default search action
ICYCS 2008: Zhang Jia Jie, Hunan, China
- Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3398-8
- Ebrahim Malalla:
Multiple-Choice Allocations with Fixed Densities. 1-8 - Dongmei Lin, Xiangbin Wu, Dong Wang:
Exact Heuristic Algorithm for Traveling Salesman Problem. 9-13 - Wanfu Ding, Ruifeng Guo:
Design and Evaluation of Sectional Real-Time Scheduling Algorithms Based on System Load. 14-18 - Yaohui Li, Yong Feng, Jiwei Xue:
An Improved Method for Computing Dixon Polynomial. 19-24 - Xiaogang Qi, Lifang Liu, Sanyang Liu:
An Algorithm for Dynamic Optimal Path Selection with Constraint. 25-30 - Xianxia Zou, Weijia Jia, Jiuhui Pan, Wei Du:
The Partition Transform Algorithm of Join Query. 31-35 - Bo Li, Hong Li, Min Wu, Ping Li:
Multi-label Classification based on Association Rules with Application to Scene Classification. 36-41 - Xiaohua Liu, Chunguang Zhou, Libiao Zhang, Huipeng Sheng, Jiangchun Li:
Quick Searching Based on L-K Means Hierarchical Clustering in a Huge Scale Face Database. 42-47 - Yang Li, Yan Sun, Chengshan Han, Xiaodong Wang, Shuyan Xu:
Algorithm Research of Flexible Graphplan based on Heuristic. 48-53 - Tian Xia:
An Edit Distance Algorithm with Block Swap. 54-59 - Tianyan Deng, Daoyun Xu:
Hardness of Approximation Algorithms on k-SAT and (k, s)-SAT Problems. 60-64 - Xiuqin Wang, Hao Wang, Guangsheng Ma:
Hybrid SAT Solver Considering Circuit Observability. 65-70 - Qiang Zou, Dan Feng:
OpenMail File System Workloads Analysis and Characterization. 71-76 - Yunhui Shi, Shaoyuan Yue, Baocai Yin, Yi Huo:
A Novel ROI-Based Rate Control Scheme for H.264. 77-81 - Jia Wu, Ling Chen:
A Fast Frequent Subgraph Mining Algorithm. 82-87 - Jitian Xiao, Jun Wang:
A Type of Variation of Hamilton Path Problem with Applications. 88-93 - Chenguang Luo:
From Word Automata to Tree Automata. 94-99 - Ebrahim Malalla:
Estimation of the k-Orientability Threshold. 100-105 - Bin Yao, Haisen S. Li, Tian Zhou, Baowei Chen:
Theoretical Research on Topological Properties of Generalized K-Ary n-Cube Interconnection Network. 106-111 - Sheng Zhang, Xiaoling Bao, Jian Shu, Sha Chen:
Comparative Research of XML Compression Technologies. 112-117 - Zhiming Chang, XinJun Mao, Zhichang Qi:
Formal Analysis of Architectural Policies of Self-Adaptive Software by Bigraph. 118-123 - Guisheng Fan, Huiqun Yu, Dongmei Liu, Liqiong Chen:
Modeling and Analyzing Time Constrains for Service Composition. 124-129 - Shukuan Lin, Shaomin Zhang, Jianzhong Qiao, Hualei Liu, Ge Yu:
A Parameter Choosing Method of SVR for Time Series Prediction. 130-135 - Lasheng Yu, Fei Hong, PengRen Wang, Yang Xu, Yong Liu:
Influence Graph based Task Decomposition and State Abstraction in Reinforcement Learning. 136-141 - Chihang Yau, Yiyu Tan, Anthony Shi-Sheung Fong, Pak Lun Mok:
An Extensive Hardware/Software Co-design on a Descriptor-Based Embedded Java Processor. 142-147 - Rui Gong, Kui Dai, Zhiying Wang:
Transient Fault Recovery on Chip Multiprocessor based on Dual Core Redundancy and Context Saving. 148-153 - Wanxia Qu, Yang Guo, Zhengbin Pang, Xiaodong Yang:
Efficient Verification of Parameterized Cache Coherence Protocols. 154-159 - Yu Deng, Li Wang, Xiaobo Yan, Xuejun Yang:
A Double-Buffering Strategy for the SRF management in the Imagine Stream Processor. 160-165 - Jieqiong Li, Dan Feng:
Implementation and Evaluation of a Dynamic Schedule Policy for Multi-user Request in Network-Attached Disk Array. 166-171 - Qiong Li, Zhengbin Pang, Yufeng Guo, Enqiang Zhou, Xuejun Yang:
A GPDMA-based Distributed Shared I/O Solution for CC-NUMA System. 172-177 - Jiaxin Li, Ning Deng, Caixia Liu, Mengxiao Liu, Zuo Wang, Qi Zuo:
FG-NC: A Schedule Algorithm of Designing Concurrent Multi-direction Data Switch Structure. 178-182 - Jinbing Peng, Xiang Long, Limin Xiao:
DVMM: A Distributed VMM for Supporting Single System Image on Clusters. 183-188 - Abhijit Ray, Wu Jigang, Thambipillai Srikanthan:
Performance Estimation: IPC. 189-193 - Yonggang Che:
Evaluating the Data Access Efficiency of Imagine Stream Processor with Scientific Applications. 194-199 - Xinbiao Gan, Kui Dai, Zhiying Wang:
Low-Level Component for OpenGL ES Oriented Heterogeneous Architecture with Optimization. 200-205 - Limin Fan, Yongbin Zhou, Dengguo Feng:
A Fast Implementation of Computing the Transparency Order of S-Boxes. 206-211 - Lei Wang, Zhiying Wang, Kui Dai:
Performance Bound Analysis and Retiming of Timed Circuits. 212-217 - Di Yao, Dan Feng:
Intrusion Detection for Object-Based Storage System. 218-222 - Yuanzhe Yao, Binxing Fang, Xinran Liu, Hong Zhang:
Autonomic Grid Node Organization and Management in RNMS. 223-228 - Yang Yang, Huanguo Zhang, Li Wan, Bingyu Zou:
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. 229-233 - Yufeng Wang, Akihiro Nakao:
On Evolution of Cooperative Overlay Network Based on Group Selection Mechanism. 234-239 - Chuanliang Xia:
Property Preservation by Petri-Net-Based Refinements in System Design. 240-246 - Rui Yang, Shijie Zhou, Chengyu Fan:
A New Algorithm for Network Diameter. 247-252 - Rami S. Youail, Wenqing Cheng, Shaoguo Tao:
Cost Minimization for Multi-Source Multi-Sinks Network Coding. 253-258 - Jinxiang Zhang, Jiahai Yang, Jianping Wu:
A Novel Management Information Retrieval Algorithm Based on NGI. 259-263 - Zhijian Wang, Dingguo Wei:
A Class of Petri Nets for Modular and Hierarchical System Modeling. 264-269 - Laiquan Han, Jinkuan Wang, Cuirong Wang:
A Crosslayer Concurrent Multipath Random Forward Algorithm. 270-275 - Naijing Hu, Huan Zhou, Liang Zhao:
Privacy-Preserving Query based on Virtual Organization in Grid Database. 276-281 - Zhiguang Shan, Chuang Lin:
Approximate Performance Analysis of Job Scheduling on Computational Grids. 282-287 - Bin Lu, Hongbin Zhang:
Grid Load Balancing Scheduling Algorithm Based on Statistics Thinking. 288-292 - Yi Fu, Zhigang Hu, Qingjun Zhang:
Bayesian Network based QoS Trustworthiness Evaluation Method in Service Oriented Grid. 293-298 - Xin Yu, Min Wu, Taoshen Li, Zhaowen Wei:
On Graph Embedding of Crossed Cube-Connected Ring Networks. 299-304 - Fuhong Lin, Changjia Chen, Hongke Zhang:
Characterizing Churn in Gnutella Network in a New Aspect. 305-309 - Yijun Wang, Junbin Liang, Jianxin Wang:
An Global Uneven Clustering Protocol Based on Collision Decreasing in Environment Integrated Surveillance. 310-315 - Jiawei Huang, Jianxin Wang, Yuhong Luo, Jin Ye:
A Channel-Aware Scheduling Algorithm for Improving TCP Fairness. 316-321 - Liwei Zheng, Jian Tang, Zhi Jin:
Requirement Driven Service Agent Coalition Formation and Negotiation. 322-329 - Youngkon Lee:
Quality Context Composition for Management of SOA Quality. 330-335 - Hui Ye, Zhigang Chen, QinHua Li:
Research of Improved QoS of Data Transmission in Bluetooth Mobile P2P Networks. 336-341 - Liping Liu, Anfeng Liu, Ya Gao:
Improved Algorithm for Dynamic Web Services Composition. 342-347 - Suke Li, Zhong Chen, Liyong Tang, Zhao Wang:
TSearch: A Self-learning Vertical Search Spider for Travel. 348-353 - Yonghua Xiong, Min Wu, Weijia Jia:
Rate Adaptive Real-Time Video Transmission Scheme over TCP Using Multi-Buffer Scheduling. 354-361 - Xiuwu Zhang, Weimin Lei, Wei Zhang:
Using P2P Network to Transmit Media Stream in SIP-based System. 362-367 - Jin Ye, Jianxin Wang, Qinghua Liu, Yuhong Luo:
An Improved TCP with Cross-layer Congestion Notification over Wired/Wireless Hybrid Networks. 368-373 - Bin Zeng, Dafang Zhang, Wenwei Li, Gaogang Xie, Guangxing Zhang:
Design and Implementation of a Network Behavior Analysis-Oriented IP Network Measurement System. 374-379 - Taoshen Li, Meng Xiao, Songqiao Chen, Zhihui Ge:
An Efficient Ant Colony Optimization Algorithm for QoS Anycast Routing. 380-385 - Taoshen Li, Ming Yang, Songqiao Chen, Zhigang Zhao, Zhihui Ge:
On QoS Anycast Routing Algorithm based on Particle Swarm Optimization. 386-391 - ZhiHui Lv, Yu Wu, Chuan Xiao, Shiyong Zhang, YiPing Zhong:
WSDSNM3: A Web Services-based Distributed System and Network Management Middleware Model and Scheme. 392-397 - Ai-Min Yang, Sheng-Yi Jiang, He Deng:
A P2P Network Traffic Classification Method Using SVM. 398-403 - Jie Zhang:
Optimal Model of Service Discovery Architecture Based on IMS. 404-409 - Jiaqi Liu, Zhigang Chen, Deng Li, Hui Liu:
Towards a Self-Adaptive Super-node P2P Overlay Based on Information Exchange. 410-415 - Xinlin Zhang, Huaikou Miao, Shenghong Li:
An Approach to Checking the Compatibility for Web Services Specification Based on the Typed Graph Category. 416-421 - Shengping Qin, Zhanlei Shang, Xin Zhang, Peide Liu, Zheng Zhou:
Symbol Time Error and Channel Estimation in Wireless OFDM LAN/MAN. 422-426 - Sahar Adabi, Sam Jabbehdari, Amir Masoud Rahmani, Sepideh Adabi:
SBCA: Score Based Clustering Algorithm for Mobile AD-hoc Networks. 427-431 - Sancheng Peng, Weijia Jia, Guojun Wang:
Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory. 432-438 - Dayang Sun, Yanheng Liu, Aimin Wang, Bin Ge:
Research on Service-Oriented Lifetime and Network Density in WSN. 439-444 - Feng Zeng, Zhigang Chen:
Load Balancing Placement of Gateways in Wireless Mesh Networks with QoS Constraints. 445-450 - Panlong Yang, Guihai Chen:
FAST CASH: FAir and STable Channel ASsignment on Heterogeneous Wireless Mesh Network. 451-456 - Xiao Xiao, Luming Yang, Weiping Wang, Shuai Zhang:
A Broadcasting Retransmission Approach Based on Random Linear Network Coding. 457-461 - Jinxia Liu, Naijie Gu, Songsong He:
An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor Networks. 462-468 - Quanlong Li, Luo Yu, Xiaofei Xu, Zhijia Zhao:
An Algorithm for Target Localization in Sensor Networks Based on Overlap Area Boundary of Sensor Detection. 469-474 - Anfeng Liu, Xian-You Wu, Wei-Hua Gui:
Research on Energy Hole Problem for Wireless Sensor Networks Based on Alternation between Dormancy and Work. 475-480 - Ye Yao, Vincent Hilaire, Abder Koukam, Wandong Cai:
A RIO Approach for Modeling Wireless Sensor Network. 481-486 - Hailan Shen, Deng Li, Pengfei Xu, Zailiang Chen:
Semi-Supervised Top-k Query in Wireless Sensor Networks. 487-492 - Huamei Qi, Zhigang Chen, Lianming Zhang:
Towards End-to-end Delay Bounds on WMNs Based on Statistical Network Calculus. 493-497 - Wensheng Tang, Wangqiu Kuang, Dingxing Zhang:
A Novel Approach to Mobile Positioning Tracking. 498-503 - Baoyan Song, Yanyan Cong, Jiayang Zhang, Xiaoguang Li, Ge Yu:
An Effective Approach for Continuous Window Query in Wireless Sensor Networks. 504-509 - Tengfei Zhu, Jun Peng, Ying Guo, Xiaoyong Zhang, Fu Jiang, Chunming Li:
A Distributed Power Proportional Clustering Algorithm to Improve Energy Efficiency for Wireless Sensor Networks. 510-515 - Zhuonong Xu, Jianxin Wang, Yanrong Su:
A Dynamic Spatial Backoff Algorithm Based on Channel Rate and Transmit Power in Wireless Networks. 516-521 - Diwen Wu, Dongqing Xie, Lupeng Wang:
A Deployment Algorithm to Achieve both Connectivity and Coverage in Grid Sensor Networks. 522-526 - Yuan Lu, Guojun Wang, Weijia Jia, Sancheng Peng:
Multipath-Based Segment-by-Segment Routing Protocol in MANETs. 527-532 - Weiyu Chen, Jingjing Wu, Weiwei Sun, Zhenying He:
A Location Based Execution Path Selection for Composite Service in MANETs. 533-538 - Zhuoyao Zhang, Weiwei Sun, Weiyu Chen, Jiaqi Dong:
A Lifetime Aware Approach to Service Selection in Mobile Ad Hoc Networks. 539-544 - Jin Zheng, Weijia Jia, Guojun Wang:
A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks. 545-551 - Xinhui Yuan, Songqiao Chen, Xinhua Jiang:
A Low Overhead Truthful Energy-Efficient Routing Protocol in Wireless Mobile Ad hoc Networks with Selfish Nodes. 552-557 - Baolin Sun, Chao Gui, Qifei Zhang, Bing Yan, Wei Liu:
A Multipath On-Demand Routing with Path Selection Entropy for Ad Hoc Networks. 558-563 - Jian Li, Xianwen Zeng, Qinggang Su:
Performance Investigation of Backoff Algorithms in Multihop Wireless Networks. 564-569 - Zhiwen Zeng, Anfeng Liu, Deng Li, Jun Long:
A Highly Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks. 570-575 - Bo Peng, Weiwei Sun, Jiaqi Dong, Ping Yu:
A Self-Adaptive Service Discovery Approach in Mobile Ad Hoc Networks. 576-581 - Wei Dong, Chun Chen, Jiajun Bu, Kougen Zheng, Xiaofan Wu, Guodong Teng:
A Dynamic TimeSynchronization Scheme for Multihop Sensor Networks. 582-587 - Changgeng Tan, Songqiao Chen, Wenyan Luo:
An Optimal Local Reputation System in Mobile Ad hoc Networks. 588-593 - Ronghua Shi, Yongyan Deng:
An Improved Scheme for Reducing the Latency of AODV in Ad Hoc Networks. 594-598 - Luobei Kuang, Ming Xu, Wei Yu:
EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint. 599-604 - Xiaoli Xiao, Min Huang, Weiping Zhang:
Research and Improvement on Expected Throughput Metric in Wireless Mesh Network. 605-609 - Zhuoyao Zhang, Weiwei Sun, Ping Yu, Yongrui Qin:
Preemptive Scheduling for Multi-item Queries in On-Demand Data Broadcast. 610-615 - Hui Cheng, Xingwei Wang, Min Huang, Shengxiang Yang:
A Review of Personal Communications Services. 616-621 - Haijun Li, Hongbo Zou, Peirong Ji, Xuejun Zhou:
An Algorithm for Computing 4^M-Point DFT Based on 4-Point DFT Block. 622-627 - Xiaoding Liao, Jingnan Nie, Lei Zhang:
Throughput Bounds of Unslotted CDMA Packet Networks. 628-632 - Zhihui Ge, Taoshen Li:
An Adaptive QoS-Supported Backoff Mechanism for IEEE 802.11. 633-637 - Ning Chen, Xuzhi Lai, Changbing Lu:
Controlled Clipper Method to Reduce PAPR by Tone Reservation in OFDM System. 638-642 - Ying Guo, Zhigang Chen:
Fibonacci Jacket Linear Network Codes. 643-646 - Hui Tian, Ke Zhou, Yongfeng Huang, Dan Feng, Jin Liu:
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. 647-652 - Cheng Zhang, Jianxin Liao, Xiaomin Zhu:
Probabilistic Event-Driven Heuristic Fault Localization using Incremental Bayesian Suspected Degree. 653-658 - Chun-Chao Yeh, Soun-Jan Chiang:
Revisit Bayesian Approaches for Spam Detection. 659-664 - Lasheng Yu, Emmanuel Masabo, Lian Tan, Manqing He:
Multi-Agent Automated Intelligent Shopping System (MAISS). 665-670 - Mianxiong Dong, Minyi Guo, Long Zheng, Song Guo:
Performance Analysis of Resource Allocation Algorithms Using Cache Technology for Pervasive Computing System. 671-676 - Bin Liu, Ning Shangguan, Junyi Lin, Kaiyong Jiang:
Transferring Landmarks to Individual Foot Using Deformable Template Models. 677-682 - Jie Li, Fangzhou Zhang, Yingying Niu, Xiaoyu Sheng:
Research on 3D Seismic Data Visualization System Based on Windows. 683-688 - Linlin Shui, Minyong Shi, Weiguo Lin, Jianxiang Cao:
A Chinese Paper Cut-out System Based on Decorative Pattern Recognition. 689-692 - Fawang Liu, Yunde Jia:
Human Action Recognition Using Manifold Learning and Hidden Conditional Random Fields. 693-698 - Lili Hao, Lizhu Hao:
Temporal Data Driven Naive Bayesian Text Classifier. 699-702 - Peng Xiao, Zhigang Hu, Xi Li, Liu Yang:
A Novel Statistic-based Relaxed Grid Resource Reservation Strategy. 703-707 - Xiaoli Qiu, Xun Xu, Zhonghua Ni:
Digital Product Information Sharing Based on STEP and XML. 708-713 - Anrong Xue, Xiqiang Duan, Handa Ma, Weihe Chen, Shiguang Ju:
Privacy Preserving Spatial Outlier Detection. 714-719 - Yongxiang Hu, Jingtian Tang, Hong Jiang, Sancheng Peng:
A Fast Algorithm to Estimate Mutual Information for Image Registration. 720-724 - Wei Song, ShaoZhuo Liu, Qiang Liu:
Business Process Mining Based on Simulated Annealing. 725-730 - Yanhui Fan, Hongguo Xu, Xibo Liu:
Simulation on Kinematics Law of Pedestrian in Vehicle/Pedestrian Contacting Phase. 731-736 - Peng Shi, Lianhong Ding:
A Data Sharing Platform for Materials Service Safety Appraisement. 737-741 - Yong Cao, Qingxin Zhu:
Improved Metrics for Encapsulation Based on Information Hiding. 742-747 - Dongyan Liu, Wenbo Liu, Gong Zhang:
An Adaptive Watermarking Scheme Based on Nonsubsampled Contourlet Transform for Color Image Authentication. 748-752 - Hong Shao, Yueshu Wu, Wen-cheng Cui, Jinxia Zhang:
Image Retrieval Based on MPEG-7 Dominant Color Descriptor. 753-757 - Hong Zhu, Weizhen Sun, Minhua Wu, Guixia Guan, Yong Guan:
Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter. 758-763 - Xing Yang, Chaochao Huang, Hua Yang:
Research on Adaptive Preprocessing License Plate Location. 764-768 - Wei Jiang, Dong Xiang:
A Compression Framework for Personal Image Used in Mobile RFID System. 769-774 - Jiacheng Li, Yue Chen:
A Fast Mesh Simplification Algorithm Based on Octree with Quadratic Approximation. 775-780 - Lianwei Zhang, Yan Li, Jinze Song, Meiping Shi, Xiaolin Liu, Hangen He:
A Method for Surface Reconstruction from Cloud Points Based on Segmented Support Vector Machine. 781-785 - Song Wang, Hong Li, Xia Zhu, Ping Li:
An Evaluation Index Based on Parameter Weight for Image Inpainting Quality. 786-790 - Guomin Zhang, Jianping Yin, En Zhu, Ling Mao:
On the Selection of Multi Optimal Imaging Frames in Single Time Slot for Earth Observation Satellite. 791-796 - Yan Xing, Jieqing Tan, Peilin Hong:
Quaternion Julia Fractals. 797-802 - Jianjun Qian, Weilan Wang:
Main Feature Extraction and Expression for Religious Portrait Thangka Image. 803-807 - Sen Xu, Zhimao Lu, Guochang Gu:
An Efficient Spectral Method for Document Cluster Ensemble. 808-813 - Yongmei Zhou, Jin-kuang Wang, Ai-Min Yang:
A Method of Region-based Calculating Image Similarity for RBIR System. 814-819 - Yuejian Guo, Hong Li, Wei Zhang, Yao Xiang:
Multi-source Color Transfer Based on Multi-labeled Decision Tree. 820-825 - Hailing Huang, Weiqiang Guo, Yu Zhang:
A Novel Method for Image Spam Filtering. 826-830 - Liping Lin, Pingdong Wu, Jie Huang, Jian Li:
Precise Depth Perception in Projective Stereoscopic Display. 831-836 - Zhijiao Xiao, Zhong Ming, Jianfei Yin:
Role-Oriented Workflow Modeling Based on Object Petri Net. 837-843 - WanXia Qu, Tun Li, Yang Guo, Xiaodong Yang:
Explicit Model Checking Based on Integer Pointer and Fibonacci Hash. 844-849 - Lei Jiang, Jianxun Liu:
Research on Web Services Maiden Business Trust Metrics, Appraisal and Filtration Model. 850-855 - Jian Zhang, Niya Li, Di Luo, Lili He, Chengquan Hu:
Conditional Delegation Model Based on Weighted Roles for Workflow. 856-861 - Yueping He, Ziqiang Li:
An Effective Approach for Multi-Rectangle Detection. 862-867 - Chuanming Song, Xiang-Hai Wang, Fuyan Zhang:
Research on Motion Vector Accuracy in Overcomplete Wavelet-Domain Scalable Video Coding Based on Human Visual System Characteristics. 868-873 - Jingqiao Zhang, Zhuoer Ji:
A Real-time Parallel Catmull-Clark Subdivision Algorithm on GPU. 874-879 - Guiling Wang, Shaohua Yang, Yanbo Han:
A Spreadsheet-like Construct for Streamlining and Reusing Mashups. 880-885 - Lin Liu:
A New Method for Camera Motion Estimation in Video. 886-890 - Hongshen Wang, Shusheng Zhang, Kaixing Zhang, Xiaoliang Bai:
A Shape Distributions Retrieval Algorithm of 3D CAD Models Based on Normal Direction. 891-896 - Xin Sun, Derong Shen, Zhenhua Wang, Yue Kou, Tiezheng Nie, Ge Yu:
LAD: Layered Adaptive Data Integration Architecture. 897-902 - Guodong Tang, Aina Qin:
ECG De-noising Based on Empirical Mode Decomposition. 903-906 - Jie Zhou, Hai Chen, Yue Chen:
Reconstruction of the Visual Hull with Modified Ray-tracing and Fast Slice-based Surface Extraction. 907-912 - Yibo Li, Hongjuan Qian:
Automatic Recognition System for Numeric Characters on Ammeter Dial Plate. 913-918 - Taizong Lai, Wenjun Li, Hui Liang, Xiaocong Zhou:
FRASCS: A Framework Supporting Context Sharing. 919-924 - Xin Chen, Yueshan Xiong:
Generation of Three-Dimensional Finite Element Meshes from CT Dataset of Human Femurs. 925-930 - Yun-Qian Qu, Jian-Min Yao, Jun Sun, Meng Sun:
OOV Translation Mining from Mixed-Language Snippets from a Search Engine. 931-935 - Xingbo Jiang, Xiaoqing Lu, Chengcheng Liu, Monan Li:
A Hybrid Algorithm for Solving the Optimal Layout Problem of Rectangular Pieces. 936-941 - Qi Li, Huadong Ma, Shuo Feng:
A Robust Endpoint Detection Algorithm for Video Caption Generation. 942-946 - Jie Hao, Silong Peng:
HJ-hPl: Hierarchical Mixed-Size Placement Algorithm with Priori Wirelength Estimation. 947-952 - Yue Liu, Yafeng Yin, Junjun Gao, Chongli Tan:
Wrapper Feature Selection Optimized SVM Model for Demand Forecasting. 953-958 - Ningning Ma, Chao Li, Airong Jiang, Chunxiao Xing:
Design and Implementation of Open Source Based Digital Preservation Experimental Platform (THDP). 959-964 - Gang Chen:
A Design of Data Rebuilding for Decision Support in E-Government System. 965-970 - Xiyuan Chen, Ouyang Yang, Miaoliang Zhu, Yan He:
Semantic-Aware Access Control for Grid Application. 971-975 - Shuqin Wang, Chunbao Zhou, Yingsi Wu, Jianxin Wang, Chunguang Zhou, Yanchun Liang:
A Novel Approach for Classifying Human Cancers. 976-981 - Shu-Xue Zou, Yanxin Huang, Yan Wang, Jianxin Wang, Chunguang Zhou:
SVM Learning from Imbalanced Data by GA Sampling for Protein Domain Prediction. 982-987 - Xingbao Liu, Zixing Cai, Chixin Xiao:
Fast Mutation Operator Applied in Detector Generating Strategy. 988-993 - Shanhong Zheng, Chunguang Zhou, Yanwen Li, Guixia Liu:
Research on Signaling Pathway Reconstruction Based on HMM. 994-999 - Jia Liang, Yuanquan Wang:
Improved GVF Based Left Ventricle Segmentation from Cardiac MR Images Using Radial B-Snake Model. 1000-1005 - Jing Zhang, Yang Liu, Seok-Wun Ha:
A Novel Approach of Face Detection based on Skin Color Segmentation and PCA. 1006-1011 - Jingli Wu, Jianxin Wang, Jianer Chen:
A Genetic Algorithm for Single Individual SNP Haplotype Assembly. 1012-1017 - Min Li, Jianxin Wang, Jianer Chen, Bin Hu:
Greedily Mining l-dense Subgraphs in Protein Interaction Networks. 1018-1023 - Yangyi Sui, Lili Pang, Jun Lin, Xiaotuo Zhang:
Dataflow Visual Programming Language Debugger Supported by Fisheye View. 1024-1029 - Ge Hu, Shengbing Ren, Xie Wang:
A Comparison of C/C++-based Software/Hardware Co-design Description Languages. 1030-1034 - Bin Wang, Jian Ding, Wei Zhu, Yunqiao Tan, Jinfang Sheng:
Research on Model of Dual Core Aspectual Middleware & Dynamic Weaving Technology. 1035-1040 - Lingli Li, Hongzhi Wang, Jianzhong Li, Jizhou Luo:
Efficient Top-k Keyword Search on XML Streams. 1041-1046 - Yong Dong, Juan Chen, Xuejun Yang, Canqun Yang, Lin Peng:
Low Power Optimization for MPI Collective Operations. 1047-1052 - Xiangdong Lei, Wuke Li, Xiaoli Yuan:
Scheduling Real-Time Nested Transactions in Mobile Broadcast Environments. 1053-1058 - Zhijian Wang:
A Subsystem Division Method by Clustering. 1059-1063 - Wei Jiang, Guangze Xiong, Xuyang Ding:
Energy-Saving Service Scheduling for Low-End Cyber-Physical Systems. 1064-1069 - Lijun Lun, Hui Xu:
An Approach to Software Architecture Testing. 1070-1075 - Lili Pan, Beiji Zou, Hao Chen, Haoyu Zhou:
Research on Translucent Mechanism-Based Infeasible Path. 1076-1081 - Xiaodong Huang, Huadong Ma, Haidong Yuan:
Video Mosaic Block Detection Based on Template Matching and SVM. 1082-1086 - Huan Wang, Xiaomin Shi, Yan Li, Heng Chang, Weiliang Chen, Jie Tang, Eduardo Martins:
User Profile Management for Personalized Telecom Service. 1087-1092 - Jun Zhu, Changguo Guo, Quan Yin, Jianlu Bo, Quanyuan Wu:
A Runtime-Monitoring-Based Dependable Software Construction Method. 1093-1100 - Zhiyong He, Kerong Ben, Zhixiang Zhang:
Software Architectural Reflection Mechanism for Runtime Adaptation. 1101-1105 - Fangyuan Zheng, Hao Hu, Jian Lü:
Applying a Component Behavior Model to MVC Pattern. 1106-1111 - Hongfang Gong, Junyi Li:
Generating Test Cases of Object-Oriented Software Based on EDPN and Its Mutant. 1112-1119 - Lingfei Zhang, Gang Chen, Dong Ye, Rensheng Che:
A Fast Center of Mass Estimation Algorithm for Coordinates of IR Markers. 1120-1125 - Juntao Gao, Li Zhang, Zhiyao Wang:
Decision Support in Procuring Requirements for ERP Software. 1126-1131 - Bao Liang, Xiaoguang Hong, Lei Zhang, Shuai Li:
Extended MRI-Cube Algorithm for Mining Multi-Relational Patterns. 1132-1136 - Fengliang Qi, Beihong Jin, Haibiao Chen, Zhenyue Long:
An Efficient Primitive Subscription Matching Algorithm for RFID Applications. 1137-1144 - Haimei Zhang, Kerong Ben, Zhixiang Zhang:
A Reflective Architecture-Aware Framework to Support Software Evolution. 1145-1149 - Xiaohong Chen, Zhi Jin:
A Scenario-Based Problem Decomposition. 1150-1155 - Xiaojian Liu, Xuejun Liu, Jianxin Li, Yanzhi Zhao, Zhixue Wang:
Refinement of UML Interaction for Correct Embedded System Design. 1156-1162 - Yingqiang Wang, Qingshan Li, Chenguang Zhao, Hua Xing:
A Multi-Agent System Frame Model for Dynamic Integration. 1163-1168 - Jinyu Chen, Ten Long, Kangming Deng:
The Consistency of Materialized View Maintenance and Drill-Down in a Warehousing Environment. 1169-1174 - Yubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu:
A Role and Context Based Access Control Model with UML. 1175-1180 - Gui Gui, Paul D. Scott:
New Coupling and Cohesion Metrics for Evaluation of Software Component Reusability. 1181-1186 - Zhong Ming, Xingan Jiang, Jiancong Bai:
Partheno-Genetic Algorithm for Test Instruction Generation. 1187-1192 - Xiaochun Zhu, Bo Zhou, Li Hou, Junbo Chen, Lu Chen:
An Experience-Based Approach for Test Execution Effort Estimation. 1193-1198 - Jing Gao, Yuqing Lan, Maozhong Jin:
A Model of Third-Party Integration Testing Process for Foundation Software Platform. 1199-1204 - Deping Zhang, Changhai Nie, Baowen Xu:
A Markov Decision Approach to Optimize Testing Profile in Software Testing. 1205-1210 - Rui Zhang, Jianhui Jiang, Jie Yin, Ang Jin, Jungang Lou, Ying Wu:
A New Method for Test Suite Reduction. 1211-1216 - Jun Cheng, Qiang Liu:
Using Stakeholder Analysis for Improving Statechart Merging in Software Requirement Management. 1217-1222 - Dan Wang, Maozeng Li:
Design and Implementation of a Data Stream Load Shedding Model. 1223-1228 - Tian Qiu, Pengfei Li:
Web Service Discovery Based on Semantic Matchmaking with UDDI. 1229-1234 - Hang Zhou, Zhiqiu Huang, Yi Zhu:
Polymorphism Sequence Diagrams Test Data Automatic Generation Based on OCL. 1235-1240 - Ji Wu, Yong Po Liu, Xiao-xia Jia, Chao Liu:
Mining Open Source Component Behavior and Performance for Reuse Evaluation. 1241-1247 - Jinfang Sheng, Bin Wang:
Evaluating COTS Components Using Gap Analysis. 1248-1253 - Xiaoqiang Zhang, Lin Peng, Lunguo Xie:
A Lightweight Snapshot-based Algorithm for Software Transactional Memory. 1254-1259 - Hai Yu, Fan Xiaoya:
Mitigating Soft Errors in System-on-Chip Design. 1260-1265 - Yonghee You, Hwanmun Lee, Mee Young Sung, Kyungkoo Jun, Jin-Suk Kang:
Sound-Specific Vibration Interface: Its Performance of Tactile Effects and Applications. 1266-1271 - Jianhua Zheng, Di Li, Zhaogan Shu, Rong Zhu:
New Approach for Embedded Computer Numeric Control Development. 1272-1278 - Zhiquan Feng, Bo Yang, Yuehui Chen, Yan Jiang, Tao Xu, Haokui Tang:
A Particle Filtering for 3D Human Hand Tracking. 1279-1284 - Jianfei Yin, Zhong Ming, Zhijiao Xiao, Hui Wang:
A Web Performance Modeling Process Based on the Methodology of Learning from Data. 1285-1291 - Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao, Dan Chen:
A Novel Hardware Assisted Full Virtualization Technique. 1292-1297 - Chunsheng Qi, Xiao Zheng, Biying Kuang, Wei Zhou:
Design and Implementation of an Integrated Fault-Supervising System for Large HPCs. 1298-1302 - Yanyan Gao, Xi Li:
Formal Verification of Bypassed Processor Pipelines. 1303-1308 - Hui-Chin Yang, Li-Ming Wang, Chung-Ping Chung:
iAIM: An Intelligent Autonomous Instruction Memory with Branch Handling Capability. 1309-1313 - Shaogang Wang, Dan Wu, Zhengbin Pang, Wensheng Tang, Xiaodong Yang:
Lowering the Overhead of Hybrid Transactional Memory with Transact Cache. 1314-1319 - Caixia Liu, Jiaxin Li, Hongli Zhang, Qi Zuo:
HHMA: A Hierarchical Hybrid Memory Architecture Sharing Multi-Port Memory. 1320-1325 - Lei Li, Zheng Cao, Mingyu Chen, Jianping Fan:
Design and Evaluation of Optical Bus in High Performance Computer. 1326-1330 - Lei Jiao, Yanyuan Zhang, Wei Lin:
Journal-based Block Images for Flash Memory Storage Systems. 1331-1336 - Yu Sheng, Weiping Wang:
Design and Implementation of Compression Algorithm Comparator for Digital Image Processing Based on Component. 1337-1341 - Hualong Zhao, Hongshi Sang, Tianxu Zhang:
The Design and Implementation of a High Performance and High Flexibility Memory Interface Architecture for Embedded Application. 1342-1347 - Wenying Zeng, Yuelong Zhao, Junwei Zeng:
Hierarchical Storage System Based on Wireless Mesh Network. 1348-1353 - Jianjun Guo, Kui Dai, Ming-che Lai, Zhiying Wang:
The P2P Communication Model for a Local Memory based Multi-core Processor. 1354-1359 - Yanqin Yang, Zili Shao, Linfeng Pan, Minyi Guo:
ISOS: Space Overlapping Based on Iteration Access Patterns for Dynamic Scratch-pad Memory Management in Embedded Systems. 1360-1366 - Fangfang Li, Chuanwen Li, Xiaochun Yang, Ge Yu:
A Data Storage Method Based on Query Processing Region in Wireless Sensor Networks. 1367-1372 - Shengyuan Yang, Shi Shu:
Robust Feature Extraction for the Composite Surface Mesh from STL File. 1373-1378 - Hailin Guo, Xiaoyan Xue, Xingang Wang, Weiqin Tong, Weili Ni:
An Implementation of Parallel MLFMA on a Cluster of Computers with Distributed Memory. 1379-1383 - Zhenyu Wang, Qi Feng, Rui Xu, Zengjie Dou, Xin Chen:
Research on Trusted Access Technology of Grid Resource Based on the Virtual Machine. 1384-1388 - Yingjie Zhao, Nong Xiao:
Saber: Sequential Access Based cachE Replacement to Reduce the Cache Miss Penalty. 1389-1394 - Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li:
VM-based Architecture for Network Monitoring and Analysis. 1395-1400 - Changping Liu, Yong Feng, Mingyu Fan, Guangwei Wang:
PKI Mesh Trust Model Based on Trusted Computing. 1401-1405 - Huaqiang Yuan, Weimin Xiao, Guoqiang Han:
A Fingerprint Matching Algorithm Based on B-Spline Curves. 1406-1411 - Jianhong Zhang, Jianjun Xie:
Security Analysis and their Improvement of Two Signature Schemes. 1412-1417 - Buyun Qu, Lianhao Liu:
An XSL Analysis on BES. 1418-1423 - Guangxi Chen, Yan Cheng, Yinghao Wang:
A Robust Adaptive Video Watermarking Algorithm Based on HVS. 1424-1428 - Xiongjun Li:
A Generalized Matrix-based Scrambling Transformation and its Properties. 1429-1434 - Shuaijun Li, Fei Peng:
An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems. 1435-1439 - Ying Chen, Yuping Wang:
Exposing Digital Forgeries by Detecting Traces of Smoothing. 1440-1445 - Mi He, Lizhi Cheng:
Asymmetric Watermarking Method Based on Subspace Projection. 1446-1452 - Anfeng Hu, Ning Chen:
A Blind Watermarking Algorithm for Color Image Based on Wavelet Transform and Fourier Transform. 1453-1458 - Peng Lu, Zhao Lu, Zili Zhou, Junzhong Gu:
An Optimized Natural Language Watermarking Algorithm based on TMR. 1459-1463 - Ming Zhao, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen:
A Game Theoretic Approach Based Access Control Mechanism. 1464-1469 - Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:
An Automatic Mechanism for Sanitizing Malicious Injection. 1470-1475 - Zuowen Tan, Hongguang Xiao:
Hierarchical Proxy Blind Signature: A Solution to E-cash in the Real World. 1476-1480 - Ge Cheng, Hai Jin, Deqing Zou, Alex K. Ohoussou, Feng Zhao:
A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. 1481-1487 - Hongxing Lan, Songqiao Chen, Taoshen Li, Aina Hu:
A Digital Watermarking Algorithm Based on Dual-tree Complex Wavelet Transform. 1488-1492 - Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu:
Collecting Internet Malware Based on Client-side Honeypot. 1493-1498 - Jian Wang, Yanheng Liu, Xin Sun, Yu Jiao:
Modeling Cascading Failures in Congested Internet. 1499-1504 - Jinsong Gui, Xiaoheng Deng:
An Adaptive Topology-Based Reputation Model for Unstructured P2P Networks. 1505-1510 - Fanping Zeng, Kaitao Yin, Minghui Chen:
Research on TCP Initial Sequence Number Prediction Method Based on Adding-weight Chaotic Time Series. 1511-1515 - Jianquan Dong, Chao Tan, Yunqi Zhang:
A Reputation Evaluation Method in P2P Anonymous Environment. 1516-1521 - Qin Li, Dongyang Long, Changji Wang:
Secure Relativistic Bit Commitment with Fixed Channel Capacity. 1522-1526 - Yanhui Wu, Weiping Wang, Jianer Chen:
A Novel Anonymous Communication Strategy with Respect to Payment Mechanism. 1527-1531 - Fenghua Li, Wei Wang, Jianfeng Ma, Zhenguo Ding:
Enhanced Architecture of TPM. 1532-1537 - Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji:
Network Security Evaluation Algorithm Based on Access Level Vectors. 1538-1544 - Lingli Deng, Yeping He, Ziyao Xu:
Enforcing Separation of Duty in Ad Hoc Collaboration. 1545-1552 - Bin Wang, Piao Ding, Jinfang Sheng:
P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy. 1553-1558 - Yanmei Zhang, Jianming Zhu:
A Hybrid Vulnerability Analysis Method against Non-Security Protocols. 1559-1564 - Xuri Chen, Weimin Xu:
Counter-Attack Trust Model Based on Vague Set for P2P Networks. 1565-1570 - Kai Bu, Zhixin Sun:
A Method Based on AMHI for DDoS Attacks Detection and Defense. 1571-1576 - Ming Luo, Yingyou Wen, Hong Zhao:
An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography. 1577-1582 - Jiahao Wang, Terry Ye, Edward C. Wong:
Privacy Guaranteed Mutual Authentication on EPCglobal Class 1 Gen 2 Scheme. 1583-1588 - Yang Lu, Jiguo Li, Junmo Xiao:
Generic Construction of Certificate-Based Encryption. 1589-1594 - Guiliang Zhu, Xiaoqiang Zhang:
Mixed Image Element Encryption System. 1595-1600 - Lijie Yin, Jinhui Zhao, Yan Duan:
Encryption Scheme for Remote Sensing Images Based on EZW and Chaos. 1601-1605 - Jian Xu, Fucai Zhou, Xinyang Li, Muzhou Yang:
Hierarchical Data Processing Model and Complete Tree Key Management Mechanism. 1606-1612 - Shanqing Guo, Chunhua Zhang:
Identity-based Broadcast Encryption Scheme with Untrusted PKG. 1613-1618 - Leyou Zhang, Yupu Hu, Ningbo Mu:
An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. 1619-1623 - Guojun Zhang, Enmin Song, Guangzhi Ma, Wei Zhang:
Attribute Reduction Algorithm Research Based on Rough Core and Back Elimination. 1624-1628 - Bo Liu, Luming Yang, Yunlong Deng:
A Vector Matrix Iterative Self-Organizing Assistant Clustering Algorithm of XML Document. 1629-1634 - Degang Xu, Zhifang Su:
Stability Analysis of Large-scale Time-delay Fuzzy Systems with Hybrid Models. 1635-1640 - Xiaoqing Chen, Zhongxi Hou, Jianxia Liu:
Real-Parameter Optimization with Modified Differential Evolution. 1641-1646 - Lei Chen, Haiming Chen:
Efficient Type Checking for a Subclass of Regular Expression Types. 1647-1652 - Yinglong Ma, Beihong Jin, Shipeng Zhang:
A Hybrid Model for Distributed Semantic Queries. 1653-1658 - Haitao Zhang, Jian Rong, Xiaochun Zhong:
Research of the INS/GPS Integrated Navigation System for High Speed Trains. 1659-1663 - Jintao Tang, Ting Wang, Ji Wang:
Information Flow Detection and Tracking on Web2.0 BLOGS Based on Social Networks. 1664-1670 - Xinde Li, Xianzhong Dai, Jean Dezert, Florentin Smarandache:
DSmT Qualitative Reasoning based on 2-Tuple Linguistic Representation Model. 1671-1676 - Honglei Zhu, Dequan Zheng, Tiejun Zhao:
Research on Query Translation Disambiguation for CLIR Based on HowNet. 1677-1682 - Muyun Yang, Junguo Zhu, Jufeng Li, Lixin Wang, Haoliang Qi, Sheng Li, Daxin Liu:
Extending BLEU Evaluation Method with Linguistic Weight. 1683-1688 - Jinwu Hu, Liuling Dai, Bin Liu:
Measure Semantic Similarity between English Words. 1689-1694 - Bofeng Zhang, Jianguo Pan, Jianbo Hu, Zhongyuan Liu, Ruimin Zhang:
A Case Study on Chinese Text Information Filtering Method Based on User Ontology Model. 1695-1700 - Mei Wang, Guohong Wang:
An Optimization Algorithm of Vehicle License Plate Correction Based on Minimum Projection Distance. 1701-1705 - Manling Huang, Pingdong Wu, Ying Liu, Luzheng Bi, Hongwei Chen:
Application and Contrast in Brain-Computer Interface between Hilbert-Huang Transform and Wavelet Transform. 1706-1710 - Shu-Bin Cai, Zhong Ming, Shixian Li:
BALC: A Belief Extension of Description Logic ALC. 1711-1716 - Jiancheng Liu, Xinhua Jiang, Baohua Lan:
Learning TSK Fuzzy Model by GA-BP Method. 1717-1721 - Jianping Wu, Jinxiang Li, Changshui Xiao, Fangyong Tan, Caidong Gu:
Real-time Robust Algorithm for Circle Object Detection. 1722-1727 - Baifan Chen, Zixing Cai, Zheng Xiao, Jinxia Yu, Limei Liu:
Real-time Detection of Dynamic Obstacle Using Laser Radar. 1728-1732 - Wei Pan, Zixing Cai, Limei Liu, Baifan Chen:
An Approach to Cooperative Multi-Robot Map Building in Complex Environments. 1733-1737 - Limei Liu, Zixing Cai, Wei Pan, Baifan Chen, Lijue Liu:
A Map Building Method Based on Uncertain Information of Sonar Sensor. 1738-1742 - Peng Zhao, Shutao Li:
Tablets Vision Inspection Approach Using Fourier Descriptors and Support Vector Machines. 1743-1748 - Chixin Xiao, Zixing Cai, Yong Wang, Xingbao Liu:
Tuning of the Structure and Parameters of a Neural Network Using a Good Points Set Evolutionary Strategy. 1749-1754 - Jinze Song, Tao Wu, Ping An:
Cascade Linear SVM for Object Detection. 1755-1759 - Shuren Zhou, Ximing Liang, Can Zhu:
Exploiting LCSVC Algorithm for Expression Recognition. 1760-1765 - Lichun Zhang, Junwei Chen, Yue Lu, Patrick S. P. Wang:
Face Recognition Using Scale Invariant Feature Transform and Support Vector Machine. 1766-1770 - Meng Zhang, Yi Zhang, Kuo Zhao, Liang Hu:
Automata for Weak Factor Recognition. 1771-1776 - Junmin Ye, Junjie Wang, Wei Dong, Zhichang Qi:
Implementation of String Recognition Algorithm Based on the Principle of Artificial Immunology. 1777-1782 - Yongli Ren, Yangdong Ye, Gang Li:
The Density Connectivity Information Bottleneck. 1783-1788 - Jing Chen, Xinqiao Lu, Qiaoling Luo, Ping Li, Xiaojuan Liu:
A Segment Extraction-Combination Algorithm Based on Polygonal Approximation and Finite State Machines for On-Line Chinese Character Recognition. 1789-1794 - Lingyu Xu, Na Zhang, Wentao Huang, Shijie Sun:
Multi-text Fusion Computation Based on Flexible Interval Control. 1795-1800 - Hongfeng Xiao, Guanzheng Tan:
A Novel Simplex Hybrid Genetic Algorithm. 1801-1806 - Yemei Qin, Ji Wang, Weihua Gui:
Particle Clonal Genetic Algorithm Using Sequence Coding for Solving Distribution Network Reconfiguration. 1807-1812 - Guannan Zhu, Ning Xu, Zhulin An, Yongjun Xu:
An Improved Genetic Algorithm Based on Variable Step-Size Search. 1813-1818 - Bo Liu, Peisheng Meng:
Hybrid Algorithm Combining Ant Colony Algorithm with Genetic Algorithm for Continuous Domain. 1819-1824 - Jun Mu, Hongxiao Fei, Xin Dong:
A Parameter-Free Clustering Algorithm Based on Density Model. 1825-1831 - Yantao Zhou, Zhengguo Wu, Xingdong Yi:
An Extended Grid-based Clustering Algorithm with Referential Value of Parameters. 1832-1837 - Zhifang Liao, Xiaoping Fan, Yun Zhou, Kezhun Liu:
A Clustering Algorithm for Mixed Data Based on Lattice Theory. 1838-1842 - Weizhe Zhang, Hongli Zhang, Xinran Liu, Xuemai Gu:
Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems. 1843-1848 - Chengming Qi, Yingjie Tian, Shoumei Cui, Yunchuan Sun:
Concept Semilattice: Construction and Complexity. 1849-1853 - Dengyuan Wu, Kai Wang, Tao He, Jicheng Ren:
A Dynamic Weighted Ensemble to Cope with Concept Drifting Classification. 1854-1859 - Hong Li:
Concept Granular System and Granular Concept Lattice. 1860-1865 - Kaifu Lu, Shukuan Lin, Jianzhong Qiao, Ge Yu, Hualei Liu:
FSMBO: Fast Time Series Similarity Matching Based on Bit Operation. 1866-1871 - Anrong Xue, Lin Yao, Shiguang Ju, Weihe Chen, Handa Ma:
Algorithm for Fast Spatial Outlier Detection. 1872-1877 - Shaochun Wu, Minfu Fang, Yinyin Li, Bofeng Zhang:
An Earthquake Sequential Pattern Mining Algorithm Based on General Constraint. 1878-1883 - Zheng Lin, Lubin Wang:
Multi-Stage Partner Selection Based on Genetic-Ant Colony Algorithm in Agile Supply Chain Network. 1884-1889 - Jinjiang Li, Da Yuan, Qingsong Xie, Caiming Zhang:
Fractal Image Compression by Ant Colony Algorithm. 1890-1894 - Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan:
Dynamic Keys Based Sensitive Information System. 1895-1901 - Yueming Deng, Guojun Wang:
A Time-Related Trust Model Based on Subjective Logic Theory. 1902-1907 - Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, Laurissa N. Tokarchuk:
Propagation Model of Active Worms in P2P Networks. 1908-1912 - Jinzhao Wu, Shihan Yang:
Timed CSP for Safety Specification of Hybrid System. 1913-1918 - Lan Li, Shaojun Zhang, Lei Fan:
Behavior-Aware Role Based Trust Management. 1919-1924 - Ricardo Neisse, Maarten Wegdam, Marten van Sinderen:
Trustworthiness and Quality of Context Information. 1925-1931 - Zhenhai Yang, Sheng Ge, Gang Li:
A Search Method for the Network of Interpersonal Trust. 1932-1937 - Gang Li, Sheng Ge, Zhenhai Yang:
An Affair-based Interpersonal Trust Metric Calculation Method. 1938-1943 - Shaoyin Cheng, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing:
DBTG: Demand-Driven Backtracking Test Generation. 1944-1950 - Li Li, Guosun Zeng, Bo Chen:
Trusted Transmission Protocol for Content Security. 1951-1956 - Jun Zheng, Yan Qin, Jianyong Zhu, Xinyou Li:
Constructing Trust Networks Based on Small-World Theories. 1957-1962 - Jianli Hu, Quanyuan Wu, Bin Zhou:
FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model. 1963-1968 - Yishi Zhao, Nigel Thomas:
A Cost Model Analysis of a Secure Key Distribution Centre. 1969-1974 - Zhiwen Zeng, Ya Gao, Zhigang Chen, Xiaoheng Deng:
Trust Path-Searching Algorithm Based on PSO. 1975-1979 - Nadia Nedjah, Luiza de Macedo Mourelle:
Efficient Hardware for Modular Exponentiation using the Sliding-Window Method with Variable-Length Partitioning. 1980-1985 - Fang Qi, Zhe Tang, Guojun Wang:
Attacks vs. Countermeasures of SSL Protected Trust Model. 1986-1991 - Nicolai Kuntze, Andreas U. Schmidt, Zaharina Velikova, Carsten Rudolph:
Trust in Business Processes. 1992-1997 - A. S. Poornima, B. B. Amberker:
A New Approach to Securing Broadcast Data in Sensor Networks. 1998-2001 - Luiz Olavo Bonino da Silva Santos, Luís Ferreira Pires, Marten van Sinderen:
A Trust-Enabling Support for Goal-Based Services. 2002-2007 - Tianle Zhang, Zongwei Luo, Feng Zhou, Xudong Yang:
Developing a Trusted System for Tracking Asset on the Move. 2008-2013 - Desire Nguessan, José Sidnei Colombo Martini:
Study and Implementation of a Solution to Security Management for Mobile Environments Based on Tuple. 2014-2020 - Qi Cheng, Yu-Hsin Li:
A Number Theoretic Memory Bounded Function and Its Applications. 2021-2025 - Ronghua Shi, Yanhua Yan:
Protection against Mobile Adversaries in Mobile Ad-hoc Networks. 2026-2031 - Kaibo Wang, Xingshe Zhou, Shandan Zhou:
Scheduling Framework and Algorithms for Large-Scale Divisible Load Processing with Multi-Dimensional QoS Constraints. 2032-2037 - Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee:
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. 2038-2043 - Ruixuan Li, Cuihua Zuo, Yuntian He, Zhengding Lu:
A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. 2044-2049 - Qi Jiang, Dongfeng Han, Yi Li, Wenhui Li:
Copyright Protection Using a Computational Watermarking Scheme. 2050-2054 - Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri:
Validating X.509 Certificates Based on their Quality. 2055-2060 - Neyire Deniz Sarier:
A New Biometric Identity Based Encryption Scheme. 2061-2066 - Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu:
Correlation Power Analysis Attack against Synchronous Stream Ciphers. 2067-2072 - Kun Huang, Dafang Zhang:
A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection. 2073-2078 - Yang Xu, Xiaoyao Xie:
Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic. 2079-2084 - Esam Elsheh:
On the Linear Structures of Cryptographic Rotation Symmetric Boolean Functions. 2085-2089 - Wei Zhao, Dingfeng Ye:
Modified Huang-Wang's Convertible Nominative Signature Scheme. 2090-2095 - Zecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li:
A CDH-Based Multi-Signature Scheme with Tight Security Reduction. 2096-2101 - Zhenjie Huang, Xuanzhi Lin, Rufen Huang:
Certificateless Concurrent Signature Scheme. 2102-2107 - Weihe Chen, Zhu Tang, Shiguang Ju:
Enforcement of Spatial Separation of Duty Constraint. 2108-2114 - Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo:
Hierarchical Identity-Based Online/Offline Encryption. 2115-2119 - Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang:
Performance Analysis of the HLLACF. 2120-2124 - Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi:
Towards Trusted Broadcast Encryption. 2125-2130 - Chengyu Fan, Shijie Zhou, Fagen Li:
Deniable Proxy-Anonymous Signatures. 2131-2136 - Kurt Dietrich:
A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. 2137-2142 - Huiyun Li, Keke Wu, Bo Peng, Yiwei Zhang, Xinjian Zheng, Fengqi Yu:
Enhanced Correlation Power Analysis Attack on Smart Card. 2143-2148 - Chi Guo, Lina Wang, Furong Zhou, Lainv Huang, Zhen Peng:
Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect. 2149-2153 - Fang Wang, Shanzhi Chen, Xin Li, Yuhong Li:
A Route Flap Suppression Mechanism Based on Dynamic Timers in OSPF Network. 2154-2159 - Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou:
A PIN-Based Dynamic Software Fault Injection System. 2160-2167 - Chuanming Jing, Xia Yin, Zhiliang Wang, Jianping Wu:
A Formal Approach to Robustness Testing of Network Protocol with Time Constraints. 2168-2174 - Yufeng Xiao, Shanzhi Chen, Xin Li, Yuhong Li:
An Enhanced Factoring Algorithm for Reliability Evaluation of Wireless Sensor Networks. 2175-2179 - Xiaolin Chen, Hui Deng, Feng Wang, Mu Mu, Sanglu Lu:
A Deployable Architecture against Application-level DDoS Attacks. 2180-2185 - Ping Zhu, Fumin Yang, Gang Tu, Wei Luo:
Fault-Tolerant Scheduling for Periodic Tasks based on DVFS. 2186-2191 - Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang:
A Defending Mechanism against DDoS Based on Registration and Authentication. 2192-2197 - Yinqian Zhang, Xun Fan, Zhi Xue, Hao Xu:
Two Stochastic Models for Security Evaluation Based on Attack Graph. 2198-2203 - Baiqiang Chen:
Strategies on Algebraic Attacks Using SAT Solvers. 2204-2209 - Paul Rabinovich:
ECL: A TLS Extension for Authentication in Complex PKIs. 2210-2215 - Chi Guo, Lei Zhao, Lina Wang, Zhejun Fang:
A Secure Network Admission and Routing Model Based on Trust Theory. 2216-2221 - Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. 2222-2229 - Rui Zhu, Changguo Guo, Huaimin Wang, Hailin Gong:
A User Trustworthiness Based Lightweight Access Control. 2230-2234 - Seil Kim, Ji Young Chun, Dong Hoon Lee:
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. 2235-2239 - Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, Dongsheng Peng:
TNC-UTM: A Holistic Solution to Secure Enterprise Networks. 2240-2245 - Lingli Deng, Yeping He, Ziyao Xu:
Service Authenticity in P2P File-Sharing. 2246-2253 - Zhexuan Song, Seigo Kotani, Ryusuke Masuoka:
Building an Independent Integrated Authentication Service. 2254-2259 - Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma:
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method. 2260-2265 - Helen Tang, Mazda Salmanian:
Lightweight Integrated Authentication for Tactical MANETs. 2266-2271 - Tian Chen, Huaguo Liang, Minsheng Zhang, Wei Wang:
A Scheme of Test Pattern Generation Based on Reseeding of Segment-Fixing Counter. 2272-2277 - Chuliang Weng, Yuan Luo, Minglu Li, Xinda Lu:
A BLP-Based Access Control Mechanism for the Virtual Machine System. 2278-2282 - Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu:
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. 2283-2288 - Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael Chung-Wei Phan, Roderick Bloem:
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. 2289-2294 - Zhifang Wang, Yiyun Chen, Zhenming Wang, Wei Wang, Bo Tian:
Implementation of Pointer Logic for Automated Verification. 2295-2301 - Junmin Ye, Zemei Zhan, Zhenfang Zhang, Wei Dong, Zhichang Qi:
Design of Some Artificial Immune Operators in Software Test Cases Generation. 2302-2307 - Xiaofeng Chen, Dengguo Feng:
A New Direct Anonymous Attestation Scheme from Bilinear Maps. 2308-2313 - Bing Duan, Yinqian Zhang, Dawu Gu:
An Easy-to-Deploy Penetration Testing Platform. 2314-2318 - Zhiyi Yin, Jianming Fu, Fuxi Zhu, Fanchen Su, Haitao Yao, Fen Liu:
Fingerprinting Executable Programs Based on Color Moments of a Novel Abstract Call Graph. 2319-2324 - Junmin Ye, Wei Dong, Zhichang Qi:
A Method to Generate Embedded Real-Time System Test Suites Based on Software Architecture Specifications. 2325-2329 - Fan He, Huanguo Zhang, Mei Tang:
A Test Method of Trusted Computing Supporting Software. 2330-2334 - Jing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li:
Research on Automated Testing of the Trusted Platform Model. 2335-2339 - Anbang Ruan, Qingni Shen, Yuanyou Yin:
A Generalized Trusted Virtualized Platform Architecture. 2340-2346 - Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei:
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. 2347-2353 - Zhi Guan, Huiping Sun, Zhong Chen, Xianghao Nan:
Efficient Identity-Based Key Issue with TPM. 2354-2359 - Kurt Dietrich, Johannes Winter:
Secure Boot Revisited. 2360-2365 - Thomas Tan, Mei He, Ye Yang, Qing Wang, Mingshu Li:
An Analysis to Understand Software Trustworthiness. 2366-2371 - Ziren Wang, Ronghua Liang:
Discuss on Applying SPC to Quality Management in University Education. 2372-2375 - Jian Xiang, Lv Ye:
Thought and Tentative Idea of Reform in Formative Assessment. 2376-2380 - Jianjun Xie, Junhong Li, Yi Geng:
Enhancing Foundation to Foster Competence of Independent College Students. 2381-2385 - Youtian Qu, Chaonan Wang:
Research about the Model of Quality-Oriented Education and Ability Cultivation to College Students. 2386-2390 - Jialin Cui, Yigang Wang, Shengli Fan, Zhuoyuan Wang, Shenghuai Xu:
Discussion on Computer Education Mode of Engineering Course in Independent College. 2391-2395 - Haiwei Jin:
An Approach of Multi-Tactics in Programming Language Education. 2396-2401 - Jinfeng Dou, Jiabao Cao, Yongguo Jiang, Zhongwen Guo:
Research on the Teaching Reform of Operating System Courses. 2402-2406 - Minghui Wu, Hui Yan:
System Dynamics Modeling and Simulation in Software Engineering Education. 2407-2411 - Jianhua Li, Weibin Guo, Hong Zheng:
An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era. 2412-2416 - Penglin Li, Zhi Liu, Xingbo Guo:
Research on the Diversification Training Mode of Software Talents Based on University-Enterprise Cooperation. 2417-2421 - Hong Huang, Dongyong Yang:
Teaching Design Patterns: A Modified PBL Approach. 2422-2426 - Muyun Yang, Lixin Wang, Haoliang Qi, Tiejun Zhao, Sheng Li:
A Reflective Learning Model to Computer Undergraduates. 2427-2431 - Yi Li:
A New Approach to Teaching Logic in Discrete Mathematics. 2432-2437 - Huifang Deng:
Exploring the Way of Training High-Level Software Talents with Global Reach in China. 2438-2443 - Xiaoqing Feng, Jianping Han:
Practice and Discussion on a New Teaching Mode of "Case Guide Learning" in Basic of Database Application. 2444-2448 - Jianfeng Yang, Yinbo Xie, Qing Geng, Jolly Wang, Nick Bao:
Using cP^2BL in Teaching Multi-Core Related Contents. 2449-2453 - Luo Li, Shaogen Wu, Jia Luo:
Learning from Practicing: Adaptation of NIIT(India) Model for Software Developer Training to Chinese Higher Vocational and Technical Colleges. 2454-2458 - Youtian Qu, Chaonan Wang:
The Discussion and Design of Innovative Education Modein the College and University. 2459-2463 - Ningning Zhou, Zhengxu Zhao, Yulong Deng:
A New Evaluation Method Based on Measuring of Medium Truth Scale. 2464-2469 - Kai Cao, Xiaoyun Zhu:
Research and Design of Educational Resource Information Center for Investors Based on J2EE. 2470-2475 - Ben Liu, Hejie Chen, Wei He:
A Framework of Deriving Adaptive Feedback from Educational Ontologies. 2476-2480 - Wen Ding, Qing Wu, Weihua Hu, Zhiling Hu, Hongbiao Xie:
A Linux-based Development and Application of Automatic Test System. 2481-2484 - Haijun Mao, Haiyan Ma, Hong Zhuang, Penyin Wang:
The Research in Grade Teaching of Elementary Course of Computer. 2485-2489 - Yu Chen, Yuefeng Zheng, Decai Huang, Song'en Sheng, Jianqing Shi:
Theory and Application of School-Based Education Quality Evaluation Model Constructed from Improved AHP Method. 2490-2494 - Huiqiang Lin, Caixing Liu, Piyuan Lin:
A Method of Elicitation Teaching for Object-Oriented Analysis and Design Curriculum. 2495-2500 - Zhi Liu, Huaguo Jia, Shanshan Han:
Research on the Teaching Method of Combining the Theory and Practice in Data Structure Course. 2501-2506 - Guanlin Chen, Wenyong Weng:
Reform and Practice in Teaching J2EE Programming. 2507-2511 - Xuming Han, Limin Wang, Wanli Zuo, Hongzhi Wang, Guojun Chen:
Research on Teaching Reform of Computer Basic Courses in Technology Universities. 2512-2516 - Liang Zhang, Xiumin Liu, Xiujuan Liu:
Personalized Instructing Recommendation System Based on Web Mining. 2517-2521 - Hongjun Dai, Zhiping Jia, Xueqing Li, Yitao Guo:
Practical Training in the Embedded System Education: A New Way to Narrow the Gap with Industry. 2522-2527 - Qingsong Shi, Wei Hu, Sha Liu, Tianzhou Chen:
Introduction to the Reform on the Course of Fundamental Logic and Computer Design. 2528-2532 - Jun Zhang, Fuxiang Gao, Jian Wang:
Teaching Plan for Assembly Language and Programming: Conditional Directives and Macro Directives. 2533-2535 - Jiangbo Qian, Rangding Wang, Guang Jin, Yuan Li:
Breaking Boundaries among Hardware Curriculums by EDA Technology. 2536-2540 - Lijie Ren, Zhongwen Guo, Yongguo Jiang, Hao Wu:
Research and Practice of Experimental Simulation Platform for Course of Digital Logic. 2541-2545 - Yijun Liu, Banghai Wang, Guobo Xie, Pinghua Chen, Zhenkun Li:
Designing a Multi-Processor Education Board for High-Performance Embedded Processing. 2546-2551 - Qing Wu, Wen Ding, Weihua Hu, Bishui Zhou, Tianzhou Chen:
Computer Ability Assisted Assessment System for Large-Scale Heterogeneous Distributed Environments. 2552-2555 - Jinzhong Xu, Keliang Jia, Jibin Fu:
Research of Automatic Question Answering System in Network Teaching. 2556-2560 - Yunfu Shen, Yue Wu, Mingjun Xin, Yu Zheng:
A Novel Self-Studying Platform with its Application to Programming Courses. 2561-2566 - Jianguo Xing, Wenmin Zhao, Hua Hu:
An FPGA-Based Experiment Platform for Multi-Core System. 2567-2571 - Zhongwen Li, Wuling Lv:
Research on Curriculum Design of "Real-time Analysis and Design" Based on Multi-core Platform. 2572-2576 - Keliang Jia, Xiuling Pang, Zhinuo Li:
Question Answering System in Network Education Based on FAQ. 2577-2581 - Fei Hong, Yu Bai:
Research on Networking Laboratory Design and Training. 2582-2587 - Shuoping Wang, Gaoyan Zhang, Jun Liu:
Design of an Expandable Website Platform for Quality Course Cluster. 2588-2591 - Haiqing Yang, Yong He:
Experimental Design of Applying Intelligent Computation to NIR Spectral Data Mining. 2592-2597 - Jianwen Feng, Guojun Dai, Peng Liu, Xingfa Shen:
Research on Experimental Platform and Methods for the Course "Interface and Communication". 2598-2603 - Shulong Li:
Experiences of Simulation Training with Computer Technology in Police College. 2604-2608 - Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen:
The Practice of Remote Education on Information Security. 2609-2613 - Juan Feng, Jie Zhao, Guohua Zhan:
Content-based School Assignment Cluster Algorithm. 2614-2618 - Zhenkuan Pan, Yanbin Fan:
The Exploration and Practice of Embedded System Curriculum in Computer Science field. 2619-2624 - Rongchun Chen, Lixin Xue:
Integrated Application of Project Cases in Programming Course. 2625-2629 - Qiaoming Pan, Yongqiang Zhu, Wei Zhu:
Application of the Attribution Theory in Improving Computer Study Effects of University Students. 2630-2635 - Ping Huang, Mingrui Chen, Shaofan Chen:
The Practice Training in the Software Engineering Education. 2636-2640 - Wenxiang Zhang, Siyou Xiao, Xiaoyong Wang, Xuping Zhu:
Research on Construction Mode of Using Internet to Boost Language C Teaching. 2641-2646 - Jibin Fu, Keliang Jia, Jinzhong Xu:
Domain Ontology Learning for Question Answering System in Network Education. 2647-2652 - Hai Wang, Lihe Hu, Yunhe Lu, Po Hu:
Application of Project-Based Cooperative Learning in Computer Education. 2653-2658 - Xiumin Shi, Ji Zhang, Yanbing Ju:
Research and Practice in Undergraduate Embedded System Course. 2659-2663 - Rongliang Luo, Minghui Wu, Yong Zhu, Yunru Shen:
Exploration of Curriculum Structures and Educational Models of Database Applications. 2664-2668 - Zhi Liu, Jian Lu, Xiaochun Dai:
Dynamic Demo System of Data Structure with C++/MFC. 2669-2674 - Long Hong, Yanli Chen, Ningning Zhou, Fangwu Yao:
Investigating on the Curriculum Visions of Computing Disciplines. 2675-2680 - Weidong Zhao, Anhua Wang:
University-Industry Collaboration for Software Engineering Teaching. 2681-2685 - Joseph Timoney, Stephen Brown, Deshi Ye:
Experiences in Software Testing Education: Some Observations from an International Cooperation. 2686-2691 - Min Lu, Xiaoyu Jin:
Analysis of a C Language Teaching Example Based on the ARCS Model: The Basic Concept and Use of Structure. 2692-2695 - Jianping Han, Weihua Hu, Xiaoqing Feng:
Exploration and Practice on Teaching Java as Introductory Language for Non-CSE Major Students. 2696-2700 - Qi Wu, Hong-Sen Yan, Hongbing Yang:
A Hybrid Forecasting Model Based on Chaotic Mapping and Improved v-Support Vector Machine. 2701-2706 - Yao Zeng, Echuan Yan, Chunfeng Li, Ying Li:
Application of Multivariable Time Series Based on RBF Neural Network in Prediction of Landslide Displacement. 2707-2712 - Ling Xiang, Guiji Tang, Yongli Zhu:
Vibration Signal Analysis of Rotor System Based on Time-Frequency Attributes. 2713-2717 - Xiangdong Liu, Junxing Zhang, Jinhai Zhang, Xinqin He:
Analyzing the Self-similarity of the TCP Bulk Flow. 2718-2721 - Guoran Rao, Ping Liang:
Forecasting Air Quality Based on ChaoticFull-AreaMethod. 2722-2726 - Jinyong Zhou, Lan Gao, Qing Hua:
Prediction of Vessel Traffic Accident Based on Chaotic Theory. 2727-2731 - Jianjun Hou, Fang Dong, Yundong Han:
Chaotic Behavior of Ship Swaying Motions in Irregular Waves. 2732-2737 - Haiyan Wu, Hongbo Wang, Mingbo Sun, Jin Zhou:
Experimental and Simulation Investigation in Fractal Dimension of Supersonic Combustion. 2738-2742 - Jun Zhang, Hai Zhao, Guilan Luo, Yan Zhou:
The Study on Fractals of Internet Router-level Topology. 2743-2747 - Xiuchun Shi, Longde Wu, Hongyong Yang:
Scientific Collaboration Network Evolution Model Based on Motif Emerging. 2748-2752 - Yurong Song, Guoping Jiang:
Hash Function Construction Based on Chaotic Coupled Map Network. 2753-2758 - Yu Ji, Lequan Min, Yan Meng:
Analytical Criteria for the Local Activity of Three-Port CNN with Five State Variables: Analysis and Application. 2759-2765 - Zhiwen Zhu, Hongli Wang, Hongchen Han, Jia Xu:
Nonlinear Dynamic Characteristics of Traffic Flow based on Continuous Car-following Model with Nonintegral Exponent. 2766-2770 - Yiran Gu, Yurong Song, Guoping Jiang, Suoping Wang:
A New Susceptible-Infected Model of Malware Propagation in the Internet. 2771-2775 - Zhiliang Zhu, Jingping Song, Dong Aoshuang, Hai Yu, Ye Yang:
Research and Analysis of Securities Market based on Multi-Fractal Generator. 2776-2781 - Bin Zhang, Chenhui Jin:
Cryptanalysis of a Chaos-based Stream Cipher. 2782-2785 - Qian Zhou, Zengqiang Chen:
Application of Chaos in Digital Fountain Codes. 2786-2791 - Dongming Chen, Zhiliang Zhu, Guangming Yang:
An Improved Image Encryption Algorithm Based on Chaos. 2792-2796 - Tiankai Sun, Xiaogen Shao, Xingyuan Wang:
A Novel Binary Image Digital Watermarking Algorithm Based on DWT and Chaotic Encryption. 2797-2802 - Zhao Song, Hengjian Li, Yan Xu:
A Secure and Efficient Fingerprint Images Encryption Scheme. 2803-2808 - Fei Peng, Tao Deng, Min Long:
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling. 2809-2813 - Yongliang Xiao, Limin Xia:
A New Hyper-Chaotic Algorithm for Image Encryption. 2814-2818 - Chunbiao Li, Hankang Wang:
The Scroll Control of a New Chaotic System. 2819-2823 - Hong Chen, Qun Ding, Jing Pang:
Study on the Chaotic Wave. 2824-2829 - Jiangdong Cai, Daoming Zhang, Zhenquan Jiang:
Study on the Nonlinear Dynamic Characteristic of Cone Penetrate Test Curve. 2830-2834 - Jia Xu, Hongli Wang, Zhiwen Zhu, Gen Ge:
Research on Optimal Control of Vehicle Vibration Based on Semi-Active Suspension System. 2835-2839 - Chaoxia Zhang, Simin Yu, Jinhu Lu, Guanrong Chen:
Generating Multi-Wing Butterfly Attractors from the Piecewise-Linear Chen System. 2840-2845 - Yan Meng, Lequan Min, Yu Ji:
Application of Local Activity Theory to Rossler CNN Model. 2846-2851 - Wei Ou, Fengxing Zou, Xiaohong Xu, Gao Zheng:
Targets Assignment for Cooperative Multi-UAVs Based on Chaos Optimization Algorithm. 2852-2856 - Youxin Luo, Xiguang Huang, Bin Zeng:
Forward Displacement Analysis of the 4SPS-2CCS Generalized Stewart Platform Based on Hyper-Chaotic Neural Network Mathematical Programming Method. 2857-2862 - Fangfang Chen, Fangyue Chen, Weifeng Jin, Lin Chen:
Topological Entropy and Complexity of One Class of Cellular Automata Rules. 2863-2867 - Lin Chen, Fangyue Chen, Fangfang Chen, Weifeng Jin:
Complex Symbolic Dynamics of Bernoulli Shift Cellular Automata Rule. 2868-2873 - Lidong Wang, Xiuying Xing, Zhenyan Chu:
On Definitions of Chaos in Discrete Dynamical System. 2874-2878 - Yongxin Gui, Zhiming Zhou:
Hausdorff Dimension of a Class of Self-affine Fractals Generated by Linear Fibre Coding. 2879-2884 - Yandong Chu, Xian-Feng Li, Jiangang Zhang, Yingxiang Chang:
Numeration and Comparison of Two Kinds of Lyapunov Dimensions in Autonomous Chaotic Flows. 2885-2889 - Nan Yang, Zhangcai Long, Xianghui Zhao:
A New Method to Estimate Additive Noise in Synchronized Oscillations. 2890-2894 - Yunlong Li, Pingjian Zhang:
Chaos Study of the Lamprey Neural System via Improved Small Dataset Method. 2895-2899 - Yun Chen, Guanrong Chen, Xiaofeng Wu:
A Note on Chaos Synchronization of Generalized Lorenz Systems. 2900-2902 - Yuhua Xu, Wuneng Zhou, Lebin Deng, Hongqian Lu:
Modified Projective Synchronization among Three Modified Chen Chaotic Systems with Unicoupled Response System. 2903-2907 - Yin Li, Biao Li, Yong Chen:
Generalized Cascade Synchronization of Discrete-time Henon-like Map. 2908-2913 - Xulei Bao, Guangyi Wang, Cuiping Wang, Wei Feng:
Experimental Investigation on Impulsive Synchronization of Chaotic PN Sequences Based on FPGA. 2914-2918 - Jigui Jian, Yanjun Shen, Hui Yu:
Synchronization of Rikitake Chaotic Attractor via Partial System States. 2919-2924 - Jianning Yu, Jiangang Zhang, Li Zhang:
Improved Full State Hybrid Projective Synchronization ofChaotic Systems with the Different Order. 2925-2930 - Qi Han, Chuandong Li, Junjian Huang, Xiaofeng Liao, Tingwen Huang:
Anticipating Synchronization of Chaotic Systems with Parameter Mismatch. 2931-2936 - Hao Zhu, Shangbo Zhou, Weiwei Zhang:
Chaos and Synchronization of Time-Delayed Fractional Neuron Network System. 2937-2941 - Zhenwei Shang, Honge Ren, Jian Zhang:
A Block Location Scrambling Algorithm of Digital Image Based on Arnold Transformation. 2942-2947 - Yanping Cai, Shu Cheng, Yanping He, Ping Xu:
Application of Image Recognition Technology based on Fractal Dimension for Diesel Engine Fault Diagnosis. 2948-2953 - Zhen Qin, Hai Yu, Jinling Ju:
Fractal Image Compression Based on Number of Hopping and Variance of Continuing Positive and Negative Pixels. 2954-2958 - Jianhua Wu, Chunhua Jiang, Liqiang Yao:
Medical Image Retrieval Based on Fractal Dimension. 2959-2961 - Yan Wang, Lanling Zeng, Yan Qi:
Golden Section in 3D Plants IFS Reconstruction. 2962-2967 - Bowen Sun, Litao Jiang, Boling Sun, Shengtao Jiang:
Research of Plant Growth Model Based on the Combination of L-system and Sketch. 2968-2972 - Shaoqing Yang, Sihua He, Hongwen Lin:
Video Image Targets Detection Based on the Largest Lyapunov Exponent. 2973-2977 - JiXiang Ye, Guanzheng Tan:
Facial Affection Recognition Algorithm Based on Gabor Wavelet Transformation and Fractal Dimension. 2978-2982 - Bocheng Bao, Zhong Liu, Zhusheng Kang, Jianping Xu, Xiaohua Qiao:
An Unsymmetrical Hyperchaotic Attractor. 2983-2988 - Lin Ji, Xiufeng Lang, Guowei Deng:
Delay Adjusted Noise Effect in Coupled Nonlinear ChemicalSystem. 2989-2993 - Shuang Ma, Aiping Jiang:
A New Method of Financial Risk Management Based on Multifractal. 2994-2998 - Junjun Tang, Jing Wang, Cheng Huang, Guolun Wang, Xiong Wang:
Subprime Mortgage Crisis Detection in U.S. Foreign Exchange Rate Market by Multifractal Analysis. 2999-3004 - Huanmei Qin:
Research on Chinese Economic Effect of Central Bank Raising Interest Rates Based on System Dynamics. 3005-3010 - Liangsheng Chen:
On the Chaotic Dynamics Analysis of China Stock Market. 3011-3015 - Hongjuan Liu, Zhiliang Zhu, Huiyan Jiang, Beilei Wang:
A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map. 3016-3021 - Wenyu Zhang, Jinzhao Liang, Jianzhou Wang, Jinxing Che:
Chaotic Time Series Forecasting Base on Fuzzy Adaptive PSO for Feedforward Neural Network Training. 3022-3027 - Junbiao Guan, Shujuan Guo, Xinchu Fu:
Stability and Hopf Bifurcation in a Generalized Prototype Delayed System. 3028-3032 - Wenjuan Wu, Zengqiang Chen, Zhuzhi Yuan:
A Rigorous Computer-Assisted Verification of Horseshoe Chaos in a Seasonally Forced SEIR Epidemic Model. 3033-3038 - Hongyan Jia, Zengqiang Chen, Zhuzhi Yuan:
The Analysis and Circuit Implementation of a New Hyper-Chaos System. 3039-3044 - Zhusong Liu, Simin Yu, Guobo Xie, Yijun Liu:
A Novel Fourth-Order Chaotic Circuit and Its Implementation. 3045-3050 - Heng Song, Jingbo Guo:
Optimization of One-Dimensional Coded Modulations Using Chaotic Maps. 3051-3056 - Chong Fu, Zhiliang Zhu:
A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method. 3057-3061
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.