By Topic

2012 IEEE/ACIS 11th International Conference on Computer and Information Science

May 30 2012-June 1 2012

Filter Results

Displaying Results 1 - 25 of 124
  • ICIS 2012 2012 IEEE/ACIS 11th International Conference on Computer and Information Science [cover art]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (4868 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from Conference Co-chairs

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (106 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Co-chairs

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):xxi - xxviii
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2012, Page(s):xxix - xxxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sponsors

    Publication Year: 2012, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • A Novel Blocks Placement Strategy for Hadoop

    Publication Year: 2012, Page(s):3 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (809 KB) | HTML iconHTML

    A novel blocks placement strategy is developed for solving some shortages in recent Hadoop. With the Strategy, the optimal Data nodes, according to the real-time situation of Data nodes, are chosen dynamically to achieve load balancing. Finally, the simulation experiments indicate that our strategy behaves much better than the HDFS blocks placement when the situation is coherent to time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Periodicity of the P-adic Expansion after Arithmetic Operations in P-adic Field

    Publication Year: 2012, Page(s):8 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    For the past few years, we have been developing the Exact Scientific Computational Library (ESCL) using P-adic arithmetic. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking the advantage of fast integer multiplication of modern computer architectures. By properly selecting prime numbers as the bases and practically choosing the lengt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Methodology of Composing and Decomposing EPC Data in RFID Networks

    Publication Year: 2012, Page(s):14 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (634 KB) | HTML iconHTML

    As the lack in business process information, the EPC (Electronic Product Code) data in RFID (Radio Frequency Identification) network miss its readability. Focus on the challenge this paper proposes a kind of method and technology for composing and decomposing business process information with EPC data in RFID network. By abstracting the transaction information with its EPC data and composing both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Initial Investigation into Using Two-Level Regional Voting Approach for Face Verification

    Publication Year: 2012, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB) | HTML iconHTML

    Face verification is defined as a person whose identity is claimed a priori will be compared with the person's individual template in database, and then the system checks whether the similarity between pattern and template is sufficient to provide access. In this paper we introduce a new procedure of face verification with an embedding Electoral College framework, which has been applied successful... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modeling Method of Scientific Workflow Based on Cloud Environment

    Publication Year: 2012, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    In Cloud environment, a number of compute resources are distributed in a resource pool, and a variety of applications can get computing resources, storage space and all kinds of software services if they need through information sharing and real-time communication on the internet. SWF focuses on the data analysis, so the correctness, integrity, consistency and independence of data are the premises... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Adopting Cloud-Based E-learning System

    Publication Year: 2012, Page(s):37 - 42
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    The advent of cloud computing in recent years has sparked an interest from different organizations, institutions and users to take its advantage. This is a result of the new economic model for the Information Technology (IT) that cloud computing promises. It promises a shift from an organization required to invest heavily for limited IT resources that are internally managed, to a model where the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Refined RBAC Model for Cloud Computing

    Publication Year: 2012, Page(s):43 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    Cloud computing is a fast growing field which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources on based on their payments. This paper discusses cloud computing and its related security risks, with a focus on access control. As a traditional access control mechanism, role-based access control (RBA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Focal Determinants of Service Fairness into Post-Acceptance Model of IS Continuance in Cloud Computing

    Publication Year: 2012, Page(s):49 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    This study integrates the focal determinants of service fairness into a post-acceptance model of information system continuance. This study added structural and social service fairness constructs based on Greenberg's (1993) focal determinants of organizational justice. The research model seeks to be useful in predicting satisfaction, which enhances continued usage of an IS. The results show that p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objective Optimization Based Virtual Resource Allocation Strategy for Cloud Computing

    Publication Year: 2012, Page(s):56 - 61
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    The increasing requirements on cloud computing entail building up large numbers of large-scale data centers which require a surprising amount of energy. With the gradual depletion and price escalation of traditional energy, operating data center in an energy efficient way is an emerging urgent problem. However, most existing researches of resource allocation in datacenter did not take into full co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP DDOS Attack Detection on the Host in the KVM Virtual Machine Environment

    Publication Year: 2012, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    Analyze the disadvantages of KVM original network connection modes, and design the third network connection mode: NAT + Bridge mode. For the malicious virtual machines in user mode are difficult to detect and locate in normal way, the article proposes a strategy for detecting TCP DDOS attack based on an improved CUSUM algorithm in the KVM. This strategy detects attack of virtual machines in user m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combination Scheme against Pollution Attacks in Network Coding

    Publication Year: 2012, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    The network coding usually suffers from pollution attacks. Two schemes against pollution attacks are discussed in this paper, based on linear space signature and information theory, respectively. Pollution attacks detection algorithm of information theory based scheme is improved. The time consumptions of two schemes under different conditions of file size and data segmentation size are compared, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable P2P Video Conferencing System Based on VCStream Model

    Publication Year: 2012, Page(s):77 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (917 KB) | HTML iconHTML

    Recently, Peer-to-Peer (P2P) based multi-party video conference systems have been widely deployed. However, those solutions suffer from high cost when multiple users simultaneously distribute video streams to receivers. Most existing systems only support up to a dozen of users at the same time. In this paper, we propose a novel approach to construct and manage a heterogeneous P2P network for scala... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location Attraction Mobility Model for Mobile Ad Hoc Network

    Publication Year: 2012, Page(s):83 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB) | HTML iconHTML

    Mobility models play a crucial role in mobility wireless networks with respect to evaluating the network protocols and performances. However, the majority of existing mobility models either does not exhibit realistic movement characteristics or modeling methods are too complex. In this paper, a new mobility model based on Location Attraction (LAMM) is proposed, which utilizes human's clustering fe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.