By Topic

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2013 14th ACIS International Conference on

Date 1-3 July 2013

Filter Results

Displaying Results 1 - 25 of 116
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (3071 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Message from Conference Chair

    Publication Year: 2013, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (121 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2013, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (293 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2013, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s):xxi - xxiii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2013, Page(s):xxiv - xxvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB)

    These keynote speeches discuss the following: opportunistic resource utilization networks; error free computing? where are we now?; and software development for u-healthcare services and its application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Undirected Graph Traversal Based Grouping Prediction Method for Data De-duplication

    Publication Year: 2013, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    The data capacity of the de-duplication system, which is limited by the memory, is difficult to carry out a large-scale expansion. To solve this problem, the paper proposes a hash table grouping prediction method based on undirected graph traversal. This method exploits the indexing table replacement, which is similar to the virtual memory cache replacement, to expand the storage capacity of the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm of Developed Imperialist Competition for Suitable Human Resource Layout

    Publication Year: 2013, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    Due to the excess of human resource and not paying enough attention to layout and how to implement them, operations cost a lot and energy is wasted in big organizations. Thus, to improve layout, an imperialist competitive algorithm has been used in this research paper to achieve an acceptable and suitable answer for individuals' layout. In this paper, a new approach is introduced which is based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File Transfer Scheduling Optimization Using Artificial Immune System

    Publication Year: 2013, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Natural immune system has features such as pattern recognition, diversity, learning, distributed detection, stochastic detection, and adaptability, that make it a great metaphor to solve hard problems. In two last decades artificial immune systems, as a novel computational artificial intelligence approach, are used to solve hard optimization problems. As for existence of different theories and mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improve the Intelligent Consortium Agent for SMEs in the Plastic Market

    Publication Year: 2013, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    With development of Internet and technology, the traditional market has become an electronic market, and the value of trading has become more than a traditional market. The SME e-commerce has been grown rapidly, and more businesses have used the e-commerce for selling and buying goods or services. Consequently, most of the plastic e-marketplaces only allow the large companies to search the product... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Stock Analysts' Decision Making: An Intelligent Decision Support System

    Publication Year: 2013, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    It is well known that security analysis is a time-consuming and error-prone process. However, it can be improved or enhanced considerably by automated reasoning. Efforts to reduce the inaccuracy and incorrectness of analyses and to enhance the confidence levels of stock selection have led to the development of an intelligent decision support system called Trade Expert, which assists, not replaces,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Veracity and Convincingness: Sources of Plausibility for Decision Making and Situation Management

    Publication Year: 2013, Page(s):35 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    This paper explores the options for calculating the measures of veracity of statements and convincingness of reasoning. This is one approach for handling plausibility and it is important in systems that support or (autonomously) execute decision making for situation management. An unexpected and peculiar non-unity was discovered between the measure of correctness of inference steps and the measure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Winner-Take-All Memetic Differential Evolution for Genetic Interaction: Parameter Identification

    Publication Year: 2013, Page(s):43 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The emerging large-scale biological tools (e.g., micro array) challenge biologists to realize the connectivity of genes and/or proteins at the system level (global view). Having advantages in good generalization and showing the direct interaction of genes and/or proteins, the S-system becomes one of the popular models, which is able to capture the dynamic behavior of the biological system. Differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • e-Learning Content Authentication Using Bipartite Matching

    Publication Year: 2013, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (703 KB) | HTML iconHTML

    Content authenticity and correctness is one of the important challenges in eLearning as there can be many solutions for one specific problem in the cyber space. Therefore, we feel the necessity of mapping problem to solutions using graph partition and weighted bipartite matching. This paper presents a novel architecture and methodology for a personal eLearning system called PELS that is developed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Resource Provisioning and Bursting Approaches

    Publication Year: 2013, Page(s):59 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Cloud computing recently emerged as a new paradigm that aims to deploy services via Internet. Under hybrid cloud environment, cloud bursting is a technique that combines local (organizations or in-house) resources with public cloud resources, these resources are leased based on a pay-per-use basis. It used to process the overload work within local resource or to accelerate the execution time of di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Content Aggregation Using Aspect Oriented Programming

    Publication Year: 2013, Page(s):67 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Quality content is essential for successful content business. Content aggregation is a process of outsourcing quality content. During the aggregation, some modification of original content in source code level is required. Aspect Oriented Programming (AOP) that automatically inserts additional logic to relevant points in source codes can release or eliminate the task. Through AOP, modification can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving the Global Consistency of Dynamic Reconfiguration

    Publication Year: 2013, Page(s):71 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Many component-based systems need to modify their behavior or structure at run time in order to adapt the continuous change of user requirements or working environments. Change management is an essential part of reconfigurable systems. Dynamic reconfiguration helps these systems to evolve incrementally for one configuration to another at execution time. Many approaches have been proposed to suppor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ensemble Approach for Cyber Attack Detection System: A Generic Framework

    Publication Year: 2013, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier able to give maximum accuracy for all the five classes (Normal, Probe, DOS, U2R and R2L). We have proposed a Cyber Attack Detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An LBP Based Key Management for Secure Wireless Body Area Network (WBAN)

    Publication Year: 2013, Page(s):85 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    (BANs) gained immense consideration due to its applicability in the medical field. In this paper we propose a Hybrid type of Key management technique which uses human Physiological Values based generated keys as well as some preloaded keys in order to secure the wireless communication of BAN. We assume BAN to be a heterogeneous sensor network having the capability of measuring different physiologi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic Algorithms

    Publication Year: 2013, Page(s):89 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long time period, due to recent advances such as high progress in cryptanalysis techniques, improvement of computing skills and continuous hacking trials. This paper refers important issues ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.