Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 72 papers published in subject: since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Flow Label Negotiation Mechanism in Heterogeneous Networks based on SIP | |||
GAO Cheng,Huang Xiaohong,Sun Qiong,Ma Yan | |||
Computer Science and Technology 05 February 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Flow Label is a 20-bit field in IPv6’s Base Header. This field is especially designed to solve the QoS problem in next generation network. However, the related research work is still far from enough to make it practical. In this paper, a framework to guarantee the QoS across multiple domains using Flow Label is discussed. Based on this framework, we enhance the SDP message and Precondition, a Flow Label negotiation mechanism using SIP is proposed. | |||
TO cite this article:GAO Cheng,Huang Xiaohong,Sun Qiong, et al. Flow Label Negotiation Mechanism in Heterogeneous Networks based on SIP[OL].[ 5 February 2009] http://en.paper.edu.cn/en_releasepaper/content/28474 |
2. The Research and Implementation of Information Customization and Active Distribution System Based on Web Service | |||
Li Ying,Hu Fei,Sun Bo | |||
Computer Science and Technology 05 February 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:“Pull” mode, the traditional access to information, has many defects, while “Push” mode is an effective solution to the vast amounts of information and information noise problems. This paper introduces an information customization and active distribution system based on web service, which featured by customized services designed templates, the required distribution of the relevant information and dynamic customization capabilities. This system uses web service to query the information the users want, which makes the date platform-independent and completely transparent to users. Information customization makes use of ontology concepts, which are related to data to give users the freedom of customization. | |||
TO cite this article:Li Ying,Hu Fei,Sun Bo. The Research and Implementation of Information Customization and Active Distribution System Based on Web Service[OL].[ 5 February 2009] http://en.paper.edu.cn/en_releasepaper/content/28471 |
3. A Practical Method of 3D Reconstruction Based on Uncalibrated Image Sequence | |||
ZHANG Ying-Kang ,XIAO Yang | |||
Computer Science and Technology 19 January 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:3D reconstruction is an important technique in the domain of computer vision. The existing systems of 3D reconstruction are often built on specialized hardware such as structured light or laser scanner with high cost. And some systems require intricate calibration procedures using complex calibration objects. These are not practical to reconstruct the 3D model of an arbitrary scene. In this paper, a flexible method of 3D reconstruction based on uncalibrated image sequence is proposed. This proposed system consist a series of processes such as feature points extraction and match, projective reconstruction, self-calibration, dense match, and finally the dense surface of 3D model can be reconstructed. Experimental results prove that this method is practical and has higher precision. | |||
TO cite this article:ZHANG Ying-Kang ,XIAO Yang. A Practical Method of 3D Reconstruction Based on Uncalibrated Image Sequence[OL].[19 January 2009] http://en.paper.edu.cn/en_releasepaper/content/28061 |
4. 2-D Directional Hybrid Transform and Medical Ultrasound Image Denoising | |||
Xiao Yang,Wen Xin-ling ,Kiseon Kim | |||
Computer Science and Technology 19 January 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Conventional 2-D discrete cosine transform (DCT) and 2-D discrete wavelet transform (DWT) don’t take image orientation information into account. Thus it becomes a key issue that how to incorporate the image orientation information into DCT and DWT for some special applications. At the same time, with the development of the ultrasonic imaging, it has become an important means of medicine diagnosis. However, speckle noise is produced in the process of the ultrasonic imaging, and it degrades the quality of the image. It is also a key issue that how to remove the speckle noise. Based on the above two issues, aiming at the sectorial ultrasound image, according to the characteristic of its emission wave of the probe of an ultrasonic machine, the paper proposes directional DCT-DWT hybrid transform, the hybrid transform is used to denoise the ultrasound image, the experiment result shows that the proposed algorithm obtained good denoise effects. | |||
TO cite this article:Xiao Yang,Wen Xin-ling ,Kiseon Kim. 2-D Directional Hybrid Transform and Medical Ultrasound Image Denoising[OL].[19 January 2009] http://en.paper.edu.cn/en_releasepaper/content/28046 |
5. Tabu Search for Floorplan Using B*-tree Representation | |||
mao fubing,Xu Ning | |||
Computer Science and Technology 12 December 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Floorplan is an very important step in the physical design of VLSI circuits. It is the rectangular packing problem: Given a set of rectangular modules, place them non-overlapping on a plane within a rectangle of minimum area. Since the variety of packing is uncountable infinite, the key issue is to find the optimal solution in the finite solution space. It is hard to be solved exactly in practical applications. An approach is presented to improve the area utilization based on B*-tree. The simulated annealing is embedded into the tabu search for floorplan. Experimental results show that our approach can improve the area utilization in short time. | |||
TO cite this article:mao fubing,Xu Ning. Tabu Search for Floorplan Using B*-tree Representation[OL].[12 December 2008] http://en.paper.edu.cn/en_releasepaper/content/26569 |
6. Web Application's Analysis and Design Based on Computer Mediated Communication | |||
wenxiu wang,siwei luo | |||
Computer Science and Technology 09 December 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper introduces and analyzes the Web applications based on the point of view of computer mediated communication through theories and examples. For instance, the Web based ICT technology was analyzed through the Media’s Law which is a general guide for communication. Meanwhile, by discussing the communication history, I try to make the computer scientists aware that they are in the process of “communication revolution” of human being and as the protagonists they should have a high point of view of the whole society when doing research or design, favoring the positive ones and avoid the negative ones as possible as they could. From this article we can see that Web applications based on computer mediated communication has already changed or impacted the whole society. However, as the degree of development of Internet, the computer mediated communication revolution is only really at the beginning. | |||
TO cite this article:wenxiu wang,siwei luo. Web Application's Analysis and Design Based on Computer Mediated Communication[OL].[ 9 December 2008] http://en.paper.edu.cn/en_releasepaper/content/26435 |
7. Research on security of e-payment in e-commerce | |||
DENG Guo-Xu,WANG Zhi-Qian | |||
Computer Science and Technology 24 September 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Electronic payment is a critical technology to ensure the normal running of electronic commerce. E-payment can work on Internet, mobile phone and PSTN. They achieve security mainly through SSL and SET. However, the detailed implementations are different. This paper researches the secure schemes of them and seeks a proper way to ensure the security of e-payment on PSTN network on which there is not even an operative method. | |||
TO cite this article:DENG Guo-Xu,WANG Zhi-Qian. Research on security of e-payment in e-commerce [OL].[24 September 2008] http://en.paper.edu.cn/en_releasepaper/content/24319 |
8. Design and Implementation of the Spatial Index Structure QER+-tree | |||
Xiaoli Qi,Chen Xiaoyun ,Ma Jun | |||
Computer Science and Technology 18 August 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:QER+-tree, a new spatial index structure based on quad-tree, R-tree and R+-tree, is proposed. Its data structure, operation algorithms and experimental results are also stated. The main thought of QER+-tree is partitioning the whole index space to multi-levels using quad-tree. Then R-tree or R+-tree is used for indexing the subspaces. This way not only restrains the query space, but also decreases the overlap of index space. In addition, QER+-tree uses the reinserting mechanism while splitting nodes. It can better the trees’ structure. So QER+-tree has more superiority than R-tree and R+-tree. | |||
TO cite this article:Xiaoli Qi,Chen Xiaoyun ,Ma Jun . Design and Implementation of the Spatial Index Structure QER+-tree[OL].[18 August 2008] http://en.paper.edu.cn/en_releasepaper/content/23410 |
9. Influence of Propagation models in Ad Hoc Networks Routing Protocols | |||
Sixte Martial Itoua | |||
Computer Science and Technology 15 April 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A mobile Ad Hoc Network is (MANET) is a network consisting of a group of wireless mobile nodes that communicate with each others without centralized control or established infrastructure. In recent years, a lot of new routing protocols have been developed in order to increase the performance of ad hoc networks. Like all wireless based system, MANET suffers for the performance limitations of a wireless channel, like the obstacle between the transmitter and the receiver. Hence the necessity of an effective mobility model which represents the moving behavior of each mobile node (MN). In this paper the performance of some of the well known ad hoc protocols is studied under different propagation models. The analysis shown that the propagation model has a deep impact on the performance of ad hoc routing protocols. | |||
TO cite this article:Sixte Martial Itoua. Influence of Propagation models in Ad Hoc Networks Routing Protocols[OL].[15 April 2008] http://en.paper.edu.cn/en_releasepaper/content/20477 |
10. An Implementation Method of Tree Structure Based on Multilevel Marking Coding Theory | |||
Wu Shengyuan | |||
Computer Science and Technology 24 March 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Based on multilevel marking coding theory,this paper presents a new tree implementation method, called as matrix-based implementation method, which can be used to implement binary tree, general tree, and any kinds of trees. Comparing to the existent implementation methods, matrix-based implementation method is simpler, the operations of tree are simplified and more efficient, and storage space can be saved | |||
TO cite this article:Wu Shengyuan. An Implementation Method of Tree Structure Based on Multilevel Marking Coding Theory[OL].[24 March 2008] http://en.paper.edu.cn/en_releasepaper/content/19618 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated