Search Results - "2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing"

Refine Results
  1. 1

    Blog Hotness Evaluation Model Based on Text Opinion Analysis by Jianjiang Li, Xuechun Zhang, Yu Weng, Changjun Hu

    “…Aiming at the deficiencies of traditional blog hotness evaluation methods, the paper presents a blog hotness evaluation model based on text opinion analysis…”
    Get full text
    Conference Proceeding
  2. 2

    Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures by Itani, W., Kayssi, A., Chehab, A.

    “…In this paper we present PasS (privacy as a service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud…”
    Get full text
    Conference Proceeding
  3. 3

    Intrusion Detection in the Cloud by Roschke, S., Feng Cheng, Meinel, C.

    “…Intrusion detection systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important…”
    Get full text
    Conference Proceeding
  4. 4

    Bowling Alone and Trust Decline in Social Network Sites by Massa, P., Salvetti, M., Tomasoni, D.

    “…In this paper we analyze the community of a social network site, Advogato. The peculiar characteristics of Advogato is that users can explicitly express…”
    Get full text
    Conference Proceeding
  5. 5

    A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms by My Chau Tu, Dongil Shin, Dongkyoo Shin

    “…Medical data mining has been a popular data mining topic of late. Especially, diagnosing of the heart disease is one of the important issue and many…”
    Get full text
    Conference Proceeding
  6. 6

    An Analysis of Security in Social Networks by Weimin Luo, Jingbo Liu, Jing Liu, Chengyu Fan

    “…The threats to Internet have been also posed to the social networking sites. In social networks people tend to reduce the original alert and this makes it…”
    Get full text
    Conference Proceeding
  7. 7

    Towards Integrated Simulation of Cyber-Physical Systems: A Case Study on Intelligent Water Distribution by Jing Lin, Sedigh, S., Miller, A.

    “…In cyber-physical systems (CPSs), embedded computing systems and communication capability are used to streamline and fortify the operation of a physical…”
    Get full text
    Conference Proceeding
  8. 8

    Cyber-I: Vision of the Individual's Counterpart on Cyberspace by Jie Wen, Kai Ming, Furong Wang, Benxiong Huang, Jianhua Ma

    “…Cyber-Individual, with a short term 'Cyber-I', is a real individual's counterpart in cyberspace. It is closely related to human-centric computing ideology…”
    Get full text
    Conference Proceeding
  9. 9

    A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud by Ji Hu, Klein, A.

    “…Cloud computing is a new computing style which provides IT infrastructure and software as dynamic, scalable, and pay-per-use services. One of its…”
    Get full text
    Conference Proceeding
  10. 10

    People Reidentification in a Camera Network by de Oliveira, Icaro Oliveira, Pio, José Luiz de Souza

    “…This paper presents an approach to the object reidentification problem in a camera network system. The reidentification or reacquisition problem consists…”
    Get full text
    Conference Proceeding
  11. 11

    Pattern Matching with Independent Wildcard Gaps by Fan Min, Xindong Wu, Zhenyu Lu

    “…Pattern matching is fundamental in applications such as biological sequence analysis and text indexing. A wildcard gap matches any subsequence with a length…”
    Get full text
    Conference Proceeding
  12. 12

    Multi-metric Routing Decisions in VANET by Xiao-bo Wang, Yu-liang Yang, Jian-wei An

    “…Due to the rapidly changing topology of vehicular ad hoc network (VANET), it requires the routing protocol can be able to find out comparatively more stable…”
    Get full text
    Conference Proceeding
  13. 13

    A Mobile Health Monitoring System Using RFID Ring-Type Pulse Sensor by Yu-Chi Wu, Pei-Fan Chen, Zhi-Huang Hu, Chao-Hsu Chang, Gwo-Chuan Lee, Wen-Ching Yu

    “…The "long-distance home health care service" has become one of the key emerging businesses in Taiwan. In this paper, a mobile health management system is…”
    Get full text
    Conference Proceeding
  14. 14

    Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy by Jinlong Hou, Yongxin Zhu, Le Zhang, Yuzhuo Fu, Feng Zhao, Li Yang, Guoguang Rong

    “…Capsule endoscopes have been proven useful to diagnose lesions along digestive tracts in recent years. However,the capsule moving through the GI tract can't be…”
    Get full text
    Conference Proceeding
  15. 15

    Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement by Kai Hwang, Kulkareni, S., Yue Hu

    “…Internet clouds work as service factories built around Web-scale data centers. The elastic cloud resources and huge datasets processed are subject to security…”
    Get full text
    Conference Proceeding
  16. 16

    Notice of Violation of IEEE Publication Principles: A Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval) by Sudha, R.

    “…The main motive behind raga identification is that it can be used as good basis for music information retrieval of carnatic music songs or film songs based on…”
    Get full text
    Conference Proceeding
  17. 17

    Mobile Phones as 3-DOF Controllers: A Comparative Study by Katzakis, N., Hori, M.

    “…Conventional input devices such as the mouse and keyboard lack in intuitiveness when it comes to 3D manipulation tasks. In this paper, we explore the use of…”
    Get full text
    Conference Proceeding
  18. 18

    Measuring the Probability of Correctness of Contextual Information in Context Aware Systems by Brgulja, N., Kusber, R., David, K., Baumgarten, M.

    “…Context-awareness refers to computing systems that are able to sense and to comprehend their environment in order to adapt themselves in dependence to the…”
    Get full text
    Conference Proceeding
  19. 19

    Design of 3D Positioning Algorithm Based on RFID Receiver Array for In Vivo Micro-Robot by Le Zhang, Yongxin Zhu, Tingting Mo, Jinlong Hou, Hao Hu

    “…The clinical applications of capsule endoscopes have been increasing consistently since the invention of a passive capsule endoscope was made. Though the…”
    Get full text
    Conference Proceeding
  20. 20

    Web Service Selection Algorithm Based on Particle Swarm Optimization by Hong Xia, Yan Chen, Zengzhi Li, Haichang Gao, Yanping Chen

    “…A novel multi-objective optimization based particle swarm optimization algorithm is presented to solve the global optimization problem for based services…”
    Get full text
    Conference Proceeding