Search Results - "Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)"

Refine Results
  1. 1

    Efficient Complex Event Processing over RFID Data Stream by Jin, Xingyi, Lee, Xiaodong, Kong, Ning, Yan, Baoping

    “…RFID technology holds the promise of real-time identifying, locating and monitoring physical objects. To achieve these goals, RFID events need to be collected…”
    Get full text
    Conference Proceeding
  2. 2

    Building a Service-Oriented Ontology for Wireless Sensor Networks by Jeong-Hee Kim, Hoon Kwon, Do-Hyeun Kim, Ho-Young Kwak, Sang-Joon Lee

    “…Wireless sensor networks (WSNs) provide various environment data in the real-world, and also WSNss middleware is able to offer field data in real-time by user…”
    Get full text
    Conference Proceeding
  3. 3

    Optimizing Text Summarization Based on Fuzzy Logic by Kyoomarsi, F., Khosravi, H., Eslami, E., Dehkordy, P.K., Tajoddin, A.

    “…In this paper we first analyze some state of the art methods for text summarization. We discuss what the main disadvantages of these methods are and then…”
    Get full text
    Conference Proceeding
  4. 4

    A Novel Image Text Extraction Method Based on K-Means Clustering by Yan Song, Anan Liu, Lin Pang, Shouxun Lin, Yongdong Zhang, Sheng Tang

    “…Texts in web pages, images and videos contain important clues for information indexing and retrieval. Most existing text extraction methods depend on the…”
    Get full text
    Conference Proceeding
  5. 5

    Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity Measures by Ichise, R.

    “…This paper presents a new framework for the ontology mapping problem. We organized the ontology mapping problem into a standard machine learning framework,…”
    Get full text
    Conference Proceeding
  6. 6

    Attention Model Based SIFT Keypoints Filtration for Image Retrieval by Ke Gao, Shouxun Lin, Yongdong Zhang, Sheng Tang, Huamin Ren

    “…Effective feature extraction is a fundamental component of content-based image retrieval. Scale Invariant Feature Transform (SIFT) has been proven to be the…”
    Get full text
    Conference Proceeding
  7. 7

    Web Page Dependent Vision Based Segementation for Web Sites by Pyungkwan Ko, Sanggil Kang

    “…We introduce a web page segmentation system through mobile device. By providing segmented web pages service, the problem of the limitation of resource of…”
    Get full text
    Conference Proceeding
  8. 8

    Notice of Violation of IEEE Publication Principles: Observations on Liner Prediction Based Blind Source Extraction Algorithms by Gan, Min, Wang, Hongfa, Yue, Guoying, Xie, Nan, Zhang, Haibo

    “…As we see, blind source extraction (BSE) is advantageous over blind source separation (BSS) when obtaining some underlying source signals from high dimensional…”
    Get full text
    Conference Proceeding
  9. 9

    On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones by Ya-mei Xia, Jun-liang Chen, Xiang-wu Meng

    “…In this paper, an algorithm DACO (dynamic ant colony optimization algorithm based on multi- pheromones) is put forward to apply to the dynamics of web services…”
    Get full text
    Conference Proceeding
  10. 10

    On the Precision and Accuracy of Impact Analysis Techniques by Hattori, L., Guerrero, D., Figueiredo, J., Brunet, J., Damasio, J.

    “…Several techniques and algorithms for impact analysis of software systems have been recently published in literature. Most of them, however, are not practical…”
    Get full text
    Conference Proceeding
  11. 11

    Designing Fault Tolerant Web Services Using BPEL by Jim Lau, Lau Cheuk Lung, da Fraga, J., Veronese, G.S.

    “…The Web services technology provides an approach for developing distributed applications by using simple and well defined interfaces. Due to the flexibility of…”
    Get full text
    Conference Proceeding
  12. 12

    A Parallel Algorithm for Closed Cube Computation by Jinguo You, Jianqing Xi, Pingjian Zhang

    “…Closed cubing is a very efficient algorithm for data cube compression proposed recently in the literature. It losslessly condenses a group of cells into one…”
    Get full text
    Conference Proceeding
  13. 13

    Three Dimensional Face Recognition Using SVM Classifier by Mousavi, M.H., Faez, K., Asghari, A.

    “…In this paper, we presented a novel approach for automated 3D face recognition using range data. An object recognition system generally consists of two main…”
    Get full text
    Conference Proceeding
  14. 14

    Message from the Program Chairs

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  15. 15

    Message from the Conference Chairs

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  16. 16

    EESM for IEEE 802.16e: WiMaX by Mumtaz, S., Gamerio, A., Rodriguez, J.

    “…For Link Level interfacing packet switched simulation adopt the AVI (actual value interface) approach for mapping the computed SNR to the Block Error Rate…”
    Get full text
    Conference Proceeding
  17. 17

    P2P Distributed Intrusion Detections by Using Mobile Agents by Dayong Ye, Quan Bai, Minjie Zhang, Zhen Ye

    “…Traditional hierarchical intrusion detection systems have a central manager which attracts hackers to attack and might overload when there are too many client…”
    Get full text
    Conference Proceeding
  18. 18

    Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses by Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Chang-sun Shin, Hyun Yoe

    “…Recently, there are many researches to enable future ubiquitous environments based on wireless sensor network (WSN). Various sensing devices deployed in…”
    Get full text
    Conference Proceeding
  19. 19

    A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMM by Hoyeon Ryu, Dong-Kuk Ryu, Jongmoon Baik

    “…It is well known that most of mission critical systems like defense systems demand higher quality than general software systems. In order to assure the high…”
    Get full text
    Conference Proceeding
  20. 20

    Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition Techniques by Gacitua, R., Sawyer, P.

    “…Most approaches to ontology learning combine techniques from different areas (hybrid approaches) to increase the efficiency of the ontology learning process…”
    Get full text
    Conference Proceeding