Skip to main content

Page of 6
and
  1. No Access

    Chapter and Conference Paper

    Light Vehicle Event Data Recorder Forensics

    While traffic crash reconstruction focuses primarily on interpreting physical evidence, the proper generation and preservation of digital data from Event Data Recorders (EDRs) can provide invaluable evidence t...

    Jeremy S. Daily, Nathan Singleton in Advances in Computer and Information Scien… (2008)

  2. No Access

    Chapter and Conference Paper

    Non-Linear Control Applied to an Electrochemical Process to Remove Cr(VI) from Plating Wastewater

    In this work the process to reduce hexavalent Chromium (Cr(VI)) in an electrochemical continuous stirred tank reactor is optimized. Chromium (VI) is toxic and potentially carcinogenic to living beings. It is p...

    A. Regalado-Méndez, D. Tello-Delgado in Advances in Computer and Information Scien… (2008)

  3. No Access

    Chapter and Conference Paper

    An Analysis of Effort Variance in Software Maintenance Projects

    Quantitative project management, understanding process variations and improving overall process capability, are fundamental aspects of process improvements and are now strongly propagated by all best-practice ...

    Nita Sarang, Mukund A Sanglikar in Advances in Computer and Information Scien… (2008)

  4. No Access

    Chapter and Conference Paper

    Interactive Visualization of Data-Oriented XML Documents

    There is many data stored and exchanged in XML nowadays. However, understanding of the information included in large data-oriented XML instances may not be simple in contrast to the presentation of document-or...

    Petr Chmelar, Radim Hernych, Daniel Kubicek in Advances in Computer and Information Scien… (2008)

  5. No Access

    Chapter and Conference Paper

    Predicting Effectively the Pronunciation of Chinese Polyphones by Extracting the Lexical Information

    One of the difficult tasks on Natural Language Processing (NLP) is the sense ambiguity of characters or words on text, such as polyphones, homonymy, and homograph. The paper addresses the ambiguity and issues ...

    Feng-Long Huang, Shu-Yu Ke, Qiong-Wen Fan in Advances in Computer and Information Scien… (2008)

  6. No Access

    Chapter and Conference Paper

    Service-Oriented Context-Awareness and Context-Aware Services

    This paper describes the design, implementation, deployment, and performance evaluation of a Service-Oriented Wireless Context-Aware System (SOWCAS), a distributed pervasive system having computers, a context-...

    H. Gümüşkaya, M. V. Nural in Advances in Computer and Information Sciences and Engineering (2008)

  7. No Access

    Chapter and Conference Paper

    Application Multicriteria Decision Analysis on TV Digital

    In domains (such as digital TV, smart home, and tangible interfaces) that represent new paradigms of interactivity, deciding the most appropriate interaction design solution is a challenge. There is not yet an...

    Ana Karoline Araüjo de Castro in Advances in Computer and Information Scien… (2008)

  8. No Access

    Chapter and Conference Paper

    Comparing PMBOK and Agile Project Management software development processes

    The objective of this article is to compare a generic set of project management processes as defined in Project Management Body of Knowledge (PMBOK) with a number of agile project management processes. PMBOK i...

    P. Fitsilis in Advances in Computer and Information Sciences and Engineering (2008)

  9. No Access

    Chapter and Conference Paper

    A Model for Mobile Television Applications Based on Verbal Decision Analysis

    The emergence of Digital Television - DTV brings the necessity to select an interface that may be used in Digital Television for Mobile Devices. Many different candidate solutions for interaction applications ...

    Isabelle Tamanini, Thais C. Sampaio Machado in Advances in Computer and Information Scien… (2008)

  10. No Access

    Chapter and Conference Paper

    Grid Computing Implementation in Ad Hoc Networks

    The development of ubiquitous computing and mobility opens challenges for implementation of grid computing in ad hoc network environments. In this paper, a new grid computing implementation for ad hoc networks...

    Aksenti Grnarov, Bekim Cilku, Igor Miskovski in Advances in Computer and Information Scien… (2008)

  11. No Access

    Chapter and Conference Paper

    Securing XML Web Services by using a Proxy Web Service Model

    XML Web Services play a fundamental role in creating distributed, integrated and interoperable solutions across the Internet. The main problem that XML Web Services face is the lack of support for security in ...

    Quratul-ain Mahesar in Advances in Computer and Information Scien… (2008)

  12. No Access

    Chapter and Conference Paper

    Extension of Aho-Corasick Algorithm to Detect Injection Attacks

    In this paper we propose an extension to the Aho-Corasick algorithm to detect injection of characters introduced by a malicious attacker. We show how this is achieved without significantly increasing the size ...

    Jalel Rejeb, Mahalakshmi Srinivasan in Advances in Computer and Information Scien… (2008)

  13. No Access

    Chapter and Conference Paper

    Factors for E-Services System Acceptance: A Multivariate Analysis

    This study investigates factors that influence the acceptance and use of e-Services. The research model includes factors such as user experience, user motivation, perceived usefulness and perceived ease of use...

    Kamaljeet Sandhu in Advances in Computer and Information Sciences and Engineering (2008)

  14. No Access

    Chapter and Conference Paper

    Intuitive Interface for the Exploration of Volumetric Datasets

    Conventional human-computer interfaces for the exploration of volume datasets employ the mouse as an input device. Specifying an oblique orientation for a cross-sectional plane through the dataset using such i...

    Rahul Sarkar, Chrishnika de Almeida in Advances in Computer and Information Scien… (2008)

  15. No Access

    Chapter and Conference Paper

    Component Based Face Recognition System

    The goal of this research paper was to design and use a component based approach to face recognition and show that this technique gives us recognition rates of up to 92%. A novel graphical user interface was a...

    Pavan Kandepet, Roman W. Swiniarski in Advances in Computer and Information Scien… (2008)

  16. No Access

    Chapter and Conference Paper

    Theoretical Perspectives for E-Services Acceptance Model

    Web-based e-service user adoption and continuance requires an understanding of consumer contextual factors. In this context, e-service is referred to (interactive) service being provided on the website. This p...

    Kamaljeet Sandhu in Advances in Computer and Information Sciences and Engineering (2008)

  17. No Access

    Chapter and Conference Paper

    Construction of Group Rules for VLSI Application

    An application of cellular automata (CA) has been proposed for building parallel processing systems, cryptographic hashing functions, and VLSI technology. Recently, Das et al. have reported characterization of...

    Byung-Heon Kang, Dong-Ho Lee, Chun-Pyo Hong in Advances in Computer and Information Scien… (2008)

  18. No Access

    Chapter and Conference Paper

    On Use of Operation Semantics for Parallel iSCSI Protocol

    iSCSI [1,2], is an emerging communication protocol enabling block data transport over TCP/IP network. The iSCSI protocol is perceived as a low cost alternative to the FC protocol for networked storages [8, 9, ...

    Ranjana Singh, Rekha Singhal in Advances in Computer and Information Scien… (2008)

  19. No Access

    Chapter and Conference Paper

    Simulating VHDL in PSpice Software

    This paper incorporates the use of PSpice to simplify massive complex circuits. This involves the simulation of a VHDL based designed processor in PSpice software. After reading through the various properties ...

    Saeid Moslehpour, Chandrasekhar Puliroju in Advances in Computer and Information Scien… (2008)

  20. No Access

    Chapter and Conference Paper

    Transferable Lessons from Biological and Supply Chain Networks to Autonomic Computing

    Autonomic computing undoubtedly represents the solution for dealing with the complexity of modern computing systems, driven by ever increasing user needs and requirements. The design and management of autonomi...

    Ani Calinescu in Advances in Computer and Information Sciences and Engineering (2008)

Page of 6