IET International Conference on Frontier Computing. Theory, Technologies and Applications

Buy conference proceeding
(plus tax if applicable)
  • Location: Taichung, Taiwan
  • Conference date: 4-6 Aug. 2010
  • ISBN: 978-1-84919-208-8
  • Conference number: CP568
  • The following topics are dealt with: VoIP; grid computing; information filtering systems; data handling; hidden Markov model; user interfaces; e-learning; computer games; image processing; wireless sensor networks; access control; cryptography; and Web services.

1 - 20 of 75 items found

  • A completed partial order of ordered semi-vector space of intuitionistic fuzzy values
  • Hypermedia note taking
  • Digital game-based learning in improving students' reasoning: a pilot study
  • Constructing a multi-perspective learning environment using blog technology and topic maps
  • Digital game design principles for spatial ability enhancement
  • Using competitive digital game-based learning to improve learning motivation
  • Performance evaluation of Gfarm and GPFS-WAN in data grid environment
  • A complex event processing method based on pre-grouping for radio frequency identification data streams
  • On the study of a ubiquitous healthcare network with security and QoS
  • Hierarchical decoder for filter-based low-power BTB
  • The design of a shoulder rehabilitation game system
  • Dynamic hardware-software task switching and relocation mechanisms for reconfigurable systems
  • Embedding data and sharing original image in two stego images using Sudoku
  • Study on image feature selection: a genetic algorithm approach
  • Novel histogram equalization for image contrast enhancement with mean brightness preservation
  • Automatic optimization system for CD-phantom image quality
  • Extraction of vehicle license plate number using license plate calibration
  • Service mobility support for pervasive grid based on SIP
  • A face identification algorithm using support vector machine based on binary two dimensional principal component analysis
  • A path selection mechanism in 802.16J mobile molti-hop networks
1 2 3 4 | Next >
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address