By Topic

Computer and Information Science (ICIS), 2013 IEEE/ACIS 12th International Conference on

Date 16-20 June 2013

Filter Results

Displaying Results 1 - 25 of 106
  • [Front cover]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):ix - xiv
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • International program committee

    Publication Year: 2013, Page(s):iii - v
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Message from conference chair

    Publication Year: 2013, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2013, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Author index

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • The future of enterprise computing

    Publication Year: 2013, Page(s): 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB)

    Summary form only given. With emerging computing trends of social, mobile, cloud and big data, and also with the new trend of BYOD (Bring Your Own Device) in companies, enterprise computing is recently going through transformational changes. This talk will start by looking at the recent computing trends, one by one, and their implication on the enterprise computing, individually and collectively. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Affective retrieval: Multimedia data retrieval based on impression

    Publication Year: 2013, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB)

    Summary form only given. Affective computing and affective engineering have attracted the interests of researchers in the field of information science. Feelings, sensitivity, impressions, and emotions are treated in affective engineering. Multimedia data including pictures, music pieces, and movies give us some impression. Impression should be considered in the multimedia data retrieval. This mean... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to service dynamic reconfiguration using probabilistic model checking

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB)

    Summary form only given: Web service has been an important solution to achieve resource sharing and application integration in the Internet era, which can develop the most promising software application with the on-demand changing computing paradigm, through service reuse and dynamic synthesis. Now, more and more enterprises and organizations have taken part in the emerging service software indust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of requirement definition in user-oriented virtual network architecture

    Publication Year: 2013, Page(s):4 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB) | HTML iconHTML

    Recent years have brought progress in flexible construction of network services through an open-flow or software-defined network (SDN). These existing methods, however, require equipment for exclusive use. This paper proposes a user-oriented virtual network service architecture that easily enables new network service construction from the user viewpoint. Concretely, a commercial server is installe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on gait recognition using LPC cepstrum for mobile terminal

    Publication Year: 2013, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1351 KB) | HTML iconHTML

    The use of mobile terminals has been expanding dramatically in recent years as they evolve from a means of dispatching and gathering information to a highly functional tool that supports personal lifestyles and behavior. A mobile terminal is likely to store various kinds of personal information such as a calendar and contact information as well as key data to carry out online transactions. Losing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approaches to analyze requirements of billing management for cloud computing services

    Publication Year: 2013, Page(s):17 - 22
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (783 KB) | HTML iconHTML

    Business management using information-communication (info-communication) infrastructures such as broadband networks and data centres will become more and more important these days. Moreover, cloud computing service induces a lot of corporate alliances and it makes customer-service management complicated. Especially, billing management is very critical for both providers and customers. It is expect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instant distributed minimum diameter tree construction for scalable application layer multicast

    Publication Year: 2013, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1178 KB) | HTML iconHTML

    Many research efforts on application layer multicast has been performed as an alternative group communication method because of difficulties in deployment problem of IP multicast and optimization is one of the hot topics to make efficient multicast tree. Because of high cost, adopting distributed optimization process in tree building has not been promising. This paper aims at minimizing the diamet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptation of Region Growing thresholds using Memetic Programming algorithm

    Publication Year: 2013, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1662 KB) | HTML iconHTML

    This paper presents a new strategy for the segmentation of brain images from the volumetric Magnetic Resonance Imaging (MRI). We propose a new segmentation technique that hybridize an evolutionary algorithm, called the Memetic Programming (MP) algorithm, with the Region Growing (RG) technique. The MP algorithm generates new threshold functions and then the RG uses these thresholds to perform an ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reuse environments for software artifacts: Analysis framework

    Publication Year: 2013, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Systematic software reuse facilitates achieving quality software, faster and at a lower cost. Software reuse environments play an important role in exploiting reusable artifacts to the extent. Environments that support reusing early-stage software artifacts are of great interest. There have been a number of reuse environments proposed in the literature for reuse of software artifacts. However, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for evaluating software design pattern specification languages

    Publication Year: 2013, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Software design patterns are solutions to recurring problems. These solutions have been widely accepted and adopted by the software practitioners. Design Patterns were initially described informally through the use of textual descriptions or some object oriented graphical notations. However, informal descriptions of design patterns give rise to ambiguity and incorrect usage of the design pattern. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of impression received from reverse perspective illusion to create innovative advertising

    Publication Year: 2013, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1003 KB) | HTML iconHTML

    Using an innovative approach for advertising on knowledge based society, we proposed a new image representation about the out of home (OOH) media. It has been the utilization of reverse perspective illusion by painted three-dimensional objects with realistic image that assembled two-dimensional objects like craft papers. Recently, an expertise of using reverse perspective illusion was not sufficie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of programming competency for PEAS system innovation: PEAS System: Programming experience assessment scale system

    Publication Year: 2013, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    After programming test we usually use demerit point system. However, there is a possibility that the number of mistakes in the reply and for programming skills are not necessarily correspond and right assessment is not get. Then we developed trial product to evaluate students programming skill exactly. That product is named PEAS system. We analyzed examinee by PEAS system. As a result, we got not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive assessment of 3D visual images

    Publication Year: 2013, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (962 KB) | HTML iconHTML

    Three-dimensional (3D) Image quality assessment (IQA) is becoming one of hot research area recently. 3D image refers to a technique for enhancing the illusion of depth and protrusion in an image by presenting two offset images separately to the left and right eye of the viewer. These two-dimensional images are combined in the brain to give the perception of 3D depth and protrusion. With the advent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Layout-tree-based approach for identifying visually similar blocks in a web page

    Publication Year: 2013, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1188 KB) | HTML iconHTML

    When extracting information from a web page, IE systems usually need to perform pattern recognition to identify the elements that have similar patterns. However, most of them are mainly based on analyzing HMTL source code, DOM tree, tag tree or Xpath of web pages. These methods are language-dependent, or more precisely, HTML-dependent. They have some insuperable limitations. In order to overcome t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping of nearest neighbor for classification

    Publication Year: 2013, Page(s):121 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    Dimension reduction of data is an important theme in the data processing and on the web to represent and manipulate higher dimensional data. Reduct in the rough set is a minimal subset of features, which has almost the same discernible power as the entire features in the higher dimensional scheme. But, there are problems in the application of reducts for classification. Here, we develop a method w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design & deployment of an Enterprise Grade Real-time Multi Agent System for supply chain synchronization

    Publication Year: 2013, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1026 KB) | HTML iconHTML

    To respond to customer demand businesses invest in capacities and supply. Any mismatch results in obsolescent stock, wasted resources and lost sales. In this paper the considerations for design & deployment of an Enterprise Grade Real-time Multi Agent System for supply chain synchronization is presented, so that each and every business involved in the supply chain can adjust their activities t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent technology for designing adaptive business processes

    Publication Year: 2013, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (691 KB) | HTML iconHTML

    Complexity of the Internet based global market is increasing relentlessly. To survive and prosper under new conditions business processes need to be adaptable, which means capable of positively reacting to frequent disruptions. A methodology and technology for designing adaptable business processes is outlined and examples are given of solutions supplied to commercial enterprises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing an argumentation support system for face-to-face collaborative learning

    Publication Year: 2013, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (767 KB) | HTML iconHTML

    In argumentative collaborative learning, learners have to externalize their knowledge and construct one knowledge from their knowledge by an argument. Although the quality of the argument is much important to enhance the knowledge construction, it is very difficult for learners without enough arguing-skills to achieve such high quality argument. Therefore, we developed a system that promotes utili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.