


default search action
11. CIT 2011: Pafos, Cyprus
- 11th IEEE International Conference on Computer and Information Technology, CIT 2011, Pafos, Cyprus, 31 August-2 September 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4388-8

- K. Harald Gjermundrød

, Carl Hauser, David E. Bakken:
Scalable Wide-Area Multicast with Temporal Rate Filtering Distribution Framework. 1-8 - Fahed Awad

, Omar Banimelhem
, Nadia Al-Rousan
:
The Potential of Using Network Coding with Geographical Forwarding Routing for Wireless Multimedia Sensor Networks. 9-14 - Carmela Comito

, Domenico Talia
, Paolo Trunfio
:
An Energy-Aware Clustering Scheme for Mobile Applications. 15-22 - Mohammad A. Alghamdi

, Adam P. Chester, Ligang He, Stephen A. Jarvis
, James Wen Jun Xue:
Dynamic Active Window Management: A Method for Improving Revenue Generation in Dynamic Enterprise Systems. 23-28 - Nicolas Hidalgo

, Erika Rosas, Luciana Arantes
, Olivier Marin
, Pierre Sens, Xavier Bonnaire:
DRing: A Layered Scheme for Range Queries over DHTs. 29-34 - Sebastian Holzapfel, Sebastian Schuster, Torben Weis

:
VoroStore - A Secure and Reliable Data Storage for Peer-to-Peer-Based MMVEs. 35-40 - Eddy Caron, Florent Chuffart, Haiwu He, Cédric Tedeschi:

Implementation and Evaluation of a P2P Service Discovery System: Application in a Dynamic Large Scale Computing Infrastructure. 41-46 - Emanuele Carlini

, Massimo Coppola, Laura Ricci
:
Probabilistic Dropping in Push and Pull Dissemination over Distributed Hash Tables. 47-52 - Patrizio Dazzi

, Matteo Mordacchini
, Fabio Baglini:
Experiences with Complex User Profiles for Approximate P2P Community Matching. 53-58 - Rickard Holsmark, Shashi Kumar:

An Abstraction to Support Design of Deadlock-free Routing Algorithms for Large and Hierarchical NoCs. 59-66 - Adam P. Chester, Matthew Leeke, Mohammad A. Alghamdi

, Arshad Jhumka, Stephen A. Jarvis
:
A Framework for Data Center Scale Dynamic Resource Allocation Algorithms. 67-74 - Hyeong-Il Kim, Young-Sung Shin, Jae-Woo Chang:

A Grid-Based Cloaking Scheme for Continuous Queries in Distributed Systems. 75-82 - Toktam Ghafarian-M.

, Hossein Deldari, H. Mohhamad, Mohammad Hossein Yaghmaee Moghaddam
:
Proximity-Aware Resource Discovery Architecture in Peer-to-Peer Based Volunteer Computing System. 83-90 - Su Chen, Hai Jiang:

Accelerating Circle Detection Based on Generalized Projection Method with GPUs. 91-96 - Tianyi Zhu, Weidong Liu, Jiaxing Song:

An Efficient Role Based Access Control System for Cloud Computing. 97-102 - Linlin Meng, Jianxin Li, Hailong Sun:

WSRank: A Collaborative Ranking Approach for Web Service Selection. 103-108 - Zekun Zhu, Jianxin Li, Yongwang Zhao, Zhuqing Li:

SCENETester: A Testing Framework to Support Fault Diagnosis for Web Service Composition. 109-114 - Imad M. Abbadi:

Middleware Services at Cloud Virtual Layer. 115-120 - Zaigham Mahmood:

Cloud Computing: Characteristics and Deployment Approaches. 121-126 - Chengying Mao

:
Towards a Data Complexity Metric Set for Web Service Composition. 127-131 - Yonal Kirsal, Enver Ever

, Orhan Gemikonakli
, Glenford E. Mapp:
Critical Review of Analytical Modelling Approaches for Performability Evaluation of the Handover Phenomena in Mobile Communication Systems. 132-137 - Daniel James Waters, Jianjun Zhang:

SOHO Network Performance Optimization via Local Caching with the Presence of a Main Bottleneck, the Accessing WAN Link. 138-143 - Chi-Min Oh, Md Zahidul Islam, Chil-Woo Lee:

MRF-based Particle Filters for Multi-touch Tracking and Gesture Likelihoods. 144-149 - Myungeun Lee, Yanjuan Chen, Soo-Hyung Kim, Kwanggi Kim:

Geometric Active Model for Lesion Segmentation on Breast Ultrasound Images. 150-157 - Haosong Gou, Younghwan Yoo:

A Bit Collision Detection Based Hybrid Query Tree Protocol for Anti-collision in RFID System. 158-163 - Arash Habibi Lashkari

, Azizah Abdul Manaf, Maslin Masrom:
A Secure Recognition Based Graphical Password by Watermarking. 164-170 - Sheng Wang:

Vehicle Detection on Aerial Images by Extracting Corner Features for Rotational Invariant Shape Matching. 171-175 - Susu Jiang, Bofeng Zhang, Daming Wei:

The Elderly Fall Risk Assessment and Prediction Based on Gait Analysis. 176-180 - Alexander Wei Yin, Thomas Canhao Xu

, Bo Yang, Pasi Liljeberg, Hannu Tenhunen:
Change Function of 2D/3D Network-on-Chip. 181-188 - Gabriele Capannini:

Designing Efficient Parallel Prefix Sum Algorithms for GPUs. 189-196 - Samah Mustafa, Velar Hikmat

, Salar Shekha:
Wavelet Filter Bank-Based Non Uniform Multi-tone Transceiver for Digital Subscriber Line. 197-203 - Hyuntae Cho, Sanghyun Son, Jongdeok Kim, Yunju Baek:

Time Synchronization of Distributed Readers for a Large-Scale Active RFID Network. 204-211 - Min Seok Kim, Sungryul Kim, Jeonghyun Kim, Younghwan Yoo:

Design and Implementation of MAC Protocol for SmartGrid HAN Environment. 212-217 - Sungwoo Tak, Hyejin Kim:

Policy-Driven Reconfiguration Incorporating Multi-objective Optimization for Performance Management in a Ship Backbone Network. 218-223 - Haibin Zhai, Hai Jiang, Yi Sun, Jun Li, Jing Liu, Gengfa Fang, Eryk Dutkiewicz

:
LHCDS: A Novel Deployment Strategy of Proxy Caches for P2P Traffic in ISP Networks. 224-230 - Qi Wang, Hai Jiang, Albert K. Wong, Jun Li, Zhongcheng Li:

A Full-Distributed Architecture for PoC Application in Data Packet Voice Communication. 231-237 - Omayma A. El-Mohsen, Hussein M. Harb

:
Novel Multicast Operation Method in Metro Ethernet Networks. 238-244 - You-ye Sun, Cui Zhang, Shao-qing Meng, Kai-ning Lu:

Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network. 245-248 - Kun Peng:

Survey, analysis and re-evaluation - How efficient and secure a mix network can be. 249-254 - Edward Kresch, S. Kulkarni:

A Poisson Based Bursty Model of Internet Traffic. 255-260 - Seon-Yeong Kim, Sora Kim, Hwan-Gue Cho:

A New Human Interactive Proof System Using Arbitrary and Fractal Polygon Image. 261-268 - Septimiu Fabian Mare, Mircea Vladutiu, Lucian Prodan:

Decreasing Change Impact Using Smart LSB Pixel Mapping and Data Rearrangement. 269-276 - Sheng Wang:

A Review of Gradient-Based and Edge-Based Feature Extraction Methods for Object Detection. 277-282 - Toan Nguyen Dinh, Jeong Hwan Kim, Gueesang Lee:

Extracting the Path of Frame Center Points Using Spatial Transformation and Motion Estimation. 283-290 - Gilles Perrot, Stéphane Domas, Raphaël Couturier

, Nicolas Bertaux:
GPU Implementation of a Region Based Algorithm for Large Images Segmentation. 291-298 - Kavitha Madhubalan, Gueesang Lee:

Binarization of Degraded Characters Using Tensor Voting Based Color Clustering. 299-305 - Sang-Cheol Park, In Seop Na

, Soo-Hyung Kim, Gueesang Lee, Kang Han Oh, Jeong Hwan Kim, Tae Ho Han:
Lanes Detection in PCR Gel Electrophoresis Images. 306-313 - Panagiotis D. Michailidis

, Konstantinos G. Margaritis
:
Open Multi Processing (OpenMP) of Gauss-Jordan Method for Solving System of Linear Equations. 314-319 - Christoph Torens, Lars Ebrecht

, Karsten Lemmer:
Starting Model-Based Testing Based on Existing Test Cases Used for Model Creation. 320-327 - Mohammad Azzeh

:
Model Tree Based Adaption Strategy for Software Effort Estimation by Analogy. 328-335 - Tao Zhang

, Byungjeong Lee:
A Bug Rule Based Technique with Feedback for Classifying Bug Reports. 336-343 - Poulcheria Benou, Costas Vassilakis

:
A Software Architecture for Provision of Context-Aware Web-based m-Commerce Applications. 344-349 - Miia-Maarit Saarelainen:

Why Groups are Used in Software System Modernization Decisions? Comparing Group Decision-Making in Private and Public Sector. 350-355 - Felipe Pontes Guimarães, Alba Cristina Magalhaes Alves de Melo

:
User-Defined Adaptive Fault-Tolerant Execution of Workflows in the Grid. 356-362 - Afef Mdhaffar

, Riadh Ben Halima, Ernst Juhnke, Mohamed Jmaiel, Bernd Freisleben
:
AOP4CSM: An Aspect-Oriented Programming Approach for Cloud Service Monitoring. 363-370 - Sara Casolari, Michele Colajanni

, Stefania Tosi:
Detecting Behavioral Variations in System Resources of Large Data Centers. 371-378 - Dimitris Karakasilis, Fotis Georgatos, Lambros Lambrinos

, Theodoros Alexopoulos:
Application of Live Video Streaming over GRID and Cloud Infrastructures. 379-383 - Mi-Young Kang, Hyung-Ok Lee, Ji-Seung Nam:

On Application-Level Approaches to Cloudy Computing Service in Agent-Base Distributed System. 384-388 - Mauro Andreolini

, Michele Colajanni
, Stefania Tosi:
A Software Architecture for the Analysis of Large Sets of Data Streams in Cloud Infrastructures. 389-394 - Charith Gunaratna, Ronaldo Menezes

:
Using Network Science to Understand the Structure of Brazilian Popular Music. 395-402 - Bahtijar Vogel, Arianit Kurti

, Marcelo Milrad
, Andreas Kerren:
An Interactive Web-Based Visualization Tool in Action: User Testing and Usability Aspects. 403-408 - Jie Song, Yubin Bao, Zhiliang Zhu:

Navigating Measurements by Cross-Classifications in Multi-use Data Warehouse. 409-414 - Patrik Emanuel Mezö, Mircea Vladutiu, Lucian Prodan:

Design of a Hierarchical Based DHT Overlay P2P Routing Algorithm. 415-420 - Mi-Young Jang, Jae-Woo Chang:

A New K-NN Query Processing Algorithm Enhancing Privacy Protection in Location-Based Services. 421-428 - Muhammad Taufiq Nuruzzaman

, Changmoo Lee, Deokjai Choi:
Independent and Personal SMS Spam Filtering. 429-435 - Feng Pan, Tim Converse, David Ahn, Franco Salvetti, Gianluca Donato:

Greedy and Randomized Feature Selection for Web Search Ranking. 436-442 - Jie Yu, Jie Gong, Fangfang Liu

:
Generation of Semantic Interactive Environment for Personalized Search. 443-448 - Su-Do Kim, Sung-Hwan Kim, Hwan-Gue Cho:

Predicting the Virtual Temperature of Web-Blog Articles as a Measurement Tool for Online Popularity. 449-454 - Guijia He, Tao Zhang

, Byungjeong Lee, Jin Suk Kim:
Utilizing SSTAG: A Novel Tag Recommendation Mechanism to Web Page Search. 455-460 - Nihel Ben Youssef, Adel Bouhoula

:
A Fully Automatic Approach for Fixing Firewall Misconfigurations. 461-466 - Mohammad Zarifi Eslami, Alireza Zarghami, Brahmananda Sapkota, Marten van Sinderen

:
Flexible Homecare Application Personalization and Integration Using Pattern-Based Service Tailoring: Supporting Independent Living of Elderly with IT. 467-474 - Leonidas L. Fragidis

, Prodromos D. Chatzoglou:
The Use of Electronic Health Record in Greece: Current Status. 475-480 - Sherin M. Youssef

, Ezzat A. Korany, Rana M. Salem:
Contourlet-based Feature Extraction for Computer Aided Diagnosis of Medical Patterns. 481-486 - Amina Hossain, Al-Amin Hossain, Jae-Woo Chang:

Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road Networks. 487-490 - Rui Zhang, Quan Qian, Mingjun Xin, Bofeng Zhang:

Opportunistic Scheduling and Performance Analysis on Wireless Network Coding. 491-498 - Mei Wu, Martin Collier

:
Extending the Lifetime of Heterogeneous Sensor Networks Using a Two-Level Topology. 499-504 - Michael T. Todinov:

Fast Augmentation Algorithms for Maximising the Flow in Repairable Flow Networks After a Component Failure. 505-512 - Se-Mi Kim, Seung-Chur Yang, Jong-Deok Kim:

Design and Implementation of a Smartphone-Based Reliable Real-Time Wi-Fi Broadcast System. 513-517 - Shahabeddin Geravand, Mahmood Ahmadi

:
A Novel Adjustable Matrix Bloom Filter-Based Copy Detection System for Digital Libraries. 518-525 - Sun-Young Park, Seon-Yeong Kim, Sung-Hwan Kim, Hwan-Gue Cho:

A Global Dictionary Based Approach to Fast Similar Text Search in Document Repository. 526-532 - Nourchène Elleuch, Adel Khalfallah

, Samir Ben Ahmed
:
ArchMDE Approach for the Formal Verification of Real Time Systems. 533-538 - Boutheina A. Fessi, S. B. Abdallah, Yacine Djemaiel, Noureddine Boudriga:

A Clustering Data Fusion Method for Intrusion Detection System. 539-545 - Pranesh Sthapit, Jae-Young Pyun:

Effects of Radio Triggered Sensor MAC Protocol over Wireless Sensor Network. 546-551 - Allen Pomeroy, Qing Tan:

Effective SQL Injection Attack Reconstruction Using Network Recording. 552-556 - Young Tae Lee, Yong Joon Shin, Cheong Hee Park:

Extending Linear Discriminant Analysis by Using Unlabeled Data. 557-562 - Ryota Katayanagi, Toshiharu Sugawara

:
Efficient Team Formation Based on Learning and Reorganization and Influence of Communication Delay. 563-570 - Satoru Ohta, Takehito Hirota:

Machine Learning Approach to the Power Management of Server Clusters. 571-578 - Viktor Mashkov

:
New Approach to System Level Self-Diagnosis. 579-584 - Hiroki Oda, Hiroyuki Hisamatsu, Hiroshi Noborio:

Design and Evaluation of Hybrid Congestion Control Mechanism for Video Streaming. 585-590 - Colin Bailey, Xiao-Hong Peng:

Exploring the Effect of Buffer Behaviour on Perceived Video Quality. 591-596 - D. S. Gaikwad, Mukesh A. Zaveri:

A Novel Mobility Model for Realistic Behavior in Vehicular Ad Hoc Network. 597-602 - Guangfei Zhang, Yifei Jiang, Wenxiang Wang, Menghao Su:

A Laxity-Aware Memory Access Scheduler for High Performance Multimedia SoC. 603-608 - Xiaohui Zhang, Ming Cong, Guangqiang Chen:

Software and Hardware Co-designed Multi-level TLBs for Chip Multiprocessors. 609-614 - Frédéric Pinel, Johnatan E. Pecero

, Pascal Bouvry
, Samee Ullah Khan
:
A Review on Task Performance Prediction in Multi-core Based Systems. 615-620 - Yue Wang, N. Ranganathan:

An Instruction-Level Energy Estimation and Optimization Methodology for GPU. 621-628 - Harold E. Castro

, German Sotelo, Cesar O. Diaz, Pascal Bouvry
:
Green Flexible Opportunistic Computing with Virtualization. 629-634 - Carlos Jaime Barrios Hernández, Daniel A. Sierra, Sébastien Varrette

, Dino Lopez Pacheco:
Energy Efficiency on Scalable Computing Architectures. 635-640 - Cesar O. Diaz, Mateusz Guzek

, Johnatan E. Pecero
, Pascal Bouvry
, Samee Ullah Khan
:
Scalable and Energy-Efficient Scheduling Techniques for Large-Scale Systems. 641-647 - Ulrich Greveler, Benjamin Justus, Dennis Loehr:

A Privacy Preserving System for Cloud Computing. 648-653 - Shun-Yun Hu:

Survivable Interaction Distribution Networks. 654-659

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














