Advances in Computer Science and Engineering: 13th International CSI Computer Conference, CSICC 2008 Kish Island, Iran, March 9-11, 2008 Revised Selected Papers / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$191.41
Used and New from Other Sellers
Used and New from Other Sellers
from $67.92
Usually ships in 1-2 business days
(Save 71%)
Other sellers (Paperback)
  • All (14) from $67.92   
  • New (11) from $67.92   
  • Used (3) from $67.92   

More About This Textbook

Overview

This book constitutes the revised selected papers of the 13th International CSI Computer Conference, CSICC 2008 held on Kish Island, Iran, in March 2008. The 84 regular papers presented together with 68 poster presentations were carefully reviewed and selected from a total of 426 submissions.

The papers are organized in topical sections on learning/soft computing, algorithm theory, SoC and NoC, wireless/sensor networks, video processing and related topics, processor architecture, AI/robotics/control, medical image processing, p2p/cluster/grid systems, mobile ad hoc networks, web, signal processing/speech processing, misc, security, image processing applications as well as VLSI.

Read More Show Less

Product Details

Table of Contents

Full Papers.- A Novel Piecewise Linear Clustering Technique Based on Hyper Plane Adjustment.- Ant Colony Optimization with a Genetic Restart Approach toward Global Optimization.- Automatic Extraction of IS-A Relations in Taxonomy Learning.- A Bayesian Network Based Approach for Data Classification Using Structural Learning.- A Clustering Method Based on Soft Learning of Model (Prototype) and Dissimilarity Metrics.- An Approximation Algorithm for the k-Level Uncapacitated Facility Location Problem with Penalties.- Optimizing Fixpoint Evaluation of Logic Programs with Uncertainty.- Approximating Component Selection with General Costs.- Online Suffix Tree Construction for Streaming Sequences.- Fuzzy Voronoi Diagram.- A Novel Partitioned Encoding Scheme for Reducing Total Power Consumption of Parallel Bus.- Efficient Parallel Buffer Structure and Its Management Scheme for a Robust Network-on-Chip (NoC) Architecture.- Integration of System-Level IP Cores in Object-Oriented Design Methodologies.- Polymorphism-Aware Common Bus in an Object-Oriented ASIP.- Efficient VLSI Layout of WK-Recursive and WK-Pyramid Interconnection Networks.- Energy Adaptive Cluster-Head Selection for Wireless Sensor Networks Using Center of Energy Mass.- SHRP: A New Routing Prool to Wireless Sensor Networks.- Improvement of MAC Performance for Wireless Sensor Networks.- Route Optimization Security in Mobile IPv6 Wireless Networks: A Test-Bed Experience.- Adaptive End-to-End QoS for Multimedia over Heterogeneous Wireless Networks.- A Blocking Reduction Scheme for Multiple Slot Cell Scheduling in Multicast Switching Systems.- Object-Based Video Coding for Distance Learning Using Stereo Cameras.- Seabed Image Texture Segmentation and Classification Based on Nonsubsampled Contourlet Transform.- Unequal Error Protection for the Scalable Extension of H.264/AVC Using Genetic Algorithm.- An Adaptive Method for Moving Object Blending in Dynamic Mosaicing.- Inferring a Bayesian Network for Content-Based Image Classification.- High Performance Mathematical Quarter-Pixel Motion Estimation with Novel Rate Distortion Metric for H.264/AVC.- A Versatile Reconfigurable Bit-Serial Multiplier Architecture in Finite Fields GF(2m).- A Nonspeculative Maximally Redundant Signed Digit Adder.- System-Level Assertion-Based Performance Verification for Embedded Systems.- The Effect of Core Number and Core Diversity on Power and Performance in Multicore Processors.- Reducing the Computational Complexity of an RLS-Based Adaptive Controller in ANVC Applications.- An Efficient and Extendable Modeling Approach for VLIW DSP Processors.- An Exact Algorithm for the Multiple-Choice Multidimensional Knapsack Based on the Core.- Kinetic Polar Diagram.- A Graph Transformation-Based Approach to Formal Modeling and Verification of Workflows.- Efficient Parallel Routing Algorithms for Cartesian and Composition Networks.- A Naïve Bayes Classifier with Distance Weighting for Hand-Gesture Recognition.- SBUQA Question Answering System.- A New Feedback ANC System Approach.- Benefiting White Noise in Developing Feedforward Active Noise Control Systems.- Comparison of Linear and Nonlinear Models for Estimating Brain Deformation Using Finite Element Method.- Context-Dependent Segmentation of Retinal Blood Vessels Using Hidden Markov Models.- Retinal Vessel Extraction Using Gabor Filters and Support Vector Machines.- A New Segmentation Method for Iris Recognition Using the Complex Inversion Map and Best-Fitting Curve.- A New Algorithm for Combating Free-Riders in Structured P2P Networks.- Clustering Search Engine Log for Query Recommendation.- Reliability Evaluation in Grid Environment.- Formulating Priority Coefficients for Information Quality Criteria on the Blog.- A Distributed Proxy System for High Speed Clients.- New Routing Strategies for RSP Problems with Concave Cost.- Modeling Routing Prools in Adhoc Networks.- CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs.- A Secure Cross-Layer Design of Clustering–Based Routing Prool for MANET.- An Approach for Semantic Web Query Approximation Based on Domain Knowledge and User Preferences.- Semantic Web Services for Handling Data Heterogeneity in an E-Business Framework.- Challenges in Using Peer-to-Peer Structures in Order to Design a Large-Scale Web Search Engine.- Sparse Sinusoidal Signal Representation for Speech and Music Signals.- Variant Combination of Multiple Classifiers Methods for Classifying the EEG Signals in Brain-Computer Interface.- Nevisa, a Persian Continuous Speech Recognition System.- Effects of Feature Domain Normalizations on Text Independent Speaker Verification Using Sorted Adapted Gaussian Mixture Models.- A Centrally Managed Dynamic Spectrum Management Algorithm for Digital Subscriber Line Systems.- Methods for Analyzing Information Contained in an Enterprise Email Database.- Early Bug Detection in Deployed Software Using Support Vector Machine.- A New Architecture for Heterogeneous Context Based Routing.- Performance Modeling of a Distributed Web Crawler Using Shastic Activity Networks.- Performance Comparison of Simple Regular Meshes and Their k-ary n-cube Variants in Optical Networks.- A Robust and Efficient SIP Authentication Scheme.- A Temporal Semantic-Based Access Control Model.- A Review on Concepts, Algorithms and Recognition Based Applications of Artificial Immune System.- Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers.- A Cluster-Based Key Establishment Prool for Wireless Mobile Ad Hoc Networks.- Time Series Analysis for ARP Anomaly Detection: A Combinatorial Network-Based Approach Using Multivariate and Mean-Variance Algorithms.- Polyhedral GPU Accelerated Shape from Silhouette.- Discrimination of Bony Structures in Cephalograms for Automatic Landmark Detection.- Grid Based Registration of Diffusion Tensor Images Using Least Square Support Vector Machines.- Detection of Outer Layer of the Vessel Wall and Characterization of Calcified Plaques in IVUS Images.- Object Modeling for Multicamera Correspondence Using Fuzzy Region Color Adjacency Graphs.- Secure Digital Image Watermarking Based on SVD-DCT.- A Novel Delay Fault Testing Methodology for Resistive Faults in Deep Sub-micron Technologies.- On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices.- Performance Enhancement of Asynchronous Circuits.- A Low Power SRAM Based on Five Transistors Cell.- Evaluating the Metro-on-Chip Methodology to Improve the Congestion and Routability.- Sequential Equivalence Checking Using a Hybrid Boolean-Word Level Decision Diagram.- A Circuit Model for Fault Tolerance in the Reliable Assembly of Nano-systems.- Short Papers.- An Operator for Removal of Subsumed Clauses.- Low Power and Storage Efficient Parallel Lookup Engine Architecture for IP Packets.- Assignment of OVSF Codes in Wideband CDMA.- Toward Descriptive Performance Model for OpenMosix Cluster.- Analysis of the Growth Process of Neural Cells in Culture Environment Using Image Processing Techniques.- Bandwidth-Delay Constrained Least Cost Multicast Routing for Multimedia Communication.- Cellular Probabilistic Evolutionary Algorithms for Real-Coded Function Optimization.- A New Approach for Scoring Relevant Documents by Applying a Farsi Stemming Method in Persian Web Search Engines.- FRGA Matching Algorithm in High-Speed Packet Switches.- A New Class of Data Dissemination Algorithms for Multicast Prools.- Dynamic Point Coverage in Wireless Sensor Networks: A Learning Automata Approach.- A Novel Approach in Adaptive Traffic Prediction in Self-sizing Networks Using Wavelets.- Simulative Study of Two Fusion Methods for Target Tracking in Wireless Sensor Networks.- The Advantage of Implementing Martin’s Noise Reduction Algorithm in Critical Bands Using Wavelet Packet Decomposition and Hilbert Transform.- Real-Time Analysis Process Patterns.- Selecting Informative Genes from Microarray Dataset Using Fuzzy Relational Clustering.- GMTM: A Grid Transaction Management Model.- Design of a Custom Packet Switching Engine for Network Applications.- Multiple Robots Tasks Allocation: An Auction-Based Approach Using Dynamic-Domain RRT.- Efficient Computation of N-S Equation with Free Surface Flow Around an ACV on ShirazUCFD Grid.- Enhancing Accuracy of Source Localization in High Reverberation Environment with Microphone Array.- Class Dependent LDA Optimization Using Genetic Algorithm for Robust MFCC Extraction.- TACtic- A Multi Behavioral Agent for Trading Agent Competition.- Software Reliability Prediction Based on a Formal Requirements Specification.- ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG.- The Combination of CMS with PMC for Improving Robustness of Speech Recognition Systems.- A Dynamic Multi Agent-Based Approach to Parallelizing Genetic Algorithm.- Fuzzy Neighborhood Allocation (FNA): A Fuzzy Approach to Improve Near Neighborhood Allocation in DDB.- OPWUMP: An Architecture for Online Predicting in WUM-Based Personalization System.- Artificial Intelligent Controller for a DC Motor.- A Multi-Gb/s Parallel String Matching Engine for Intrusion Detection Systems.- A Modified Version of Sugeno-Yasukawa Modeler.- Directing the Search in the Fast Forward Planning.- A Dynamic Mandatory Access Control Model.- Inferring Trust Using Relation Extraction in Heterogeneous Social Networks.- Sorting on OTIS-Networks.- A Novel Semi-supervised Clustering Algorithm for Finding Clusters of Arbitrary Shapes.- Improving Quality of Voice Conversion Systems.- Feature Selection SDA Method in Ensemble Nearest Neighbor Classifier.- A Novel Hybrid Structure for Clustering.- 6R Robots; How to Guide and Test Them by Vision?.- Hierarchical Diagnosis of Vocal Fold Disorders.- A Voronoi-Based Reactive Approach for Mobile Robot Navigation.- Evaluation of PersianCAT Agent’s Accepting Policy in Continuous Double Auction, Participant in CAT 2007 Competition.- A Framework for Implementing Virtual Collaborative Networks – Case Study on Automobile Components Production Industry.- Virtual Collaboration Readiness Measurement a Case Study in the Automobile Industry.- Facilitating XML Query Processing Via Execution Plan.- The Impact of Hidden Terminal on WMNet Performance.- Design and Implementation of a Fuzzy Accident Detector.- Approximation Algorithms for Edge-Covering Problem.- A Novel Crosstalk Estimator after Placement.- A New Operator for Multi-addition Calculations.- Quantum Differential Evolution Algorithm for Variable Ordering Problem of Binary Decision Diagram.- A Joint Source-Channel Rate-Distortion Optimization Algorithm for H.264 Codec in Wireless Networks.- Pre-synthesis Optimization for Asynchronous Circuits Using Compiler Techniques.- Absolute Priority for a Vehicle in VANET.- An Ontology Based Routing Index in Unstructured Peer-to-Peer Networks.- Two Architectural Practices for Extreme Programming.- Adaptive Target Detection in Sensor Networks.- Linear Temporal Logic of Constraint Automata.- Using Social Annotations for Search Results Clustering.- Event Detection from News Articles.- Architectural Styles as a Guide for Software Architecture Reconstruction.- Best Effort Flow Control in Network-on-Chip.- Prevention of Tunneling Attack in endairA.- Digital Social Network Mining for Topic Discovery.- Towards Dynamic Assignment of Rights and Responsibilities to Agents (Short Version).- Finding Correlation between Protein Protein Interaction Modules Using Semantic Web Techniques.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)