Cover Art - Volume 2 (PDF)
Title Page i - Volume 2 (PDF)
Title Page iii - Volume 2 (PDF)
Copyright Page - Volume 2 (PDF)
Table of Contents - Volume 2 (PDF)
Message from the Symposium Chairs - Volume 2 (PDF)
WCSE 2009 and IISA 2009 Organizing Committee - Volume 2 (PDF)
WCSE 2009 and IISA 2009 Committee Members - Volume 2 (PDF)
Reviewers - Volume 2 (PDF)
Energy Demand Forecast in China Based on Wavelet Neural Network (Abstract)
Multi-pose Face Detection Using Facial Features and AdaBoost Algorithm (Abstract)
An Efficient Certificate-Based Signature Scheme without Pairings (Abstract)
A Chaos-Based Blind Wavelet-Domain Watermarking Scheme Using Fast ICA (Abstract)
Research on Image Fusion Method Based on Wavelet Transform and NMF (Abstract)
Research of Distribution Line Communication Channel Characteristics (Abstract)
An ALG-Based NAT Traversal Solution for SIP-Based VoIP (Abstract)
A Rough Set and SVM Based Intrusion Detection Classifier (Abstract)
Improving the Scalability of PrivacyCAs (Abstract)
A Remote Wireless Data Acquisition System Based on Ad Hoc Network and GPRS (Abstract)
Multiple Features Human Face Tracking Based on Particle Filter (Abstract)
Deformable Surface 3D Tracking Using Linear Programming (Abstract)
The Research and Design of the Can Bus to Ethernet Gateway Based on SSL (Abstract)
A Research of DCT Algorithm Based on OMAP3530 (Abstract)
Sharing E-Government Platform Based on SOA (Abstract)
Construction of Optimal Multiwavelet and Its Application in Image Denoising (Abstract)
A Study on Service Quality Assurance in Mobile Commerce (Abstract)
Design and Implementation of a Crawling System in Shopping Search Engine (Abstract)
Alternative Formalization and Implementation of Sequential Aggregate Signatures (Abstract)
A Feature Points Matching Method for Calibration Target Images (Abstract)
Background Color Constancy Algorithm Based on Neural Network (Abstract)
The Research and Application of Functional Knowledge Ontology (Abstract)
A Novel Algorithm for the Canceling of Broadband Multi-path Interference (Abstract)
A Performance Comparison of the Ad Hoc Network Protocols (Abstract)
The Study of Color Tree Image Segmentation (Abstract)
A Source Video Identification Algorithm Based on Motion Vectors (Abstract)
Fusion Coding Algorithm of Node Energy in Wireless Sensor Networks (Abstract)
A Privacy-Preserving Book Recommendation Model Based on Multi-agent (Abstract)
Study on Strategic Factors of Software Outsourcing in China (Abstract)
A Function Testing Method for Interactive Software (Abstract)
A Watermark Embedding Algorithm Based on Low Bit Planes Fusion of DCT Space (Abstract)
A Method for Modeling Multi-task Workflow Based on High-Level Petri Nets (Abstract)
Research of Semantic Annotation Technology Based on Domain Ontology (Abstract)
Home Networking and Control Based on UPnP: An Implementation (Abstract)
Subnet Abstract and Transition Refinement in Petri Nets Model (Abstract)
Algorithm of Low Complexity Viterbi Decoder in Convolutional Codes (Abstract)
Study on the Diversity of E-Commerce Ecosystem and an Example (Abstract)
Polar Radius-Haar Wavelet Descriptor for 2D Shape (Abstract)
Watermarking-Based Authentication with Recovery Mechanism (Abstract)
The Load Optimized Distribution among Units Based on NGA (Abstract)
Resource-Constrained Project Scheduling Based on ACO-Critical Chain Method (Abstract)
The Emulation Research of Flame Detection on Fuzzy Fusion Method (Abstract)
A Very Fast Converge Method for Geometric Constraint Solving (Abstract)
Delude Remote Operating System (OS) Scan by Honeyd (Abstract)
MDA-Based Modeling and Implementation of E-Commerce Web Applications in WebML (Abstract)
Texture Analysis of Smoke for Real-Time Fire Detection (Abstract)
Customer Value Analysis Based on the Combination of Rough Set and Decision Tree (Abstract)
Construction of Workflow Management System Modeled by Roles (Abstract)
A New Algorithm for Using Dynamic Keys Encryption Video Information (Abstract)
An Introduction and Comparison of Dung's Argumentation Frameworks (Abstract)
The Fault-Tolerant Design in Space Information Processing System Based on COTS (Abstract)
Modified SPIHT Based Image Compression Algorithm for Hardware Implementation (Abstract)
Correction Methods of Near-Zero Step Error in Phase Laser Ranging (Abstract)
Research on DFA Resistant Targeted at Block Crypto Chips (Abstract)
Application of Association Rules Mining in Inventory Classification (Abstract)
Author Index - Volume 2 (PDF)
Publisher's Information - Volume 2 (PDF)