Search Results - "Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)"
-
1
Efficient Complex Event Processing over RFID Data Stream
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…RFID technology holds the promise of real-time identifying, locating and monitoring physical objects. To achieve these goals, RFID events need to be collected…”
Get full text
Conference Proceeding -
2
Building a Service-Oriented Ontology for Wireless Sensor Networks
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Wireless sensor networks (WSNs) provide various environment data in the real-world, and also WSNss middleware is able to offer field data in real-time by user…”
Get full text
Conference Proceeding -
3
Optimizing Text Summarization Based on Fuzzy Logic
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…In this paper we first analyze some state of the art methods for text summarization. We discuss what the main disadvantages of these methods are and then…”
Get full text
Conference Proceeding -
4
A Novel Image Text Extraction Method Based on K-Means Clustering
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Texts in web pages, images and videos contain important clues for information indexing and retrieval. Most existing text extraction methods depend on the…”
Get full text
Conference Proceeding -
5
Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity Measures
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…This paper presents a new framework for the ontology mapping problem. We organized the ontology mapping problem into a standard machine learning framework,…”
Get full text
Conference Proceeding -
6
Attention Model Based SIFT Keypoints Filtration for Image Retrieval
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Effective feature extraction is a fundamental component of content-based image retrieval. Scale Invariant Feature Transform (SIFT) has been proven to be the…”
Get full text
Conference Proceeding -
7
Web Page Dependent Vision Based Segementation for Web Sites
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…We introduce a web page segmentation system through mobile device. By providing segmented web pages service, the problem of the limitation of resource of…”
Get full text
Conference Proceeding -
8
Notice of Violation of IEEE Publication Principles: Observations on Liner Prediction Based Blind Source Extraction Algorithms
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…As we see, blind source extraction (BSE) is advantageous over blind source separation (BSS) when obtaining some underlying source signals from high dimensional…”
Get full text
Conference Proceeding -
9
On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…In this paper, an algorithm DACO (dynamic ant colony optimization algorithm based on multi- pheromones) is put forward to apply to the dynamics of web services…”
Get full text
Conference Proceeding -
10
On the Precision and Accuracy of Impact Analysis Techniques
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Several techniques and algorithms for impact analysis of software systems have been recently published in literature. Most of them, however, are not practical…”
Get full text
Conference Proceeding -
11
Designing Fault Tolerant Web Services Using BPEL
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…The Web services technology provides an approach for developing distributed applications by using simple and well defined interfaces. Due to the flexibility of…”
Get full text
Conference Proceeding -
12
A Parallel Algorithm for Closed Cube Computation
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Closed cubing is a very efficient algorithm for data cube compression proposed recently in the literature. It losslessly condenses a group of cells into one…”
Get full text
Conference Proceeding -
13
Three Dimensional Face Recognition Using SVM Classifier
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…In this paper, we presented a novel approach for automated 3D face recognition using range data. An object recognition system generally consists of two main…”
Get full text
Conference Proceeding -
14
Message from the Program Chairs
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Presents the introductory welcome message from the conference proceedings…”
Get full text
Conference Proceeding -
15
Message from the Conference Chairs
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Presents the introductory welcome message from the conference proceedings…”
Get full text
Conference Proceeding -
16
EESM for IEEE 802.16e: WiMaX
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…For Link Level interfacing packet switched simulation adopt the AVI (actual value interface) approach for mapping the computed SNR to the Block Error Rate…”
Get full text
Conference Proceeding -
17
P2P Distributed Intrusion Detections by Using Mobile Agents
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Traditional hierarchical intrusion detection systems have a central manager which attracts hackers to attack and might overload when there are too many client…”
Get full text
Conference Proceeding -
18
Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Recently, there are many researches to enable future ubiquitous environments based on wireless sensor network (WSN). Various sensing devices deployed in…”
Get full text
Conference Proceeding -
19
A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMM
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…It is well known that most of mission critical systems like defense systems demand higher quality than general software systems. In order to assure the high…”
Get full text
Conference Proceeding -
20
Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition Techniques
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…Most approaches to ontology learning combine techniques from different areas (hybrid approaches) to increase the efficiency of the ontology learning process…”
Get full text
Conference Proceeding