Skip to main content

Page of 6
and
  1. No Access

    Chapter and Conference Paper

    A Parallel Algorithm that Enumerates all the Cliques in an Undirected Graph

    In this paper a new algorithm that guarantees to enumerate all the existing cliques including the maximal clique based on set operations is presented. The first advantage of the algorithm is that it can be par...

    A. S. Bavan in Advances in Computer and Information Sciences and Engineering (2008)

  2. No Access

    Chapter and Conference Paper

    Component-Based Project Estimation Issues for Recursive Development

    In this paper we investigated the component-based specific issues that might affect project cost estimation. Component-based software development changes the style of software production. With component-based ...

    Yusuf Altunel, Mehmet R. Tolun in Advances in Computer and Information Scien… (2008)

  3. No Access

    Chapter and Conference Paper

    The sensing mechanism and the response simulation of the MIS hydrogen sensor

    The Pd0.96Cr0.04alloy gated metal-insulator-semiconductor (MIS) hydrogen sensor has been studied. A new sensing mechanism is proposed that the sensor response is related to the protons. The capacitance-voltage (C...

    Linfeng Zhang, Erik McCullen, Lajos Rimai in Advances in Computer and Information Scien… (2008)

  4. No Access

    Chapter and Conference Paper

    Power Efficiency Profile Evaluation for Wireless Communication Applications

    With the advances on semiconductor technologies, wireless communication applications are an emerging class of applications on battery powered devices. The multitude and complexity of components that implement ...

    Marius Marcu, Dacian Tudor, Sebastian Fuicu in Advances in Computer and Information Scien… (2008)

  5. No Access

    Chapter and Conference Paper

    A Test Taxonomy Applied to the Mechanics of Java Refactorings

    In this paper, we describe the automated production of all interactions between the mechanics of seventy-two refactorings proposed by Fowler in the form of chains. Each chain represents the paths a specific re...

    Steve Counsell, Stephen Swift in Advances in Computer and Information Scien… (2008)

  6. No Access

    Chapter and Conference Paper

    RFID: A New Software Based Solution to Avoid Interference

    RFID (Radio Frequency Identification) interference is one of the most important issues for RFID applications. The dense-reader mode in Class 1 Gen2 in EPC-global is one of the solutions which can reduce the in...

    Syed S. Rizvi, Eslam M. Gebriel in Advances in Computer and Information Scien… (2008)

  7. No Access

    Chapter and Conference Paper

    Available Bandwidth Based Congestion Avoidance Scheme for TCP: Modeling and Simulation

    Available bandwidth being the capacity of the tightest link along a data path established by virtual circuit service paradigm, is being proposed as an efficient congestion avoidance scheme for TCP to be deploy...

    A. O. Oluwatope, G. A. Aderounmu in Advances in Computer and Information Scien… (2008)

  8. No Access

    Chapter and Conference Paper

    A Dynamic Approach to Software Bug Estimation

    There is an increase in the number of software projects developed in a globally distributed environment. As a consequence of such dispersion, it becomes much harder for project managers to make resource estima...

    Chuanlei Zhang, Hemant Joshi in Advances in Computer and Information Scien… (2008)

  9. No Access

    Chapter and Conference Paper

    Object Normalization as Contribution to the area of Formal Methods of Object-Oriented Database Design

    An overview of the current status in the area of formal technique of object database design is described in the article. It is discussed here, why relational normalization is not able to be easy used in object...

    Vojtěch Merunka, Martin Molhanec in Advances in Computer and Information Scien… (2008)

  10. No Access

    Chapter and Conference Paper

    Routing Table Instability in Real-World Ad-Hoc Network Testbed

    In this paper we have carried out an experimental study of the stability of routing tables in a real-world ad-hoc network. Two sets of experiments were conducted, one with a static topology, and the other with...

    Tirthankar Ghosh, Benjamin Pratt in Advances in Computer and Information Scien… (2008)

  11. No Access

    Chapter and Conference Paper

    Resource Allocation in Market-based Grids Using a History-based Pricing Mechanism

    In an ad-hoc Grid environment where producers and consumers compete for providing and employing resources, trade handling in a fair and stable way is a challenging task. Dynamic changes in the availability of ...

    Behnaz Pourebrahimi, S. Arash Ostadzadeh in Advances in Computer and Information Scien… (2008)

  12. No Access

    Chapter and Conference Paper

    Innovation in Telemedicine: an Expert Medical Information System based on SOA, Expert Systems and Mobile Computing

    This paper presents Expert Medical Information System (EMIS) that supports the medical information management such as electronic health records (EHR) and it helps in the diagnostic processes. EMIS is designed ...

    Denivaldo Lopes, Bruno Abreu, Wesly Batista in Advances in Computer and Information Scien… (2008)

  13. No Access

    Chapter and Conference Paper

    A New Technique for Unequal-Spaced Channel-Allocation Problem in WDM Transmission System

    For long-haul fiber-optic transmission systems to support multiple high speed channels wavelength-division multiplexing (WDM), is currently being deployed to achieve high-capacity. It allows information to be ...

    A.B.M. Mozzammel Hossain in Advances in Computer and Information Scien… (2008)

  14. No Access

    Chapter and Conference Paper

    A Fingerprint Method for Scientific Data Verification

    This article discusses an algorithm (called "UNF") for verifying digital data matrices. This algorithm is now used in a number of software packages and digital library projects. We discuss the details of the a...

    Micah Altman in Advances in Computer and Information Sciences and Engineering (2008)

  15. No Access

    Chapter and Conference Paper

    A New Persian/Arabic Text Steganography Using “La” Word

    By expanding communication, in some cases there is a need for hidden communication. Steganography is one of the methods used for hidden exchange of information. Steganography is a method to hide the informatio...

    Mohammad Shirali-Shahreza in Advances in Computer and Information Sciences and Engineering (2008)

  16. No Access

    Chapter and Conference Paper

    A Mesoscale Simulation of the Morphology of the PEDT/PSS Complex in the Water Dispersion and Thin Film: the Use of the MesoDyn Simulation Code

    intrinsically conducting polymer. Its complex with polystyrene sulfonic acid (PSS) attracts general interest ([1] and citations therein). The dispersion of the PEDT/PSS complex is usually prepared by an oxidat...

    T. Kaevand, A. Öpik, Ü. Lille in Advances in Computer and Information Scien… (2008)

  17. No Access

    Chapter and Conference Paper

    Image Enhancement Using Frame Extraction Through Time

    Image enhancement within machine vision systems has been performed a variety of ways with the end goal of producing a better scene for further processing. The majority of approaches for enhancing an image scen...

    Elliott Coleshill, Alex Ferworn in Advances in Computer and Information Scien… (2008)

  18. No Access

    Chapter and Conference Paper

    Support Vector Machines based Arabic Language Text Classification System: Feature Selection Comparative Study

    feature selection (FS) is essential for effective and more accurate text classification (TC) systems. This paper investigates the effectiveness of five commonly used FS methods for our Arabic language TC Syste...

    Abdelwadood. Moh’d. Mesleh in Advances in Computer and Information Sciences and Engineering (2008)

  19. No Access

    Chapter and Conference Paper

    Unsupervised Color Textured Image Segmentation Using Cluster Ensembles and MRF Model

    We propose a novel approach to implement robust unsupervised color image content understanding approach that segments a color image into its constituent parts automatically. The aim of this work is to produce ...

    Mofakharul Islam, John Yearwood in Advances in Computer and Information Scien… (2008)

  20. No Access

    Chapter and Conference Paper

    Fuzzy Round Robin CPU Scheduling (FRRCS) Algorithm

    Scheduling is to determine when and on what processor each process has to run. Scheduling objectives are achieving high processor utilization; minimizing average (or maximum) response time, maximizing system t...

    M.H. Zahedi, M. Ghazizadeh, M. Naghibzadeh in Advances in Computer and Information Scien… (2008)

Page of 6