2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing

9-11 June 2010

Filter Results

Displaying Results 1 - 25 of 54
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (514 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • A Message from the Conference Chairs

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2010, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB)

    Summary form only given. What is the core of Computing? This talk defines the discipline of computing as centered around the notion of modeling, especially those models that are automatable and automatically manipulable. As a discipline, computing brings together models, languages, and machines to represent and generate processes. The heart of computing is not the particular artifacts around which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2010, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Summary form only given. Web applications have been developing rapidly around the world, many organizations developed high-performance web applications tightly integrated into many business critical systems such as electronic marketplaces, e-banking, e-trading, electronic access to public administration services. It brings new features including dynamic behaviors, heterogeneous representations, un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian Network Inference with Qualitative Expert Knowledge for Decision Support Systems

    Publication Year: 2010, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    In this paper, we consider a methodology that utilizes qualitative expert knowledge for inference in a Bayesian network. The decision-making assumptions and the mathematical equation for Bayesian inference are derived based on data and knowledge obtained from experts. A detailed method to transform knowledge into a set of qualitative statements and an “a priori” distribution for Baye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Query Validation in Guided-Based Systems: Assuring the Construction of Queries that Make Sense

    Publication Year: 2010, Page(s):9 - 14
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Semantic search importance is growing each day as millions of people around the world need to obtain objective and concrete information. Guided-based systems are an alternative to natural language systems regarding the query construction method. However, current guided-based systems perform query validation only at a syntactical level. In this paper we address the semantic validation of queries in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of OpenGL in Bridge Simulation

    Publication Year: 2010, Page(s):15 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Using three-dimensional finite element to analyze the bridge structure, the article use OpenGL to research bridge three-dimensional modeling and render realistic graphics. Based on this, we develop bridge structure dynamic simulation system. Take a large bridge engineering for example, and combined with the actual usage situation, we simulate and analyze the following several aspects: traffic flow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User and Item Pattern Matching in Multi-criteria Recommender Systems

    Publication Year: 2010, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Information on the ratings of several features of items can be deployed to improve the quality of recommendations in recommender systems by incorporating them into similarity calculation between any two users or two items. However, the incremental information of these features has important impacts on recommender systems. For example, the complexity of similarity calculation is increased and more ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS Meta-model of Large-Scale Device Collaboration

    Publication Year: 2010, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Aiming at the large-scale and dynamics of large-scale device collaboration system, the paper presents a QoS meta-model of large-scale device collaboration, which contains QoS of single device resource, compound QoS of multiple device resource and the constrain relation among QoS. A prototype system based on the QoS meta-model is designed and implemented. Finally, simulation experiments are done. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Device Collaboration Process Based on Petri Net

    Publication Year: 2010, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    In the area of device collaboration system, there are a large number of devices which needed to be collaborated with other devices, and the collaboration process is complex. It is significative to reduce the complexity of modeling a device collaboration process. In this paper, a device collaboration process model is proposed, which includes four basic structures. By use of device collaboration net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CP-Nets Based Methodology for Integrating Functional Verification and Performance Analysis of Network Protocol

    Publication Year: 2010, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    It is very risky to improve the performance of network protocols without the assurance of its functional correctness, especially for protocols that with complicated and concurrent behaviors. However, in most of current model based protocol engineering projects, two independent models are adopted for individual functional verification and performance analysis, which could not guarantee the performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers

    Publication Year: 2010, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Flooding is one type of Denial of Service (DoS) attacks which can cause significant financial losses. This paper presents a new security approach which prevents flooding in the government critical systems and focuses in preventing flooding in non-authenticated client area. A new cooperation with local service providers has been suggested to make the prevention of flooding attacks easier. In additi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving Flow-Level Controllability in Network Intrusion Detection System

    Publication Year: 2010, Page(s):55 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Current network intrusion detection systems are lack of controllability, manifested as significant packet loss due to the long-term resources occupation by a single flow. The reasons can be classified into two kinds. The first kind is known as normal reasons, that is, the processing of mass arriving packets of a large flow can not be limited to a determinable period of time and thus makes other fl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification by Rough Set Reducts, AdaBoost and SVM

    Publication Year: 2010, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Most classification studies are done by using all the objects data. It is expected to classify objects by using some subsets data in the total data. A rough set based reduct is a minimal subset of features, which has almost the same discernible power as the entire conditional features. Here, we propose a greedy algorithm to compute a set of rough set reducts which is followed by the k-nearest neig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explaining Classification by Finding Response-Related Subgroups in Data

    Publication Year: 2010, Page(s):69 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    A method for explaining results of a regression based classifier is proposed. The data is clustered using a metric extracted from the classifier. This way, clusters found are related to classifier predictions, and each cluster can be considered a possible explanation for classification result. The clusters are described by simple rules, meant to be easy for a human to understand. The key points of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining High Utility Web Access Sequences in Dynamic Web Log Data

    Publication Year: 2010, Page(s):76 - 81
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Mining web access sequences can discover very useful knowledge from web logs with broad applications. By considering non-binary occurrences of web pages as internal utilities in web access sequences, e.g., time spent by each user in a web page, more realistic information can be extracted. However, the existing utility-based approach has many limitations such as considering only forward references ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML Path Matching for Different Hierarchy Order of Elements in XML Documents

    Publication Year: 2010, Page(s):82 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    XML documents allow document owners to create their documents in their own formats (element names and structure). The same information might be described in several ways. To find the similarity between XML documents which use different formats, one method is path similarity detection. The recently approach is PathSim. The previous approach can detect the similarity rate between two XML paths in ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Implementation of Synthetic Aperture Sonar Imaging on High Performance Clusters

    Publication Year: 2010, Page(s):89 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    A flexible and scalable architecture that implements real-time synthetic aperture sonar (SAS) imaging on high performance clusters (HPCs) is introduced in this paper. Combing HPCs with application of a hybrid MPI and OpenMP parallel programming model, the lookup table algorithm for SAS image reconstruction based on the time-domain correlation algorithm is realized in parallel. Considering the huge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.