Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)

236 authors
Li, Wei
A Novel Causal Model Based Distributed Fault Detection Method For Locomotive Electric Traction System
Li, Enhui
Research on LBS-based Optimizing Personal Recommendation System
Li, Hao-zhan
The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road
Li, Jiaxin
Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability
Lin, Huey-Yeh
Malicious Website Detection Based on Honeypot Systems
Lin, Chih-Jer
Path Planning of a Mobile Robot Using Real-coded Genetic Algorithm Based Simultaneous Exploration
Lin, Xiaola
Cbufferless: A Novel Congestion Control for Bufferless Networks On-Chip
Lin, Cong
Tracking Object Using Particle Filter and DCT features
Lishou, Claude
S-wane Model Designed to Improve Security Association Negotiation Process in IPv6
Liu, Fanjun
A Neural Network Enhanced Stereo Vision Obstacle Detection and Avoidance System for Unmanned Ground Vehicle
Liu, Cheng-Hsin
Path Planning of a Mobile Robot Using Real-coded Genetic Algorithm Based Simultaneous Exploration
Liu, Tieying
A Venture Capital Assessment Model based on the Genetic Neural Network
Liu, Zhongwen
Nonlinear Cointegration Analysis Based on Support Vector Machines and Its Application to the Connection between Financial Markets
Liu, Hongjiang
Research on Virtual Interactive Sand Table for Showing of Energy Conservation Data
Liu, Qiangbo
The Research on Attack Threat Sensing based on "Software Security Sensor"
Liu, Xiaowei
Generating Power-Efficient Query Execution Plan
Liu, Jianyi
Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability
López-Franco, Carlos
Rough Terrain Perception Through Geometric Entities for Robot Navigation
Luo, Xiaoyue
Statistical Properties of Chinese Near-synonyms Network
Ma, Liping
An Efficient Algorithm of Convex Hull for Very Large Planar Point Set
Manas, Jakub
Power Quality Improvement by Shunt Active Performance Filters Emulated by Artificial Intelligence Techniques
Martinek, Radek
Power Quality Improvement by Shunt Active Performance Filters Emulated by Artificial Intelligence Techniques
Masrom, Maslin
An Examination of the Concept of Smart School: An Innovation to Address Sustainability
Meena, Jha
Comparison of Modernization Approaches: With and Without the Knowledge Based Software Reuse Process
Mohamed, Abr
Sequential QoS Mapping Model for Multi-layerVideo Delivery in 802.11e Wireless Networks
Mohamed Farssi, Sidi
Using of Polar Codes in Steganography
Mouhamed Farssi, Sidi
S-wane Model Designed to Improve Security Association Negotiation Process in IPv6
Mudassar, Ahmed
IROTS: A Proposed COTS Evaluation & Selection Methodology for Component Based Software Engineering in Under-Development Countries
Nemuraite, Lina
Lightweight Model Driven Process to Ensure Model Traceability and a Case for SYSMOD
Norhamreeza Abdul, Hamid
Reducing Falsely Detected JPEG’s Fragmentation Point Using Unique Hex Patterns (UHP)
Nurul Azma, Abdullah
Reducing Falsely Detected JPEG’s Fragmentation Point Using Unique Hex Patterns (UHP)
O'Brien, Liam
Comparison of Modernization Approaches: With and Without the Knowledge Based Software Reuse Process
Omidinia, Siavash
An Examination of the Concept of Smart School: An Innovation to Address Sustainability
Pan, Ying
The Application of Chaos Immune Genetic Algorithm in Sequencing Problem of Sports Meeting
Pavalkis, Saulius
Lightweight Model Driven Process to Ensure Model Traceability and a Case for SYSMOD
Pun, Chi-Man
Tracking Object Using Particle Filter and DCT features
Qiu, Lin
A Chinese Word Clustering Method Using Latent Dirichlet Allocation and K-means
Qiu, Yangfan
A New Call Admission Control Strategyfor LTE Femtocell Networks
Rato, Luis
Improving Performance of Classifiers using Rotational Feature Selection Scheme
Rehr, J.J.
Integrated Scientific Cloud Computing WorkflowsSC2IT: A Toolkit to Bring Novel Computational Science to Non-specialists
Romdhani, Lamia
Sequential QoS Mapping Model for Multi-layerVideo Delivery in 802.11e Wireless Networks
Rosziati, Ibrahim
Reducing Falsely Detected JPEG’s Fragmentation Point Using Unique Hex Patterns (UHP)
Roychowdhury, Joydeb
Energy Aware Battery Powered Electric Vehicles:A Predictive Model Driven Approach
Rubiyah, Yusof
Clustering the Tropical Wood Species Using Kohonen Self-Organizing Map (KSOM)
Rui, Qiang
The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road
Saha, Indrajit
Improving Performance of Classifiers using Rotational Feature Selection Scheme
Schmidt, S.
Service Oriented Cost AccountingUtilization-based Accounting and Charging of IT Service Costs
Schwarz, Christopher
Service Oriented Cost AccountingUtilization-based Accounting and Charging of IT Service Costs
Selamat, Harihodin
An Examination of the Concept of Smart School: An Innovation to Address Sustainability
Sellner, A.
Service Oriented Cost AccountingUtilization-based Accounting and Charging of IT Service Costs
Shakeel Faridi, M.
IROTS: A Proposed COTS Evaluation & Selection Methodology for Component Based Software Engineering in Under-Development Countries
Shen, Hao
Statistical Properties of Chinese Near-synonyms Network
Shen, Chuanhe
Nonlinear Cointegration Analysis Based on Support Vector Machines and Its Application to the Connection between Financial Markets
Sidzina, Marcin
Shortening of the Automata Cycle of Industrial Communication System Nodes
Song, Meiyan
Relationship between Capital Structure and Performance Evidence based on Information Technology Industry
Stój, Jacek
Shortening of the Automata Cycle of Industrial Communication System Nodes
Su, Fu-shun
Design and Implementation of a High-Speed Data Transmission System Based on PCI-Express Protocol
Su, Chao
Study on Information Service Push Strategy based on Networked Manufacture
Sun, Yao
The Design and Implementation of Cloud Storage SystemBased on Hiphop-php
Sunil, Gupta
Using Fuzzy Inference System to Develop an Optimal Tube Voltage and Tube Current Chart for Radiation Reduction in Pediatric CT Examinations
Sylla, K.
Using of Polar Codes in Steganography
Szolomicki, Jerzy
Computer Implementation for Analysis of Complex Masonry Shell Structures
Talange, B.D.
Fractional Order Modeling and Control of Depth System of AUV A Case Study
Talange, D.B.
Low Voltage Ride through Capability Improvement of DFIG using Feed Forward Current Regulator
Tall, K.
Using of Polar Codes in Steganography
Thulasiram, Ruppa
Task Level Parallelization of All Pair Shortest Path Algorithm in OpenMP 3.0
Thulasiraman, Parimala
Task Level Parallelization of All Pair Shortest Path Algorithm in OpenMP 3.0
Timchenko, Leonid
Application of parallel-hierarchical transformations for rapid recognition of dynamic images based on GPU technology
Tudor, Christiana
RESTful Digital Web Services for Market Price Forecasting with RAn Application on Equity Markets Using Garch Models
Valencia-Murillo, Roberto
Rough Terrain Perception Through Geometric Entities for Robot Navigation
Wane Keïta, Khadidiatou
S-wane Model Designed to Improve Security Association Negotiation Process in IPv6
Wang, Pu
Longitudinal Data Based Research on Web User Interests Drift Modeling
Wang, Lanmei
High Resolution DOA Estimation Algorithm based on Nonuniform L-shaped Array
Wang, Guibao
High Resolution DOA Estimation Algorithm based on Nonuniform L-shaped Array
Wang, Jinbao
An Energy-Efficient Data Placement Algorithm and Node Scheduling Strategies in Cloud Computing Systems
Wang, Huaijun
Effectiveness Evaluation of Software Protection based on SAMMPN
Wang, Ni
Effectiveness Evaluation of Software Protection based on SAMMPN
Wang, Dingjiang
Stability of the Forest Evolution System with growth functions
Wang, Jeen-Shing
Accelerometer-based Energy Expenditure Estimation Methods and Performance Comparison
Wang, Jie
A Novel User Pairing Algorithm for Lte Femtocell Uplink
Wang, Xuelong
A Service Selection Conflict Avoidance Algorithm Based on Multilevel Backtracking
Wang, Jiliang
The Design and Implementation of Cloud Storage SystemBased on Hiphop-php
Wang, Huaijun
The Research on Attack Threat Sensing based on "Software Security Sensor"
Wang, Dali
Using Fuzzy Inference System to Develop an Optimal Tube Voltage and Tube Current Chart for Radiation Reduction in Pediatric CT Examinations
Wang, Pengfei
Survivability-Oriented APT Penetration Analysis
Wang, Hong-yan
The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road
Wang, Tao
The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road
Wang, Jinbao
Generating Power-Efficient Query Execution Plan
Wang, Haijie
Generating Power-Efficient Query Execution Plan
Wang, Chunhua
Relationship between Capital Structure and Performance Evidence based on Information Technology Industry
Wang, Jie
A New Call Admission Control Strategyfor LTE Femtocell Networks
Wang, Ying
The Research on NSC Key Service Mechanism in Mobile Network
Wu, Jun
BTS-SRP: An Energy-Efficient Concurrency Control Protocol for Embedded Real-Time Systems
Wu, Jun-Xing
BTS-SRP: An Energy-Efficient Concurrency Control Protocol for Embedded Real-Time Systems
Wu, Qiong-zhi
Design and Implementation of a High-Speed Data Transmission System Based on PCI-Express Protocol
Xia, Yan
Automatic Panorama Recognition and Stitching Based on Graph Structure
Xiao, Feng
Statistical Properties of Chinese Near-synonyms Network
Xiao, Yanwen
An Energy-Efficient Data Placement Algorithm and Node Scheduling Strategies in Cloud Computing Systems
Xie, Yu
Design of a Control System of Single-Head Pneumatic Hinging Machine Based on STC90C58
Xing, Yang
Design and Implementation of a High-Speed Data Transmission System Based on PCI-Express Protocol