By Topic

Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD), 2012 13th ACIS International Conference on

Date 8-10 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 139
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1194 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • A Message from the Conference Chair

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (90 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xx - xxii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Keynote abstracts [two abstracts]

    Publication Year: 2012, Page(s):xxiii - xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB)

    Summary form only given. Provides the abstracts for the following four invited talks: Pursuit of Low-dimensional Structures in High-dimensional Data; Interest Points Detectors and Descriptors in Image Recognition; Patient and Process Specific Imaging and Visualization for computer assisted interventions; Three Approaches of Scene Text Recognition: An informal comparison on difficult images. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query Range Sensitive Probability Guided Multi-probe Locality Sensitive Hashing

    Publication Year: 2012, Page(s):3 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Locality Sensitive Hashing (LSH) is proposed to construct indexes for high-dimensional approximate similarity search. Multi-Probe LSH (MPLSH) is a variation of LSH which can reduce the number of hash tables. Based on the idea of MPLSH, this paper proposes a novel probability model and a query-adaptive algorithm to generate the optimal multi-probe sequence for range queries. Our probability model t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computational Model of Imitation and Autonomous Behavior

    Publication Year: 2012, Page(s):13 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (947 KB) | HTML iconHTML

    Learning is essential for an autonomous agent to adapt to an environment. One method that can be used is learning through trial and error. However, it is impractical because of the long learning time required when the agent learns in a complex environment. Therefore, some guidelines are necessary to expedite the learning process in a complex environment. Imitation of the behavior of other agents w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does Talking to a Robot in a High-Pitched Voice Create a Good Impression of the Robot?

    Publication Year: 2012, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    When talking to infants, we tend to use infant-directed speech (IDS) rather than adult-directed speech (ADS). IDS attracts more attention from infants, conveys the emotions of adults more easily, and makes language acquisition easier. It is not clear, however, whether IDS has a cognitive effect on adults as well. To address this issue, we focus on one of the most distinctive features of IDS, a hig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Efficiency of Interactive Differential Evolution in Creation of Sound Contents: In Comparison with Interactive Genetic Algorithm

    Publication Year: 2012, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Interactive Evolutionary Computation (IEC) is well known as an effective method to create media contents suited to user's preference and objectives to use. As one of the methods, we have applied Differential Evolution, which is recent evolutionary algorithm to IEC. Concretely, we have already presented a method that creates sign sounds with Interactive Differential Evolution (IDE). This study aims... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimodal Medical Image Fusion in Modified Sharp Frequency Localized Contourlet Domain

    Publication Year: 2012, Page(s):33 - 37
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    As a novel of multi-resolution analysis tool, the modified sharp frequency localized contour let transforms (MSFLCT) provides flexible multiresolution, anisotropy, and directional expansion for medical images. In this paper, we proposed a new fusion rule for multimodal medical images based on MSFLCT. The multimodal medical images are decomposed by MSFLCT. For the high-pass sub band, the weighted s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Analysis of Access Control Systems on Cloud

    Publication Year: 2012, Page(s):41 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Cloud computing, a relatively new concept and has gained an immense attention of research community in the past few years. R&D organizations and industry are investing a lot in cloud based research and applications. Similarly on theconsumers' side organizations are moving their business on cloud to provide flexibility and conceive ever increasing computational power requirements. In spite of s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Admission Control Strategy of Serving Peers in P2P VoD Systems

    Publication Year: 2012, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Data request task scheduling is one of the important issues for P2P VoD systems. However the existing data scheduling strategies in P2P VoD system is not fair enough. They make many nodes, which upload data actively, bear very heavy load, while those selfish nodes providing no resource sit idle. This paper presents an admission control strategy on serving nodes combining with the incentive mechani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pricing Model and Real Options in 4G LTE Mobile Network

    Publication Year: 2012, Page(s):54 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    This paper focuses on real option theory and on its applications in 4G LTE mobile network. The objective of this paper are (1) to introduce real option theory and to discuss its applicability as a decision support tools, (2) to exemplify some real options present in 4G LTE communication of MNO markets, and (3) to apply real option approach based on the proposed pricing model to the selected case t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Botnet: From Mathematical Modelling to Integrated Detection and Mitigation Framework

    Publication Year: 2012, Page(s):63 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    No one is absolutely sure about cyber security as long as a communication system is connected to the internet, since internet is a wild that comprises all kind of people around the world from white hat to black hat. In other words, virtually any Internet connected system is vulnerable to major outrages from receiving a spam email to a botnet originated DDOS attack. But every individual, company an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Online Event Analysis Framework for Micro-blog Based on Incremental Topic Modeling

    Publication Year: 2012, Page(s):73 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    In this paper, we present a scalable implementation of a topic modeling (Adaptive Link-IPLSA) based method for online event analysis, which summarize the gist of massive amount of changing tweets and enable users to explore the temporal trends in topics. This model also can simultaneously maintain the continuity of the latent semantics to better capture the time line development of events. With th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does it Matter What They Said? A Text Mining Analysis of the State of the Union Addresses of USA Presidents

    Publication Year: 2012, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Text data are a major type of data in the modern society. Literatures have pointed out that more than 80% of data are in text form. It is important to study the insights from text data in addition to quantitative data. The development of text mining techniques started in the early 80's. The methodology has become much more mature in the recent years. In this article, we conduct a case study using ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSCLU: A New Data Stream Clustring Algorithm for Multi Density Environments

    Publication Year: 2012, Page(s):83 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    Recently, data stream has become popular in many contexts of data mining. Due to the high amount of incoming data, traditional clustering algorithms are not suitable for this family of problems. Many data stream clustering algorithms proposed in recent years considered the scalability of data, but most of them did not attend the following issues: (1) The quality of clustering can be dramatically l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhance the Multi-level Fuzzy Association Rules Based on Cumulative Probability Distribution Approach

    Publication Year: 2012, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    This paper introduces a fusion model to reinforce multi-level fuzzy association rules, which integrated cumulative probability distribution approach (CPDA) and multi-level taxonomy concepts to extract fuzzy association rules. The proposed model generate large item sets level by level and mine multi-level fuzzy association rule lead to finding more informative and important knowledge from transacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factor Analysis for Influence Maximization Problem in Social Networks

    Publication Year: 2012, Page(s):95 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    In recent years, researchers have paid more attention to influence maximization problem. This problem is firstly defined by Domingos and Richardson as follows: finding a small set of individuals in a social network that could maximize the spread of influence under certain influence cascade model. To solve this issue, researchers proposed different algorithms. However, in all of these algorithms, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GDCLU: A New Grid-Density Based ClustrIng Algorithm

    Publication Year: 2012, Page(s):102 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (711 KB) | HTML iconHTML

    This paper addresses the density based clustering problem in data mining where clusters are established based on density of regions. The most well-known algorithm proposed in this area is DBSCAN [1] which employs two parameters influencing the shape of resulted clusters. Therefore, one of the major weaknesses of this algorithm is lack of ability to handle clusters in multi-density environments. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.