SNPD C

159 papers

YearTitle / Authors
2008A Class of SIR Epidemic Model with Saturation Incidence and Age of Infection.
Junyuan Yang, Fengqin Zhang, Xiaoyan Wang
2008A Comparative Evaluation of Tests Generated from Different UML Diagrams.
Supaporn Kansomkeat, Jeff Offutt, Aynur Abdurazik, Andrea Baldini
2008A Comparison of Iterative Repair Strategies for Earth Observing Satellites Imaging Scheduling.
Yu-Hua Guo, Ning Jing, Jun Li, Jun Wang
2008A Crossover Game Routing Algorithm for Wireless Multimedia Sensor Networks.
Zongwu Ke, Layuan Li, Nianshen Chen
2008A Feature Selection for Malicious Detection.
Yingxu Lai
2008A Formal Approach for Design of Agent Based Earthquake Management System (EMS).
Sarmad Sadik, M. Alade Rahman, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri
2008A Formal Model of Dynamic Resource Allocation in Grid Computing Environment.
Leila Ismail, Bruce Mills, Alain Hennebelle
2008A Genetic Algorithm-aided Hidden Markov Model Topology Estimation for Phoneme Recognition of Thai Continuous Speech.
Pattana Bhuriyakorn, Proadpran Punyabukkana, Atiwong Suchato
2008A Hierarchical Cache Scheme for the Large-scale Web Search Engine.
Sungchae Lim, Joonseon Ahn
2008A Hybrid Text Classification Model based on Rough Sets and Genetic Algorithms.
Xiaoyue Wang, Zhen Hua, Rujiang Bai
2008A Multisecret Sharing Threshold Scheme.
Yanyan Zhang
2008A New Auto-Focusing Method Based on WBDCT for Many Object Situations.
Ke Han, Xue-Mei Jiang, Quan Feng, Xiu-chang Zhu
2008A New Classifier to Deal with Incomplete Data.
Jun Wu, Yo Seung Kim, Chi-Hwa Song, Won Don Lee
2008A New Hybrid Farsi Text Summarization Technique Based on Term Co-Occurrence and Conceptual Property of the Text.
Azadeh Zamanifar, Behrouz Minaei-Bidgoli, Mohsen Sharifi
2008A New Kind of Super-Resolution Reconstruction Algorithm Based on the ICM and the Constrained Cubic Spline Interpolation.
Zhang Xiang-guang
2008A New Model of Mine Hoist Fault Diagnosis Based on the Rough Set Theory.
Xia Zhanguo, Wang Zhixiao, Wang Ke, Guan Hongjie
2008A New PAPR Reduction Technique for OFDM-WLAN in 802.11a Systems.
Chusit Pradabpet, K. Eupree, Sorawat Chivapreecha, Kobchai Dejhan
2008A New Vocoder based on AMR 7.4kbit/s Mode in Speaker Dependent Coding System.
Vu Thi Lan Huong, Byung-Jae Min, Dong-Chul Park, Dong-Min Woo
2008A Novel Method for All Solutions SAT Problem.
Xiuqin Wang, Guangsheng Ma, Hao Wang
2008A Novel Voice Morphing System Using Bi-GMM for High Quality Transformation.
Ning Xu, Xi Shao, Zhen Yang
2008A Photonic-based Random Number Generator for Cryptographic Application.
N. M. Thamrin, Gunawan Witjaksono, A. Nuruddin, M. S. Abdullah
2008A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS.
Dongmei Liu, Sihan Qing, Pengfei Li, Chunyang Yuan
2008A Preliminary Study on Portable Interceptor Mechanism to SOAP.
Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin
2008A Review of Software Risk Management for Selection of Best Tools and Techniques.
Md Forhad Rabbi, Khan Olid Bin Mannan
2008A Secure Scheme for Image Transformation.
Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das
2008A Sequential Pattern Mining Algorithm Based on Improved FP-tree.
Yi Sui, Fengjing Shao, Rencheng Sun, Jinlong Wang
2008A Sound and Complete Reified Temporal Logic.
Guoxing Zhao, Jixin Ma, Fuxing Shen, Miltos Petridis
2008A Study of Classification Algorithm for Data Mining Based on Hybrid Intelligent Systems.
Gang Wang, Chenghong Zhang, Lihua Huang
2008A Tabu Search and Ant Colony System Approach for the Capacitated Location-Routing Problem.
Lyamine Bouhafs, Amir Hajjam, Abderrafiaa Koukam
2008A Traffic Modeling Method for MMOG.
Xiangbin Shi, Du Ling, Liu Fang, Li Bao-long, Xian-min Chen
2008A Two-Dimensionality Model for Providing End-to-End QoS CAC.
Jiazheng Wang, Xiuhua Fu
2008A Two-Stage Clustering Algorithm for Multi-type Relational Data.
Ying Gao, Dayou Liu, Chengmin Sun, He Liu
2008A Visualization Portal for a Tsunami Warning System on a Distributed Environment.
Pemjit Aphimaeteethomrong, Veera Muangsin
2008A Z-Specification of Classification and Relationships between Usecases.
Durga Prasad Kakollu, B. D. Chaudhary
2008AINAN: Collaborative Application for Protein Visualization & Analyses.
Rauf Malick, Usama Khanzada, Athar Abbas, Waheed Iqbal, Kamran Azim
2008Accuracy of an Icing On-line Monitoring System.
Xinbo Huang, Qindong Sun
2008Adaptive Evolvement of Query Plan Based on Low Cost in Dynamic Grid Database.
Naijing Hu, Yuan Luo, Yingying Wang
2008Adaptive Self-Organizing Overlay Network for Car-to-Car Communications.
Mikio Aoyama, Hiroshi Takeichi
2008Aggregate Congestion Control for Peer-to-Peer File Sharing Applications.
Wei Li, Shanzhi Chen, Yaning Liu, Xin Li
2008An Adaptive Performance Management Method for Failure Detection.
Ke Liang, Xingshe Zhou, Kailong Zhang, Ruiqing Sheng
2008An Algorithm of Level of Detail Terrain.
Xiangbin Shi, Liu Fang, Du Ling, Bao Siqin, Xian-min Chen
2008An Alternative Model for ERP Maintenance Strategy.
Muhammad Rofi Imtihan, Mohd. Salihin Ngadiman, Habibollah Haron
2008An Application Generator Framelet.
Inggriani Liem, Yohanes Nugroho
2008An Approach to Modeling Software Safety.
M. Ben Swarup, P. Seetha Ramaiah
2008An Automated Decision System for Computer Adaptive Testing Using Genetic Algorithms.
Manop Phankokkruad, Kuntpong Woraratpanya
2008An Effective Method for Chinese Related Queries Recommendation.
Xiaoyan Shen, Bo Cheng, Junliang Chen, Xiangwu Meng
2008An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier.
Zonghua Liu, Guangqing Liu, Byungwook Lee
2008An Efficient Parallel Eye Detection Algorithm on Facial Color Images.
Jalal A. Nasiri, M. Amir Moulavi, Sepideh Nazemi Gelyan, Hossein Deldari, Hadi Sadoghi Yazdi, A. Eshghi Shargh
2008An Ensemble of Complexity Metrics for BPEL Web Processes.
Reza Meimandi Parizi, Abdul Azim Abdul Ghani
2008An Improved ID-based Restrictive Partially Blind Signature Scheme.
Shangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang
2008An Interest Management Mechanism Based on N-Tree.
Xiangbin Shi, Wang Yue, Li Qiang, Du Ling, Liu Fang
2008An MDA Approach to Byte Code Level Cross-Compilation.
Arno Puder, Sascha Häberling, Rainer Todtenhoefer
2008An Optimal Data Center Availability and Investment Trade-Offs.
Montri Wiboonrat
2008Analytical Modeling of Task Scheduling for Master-Slave Super Hypercube Architecture.
Maryam Amiripour, Hamid Abachi
2008Application of Multi-layer Feed-forward Neural Network in Fault Diagnosis Based on FBP Algorithm.
Bin Zhang, Jun Yan, Wei Zhang
2008Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked Programs.
Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe
2008Background Subtraction Enhancement using Segmentation.
Kyongil Yoon
2008Bring Precision and Access Control to Business Document Search.
Somchai Chatvichienchai, Katsumi Tanaka
2008Byte Code Transformations using XSL Stylesheets.
Arno Puder
2008COS: A Frame Work for Clustered off-line Search.
Sree Harsha Totakura, S. Venkata Nagendra, Rohit Indukuri, V. Vijayasherly
2008Classification of Bio-Optical Signals using Soft Computing Tools.
Subramanya G. Nayak, C. Puttamadappa, Akshata Kamath, B. Raja Sudeep, K. Kavitha
2008Classification of Facial Expression Using SVM for Emotion Care Service System.
Byungsung Lee, Junchul Chun, Peom Park
2008Clustering ICT Indicators of Bhutan using Two Level HSOM Algorithm.
Tshering, Somjit Arch-int
2008Collation Strategy Based on Heuristics Chart for Myanmar Language.
Yuzana, Khin Marlar Tun
2008Combined Fuzzy State Q-learning Algorithm to Predict Context Aware User Activity under Uncertainty in Assistive Environment.
Mohamed Ali Feki, Sang Wan Lee, Z. Zenn Bien, Mounir Mokhtari
2008Comparison of Direct and Incremental Genetic Algorithm for Optimization of Ordinal Fuzzy Controllers.
Khairulmizam Samsudin, Faisul Arif Ahmad, Syamsiah Mashohor, Norfadzilah Mohd Latif
2008Comparison of the Mechanisms of the Zigbee's Indoor Localization Algorithm.
Angela Song-Ie Noh, Woong Jae Lee, Jin Young Ye
2008Conceptual Modeling for Safety Critical Computer Systems.
P. Seetha Ramaiah, M. Ben Swarup, K. Raja Kumar
2008Consideration of User Preference on Internet-based Overlay Network.
Taewan Gu, Jae-Bong Yoo, Chan-Young Park
2008Customer Value-based HW/SW Partitioning Decision in Embedded Systems.
Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, Hoh Peter In
2008DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication.
M. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh
2008Decision Tree-Based Model for Automatic Assignment of IT Service Desk Outsourcing in Banking Business.
Padej Phomasakha Na Sakolnakorn, Phayung Meesad
2008Design of MLP using Evolutionary Strategy with Variable Length Chromosomes.
Abbas Sarraf Shirazi, Tahereh Seyedena
2008Design of a Network Coverage Analyzer for Roadside-to-Vehicle Telematics Networks.
Junghoon Lee
2008Detecting Feature Interactions in Home Appliance Networks.
Pattara Leelaprute, Takafumi Matsuo, Tatsuhiro Tsuchiya, Tohru Kikuno
2008Detecting Semantic Mapping of Ontologies with Inference of Description Logic.
Wenhui Ma, Guangping Xu, Gang Wang, Jing Liu
2008Dynamic Data Feed to Bayesian Network Model and SMILE Web Application.
Nipat Jongsawat, Pittaya Poompuang, Wichian Premchaiswadi
2008E Commerce - Forward and Reverse Auction - A Managerial Tool to Succeed over Business Competitiveness.
D. Ganguly, Samit Chakraborty
2008E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand.
Sukanya Suwisuthikasem, Songsri Tangsripairoj
2008ESnapII: A Writable Dependent Snapshot System with Shared Cache.
Guangjun Xie, Lu Qi, Feng Wang, Gang Wang, Xiaoguang Liu, Jing Liu
2008Early-Life Cycle Reuse Approach for Component-Based Software of Autonomous Mobile Robot System.
Dayang N. A. Jawawi, Safaai Deris, Rosbi Bin Mamat
2008Eclipse Project and Resource Tracking Plug-in.
Kevin Li, Dwight Deugo
2008Effect of Security Increment to Symmetric Data Encryption through AES Methodology.
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin
2008Efficient Object Recognition Using Parametric Eigenspace under Influence of Noise and Occlusion.
Pravinkumar S. Revankar, Prabir Kumar Biswas, Sonali N. Deshpande
2008Enhancing Service-Side QoS Monitoring for Web Services.
Natee Artaiam, Twittie Senivongse
2008Equalization for a Wireless ATM Channel with a Recurrent Neural Network Pruned by Genetic Algorithm.
Dong-Chul Park
2008Face Detection Based on Skin Gaussian Model and KL Transform.
Chuanxu Wang, Zuoyong Li
2008Face Detection using BP Network Combined with Gabor Wavelet Transform.
Wang Chuan-xu, Li Xue
2008Fast Preemptive Task Scheduling Algorithm for Homogeneous and Heterogeneous Distributed Memory Systems.
Maruf Ahmed, Sharif M. H. Chowdhury, Masud Hasan
2008Finding Causes of Software Failure Using Ridge Regression and Association Rule Generation Methods.
Saeed Parsa, Mojtaba Vahidi-Asl, Somaye Arabi Naree
2008ICLS : Intelligent Cricket-based Location Tracking System Using Sensor Fusion.
Ho Min Jung, Byung Ki Kim, Wan Yeon Lee, Young Woong Ko
2008Identification and Extraction of Design Pattern Information in Java Program.
Chengwan He, Zheng Li, Keqing He
2008Image Authentication Schemes against Key-Logger Spyware.
M. N. Doja, Naveen Kumar
2008Image Preprocessing and Trajectory Feature Extraction based on Hidden Markov Models for Sign Language Recognition.
Duong Van Hieu, Supot Nitsuwat
2008Implementation of Parallel Algorithms for LUC Cryptosystem.
Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Mohd Said, Md Nasir Sulaiman
2008Improve Frequent Closed Itemsets Mining over Data Stream with Bitmap.
Haifeng Li, Hong Chen
2008Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction.
Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan
2008Information Flow based Ontology Mapping.
Ye Liang, Hong Bao, Hongzhe Liu
2008Information Value Evaluation Model for ILM.
Hai Jin, Muzhou Xiong, Song Wu
2008Intelligent Personalization Job Web Site.
Wuttipol Wanarsup, Suwarin Pattamavorakun, Suwat Pattamavorakun
2008Knowledge Representation and Query Process Based-on Semantic Web Technologies.
Chenghong Zhang, Songran Liu, Zhengchuan Xu, Zhuojun Gu, Xiaoling Wang
2008LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams.
Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang
2008Lipschitz Continuity of Approximate Reasoning.
Takashi Mitsuishi, Takanori Terashima, Toshimichi Homma, Yasunari Shidama
2008Malicious Code Detection Architecture Inspired by Human Immune System.
Mohd Fadzli Marhusin, David Cornforth, Henry Larkin
2008Managing Quality Level for Developing Information Security System Adopting QFD.
Pauline Kongsuwan, Sangmun Shin, Myeonggil Choi
2008Mathematical Modelling for the Design of an Edge Router.
Partha Bhattacharjee, Goutam Sanyal
2008Message Sequence Charts to Specify the Communicating Threads for Concurrent Discrete Wavelet Transform Based Image Compression and a Verification Analysis.
Kamrul Hasan Talukder, Koichi Harada
2008Meta-heuristic Enabled MAS Optimization in Supply Chain Procurement.
Xia Zhanguo, Wang Ke, Wang Zhixiao
2008Mining Approximate Closed Frequent Itemsets over Stream.
Haifeng Li, Zongjian Lu, Hong Chen
2008Mixing Protocol based on the Cooperation and the Parallelism for the Distributed Environment.
Belaid Saad, Francine Herrmann, Yann Lanuel, Thomas Tamisier
2008Model Checking for Web Service Flow Based on Annotated OWL-S.
Rujuan Liu, Changjun Hu, Chongchong Zhao
2008Modified Method for Denoising Color Images using Fuzzy Approach.
Madhu S. Nair, M. Wilscy
2008Modular Matrix Cipher and Its Application in Authentication Protocol.
Bao Ngoc Tran, Thuc Dinh Nguyen
2008Multi Readers Detection in Adaptive RFID Middleware.
Siti Zaiton Mohd Hashim, Mardiyono, Wan M. N. Wan-Kadir, Nurulhaini Anuar
2008Multi-Agent System Model of a BitTorrent Network.
Enrique Costa-Montenegro, Juan C. Burguillo-Rial, Pedro S. Rodríguez-Hernández, Francisco J. González-Castaño, Maria Curras-Parada, Patricia Gomez-Rana, Juan P. Rey-Souto
2008Multi-signers Strong Designated Verifier Signature Scheme.
Yaling Zhang, Jing Zhang, Yikun Zhang
2008Multicasting Support for NEMO based on ODMRP.
Seong-Yee Phang, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim
2008Multidisciplinary Design Approach Using Repetitive Response Surface Enhancement and Global Optimization.
Kwon-Su Jeon, Jae-Woo Lee, Yung-Hwan Byun
2008Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling Frequency.
Steven P. Sweeney, Sehwan Yoo, Albert Chi, Frank Lin, Taikyeong Jeong, Sengphil Hong, Sam Fernald
2008Neuro Fuzzy Model Predictive Control of AQM Networks Supporting TCP Flows.
A. R. Maghsoudlou, Roohollah Barzamini, S. Soleimanpour, Javid Jouzdani
2008New Approaches for Software Watermarking by Register Allocation.
Hakun Lee, Keiichi Kaneko
2008Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand
2008Novelty towards Hybrid Segmentation of Coronary Artery in CT Cardiac Images.
Valliappan Raman, Patrick Hang Hui Then
2008Omni-Directional Antenna for Wireless Access Point.
Suwat Pattamavorakun, Wuttipol Wanarsup, Suwarin Pattamavorakun
2008On Relaxing and Steady State Genetic Methods for Satellite Imaging Scheduling.
Xiao-shan Jin, Jun Li, Ning Jing
2008Parallel Implementation of the Novel Approach to Genome Assembly.
Jacek Blazewicz, Marta Kasprzak, Aleksandra Swiercz, Marek Figlerowicz, Piotr Gawron, Darren Platt, Lukasz Szajkowski
2008Placing a Liaison between Two Members of the Same Level in an Organization Structure of a Complete Binary Tree.
Kiyoshi Sawada
2008Prioritizing Default Rules Embedded in Description Logic Knowledge Base.
Shaohua Liu, Junsheng Yu, Yinglong Ma, Xu Zhang, Xiaoming Liu, Hansheng Su
2008Privacy Preserving of Associative Classification and Heuristic Approach.
Nattapon Harnsamut, Juggapong Natwichai, Bowonsak Seisungsittisunti
2008Prolonging Sensor Network Lifetime with Initial Energy Level Assignment.
Lijie Ren, Zhongwen Guo, Renzhong Ma
2008QoS Protocol Verification using Petri-Net for Seamless Mobility in a Ubiquitous Environment: A Case Study.
Dalju Lee, Jongmoon Baik
2008Ranking of Indian E-commerce Web-applications by Measuring Quality Factors.
Priyanka Tripathi, M. Kumar, Namita Shrivastava
2008Reinforcement Distribution in a Team of Cooperative Q-learning Agents.
Zahra Abbasi, Mohammad Ali Abbasi
2008Research on Mechanism of Agricultural FAQ Retrieval Based on Ontology.
Fang Wang, Guifa Teng, Lisheng Ren, Jianbin Ma
2008Research on UML-based Modeling of Workflow Manage System.
Guan Hongjie, Meng Fan-rong, Xia Zhanguo
2008Routing in General Incomplete Star Interconnection Network.
Bao-Xing Chen, Wenjun Xiao
2008SMILE Visualization with Flash Technologies.
Anucha Tungkatsathan, Pittaya Poompuang, Wichian Premchaiswadi
2008Security Analysis of Micali's Fair Contract Signing Protocol by Using Coloured Petri Nets.
Panupong Sornkhom, Yongyuth Permpoontanalarp
2008Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005.
Ayesha Altaf, M. Younus Javed, Attiq Ahmed
2008Software Engineering Issues in Developing a Context-aware Exhibition Guide System.
Jongmyung Choi, Hyun-Joo Moon
2008Specifying and Verifying Timing Properties of a Time-triggered Protocol for In-vehicle Communication.
Bo Zhang
2008Static Hand Gesture Recognition and its Application based on Support Vector Machines.
Yun Liu, Zhijie Gan, Yu Sun
2008Stock Price Time Series Prediction using Neuro-Fuzzy with Support Vector Guideline System.
Phayung Meesad, Tong Srikhacha
2008Study on Ontology Partition Based on Ant Colony Algorithm.
Lei Zhang, Shixiong Xia, Zhanguo Xia, Yong Zhou
2008Test Sequence Generation from UML Sequence Diagrams.
Philip Samuel, Anju Teresa Joseph
2008Testing Component-Based Real Time Systems.
Rachid Bouaziz, Ismail Berrada
2008The Complexity of the Evolution of Graph Labelings.
Geir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra
2008The Complexity of the Grid Wireless Mobility Model.
Sanpawat Kantabutra, Pattama Longani
2008The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ.
Supasit Monpratarnchai, Tetsuo Tamai
2008The Prototype of the Massive Events Streams Service Architecture and its Application.
Kyungeun Park, Yanggon Kim, Juno Chang, Dae Woong Rhee, Jinkyu Lee
2008The Study of a Financial Crisis Prediction Model based on XBRL.
Fengyi Lin, Deron Liang, Shih-Jung Chiu
2008The Upper Bound of Coverage on Fixed Energy Budget in Wireless Sensor Networks.
Fang Wang, Lisheng Ren, Guifa Teng
2008Tools and Techniques for Model Checking Networked Programs.
Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe
2008Towards Formal Modeling and Analysis of Networks of Embedded Medical Devices in Real-Time Maude.
Peter Csaba Ölveczky
2008Type Flaw Attacks and Prevention in Security Protocols.
Juan Wang, Jingwei Zhang, Huanguo Zhang
2008Using Social Network Analysis to Better Understand the Dependencies in UML Use Cases Collection.
Phanarut Srichetta, Songsri Tangsripairoj
2008Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey.
Sheraz Naseer, Muhammad Younus, Attiq Ahmed
2008Vulnerabilities of UMTS Access Domain Security Architecture.
Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema
2008Web Services Communication Model in Telecom Domain.
Bo Cheng, Xiaoyan Shen, Xiangwu Meng, Junliang Chen