By Topic

Computer and Information Science (ICIS), 2011 IEEE/ACIS 10th International Conference on

Date 16-18 May 2011

Filter Results

Displaying Results 1 - 25 of 79
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1804 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s):xv - xviii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2011, Page(s):xix - xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (70 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Differential Evolution and Sequential Quadratic Programming Algorithm

    Publication Year: 2011, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Optimization algorithms are very important in product design. They could be divided into two classes: traditional local search methods and heuristic global ones. Sequential quadratic programming (SQP) algorithm has been known as one of the most prominent and fastest methods, but its local exploitation characteristic leads to the fact that it could be easily trapped by local optimum. However, heuri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of the Computer Virus Evolution Model Based on Immune Genetic Algorithm

    Publication Year: 2011, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Inspiration form biological immune mechanism, this article gives the formal definition of computer virus in the gene model. Based on immune genetic algorithm, a evolution model of computer virus is proposed, and also the evolution operators which include selection operator, crossover operator, mutation operator and immune operator are established. The simulation experiments were conducted and it i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geospatially-Aware Access Control for Distributed Spatial Database Based on View Mechanism

    Publication Year: 2011, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    With the growing need of integration and sharing of spatial data located in different places on the network, distributed spatial database technology has become a hot research field. Meanwhile, spatial information security, especially access control, has attracted more and more attention in practice. Access control for distributed spatial databases has two challenges: realization of fine-grained an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying the ß-Hairpin Motifs in Enzymes by Using Support Vector Machine

    Publication Year: 2011, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Based on enzyme sequence information and predicted secondary structure information as feature parameters, by using support vector machine (SVM), a novel method for identifying the ¦Â-hairpin motifs in enzymes is proposed. The method is trained and tested on an enzymes database of 4030 ¦Â-hairpins and 1780 non-¦Â-hairpins. For training dataset in 5-fold cross-val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting of Oxidoreductase and Lyase Subclasses by Using Support Vector Machine

    Publication Year: 2011, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Based on enzyme sequence, using composite vector with amino acid composition, low frequency of power spectral density, predicted secondary structure, value of autocorrelation function and motif frequency to express the information of sequence, an approach of support vector machine (SVM) for predicting 18 subclasses of oxidoreductases and 6 subclasses of lyases is proposed. By the Jackknife test, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieve Load Balancing with a Re-routable LB-BvN Switching Scheme

    Publication Year: 2011, Page(s):35 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Multipath based routing and switching can achieve network-wide load balancing and reduce the port contentions of switching devices. From this point of view, in this paper, after analyzing the feasibility of implementing multinext-hop in core switching networks comprehensively, it comes up with a switching scheme called MXRS (Multi-next-hop Rerouting Switch) which supports multi-next-hop dynamical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Vehicle Traces Routing for Vehicular Ad-Hoc Network

    Publication Year: 2011, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Inter-Vehicle Communications (IVC) allows to exchange data among vehicles without requiring any fixed infrastructure in Vehicular Ad-hoc Networks (VANETs). Multi-hop data delivery through VANETs is challenging because of rapid topology changes and network fragmentation. To address this issue, we combine the idea of store-carry and forward (SCF) with routing scheme. In this paper, we proposed a nov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multihomed HWN Policy Framework Signalling Delivery

    Publication Year: 2011, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    This paper presents an XML based policy framework to approach flow distribution issues for multihoming and Mobile Internet Protocol Version 6 (MIPv6) enabled Heterogeneous Wireless Networks (HWN). In such a heterogeneous environment, flow distribution policies are first defined depending on mobility decisions, service agreements and user & provider interactions. Each traffic session is coup... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Function Companding Scheme for Peak-to-Average Power Ratio Reduction of SC-FDMA Signals

    Publication Year: 2011, Page(s):53 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    The 3rd generation partnership project (3GPP) long term evolution (LTE) standard has adopted orthogonal frequency division multiplexing access (OFDMA) in downlink and single carrier-frequency division multiple access (SC-FDMA) scheme for the uplink transmissions, which utilizes single carrier modulation and frequency domain equalization. In this paper, we proposed a power-function companding schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game-Theoretic Approach against Selfish Attacks in Cognitive Radio Networks

    Publication Year: 2011, Page(s):58 - 61
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Cognitive Radio (CR) networks are vulnerable to selfish attacks, where secondary users increase their accessing probability to enhance their own utilities, resulting in serious performance degradation in CR networks. Therefore, we formulate the secure access for CR networks into a static game called Back off Window Control Game (BWCG) and a repeated game with punishment mechanism based on the CSMA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiprocessor System-on-Chip Design with Fuzzy Dynamic Scheduling for Parallel Video Processing

    Publication Year: 2011, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    The Multiprocessor System-on-Chip is becoming a promising solution for the future complex computers and embedded systems, which are requiring higher performances. This paper addresses the inherent unreliability and instability of the multiple uncertain characteristics of complex embedded multiprocessor systems. In this work, we propose a fuzzy sets description for the multiple uncertain characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing

    Publication Year: 2011, Page(s):73 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of malware over the Internet, generating their signatures for detecting via anti-virus (AV) scan engines becomes an important reactive security function. However, AV security products consume much of the PC memory and resources due to their large signature files. AV cloud comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing Relaxed Declassifications with Reference Points

    Publication Year: 2011, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Language-based information flow security provides a way to enforce either the baseline noninterference property or more relaxed properties specifying intended information release. This paper presents a new approach for enforcing information release policy on programming language with I/O channels. First we present a relaxed security property complying with the security policy on the what-dimension... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keep Consistency: A Data Backup and Recovery Mechanism in TPM

    Publication Year: 2011, Page(s):82 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    The Trusted Platform Module (TPM) is an embedded cryptographic processor and non-volatile storage device which designed to be tamper-proof. There are many sensitive data in the TPM. We present a sensitive data backup and recovery mechanism in the TPM used in some abnormal situations such as power outage to ensure the data consistency and analyze the feasibility of this mechanism in detail. Besides... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering XML Elements for Efficient Code Generation

    Publication Year: 2011, Page(s):91 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Several works [1,2,3] have been reported in literature to cluster XML documents and/or XML Schemas based on structure similarity, semantic similarity, edit distance similarity etc. Our current attempt clusters the elements presented in an XML Schema based on conversion cost that incurs to transform one object to the other. Our strategy would help a dynamic XML compiler to reproduce classes for new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.