Search Results - "2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing"
-
1
Blog Hotness Evaluation Model Based on Text Opinion Analysis
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Aiming at the deficiencies of traditional blog hotness evaluation methods, the paper presents a blog hotness evaluation model based on text opinion analysis…”
Get full text
Conference Proceeding -
2
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…In this paper we present PasS (privacy as a service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud…”
Get full text
Conference Proceeding -
3
Intrusion Detection in the Cloud
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Intrusion detection systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important…”
Get full text
Conference Proceeding -
4
Bowling Alone and Trust Decline in Social Network Sites
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…In this paper we analyze the community of a social network site, Advogato. The peculiar characteristics of Advogato is that users can explicitly express…”
Get full text
Conference Proceeding -
5
A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Medical data mining has been a popular data mining topic of late. Especially, diagnosing of the heart disease is one of the important issue and many…”
Get full text
Conference Proceeding -
6
An Analysis of Security in Social Networks
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…The threats to Internet have been also posed to the social networking sites. In social networks people tend to reduce the original alert and this makes it…”
Get full text
Conference Proceeding -
7
Towards Integrated Simulation of Cyber-Physical Systems: A Case Study on Intelligent Water Distribution
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…In cyber-physical systems (CPSs), embedded computing systems and communication capability are used to streamline and fortify the operation of a physical…”
Get full text
Conference Proceeding -
8
Cyber-I: Vision of the Individual's Counterpart on Cyberspace
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Cyber-Individual, with a short term 'Cyber-I', is a real individual's counterpart in cyberspace. It is closely related to human-centric computing ideology…”
Get full text
Conference Proceeding -
9
A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Cloud computing is a new computing style which provides IT infrastructure and software as dynamic, scalable, and pay-per-use services. One of its…”
Get full text
Conference Proceeding -
10
People Reidentification in a Camera Network
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…This paper presents an approach to the object reidentification problem in a camera network system. The reidentification or reacquisition problem consists…”
Get full text
Conference Proceeding -
11
Pattern Matching with Independent Wildcard Gaps
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Pattern matching is fundamental in applications such as biological sequence analysis and text indexing. A wildcard gap matches any subsequence with a length…”
Get full text
Conference Proceeding -
12
Multi-metric Routing Decisions in VANET
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Due to the rapidly changing topology of vehicular ad hoc network (VANET), it requires the routing protocol can be able to find out comparatively more stable…”
Get full text
Conference Proceeding -
13
A Mobile Health Monitoring System Using RFID Ring-Type Pulse Sensor
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…The "long-distance home health care service" has become one of the key emerging businesses in Taiwan. In this paper, a mobile health management system is…”
Get full text
Conference Proceeding -
14
Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Capsule endoscopes have been proven useful to diagnose lesions along digestive tracts in recent years. However,the capsule moving through the GI tract can't be…”
Get full text
Conference Proceeding -
15
Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Internet clouds work as service factories built around Web-scale data centers. The elastic cloud resources and huge datasets processed are subject to security…”
Get full text
Conference Proceeding -
16
Notice of Violation of IEEE Publication Principles: A Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval)
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…The main motive behind raga identification is that it can be used as good basis for music information retrieval of carnatic music songs or film songs based on…”
Get full text
Conference Proceeding -
17
Mobile Phones as 3-DOF Controllers: A Comparative Study
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Conventional input devices such as the mouse and keyboard lack in intuitiveness when it comes to 3D manipulation tasks. In this paper, we explore the use of…”
Get full text
Conference Proceeding -
18
Measuring the Probability of Correctness of Contextual Information in Context Aware Systems
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…Context-awareness refers to computing systems that are able to sense and to comprehend their environment in order to adapt themselves in dependence to the…”
Get full text
Conference Proceeding -
19
Design of 3D Positioning Algorithm Based on RFID Receiver Array for In Vivo Micro-Robot
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…The clinical applications of capsule endoscopes have been increasing consistently since the invention of a passive capsule endoscope was made. Though the…”
Get full text
Conference Proceeding -
20
Web Service Selection Algorithm Based on Particle Swarm Optimization
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…A novel multi-objective optimization based particle swarm optimization algorithm is presented to solve the global optimization problem for based services…”
Get full text
Conference Proceeding