Sciweavers

IEEECIT
2010
IEEE
13 years 1 months ago
Scalable Orchestration Strategy for Automatic Service Composition
Hiroshi Mizugai, Incheon Paik, Wuhui Chen
IEEECIT
2010
IEEE
13 years 1 months ago
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace
Face recognition has great demands in human recognition and recently it becomes one of the most important research areas of biometrics. In this paper, we present a novel layered fa...
Muhammad Imran Razzak, Muhammad Khurram Khan, Khal...
IEEECIT
2010
IEEE
13 years 1 months ago
A Photo Visualization System Considering Region of Interest
Dong-Sung Ryu, Seon-Yeong Kim, Hwan-Gue Cho
IEEECIT
2010
IEEE
13 years 1 months ago
Optimized Application and Practice of A* Algorithm in Game Map Path-Finding
Huilai Zou, Lili Zong, Hua Liu, Chaonan Wang, Zeni...
IEEECIT
2010
IEEE
13 years 1 months ago
Micromouse Competition Training Method Based on 3D Simulation Platform
This paper describes a successful integration of the IEEE micromouse competition training programme with regular undergraduate courses at Zhejiang University City College (ZUCC), H...
Meimei Huo, Jianzhong Wu, Jianping Cai, Bin Song
IEEECIT
2010
IEEE
13 years 1 months ago
SESAM: An MPSoC Simulation Environment for Dynamic Application Processing
Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. With the increase...
Nicolas Ventroux, Alexandre Guerre, Tanguy Sassola...
IEEECIT
2010
IEEE
13 years 2 months ago
Adaptive Algorithms for Efficient Content Management in Social Network Services
Identifying the set of resources that are expected to receive the majority of requests in the near future, namely hot set, is at the basis of most content management strategies of...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
IEEECIT
2010
IEEE
13 years 2 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
IEEECIT
2010
IEEE
13 years 2 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
IEEECIT
2010
IEEE
13 years 2 months ago
Using Chemical Metaphor to Express Workflow and Service Orchestration
Abstract--Nowadays, novel applications, such as personalized e-commerce services, call for cooperation across enterprise boundaries. Service-Oriented-Architecture (SOA) forms a sol...
Chen Wang, Jean-Louis Pazat