Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2011 Seventh International Conference on Signal Image Technology & Internet-Based Systems

Nov. 28 2011-Dec. 1 2011

Filter Results

Displaying Results 1 - 25 of 87
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1249 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • SITIS 2011 Foreword

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (134 KB) | HTML iconHTML
    Freely Available from IEEE
  • SITIS 2011 Conference Objective

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • SITIS 2011 Conference Committees

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • IBCS Track Committee

    Publication Year: 2011, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • SIT Track Committee

    Publication Year: 2011, Page(s):xvii - xix
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • SITIS 2011 Workshop Committees

    Publication Year: 2011, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • SITIS 2011 Reviewers

    Publication Year: 2011, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • IBCS Track Editorial Message

    Publication Year: 2011, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (129 KB) | HTML iconHTML
    Freely Available from IEEE
  • SIT Track Editorial Message

    Publication Year: 2011, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (117 KB) | HTML iconHTML
    Freely Available from IEEE
  • KARE 2011 Workshop Editorial Message

    Publication Year: 2011, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote and Tutorial Speakers

    Publication Year: 2011, Page(s):xxvi - xxix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB)

    We consider the estimation of diffeomorphic transformations aligning a known shape and its distorted observation. The classical way to solve this registration problem is to find correspondences between the shapes and then compute the transformation parameters from these landmarks. Here we propose a novel framework where the exact transformation is obtained as the solution of a polynomial system of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acknowledgments

    Publication Year: 2011, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (215 KB)
    Freely Available from IEEE
  • QoS Routing for Heterogeneous Mobile Ad Hoc Networks Based on Multiple Exponents in the Definition of the Weighted Connectivity Index

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    In decades, lots of QoS routing algorithms have been proposed to let each mobile node in ad hoc networks to find paths based on QoS metrics which are mainly bandwidth and delay. We also proposed to use both Connectivity Index (CI) and weighted CI, the mathematically combination of link capacity and CI, as the QoS metrics in ad hoc networks. CI is widely used topological index in chemical and mathe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Mobility Management Scheme for Proxy Mobile IPv6 Networks with IP Paging Support

    Publication Year: 2011, Page(s):9 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    Proxy Mobile IPv6 (PMIPv6) is a network-based localized mobility support in IP network. The main advantage of using PMIPv6 is the freeing up of the mobile host in doing any mobility related activities and thereby saving its resources. However, the Mobile Access Gateway (MAG) incurs a high signaling cost to update the location of a mobile node to the remote Local Mobility Anchor (LMA) if it moves f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Autonomous Document Architecture for Enterprise Digital Right Management

    Publication Year: 2011, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2987 KB) | HTML iconHTML

    In information systems data security is one of the most important goals. This concerns the confidentiality of information but also its integrity and availability. The problem becomes even more difficult if a user wants to "checkout" a document from the information system, for example to work offline or to distribute it to other people outside the organization. During our work on the project FLUOR ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CVSS Attack Graphs

    Publication Year: 2011, Page(s):24 - 31
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Attack models and attack graphs are efficient tools to describe and analyse attack scenarios aimed at computer networks. More precisely, attack graphs give all possible scenarios for an attacker to reach a certain goal, exploiting vulnerabilities of the targeted network. Nevertheless they give no information about the damages induced by these attacks, nor about the probability of exploitation of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving E-Learning Ontologies for Personal and Cloud Learning Environments

    Publication Year: 2011, Page(s):32 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1349 KB) | HTML iconHTML

    Personal Learning Environments (PLEs) and Cloud Learning Environments (CLEs) aim at offering learners a personalised and responsive e-learning experience. Towards this objective, we propose the use of evolving e-learning ontologies in order to enrich the knowledge base of these learning environments with valid metadata. In particular, we define a process for the evolution of e-learning ontologies,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-Based LiDAR Visualization with Point-Based Rendering

    Publication Year: 2011, Page(s):38 - 45
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2308 KB) | HTML iconHTML

    The usage of LiDAR (Light Detection And Ranging) technology has been steadily increasing in recent years, creating large amounts of terrain data using terrestrial, airborne and satellite LiDAR scanning. The biggest problems encountered are large storage requirements, lesser transportability due to file sizes and real-time visualization of produced points, which reach numbers even up to a billion f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a SKOS Engine to Create, Share and Transfer Terminology Data Sets

    Publication Year: 2011, Page(s):46 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    In the recent years, research on terminology data sets standardization has been one of the biggest concerns of a World Wide Web Consortium working group. This research has led to the development of SKOS, a new standard which was subsequently issued in 2009 as a W3C Recommendation. In this paper we present the research work we undertake for the design and development of web based tools allowing to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lecture Video Indexing and Analysis Using Video OCR Technology

    Publication Year: 2011, Page(s):54 - 61
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    The text displayed in a lecture video is closely related to the lecture content. Therefore, it provides a valuable source for indexing and retrieving lecture video contents. Textual content can be detected, extracted and analyzed automatically by video OCR (Optical Character Recognition) techniques. In this paper, we present an approach for automated lecture video indexing based on video OCR techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.