15-18 Dec. 2010
Filter Results
-
[Copyright notice]
Publication Year: 2010, Page(s): 1|
PDF (283 KB)
-
Table of contents
Publication Year: 2010, Page(s):1 - 4|
PDF (941 KB)
-
Keynotes speakers
Publication Year: 2010, Page(s):1 - 3Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»
-
Organizers
Publication Year: 2010, Page(s): 1|
PDF (321 KB)
-
Program
Publication Year: 2010, Page(s):1 - 8|
PDF (1084 KB)
-
Sponsors
Publication Year: 2010, Page(s): 1|
PDF (488 KB)
-
Technical Program Committee
Publication Year: 2010, Page(s):1 - 2|
PDF (760 KB)
-
Welcome message from the technical program chair
Publication Year: 2010, Page(s): 1 -
First-Slot scheduling with wavelength conversion for distributed file transfers
Publication Year: 2010, Page(s):42 - 47As more flexible and self-adaptive network connections are expected between cloud users and service vendors, the requests for more sophisticated bandwidth scheduling schemes are emerging. In this paper, we conduct a thorough study on the a specific type of bandwidth reservation: First-Slot scheduling in this scenario. We introduce a model for the optical networks with sparse wavelength conversion,... View full abstract»
-
Computer networks resilience challenges: Routing protocols
Publication Year: 2010, Page(s):28 - 33Computer networks are the core of the cyberinfrastucture and are endangered by malicious activities and natural disasters. These threats stress the need for a resilient computer networks to ensure business operational continuity and optimum performance. Several aspects affect computer network resilience level such as network topology, routing protocols, and others. This paper demonstrates Redundan... View full abstract»
-
Task clustering & scheduling with duplication using recursive critical path approach (RCPA)
Publication Year: 2010, Page(s):34 - 41
Cited by: Papers (2)This paper address the problem of static task clustering and scheduling of a parallel program given as a Directed Acyclic Graph(DAG) with duplication. Scheduling of task graphs onto multiprocessors is known to be an NP-complete in most cases leading to solutions based on heuristics. In this paper, a novel task-duplication scheduling heuristic is presented. Our approach differs from other heuristic... View full abstract»
-
An enhanced e-learning ecosystem based on an integration between cloud computing and Web2.0
Publication Year: 2010, Page(s):48 - 55
Cited by: Papers (6)What we know is less important than our capacity to continue to learn more until e-learning appeared. While e-learning technology has matured considerably since its inception, there are still many problems that practitioners find when come to implementing e-learning. Today's knowledge society of the 21st century requires a flexible learning environment which is capable to adapt according to teachi... View full abstract»
-
SCAMRA: Simulated Context-Aware Meeting Room Application
Publication Year: 2010, Page(s):56 - 60This paper deals with how to adapt the context architecture defined in [1] to a context-aware application called Simulated Context-Aware Meeting Room Application (SCAMRA). The main goal is to test and experiment the CFM and the proposed architecture done in [1]. SCAMRA can be used to manage any holding meeting on offices, universities, organizations or any other location by managing sessions, atte... View full abstract»
-
Analyses on kernel-specific generalization ability for kernel regressors with training samples
Publication Year: 2010, Page(s):61 - 66Theoretical analyses on generalization error of a model space for kernel regressors with respect to training samples are given in this paper. In general, the distance between an unknown true function and a model space tends to be small with a larger set of training samples. However, it is not clarified that a larger set of training samples achieves a smaller difference at each point of the unknown... View full abstract»
-
Singer and music discrimination based threshold in polyphonic music
Publication Year: 2010, Page(s):445 - 450
Cited by: Papers (1)Song and music discrimination play a significant role in multimedia applications such as genre classification and singer identification. Song and music discrimination play a significant role in multimedia applications such as genre classification and singer identification. The problem of identifying sections of singer voice and instrument signals is addressed in this paper. It must therefore be ab... View full abstract»
-
Optical watermarking technique robust to geometrical distortion in image
Publication Year: 2010, Page(s):67 - 72
Cited by: Papers (4)This paper presents an optical watermarking technique that is robust against geometrical distortion in images by using spatially modulated illumination. It can protect “analog” objects like pictures painted by artists from having photographs taken of them illegally in museums. Illegally captured images in practical situations may contain various distortions, and embedded watermarks m... View full abstract»
-
A framework to strengthen password authentication using mobile devices and browser extensions
Publication Year: 2010, Page(s):73 - 78Shoulder-surfing, phishing and keylogging are widely used by attackers to obtain users' sensitive credentials. In this paper, we propose a framework to strengthen password authentication using mobile devices and browser extensions. This approach provides a relatively high resilience against shoulder-surfing, phishing and keylogging attacks while requires no change on the server side. A prototype i... View full abstract»
-
Human activity recognition via temporal moment invariants
Publication Year: 2010, Page(s):79 - 84
Cited by: Papers (3)Temporal invariant shape moments intuitively seem to provide an important visual cue to human activity recognition in video sequences. In this paper, an SVM based method for human activity recognition is introduced. With this method, the feature extraction is carried out based on a small number of computationally-cheap invariant shape moments. When tested on the popular KTH action dataset, the obt... View full abstract»
-
Multi-objective optimization of NoC standard architectures using Genetic Algorithms
Publication Year: 2010, Page(s):85 - 90
Cited by: Patents (1)One of the challenging problems in Networks-on-Chip (NoC) design is optimizing the architectural structure of the on-chip network in order to maximize the network performance while minimizing corresponding costs. In this paper, a methodology for multi-objective optimization of NoC standard architectures using Genetic Algorithms is presented. The methodology considers two cost metrics, power and ar... View full abstract»
-
Improving performance of fading channel simulators by use of uniformly distributed random numbers
Publication Year: 2010, Page(s):91 - 96Filter-based fading channel simulators universally use White Gaussian Noise (WGN) to generate complex tap coefficients. In this work, we will show that replacing WGN source by Uniform Random Number Generator (URNG) results in improved simulation speed in case of software simulator; and reduced area/power in case of hardware simulator. We will verify, both analytically and through extensive simulat... View full abstract»
-
Hierarchical clustering of 3-D line segments for building detection
Publication Year: 2010, Page(s):388 - 393
Cited by: Papers (1)A novel approach for an efficient extraction of rectangular boundaries from aerial image data is proposed in this paper. In this approach, a Centroid Neural Network (CNN) with a metric of line segments is utilized for connecting low-level linear structures or grouping similar objects. The proposed an approach, called hierarchical clustering method, utilizes the fact that rooftops of a building are... View full abstract»
-
Content-based retrieval of audio data using a Centroid Neural Network
Publication Year: 2010, Page(s):394 - 398
Cited by: Papers (1)A classification scheme for content-based audio signal retrieval is proposed in this paper. The proposed scheme uses the Centroid Neural Networks (CNN) with a Divergence Measure called Divergence-based Centroid Neural Network (DCNN) to perform clustering of Gaussian Probability Density Function (GPDF) data. In comparison with other conventional algorithms, the DCNN designed for probability data ha... View full abstract»
-
Fuzzy self-tuning inverse dynamics control of 3 DOF planar robot manipulators
Publication Year: 2010, Page(s):439 - 444Control of an industrial robot includes nonlinearities, uncertainties and external perturbations that should be considered in the design of control laws. Inverse dynamics control is a well-known conventional motion control strategy for manipulators which ensures global asymptotic stability for fixed symmetric positive definite (proportional and derivative) gain matrices. In this paper, a superviso... View full abstract»
-
On the security of image encryption schemes based on Multiple Parameters Transforms
Publication Year: 2010, Page(s):97 - 101
Cited by: Papers (2)Recent developments of generalized forms of signal processing transforms with a large number of independent parameters, such as the Multiple Parameter Fractional Fourier Transform and the Discrete Fractional Cosine Transform, have encouraged many researchers to propose image encryption algorithms based on a single or multiple applications of these transforms. In order to claim a high level of secu... View full abstract»
-
Pupil location and movement measurement for efficient emotional sensibility analysis
Publication Year: 2010, Page(s):1 - 6With advances in intelligent technologies, e.g. ambient intelligence, context-aware, and pervasive systems, much research is now devoted to a computational paradigm that senses and perceives changes in human emotion. This paper presents a context-aware architecture for adaptive emotional sensibility analysis called CAF-ESA (a Context-Aware Framework based Emotional Sensibility Analysis) with adapt... View full abstract»