default search action
CIS 2011: Sanya, Hainan, China
- Yuping Wang, Yiu-ming Cheung, Ping Guo, Yingbin Wei:
Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2008-6
Intelligent Computation
- Junfeng Chen, Tiejun Wu:
A Cloud Model Based Computational Intelligence Algorithm for Parameter Identification of Chaotic Systems. 1-5 - Dalian Liu, Jinling Du, Xiaohua Chen:
A Genetic Algorithm Based on a New Fitness Function for Constrained Optimization Problem. 6-9 - HeCheng Li:
A Genetic Algorithm Based on Duality for Linear Bilevel Programming Problems. 10-14 - Jiafei Li, Jihong Ouyang, Mingyong Feng:
A Heuristic Genetic Process Mining Algorithm. 15-19 - Jinhua Li, Jie Liu:
A Hybrid Method for Solving Global Optimization Problems. 20-23 - Ning Dong, Yuping Wang:
A Hybrid Multiobjective Differential Evolution Algorithm Based on Improved έ-Dominance. 24-28 - Xiaofang Guo:
A Hybrid Simplex Multi-objective Evolutionary Algorithm Based on Preference Order Ranking. 29-33 - Lixiao Ma, Zhanfang Zhao, Shu-Qing Chen:
A Line-up Competition Differential Evolution Algorithm for the Generalized Assignment Problem. 34-37 - Liu Jie:
A new filled function algorithm for constrained global optimization problems. 38-41 - Yuhong Duan, Yuelin Gao:
A New Improved Particle Swarm Optimization Algorithm. 42-46 - Yun Ling, Qiu-yan Cao, Hua Zhang:
Application of the PSO-SVM Model for Credit Scoring. 47-51 - Xiao-Bin Guo:
Approximate Solution of Fuzzy Sylvester Matrix Equations. 52-56 - Xiaoli Wang, Yuping Wang:
Energy-efficient Multi-task Scheduling Based on MapReduce for Cloud Computing. 57-62 - Yun-yuan Dong, Yang Jun, Qi-jun Liu, Yong-Xian Wang, Zhenghua Wang:
Exploring Centrality-Lethality Rule from Evolution Constraint on Essential Hub and Nonessential Hub in Yeast Protein-Protein Interaction Network. 63-65 - Deng-Xu He, Hua-Zheng Zhu, Gui-Qing Liu:
Glowworm swarm optimization algorithm for solving multi-constrained QoS multicast routing problem. 66-70 - Lai Nian, Jinhua Zheng:
Hybrid Genetic Algorithm for TSP. 71-75 - Ben Niu, Hong Wang, Lijing Tan, Li Li:
Improved BFO with Adaptive Chemotaxis Step for Global Optimization. 76-80 - Huirong Li, Yuelin Gao, Li Chao, Peng-Jun Zhao:
Improved differential evolution algorithm with adaptive mutation and control parameters. 81-85 - Junwei Ge, Xian Jiang, Yiqiu Fang:
Improvement of the MapReduce Model Based on Message Middleware Oriented Data Intensive Computing. 86-89 - Feng Chen, Xinxin Sun, Dali Wei:
Inertia Weight Particle Swarm Optimization with Boltzmann Exploration. 90-95 - Yan-Yan Tan, Yong-Chang Jiao, Xin-Kuan Wang:
MOEA/D with Uniform Design for the Multiobjective 0/1 Knapsack Problem. 96-100 - J. Q. Feng, C. Xu, W. X. Xie:
Monitoring the PSO Process Based on Fuzzy Random Variables. 101-105 - Jinling Du, Chunxiao Wang, Feng Zhang:
Multi-objective Optimization of Bus Dispatching Based on Improved Genetic Algorithm. 106-109 - Zhendong Liu, Zhijun Zhang, Zaixue Liu, Daming Zhu:
New Heuristic Algorithm of RNA Secondary Structure Prediction with Pseudoknots. 110-114 - Xiang You Li, Qing Xiang Zhang:
Optimality Conditions for Fractional Programming with B (p, r, a) Invex Functions. 115-118 - Shulei Wu, Huandong Chen, Dachao Li:
Phylogenetic Tree of DNA Sequences Constructed by a New Method-H Curve. 119-122 - Liumei Zhang, Jianfeng Ma, Yichuan Wang, Shaowei Pan:
PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction. 123-126 - Zhenqiu Liang:
Research of Blocking Factor Combined with Improved Ant Colony Algorithm in VRP. 127-130 - Bi-Ying Zhou:
Research on Nonlinear Predictive Control Rolling Optimization Strategy Based on SAPSO. 131-134 - Shengjie Sun, Sheng Zhong, Baihai Zhang:
Researching on the Growth Operator SWFZIRS of Growth Evolution Algorithms. 135-138 - Kai Peng, Jing Xu, Wei Liu, Xiaohui Chen, Jian Wu:
Resource Optimization for Uncertain Traffic Demand in Multi-radio Multi-channel Wireless Networks. 139-143 - Jihong Jia:
Sufficient Optimality Conditions and Duality for a Minmax Fractional Problem. 144-148 - Weiqi Chen, Zhifeng Hao, Hai-Lin Liu:
The 0/1 Multi-objective Knapsack Problem Based on Regional Search. 149-153 - Chengmin Sun, Dayou Liu:
The Overview of Feature Selection Algorithms Based Swarm Intelligence and Rough Set. 154-158 - Liping Jia, Yuping Wang, Lei Fan:
Uniform Design Based Hybrid Genetic Algorithm for Multiobjective Bilevel Convex Programming. 159-163
Intelligent Systems and Complex Systems
- Fengdan Lao, Guanghui Teng:
3G-based Remote Video Surveillance and Control System for Facility Agriculture. 164-167 - Ziqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu:
A Cloud Model Approach to the Modification of the Exponential Function Model for Software Reliability. 168-170 - You Li, Yuming Lin, Lingzhong Zhao:
A Comparative Study on Appending Priority Relations of Rules in BDI-Based Agent Model. 171-175 - Jianhui Yang, Yuan Wang:
A fuzzy portfolio model considering transaction costs. 176-179 - Xin Gao, Qingxuan Jia, Huan Hu, Hanxu Sun, Jingzhou Song:
A Human-Computer Interaction Method with Multi-Dimensional Information in the Teleoperation Augmented Reality System. 180-184 - Wei Lu, Yian Zhu, Chunyan Ma, Longmei Zhang:
A Model Driven Approach for Self-Healing Computing System. 185-189 - Jun Hu, Chun Guan:
A Model of Emotional Agent Based on Granular Computing. 190-194 - Ziqiang Luo, Peng Cao, Guochun Tang, Lihua Wu:
A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory. 195-198 - Chunsheng Li, Kan Li:
A Practical Framework for Agent-Based Hybrid Intelligent Systems. 199-203 - Lingyan Sun, Shizhan Chen, Qixuan Liang, Zhiyong Feng:
A QoS-based Self-adaptive Framework for OpenAPI. 204-208 - Jiang-feng Luo, Luohao Tang, Cheng Zhu, Wei Ming Zhang:
Action-Seeking Team Coordination for Unmanned Vehicles Team Planning. 209-213 - Liping Chen:
Adaptive Evaluation Model of Information System by Triangular Fuzzy Number. 214-218 - Cequn Fu, Shulei Wu, Sheng Zhong:
Algorithm of Distribution Estimation for Node Localization in Wireless Sensor Network. 219-221 - Xirong Xu, Aihua Deng, Wenhua Zhai:
An Important Property about Vertex Distance of Crossed Cubes CQn. 222-225 - Wenyi Zeng, Shuang Feng:
An Improvement of Comprehensive Evaluation Model. 226-230 - Lingling Hu, Haifeng Li, Xu Xu, Jian Li:
An Intelligent Vehicle Monitoring System Based on Internet of Things. 231-233 - Xiaoya Li, Songsen Yu:
An Optimal Architecture of Middle Agents in Multi-Agent Systems. 234-238 - Camilla Schwind:
Belief Base Change on Implicant Sets: How to Give Up Elements of a Belief Based on Literal Level. 239-243 - Bo Yang:
Communities Detection with Applications to Real-World Networks Analysis. 244-248 - Zhiming Wang, Hong Bao:
Cooperative Neural Network Background Model for Multi-Modal Video Surveillance. 249-254 - Hong Han, Fengju Kang, Shengjie Wang:
Design of Intelligent Decision-making System in Multi-UUV Formation Control Simulation. 255-257 - Juan Zhao, Mingchun Wang, Kun Liu, Can Wang:
Discretization Based on Positive Domain and Information Entropy. 258-262 - Jingyi Wang, Jianwen Feng, Yi Zhao:
Exponentially Synchronization of Stochastic Complex Networks with Time-varying Delays and Switching Topology via Pinning Control. 263-267 - Liu Liu, Zhenhan Liu, Lu Xu, Junwei Zhang:
FBctlr - A Novel Approach for Storage Performance Virtualization. 268-272 - Limin Han, Deyuan Gao, Xiaoya Fan, Liwen Shi, Jianfeng An:
Global Prefetcher Aggressiveness Control for Chip-Multiprocessor. 273-277 - Shaojuan Yu, Junjun Song:
Iterative Learning Control of Double Servo Valve Controlled Electro Hydraulic Servo System. 278-282 - Se-Hang Cheong, Kai-Ip Lee, Yain-Whar Si, Leong Hou U:
Lifeline: Emergency Ad Hoc Network. 283-289 - Sheng Gao, Guohui Li, Pei Zhao:
Marshmallow: A Content-Based Publish-Subscribe System over Structured P2P Networks. 290-294 - Yajuan Yang, Lian Ren:
Multi-Agents Model Analysis for the Evolution of Industrial Clusters. 295-299 - Yi Zhao, Jianwen Feng, Jingyi Wang:
On Cluster Synchronization for Linearly Coupled Complex Networks. 300-304 - Xia Liu, Chao Yang:
Optimization of Vehicle Routing Problem Based on Max-Min Ant System with Parameter Adaptation. 305-307 - Ziqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu:
Qualitative Modeling for Parallel Software System Reliability Evaluation. 308-311 - Jun Chen, Xiong Shi:
Real-time LOD Algorithm Based on Triangle Collapse Optimization. 312-315 - Fei Gong, Lun Xie, Nan Li, Zhi-Liang Wang:
Research of Rapid Attention-Information Extraction in Human-Robot Interaction. 316-320 - Yuan-xin Liang:
Robust Stability for Uncertain Neutral Systems with Time-varying and Distributed Delays. 321-324 - Yanfei Yu, Yonglin Min:
Simulation of Influence of Desired Velocity Distribution and Herd Effect on Pedestrian Evacuation. 325-328 - Qian Yin, Ruiyi Luo, Ping Guo:
Software Fault Prediction Framework Based on aiNet Algorithm. 329-333 - Hao Peifeng:
Study on Friction Coefficient Mechanism Model of Tandem Cold Mill in Unstable Condition. 334-337 - Sheng-Quan Ma, Fu-chuan Chen, Qiang Wang, Zhi-qing Zhao:
The Design of Fuzzy Classifier Based on Sugeno Type Fuzzy Complex-Value Integral. 338-342 - Yao Lu, Gang Liu, Wei Chen, Jesper Ø. Olsen:
Voice-based Local Search Using a Language Model Look-ahead Structure for Efficient Pruning. 343-347 - Yong-lin Liu, Xiao-bo Cai:
Weak-pseudo-R0 Algebras. 348-352
Neural Networks and Neural Systems
- Xingbao Gao, Jing Wang:
A Neural Network for a Class of Horizontal Linear Complementary Problems. 353-357 - Ruliang Wang, Jie Li:
Adaptive Neural Control for a Class of Perturbed Time-delay Nonlinear Systems. 358-361 - Kai Zhu, Huaguang Song, Jinzhu Gao, Guojian Cheng:
Application of Evolutionary Neural Networks for Well-logging Recognition in Petroleum Reservoir. 362-366 - Quan-ju Zhang:
Artificial Neural System Method for Solving Nonlinear Programming with Linear Equality Constraints. 367-370 - Yanshuang Meng:
Existence and Global Attractivity of Almost Periodic Solution of Hopfield Neural Networks with Time Delays. 371-374 - Xuefei Wu, Chen Xu:
Global Synchronization of Hybrid Coupled Neural Networks with Time-varying Delay. 375-380 - Tzai-Der Wang, Xiaochuan Wu, Colin Fyfe:
Minimal Echo State Networks for Visualisation. 381-385 - Gaochang Zhao:
Predictions for Coal Spontaneous Combustion Stage Based on an Artificial Neural Network. 386-389 - Shuo Wang, Kaiying Xu, Yong Zhang, Fei Li:
Search Engine Optimization Based on Algorithm of BP Neural Networks. 390-394 - Feng Guo, Chen-yu Liu, Su-qin Zhang, Bin Zhou:
Spares Consumption Prediction Based on BP Neural Network. 395-397 - Chen-yu Liu, Feng Guo, Yuan-lei Li, Su-qin Zhang:
Spares Consumption Quota Model Based on BP Neural Network. 398-400 - Yingchun Fu, Xiantie Zeng, Xueyu Lu:
Spatial Prediction of Dissolved Organic Carbon Using GIS and ANN Modeling in River Networks. 401-406 - Shujun Long, Liping Jia:
Stability Analysis of Neutral-type Fuzzy Neural Networks with Distributed Delays. 407-411 - Ming Chang, Hongwei Chen, Yingying Wang, Yueou Ren, Hao Kang:
The Application of Neural Network in the Intelligent Fault Diagnosis System. 412-415
Learning Algorithms
- Yanping Zhang, Xiaoyan Chen, Bo Hua, Yuan Zhang:
A Maximal Clique Partition Method for Network Based on Granularity. 416-420 - Huamin Feng, Xinghua Yang, Biao Liu, Chao Jiang:
A Spam Filtering Method Based on Multi-modal Features Fusion. 421-426 - Haiping Zhu, Yan Chen, Yang Yang, Chao Gao:
A Topic Partition Algorithm Based on Average Sentence Similarity for Interactive Text. 427-430 - Bing Guo, Yan Shen, Xiaobin Liu, Qi Li, Jihe Wang, Yuan Sheng Wu:
An Embedded Software Fusion Power Model Based on Algorithm and Micro-architectural Level. 431-435 - Yong Liu, Shizhong Liao:
An Error Bound for Eigenvalues of Graph Laplacian with Bounded Kernel Function. 436-440 - Zhao Liu, Rui Zhang, Denghua Mei, Xi Zheng:
An Improved Software Reliability Model Considering Fault Correction Rate. 441-444 - Yunhui He:
Class-Incremental Kernel Discriminative Common Vectors. 445-449 - Meiyin Dai, Fanzhang Li:
Dynamic Fuzzy Semisupervised Multitask Learning. 450-454 - Xiaoqiang Jia:
Feature selection algorithm based on the Community discovery. 455-458 - Peng Jin, John Carroll, Yunfang Wu, Diana McCarthy:
Improved Word Similarity Computation for Chinese Using Sub-word Information. 459-462 - Shu Zhao, Chao Xu, Yanping Zhang, Jun Ma:
Multi-Side Multi-Instance Algorithm. 463-467 - Changqing Liu, Wencai Luo:
Probabilistic Trajectory Modeling of Flight Vehicles Based on Parameter Deviations. 468-471 - Juan Enrique Agudo, Colin Fyfe:
Reinforcement Learning for the N-Persons Iterated Prisoners' Dilemma. 472-476 - Guihua Wen, Lijun Jiang:
Relative Local Mean Classifier with Optimized Decision Rule. 477-481 - Yanping Zhang, Bo Hua, Juan Jiang, Yuan Zhang, Xiaoyan Chen:
Research on the Maximum Flow in Large-scale Network. 482-486 - Jiajia Hu, Ning Wang:
The Application of Graph Theory in Old Chinese Phonology Study. 487-491 - Mengxuan Dong, Fanzhang Li:
The Estimation Algorithm of Laplacian Eigenvalues for the Tangent Bundle. 492-496 - W. Q. Zhang, C. Xu:
Time Series Forecasting Method Based on Huang Transform and BP Neural Network. 497-502
Information Security, Computer Security and Intergrity
- Baoming Qiao, Zhang Pulin, Kang Qiao:
A Digital Watermarking Algorithm Based on Wavelet Packet Transform and BP Neural Network. 503-506 - Jianhua Che, Tao Zhang, Weimin Lin, Houwei Xi:
A Markov Chain-based Availability Model of Virtual Cluster Nodes. 507-511 - Yanping Zhang, Juan Jiang, Chao Xu, Bo Hua, Xiaoyan Chen:
A New Scheme for Information Hiding Based on Digital Images. 512-516 - Yue Qi, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu:
A security testing approach for WSN protocols based on object-oriented attack model. 517-520 - Liping Qian, Lidong Wang:
A Study on IT-security Vocabulary for Domain Document Classification. 521-525 - Salvatore Distefano, Antonio Puliafito:
Achieving Distributed System Information Security. 526-530 - Ke Wang, Weidong Yang, Ji-Zhao Liu, Dan-tuo Zhang:
An Adaptive Connectivity Data Dissemination Scheme in Vehicular Ad-hoc Networks. 531-535 - Junwei Ge, Cong Tao, Yiqiu Fang:
Architecture for Component Library Retrieval on the Cloud. 536-539 - Ning Zhu, Xingyuan Chen, Yongfu Zhang:
Construction of Overflow Attacks Based on Attack Element and Attack Template. 540-544 - Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu:
Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. 545-549 - Chao Rong Li, Ming Qing Huang, Jianping Li:
Fingerprint Composition-Feature Extraction Using Directional Filter Banks. 550-554 - Shanshan Li, Yinghai Zhao:
Image Scrambling Based on Chaos Theory and Vigenère Cipher. 555-558 - Xing-Lan Zhang, Weiwei Liu:
Improving Privacy of Property-based Attestation without a Trusted Third Party. 559-563 - Jie Ling, Ju Liu, Jiande Sun, Jianping Qiao, Feng Wang, Feng Feng:
Information Hiding Algorithm Based on Stentiford Visual Attention Model. 564-567 - Bo Song, Shengwen Gong, Shengbo Chen:
Model Composition and Generating Tests for Web Applications. 568-572 - Xiang Fan, William W. Guo, Mark Looi:
Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms. 573-577 - Qi He, Huifang Li:
Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow. 578-582 - Hua Huang, Yuan Ding:
Orthogonal Test Algorithm on TD-SCDMA Network Optimization. 583-587 - Xing Yang, Yubao Liu, Zhan Li, Jiajie Mo:
Privacy Preserving Naïve Bayesian Classifier Based on Transition Probability Matrix. 588-592 - Liquan Chen, Miao Lu, Jingbo Chen:
Researches and Simulations of Information Hiding in Alamouti Transmission System. 593-597 - Huimei Wang, Ming Xian, Guoyu Wang:
Testing Anti-denial of Service Attacks Based on Mobile Agent. 598-602 - Luan Lan:
The AES Encryption and Decryption Realization Based on FPGA. 603-607 - Jihai Huang, Yu Su, Min Cao:
The Implementation of Trust Model in the P2P Patch Distribution System. 608-611
Security Methodologies and Management
- Yisheng Xue, Shulei Wu, Huandong Chen:
A Blakley Secret Sharing Scheme without Trusted Share Distributed Center. 612-614 - Jie Wang, Yongquan Cai:
A Rational Secret Sharing Scheme Based on Repeated Game. 615-619 - Chao-Qin Gao, Chuang-Bai Xiao:
A Security Model for Information Systems with Multi-level Security. 620-624 - Jianting Ning, Xinchun Yin, Ting Yang:
A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks. 625-629 - Fang Shen, Qingqi Pei, Shu-po Bu:
A Trust-based Dynamic Secure Service Discovery Model for Pervasive Computing. 630-634 - Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li:
AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. 635-639 - Litao Wang, Bin Yu:
Analysis and Measurement on the Electromagnetic Compromising Emanations of Computer Keyboards. 640-643 - Haibo Wu, Shenghui Su:
Analysis of the Success Rate of the LLL Lattice Basis Reduction. 644-647 - Shuxin Liu, Jianhua Peng, Caixia Liu:
Analysis of Wireless Mesh Network Security Based on Node Function. 648-652 - Kun Gu, Liji Wu, Xiangyu Li, Xiangxin Zhang:
Design and Implementation of an Electromagnetic Analysis System for Smart Cards. 653-656 - Jiawei Wu, Guohua Liu:
Modeling the Uncertain Data in the K-anonymity Privacy Protection Model. 657-661 - JieYuan Li, Guohua Liu:
On the Representation and Querying of Sets of Possible Worlds in the K-anonymity Privacy Protecting Model. 662-664 - Ben Niu, Hui Li, Xiaoyan Zhu, Chao Lv:
Security Analysis of Some Recent Authentication Protocols for RFID. 665-669
Network & Wireless Security
- Rongrong Jiang, Tieming Chen:
A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks. 670-673 - Yun Niu, Liji Wu, Li Wang, Xiangmin Zhang, Jun Xu:
A Configurable IPSec Processor for High Performance In-Line Security Network Processor. 674-678 - Miao Zhang, Jingying Li:
A Fast Handoff Method Based on RSSI and LQI in Wireless Sensor Network. 679-684 - Xiangdong Li, Li Chen:
A Survey on Methods of Automatic Protocol Reverse Engineering. 685-689 - Xu Xiang:
A Sybil-resilient Contribution Transaction Protocol. 690-692 - Shirui Ji, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu:
An Automated Black-box Testing Approach for WSN Security Protocols. 693-697 - JiongCheng Li, Henghui Xiao, Xibin Lin, Yanbo Zhao:
An Efficient Closed-form Solution of Synchronization and Channel Estimation in UWB. 698-702 - Weichang Li, Hongning Li, Min Xie, Shupo Bu:
An Identity-based Secure Routing Protocol in WSNs. 703-706 - Chunling Wang, Fei Yang:
An Interactive Charge Scheme with Reward and Non-repudiation. 707-711 - Xiaolong Xie, Xinsheng Ji, Caixia Liu:
Analysis of Abnormal Events in IMS and Research on the Strategy of Detection. 712-716 - Dong Li, Jiang Fei Bo:
Design of the DS-UWB Communication System Based on Chaotic Variable Spreading Factor. 717-720 - Jun Hu, Zeng Ma, Chunsheng Sun:
Energy-efficient MAC Protocol Designed for Wireless Sensor Network for IoT. 721-725 - Yong-mao Cheng, Wang-da Chen, Hui Qu, Tian-yi Cai:
Joint Synchronization and Channel Estimation Algorithm of FH-OFDM Systems in Aviation Mobile Communications. 726-730 - Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen:
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. 731-735 - Tianzhen Cheng, Ping Li, Sencun Zhu:
Multi-jammer Localization in Wireless Sensor Networks. 736-740 - Wei Li, Guangye Li, Chunlei Liu:
Query-Aware Anonymization in Location-Based Service. 741-745 - Fei Li, Shuming Xiong, Liangmin Wang:
Recovering Coverage Holes by Using Mobile Sensors in Wireless Sensor Networks. 746-749 - Yafen Shen, Jiaxi Chen, Jing Yuan, Ning Huang:
Reliability Analysis of System-in-the-Loop Network Platform Based on Delays. 750-753 - Jiang Hong Guo, Jian Feng Ma, Xiu Qiang Wu:
Secure Data Aggregation Scheme for Clustered Wireless Sensor Networks. 754-758 - Fang Qun, Wu Xu, Xu Yong:
Stochastic Modeling File Population in P2P Network. 759-763 - Guojun Zhang, Liping Chen, Weitao Ha:
The Design of Cooperative Intrusion Detection System. 764-766 - Hao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Lang Qin:
The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring. 767-770
Authentication and Authorization
- Jianrong Xi:
A Design and Implement of IPS Based on Snort. 771-773 - Huixian Li, Ping Yin, Xuan Wang, Liaojun Pang:
A Novel Hash-based RFID Mutual Authentication Protocol. 774-778 - Thomas Studer:
An Application of Justification Logic to Protocol Verification. 779-783 - Jing Qiu, Ping Wang:
An Image Encryption and Authentication Scheme. 784-787 - Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma:
Analysis of the Authentication Protocols Based on Game Theory. 788-792 - Vrizlynn L. L. Thing, Tong-Wei Chua, Ming-Lee Cheong:
Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving. 793-797 - Zhen Su, Lian-Hai Wang:
Evaluating the Effect of Loading Forensic Tools on the Volatile Memory for Digital Evidences. 798-802 - Liang Chen, Yongquan Cui, Xueming Tang, Dongping Hu, Xin Wan:
Hierarchical ID-Based Blind Signature from Lattices. 803-807 - Shaobo Wu, Chengshu Li:
Identity-based SIP Authentication and Key Agreement. 808-811 - Zhang Qun, Yingmin Wang:
Obtaining the Resonant Frequency of the Bubble in the Ship Wake by ANSYS. 812-816 - Yanqiong Zhu, Hui Xu, Zhan Gao:
Security Authentication Scheme Based on Certificateless Signature and Fingerprint Recognition. 817-820 - YunCheng Liu, Xingchun Sun, Xiaoqin Mao:
Security Problems and Countermeasures with Commercial Banking Computer Networks. 821-825 - Baojiang Cui, Ce Bian, Tao Guo, Yongle Hao, Jianxin Wang:
Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process. 826-830 - Chufeng Zeng, Qingxian Wang:
Systematical Vulnerability Detection in Browser Validation Mechanism. 831-836 - Junfeng He, Hui Sun:
The Analysis of Influence Factors of the Confidence Level on University Students' Network Shopping. 837-841 - Yi Ding, Lei Fan:
Traitor Tracing and Revocation Mechanisms with Privacy-Preserving. 842-846
Cryptography and Cryptanalysis
- Yilei Wang, Qiuliang Xu:
2-out-of-2 Rational Secret Sharing in Extensive Form. 847-851 - YinDong Chen:
A Construction of Balanced Odd-variable Boolean Function with Optimum Algebraic Immunity. 852-855 - Qing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang:
A New Cross-realm Group Password-based Authenticated Key Exchange Protocol. 856-860 - Junping Yao, Zefeng Dong, Xinshe Li:
A Novel Group Signature Scheme Based on NTRU. 861-864 - Yonglong Luo, Chao Cheng, Cai-xia Chen, Hong Zhong:
A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space. 865-869 - Yan-yan Han, Xiao-ni Cheng, Wen-cai He:
A Watermarking-based Visual Cryptography Scheme with Meaningful Shares. 870-873 - Yaobin Wang, Hong An, Zhiqin Liu, Kang Xu, Wanli Dong:
Accelerating Block Cryptography Algorithms in Procedure Level Speculation. 874-877 - Wei Fu, Guang-liang Liu:
An ID-based (k, t, n) Threshold Group Signature Scheme. 878-881 - Fei Xiang, Xiao-cong Guo:
An Image Encryption Algorithm Based on Scrambling and Substitution Using Hybrid Chaotic Systems. 882-885 - Caifen Wang, Xiaojun Cao:
An Improved Signcryption with Proxy Re-encryption and its Application. 886-890 - Na Zhao, Shenghui Su:
An Improvement and a New Design of Algorithms for Seeking the Inverse of an NTRU Polynomial. 891-895 - Xiaobo Feng, Mingqiang Wang:
Attack on the Cryptosystem Based on DLP. 896-899 - Hao Wang, Qiuliang Xu, Han Jiang, Rui Li:
Attribute-Based Authenticated Key Exchange Protocol with General Relations. 900-904 - Changji Wang, Jiasen Huang:
Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism. 905-909 - Ming Luo, Chun-hua Zou, Jianfeng Xu:
Certificateless Broadcast Signcryption with Forward Secrecy. 910-914 - Leibo Li, Tao Zhan:
Co-Z Addition Operation of Hessian Curve. 915-919 - Rui Li, Qiuliang Xu, Hao Wang:
Concurrent Non-malleable Statistically Hiding Commitment. 920-924 - Jing-feng Li, Weifeng Guo, Lai-shun Zhang, Yun-peng Li:
Cryptoanalysis and Improvement of Verifier-based Key Agreement Protocol in Cross-Realm Setting. 925-929 - Qian Zeng, Guorui Feng:
Differential Energy Watermarking Based on Macro-block Prediction. 930-933 - Yi Ding, Lei Fan:
Efficient Password-Based Authenticated Key Exchange from Lattices. 934-938 - Keke Wu, Huiyun Li, XuCheng Yin, Guoqing Xu:
Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks. 939-943 - Jinman Zhang, Qin Chen:
Hierarchical Identity-based Broadcast Encryption Scheme on Lattices. 944-948 - Xu An Wang, Ziqing Wang, Yi Ding, Shujun Bai:
K-times Proxy Re-encryption. 949-953 - Xunxun Shen, Maozhi Xu, Yanhui Zhao:
Multi-Undeniable Signature Schemes. 954-958 - Xinshan Zhu, Shuoling Peng:
Novel Quantization Watermarking Based on Random Angle Modulation. 959-963 - Xinchun Yin, Ting Yang, Jianting Ning:
Optimized Approach for Computing Multi-base Chains. 964-968 - Weidong Zhong, Xu An Wang, Ziqing Wang, Yi Ding:
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. 969-973 - Yanyan Han, Xiaoni Cheng, Dong Yao, Wencai He:
VVCS: Verifiable Visual Cryptography Scheme. 974-977
Access Control and Protection
- Yuxin Meng, Lam-for Kwok:
A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. 978-982 - Hassina Bensefia, Nacira Ghoualmi-Zine:
A New Approach for Adaptive Intrusion Detection. 983-987 - Adriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta:
A Security API for Multimodal Multi-biometric Continuous Authentication. 988-992 - Dingde Jiang, Peng Zhang, Zhengzheng Xu, Cheng Yao, Wenda Qin:
A Wavelet-Based Detection Approach to Traffic Anomalies. 993-997 - Chao Wang, Xing-yuan Chen, Na Li:
An Access Control Mode Based on Information Flow Graph. 998-1000 - Chen-Guang He, Cun-Zhang Cao, Shu-Di Bao:
An Enhanced Role-Based Access Control Mechanism for Hospital Information Systems. 1001-1005 - Hua Jiang, Liaojun Pang:
Fast Network Traffic Anomaly Detection Based on Iteration. 1006-1010 - Takamasa Isohara, Keisuke Takemori, Ayumu Kubota:
Kernel-based Behavior Analysis for Android Malware Detection. 1011-1015 - Jozsef Hegedus, Yoan Miche, Alexander Ilin, Amaury Lendasse:
Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers. 1016-1023 - Xi-hong Wu:
Performance Analysis of the Single Pattern Matching Algorithm Based on Prefix Searching. 1024-1027 - Siyuan Xin, Yong Zhao, Yu Li:
Property-Based Remote Attestation Oriented to Cloud Computing. 1028-1032 - Xiaoyi Duan, Ronglei Hu, Xiu Ying Li:
Research and Implementation of DPA-resistant SMS4 Block Cipher. 1033-1036 - JianGuo Ju, Weihe Chen, Yongzhao Zhan:
Research of Access Control in Electronic Medical Record Based on UCON. 1037-1040 - Fenghua Li, Yinyan Xu, Dongdong Li, Jinghui Zhang:
Research on Access Control Mechanism for Digital Products Trading. 1041-1045 - Zhenghong Liu, Yuhong Jia, Tieli Sun:
Study on Role-Based Access Control with Time Constraint. 1046-1048 - Li Han:
Using a Dynamic K-means Algorithm to Detect Anomaly Activities. 1049-1052
Pattern Recognithion and Knowledge Discovery
- Haifeng Zhang, Jianzhong Cao, Linao Tang, Huawei Wang:
A New Algorithm for Auto-Exposure Based on the Analogy Histogram. 1053-1056 - Wei He, Wen-Sheng Chen, Bin Fang:
A Novel Subspace Discriminant Locality Preserving Projections for Face Recognition. 1057-1061 - Yang Zheng, Chunping Liu, Zhaohui Wang, Yi Ji, Shengrong Gong:
A Saliency Detection Model Based on Multi-feature Fusion. 1062-1066 - Chen Xu, Xiaoli Sun, Min Li:
A secondary image denoising model based on the local energy operator. 1067-1070 - Hengbo Zhao, Lixiong Liu:
Active Contours with Adaptively Normal Biased Gradient Vector Flow External Force. 1071-1075 - Yan-xin Shi, Yongmei Cheng:
Adaptive Filter for Color Impulsive Removal Based on the HSI Color Space. 1076-1080 - Ji-Wei Wu, Judy C. R. Tseng, Wen-Nung Tsai:
An Efficient Linear Text Segmentation Algorithm Using Hierarchical Agglomerative Clustering. 1081-1085 - Wang Hui, Zhou Zhi Guo, Jie Long Mei:
Automatic Detection of Lumina in Mouse Liver Immunohistochemical Color Image Using Support Vector Machine and Cellular Neural Network. 1086-1090 - Taiquan Huang, Wen-Sheng Chen:
Automatic Parameter Determination Based on a Modified Discriminant Criterion for Face Recognition. 1091-1094 - Baochuan Pang, Long Zhou, Wu Zeng, Xinge You:
Cell Nuclei Detection in Histopathological Images by Using Multi-curvature Edge Cue. 1095-1099 - Bin Li, Haibo Kuang, Xiaohe Chen, Xuri Tang, Chen Chen:
Construction of a Bilingual Cognitive Property Knowledgebase. 1100-1103 - Xin Zheng, Xiumin Zhang, Fuqing Duan, Wei Liu:
Contours-Matching in Building Reconstruction from a Single Image. 1104-1108 - Taerim Lee, Bon Min Goo, Hun Kim, Sang-Uk Shin:
Efficient e-Discovery Process Utilizing Combination Method of Machine Learning Algorithms. 1109-1113 - Zheng-Chun Sun, Jian Cheng:
Face Recognition with Statistical Local Line Binary Pattern. 1114-1117 - Donghua Huang, Fuqing Duan, Qingqiong Deng, Zhongke Wu, Mingquan Zhou:
Face Reconstruction from Skull Based on Partial Least Squares Regression. 1118-1121 - Yanjun Fu, Weiqiang Wang:
Fast and Effectively Identify Pornographic Images. 1122-1126 - Yu Li, Zhou Xue:
Fast Iris Boundary Location Based on Window Mapping Method. 1127-1130 - Yiping Xu, Jing Tan, Hongping Li, Yan Tian:
Image Matching Algorithm Based on Analysis of Reliability in Log-Polar Field. 1131-1135 - Chun-Hsien Chou, Yun-Hsiang Hsu:
Image Quality Assessment Based on Binary Structure Information. 1136-1140 - Zhenglian Su, Jun Yan, Haisong Chen, Jiaojiao Zhang:
Improving the Performance of Personalized Recommendation with Ontological User Interest Model. 1141-1145 - Yuxiang Jia, Hongying Zan, Ming Fan:
Inducing Chinese Selectional Preference Based on HowNet. 1146-1149 - ShiSong Zhu, Liang Chen, Shuhong Cao:
Knowledge Discovery Method from Abnormal Monitoring Data. 1150-1153 - Fanyi Xiao, Yixiong Liang, Xiaohui Qu:
Learning Local Binary Patterns with Enhanced Boosting for Face Recognition. 1154-1158 - Souleymane Balla-Arabé, Bin Wang, Xinbo Gao:
Level Set Region Based Image Segmentation Using Lattice Boltzmann Method. 1159-1163 - Yu Hou, Caikou Chen:
Local Reconstruction Error of l2 Norm for Discriminant Feature Extraction. 1164-1168 - Junlin Hu, Ping Guo:
Multi-Level Kernel Machine for Scene Image Classification. 1169-1173 - Wenyao Zhang, Manrui Zhang, Bo Sun:
Multiresolution Streamline Placement for 2D Flow Fields. 1174-1178 - Wenzhang He, Rui Liu, Ruimin Zhao:
Parabolic Adjustment of Image Clearness Algorithm Based on Retinex Theory. 1179-1183 - Guolong Gan, Jian Cheng:
Pedestrian Detection Based on HOG-LBP Feature. 1184-1187 - Xingbao Wang, Chunping Liu, Gong Liu, Long Liu, Shengrong Gong:
Pedestrian Recognition Based on Saliency Detection and Kalman Filter Algorithm in Aerial Video. 1188-1192 - Liu Jing, Xiong Jie:
Research and Implementation on the Digital Medical Image Enhancement Methods Based on Gradient Smooth and Context Smooth. 1193-1196 - Zhenhuan He:
Research on Improved Greedy Algorithm for Train Rescheduling. 1197-1200 - Tanchao Zhu, Weiming Wang, Ping Liu, Yongming Xie:
Saliency-based Adaptive Scaling for Image Retargeting. 1201-1205 - Shenhai Yan, Yang Liu, Xiantong Huang:
Schistosoma Cercariae Image Recognition via Sparse Representation. 1206-1210 - Xiaohui Tian, Rong Wang:
Soft-Voting Classification using Locally Linear Reconstruction. 1211-1214 - Bingxin Xu, Ping Guo:
Sparse Representation for Multi-Label Image Annotation. 1215-1219 - Lifang Xue, Xiu-shuang Yi:
Speech Feature Analysis Using Temporal Linear Embedding. 1220-1223 - Yi Wang, Wenyao Zhang, Jianguo Ning:
Streamline-based Visualization of 3D Explosion Fields. 1224-1228 - Guojian Cheng, Caiyun Shi, Kai Zhu, Kevin Gong:
The Application of Binary Particle Swarm Algorithm in Face Recognition. 1229-1233 - Min Li, Chen Xu, Xiaoli Sun, Weiqiang Zhang:
The Iterative Regularization Method Based on Image Decomposition Model. 1234-1237 - Hui Liu, Chen Xu, Wenming Cao:
The Multispectral Image Edge Detection Based on Clifford Gradient. 1238-1242 - ShuangCheng Ma:
Using the Callback Function Realization Touch Screen Gestures Recognition of Computer. 1243-1245
Data Mining
- Baozhi Qiu, Shuang Wang:
A Boundary Detection algorithm of clusters based on Dual Threshold Segmentation. 1246-1250 - Jing Cai, Heng Li, Bo Lang:
A Combined Music Label Propagation Model. 1251-1255 - Rui Sun, Peng Jin, Juan Lai:
A Method for New Word Extraction on Chinese Large-scale Query Logs. 1256-1259 - Qi Luo:
A New Community Structure Detection Method Based on Structural Similarity. 1260-1262 - Qi Wang, Xin-Ping Liu:
A Real Time Multi-Scale Correlation Analysis Method and its Application on the Data Mining in Thermodynamic Process. 1263-1267 - Haifeng Li, Ning Zhang:
A Simple But Effective Stream Maximal Frequent Itemset Mining Algorithm. 1268-1272 - Jun-jie Yang, Hai-Lin:
A Weighted K-hyperline Clustering Algorithm for Mixing Matrix Estimation on Bernoulli-Gaussian Sources. 1273-1278 - Wei Li, Jibiao Liao:
An Empirical Study on Credit Scoring Model for Credit Card by Using Data Mining Technology. 1279-1282 - Chun Guan, Xiaoqin Zeng:
An Improved ID3 Based on Weighted Modified Information Gain. 1283-1285 - Xing Wang:
Analysis on Cloud Computing-based Logistics Information Network Mode. 1286-1289 - Pengyuan Liu:
Another View of the Features in Supervised Chinese Word Sense Disambiguation. 1290-1293 - Ru Xue, Zong-Sheng Wu, A.-Ning Bai:
Application of Cloud Storage in Traffic Video Detection. 1294-1297 - Lin Wang, Xiuling Zhou:
Approximation Kernel 2DPCA by Mixture of Vector and Matrix Representation. 1298-1302 - Wu Zeng, Long Zhou, Xiubao Jiang, Xinge You, Mingming Gong:
Clustering Based Image Denoising Using SURE-LET. 1303-1307 - Aijun Yang, Ping Song:
Data Mining Technique in the Internal Auditing of Enterprise Groups. 1308-1311 - Longqing Shi, Qingfeng Zhao:
Data Sources of Webometrics. 1312-1315 - Wei He, Xiaoping Yang, Dupei Huang:
Measuring Semantic Relatedness between Words Using Lexical Context. 1316-1320 - Changqing Liu, Wencai Luo:
Methodology for Statistical Distribution Determination of Various Data Sources. 1321-1324 - Huaping Jia:
Neural network in the application of EEG signal classification method. 1325-1327 - Rong Wang:
Normalizing Modularity Matrices for Data Clustering. 1328-1330 - André Fabiano de Moraes, Lia Caetano Bastos:
Pattern Recognition with Spatial Data Mining in Web: An Infrastructure to Engineering of the Urban Cadaster. 1331-1335 - Li Sun, Ming Zhu, Jiyun Li:
Promotion Analysis Based on Fitting in Multi-Level Space. 1336-1340 - Peng Lin, Jianhui Yang:
Research on characteristics of plates on Chinese stock market. 1341-1344 - Lei Zhang, Jie Liu:
Research on Industrial Building's Reliability Assessment Based on Projection Pursuit Model. 1345-1349 - Qiu Lu, Xiao-hui Cheng:
Research on Privacy-preserving in Distributed Mining Based on the Attribute Similarity. 1350-1353 - Changqing Liu, Wencai Luo:
Sequential Bayesian Method for Formulating Uncertainty in Sparse Data. 1354-1356 - Yanfei Zuo, Guohua Liu, Xiaoli Yue, Wei Wang, Honghua Wu:
Similarity Matching over Uncertain Time Series. 1357-1361 - Weidong Zhao, Xi Liu, Anhua Wang:
Simplified Business Process Model Mining Based on Structuredness Metric. 1362-1366 - Chuanyi Fu, Huandong Chen, Jieqing Xing:
Spectral Clustering and its Research Progress. 1367-1369 - Yifang Yang, Guoqiang Chen, Yanchun Guo:
SVM Combined with FCM and PSO for Fuzzy Clustering. 1370-1373 - Bingchun Lin, Guohua Liu:
The Classification of k-anonymity Data. 1374-1378 - Jiechang Wen, Taowen Wang:
The Estimation of Mixing Matrix Based on Bernoulli-Gaussian Model. 1379-1383 - Zhengfeng Ming, Rui Wen:
The Finite Element Analysis of the Electromagnetic Levitation System Based on the Large Air Gap. 1384-1386 - Yanping Cao, Chunmei Gong:
The Problem about Grey Incidence Cluster Analysis. 1387-1389 - Li Juan:
TKNN: An Improved KNN Algorithm Based on Tree Structure. 1390-1394
System Analysis and Modeling
- Wang Wei, Tan Enmin, Feng Bing:
A Data Distribution Platform Based on Event-Driven Mechanism. 1395-1399 - Qiguang Miao, Pengfei Xu, Weisheng Li, Hai Zhu:
A General Edge Detection Method Based on the Shear Transform. 1400-1404 - Yanchun Guo, Ganglian Ren, Yifang Yang:
A Lower Bound for the Smarandache Function Value. 1405-1407 - Zhenghai Ai:
A New Method for Interval Multiple Attribute Decision Making Based on Minimum Variance and Approach Degree. 1408-1412 - Hai Zhu, Zengfa Dou, Wengang Zhou:
A Novel Two-stage Analysis Method for Customer's Requirement. 1413-1417 - Xinhong Hei, Lining Chang, Weigang Ma, Guo Xie:
A Safety Framework and Alarming Model for Train Operation Environment Based on CPS. 1418-1421 - Weitao Ha:
Achievement of Proxy Cache System for Streaming Media Based on Patch Algorithm. 1422-1424 - Ziqing Nie, Shiying Yang:
An Implementation Method for Converting the Erhu Music from Wav to Mid. 1425-1429 - Wei Zhao:
Analysis of the Impact of Polarization Mode Dispersion on Optical Fiber Communication. 1430-1432 - Xin Lai, Cong Liu, Zhiying Wang, Quanyou Feng:
Analytical Models for Data Dependence Violation Checking in TLS. 1433-1437 - Jun Chen, Xiong Shi:
CFD Numerical Simulation of Exhaust Muffler. 1438-1441 - Yuxiang Yang, Gengui Zhou:
Closed-loop Supply Chain Network Horizontal Integration Problem. 1442-1446 - Tianxiang Feng, Hongxia Liu:
Computer Realization of Quadratic Spline Interpolation. 1447-1450 - Rong Shan:
Constructing the Expandability Web Service Based Linux. 1451-1455 - Hong Zhang, Sheng Zhong:
Co-op Advertising Analysis within a Supply Chain Based on the Product Life Cycle. 1456-1460 - Su Zou, Chuanri Li, Fei Xu, Liang Qiao:
Correlation Factor Analysis of FEA Model Simplification Methods of Printed Circuit Board. 1461-1465 - Qiuxiang Feng, Degen Huang, Xiuying Li, Rongpei Wang:
DBS Application to Chinese Adjectives. 1466-1470 - Chuanyi Fu, Jinmei Zhan, Juntao Chen:
Design and Implement of SerialPort class on Upper machine System. 1471-1473 - Min Luo, Haiquan Wang, Chunhe Xia, Lihua Wang, Ya Wang:
Design and Implementation of Bus Net Routing Algorithm. 1474-1478 - Jianhua Kang, Fangyi She, FangZheng Yang, Tao Wang:
Design of Instrument Control System Based on LabView. 1479-1483 - Jianhui Yang, Peng Lin:
Dynamic risk measurement of futures based on wavelet theory. 1484-1487 - Lan Li:
Existence of Almost Periodic and Almost Automorphic Solutions for Second Order Differential Equations. 1488-1492 - Feng Tian, Chenghui Zhang:
Experimental Study the Measurement of Acoustic Wave Flight Time under Strong Noise in the Boiler. 1493-1496 - Zheng Lv, Hao Chen, Feng Chen, Yi Lv:
Fast Verification of Memory Consistency for Chip Multi-Processor. 1497-1502 - Chongnan He:
Finite Volume Methods for the Second Order Singular Perturbation Problems. 1503-1506 - Guoqi Li:
FTA Based Runtime Evaluation of System Reliability for Autonomous Unmanned Vehicle. 1507-1509 - Sulin Pang, ShouYang Wang:
Geometric Recognitions Models of Fault Characteristics in Mobile Core Network. 1510-1514 - Min Jiang, Zhiqing Meng, Xinsheng Xu, Rui Shen, Gengui Zhou:
Multiobjective Interaction Programming for Two-Persons. 1515-1519 - Yanli Wang:
Multi-user Detection Method for MIMO-OFDM Uplink Transmission. 1520-1523 - Yiu-ming Cheung, Junping Deng:
Off-line Text-independent Writer Identification Using a Mixture of Global and Local Features. 1524-1527 - Feng Tian, HaiYang Wang, Xiaoping Sun, Jia Liu, Chuanyun Wang:
Optimization Plan of Using the Arrival and Departure Track in District Station Based on Hybrid Algorithm. 1528-1531 - Wei-wei Zheng, Li-gui Luo, Lei Zhao:
Qualitative Analysis for a Kind of Predator-Prey Model of Holling III-Function Response with Nonlinear Density Dependent. 1532-1535 - Jing Zhang, Jinjie Zhang:
Relative Stability of Solution for Hua's Macroeconomic Model. 1536-1538 - Ruliang Wang, Dongmei Gao, Yanbo Li:
Robust Adaptive Sliding Mode Control Design for a Class of Uncertain Neutral Systems with Distributed Delays. 1539-1541 - Ruizhong Wang:
Stock Selection Based on Data Clustering Method. 1542-1545 - Peng Sun, Xin Guo:
Structural Health Monitoring via Dynamic Visualization. 1546-1548 - Yuanguai Lin:
The Application of the Internet of Things in Hainan Tourism Scenic Spot. 1549-1553 - Daiwen Wu:
The Application Study about Lucene in Document Retrieval for Office. 1554-1556 - Chao Deng, Sulin Pang:
The BSC Alarm Management System Based on Rough Set Theory in Mobile Communication. 1557-1561 - Jiangfeng Yu, Youju Qi:
The Construction and Application of Distance and Open Experimental Platform. 1562-1565 - Jiatong Chen, Yong Wang:
The Guidance and Control of Small Net-recovery UAV. 1566-1570 - Zong-ji Li, Shan-Zheng Cheng, Lei Ren:
The Simulation of Trajectory for Homing Depth Charge Attacking the Submarine with Different Guide Orderliness. 1571-1575 - Guang Deng, Zengyuan Li:
The Study of Improved Marker-Controlled Watershed Crown Segmentation Algorithm. 1576-1579 - Xiaoying Pan, Hao Chen:
Using Organizational Evolutionary Particle Swarm Techniques to Generate Test Cases for Combinatorial Testing. 1580-1583 - Ren Liang:
VAR Model Analysis on Japan's OFDI and Industrial Structural Upgrading. 1584-1588
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.