


default search action
11. CIT 2011: Pafos, Cyprus
- 11th IEEE International Conference on Computer and Information Technology, CIT 2011, Pafos, Cyprus, 31 August-2 September 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4388-8
- K. Harald Gjermundrød
, Carl Hauser, David E. Bakken:
Scalable Wide-Area Multicast with Temporal Rate Filtering Distribution Framework. 1-8 - Fahed Awad
, Omar Banimelhem, Nadia Al-Rousan
:
The Potential of Using Network Coding with Geographical Forwarding Routing for Wireless Multimedia Sensor Networks. 9-14 - Carmela Comito
, Domenico Talia
, Paolo Trunfio
:
An Energy-Aware Clustering Scheme for Mobile Applications. 15-22 - Mohammad A. Alghamdi
, Adam P. Chester, Ligang He, Stephen A. Jarvis
, James Wen Jun Xue:
Dynamic Active Window Management: A Method for Improving Revenue Generation in Dynamic Enterprise Systems. 23-28 - Nicolas Hidalgo
, Erika Rosas, Luciana Arantes
, Olivier Marin
, Pierre Sens, Xavier Bonnaire:
DRing: A Layered Scheme for Range Queries over DHTs. 29-34 - Sebastian Holzapfel, Sebastian Schuster, Torben Weis
:
VoroStore - A Secure and Reliable Data Storage for Peer-to-Peer-Based MMVEs. 35-40 - Eddy Caron, Florent Chuffart, Haiwu He, Cédric Tedeschi:
Implementation and Evaluation of a P2P Service Discovery System: Application in a Dynamic Large Scale Computing Infrastructure. 41-46 - Emanuele Carlini
, Massimo Coppola, Laura Ricci
:
Probabilistic Dropping in Push and Pull Dissemination over Distributed Hash Tables. 47-52 - Patrizio Dazzi
, Matteo Mordacchini
, Fabio Baglini:
Experiences with Complex User Profiles for Approximate P2P Community Matching. 53-58 - Rickard Holsmark, Shashi Kumar:
An Abstraction to Support Design of Deadlock-free Routing Algorithms for Large and Hierarchical NoCs. 59-66 - Adam P. Chester, Matthew Leeke, Mohammad A. Alghamdi
, Arshad Jhumka, Stephen A. Jarvis
:
A Framework for Data Center Scale Dynamic Resource Allocation Algorithms. 67-74 - Hyeong-Il Kim, Young-Sung Shin, Jae-Woo Chang:
A Grid-Based Cloaking Scheme for Continuous Queries in Distributed Systems. 75-82 - Toktam Ghafarian-M.
, Hossein Deldari, H. Mohhamad, Mohammad Hossein Yaghmaee Moghaddam
:
Proximity-Aware Resource Discovery Architecture in Peer-to-Peer Based Volunteer Computing System. 83-90 - Su Chen, Hai Jiang:
Accelerating Circle Detection Based on Generalized Projection Method with GPUs. 91-96 - Tianyi Zhu, Weidong Liu, Jiaxing Song:
An Efficient Role Based Access Control System for Cloud Computing. 97-102 - Linlin Meng, Jianxin Li, Hailong Sun:
WSRank: A Collaborative Ranking Approach for Web Service Selection. 103-108 - Zekun Zhu, Jianxin Li, Yongwang Zhao, Zhuqing Li:
SCENETester: A Testing Framework to Support Fault Diagnosis for Web Service Composition. 109-114 - Imad M. Abbadi:
Middleware Services at Cloud Virtual Layer. 115-120 - Zaigham Mahmood:
Cloud Computing: Characteristics and Deployment Approaches. 121-126 - Chengying Mao
:
Towards a Data Complexity Metric Set for Web Service Composition. 127-131 - Yonal Kirsal, Enver Ever
, Orhan Gemikonakli
, Glenford E. Mapp:
Critical Review of Analytical Modelling Approaches for Performability Evaluation of the Handover Phenomena in Mobile Communication Systems. 132-137 - Daniel James Waters, Jianjun Zhang:
SOHO Network Performance Optimization via Local Caching with the Presence of a Main Bottleneck, the Accessing WAN Link. 138-143 - Chi-Min Oh, Md Zahidul Islam, Chil-Woo Lee:
MRF-based Particle Filters for Multi-touch Tracking and Gesture Likelihoods. 144-149 - Myungeun Lee, Yanjuan Chen, Soo-Hyung Kim, Kwanggi Kim:
Geometric Active Model for Lesion Segmentation on Breast Ultrasound Images. 150-157 - Haosong Gou, Younghwan Yoo:
A Bit Collision Detection Based Hybrid Query Tree Protocol for Anti-collision in RFID System. 158-163 - Arash Habibi Lashkari
, Azizah Abdul Manaf, Maslin Masrom:
A Secure Recognition Based Graphical Password by Watermarking. 164-170 - Sheng Wang:
Vehicle Detection on Aerial Images by Extracting Corner Features for Rotational Invariant Shape Matching. 171-175 - Susu Jiang, Bofeng Zhang, Daming Wei:
The Elderly Fall Risk Assessment and Prediction Based on Gait Analysis. 176-180 - Alexander Wei Yin, Thomas Canhao Xu
, Bo Yang, Pasi Liljeberg, Hannu Tenhunen:
Change Function of 2D/3D Network-on-Chip. 181-188 - Gabriele Capannini:
Designing Efficient Parallel Prefix Sum Algorithms for GPUs. 189-196 - Samah Mustafa, Velar Hikmat
, Salar Shekha:
Wavelet Filter Bank-Based Non Uniform Multi-tone Transceiver for Digital Subscriber Line. 197-203 - Hyuntae Cho, Sanghyun Son, Jongdeok Kim, Yunju Baek:
Time Synchronization of Distributed Readers for a Large-Scale Active RFID Network. 204-211 - Min Seok Kim, Sungryul Kim, Jeonghyun Kim, Younghwan Yoo:
Design and Implementation of MAC Protocol for SmartGrid HAN Environment. 212-217 - Sungwoo Tak, Hyejin Kim:
Policy-Driven Reconfiguration Incorporating Multi-objective Optimization for Performance Management in a Ship Backbone Network. 218-223 - Haibin Zhai, Hai Jiang, Yi Sun, Jun Li, Jing Liu, Gengfa Fang, Eryk Dutkiewicz
:
LHCDS: A Novel Deployment Strategy of Proxy Caches for P2P Traffic in ISP Networks. 224-230 - Qi Wang, Hai Jiang, Albert K. Wong, Jun Li, Zhongcheng Li:
A Full-Distributed Architecture for PoC Application in Data Packet Voice Communication. 231-237 - Omayma A. El-Mohsen, Hussein M. Harb
:
Novel Multicast Operation Method in Metro Ethernet Networks. 238-244 - You-ye Sun, Cui Zhang, Shao-qing Meng, Kai-ning Lu:
Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network. 245-248 - Kun Peng:
Survey, analysis and re-evaluation - How efficient and secure a mix network can be. 249-254 - Edward Kresch, S. Kulkarni:
A Poisson Based Bursty Model of Internet Traffic. 255-260 - Seon-Yeong Kim, Sora Kim, Hwan-Gue Cho:
A New Human Interactive Proof System Using Arbitrary and Fractal Polygon Image. 261-268 - Septimiu Fabian Mare, Mircea Vladutiu, Lucian Prodan:
Decreasing Change Impact Using Smart LSB Pixel Mapping and Data Rearrangement. 269-276 - Sheng Wang:
A Review of Gradient-Based and Edge-Based Feature Extraction Methods for Object Detection. 277-282 - Toan Nguyen Dinh, Jeong Hwan Kim, Gueesang Lee:
Extracting the Path of Frame Center Points Using Spatial Transformation and Motion Estimation. 283-290 - Gilles Perrot, Stéphane Domas, Raphaël Couturier
, Nicolas Bertaux:
GPU Implementation of a Region Based Algorithm for Large Images Segmentation. 291-298 - Kavitha Madhubalan, Gueesang Lee:
Binarization of Degraded Characters Using Tensor Voting Based Color Clustering. 299-305 - Sang-Cheol Park, In Seop Na
, Soo-Hyung Kim, Gueesang Lee, Kang Han Oh, Jeong Hwan Kim, Tae Ho Han:
Lanes Detection in PCR Gel Electrophoresis Images. 306-313 - Panagiotis D. Michailidis
, Konstantinos G. Margaritis
:
Open Multi Processing (OpenMP) of Gauss-Jordan Method for Solving System of Linear Equations. 314-319 - Christoph Torens, Lars Ebrecht
, Karsten Lemmer:
Starting Model-Based Testing Based on Existing Test Cases Used for Model Creation. 320-327 - Mohammad Azzeh
:
Model Tree Based Adaption Strategy for Software Effort Estimation by Analogy. 328-335 - Tao Zhang
, Byungjeong Lee:
A Bug Rule Based Technique with Feedback for Classifying Bug Reports. 336-343 - Poulcheria Benou, Costas Vassilakis
:
A Software Architecture for Provision of Context-Aware Web-based m-Commerce Applications. 344-349 - Miia-Maarit Saarelainen:
Why Groups are Used in Software System Modernization Decisions? Comparing Group Decision-Making in Private and Public Sector. 350-355 - Felipe Pontes Guimarães, Alba Cristina Magalhaes Alves de Melo
:
User-Defined Adaptive Fault-Tolerant Execution of Workflows in the Grid. 356-362 - Afef Mdhaffar
, Riadh Ben Halima, Ernst Juhnke, Mohamed Jmaiel, Bernd Freisleben
:
AOP4CSM: An Aspect-Oriented Programming Approach for Cloud Service Monitoring. 363-370 - Sara Casolari, Michele Colajanni
, Stefania Tosi:
Detecting Behavioral Variations in System Resources of Large Data Centers. 371-378 - Dimitris Karakasilis, Fotis Georgatos, Lambros Lambrinos
, Theodoros Alexopoulos:
Application of Live Video Streaming over GRID and Cloud Infrastructures. 379-383 - Mi-Young Kang, Hyung-Ok Lee, Ji-Seung Nam:
On Application-Level Approaches to Cloudy Computing Service in Agent-Base Distributed System. 384-388 - Mauro Andreolini
, Michele Colajanni
, Stefania Tosi:
A Software Architecture for the Analysis of Large Sets of Data Streams in Cloud Infrastructures. 389-394 - Charith Gunaratna, Ronaldo Menezes
:
Using Network Science to Understand the Structure of Brazilian Popular Music. 395-402 - Bahtijar Vogel, Arianit Kurti
, Marcelo Milrad
, Andreas Kerren:
An Interactive Web-Based Visualization Tool in Action: User Testing and Usability Aspects. 403-408 - Jie Song, Yubin Bao, Zhiliang Zhu:
Navigating Measurements by Cross-Classifications in Multi-use Data Warehouse. 409-414 - Patrik Emanuel Mezö, Mircea Vladutiu, Lucian Prodan:
Design of a Hierarchical Based DHT Overlay P2P Routing Algorithm. 415-420 - Mi-Young Jang, Jae-Woo Chang:
A New K-NN Query Processing Algorithm Enhancing Privacy Protection in Location-Based Services. 421-428 - Muhammad Taufiq Nuruzzaman
, Changmoo Lee, Deokjai Choi:
Independent and Personal SMS Spam Filtering. 429-435 - Feng Pan, Tim Converse, David Ahn, Franco Salvetti, Gianluca Donato:
Greedy and Randomized Feature Selection for Web Search Ranking. 436-442 - Jie Yu, Jie Gong, Fangfang Liu:
Generation of Semantic Interactive Environment for Personalized Search. 443-448 - Su-Do Kim, Sung-Hwan Kim, Hwan-Gue Cho:
Predicting the Virtual Temperature of Web-Blog Articles as a Measurement Tool for Online Popularity. 449-454 - Guijia He, Tao Zhang
, Byungjeong Lee, Jin Suk Kim:
Utilizing SSTAG: A Novel Tag Recommendation Mechanism to Web Page Search. 455-460 - Nihel Ben Youssef, Adel Bouhoula:
A Fully Automatic Approach for Fixing Firewall Misconfigurations. 461-466 - Mohammad Zarifi Eslami, Alireza Zarghami, Brahmananda Sapkota, Marten van Sinderen:
Flexible Homecare Application Personalization and Integration Using Pattern-Based Service Tailoring: Supporting Independent Living of Elderly with IT. 467-474 - Leonidas L. Fragidis
, Prodromos D. Chatzoglou:
The Use of Electronic Health Record in Greece: Current Status. 475-480 - Sherin M. Youssef
, Ezzat A. Korany, Rana M. Salem:
Contourlet-based Feature Extraction for Computer Aided Diagnosis of Medical Patterns. 481-486 - Amina Hossain, Al-Amin Hossain, Jae-Woo Chang:
Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road Networks. 487-490 - Rui Zhang, Quan Qian, Mingjun Xin, Bofeng Zhang:
Opportunistic Scheduling and Performance Analysis on Wireless Network Coding. 491-498 - Mei Wu, Martin Collier
:
Extending the Lifetime of Heterogeneous Sensor Networks Using a Two-Level Topology. 499-504 - Michael T. Todinov:
Fast Augmentation Algorithms for Maximising the Flow in Repairable Flow Networks After a Component Failure. 505-512 - Se-Mi Kim, Seung-Chur Yang, Jong-Deok Kim:
Design and Implementation of a Smartphone-Based Reliable Real-Time Wi-Fi Broadcast System. 513-517 - Shahabeddin Geravand, Mahmood Ahmadi
:
A Novel Adjustable Matrix Bloom Filter-Based Copy Detection System for Digital Libraries. 518-525 - Sun-Young Park, Seon-Yeong Kim, Sung-Hwan Kim, Hwan-Gue Cho:
A Global Dictionary Based Approach to Fast Similar Text Search in Document Repository. 526-532 - Nourchène Elleuch, Adel Khalfallah
, Samir Ben Ahmed
:
ArchMDE Approach for the Formal Verification of Real Time Systems. 533-538 - Boutheina A. Fessi, S. B. Abdallah, Yacine Djemaiel, Noureddine Boudriga:
A Clustering Data Fusion Method for Intrusion Detection System. 539-545 - Pranesh Sthapit, Jae-Young Pyun:
Effects of Radio Triggered Sensor MAC Protocol over Wireless Sensor Network. 546-551 - Allen Pomeroy, Qing Tan:
Effective SQL Injection Attack Reconstruction Using Network Recording. 552-556 - Young Tae Lee, Yong Joon Shin, Cheong Hee Park:
Extending Linear Discriminant Analysis by Using Unlabeled Data. 557-562 - Ryota Katayanagi, Toshiharu Sugawara
:
Efficient Team Formation Based on Learning and Reorganization and Influence of Communication Delay. 563-570 - Satoru Ohta, Takehito Hirota:
Machine Learning Approach to the Power Management of Server Clusters. 571-578 - Viktor Mashkov
:
New Approach to System Level Self-Diagnosis. 579-584 - Hiroki Oda, Hiroyuki Hisamatsu, Hiroshi Noborio:
Design and Evaluation of Hybrid Congestion Control Mechanism for Video Streaming. 585-590 - Colin Bailey, Xiao-Hong Peng:
Exploring the Effect of Buffer Behaviour on Perceived Video Quality. 591-596 - D. S. Gaikwad, Mukesh A. Zaveri:
A Novel Mobility Model for Realistic Behavior in Vehicular Ad Hoc Network. 597-602 - Guangfei Zhang, Yifei Jiang, Wenxiang Wang, Menghao Su:
A Laxity-Aware Memory Access Scheduler for High Performance Multimedia SoC. 603-608 - Xiaohui Zhang, Ming Cong, Guangqiang Chen:
Software and Hardware Co-designed Multi-level TLBs for Chip Multiprocessors. 609-614 - Frédéric Pinel, Johnatan E. Pecero
, Pascal Bouvry
, Samee Ullah Khan
:
A Review on Task Performance Prediction in Multi-core Based Systems. 615-620 - Yue Wang, N. Ranganathan:
An Instruction-Level Energy Estimation and Optimization Methodology for GPU. 621-628 - Harold E. Castro
, German Sotelo, Cesar O. Diaz, Pascal Bouvry
:
Green Flexible Opportunistic Computing with Virtualization. 629-634 - Carlos Jaime Barrios Hernández, Daniel A. Sierra, Sébastien Varrette
, Dino Lopez Pacheco:
Energy Efficiency on Scalable Computing Architectures. 635-640 - Cesar O. Diaz, Mateusz Guzek
, Johnatan E. Pecero
, Pascal Bouvry
, Samee Ullah Khan
:
Scalable and Energy-Efficient Scheduling Techniques for Large-Scale Systems. 641-647 - Ulrich Greveler, Benjamin Justus, Dennis Loehr:
A Privacy Preserving System for Cloud Computing. 648-653 - Shun-Yun Hu:
Survivable Interaction Distribution Networks. 654-659

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.