Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2013 IEEE 16th International Conference on Computational Science and Engineering

3-5 Dec. 2013

Filter Results

Displaying Results 1 - 25 of 213
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (587 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Message from CSE2013 Chairs

    Publication Year: 2013, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • CSE2013 Organizing and Program Committees

    Publication Year: 2013, Page(s):xx - xxii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Message from CIT2013 Chairs

    Publication Year: 2013, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • CIT2013 Organizing and Program Committees

    Publication Year: 2013, Page(s):xxiv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Message from ICESS2013 Chairs

    Publication Year: 2013, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICESS2013 Organizing and Program Committees

    Publication Year: 2013, Page(s):xxviii - xxix
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Message from BDSE2013 Chairs

    Publication Year: 2013, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • BDSE2013 Organizing and Program Committees

    Publication Year: 2013, Page(s):xxxi - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Message from ACIT2013 Chairs

    Publication Year: 2013, Page(s): xxxv
    Request permission for commercial reuse | PDF file iconPDF (129 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from MR.BDI2013 Chairs

    Publication Year: 2013, Page(s): xxxvi
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • MR.BDI2013 Organizing and Program Committees

    Publication Year: 2013, Page(s): xxxvii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Message from DCPIS2013 Chairs

    Publication Year: 2013, Page(s): xxxviii
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • DCPIS2013 Organizing and Program Committees

    Publication Year: 2013, Page(s): xxxix
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Nonlinear Support Vector Machines for Solving the PMC-Based System-Level Fault Diagnosis Problem

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    This paper deals with the system-level fault diagnosis problem which main objective is to identify faults, in particular permanent ones, in diagnosable systems under the PMC model. The PMC model assumes that each system's node is tested by a subset of the other nodes, and that at most t of these nodes are permanently faulty. Tests performed by faulty nodes are unreliable, and hence, they can incor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Cloud Services: Matrix Multiplication Revisited

    Publication Year: 2013, Page(s):9 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach is applicable to non-ordering integer data type used in matrix multiplication. The paper applies row-column shuffling to matrices, and adds random noises to data in order to hide a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Load-Balancing Force Decomposition Scheme for Parallel Simulation of Chemical Dynamics with Multiple Inter-atomic Force Models

    Publication Year: 2013, Page(s):15 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Force evaluation is the most computationally intensive part in a chemical dynamics simulation, and hence most parallel simulation algorithms choose the force calculation as the main target for parallelization. The majority of existing parallel algorithms assume a uniform force-evaluation cost for all atom pairs. For dynamics with considerable bonded interactions, different evaluation formulas are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aircraft Landing Problem: An Efficient Algorithm for a Given Landing Sequence

    Publication Year: 2013, Page(s):20 - 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    In this paper, we investigate a special case of the static aircraft landing problem (ALP) with the objective to optimize landing sequences and landing times for a set of air planes. The problem is to land the planes on one or multiple runways within a time window as close as possible to the preferable target landing time, maintaining a safety distance constraint. The objective of this well-known N... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a Lean Mass Customization Based Manufacturing

    Publication Year: 2013, Page(s):28 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    We describe an experimental mass customization based manufacturing system which relies on a sophisticated IT infrastructure and CAE to produce novel wooden design products in a lean and flexible way. The main focus of this paper is on the IT infrastructure where several AI techniques for machine vision, search and planning are applied. The IT system has a service oriented architecture and is compo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Mobile Devices from DoS Attacks

    Publication Year: 2013, Page(s):34 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (763 KB) | HTML iconHTML

    Today mobile devices are increasingly being used to access data services in addition to the voice communications. However such devices have limited resources to enforce strong security measures and hence they are easily vulnerable to attacks. In this paper we propose techniques for securing mobile devices from denial of service attacks. We will make use of the IPSec protocol for secure traceback a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What to Reuse?: A Probabilistic Model to Transfer User Annotations in a Surveillance Video

    Publication Year: 2013, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    Techniques to extract or understand interactions between moving objects in video is becoming increasingly important as the amount of video increases. Applications in surveillance range from understanding traffic to studying fish schooling behaviour. Because of the massive amount of data, fast, approximate techniques based on statistical models are common. These models connect user annotations (lab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.