    Publication Year: 2011, Page(s):1308 - 1311
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB)

    As the core next network protocol, IPv6 provides large-scale data addresses. So the data in the network is large scale. How to detect the large-scale data is a realistic question to the IPv6 IDS. In this paper, a new design method based on MMDB is put forward aimed at improving the speed and maneuverability of IDS and resolving the bottleneck of High speed IDS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The quantitative analysis of research papers on library knowledge service in China in 1999–2010

    Publication Year: 2011, Page(s):4150 - 4153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB)

    Chinese Academic Journal Web Publication Library as a data source, with the bibliometric methods, the author statisticases and analyzes the distribution about the research Papers on Library Knowledge Service in 1999-2010 including Published time, journals, authors, subjects and so on, to understand the development Status about the Held in the past 15 years, in order to provide the reference on sus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Asymmetry Bi-directional RSVP for improving the network performance

    Publication Year: 2011, Page(s):170 - 173
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    The classical Resource ReSerVation Protocol (RSVP) is a flow-based signaling protocol used for reserving resources in the network for a given session. The core of Integrated Service (IntServ) Model is RSVP. RSVP is a unidirectional resource reservation protocol; it can only reserve resources for the TCP data flow along the forward direction path, and cannot provide any protection to the ACK packet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discussion about the core of search engine again—Web Crawler

    Publication Year: 2011, Page(s):3188 - 3191
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB)

    The web crawler is a common product of the network real-time refresh data and search engine technology at present. This article discusses and studies thoroughly how to apply the Web Crawler technique to realize the real-time refresh data and search engine technology. On the basis of deep analysis to the Web Crawler technique, this article gives a kind of solution to realize network communications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online communities of practice research: A review of course FET8601 at the University of Southern Queensland

    Publication Year: 2011, Page(s):3369 - 3371
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB)

    In spite of the exponential growth in the number of online education programs, there seems to be few effective theories that could offer a cogent basis to orient the practice of, or judge the quality of those products. However, the theories about the communities of practice provide an encompassing solution to the problem, because it can help us understand how individuals can achieve their optimal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The improvement of VTD-XML processing model

    Publication Year: 2011, Page(s):3711 - 3714
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    As a next generation of Web application, XML is quite easy and readable. However, existing XML processor is not. DOM (Document Object Model) uses too much memory and is quite slow. SAX (Simple API for XML) chooses to access information without structure, so it's uneasy to use. As the next generation of XML processing model, VTD-XML provides a wide range of uses and better choices .But VTD-XML also... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Id-based and Cluster Key Distribution for ad hoc networks

    Publication Year: 2011, Page(s):2996 - 2999
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB)

    An Id and Cluster-Based Key Distribution Scheme for MANET based on mechanism of identity-based cryptography and (t,n) threshold secret sharing is proposed in this paper. The new scheme is much different to traditional scheme, its secret shadows are not brought from the head of cluster, but from each node's private key signature. By getting together all these n secret shadows, the cluster head can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on context awareness

    Publication Year: 2011, Page(s):144 - 147
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    We have reviewed the research of context awareness of recent years in this paper. First of all, we describe the definitions of context and context awareness which are made by different scholars in different fields, and propose our own definition. In addition, different classifications of context and context awareness are analyzed. We focus on context acquisition and sensing, context modeling and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring semantic nouns in Tibetan language

    Publication Year: 2011, Page(s):492 - 495
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Making good use of semantics can help language understanding, thus can improve retrieve performance, getting more highly-ranked, relevant documents. Word families in Tibetan language can provide unexpected light on the Tibetan semantic world. We propose semantic categories between Tibetan nouns, which considered the relationship between the nouns and others. We propose an algorithm to calculate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.