Aug. 29 2008-Sept. 2 2008
Filter Results
-
[Front cover]
Publication Year: 2008, Page(s): C1|
PDF (314 KB)
-
[Title page i]
Publication Year: 2008, Page(s): i|
PDF (11 KB)
-
[Title page iii]
Publication Year: 2008, Page(s): iii|
PDF (31 KB)
-
[Copyright notice]
Publication Year: 2008, Page(s): iv|
PDF (61 KB)
-
Table of contents
Publication Year: 2008, Page(s):v - xviii|
PDF (145 KB)
-
-
Organizing Committee
Publication Year: 2008, Page(s):xxi - xxii|
PDF (24 KB)
-
Committee Members
Publication Year: 2008, Page(s): xxiii|
PDF (17 KB)
-
Application of Digital Watermark and Mobile Agent in Copyright Protection System
Publication Year: 2008, Page(s):3 - 6Digital watermark has been an important technology for copyright protection. However, it is a challenging task to searching watermark from the data over the network. The integration of mobile agent and digital watermark has been intensively investigated in recent years. A framework model is put forward to design copyright protection based on digital watermark and mobile agent. It can reduce the lo... View full abstract»
-
Multi-agent Architecture for Collaborative CAD System
Publication Year: 2008, Page(s):7 - 11
Cited by: Papers (1)In order to improve the features of traditional CAD system, a system architecture based on multi-agent is put forward. The proposed system framework includes three levels, supporting the collaborative product design for different remote users. The user agents are classified as real-time monitoring agent, conflict detection agent, conflict solution agent, user communication agent and knowledge mana... View full abstract»
-
Scheduling Algorithm Based on Task Priority in Heterogeneous Computing Environment
Publication Year: 2008, Page(s):12 - 16In this paper, a scheduling algorithm suitable for independent heterogeneous tasks on heterogeneous computing has been studied. With the objective to find the best point between matching and load balancing , the concept of task priority has been used to improve the existing algorithm, and the simulation of our algorithm has been performed .The results demonstrated that through prioritizing tasks, ... View full abstract»
-
A Certificate-Based Signcryption Scheme
Publication Year: 2008, Page(s):17 - 23
Cited by: Papers (2)In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption, which combines traditional pubic key encryption (PKE) with identity-based encryption (IBE) while preserving most of the advantages of each, such as no private key escrow and less PKI infrastructure. In this paper, we propose the security notion of certificate-based signcryption and present a concrete certificate-based... View full abstract»
-
A New Fuzzy Support Vector Machine Method for Named Entity Recognition
Publication Year: 2008, Page(s):24 - 28
Cited by: Papers (4)Recognizing and extracting exact name entities, like Persons, Locations, Organizations, Dates and Times are very useful to mining information from electronics resources and text. Learning to extract these types of data is called Named Entity Recognition (NER) task. Proper named entity recognition and extraction is important to solve most problems in hot research area such as Question Answering and... View full abstract»
-
The Design of the Secure Electronic Payment System Based on the SET Protocol
Publication Year: 2008, Page(s):29 - 33Chinapsilas E-business is still in its infancy and the limitation of financial system has still restricted the development of trans-border transactions. We need to promote more infrastructure construction, and then the E-business can enter the real era of transaction. The electronic payment is the key stage of the E-business and the basis of its development. This paper starts with various payment ... View full abstract»
-
Hedged Predictions for Traditional Chinese Chronic Gastritis Diagnosis with Confidence Machine
Publication Year: 2008, Page(s):34 - 38Traditional Chinese chronic gastritis diagnosis focuses on producing an accurate classifier and uncovering the predictive confidence for individual instance. Transductive confidence machine (TCM), which is a novel framework that provides hedged prediction coupled with valid confidence. In the framework of TCM, the efficiency of prediction depends on the nonconformity measure of samples. This paper... View full abstract»
-
Fade Scene Change Detection using Luminance Histogram Bin
Publication Year: 2008, Page(s):39 - 43
Cited by: Papers (1)Partitioning video sequence is very important for video applications such as video indexing, retrieval or editing. A lot of techniques have been presented based on information such as structures of the image, image histogram and intensity statistics etc. The histogram-based technique is generally used due to computation complexity when compare with other techniques is less, and most of image proce... View full abstract»
-
The Study of Entrance Guard & Check on Work Attendance System Based on Face Recognition
Publication Year: 2008, Page(s):44 - 47In this paper, the core algorithm is studied, which aiming at developing a robust and practical entrance guard & check on work attendance system based on face recognition, and this system is applied to the logistics management industry. Firstly, this algorithm divides the image into block images, which are also called sub-images. Then the well-known Fisher method is directly employed to the se... View full abstract»
-
A Multilayer Method of Text Feature Extraction Based on CILIN
Publication Year: 2008, Page(s):48 - 52The feature extraction is the most critical technology of text categorization. The method of feature extraction from Chinese text based on CILIN is different from the conventional feature extraction, which uses two feature extraction methods. This method is good at dealing with synonyms and polysemes, and reducing the dimension. Firstly, it uses the method of feature extraction from Chinese text b... View full abstract»
-
Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model
Publication Year: 2008, Page(s):53 - 57
Cited by: Papers (2)A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy re-encryption schemes have been proposed. However, all of these schemes are only proved secure in the random oracle not in the standard model. In this paper, Based on Waters's identit... View full abstract»
-
Linking Finite Automata and Formal Methods Enhancing Modeling Power for Complex Systems
Publication Year: 2008, Page(s):58 - 63
Cited by: Papers (3)Automata have various applications and it plays an important role in computer science, particularly, in modeling behavior of systems. Z notation is an ideal one to be used defining state space of a system and then operations over it. Consequently, it requires an integration of automata and Z increasing its modeling power. Further, finite automata may have different implementations therefore if we ... View full abstract»
-
Fault-Tolerance Ring Network on Chip without Buffer
Publication Year: 2008, Page(s):67 - 71The paper brings forward a hierarchical ring NoC (network on chip) topology whose links are divided into two groups of rings for fault-tolerance. Each group of ring contains one control-ring and one data ring. Control-ring propagates the information of routing, link error and error control of all nodes using packet switching. Data-ring exchanges data using circuit switching. Three pipeline stages ... View full abstract»
-
Computer Simulation of the Dynamic Complexity of a Host-parasitoid Model
Publication Year: 2008, Page(s):72 - 78
Cited by: Papers (1)In this paper, computer simulation is used to study the dynamic complexities of a host-parasitoid interaction with a Hassell growth function for the host and Holling-type functional response. Many forms of complex dynamic are observed, including quasiperiodic bands with periodic windows, Hopf bifurcation, period-doubling bifurcations, period-halving bifurcations, attractor crisis, intermittent cha... View full abstract»
-
Neural Network IMC-PID Control of CPE Polymerization Temperature Based on DDE
Publication Year: 2008, Page(s):79 - 82The production process of chlorinated polyethylene (CPE) is mainly a chemical polymerization. The CPE polymerization temperature has characteristics of time varying, nonlinear and large delay. In order to realize a steady and accurate automatic control system, the neural network IMCPID (NNIMCPID) control is advanced in the article. And base on the DDE technology, the control system can achieve the... View full abstract»
-
Instance Assisted Semantic Interoperability for Distributed Digital Museums
Publication Year: 2008, Page(s):83 - 87The distribution and heterogeneity of information raise several challenges for systems to search and retrieve information mutually. One critical foundation for coordinated action in multi-systems is the ability to exchange representational objects that can be locally interpreted in ways that make sense. Coherent local interpretation of shared representations is needed to create global semantic coh... View full abstract»
-
Design of an Information Intelligent System based on Web Data Mining
Publication Year: 2008, Page(s):88 - 91
Cited by: Papers (2)How to efficiently use the vast amounts of information on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. In this paper, Web data mining process is introduced from the view of function, an intelligent mining system of network information is built with combining the data mining and artificia... View full abstract»