default search action
ICoC 2013: Zhangjiajie, China
- Jinshu Su, Baokang Zhao, Zhigang Sun, Xiaofeng Wang, Fei Wang, Ke Xu:
Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers. Communications in Computer and Information Science 401, Springer 2013, ISBN 978-3-642-53958-9 - Yingyou Wen, Zhi Li, Jian Chen, Hong Zhao:
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet. 1-8 - Xiushuang Yi, Yeting Han, Xingwei Wang:
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior. 9-20 - Xubo Wang, Defu Zhang, Xiangxiang Zeng, Xiaoying Wu:
A Bayesian Investment Model for Online P2P Lending. 21-30 - Weihai Li, Yunxiao Zu, Yue Jia:
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms. 31-39 - Cheng Zhang, Chunhe Xia, Haiquan Wang, Xiaojian Li:
On the Spatial-temporal Reachability of DTNs. 40-49 - Libing Wu, Ping Dang, Tianshui Yu, Lei Nie:
Research on Efficient Non-slotted Tree Structures for Advance Reservation. 50-61 - Jia Ye Chen, Wenzhong Guo:
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network. 62-73 - Kai Shuang, Peng Zhang, Sen Su:
An Efficient Lookup Service in DHT Based Communication System. 74-84 - Ying Liu, Shenglin Zhang, Hongying Liu:
An Improved Cooperative Model of P2P and ISP. 85-96 - Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:
Assessing Survivability of Inter-domain Routing System under Cascading Failures. 97-108 - Liehuang Zhu, Hao Yang, Zhenghe Yang:
The Adaptive Multicast Data Origin Authentication Protocol. 109-121 - Zhao Wei, Yanli Lv, Chunhe Xia, Yang Luo, Qing Wei:
A Computer Network Defense Policy Refinement Method. 122-133 - Yanbiao Li, Dafang Zhang, Gaogang Xie, Jintao Zheng, Wei Zhao:
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree. 134-144 - Peng Xu, Rui Hu, Sen Su:
Research on Resource Management in PaaS Based on IaaS Environment. 145-157 - Xiaoyan Liang, Liangshuang Lv, Chunhe Xia, Yang Luo, Yazhuo Li:
A Conflict-Related Rules Detection Tool for Access Control Policy. 158-169 - Pingping Lin, Jun Bi, Yangyang Wang:
East-West Bridge for SDN Network Peering. 170-181 - Tong Zhao, Shanbo Lu, Wei Yan, Xiaoming Li:
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET. 182-193 - Yang Luo, Yazhuo Li, Qing Tang, Zhao Wei, Chunhe Xia:
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach. 194-205 - Wenshan Fu, Tong Zhao, Kaigui Bian, Wei Yan:
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications. 206-217 - Xiao-han Yue, Fucai Zhou:
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation. 218-235 - Gaofeng Lv, Zhigang Sun, Yijiao Chen, Tao Li:
Towards Internet Innovation: Software Defined Data Plane. 236-247 - Peidai Xie, Yongjun Wang, Huabiao Lu, Meijian Li, Jinshu Su:
Mining Network Behavior Specifications of Malware Based on Binary Analysis. 248-255 - Ning Hu, BaoSheng Wang:
CoISM: Improving Security and Accuracy of BGP through Information Sharing. 256-265 - Yuzhong Chen, Xiaohui Qiu:
Detecting Community Structures in Social Networks with Particle Swarm Optimization. 266-275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.