[Front cover] (PDF)
[Copyright notice] (PDF)
Table of contents (PDF)
PICom-09 Organizing Committee (PDF)
Title Page i (PDF)
Title Page iii (PDF)
Message from the DASC 2009 Chairs (PDF)
DASC 2009 Organizing Committee (PDF)
DASC 2009 Program Committee (PDF)
Message from the PICom-09 Chairs (PDF)
Message from the UbiSafe-09 Chairs (PDF)
UbiSafe-09 Organizing Committee (PDF)
Message from the Routing-09 Program Chairs (PDF)
Routing-09 Organizing Committee (PDF)
Message from the SocialNet-09 Program Chairs (PDF)
SocialNet-09 Organizing Committee (PDF)
Message from the ACI-09 Chairs (PDF)
ACI-09 Organizing Committee (PDF)
Message from the SCC-09 Chairs (PDF)
SCC-09 Organzing Committee (PDF)
Message from the RIPWASS-09 Chairs (PDF)
Message from the MMASN-09 Chairs (PDF)
MMASN-09 Organizing Committee (PDF)
Message from the SmarTel-09 General Chairs (PDF)
SmarTel-09 Organizing Committee (PDF)
Message from the IISHCI-09 Program Chairs (PDF)
IISHCI-09 Organizing Committee (PDF)
Message from the TMUPS-09 Program Chairs (PDF)
TMUPS-09 Organizing Committee (PDF)
Formal Analysis of Fault Recovery in Self-Organizing Systems (Abstract)
Dependability Analysis for AADL Models by PVS (Abstract)
TCBC: Trap Caching Bounds Checking for C (Abstract)
A Rare Feature Recognition Approach Based on Fuzzy ART Neural Networks (Abstract)
Composition Planning for Networked Appliances (Abstract)
Replica Placement in Multi-tier Data Grid (Abstract)
Security Analysis of NSSK Protocol and its Improvement (Abstract)
Real Hardware Verification by Software for Bootstrap Using TSC (Abstract)
Generating an Approximately Optimal Detector Set by Evolving Random Seeds (Abstract)
Semantic Web Services Composition Model Based on Domain Ontology Cost Graph (Abstract)
Robust and Fast Keypoint Recognition Based on SE-FAST (Abstract)
Blog Hotness Evaluation Model Based on Text Opinion Analysis (Abstract)
A Web Text Filter Based on Rough Set Weighted Bayesian (Abstract)
Cooperative Alert Topic Detection Model in Distributed Environment (Abstract)
A Comparison of Social Service Selection Techniques (Abstract)
A Software Agent Based Simulation Model for Systems with Decision Units (Abstract)
Cyber-I: Vision of the Individual's Counterpart on Cyberspace (Abstract)
Performance Study of RFID Localisation in a Challenging Indoor Environment (Abstract)
Similarity Computation Using Reconfigurable Embedded Hardware (Abstract)
VDE: Seamless Mobility on Desktop Environment (Abstract)
Mobile Phones as 3-DOF Controllers: A Comparative Study (Abstract)
On-demand Query Processing in Mobile Ad Hoc Networks (Abstract)
A New Method for Coverage in Wireless Sensor Networks (Abstract)
A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network (Abstract)
An Adaptive Low Latency Cross-Layer MAC Protocol for Wireless Sensor Networks (Abstract)
Salmon: Precise 3D Contours in Real Time (Abstract)
Runtime Safety Models in Open Systems of Systems (Abstract)
People Reidentification in a Camera Network (Abstract)
Research on Parallelization of Aspect-Oriented Program (Abstract)
Reducing Program Environment Misjudgement on VM Detection Using TSC (Abstract)
Password Recovery for RAR Files Using CUDA (Abstract)
Design Optimization under Aleatory and Epistemic Uncertainties (Abstract)
An Improved Intrusion Detection Method in Mobile AdHoc Network (Abstract)
Finding Arc and Vertex-Disjoint Paths in Networks (Abstract)
Multi-metric Routing Decisions in VANET (Abstract)
Data Caching Based on Improved DGA in Ad Hoc Networks (Abstract)
A Load-Balancing and Energy-Aware Routing Protocol for MANET Accessing Internet (Abstract)
Compact Routing on Random Power Law Graphs (Abstract)
A Framework for Identifier-Based Routing for Future Internet (Abstract)
Crawling Strategy of Focused Crawler Based on Niche Genetic Algorithm (Abstract)
Influence Diagram Model with Interval-Valued Utilities (Abstract)
Fast Complex Network Clustering Algorithm Using Agents (Abstract)
Research on Network Flow Evaluation Benchmark Model (Abstract)
A Study of High Concurrency Workload Influence on Modern Processor (Abstract)
An Analysis of Security in Social Networks (Abstract)
Bowling Alone and Trust Decline in Social Network Sites (Abstract)
Designing a Network Acquisition System of Competitive Intelligence (Abstract)
Using Nature to Best Clarify Computer Security and Threats (Abstract)
SRD-DFA: Achieving Sub-rule Distinguishing with Extended DFA Structure (Abstract)
Intrusion Detection in the Cloud (Abstract)
A Design of Data Acquisition of High Speed CCD Camera (Abstract)
Public-Mailbox-Based Online Homework-Automatic-Processing Platform (Abstract)
Joint Topology-Transparent Scheduling and Multipath QoS Routing in MANETs (Abstract)
Research of Fingerprint Image Quality Estimation (Abstract)
[Roster] (PDF)
A New Connected Component Analysis Algorithm Based on Max-Tree (Abstract)
Research of Fingerprint Recognition (Abstract)
A Synthetic Network Management Model Based on ForCES FE Model (Abstract)
Realization of Intelligent Dynamic Topology Management in Next Generation Network (Abstract)
Publish and Subscribe Model Based on WS-Notification (Abstract)
Research of Summarization Extraction in Multiple Topics Document (Abstract)
Author Index (PDF)