|
|
 |
|
|
8th International Conference on Computer Science and Informatics (CSI) |
|
 |
|
|
CSI-1: New Developments |
An Electron Beam Lithography Method for Curvilinear Microstructure
Zhang Yu-Lin
|
Automatic Addressing for DNA Microarray Images
Lili Ma, YangQuan Chen, Dong Chen, Bart Weimer
|
Crossing the Objective-Subjective Divide in Information Space Organization
Stephen Davies, Roger King
|
An efficient framework for data stream analysis
Gianfranco Cellarosi, Claudio Sartori
|
Comparative study of classification algorithms
M Govindarajan, Rm. Chandrasekaran, B. Palaniappan
|
Researching into human-computer interface for the remote supervision of railway
Xu Weixiang, Liu Xumin, Xu Weixiang
|
CSI-2: Design Automation |
Automatic Generation of Minimal Mismatch Layouts for Capacitors Based on SA
Di Long, Xianlong Hong, Sheqing Dong
|
A Novel Incremental Algorithm for Non-slicing Floorplan with Low Time Complexity
Liu Yang, Xianlong Hong, Sheqin Dong, Yuchun Ma
|
Heterogeneous FPGA Floorplanning Based on Instance Augmentation
Rong Liu, Sheqin Dong, Xianlong Hong
|
Temporal Floorplanning Using Probability Solution Space Smoothing
Shuyi Zheng, Sheqin Dong, Xianlong Hong
|
CSI-3: Computing Technologies |
Sufficient Conditions for Linear Dependency and Independency of Interval Vectors
Hyo-Sung Ahn, YangQuan Chen
|
Achieving Full Parallelism for Cyclo-static Data Flow Graphs with Optimized Buff
Ratnesh Verma, Dongming Peng
|
A Software Architecture Based on High-performance Middleware
Jiameng Xie, Hong Peng, Donghui Yang, Zhonghua Zhu
|
CSI-4: Game Theory I |
The Rebirth of Solved Games
T. Nakamura, A. Cincotti, H. Iida
|
Study on Loop Problem in Opening Database for Chinese Chess Programs
Jr-Chang Chen, Shi-Jim Yen, Shun-Chin Hsu
|
Master-like Opening Strategy in Computer Shogi
Jun Nagashima, Tsuyoshi Hashimoto, Hiroyuki Iida
|
Tree Search in Two-Player Games - Using Bounded Common Interest to Prune
H.H.L.M. Donkers
|
CSI-5: Game Theory II |
Soft and Hard Connectivity in Go
Keh-Hsun Chen
|
History and Territory Heuristics for Monte Carlo go
Bruno Bouzy
|
The Separation Game
Tristan Cazenave
|
The Strategies for Simple One-Point Ko Situation of Computer Go
Shi-Jie Huang, Shun-Shii Lin, Shi-Jim Yen
|
CSI-6: Graph Theory & Applications |
B-ACO for the Irregularity Sum Problems
Ay-Hwa Andy Liou, Tzong-Heng Chi, Kun-Yi Lin
|
Independent Domination on Graphs with Forbidden Vertices
William Chung-Kung Yen
|
Approximation algorithms for the generalized graph partitioning problems with restrictions
Jiping Liu, Cheng Zhao, Jian Liang Zhou
|
Efficient Approaches for Finding QoS Constrained Paths with Applications for Multicast Routing
Tzay-Farn Shih, Chao-Cheng Shih
|
CSI-7: Reliability and Security |
An Approach in Designing Authorization Layer for Web Services Software Using Sys
Weider D. Yu, Archana Mansukhani
|
Watermarking Spatial Data based on Cloud Modal
Liu Bin, Hu Qiping LiDeyi
|
Research On Markov Chain Model for System Call Anomaly Detection
QIAN Quan, WANG Xu-fa
|
A low cost RSA chip based on CRT
Min Wu, Xiaoyang Zeng, Jun Han , Yongxin Ma, Yongyi Wu, Guoquan Zhang
|
Designing of RBAC Model For Secure Multiple Domain Environments
Cungang Yang, Chang N. Zhang, Leon Pan
|
| |