


default search action
10. CIT 2010: Bradford, West Yorkshire, UK
- 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4108-2

Computer and System Architecture (1)
- Jian Zou, Chuancai Liu:

Texture Classification by Matching Co-occurrence Matrices on Statistical Manifolds. 1-7 - Ali Safari Mamaghani, Mostafa Mahi

, Mohammad Reza Meybodi:
A Learning Automaton Based Approach for Data Fragments Allocation in Distributed Database Systems. 8-12 - Jie Sun

, Yongping Zhang, Kejia He:
Providing Context-awareness in the Smart Car Environment. 13-19 - Zhengwei Qiu, Cathal Gurrin

, Aiden R. Doherty
, Alan F. Smeaton
:
Term Weighting Approaches for Mining Significant Locations from Personal Location Logs. 20-25 - Taehoon Kim, Sungwoo Tak:

Experience with Hardware-Software Codesign of Network Protocol Stacks Supporting Real-Time Inter-Task Communication. 26-32 - Andreas Loos, Michael Schmidt, Dietmar Fey, Jens Grobel:

Dynamically Programmable Image Processor for Compact Vision Systems. 33-40 - Samad S. Kolahi, Burjiz K. Soorty, Navneet Chand, Zhang Qu:

Performance Comparison of IPv4 and IPv6 in Peer-Peer and Client Server Local Area Networks. 41-45
Computer and System Architecture (2)
- Menghui Yang, Zhituo Li, Weikang Yang, Tonghong Li

:
Analysis of Software Rejuvenation in Clustered Computing System with Dependency Relation between Nodes. 46-53 - Man Cao, Bin Xin, Fuming Qiao, Qingsong Shi, Tianzhou Chen, Like Yan:

Distributed Memory Management Units Architecture for NoC-based CMPs. 54-61 - Jie Yang, Like Yan, Lihan Ju, Yuan Wen, Shaobin Zhang, Tianzhou Chen:

Homogeneous NoC-based FPGA: The Foundation for Virtual FPGA. 62-67 - Claudia Canali

, Michele Colajanni
, Riccardo Lancellotti
:
Adaptive Algorithms for Efficient Content Management in Social Network Services. 68-75 - Andre Lage Freitas

, Jean-Louis Pazat:
A Self-Adaptable Approach for Easing the Development of Grid-Oriented Services. 76-82 - Matteo Mordacchini

, Ranieri Baraglia, Patrizio Dazzi
, Laura Ricci
:
A P2P REcommender System based on Gossip Overlays (PREGO). 83-90 - Jie Song, Yubin Bao, Jingang Shi:

A Triggering and Scheduling Approach for ETL in a Real-time Data Warehouse. 91-98 - Jie Cui, Xue Chen, Yongmei Lei, Weimin Xu:

Improving the Efficiency of Scheduling and Placement in FPGA by Small-world Model Based Genetic Algorithm. 99-106
High Performance Computing
- Sunwook Kim, Eutteum Jo, Hyungshin Kim

:
Low Power Branch Predictor for Embedded Processors. 107-114 - You Li, Kaiyong Zhao, Xiaowen Chu

, Jiming Liu
:
Speeding up K-Means Algorithm by GPUs. 115-122 - Ismail Ababneh, Wail Mardini

, Hilal Alawneh, Mohammad Hamed, Saad Bani-Mohammad:
Effects of Allocation Request Shape Changes on Performance in 2D Mesh-Connected Multicomputers. 123-130 - Chuanfu Xu, Yonggang Che, Jianbin Fang

, Zhenghua Wang:
Optimizing Adaptive Synchronization in Parallel Simulators for Large-scale Parallel Systems and Applications. 131-138 - Tao Tang, Xinhai Xu, Yisong Lin:

A Data Communication Scheduler for Stream Programs on CPU-GPU Platform. 139-146 - Yamin Li, Shietung Peng, Wanming Chu:

Collective Communication in Recursive Dual-Net: An Interconnection Network for High-Performance Parallel Computer Systems of the Next Generation. 147-154 - Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:

A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. 155-162 - Chao Wang, Bin Xie, Jiexiang Kang, Tianzhou Chen, Wei Hu, Zhenwei Zheng:

On-Chip Operating System Design for NoC-Based CMP. 163-170 - Wei Hu, Xingsheng Tang, Bin Xie, Tianzhou Chen, Dazhou Wang:

An Efficient Power-Aware Optimization for Task Scheduling on NoC-based Many-core System. 171-178
Utility Computing/Could Computing/Ubiquitous Computing
- Yaqiong Li, Yongbing Huang:

TMemCanal: A VM-oblivious Dynamic Memory Optimization Scheme for Virtual Machines in Cloud Computing. 179-186 - Ranieri Baraglia, Patrizio Dazzi

, Gabriele Capannini, Giancarlo Pagano:
A Multi-criteria Job Scheduling Framework for Large Computing Farms. 187-194 - Fei Teng, Frédéric Magoulès

:
Resource Pricing and Equilibrium Allocation Policy in Cloud Computing. 195-202 - Lai Yang, Zhongzhi Shi:

An Efficient Data Mining Framework on Hadoop using Java Persistence API. 203-209 - Matthew Woitaszek, Henry M. Tufo:

Developing a Cloud Computing Charging Model for High-Performance Computing Resources. 210-217 - Haosong Gou, Younghwan Yoo:

Distributed Bottleneck Node Detection in Wireless Sensor Network. 218-224 - Pablo G. S. Tiburcio, Marco Aurélio Spohn

:
Ad hoc Grid: An Adaptive and Self-Organizing Peer-to-Peer Computing Grid. 225-232
Software Engineering
- Iván García, I. Andrea:

Using the Software Process Improvement approach for Defining a Methodology for Embedded Systems Development using the CMMI-DEV v1.2. 233-240 - Sajjad Mahmood

:
The Impact of Acceptance Tests on Analyzing Component-Based Systems Specifications: An Experimental Evaluation. 241-248 - Mohammad Azzeh

, Peter I. Cowling
, Daniel Neagu
:
Software Stage-Effort Estimation Based on Association Rule Mining and Fuzzy Set Theory. 249-256 - Federico Maggi

:
A Recognizer of Rational Trace Languages. 257-264 - Mohamed Zouari, Maria-Teresa Segarra, Françoise André:

A Framework for Distributed Management of Dynamic Self-adaptation in Heterogeneous Environments. 265-272
Computer Networks (1)
- Rabindra Bista

, Hee-Dae Kim, Jae-Woo Chang:
A New Private Data Aggregation Scheme for Wireless Sensor Networks. 273-280 - Wei Peng

, Baokang Zhao, Wanrong Yu, Chunqing Wu, Xiaorong Yan:
Ferry Route Design with Delay Bounds in Delay-Tolerant Networks. 281-288 - Yongming Xie, Guojun Wang, Jie Wu:

Fuzzy Location Service for Mobile Ad Hoc Networks. 289-296 - Chunghan Lee

, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Analysis of Anomalies on a Virtualized Network Testbed. 297-304 - Pattana Wannawilai, Chanboon Sathitwiriyawong:

AOMDV with Sufficient Bandwidth Aware. 305-312 - Yousef E. M. Hamouda, Chris I. Phillips:

Metadata-Based Adaptive Sampling for Energy-Efficient Collaborative Target Tracking in Wireless Sensor Networks. 313-320
Computer Networks (2)
- Turki A. AlGhamdi

, Mike E. Woodward:
QoS Algorithm for Localised Routing Based on Bandwidth as the Dominant Metric for Candidate Path Selection. 321-328 - Mosleh M. Abu-Alhaj

, Manjur S. Kolhar
, Lingeswari V. Chandra, Omar Amer Abouabdalla
, Ahmed Manasrah:
Delta-Multiplexing: A Novel Technique to Improve VoIP Bandwidth Utilization between VoIP Gateways. 329-335 - Liang Zhao

, Ahmed Yassin Al-Dubai
, Imed Romdhani:
Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. 336-342 - Sivanantharasa Panchadcharam, Qiang Ni

, Gareth A. Taylor
:
Evaluation of QoS Parameters for Real-time Rich Media Applications Using a Test-bed Implementation. 343-348 - Xiaoqun Yuan, Hao Yin, Xuening Liu, Changlai Du, Geyong Min:

Server Placement for Peer-to-Peer Live Streaming Systems. 349-355 - Taehoon Kim, Bora Kang, Sungwoo Tak:

A Sofrware Framework for Robust Packet Delivery in Wireless Multi-hop Networks. 356-363 - Jaehyun Choi, Seungwok Han, Chang Hoon Lyu, Hee Yong Youn:

Enhanced Packet Buffering for DiffServ in Fast Handover Mobile IP. 364-370
Computer Networks (3)
- Zhe Yang, Lingzhi Li, Zhihao Wang, Linqing Li:

Active Analysis of BT with a Modified Azureus Client. 371-376 - Jing Liu, Xinming Ye, Jun Li:

Analyzing Performance for Complex Protocol using Validated CP-nets Models. 377-384 - Fuad Bajaber, Irfan Awan:

Distributed Energy Balanced Clustering for Wireless Sensor Networks. 385-392 - Loubna Mekouar

, Youssef Iraqi
, Raouf Boutaba:
Impact of Peers' Similarity on Recommendations in P2P Systems. 393-399 - Magnus Eriksson, Arif Mahmud

:
Dynamic Single Frequency Networks in Wireless Multihop Networks - Energy Aware Routing Algorithms with Performance Analysis. 400-406 - Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh, Pallab Dasgupta:

A Query based Formal Security Analysis Framework for Enterprise LAN. 407-414 - Wei Yuan, Xiaolei Cui, Ignas G. Niemegeers:

Distributed Adaptive Interference-Avoidance Multi-channel MAC Protocol for ZigBee Networks. 415-419 - Charilaos C. Zarakovitis

, Ilias G. Nikolaros, Dionysios Skordoulis
, Marios G. Hadjinicolaou, Qiang Ni
:
A Comparative Study on Iterative Methods Regarding Cross-Layer Optimization for OFDMA Systems. 420-425
Artificial Intelligence
- Kazuhiko Yamashita, Goutam Chakraborty, Hiroshi Mabuchi, Masafumi Matsuhara:

An Efficient Method to Set RBF Network Paramters Based on SOM Training. 426-431 - Huan Liu, Shuang Zhang, Shixiong Zhang:

Fuzzy Expert System Based Intelligent Website Assessment System. 432-437 - Zahra Khanmirzaei:

Training Recurrent Neuro-Fuzzy System Using Two Novel Population-Based Algorithms for Temperature Forecasting. 438-445 - Mohammad-Reza Feizi-Derakhshi

, Masood R. P. Derakhshan:
Intelligent Recognition of Gearbox Status by Wavelet Packet Decomposition. 446-450 - Cheng Hua Li, Iker Gondra:

A Novel Neural Network-Based Approach for Multiple Instance Learning. 451-456 - Shasha Feng, Dantong Ouyang, Yonggang Zhang:

The Logical Difference for Fuzzy Ontologies. 457-463 - Marcos L. P. Bueno

, Gina M. B. Oliveira:
Multiobjective Evolutionary Algorithms and a Combined Heuristic for Route Reconnection Applied to Multicast Flow Routing. 464-471 - Luiz G. A. Martins

, Luiz H. A. Monteiro
:
A Model of Intelligent Controller for Hypothyroidism Treatment. 472-479 - Nabila Kazmi, M. Alamgir Hossain, Roger M. Phillips

:
Intelligent Modelling for Benign Tumour Growth with Cell-Cell and Cell-Matrix Adhesion and Movement. 480-486
Computer Graphics/Image Processing
- Jian Wu, Hengjun Yue, Zhiming Cui, Jianming Chen:

Moving Object Tracking Method Based on Adaptive On-line Clustering and Prediction-based Cross-correlation. 487-494 - Andres Solis Montero, Milos Stojmenovic, Amiya Nayak

:
Robust Detection of Corners and Corner-line Links in Images. 495-502 - Qing Liu, Sun'an Wang, Xiaohui Zhang, Yun Hou:

Flame Recognition Algorithm Research under Complex Background. 503-510 - Lihong Zheng, Xiangjian He

, Bijan Samali, Laurence Tianruo Yang:
Accuracy Enhancement for License Plate Recognition. 511-516 - J. H. Park, G. S. Lee, W. H. Cho, N. Toan, S. H. Kim, S. Y. Park:

Moving Object Detection based on Clausius Entropy. 517-521 - Masakatsu Ohta:

Non-negative Matrix Factorization for Inferring Implicit Preference of Potential Customer. 522-528 - Toan Nguyen Dinh, Jonghyun Park, Gueesang Lee:

Voting Based Text Line Segmentation in Handwritten Document Images. 529-535 - Jun Ma, Long Zheng, Yuichi Yaguchi, Mianxiong Dong

, Ryuichi Oka:
Object Recognition using Full Pixel Matching. 536-543 - Min Li, Huibin Wang, Xijun Yan, Lizhong Xu:

An Extraction Method of Moving Object Based on Visual Cognition Mechanism. 544-551
Information Visualization
- Jong-Woo Kim, Woo-Keun Chung, Seon-Yeong Kim, Hwan-Gue Cho:

Detecting the Orientation of N-gonal Cropped Sub-images and Its Application. 552-559 - Dong-Sung Ryu, Seon-Yeong Kim, Hwan-Gue Cho:

A Photo Visualization System Considering Region of Interest. 560-566
Information Security
- Basit Qureshi

, Geyong Min, Demetres D. Kouvatsos:
A Framework for Building Trust Based Communities in P2P Mobile Social Networks. 567-574 - Monis Akhlaq, Faeiz Alserhani, Ahsan Subhan, Irfan-Ullah Awan, John Mellor, Pravin Mirchandani:

High Speed NIDS using Dynamic Cluster and Comparator Logic. 575-581 - Flavius Opritoiu, Mircea Vladutiu, Mihai Udrescu, Lucian Prodan:

Concurrent Error Detection for Multiplicative Inversion of Advanced Encryption Standard. 582-588 - Yunchuan Guo, Lihua Yin, Yuan Zhou, Binxing Fang:

Quantifying Information Leakage for Fully Probabilistic Systems. 589-595 - Qiongxiao Wang, Jiwu Jing, Jingqiang Lin:

A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms. 596-603 - Michele Colajanni

, Mirco Marchetti
, Michele Messori:
Selective and Early Threat Detection in Large Networked Systems. 604-611 - Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula

, Faten Labbene:
Enforcing Access Control to Web Databases. 612-619
Management of Data and Database Systems
- Yong-Ki Kim

, Hye-Kyeom Yoo, Jae-Woo Chang:
New GML Storage Schema Models for Spatial and Non-spatial Information. 620-626 - Guohui Li, Ping Fan, Yanhong Li, Jianqiang Du:

An Efficient Technique for Continuous K-Nearest Neighbor Query Processing on Moving Objects in a Road Network. 627-634 - Guohui Li, Pei Zhao, Sheng Gao, Jianqiang Du:

F-KDB: An K-D-B Tree Implementation over Flash Memory. 635-642 - Taijin Yoon, Sun-Young Park, Hwan-Gue Cho:

A Smart Filtering System for Newly Coined Profanities by Using Approximate String Alignment. 643-650 - Dexi Liu, Changxuan Wan, Naixue Xiong, Laurence Tianruo Yang, Lei Chen

:
Two Novel Semantics of Top-k Queries Processing in Uncertain Database. 651-659 - Baichen Chen, Geyong Min:

Robust Top-k Query Evaluation in Wireless Sensor Networks. 660-667 - Noraziah Ahmad

, Mohammad Fadel Jamil Klaib, Roslina Mohd Sidek:
Failure Semantic of Neighbour Replication Grid Transaction Model. 668-673
New Web Technology and Applications
- Yun-Jung Lee, Sung-Min Yoon, Jeong-Hoon Ji, Hwan-Gue Cho, Gyun Woo:

How to Apply the Skip List to the Management of a Massive Set of Replying Comments in Web Bulletins by Exploiting the Power-Law Distribution. 674-681 - Xiaofei Liao, Fan Zhang, Hai Jin, Linchen Yu:

iDARE: Proactive Data Replication Mechanism for P2P VoD System. 682-689 - Patricio Galeas, Ralph Kretschmer, Bernd Freisleben

:
Information Retrieval via Truncated Hilbert Space Expansions. 690-697 - Subrata Saha, Atul Sajjanhar, Shang Gao

, Robert Dew, Ying Zhao:
Delivering Categorized News Items Using RSS Feeds and Web Services. 698-702
IT for Biomedicine
- Jun Shi, Booma Devi Sekar, Ming-Chui Dong, Wai Kei Lei:

Fuzzy Neural Networks to Detect Cardiovascular Diseases Hierarchically. 703-708
IntelNet-2010: The 2010 International Workshop on Intelligent Sensor and Wireless Networks
Wireless Sensor Networks
- Vasilis Michopoulos, Lin Guan

, Iain W. Phillips
:
A New Congestion Control Mechanism for WSNs. 709-714 - Yasir Fayyaz, Mehwish Nasim, Muhammad Younus Javed:

Maximal Weight Topology Discovery in Ad hoc Wireless Sensor Networks. 715-722 - Takuya Iwai, Naoki Wakamiya, Masayuki Murata

:
Error-Tolerant Coverage Control based on Bio-inspired Attractor Selection Model for Wireless Sensor Networks. 723-729 - José Vicente Martí Avilés

, Raúl Marín Prades
:
Pattern Recognition Comparative Analysis Applied to Fingerprint Indoor Mobile Sensors Localization. 730-736 - Matthias Andree, Alexander Gebel, Holger Karl:

Concept and Prototype for a Real-Time Enabled Publish/Subscribe System. 737-742 - Ning Sun, Nai-bin Su, Sang-Ho Lee:

A Lifetime Extended Routing Protocol Based on Data Threshold in Wireless Sensor Networks. 743-748
Mobile Computing and Wireless Networks
- Muneer O. Bani Yassein

, Osama Al Oqaily, Geyong Min, Wail Mardini
, Yaser M. Khamayseh
, Saher S. Manaseer
:
Enhanced Fibonacci Backoff Algorithm for Mobile Ad-Hoc Network. 749-754 - Ghaidaa Al-Sultany

, Maozhen Li, Sadaqat Jan, Hamed S. Al-Raweshidy
:
Facilitating Mobile Communication with Annotated Messages. 755-760 - Byung Jun Lee, Kyung Tae Kim, Hyung Do Lee, Hee Yong Youn:

A SIP Signaling Retransmission Scheme for Efficient Mobile IPTV Service over 3G Wireless Networks. 761-766 - Laith Al-Jobouri

, Martin Fleury, Salah S. Al-Majeed, Mohammed Ghanbari
:
Effective Video Transport over WiMAX with Data Partitioning and Rateless Coding. 767-772 - Muhammad Bilal, Pauline M. L. Chan

, Prashant Pillai
:
Fastest-Vehicle Multi-hop Routing in Vehicular Ad hoc Networks. 773-778 - Damien Martin-Guillerez, Jean Fanchon:

Discrete-Time Simulator for Wireless Mobile Agents. 779-784 - Michel F. Randrianandrasana, Xueyong Wei

, David Lowe:
Collective Behaviour in a Square Lattice of Driven Duffing Resonators Coupled to van der Pol Oscillators. 785-790 - Lexi Xu

, Yue Chen, Yue Gao
:
Self-organizing Load Balancing for Relay Based Cellular Networks. 791-796
TSP-2010: The Third International Symposium on Trust, Security and Privacy for Emerging Applications
Metrics, Architectures, and Models
- Feng Shen, Chonglei Mei, Hai Jiang, Zhiqian Xu:

Towards Secure and Reliable Data Storage with Multi-coefficient Secret Sharing. 797-802 - Serif Bahtiyar

, Murat Cihan, Mehmet Ufuk Çaglayan:
A Model of Security Information Flow on Entities for Trust Computation. 803-808 - Wolfgang Boehmer:

Toward a Target Function of an Information Security Management System. 809-816 - Lusha Wang, Raquel Hill:

Trust Model for Open Resource Control Architecture. 817-823 - Federico Maggi

:
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. 824-831 - Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab

:
A Privacy-Preserving Trust Model for VANETs. 832-837 - Félix Gómez Mármol

, Javier G. Marín-Blázquez
, Gregorio Martínez Pérez
:
Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks. 838-845
Trust, Security and Privacy in Systems
- Yanjiang Yang, Feng Bao:

Enabling Use of Single Password over Multiple Servers in Two-Server Model. 846-850 - Ruan He, Marc Lacoste, Jean Leneutre:

Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection. 851-858 - Peter Clutterbuck:

Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications. 859-864 - Chunxiao Li, Anand Raghunathan

, Niraj K. Jha:
A Secure User Interface for Web Applications Running Under an Untrusted Operating System. 865-870 - Fangyong Hou, Hongjun He, Nong Xiao, Fang Liu, Guangjun Zhong:

Efficient Encryption-Authentication of Shared Bus-Memory in SMP System. 871-876 - Carlos Queiroz, Abdun Naser Mahmood

, Zahir Tari
:
An Analytical Framework for Evaluating Survivability of SCADA Systems. 877-881
Trust, Security and Privacy in Mobile and Wireless Communications
- Rehana Yasmin

, Eike Ritter, Guilin Wang:
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures. 882-889 - Juliano F. Kazienko

, Célio Vinicius N. de Albuquerque
:
Secure Secret Key Distribution and Storage in Wireless Sensor Networks. 890-895 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar

:
Trust Management Scheme for Mobile Ad-Hoc Networks. 896-901 - Juan E. Tapiador

, John A. Clark:
Learning Autonomic Security Reconfiguration Policies. 902-909 - Lei Zhang, Honggang Zhang, Mauro Conti

, Roberto Di Pietro
, Sushil Jajodia
, Luigi Vincenzo Mancini
:
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. 910-915 - Somanath Tripathy

:
Tin-Key: Effective Key-Establishment for Wireless Sensor Networks. 916-921
Trust, Security and Privacy in Virtualization Technologies and Cloud Computing
- Qin Liu, Guojun Wang, Jie Wu:

Efficient Sharing of Secure Cloud Storage Services. 922-929 - Frank Dölitzscher, Christoph Reich

, Anthony Sulistio:
Designing Cloud Services Adhering to Government Privacy Laws. 930-935 - Jinzhu Kong:

A Practical Approach to Improve the Data Privacy of Virtual Machines. 936-941 - Loubna Mekouar

, Youssef Iraqi
, Raouf Boutaba:
Incorporating Trust in Network Virtualization. 942-947 - Flavio Lombardi

, Roberto Di Pietro
:
A Security Management Architecture for the Protection of Kernel Virtual Machines. 948-953 - Juan Li, Zonghua Zhang, Weiyi Zhang:

MobiTrust: Trust Management System in Mobile Social Computing. 954-959
Privacy, Anonymity and Risk Analysis
- Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez:

Hiding Short Secret Messages based on Linguistic Steganography and Manual Annotation. 960-964 - Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez:

Measuring the Security of Linguistic Steganography in Spanish based on Synonymous Paraphrasing with WSD. 965-970 - Minh-Triet Tran

, Vi-Minh Luong, Anh Duc Duong, Isao Echizen:
Bi-directional RPROB-based Location Anonymizer System for Location-Based Services. 971-977 - Xiaoying Zhang, Chi Guo, Lina Wang:

Using Game Theory to Reveal Vulnerability for Complex Networks. 978-984 - Shu Qin Ren, Khin Mi Mi Aung

, Jong Sou Park:
A Privacy Enhanced Data Aggregation Model. 985-990 - Mariam Al-Hamar, Ray Dawson, Lin Guan

:
A Culture of Trust Threatens Security and Privacy in Qatar. 991-995 - Adel Almohammad, Gheorghita Ghinea

:
Image Steganography and Chrominance Components. 996-1001
Network Attacks and Defenses
- Lei Hou, Hai-Xin Duan, Jianping Wu:

Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. 1002-1008 - Jie Wang

, Raphael C.-W. Phan
, John N. Whitley, David J. Parish:
Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method. 1009-1014 - Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi:

Simultaneous Analysis of Time and Space for Conflict Detection in Time-Based Firewall Policies. 1015-1021 - Feng Hao

:
On Small Subgroup Non-confinement Attack. 1022-1025 - Pengsu Cheng, Lingyu Wang, Tao Long:

Compressing Attack Graphs Through Reference Encoding. 1026-1031 - Ali Alzahrani, Helge Janicke

, Sarshad Abubaker:
Decentralized XACML Overlay Network. 1032-1037
Cryptography and Security Protocols
- Xiaoyi Zhou, Jixin Ma

, Wencai Du, Bo Zhao, Mingrui Chen, Yongzhe Zhao:
Cryptanalysis of the Bisectional MQ Equations System. 1038-1043 - Kun Peng, Feng Bao:

Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property. 1044-1049 - Haining Chen, Yongbin Zhou, Wenling Wu, Na Wang:

Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. 1050-1057 - Yves Igor Jerschow, Martin Mauve:

Offline Submission with RSA Time-Lock Puzzles. 1058-1064 - Imran Erguler, Emin Anarim

:
Attacks on an Efficient RFID Authentication Protocol. 1065-1069 - Mujahid Mohsin, Mehreen Afzal, Muhammad Arif Wahla:

Think Before Your LFSRs Jump. 1070-1074 - Zainab Noferesti, Neda Rohani, Javad Mohajeri, Mohammad Reza Aref:

Distinguishing Attack on Bivium. 1075-1078
Authentication, Access Control, and Accounting
- Harri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis:

Security and Trust of Public Key Cryptography Options for HIP. 1079-1084 - Cesar Ghali, Ali Chehab

, Ayman I. Kayssi:
CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services. 1085-1089 - Claudio A. Ardagna

, Sabrina De Capitani di Vimercati
, Gregory Neven, Stefano Paraboschi
, Franz-Stefan Preiss, Pierangela Samarati
, Mario Verdicchio:
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. 1090-1095 - Roberto Bragantini, Mauro Conti

, Roberto Di Pietro
:
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. 1096-1101 - Min-Hua Shao, Ying-Chih Chin:

A Novel Dynamic ID-based Remote User Authentication and Access Control Scheme for Multi-server Environment. 1102-1107 - Nuno Bettencourt

, Nuno Silva
:
Recommending Access to Web Resources based on User's Profile and Traceability. 1108-1113 - Fotios Gogoulos, Anna Antonakopoulou

, Georgios V. Lioudakis
, Aziz S. Mousas, Dimitra I. Kaklamani, Iakovos S. Venieris:
Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures. 1114-1121
FGC-2010: The First International Workshop on Frontier of GPU Computing
Fundmentals of of GPU Computing
- Hagen Peters, Martin Koper, Norbert Luttenberger:

Efficiently Using a CUDA-enabled GPU as Shared Resource. 1122-1127 - Rui Ramalho, Pedro Tomás

, Leonel Sousa
:
Efficient Independent Component Analysis on a GPU. 1128-1133 - Xiaohuang Huang, Christopher I. Rodrigues, Stephen Jones, Ian Buck, Wen-mei W. Hwu:

XMalloc: A Scalable Lock-free Dynamic Memory Allocator for Many-core Machines. 1134-1139
Algorithms and Toolkits
- Guangyong Zhang, Liqiang He, Yanyan Zhang:

Parallel Best Neighborhood Matching Algorithm Implementation on GPU Platform. 1140-1145 - Francisco Vázquez, Gloria Ortega

, José-Jesús Fernández, Ester M. Garzón:
Improving the Performance of the Sparse Matrix Vector Product with GPUs. 1146-1151 - Daniel Kauker, Harald Sanftmann, Steffen Frey

, Thomas Ertl:
Memory Saving Discrete Fourier Transform on GPUs. 1152-1157 - Jiang-Feng Peng, Hu Chen, Shaohuai Shi

:
The GPU-based String Matching System in Advanced AC Algorithm. 1158-1163 - Kaiyong Zhao, Xiaowen Chu

:
GPUMP: A Multiple-Precision Integer Library for GPUs. 1164-1168
Software Developments
- Lei Wang, Yunquan Zhang, Xianyi Zhang, Fangfang Liu:

Accelerating Linpack Performance with Mixed Precision Algorithm on CPU+GPGPU Heterogeneous Cluster. 1169-1174 - Xiaolong Wu, Nady Obeid, Wen-mei W. Hwu:

Exploiting More Parallelism from Applications Having Generalized Reductions on GPU Architectures. 1175-1180 - Tobias Brandvik, Graham Pullan:

SBLOCK: A Framework for Efficient Stencil-Based PDE Solvers on Multi-core Platforms. 1181-1188
Applications of GPU Computing
- Rainer Spurzem, Peter Berczik

, Keigo Nitadori, Guillermo Marcus Martinez
, Andreas Kugel, Reinhard Männer, Ingo Berentzen, Ralf Klessen, Robi Banerjee:
Astrophysical Particle Simulations with Custom GPU Clusters. 1189-1195 - Jiying Xue, Xiaomeng Jiao, Yangdong Deng, Hao Qian, Dajie Zeng, Guoyu Li, Zhiping Yu:

Massively Parallel Finite Element Simulator for Full-Chip STI Stress Analysis. 1196-1201 - Taejung Park

, Sung-Ho Lee, Jong-Hyun Kim, Chang-Hun Kim:
CUDA-based Signed Distance Field Calculation for Adaptive Grids. 1202-1206 - Steven Gratton:

Graphics Card Computing for Cosmology: Cholesky Factorization. 1207-1212 - Yangdong Steve Deng:

GPU Accelerated VLSI Design Verification. 1213-1218 - Jian Zhu, Youquan Liu, Kai Bao, Yuanzhang Chang, Enhua Wu:

Realtime Simulation of Burning Solids on GPU with CUDA. 1219-1224
SMLA-2010: The 2010 International Workshop on Scalable Machine Learning and Applications
- Xiuqin Pan, Yongcun Cao, Yong Lu, Yue Zhao:

Tibetan Language Speech Recognition Model Based on Active Learning and Semi-Supervised Learning. 1225-1228 - Shaochun Wu, Tongyu Yuan, Yan Tang, Bofeng Zhang, Daming Wei:

Geomagnetic Precursor Z Component Diurnal Variation Phase Anomaly Recognition based on the Pattern Distance. 1229-1234 - Sébastien Bratières, Jurgen Van Gael, Andreas Vlachos

, Zoubin Ghahramani:
Scaling the iHMM: Parallelization versus Hadoop. 1235-1240 - Hua Ouyang, Alexander G. Gray:

Stochastic Mirror Descent Algorithm for L1-Regularized Risk Minimizations. 1241-1245
DSOC-2010: The 2010 International Workshop on Dependable Service-Oriented Computing
- Lin Xi, Qinglei Zhou, Linlin Xie:

An Approach on Service Component Selection and Analysis of the Resulting System Reliability. 1246-1250 - Zhiyuan Wang, Xuejun Yang, Yun Zhou:

MMPI: A Scalable Fault Tolerance Mechanism for MPI Large Scale Parallel Computing. 1251-1256 - Saeid Taherkhani, Enver Ever

, Orhan Gemikonakli
:
Implementation of Non-Pipelined and Pipelined Data Encryption Standard (DES) Using Xilinx Virtex-6 FPGA Technology. 1257-1262 - Anthony Sargeant, David Webster, Karim Djemame

, Jie Xu:
Testing the Effectiveness of Dynamic Binding in Web Services. 1263-1268 - Duncan Russell, Lu Liu

, Zongyang Luo, Colin C. Venters
, David Webster, Jie Xu:
Realizing Network Enabled Capability Through Dependable Dynamic Systems Integration. 1269-1274 - Ji Li, Lu Liu

, Jie Xu:
A P2P e-Commerce Reputation Model Based on Fuzzy Logic. 1275-1279
CSEA-2010: International Symposium on Frontier of Computer Science, Engineering and Applications
New Web Technology and Applications
- Syed Raza Ali Rizvi, Shawn Xiong Wang:

DT-Tree: A Semantic Representation of Scientific Papers. 1280-1284 - Masaki Kuwabara, Masahide Sugiyama:

Noise Robustness Evaluation of Audio Features in Segment Search. 1285-1291 - Feiyu Lin, Jonathan Butters, Kurt Sandkuhl

, Fabio Ciravegna
:
Context-based Ontology Matching: Concept and Application Cases. 1292-1298 - Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu:

CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. 1299-1305 - Cheng Hao Jin, Gouchol Pok, Hi-Seok Kim, Eun Jong Cha, Keun Ho Ryu:

Classification of Closed Frequent Patterns Improved by Feature Space Transformation. 1306-1311
High Performance Computing and Architecture
- Guang Hu, ZhiLei Chai, Wenke Zhao, Shi-liang Tu:

Towards Garbage Collection Mechanism for RTSJ-Oriented Embedded Java Processor. 1312-1316 - Yong Dong, Juan Chen, Tao Tang:

Power Measurements and Analyses of Massive Object Storage System. 1317-1322 - Myungho Lee, Jin-hong Jeon, Joonsuk Kim, Joonhyun Song:

Scalable and Parallel Implementation of a Financial Application on a GPU: With Focus on Out-of-Core Case. 1323-1327 - Xuan Zhang, Nattapong Wuwong, Hao Li, Xuejie Zhang:

Information Security Risk Management Framework for the Cloud Computing Environments. 1328-1334 - Jiehan Zhou

, Ekaterina Gilman
, Mika Ylianttila
, Jukka Riekki
:
Pervasive Service Computing: Visions and Challenges. 1335-1339 - Ekaterina Gilman

, Iván Sánchez Milara
, Timo Saloranta, Jukka Riekki
:
Reasoning for Smart Space Application: Comparing Three Reasoning Engines CLIPS, Jess and Win-prolog. 1340-1345 - Sanghyun Ryu, Kang-hak Han, Hyun-Su Jang, Young Ik Eom:

User Adaptive Recommendation Model by Using User Clustering based on Decision Tree. 1346-1351
Software Engineering
- Jin Kawasaki, Shuichi Oikawa:

Co-Locating Virtual Machine Logging and Replay for Recording System Failures. 1352-1357 - Tao Zhang

, Byungjeong Lee:
Complementary Classification Techniques based Personalized Software Requirements Retrieval with Semantic Ontology and User Feedback. 1358-1363 - Lin Li, Li Zhang, Linqing Lu, Zhiqiang Fan:

Assessing Object-Oriented Software Systems Based on Change Impact Simulation. 1364-1369 - Kirill Makankov, Seon Wook Kim:

Implementation of x86 Binary-to-C Translator by Using GNU Tools. 1370-1375 - Mohammad F. J. Klaib, Sangeetha Muthuraman, Noraziah Ahmad

, Roslina Mohd Sidek:
A Tree Based Strategy for Test Data Generation and Cost Calculation for Uniform and Non-Uniform Parametric Values. 1376-1383
Computer Graphics/Image Processing
- Dong Wang, Jinchang Ren

, Jianmin Jiang, Stanley S. Ipson:
Applying Feature Selection for Effective Classification of Microcalcification Clusters in Mammograms. 1384-1387 - Xia Hu, Caiming Zhang, Wei Wang, Xifeng Gao:

Disparity Adjustment for Local Stereo Matching. 1388-1392 - Liqiang He, Yanyan Zhang:

A Rotate-based Best Neighborhood Matching Algorithm for High Definition Image Error Concealment. 1393-1396 - Qingqi Hong, Qingde Li, Jie Tian:

Local Hybrid Level-set Method for MRA Image Segmentation. 1397-1402 - Dong Yin, Rong Zhang:

Research on the Recognition Method of Bridge Target in SAR Image. 1403-1406 - Muhammad Imran Razzak

, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf:
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. 1407-1412 - Manoj Kumar, Young-Chul Kim, Gueesang Lee:

Text Detection using Multilayer Separation in Real Scene Images. 1413-1417
Artificial Intelligence
- Omran Salem

, Alamgir Hossain, Mumtaz Kamala:
Awareness Program and AI based Tool to Reduce Risk of Phishing Attacks. 1418-1423 - Jong Bum Lee, Minghao Piao, Keun Ho Ryu:

Incremental Emerging Patterns Mining for Identifying Safe and Non-safe Power Load Lines. 1424-1429 - Yongjun Fei, Bofeng Zhang, Wenhao Zhu, Jianbo Hu:

Methods of Pattern Extraction and Interval Prediction for Equipment Maintenance. 1430-1435 - Salah Abdulrasool, Rakesh Mishra

, Haifa Khalaf:
Teachers' and Students' Attitudes Towards Traditional and Computer Assisted Blended Teaching and Learning Processes in Mechanical Engineering Subjects Area. 1436-1441 - Ho-Sun Shon, Keun Ho Ryu, Kyung-Sook Yang:

Feature Selection of Gene Expression Data Using Regression Model. 1442-1447
ITA-2010: International Symposium on Advanced Topics on Information Technologies and Applications
Networking and Telecommunications (1)
- Doug Won Choi, Jin Gyu Shin:

Conceptual Multi-Level Hierarchy for Evaluation and Classification. 1448-1455 - Hmood Al-Dossari, Jianhua Shao, Alun D. Preece:

QoS Assessment over Multiple Attributes. 1456-1461 - Muneer Masadeh, Sanabel Fathi Nimer, Ahmed Yassin Al-Dubai

:
The Effects of Network Density of a New Counter-based Broadcasting Scheme in Mobile Ad Hoc Networks. 1462-1467 - Kyung Tae Kim, Han Ku Yoo, Byung Ha Son, Hee Yong Youn:

An Energy Efficient Clustering Scheme for Self-Organizing Distributed Wireless Sensor Networks. 1468-1473 - Hiroshi Mizugai, Incheon Paik, Wuhui Chen:

Scalable Orchestration Strategy for Automatic Service Composition. 1474-1479 - Masaru Tasaki, Motoaki Sakai, Mai Watanabe, Hui Wang, Daming Wei:

Evaluation of Drowsiness During Driving using Electrocardiogram - A Driving Simulation Study. 1480-1485 - Zhuo Zhang, Hongji Yang, Dongdai Zhou, Shaochun Zhong:

A SOA Based Approach to User-Oriented System Migration. 1486-1491 - Fangfang Liu

, Jie Yu, Bofeng Zhang, Chengling Li:
Towards Exhibiting Ability of Service Communication Models. 1492-1497
Networking and Telecommunications (2)
- Claudia Di Napoli

, Maurizio Giordano
:
Experimenting Scheduling Policies with Continuation-based Services. 1498-1503 - Chen Wang, Jean-Louis Pazat:

Using Chemical Metaphor to Express Workflow and Service Orchestration. 1504-1511 - Zheng Cao, Pengpeng Yin, Zhengjun Lu:

A Key Management Scheme for Multicast Based on Layer 2 Control. 1512-1518 - Yue Liu, Zhenjiang Liao, Yafeng Yin, Zaixia Teng, Junjun Gao, Bofeng Zhang:

Selective and Heterogeneous SVM Ensemble for Demand Forecasting. 1519-1524 - Burjiz K. Soorty, Samad S. Kolahi, Navneet Chand, Zhang Qu:

Performance Comparison of Category 5e vs. Category 6 Cabling Systems for both IPv4 and IPv6 in Gigabit Ethernet. 1525-1529 - Dave Colling, Andrew Stephen McGough, Tiejun Ma, Vesso Novov, Jazz Mack Smith, David Wallom

, Xin Xiong:
Adding Standards Based Job Submission to a Commodity Grid Broker. 1530-1535 - Dohyun Kim, Younghee Lee:

Semantic Service Discovery Exploiting Efficient Concept Match over Large Amount of Heterogeneous Ontologies. 1536-1541 - Raees Khan, Farrukh Aslam Khan:

SRCP: Sensor Reliability and Congestion Control Protocol. 1542-1548 - Xuefen Chi, Wei Zhang, Kun Zhao, Lin Guan

, Jiao Feng:
A Novel Adaptive FEC Scheme Integrating Multi-Layer Functions. 1549-1553
Information Visualization
- Hu-Yu Huang, Shih-Hsu Chang:

A Lossless Data Hiding based on Discrete Haar Wavelet Transform. 1554-1559 - Jie Yan, Ruth Agada:

Methods of Improving Communications by a Life-Like Animated Pedagogical Agent. 1560-1565 - Shuang Zhang, Huan Liu, Shixiong Zhang:

Researching on Simulation of Traffic Accidents Scene by OpenGL. 1566-1570 - Zhuhua Liao, Jing Yang, Chuan Fu, Guoqing Zhang:

A Tracking Model for Enhancing Social Video Integration and Sharing. 1571-1576 - Fahad Ahmed, Asif Masood, Firdous Kausar

:
An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. 1577-1581 - Md Zahidul Islam, Chi-Min Oh, Chil-Woo Lee:

Modifed Re-sampling Based Particle Filter for Visual Tracking with MPH. 1582-1587 - Huy Le Phat, Toan Nguyen Dinh, Soo-Hyung Kim, Gueesang Lee:

Text Detection in Binarized Text Images of Korean Signboard by Stroke Width Feature. 1588-1592 - Christos Mettouris, George A. Papadopoulos

:
Exploiting Context in Location-Based Information Systems. 1593-1598 - Zhiyong Zhang, Joan Lu

, Yau Jim Yip:
Automatic Segmentation for Breast Skin-line. 1599-1604
Information Security
- Dexin Yang, Bo Yang:

A Novel Two-Server Password Authentication Scheme with Provable Security. 1605-1609 - Nabih T. Abdelmajid, M. Alamgir Hossain, S. Shepherd, Khaled W. Mahmoud

:
Improved Kerberos Security Protocol Evaluation using Modified BAN Logic. 1610-1615 - Fangyong Hou, Hongjun He, Nong Xiao, Fang Liu, Guangjun Zhong:

Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection. 1616-1621 - Jin-Liang Xing, Xiaohong Li, Yan Cao, Zhiyong Feng, Ran Liu:

Information Flow Analysis of Web Service Net. 1622-1626 - Min-Hua Shao, Ji-Bin Lin, Yi-Ping Lee:

Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET. 1627-1632
Database Systems and Information Management
- Jae-Woo Chang, Myoung-Seon Song, Jung-Ho Um:

TMN-tree: New Trajectory Index Structure for Moving Objects in Spatial Networks. 1633-1638 - Dong Chan An, Seog Park:

Group-Based Prime Number Labeling Scheme for XML Data. 1639-1644 - Wenhao Zhu, Shunlai Bai, Bofeng Zhang, Weimin Xu, Daming Wei:

An Information Extraction Method for Digitized Textbooks of Traditional Chinese Medicine. 1645-1648 - Minghao Piao, Meijing Li, Keun Ho Ryu:

Using Significant Classification Rules to Analyze Korean Customers' Power Consumption Behavior: Incremental Tree Induction using Cascading-and-Sharing Method. 1649-1653 - Doug Won Choi, Young Jun Hyun:

Transitive Association Rule Discovery by Considering Strategic Importance. 1654-1659 - Ruqayya Abdulrahman

, Sophia Alim
, Daniel Neagu
, Mick J. Ridley:
Algorithms for Data Retrieval from Online Social Network Graphs. 1660-1666 - Datchakorn Tancharoen, Kiyoharu Aizawa:

Wearable Video Retrieval and Navigation System using GPS Data. 1667-1672 - Susu Jiang, Bofeng Zhang, Weimin Xu, Daming Wei:

Gait Symmetry Analysis Based on Affinity Propagation Clustering. 1673-1678
ICESS-2010: The 7th IEEE International Conference on Embedded Software and Systems
Systems, Models and Algorithms (1)
- Jie Tao, Dominic Hillenbrand, Lizhe Wang

, Holger Marten:
Studying Filter Cache Bypassing on Embedded Systems. 1679-1686 - Xin Jin, Sanghyuk Jung, Yong Ho Song:

SEPL: Smart Evicted Page List Buffer for NAND Flash Storage System. 1687-1694 - Jun Zhang, Kuizhi Mei, Jizhong Zhao:

CSDA: An Adaptive Data Storage Strategy for Predictive Branch Path on Multi-Core Architecture. 1695-1702 - Xiaoling Wu, Bang Won Lee, Chulyong Joung, Seeun Jang:

Touchware: A Software based Implementation for High Resolution Multi-touch Applications. 1703-1710 - Qianming Yang, Nan Wu, Mei Wen, Yi He, Huayou Su, Chunyuan Zhang:

SAT: A Stream Architecture Template for Embedded Applications. 1711-1718 - Patricia Derler

, Stefan Resmerita
:
Flexible Static Scheduling of Software with Logical Execution Time Constraints. 1719-1726 - Nikolaos Alachiotis

, Simon A. Berger, Alexandros Stamatakis:
Efficient PC-FPGA Communication over Gigabit Ethernet. 1727-1734 - Wei Sun, Naixue Xiong, Laurence Tianruo Yang, Chunming Rong

:
Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors. 1735-1742
Systems, Models and Algorithms (2)
- Sufyan Samara

, Gunnar Schomaker:
Real-time Adaptation and Load Balancing Aware OS Services for Distributed Reconfigurable System on Chip. 1743-1750 - Sangchul Han, Moonju Park, Minkyu Park:

A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time Analysis. 1751-1757 - Shau-Yin Tseng, Kuo-Hung Lin, Wen-Shan Wang, Chung-Ta King, Shih-Hsueh Chang:

Performance and Power Consumption Analysis of DVFS-Enabled H.264 Decoder on Heterogeneous Multi-Core Platform. 1758-1763 - Seunggu Ji, Dongkun Shin:

Locality and Duplication-Aware Garbage Collection for Flash Memory-Based Virtual Memory Systems. 1764-1771 - Claude Évéquoz:

Guaranteeing Optional Task Completions on (m, k)-Firm Real-Time Systems. 1772-1779 - Shaobo Liu, Meikang Qiu, Wenzhong Gao, Xiao-jun Tang, Bin Guo:

Hybrid of Job Sequencing and DVFS for Peak Temperature Reduction with Nondeterministic Applications. 1780-1787 - Wei Hu, Binbin Wu, Bin Xie, Tianzhou Chen, Lianghua Miao:

A Bypass Optimization Method for Network on Chip. 1788-1795 - Ali Ahmadinia, Alireza Shahrabi

:
Adaptive Router Architecture for Optimising Quality of Service in Networks-on-Chip. 1796-1801
Systems, Models and Algorithms (3)
- Vivek Chaturvedi

, Huang Huang, Gang Quan
:
Leakage Aware Scheduling on Maximum Temperature Minimization for Periodic Hard Real-Time Systems. 1802-1809 - Linwei Niu, Gang Quan

:
Leakage-Aware Scheduling for Real-Time Systems with (m, k)-Constraints. 1810-1817 - Chunhao Wang, Lihan Ju, Di Wu, Lingxiang Xiang, Wei Hu, Tianzhou Chen:

Global Register Alias Table: Executing Sequential Program on Multi-Core. 1818-1824 - Ke Yu, Neil C. Audsley:

Combining Behavioural Real-time Software Modelling with the OSCI TLM-2.0 Communication Standard. 1825-1832 - Kerstin Bauer, Klaus Schneider

:
Predicting Events for the Simulation of Hybrid Systems. 1833-1840 - Florian Kluge, Sascha Uhrig, Jörg Mische, Benjamin Satzger, Theo Ungerer:

Dynamic Workload Prediction for Soft Real-Time Applications. 1841-1848 - Xiaoqun Yuan, Hao Yin, Xuening Liu, Changlai Du, Geyong Min:

Dynamic Resource Provision in Multi-Channel P2P Live Streaming Systems. 1849-1855 - Michael Short

, Imran Sheikh:
Timely Recovery from Task Failures in Non-preemptive, Deadline-driven Schedulers. 1856-1863 - Malcolm S. Mollison, Jeremy P. Erickson, James H. Anderson, Sanjoy K. Baruah, John A. Scoredos:

Mixed-Criticality Real-Time Scheduling for Multicore Systems. 1864-1871 - Junsung Kim, Karthik Lakshmanan, Ragunathan Rajkumar:

R-BATCH: Task Partitioning for Fault-tolerant Multiprocessor Real-Time Systems. 1872-1879
Design Methodology and Tools (1)
- Nicolas Ventroux, Alexandre Guerre, Tanguy Sassolas, L. Moutaoukil, Guillaume Blanc, Charly Bechara, Raphaël David:

SESAM: An MPSoC Simulation Environment for Dynamic Application Processing. 1880-1886 - Wolfgang Haberl, Markus Herrmannsdoerfer, Jan Birke, Uwe Baumgarten:

Model-Level Debugging of Embedded Real-Time Systems. 1887-1894 - Marco Lattuada

, Fabrizio Ferrandi
:
Combining Target-independent Analysis with Dynamic Profiling to Build the Performance Model of a DSP. 1895-1901 - Dogan Fennibay, Arda Yurdakul, Alper Sen:

Introducing Hardware-in-Loop Concept to the Hardware/Software Co-design of Real-time Embedded Systems. 1902-1909 - Georgiana Macariu:

A Model Checking Approach for Multi-core Time Partitions Design. 1910-1917
Design Methodology and Tools (2)
- Paul Lokuciejewski, Timon Kelter, Peter Marwedel:

Superblock-Based Source Code Optimizations for WCET Reduction. 1918-1925 - Sital Prasad Kedia, Anusree Bhattacharjee, Rajeshwar Kailash, Saurabh Dongre:

Coverage and Profiling for Real-Time Tiny Kernels. 1926-1931 - Haibo Zeng, Arkadeb Ghosal, Marco Di Natale

:
Timing Analysis and Optimization of FlexRay Dynamic Segment. 1932-1939 - Tripti Saxena, Gabor Karsai

:
Towards a Generic Design Space Exploration Framework. 1940-1947 - Joon-Young Paik, Eun-Sun Cho

, Tae-Sun Chung:
Reorganizing Data Blocks in Flash Memory by Program Translation. 1948-1953
Embedded Applications and Interdisciplinary Topics
- Jim Ras, Albert M. K. Cheng

:
Response Time Analysis of the Abort-and-Restart Model under Symmetric Multiprocessing. 1954-1961 - Rabindra Bista

, Hye-Kyeom Yoo, Jae-Woo Chang:
Achieving Scalable Privacy Preserving Data Aggregation for Wireless Sensor Networks. 1962-1969 - Riadh Ben Abdallah

, Tanguy Risset, Antoine Fraboulet, Jérôme Martin
:
Virtual Machine for Software Defined Radio: Evaluating the Software VM Approach. 1970-1977 - Kam L. Chan, Michael J. Pont:

Real-time Non-invasive Detection of Timing-constraint Violations in Time-triggered Embedded Systems. 1978-1986 - Marisol García-Valls, Iria Estévez-Ayres

, Pablo Basanta-Val
:
Dynamic Priority Assignment Scheme for Contract-Based Resource Management. 1987-1994 - Jianping Cai, Xuting Wan, Meimei Huo, Jianzhong Wu:

An Algorithm of Micromouse Maze Solving. 1995-2000
IWCSEI-2010: The Third International Workshop on Computer System Education and Innovation
Computer Science Courses Teaching Technology Reformation (1)
- ZhiXin Tie

, Rong Jin, Hong Zhuang, Zhaoqing Wang:
The Research on Teaching Method of Basics Course of Computer based on Cluster Analysis. 2001-2004 - Tao Wu, Ya-ping Chen, Feng Ning, Xi-Qian Gu:

Study on the Industry Oriented Education for Computing of Ireland and Its Application. 2005-2009 - Hong Zhuang, Li Liu:

Teaching Practice of Project-based VB Programming. 2010-2013 - Xiaoliang Xu, Weihua Hu:

Research on J2EE Teaching Based on Mainstream Open Source Frameworks. 2014-2017 - Guiping Wang, Rui Feng:

Research and Reformation of Online Practice Oriented Teaching in Programming Foundation Course. 2018-2024 - Nanli Zhu, Tang Yun-ting, Jianghua Xuan, Bo Guan, Man Zhao:

Construction of Role-Switch Model in College Information Technology Experiment Course. 2025-2028 - Nanli Zhu, Meng Cheng

, Jianbo Fan, Rina Shu:
Applying Role-Switch Model in College Information Technology Course. 2029-2032 - Kaiyu Dai, Yiming Zhao, Ronghua Chen:

Research and Practice on Constructing the Course of Programming Language. 2033-2038
Mobil and Smartphone Technologies
- José Barbosa Dias Jr., Marlus Dias Silva, Alexandre Cardoso

, Edgard Afonso Lamounier Jr.
:
A Software Architecture for Adapating Virtual Reality Content to Mobile Devices. 2039-2045 - Wen-Xiang Zhang, Xuan Zhang:

Design and Implementation of Smartphone's Efficient E-mail Client Software. 2046-2051 - Junwei Zou, Chu Zhang, Chongbo Dong, Chunxiao Fan, Zhigang Wen:

Mobile Payment based on RFID-SIM Card. 2052-2054 - Fan Jiang, Zhigang Feng, Lei Luo:

xFace: A Lightweight Web Application Engine on Multiple Mobile Platforms. 2055-2060 - Siyu Mi, Zhijie Qiu, Lei Luo:

Research on Mobile Web Applications End to End Technology. 2061-2065 - Houchen Li, Zhijie Qiu, Lei Luo:

Decompression Method for Massive Compressed Files in Mobile Rich Media Applications. 2066-2071 - Biao Pan, Kun Xiao, Lei Luo:

Component-based Mobile Web Application of Cross-platform. 2072-2077 - Ziqiong Wang, Yanhong Peng, Lei Luo:

Research on Mobile Web Application Phone Simulator. 2078-2083
Software Systems and Alogrithms
- Shu-Fang Zhao, Li-Chao Chen:

The Coal Mining Safety Equipment's Intelligent Monitoring and Management of Being based on the Web-environment. 2084-2088 - Zhigang Wen, Chunxiao Fan, Xiao-Ying Zhang, Yuexin Wu, Junwei Zou, Jie Liu:

A Learning Spectrum Hole Prediction Model for Cognitive Radio Systems. 2089-2093 - Chao Wang, Zhongchuan Fu, Hongsong Chen, Wei Ba, Bin Li, Lin Chen, Zexu Zhang, Yuying Wang, Gang Cui:

CFCSS without Aliasing for SPARC Architecture. 2094-2100
Computer Science Courses Teaching Technology Reformation (2)
- Zhaocheng Wang, Cheng Yang:

Research on Case Learning System for Engineering Subject - Software Engineering as an Example. 2101-2104 - Huang Xiao Tao, Wu Chi

, Li Guilan:
Industry/University Collaboration: An Effective Way to Conduct Engineering Education Towards Undergraduates. 2105-2108 - Zhigang Gao, Ganggang Xue, Guojun Dai, Xuehui Wei:

Applying Two New Methods to the Teaching of Computer Architecture. 2109-2113 - Qingsheng Li

, Jipeng Wang:
Technical Research of Streaming Media Video Course Development Platform. 2114-2119 - Baiqing Zhou, Xiuhui Kui, Youtian Qu:

Discussion on the Teaching Reform of Single-chip Computer Base on Mode CDIO at Vocational College. 2120-2123 - Haiwei Jin:

Study on Evaluation Method of Practical Teaching: A Practical Teaching Test Analysis. 2124-2128
Graph Algorithms and Mobile Technologies
- Hua Liu, Huilai Zou, Lili Zhong, Chaonan Wang, Youtian Qu:

Improvement of the Optimal Hamilton Circuit for Undirected Complete Graph. 2129-2133 - Fuwan Ren, Qifan Yang, Jiexin Zheng, Hui Yan:

Non-recursive Algorithm of Tower of Hanoi Problem. 2134-2137 - Huilai Zou, Lili Zong, Hua Liu, Chaonan Wang, Zening Qu, Youtian Qu:

Optimized Application and Practice of A* Algorithm in Game Map Path-Finding. 2138-2142 - Xuting Wan, Jianping Cai, Qifan Yang:

Remainder Sign Analysis in Fixed-point Division. 2143-2147 - Liankui Qiu, Panlong He, Lei Luo:

The Strategy of Advancing Mobile Web Application's Layout and Drawing. 2148-2152 - Xin Min, Jixian Zhang, Lei Luo:

Caching Strategy on Mobile Rich Media Engine. 2153-2156 - Yonghong Wu, Jianchao Luo, Lei Luo:

Porting Mobile Web Application Engine to the Android Platform. 2157-2161
Prior Training and Education Technologies
- Wei-Hua Hu, Jiang-tao Du, Qi-li Zhou, Dao-ping Hong, Xiao-kai Wu:

The Development of Online Innovative Education Program in Our University. 2162-2165 - Jiali Bian, Jian Kuang, Xiaojun Chen, Zhiwen Nie:

Research and Practice of Experimental Teaching System for OPhone Technology Courses. 2166-2169 - Jian Kuang, Zhiwen Nie, Jiali Bian, Lin Han:

Exploration on Cultivating OPhone Technology Talents in Universities. 2170-2173 - Meimei Huo, Jianzhong Wu, Jianping Cai, Bin Song:

Micromouse Competition Training Method Based on 3D Simulation Platform. 2174-2179 - Wei Hu, Tianzhou Chen, Qingsong Shi, Xueqing Lou:

Smartphone Software Development Course Design Based on Android. 2180-2184 - Shulong Li:

ISTS: An Integrated Simulation Training System for Education in Police College. 2185-2190 - Wei Hu, Tianzhou Chen, Jingwei Liu, Qingsong Shi:

Promoting Multi-Core Education via Special Training and Workshop Program. 2191-2195 - Liu Li, Haijun Mao, Licheng Xu:

Application of Concept Maps-based Anchored Instruction in Programming Course. 2196-2200
Computer Science Courses Teaching Technology Reformation (3)
- Qifan Yang, Jianping Cai:

Reform and Practice in the Course ???The Principle of Computer Organization???. 2201-2204 - Yong Zhang, Hui Yan:

Reform and Practice of Programming Teaching Based on Applied Ability Building. 2205-2208 - Liu Li, Tianzhou Chen, Qingsong Shi, Wei Hu:

Design of Teaching System for Computer Network Application Learning. 2209-2213 - Gaoyan Zhang, Haifeng Ke, Minghui Wu, Jun Liu:

Centralized Project-Based Teaching Approach in Database Application Development Training. 2214-2217 - Haifeng Ke, Gaoyan Zhang, Minghui Wu:

The Curriculum Reform of Database System Principle Based on Paperless Examination Platform. 2218-2221
Network Systems and Courses
- Si-You Xiao, Xuan Zhang:

Research on Key Technologies of Building Home Control Based on the Wireless Network. 2222-2227 - Xiaolin Wang, Xinxin Jin, Yingwei Luo, Zhenlin Wang:

An Innovative Course about Network Storage and System Virtualization Technologies in PKU. 2228-2232 - Jie Hao, Wenxiang Zhang, Mingqing Ling:

Research on PID Control Algorithm of BP Network based on Two Axis Digital Control Turntable. 2233-2238 - Haijun Mao, Li Liu:

The Research and Application of ???PBL Didactics??? in the Computer Network Technology Course. 2239-2243
IWVT-2010: The 2010 International Workshop on Virtualization Technology
- Akihiro Suzuki, Shuichi Oikawa:

Implementation of Virtual Machine Monitor for ARM Architecture. 2244-2249 - Binbin Wu, Xingsheng Tang, Hui Yuan, Qingsong Shi, Jiexiang Kang, Tianzhou Chen:

Virtual I/O Based on ScratchPad Memory for Embedded System. 2250-2254 - Wen-Chang Hsu, Shih-Hao Hung, Chia-Heng Tu:

A Virtual Timing Device for Program Performance Analysis. 2255-2260 - Wesley Emeneker, Amy W. Apon:

Cache Effects of Virtual Machine Placement on Multi-Core Processors. 2261-2266 - J. Lakshmi, S. K. Nandy:

I/O Virtualization Architecture for Security. 2267-2272 - Xiaolin Wang, Binbin Zhang, Haogang Chen, Xinxin Jin, Yingwei Luo, Xiaoming Li, Zhenlin Wang:

Detecting and Analyzing VM-exits. 2273-2277 - Yu Su, Xiaofei Liao, Hai Jin, Tim Bell:

Data Hiding in Virtual Machine Disk Images. 2278-2283 - Fan Xu, Li Shen, Zhiying Wang:

A Dynamic Binary Translation Framework Based on Page Fault Mechanism in Linux Kernel. 2284-2289
ESA-2010: International Symposium on Advanced Topics on Embedded Systems and Applications
Embedded Systems and Algorithms
- Majid Janidarmian, Vahhab Samadi Bokharaie, Ahmad Khademzadeh, Misagh Tavanpour:

Sorena: New on Chip Network Topology Featuring Efficient Mapping and Simple Deadlock Free Routing Algorithm. 2290-2299 - Like Yan, Yuan Wen, Man Cao, Tianzhou Chen, Degui Feng:

Augmenting NoC with Naming Service for Slot-based Reconfigurable Devices on Chip. 2300-2305 - Chi-Chia Sun

, Jürgen Götze, Hong-Yuan Jheng, Shanq-Jang Ruan:
Sparse Matrix-Vector Multiplication Based on Network-on-Chip in FPGA. 2306-2310 - Lin Zhou, Min Yao, Yongjun Li, Chengshuo Zhang, Liujie Yao:

A New Specification-based Test Data Generation Strategy for OSEK OS. 2311-2316 - Wenjing Lv, Lili Ye, Zhewen Wang, Zhengguo Yang, Yikui Zhang:

Project-Oriented Laboratory with Cross Platform Software Programming for Embedded System Education. 2317-2322 - Wonseok Choi, Sungsoo Kim, Yonghwan Kim, Yongsoo Park, Kwangseon Ahn:

PUF-based Encryption Processor for the RFID Systems. 2323-2328 - Xingjun Zhang, Yanfei Ding, Yiyuan Huang, Xiaoshe Dong

:
Design and Implementation of a Heterogeneous High-performance Computing Framework using Dynamic and Partial Reconfigurable FPGAs. 2329-2334 - Frank Dévai

, László Neumann:
A Rectangle-Intersection Algorithm with Limited Resource Requirements. 2335-2340 - Pablo Basanta-Val

, Marisol García-Valls
, Iria Estévez-Ayres
:
Towards a Cyber-Physical Architecture for Industrial Systems via Real-Time Java Technology. 2341-2346 - Amir Muhammad, Michael J. Pont:

A Time-Triggered Communication Protocol for CAN-based Networks with a Fault-Tolerant Star Topology. 2347-2354 - Shan Ding:

Scheduling Approach for Static Segment using Hybrid Genetic Algorithm in FlexRay Systems. 2355-2360 - Yue Ma, Jean-Pierre Talpin, Thierry Gautier:

Interpretation of AADL Behavior Annex into Synchronous Formalism Using SSA. 2361-2366
Design and Implementation of Embedded Systems
- Qing'an Li, Yanxiang He, Lei Zhou, Wei Wu, Yong Chen:

Integer Promotion Elimination on Abstract Syntax Tree. 2367-2372 - Zhe Chen, Gilles Motet:

Separating Functional and Dependability Requirements of Embedded Systems. 2373-2380 - Ulisses Brisolara Corrêa, Luís C. Lamb

, Luigi Carro
, Lisane B. de Brisolara
, Júlio C. B. de Mattos:
Towards Estimating Physical Properties of Embedded Systems using Software Quality Metrics. 2381-2386 - Muhammad Ali Siddiqi

, Nabeel Samad, Shahid Masud, Faheem Sheikh:
FPGA-based Implementation of Efficient Sample Rate Conversion for Software Defined Radios. 2387-2390 - Zhiqiang Que, Yongxin Zhu, Xuan Wang, Jibo Yu, Tian Huang

, Zhe Zheng, Li Yang, Feng Zhao, Yuzhuo Fu:
Implementing Medical CT Algorithms on Stand-alone FPGA Based Systems Using an Efficient Workflow with SysGen and Simulink. 2391-2396 - Xiaoyu Shi, Ting Sun, Yanming Shen, Keqiu Li, Wenyu Qu:

Tour-Guide: Providing Location-Based Tourist Information on Mobile Phones. 2397-2401
Application of Embedded Systems
- Xingang Liu, Kwanghoon Sohn, Laurence Tianruo Yang, Wei Zhu:

A Pervasive Temporal Error Concealment Algorithm for H.264/AVC Decoder. 2402-2406 - Xiaohong Zhang, Yixian Yang, Lixiang Li, Haipeng Peng:

An Extensible Hash Function Construction Based on Embedded Chaos Maps. 2407-2414 - Iban Lopetegui, Rolando A. Carrasco, Said Boussakta, O. Azpitarte:

Embedded Implementation of a SIP Server Gateway with Forward Error Correction to a Mobile Network. 2415-2420 - Kolin Paul, Tapas Kumar Kundu:

Android on Mobile Devices: An Energy Perspective. 2421-2426 - Haijun Zhao, Yikui Zhang:

The Embedded Application of Wireless Short-distance Communication Technology in Vehicle Diagnosis Process. 2427-2432 - Ralf Mitsching, Carsten Weise, Thomas Gatterdam, Stefan Kowalewski:

Low Effort Evaluation of Real-Time and Reliability Requirements for Embedded Systems. 2433-2440 - Sohail Jabbar

, Muhammad Zubair Aziz, Abid Ali Minhas
, Danial Hussain:
A Novel Power Tuning Anchors Localization Algorithm for Mobile Wireless Sensor Nodes. 2441-2446
ScalCom-2010: The 10th IEEE International Conference on Scalable Computing and Communications
Scalable Computing (1)
- Zhong Yuan Li, Sung-Keun Song, Sukjung Yong, Hee Yong Youn:

Private and Secure Service Discovery Using Incrementally Progressive Exposure and Random Match. 2447-2454 - Yu Sang, Keqiu Li, Yanming Shen:

EBDA: An Effective Bottom-up Discretization Algorithm for Continuous Attributes. 2455-2462 - Rabindra Bista

, Hye-Kyeom Yoo, Jae-Woo Chang:
A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks. 2463-2470 - Xingjun Zhang, Xiaohong Peng, Scott Fowler

, Dajun Wu:
Robust H.264/AVC Video Transmission using Data Partitioning and Unequal Loss Protection. 2471-2477 - Giuseppe Di Fatta

, David Pettinger:
Dynamic Load Balancing in Parallel KD-Tree k-Means. 2478-2485 - Sahar Mohamed Ghanem, Mohamed A. Ismail, Samia G. Omar:

System Design of a Super-Peer Network for Content-Based Image Retrieval. 2486-2493
Scalable Computing (2)
- Linchen Yu, Xiaofei Liao, Hai Jin, Pengcheng Qin:

A Hierachical VoIP System Based on Peer-to-Peer SIP: A Manageable Approach. 2494-2500 - Amril Nazir, Hao Liu, Søren-Aksel Sørensen:

A Rental-Based Approach in a Cluster or a Grid Environment. 2501-2508 - W. Hu, C. Wang, J. L. Ma, T. Z. Chen, D. Chen:

A Novel Approach for Finding Candidate Locations for Online FPGA Placement. 2509-2515 - Xingsheng Tang, Binbin Wu, Tianzhou Chen, Wei Hu, Jiexiang Kang, Zhenwei Zheng:

Network Main Memory Architecture for NoC-Based Chips. 2516-2523 - Tiejun Ma, Xin Xiong, David Wallom

:
A Framework for Sharing Heterogeneous Grid Resources in a Campus Environment. 2524-2531 - Malik Shahzad Kaleem Awan, Stephen A. Jarvis

:
Understanding Resource Provisioning for ClimatePrediction.net. 2532-2539 - Gil Heo, Eunhoe Kim, Jaeyoung Choi:

An Extended SNMP-based Management of Digital Convergence Devices. 2540-2547 - Basit Qureshi

, Geyong Min, Demetres D. Kouvatsos:
Collusion Detection and Prevention with FIRE+ Trust and Reputation Model. 2548-2555
Network Technologies and Applications (1)
- Xing Zhang, Lei Fu, Xin Wu, Wenbo Wang:

On the Study of Radio Resource Allocation of Heterogeneous Services with Soft QoS Traffics in OFDMA-based Wireless Networks. 2556-2561 - Jing Xiao, Xiaodong Ji, Xing Zhang, Shuping Chen, Wenbo Wang:

Queue Analysis of Finite Buffer for Self-Similar Traffic in Three-node Cooperative Relay Wireless Networks. 2562-2569 - Xinyu Chen, Li Xu, Jie Li

:
Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop Network. 2570-2575 - Xiangzhan Yu, Gang Wu, Dailiang Jin, Wei Li:

Research on Performance Estimation Model of Distributed Network Simulation Based on PDNS Conservative Synchronization Mechanism in Complex Environment. 2576-2580 - Mirghiasaldin Seyedebrahimi

, Xiao-Hong Peng:
Investigation of PHY, MAC and APP Layers for Adaptive and Cross-Layer Optimization in IEEE802.11 WLAN. 2581-2588 - Sun Sik Park, Myung Jin Hwang, Sung Soo Moon, Hee Yong Youn:

An Efficient VoD Scheme Providing Service Continuity for Mobile IPTV in Heterogeneous Networks. 2589-2595
Network Technologies and Applications (2)
- Hyuntae Cho, Hyunsung Jang, Yunju Baek:

Multi-Phase Correlator-based Realistic Clock Synchronization for Wireless Networks on IEEE 802.15.4. 2596-2603 - Hyuntae Cho, Youngwoo Jin, Jusik Heo, Yunju Baek:

Implementation of a PTP Bridge to Extend IEEE 1588 to Zigbee Networks. 2604-2611 - José Mendes, Paulo Salvador

, António Nogueira
:
P2P-TV Service and User Characterization. 2612-2620 - Farshad Safaei Semnani, A. Mortazavi:

A Novel Routing Algorithm for Achieving Static Fault-Tolerance in 2-D Meshes. 2621-2627 - Jianan Hao, Suiping Zhou:

SAFE: A Secure Area of Interests Filter for P2P-based MMOGs. 2628-2634 - Menghui Yang, Hua Liu, Tonghong Li:

Implementation and Performance for Lawful Intercept of VoIP Calls based on SIP Session Border Controller. 2635-2642
Network Technologies and Applications (3)
- Guangcheng Qin, Panlong Yang, Qiang Chen, Hao Yin, Kai Lin:

Prediction Model for Tiered Accuracy Requirements in Large-scale Object Tracking Sensor Networks. 2643-2648 - Ilias G. Nikolaros, Charilaos C. Zarakovitis

, Dionysios Skordoulis
, Marios G. Hadjinicolaou, Qiang Ni
:
Cross-layer Design for Multiuser OFDMA Systems with Cooperative Game and MMPP Queuing Considerations. 2649-2654 - Zhi Yan, Xing Zhang, Wenbo Wang:

Performance Analysis of Secondary Users in Dynamic Spectrum Access under Interference Temperature Constraints. 2655-2661 - Hadi Noureddine, Qiang Ni

, Geyong Min, Hamed S. Al-Raweshidy
:
A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks. 2662-2667 - Ghadah Aldabbagh, Miguel Rio, Izzat Darwazeh:

Fair Early Drop: An Active Queue Management Scheme for the Control of Unresponsive Flows. 2668-2675 - Joan Lu

, Zhaozong Meng, Gehao Lu, John B. Stav:
A New Approach in Improving Operational Efficiency of Wireless Response System. 2676-2683 - M. Bala Krishna, M. N. Doja:

Performance of Structure Based Multicast Routing Protocols in Wireless Ad hoc Networks. 2684-2691
Parallel and Distributed Systems (1)
- Jiayin Li, Meikang Qiu, Jianwei Niu

, Meiqin Liu, Bin Wang, Jingtong Hu
:
Impacts of Inaccurate Information on Resource Allocation for Multi-Core Embedded Systems. 2692-2697 - Feng Shen, Hai Jiang, Zhiqian Xu:

On Post-Generation Data Operations in Secure Distributed Storage Systems with Internal Padding. 2698-2705 - Sung Chune Choi, Minseuk Choi, Chunkyeong Lee, Hee Yong Youn:

Distributed Lock Manager for Distributed File System in Shared-Disk Environment. 2706-2713 - Zhu Wang, Chonglei Mei, Hai Jiang, Gregory A. Wilkin:

An Asymmetric Data Conversion Scheme based on Binary Tags. 2714-2721 - Dan Ji, Jianlin Qiu, Xiang Gu, Li Chen, Peng He:

A Synthesized Data Mining Algorithm Based on Clustering and Decision Tree. 2722-2728
Parallel and Distributed Systems (2)
- Ryo Aoki, Shuichi Oikawa, Ryoji Tsuchiyama, Takashi Nakamura:

Hybrid OpenCL: Connecting Different OpenCL Implementations over Network. 2729-2735 - Quan Chen, Daqiang Zhang, Minyi Guo, Qianni Deng, Song Guo

:
SAMR: A Self-adaptive MapReduce Scheduling Algorithm in Heterogeneous Environment. 2736-2743 - Duong Nguyen Binh Ta, Thang Nguyen, Suiping Zhou, Xueyan Tang, Wentong Cai

, Rassul Ayani:
A Framework for Performance Evaluation of Large-scale Interactive Distributed Virtual Environments. 2744-2751 - Amril Nazir, Hao Liu, Søren-Aksel Sørensen:

Service Level Agreements in a Rental-based System. 2752-2759 - Wei Hu, Jianliang Ma, Binbin Wu, Lihan Ju, Tianzhou Chen:

Distributed On-Chip Operating System for Network on Chip. 2760-2767 - J. L. Ma, C. Wang, Y. Wen, T. Z. Chen, W. Hu, J. Chen:

Dynamic Reconfigurable Networks in NoC for I/O Supported Parallel Applications. 2768-2775 - Mohammad A. Alghamdi

, Adam P. Chester, Stephen A. Jarvis
:
Predictive and Dynamic Resource Allocation for Enterprise Applications. 2776-2783
HMWN-2010: The International Workshop on Heterogeneous Multimedia Wireless Networks
- Yang Li, Yuning Dong, Hui Zhang, Haitao Zhao, Haixian Shi, Xin-xing Zhao

:
Spectrum Usage Prediction Based on High-order Markov Model for Cognitive Radio Networks. 2784-2788 - Muhammad Khurram Kiyani, Muhammad Usman Ahmed, Asim Loan:

Synchronization in Wireless Local Area Networks for Practical MIMO OFDM systems. 2789-2792 - Guchun Zhang, Xiaohong Peng, Xuanye Gu:

Impact of Scatterer Density on the Performances of Double-Scattering MIMO Channels. 2793-2799 - Huihui Xiang, Jiakang Liu, Jingming Kuang:

Minimum Node Degree and Connectivity of Two-dimensional MANETs under Random Waypoint Mobility Model. 2800-2805 - Hong-jie Huang, Xingming Zhang, Zhi-Wei Xu:

Semantic Video Adaptation using a Preprocessing Method for Mobile Environment. 2806-2810
IFSN-2010: The 2010 International Workshop on Frontiers of Secure Networks
- Dong Yan, Yulong Wang, Sen Su, Fangchun Yang:

An Efficient Collaborative Traceback Scheme Based on Packet Digests Logging. 2811-2815 - Ziming Song, Chunqing Wu, Zhu Tang:

An Efficient Group Signature Scheme in Ferry-Based Delay-Tolerant Networks. 2816-2821 - Bo Deng, Shuanghui Yi:

The Research of Component-Based Dependable Software Development. 2822-2824 - Yipin Sun, Xiangyu Su, Baokang Zhao, Jinshu Su

:
Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications. 2825-2830 - Weini Zeng, Yaping Lin, Lei Wang

:
Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor Networks. 2831-2836 - Baokang Zhao, Xiangyu Su, Yipin Sun, Jinshu Su

, Shanshan Li:
A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks. 2837-2842 - Jinjing Zhao, Gang Zhao, Yan Wen, Xiang Li:

Towards Detecting the Interaction Vulnerabilities in Large Distributed System. 2843-2848 - Xuewei Feng, Dongxia Wang, Jiemei Zeng, Guoqing Ma, Jin Li:

Analyzing and Correlating Security Events Using State Machine. 2849-2854
SEACUBE-2010: The Second International Workshop on Sensing and Acting in Ubiquitous Environments
- Askari Parichehreh, Bahman Javadi, Mehdi Sarikhani, Fereshte Momeni:

Reliable Hybrid Service Discovery Protocol in Mobile Ad-Hoc Grid. 2855-2860 - Abid Ali Minhas

, Sohail Jabbar
, Raja Adeel Akhtar, Waiser Mehmood:
Query-based Energy-aware Protocol for Real-time Routing in Wireless Sensor Network. 2861-2866 - Sania Bhatti

, Jie Xu, Mohsin Memon:
Model Checking of a Target Tracking Protocol for Wireless Sensor Networks. 2867-2872 - Yong-Woon Moon, Hae-Sun Jung, Chang-Sung Jeong:

Context-awareness in Battlefield using Ubiquitous Computing: Network Centric Warfare. 2873-2877 - Henry Bruce, Giuseppe Raffa, Louis LeGrand, Jonathan Huang, Bernie Keany, Rick Edgecombe:

An Extensible Sensor based Inferencing Framework for Context Aware Applications. 2878-2883 - Ralf Behnke, Jakob Salzmann, Stephan Simanowski, Dirk Timmermann

:
Efficient Localized Detection of Erroneous Nodes (ELDEN). 2884-2890 - Jakob Salzmann, Ralf Behnke, Dirk Timmermann

:
Tessellating Cell Shapes for Geographical Clustering. 2891-2896
ATSC-2010: The 2nd International Workshop on Advanced Topics on Scalable Computing
- Like Yan, Binbin Wu, Yuan Wen, Shaobin Zhang, Tianzhou Chen:

A Reconfigurable Processor Architecture Combining Multi-core and Reconfigurable Processing Unit. 2897-2902 - Weiwei Lin, Wuyao Shen:

Tree-Based Task Scheduling Model and Dynamic Load-Balancing Algorithm for P2P Computing. 2903-2907 - Yonggang Che, Chuanfu Xu, Pingjing Lu:

Evaluating the Performance and Accuracy Impact of Trace Generation to the BigSim Emulator. 2908-2913 - Yan-heng Li, Jin Zhang, Ying Peng:

A Study on XML and Ontology-based Web Data Integration. 2914-2919 - Ting Sun, Xiaoyu Shi, Yanming Shen, Keqiu Li, Wenyu Qu:

iLife: A Novel Mobile Social Network Services on Mobile Phones. 2920-2924 - Yusen Li, Wentong Cai

:
Consistency Aware Dead Reckoning Threshold Tuning with Server Assistance in Client-Server-Based DVEs. 2925-2932 - Saad Bani-Mohammad, Ismail Ababneh, Mazen Hamdan:

Comparative Performance Evaluation of Non-Contiguous Allocation Algorithms in 2D Mesh-Connected Multicomputers. 2933-2939 - Jianlin Qiu, Xiang Gu, Fen Li, Dan Ji, Peng He:

Minimization Algorithm of Unate Logic Functions. 2940-2945 - Xiuxiu Bai, Xingjun Zhang, Guofu Feng, Jinghua Feng, Xiaoshe Dong

:
cCell: A S2S Compiler with Profiling Support for the Cell BE Architecture. 2946-2951 - Anil Kumar Karna, Hengming Zou:

Cross Comparison on C Compilers' Reliability Impact on UNIX Based Fedora OS. 2952-2957 - Leila Ismail

, Jamal H. Abou-Kassem:
Toward an Automatic Load Balanced Distribution Model in Conjugate Gradient Method for One-Dimensional One-Phase Oil Reservoir Simulation. 2958-2963
FSC-2010: The 2nd International Symposium on Frontier of Scalable Communications
- Saad Liaquat Kiani, Michael Knappmeyer, Nigel Baker, Boris Moltchanov:

A Federated Broker Architecture for Large Scale Context Dissemination. 2964-2969 - Joan Lu

, Raoul Pascal Pein, Gabrielle Hansen, Kjetil L. Nielsen, John B. Stav:
User Centred Mobile Aided Learning System: Student Response System (SRS). 2970-2975 - Junchun Ma, Yongjun Wang, Jiyin Sun, Xiaofeng Hu:

A Scalable, Bidirectional-Based Search Strategy to Generate Attack Graphs. 2976-2981 - Wenwu Shen, Sen Su, Kai Shuang, Fangchun Yang, Jingshu Xia:

An Efficient Search Mechanism in Unstructured P2P Networks Based on Semantic Group. 2982-2986

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














