default search action
17th CSE 2014: Chengdu, China
- Xingang Liu, Didier El Baz, Ching-Hsien Hsu, Kai Kang, Weifeng Chen:
17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Chengdu, China, December 19-21, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7981-3
CSE 2014 - The 17th IEEE International Conference on Computational Science and Engineering
Intelligent and Bio-Inspired Computing I
- Ting Shu, Bob Zhang:
Diabetes Mellitus Detection Based on Facial Block Texture Features Using the Gabor Filter. 1-6 - Huanhuan Meng, Yue Zhang:
Classification of Electrocardiogram Signals with Deep Belief Networks. 7-12 - Tong Liu, Yujuan Si, Dunwei Wen, Mujun Zang, Weiwei Song, Liuqi Lang:
Vector Quantization for ECG Beats Classification. 13-20 - Yongjun Jiang, Jinxu Tao, Weiquan Ye, Wu Wang, Zhongfu Ye:
An Isolated Sign Language Recognition System Using RGB-D Sensor with Sparse Coding. 21-26
Intelligent and Bio-inspired Computing II
- Yungang Ma, Ji Wu:
Combining N-Gram and Dependency Word Pair for Multi-document Summarization. 27-31 - Anis Yazidi, B. John Oommen, Ole-Christoffer Granmo, Morten Goodwin:
On Utilizing Stochastic Non-linear Fractional Bin Packing to Resolve Distributed Web Crawling. 32-37 - Yingce Liu, Bo Zhao, Yuanchun Li:
Adaptive Neural Network Position/Force Hybrid Control for Constrained Reconfigurable Manipulators. 38-43
Scientific and Engineering Computing I: Control Applications
- Xiaoshuai Xin, Jinxi Chen, Jianxiao Zou:
Vehicle State Estimation Using Cubature Kalman Filter. 44-48 - Zhengli Xiao, Dechao Chen, Mingzhi Mao, Hongzhou Tan, Yunong Zhang:
Cart Velocity Tracking of General IPC Model Using ZG Control Compared with Cart Path Tracking. 49-54 - Jinglong Tong, Kuangyuh Huang:
Design and Development of Sypinge-Type Magnetorheological Damper. 55-59
Scientific and Engineering Computing II: Control Applications
- Lingjun Liu, Zhonghua Xie, Cui Yang:
Reconstruction Algorithm of Ultrasonic CT Based on Matching Pursuit. 60-65 - Xixiao Liu, Guishu Liang:
An Algorithm for Fractional Order System Identification. 66-71 - Jinglong Tong, Kuangyuh Huang:
Semi-active Spiral Flow Channel Magnetorheological Damper. 72-77 - Chunhui Liang, Yuanchun Li:
Attitude Tracking Control Based on Adaptive Sliding Mode Technique with Double Closed Loop for Spacecraft Near Small Body. 78-82 - Yunong Zhang, Ying Wang, Yonghua Yin, Hongzhou Tan, Qingkai Zeng:
Theory and Substantiation of z0g1 Controller Conquering Singularity Problem of Output Tracking for a Class of Nonlinear System. 83-88
Scientific and Engineering Computing III: Applied Mathematics
- Graham Lange, Fuhua Lin:
Modeling Well Scheduling as a Virtual Enterprise with Intelligent Agents. 89-96 - Jörg Lässig, Abhishek Awasthi, Oliver Kramer:
Common Due-Date Problem: Linear Algorithm for a Given Job Sequence. 97-104 - Jingyu Zhou, Shulin Tian, Bing Long, Chenglin Yang:
A Novel Prediction Method for Analog Circuits Based on Gaussian White Noise Estimation. 105-112
Scientific and Engineering Computing IV: Numerical Simulation
- Xingfu Wu, Guangtai Ding, Valerie E. Taylor:
Parallel Optical Flow Processing of 4D Cardiac CT Data on Multicore Clusters. 113-120 - Xiao Nie, Leiting Chen, Tao Xiang:
A GPU-Based Method for Weakly Compressible Fluids. 121-126 - Mohaned Giess Shokrallah Ahmed, Bin Tang:
New FCM's Validity Index for Sorting Radar Signal. 127-131 - Yabo Yuan, Bin Wu:
Robust Beamforming by an Improved Neural Minor Component Analysis Algorithm. 132-136
Scientific and Engineering Computing V: Image Processing, Miscellaneous
- Ayush Shrestha, Ying Zhu, Yan Zhu:
Visual Cluttering Reduction for Visualizing Large Spatio-temporal Data Sets. 137-143 - Mi Xiao, Haihong Xiong, Liang Gao, Qiangzhuang Yao:
An Efficient Method for Structural Reliability Analysis Using Evidence Theory. 144-149 - Wei Zhang, Desheng Yu, Dongdong Qi, Hongling Qi, Dan Xu:
Failure Analysis and Improved Method of Batch Cracks for Certain Fighter Aircraft. 150-154 - Jingqiao Zhang, Zhe Shi, Meiling Zhang:
Identification and Marking of Molecular Surface Feature Regions Based on Spherical Mapping. 155-160 - Huixian Sun, Yuhua Zhang, Zhaorui Li:
Texture Defect Detection Using Dual-Tree Complex Wavelet Reconstruction. 161-164
Big Data Analytic I
- Wei Wang, Hai-Ning Liang:
IRIS2: A Semantic Search Engine That Does Rational Research. 165-171 - Rui Luo, Wei Zhao:
A Robust Iterative Algorithm for Parameter Estimation of the Generalized Gamma Distribution. 172-180 - Lebi Jean-Marc Dali, Zhiguang Qin:
Cold-Start Mastered: LebiD1. 181-184 - Tao Wu, Leiting Chen, Yayong Guan, Xin Li, Yuxiao Guo:
LPA Based Hierarchical Community Detection. 185-191 - Xingyi Pan, Fulian Yin, Jianping Chai:
Delayering Tagging of Television Programs and Association Rule Mining. 192-197 - Min Zhu, Shuzhen Yao:
A Collaborative Filtering Recommender Algorithm Based on the User Interest Model. 198-202 - Jingcong Wang, Shuo Zhang, James Chen:
Vehicle Detection by Sparse Deformable Template Models. 203-206 - Dunwei Wen, Geoffrey Marshall:
Automatic Twitter Topic Summarization. 207-212
Big Data Analytic II
- Haiying Huang, Wuyi Zhang, Gaochao Deng, James Chen:
Predicting Stock Trend Using Fourier Transform and Support Vector Regression. 213-216 - Shanhong Wan, Defu Zhang, Yain-Whar Si:
Evolutionary Computation with Multi-variates Hybrid Multi-order Fuzzy Time Series for Stock Forecasting. 217-223 - Haibin Shi, Suyang Huang, Minzheng Huang, Zihong Chen, Xuemin Hong, Lingxiang Zheng, Huiru Zheng:
Segmentation of Mobile User Groups Based on Traffic Usage and Mobility Patterns. 224-230 - Aleksander Bai, Hugo Hammer, Anis Yazidi, Paal Engelstad:
Constructing Sentiment Lexicons in Norwegian from a Large Text Corpus. 231-237 - Man Qi, Yang Liu, Lin Lu, Junyong Liu, Maozhen Li:
Big Data Management in Digital Forensics. 238-243 - Wei Song, Mingyuan Liu:
A Visualizer for High Utility Itemset Mining. 244-248 - Pushpalatha K, Ananthanarayana V. S.:
An Unified Approach for Multimedia Document Representation and Document Similarity. 249-256
Cluster, Grid P2P, and Cloud Computing I
- Xin Xu, Huiqun Yu, Xin Pei:
A Novel Resource Scheduling Approach in Container Based Clouds. 257-264 - Zhuoer Gu, Cheng Chang, Ligang He, Kenli Li:
Developing a Pattern Discovery Model for Host Load Data. 265-271 - Xian Li, Rui Wang, Depei Qian:
Dual Power: Integrating Renewable Energy into Green Datacenters without Grid Tie Inverter. 272-278 - Wenbo Xie, Zhen Liu:
An Efficient Hierarchical Clustering Algorithm via Root Searching. 279-284 - Fábio Coutinho, Evandro Verdino, Jesus Ossian, Renato Santana:
GGreen: A Greedy Energy-Aware Scheduling Algorithm on Grid Systems. 285-290
Cluster, Grid P2P, and Cloud Computing II
- Yunjie Du, Xuanhua Shi, Hai Jin, Song Wu:
FITDOC: Fast Virtual Machines Checkpointing with Delta Memory Compression. 291-298 - Guangjun Zhang, Yingying Yao, Chunmiao Zheng:
HPC Environment on Azure Cloud for Hydrological Parameter Estimation. 299-304 - Jing Chen, Yinglong Wang, Bing Xue, Zhigang Zhao, Ying Guo:
A Credit-Based Allocation Method of Resource Quotas for Cloud Users. 305-311 - Hongyu Pei Breivold, Ivica Crnkovic, Iva Radosevic, Ivan Balatinac:
Architecting for the Cloud: A Systematic Review. 312-318
Microwave and Radar
- Zhiliang Tan, Peijiao Song, Liyun Ma, Zhaoxiang Meng:
Study on the Effect Mechanism of the Bipolar Junction Transistor Caused by ESD. 319-323 - Kebin Hu, Xiaoling Zhang, Wenjun Wu, Jun Shi, Shunjun Wei:
Three GPU-Based Parallel Schemes for SAR Back Projection Imaging Algorithm. 324-328 - Haodong Lin, Hao Peng, Yu Liu, Jun Dong, Tao Yang:
Low Loss Compact Meander Stripline Delay Lines Using LTCC. 329-333 - Shunjun Wei, Liwen Guo, Xiaoling Zhang, Jun Shi:
Millimeter-Wave Interferometric Synthetic Aperture Radar Imaging via Ground Projection. 334-339 - Lipeng Dai, Buhong Wang, Lingyue Jia:
A Method for Fast States Estimation of Multi-function Radar Based on Syntactic Derivation of Parse Chart. 340-344
Mobile Computing and Wireless Communications I
- O. O. Ogundile, Daniel J. J. Versfeld:
Improved Reliability Information for Rectangular 16-QAM over Flat Rayleigh Fading Channels. 345-349 - Min Wang, Hao Zhang, Wei Shi, Tingting Lu:
A STDMA-Based Collaborative Transmission Scheme for 60GHz WPANs with Directional Antenna. 350-356 - Haichao Tan, Lidong Zhu:
A Novel Routing Algorithm Based on Virtual Topology Snapshot in LEO Satellite Networks. 357-361 - Bing Zeng, Yan Dong:
An Energy Efficient Harmony Search Based Routing Algorithm for Small-Scale Wireless Sensor Networks. 362-367
Mobile Computing and Wireless Communications II
- Yanan Liu, Hao Liu, Tianxiang Jia, Teng Wang:
Improved Single-Stream Beamforming Algorithm in TD-LTE System. 368-372 - Mengjiao Zhang, Xiaohui Chen, Kai Ruan, Jiyuan Sun, Yangrui Zhu:
Localization Using Self-Organizing Maps Based on Spring Relaxation. 373-377 - Peng Qian, Enqing Dong, Juan Xu, Xing Lan, Wei Liu, Wentao Cui:
Multipath Routing Protocol Based on Congestion Control Mechanism Implemented by Cross-Layer Design Concept for WSN. 378-384
Mobile Computing and Wireless Communications III
- Han Han, Juan Chen, Junnan Yao, Yuzhen Huang, Ying Li, Jingchao Wang:
Resource Allocation for Energy Saving in Downlink Wireless Communication with Direction-Variable Antennas. 385-391 - Fenglien Lee, Daisy F. Sang, Tzu-Chaing Chiang:
An Efficient Algorithm for Route Discovery and Mobility Management on Mobile Ad Hoc Networks. 392-396 - Yuliang Wu, Shuzhen Yao:
A Modified Slotted Random Anti-collision Algorithm for the EPCglobal UHF Class-1 Generation-2 Standard. 397-400 - Tamal Chakraborty, Iti Saha Misra:
A Priority Based Adaptive Channel Reservation Algorithm for Improved System Capacity in Cognitive Radio Networks. 401-406 - Xiaohua Wu, Song Chen:
Identify & Measure Social Relations: Routing Algorithm Based on Social Relations in Opportunistic Networks. 407-412
CSE Education
- Rahok Yokokawa Sam Ann, Hirohisa Oneda, Shigeji Osawa, Koichi Ozaki:
Development of a Teaching Material That Can Motivate Students to Learn Control Engineering and Image Processing. 413-419 - Haiping Zhu, Xinhui Zhang, Xinhong Wang, Yan Chen, Bin Zeng:
A Case Study of Learning Action and Emotion from a Perspective of Learning Analytics. 420-424 - Isidoros Perikos, Panagiotis Angelopoulos, Michael Paraskevas, Thomas Zarouchas, Giannis Tzimas:
A Methodology for Evaluation and Knowledge Extraction from On-going Learning Process. 425-431 - Hadi Sutopo:
Learning Model Development of Creating a Multimedia Application Particularly Puzzle Game. 432-437 - Martin Malchow, Matthias Bauer, Christoph Meinel:
The Future of Teleteaching in MOOC Times. 438-443
Embedded and Ubiquitous Computing I
- Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang:
NSCC: Self-Service Network Security Architecture for Cloud Computing. 444-449 - Riming Wang, Jiuchao Feng:
Effective Sensors Deployment with Localization Accuracy Constraints. 450-457 - Hyun-Cheol Kim, Jihun Cha, Won Don Lee:
Eye Detection for Gaze Tracker with Near Infrared Illuminator. 458-464 - Tianxiang Jia, Yanan Liu:
Development of Attitude Determination System for Moving Carrier Based on MEMS Sensors. 465-469 - Zhiming Wang, Jiangxing Wu, Fengyu Zhang, Jianhui Zhang, Zhen Zhang, Yuxiang Hu:
A Solver for Performance-Aware Component Composition Problem in Reconfigurable Router. 470-475 - Weiguo Wu, Tao Wang, Chaohui Wang, Qing Zhang:
A Task Scheduling and Placement Strategy Based on Tasks' Aspect Ratio. 476-482
Embedded and Ubiquitous Computing II
- Lingzhi Yi, Xianjun Deng, Dexin Ding, Zenghui Zou, Wenbin Wang:
DCDF: A Distributed Clustered Decision Fusion Scheme for Target Detection in Wireless Sensor Networks. 483-486 - Atef Dorai, Virginie Fresse, El-Bay Bourennane, Abdellatif Mtibaa:
A Novel Architecture for Inter-FPGA Traffic Collision Management. 487-495 - Virginie Fresse, Catherine Combes, Hatem Belhasseb:
Mathematical Models Applied to On-Chip Network on FPGA for Resource Estimation. 496-504 - Yuanyuan Gao, Li Zhou, Yanhu Chen, Yang Wang, Jia Wang, Tao Sun:
A Hardware Acceleration Engine for Ray Tracing. 505-508 - Zhengzhi Li, Haoqian Wang, Kai Li:
Saliency-Aware Image Completion. 509-512
Advanced Networking and Applications I
- Huan Wu, Xuan Liu, Zhusheng Pan, Farong Zhong, Yuchang Mo:
A New Edge Ordering Heuristic in Network Reliability Analysis. 513-518 - Yi-Chih Tung, Wen-Jyi Hwang, Chih-Hsiang Ho:
A Novel QoS Mapping Algorithm for Heterogeneous Home Networks Using General Regression Neural Networks. 519-526 - Qinjiao Mao, Boqin Feng, Shanliang Pan:
A Bayesian Nonparametric Topic Model for User Interest Modeling. 527-534 - Zongming Feng, Jun Li, Haibo Wu, Jiang Zhi:
HD: A Cache Storage Strategy Based on Hierarchical Division in Content-centric Networking. 535-540
Advanced Networking and Applications II
- Jie Xu, Jianwei Song, Qingqiang He, Jun Xu:
A Novel Queue Management Algorithm INRIO-C Based on Differentiated Services. 541-546 - Maleeha Najam, Usman Younis, Raihan Ur Rasool:
Multi-byte Pattern Matching Using Stride-K DFA for High Speed Deep Packet Inspection. 547-553 - Panpan Shu:
Effects of Memory on Information Spreading in Complex Networks. 554-556 - Lidu Qin, Hui Li, Kai Pan, Fuxing Chen, Wensheng Chen, Chaoqi Yu:
Exploring Cache Coding Scheme for Information-centric Networking. 557-562 - Kai Lei, Tao Chen, Chen Peng, Zhi Tan:
Exploring the Benefits of Introducing Network Coding into Named Data Networking. 563-568
Security, Privacy, and Trust I
- Chaohui Du, Guoqiang Bai:
A Novel Relative Frequency Based Ring Oscillator Physical Unclonable Function. 569-575 - Ting Liu, Lequan Min:
Design of Non-autonomous Chaotic Generalized Synchronization Based Pseudorandom Number Generator with Application in Avalanche Image Encryption. 576-582 - Qiuwei Yang, Changquan Cheng, Xiqiang Che:
A Cost-Aware Method of Privacy Protection for Multiple Cloud Service Requests. 583-590
Security, Privacy, and Trust II
- Jiayu Wang, Qigeng Chen:
ASPG: Generating Android Semantic Permissions. 591-598 - Cheng Cai, Yuesheng Zhu, Bojun Wang:
A Novel Mutual Authentication Scheme for Smart Card without Information Leakage. 599-604 - Jie He, Yuexiang Yang, Xiaolei Wang, Yingzhi Zeng, Chuan Tang:
PeerSorter: Classifying Generic P2P Traffic in Real-Time. 605-613 - Non Thiranant, Young-Jin Kang, Tae-Yong Kim, Won-Tae Jang, Suhyun Park, Hoonjae Lee:
A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code. 614-619 - Yan Wen, Jinjing Zhao, Shuanghui Yi, Xiang Li:
FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor. 620-626
Service and Internet Computing I
- Cheng Chang, Ligang He, Hao Chen, Jianhua Sun, Kenli Li:
Performance Analysis and Optimization for Stochastic Workflows Running under Authorization Constraints. 627-633 - Yufeng Wang, Li Wei, Qun Jin, Jianhua Ma:
Alljoyn Based Direct Proximity Service Development: Overview and Prototype. 634-641 - Chao Zhou, Bo Li:
A Heuristic Recommendation Method Based on Contextual Social Network. 642-646
Service and Internet Computing II
- Deshun Zhao, Kun Zhao, Jun Yang, Jingrong Sha:
A Complex Network Model Based on 'Friends of a Friend' in a Fixed Community. 647-652 - Kwangkyu Lee, Okjoo Choi, Jongmoon Baik:
Service Reliability Prediction Method for Service-Oriented Multi-agent System. 653-660 - Kai Lei, Yining Ma, Zhi Tan:
Performance Comparison and Evaluation of Web Development Technologies in PHP, Python, and Node.js. 661-668 - Yuhan Wang, Qiaochu Li, Tian Lan, James Chen:
A Comparison of Content Based Image Retrieval Systems. 669-673
Distributed and Parallel Computing
- Liming Zheng, Yao Shen:
Improve Parallelism of Task Execution to Optimize Utilization of MapReduce Cluster Resources. 674-681 - Meirong Li, Yinliang Zhao, Yongqiang Si:
Dynamic Core Allocation for Energy-Efficient Thread-Level Speculation. 682-689 - Suejb Memeti, Sabri Pllana:
PaREM: A Novel Approach for Parallel Regular Expression Matching. 690-697 - John M. Ye, Jason Chen, Tianzhou Chen, Minghui Wu, Li Liu:
Offline Data Dependence Analysis to Facilitate Runtime Parallelism Extraction. 698-703
Dependable Reliable and Autonomic Computing
- Yu Lu, Alice Miller, Chris W. Johnson, Zhaoguang Peng, Tingdi Zhao:
Availability Analysis of Satellite Positioning Systems for Aviation Using the PRISM Model Checker. 704-713 - Ping Zhu, Ming Hu, Xuhui Chen:
A Novel Slack-Stealing Scheduling Algorithm for Hard-Real-Time Multiple-Processors System. 714-721 - Pengfei You, Zhen Huang, Changjian Wang, Yuxing Peng:
Reducing Repair Traffic with Exact and Uncoded Repair in Distributed Storage Systems: Intersecting Zigzag Sets Codes on Hierarchical Codes. 722-728 - Mo Li, Shaoying Liu:
Tool Support for Rigorous Formal Specification Inspection. 729-734 - Zhi Tao, Hui Li, Bing Zhu, Yunmin Wang:
A Semi-centralized Algorithm to Detect and Resolve Distributed Deadlocks in the Generalized Model. 735-740 - Tarek A. Boghdady, Mahmoud M. Sayed, A. M. Emam, E. E. Abu El-Zahab:
A Novel Technique for PID Tuning by Linearized Biogeography-Based Optimization. 741-747
Workshop on Usable Mobile Security
- Weihan Bo, Yiling Zhang, Xianbin Hong, Hanrong Sun, Xin Huang:
Usable Security Mechanisms in Smart Building. 748-753 - Haining Liang, Charles Fleming, Wei Wang:
User Authentication Interfaces in Mobile Devices: Some Design Considerations. 754-757 - Vahab Pournaghshband, David Meyer, Michael Holyland, Majid Sarrafzadeh, Peter L. Reiher:
Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices. 758-763 - Charles Fleming, Haining Liang, Ka Lok Man, Yudi An:
Mobistore: Secure Cloud-like Storage on Mobile Devices. 764-767
IUCC 2014 - The 13th IEEE International Conference on Ubiquitous Computing and Communications
Ubiquitous Computing I
- Shu Sun, Fang Liu, Jun Liu, Yinan Dou, Hua Yu:
Web Classification Using Deep Belief Networks. 768-773 - Ke Sun, Wansheng Miao, Xin Zhang, Ruonan Rao:
An Improvement to Feature Selection of Random Forests on Spark. 774-779 - Chin-Feng Lai, Ren-Hung Hwang, Han-Chieh Chao, Ying-Hsun Lai:
A Dynamic Power Features Selection Method for Multi-appliance Recognition on Cloud-Based Smart Grid. 780-785 - Bo Li, Zhi Liu, Yijian Pei, Hao Wu:
Mobility Prediction Based Opportunistic Computational Offloading for Mobile Device Cloud. 786-792 - Marc Denojean-Mairet, Qing Tan, Frédérique C. Pivot, Mohamed Ally:
A Ubiquitous Computing Platform - Affordable Telepresence Robot Design and Applications. 793-798 - Sheng Liu, Lili He, Binfei Shao:
Research on Response Model of Data Mining. 799-802
Ubiquitous Computing II
- Chuang Zhu, Huizhu Jia, Meng Li, Xiaofeng Huang, Xiaodong Xie:
Highly Efficient Local Non-Texture Image Inpainting Based on Partial Differential Equation. 803-807 - Chuan Jiang, Sheng Zhang, Xiaokang Lin:
An Effective Way to Improve Actigraphic Algorithm by Using Tri-axial Accelerometer in Sleep Detection. 808-811 - Xiaoliang Meng, Yunhao Wu, Yuwei Wang:
Geospatial Sensor Network eLearning Collaboratory - A Portal for Sensor Knowledge Acquisition and Representation. 812-817 - Kamil Zeberga, Hyung-Ju Cho, Tae-Sun Chung:
A Safe-Region Approach to k-RNN Queries in Directed Road Network. 818-824 - Xuan Xie, Xifeng Li, Dongjie Bi, Qizhong Zhou, Yongle Xie, Sanshan Xie:
Rényi's Entropy Based Method for Analog Circuits Soft Fault Detection. 825-830
Ubiquitous Computing III
- Weijia Zhong, Ziqiang Huang:
The Real-Time Eye Detection for Single User Based on Template Matching. 831-834 - Deyin Liu, Ruojin Cao, Xiaomin Mu, Lin Qi:
A Modified Greedy Algorithm for Wavelet Coefficients Reconstruction. 835-839 - Xiao-Ping Cui, Hu Wei, Chen Xin, Shumin Wang:
A New Redundant Binary Partial Product Generator for Fast 2n-Bit Multiplier Design. 840-844 - Furkan Rabee, Yong Liao, Maolin Yang, Jian Liu, Ge Zhu:
Global Hybrid Multi-core-GPUs-OpenMPs-Resources Platform in Hard Real Time System. 845-850 - Wenyi Wang, Jiying Zhao:
Chroma-Keying Based on Global Weighted Sampling and Laplacian Propagation. 851-854
Ubiquitous Communications I
- Xiaojun Li, Quanzhong Li, Kai Liu:
Efficient Dual Channel Multiple Access for Multihop Wireless Networks. 855-858 - Yunxiang Zhang, Zhiqin Zhao, Jinguo Wang, Gengyuan Dan:
Antenna Array Beam Pattern Synthesis Based on Trust Region Method. 859-862 - Xiang Gao, Dou Li, Zhiming Liu, Yuping Zhao:
A Hierarchical Scheduling Algorithm in Improving Quality of Wireless 3D Video Transmission. 863-867 - Mirghiasaldin Seyedebrahimi, Xiao-Hong Peng, Rob Harrison:
Adaptive Resource Allocation for QoE-Aware Mobile Communication Networks. 868-875 - Hongcheng Yan, Qingjun Zhang, Yong Sun:
A Novel Routing Scheme for LEO Satellite Networks Based on Link State Routing. 876-880 - Xin Cao, Zongxi Tang, Chengjie Su, Fei Wang, Yunqiu Wu:
Design of an X-Band Negative Resistance Oscillator Based on the ASIW in Modern Wireless Communication Systems. 881-883
Ubiquitous Communications II
- Zhuo Ma, Shuanyi Du:
Data Directed Estimation Based Turbo Equalization in HF Communication. 884-889 - Kun Zhang, Yourong Lu, Wei Wang:
Lattice Reduction Aided Blind Signal Separation Algorithm. 890-894 - Yong Lu, Shaohe Lv, Xiaodong Wang, Xingming Zhou:
UWBSS: Ultra-wideband Spectrum Sensing with Multiple Sub-Nyquist Sampling Rates. 895-900 - Sijun Ren, Ping Yi, Dapeng Hong, Yue Wu, Ting Zhu:
Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks. 901-908 - Hyunduk Kim, Chulki Kim, Jae-Hun Kim, Minah Seo, Seok Lee, Taikjin Lee:
Distance Based Energy Efficient Clustering Method in Wireless Sensor Networks. 909-914
Ubiquitous Communications III
- Jia Hu, Hui Lin, Li Xu:
Energy-Aware Secure Routing for Hybrid Wireless Mesh Networks. 915-922 - Won-Suk Kim, Sang-Hwa Chung, Jiameng Shi:
WiPCon: A Proxied Control Plane for Wireless Access Points in Software Defined Networks. 923-929 - Nakanya Chumsombat:
User Evaluations Service Quality on E-Tax Filing Satisfaction within the Public Sector. 930-935 - Zhaoyang Qiu, Jun Zhu, Pei Wang, Bin Tang:
Parameter Estimation of Phase Code and Linear Frequency Modulation Combined Signal Based on Fractional Autocorrelation and Haar Wavelet Transform. 936-939 - Dalaijargal Purevsuren, Saif-Ur Rehman, Gang Cui, Nwe Nwe Htay Win, Jianmin Bao:
Cone Dominance-Based Interactive Evolutionary Multiobjective Algorithm for QoS-Driven Service Selection Problem. 940-945
Ubiquitous System, Services, and Applications I
- Yuchao Zhou, Suparna De, Wei Wang, Klaus Moessner:
Enabling Query of Frequently Updated Data from Mobile Sensing Sources. 946-952 - Wiroon Sriborrirux, Panuwat Promsiri, Apirath Limmanee:
Multiple Secret Key Sharing Based on the Network Coding Technique for an Open Cloud DRM Service Provider. 953-959 - Chao Guo, Yinbo Liu, Xingang Liu:
Solutions for the Key Technologies of Cultural Transmission Platform under Wireless Networks. 960-963 - Zhen-Jie Yao, Zhi-Peng Zhang, Li-Qun Xu:
An Effective Algorithm to Detect Abnormal Step Counting Based on One-Class SVM. 964-969 - Zhibo Pang, Yuxin Cheng, Morgan E. Johansson, Gargi Bag:
Preliminary Study on Wireless Home Automation Systems with Both Cloud-Based Mode and Stand-Alone Mode. 970-975 - Yide Zhang, Xiaojuan Xu, Xinling Wang, Zhipan Fang, Jie Tang:
NC-COCA: Network Coding-Based Cooperative Caching Scheme. 976-980 - Clarence Goh, John C. Devlin, Dennis Deng, Andrew McDonald, Muhammad Ramlee Kamarudin:
Uncorrelated Weighted Median Filtering for Noise Removal in SuperDARN. 981-988
Ubiquitous System, Services, and Applications II
- Yuan Zhao, Dongping Du, Ahmed Abdalla Ali, Bin Tang:
Detection of SMSP Jamming in Netted Radar System Based on Fractional Power Spectrum. 989-993 - Duksan Ryu, Okjoo Choi, Jongmoon Baik:
Improving Prediction Robustness of VAB-SVM for Cross-Project Defect Prediction. 994-999 - Moses Olaifa, Ronell van der Merwe, Temitope Mapayi:
Agent Based Resource Discovery for Peak Request Periods in Peer-to-Peer Grid Infrastructures. 1000-1005 - Xin-Yan Xu, Zhao-Guang Liu:
Fast Intra/Inter-mode Decision for Arbitrary Downsizing Video Transcoder Using H.264/AVC Standard. 1006-1009 - Mohamed Ali, Hamza Ali, Ting Zhong, Fagen Li, Zhiguan Qin, Ahmed Abdelrahaman A. A.:
Broadcast Searchable Keyword Encryption. 1010-1016 - Zhuo Cheng, Haitao Zhang, Yasuo Tan, Azman Osman Lim:
DPSC: A Novel Scheduling Strategy for Overloaded Real-Time Systems. 1017-1023 - Lili Lu, Song Huang, Zhengping Ren:
A Weakness-Based Attack Pattern Modeling and Relational Analysis Method. 1024-1028
Ubiquitous Media and Signal Processing I
- Pei Wang, Dongping Du, Zhaoyang Qiu, Bin Tang:
Modified Cramer-Rao Bounds for Parameter Estimation of Hybrid Modulated Signal Combining PRBC and LFM. 1029-1033 - Yunhao Li, Jun Wang, Xiaodong He, Bin Tang:
A Method for PRI Estimation of Multicomponent LFM Signals from MIMO Radars. 1034-1038 - Zhixin Shen, Xingang Liu, Lingyun Lu, Xun Wang:
A New Error Concealment Algorithm for H.264/AVC. 1039-1042 - Qi Zhang, Yunhao Li, Ying Xiong, Bin Tang:
Transmit Multi-beamforming of Wideband Signals Based on the Focusing Transform. 1043-1046 - Yinbo Liu, Xingang Liu, Binfei Shao:
Fast Intra-mode Decision Algorithm for HEVC Based on Texture Direction. 1047-1050 - Xiaoyu Luo, Ping Wei, Lu Gan:
Two-Dimensional Direction-of-Arrival Estimation Using Two Transform Matrices. 1051-1054 - Pei-Ting Wu, Shin-Hung Chang:
A Fast Media Synchronization Mechanism for Streaming Screen Recording Applications. 1055-1062
Ubiquitous Media and Signal Processing II
- Kang-Tso Wu, Shin-Hung Chang:
CRA: A Real-Time CUDA-Based Resolution Adapter in Screen Recording Applications. 1063-1070 - Guangyu Dong, Kai Lin, Keqiu Li, Huayong Luo, Xiangwen Zhang:
FMA-RRSS: Fingerprint Matching Algorithm Based on Relative Received Signal Strength in Indoor Wi-Fi Positioning. 1071-1077 - Qian Li, Weiguo Wu, Xiaxin Zhou, Zeyu Sun, Jianhang Huang:
R-FirstFit: A Reservation Based First Fit Priority Job Scheduling Strategy and Its Application for Rendering. 1078-1085 - Lingyun Lu, Xingang Liu, Xun Wang, Zhixin Shen:
Algorithm Analysis and System Implementation of Advanced Facial Information Extraction and Face Recognition under Wireless Networks. 1086-1089 - Xiaoliang Meng, Yuwei Wang, Yunhao Wu:
Modeling Geospatial Sensor Knowledge under a Semantic Sensor Web Environment. 1090-1095 - Yingying She, Qian Wang, Yunzhe Jia, Ting Gu, Qun He, Baorong Yang:
A Real-Time Hand Gesture Recognition Approach Based on Motion Features of Feature Points. 1096-1102 - Wei Zhang, Haofu Han, Minglu Li:
Mobile Sensing on GSM Channel Utilization at Metropolitan Scales. 1103-1108 - Chao Yang, Hua Shi, Guangtao Xue, Hongzi Zhu, Chen Qian:
Network Redundancy Elimination by Dynamic Buffer Allocation. 1109-1114
I-SPAN 2014 - The 13th International Symposium on Pervasive Systems, Algorithms, and Networks
Graphs, Algorithms, and Networks I
- Jinson Zhang, Mao Lin Huang, Wenbo Wang, Liang Fu Lu, Zhao-Peng Meng:
Big Data Density Analytics Using Parallel Coordinate Visualization. 1115-1120 - Chuan-Min Lee, Cheng-Chien Lo:
On the Complexity of Reverse Minus Domination on Graphs. 1121-1126 - Darius A. Mulia, Charles R. Skelsey, Lihan Yao, Dougan J. McGrath, D. Frank Hsu:
When to Combine Two Visual Cognition Systems. 1127-1133 - Sheng-Lung Peng, Yin-Te Li:
On the Minimum Hub Set Problem. 1134-1137 - Bang Ye Wu, Chen-Wan Lin:
Clustered Trees with Minimum Inter-cluster Distance. 1138-1141 - Jinming Li, Laixian Peng, Yilei Ye, Renhui Xu, Wendong Zhao, Chang Tian:
A Neighbor Discovery Algorithm in Network of Radar and Communication Integrated System. 1142-1149 - Yu-Huei Chang, Jinn-Shyong Yang, Jou-Ming Chang, Yue-Li Wang:
Parallel Construction of Independent Spanning Trees on Parity Cubes. 1150-1154
Graphs, Algorithms, and Networks II
- Savio S. H. Tse:
Belated Analyses of Three Credit-Based Adaptive Polling Algorithms. 1155-1162 - Chia-Ping Tsai, Kuo-Yu Yang, Jui-Yu Hsieh, Hung-Chang Hsiao, Ching-Hsien Hsu:
Publish/Subscribe in NoSQL. 1163-1170 - Yi-Wen Peng, Wei-Mei Chen:
A Recursive Algorithm for General Hash Chain Traversal. 1171-1174 - Kehao Wang:
Multicast Rendezvous in Cognitive Radio Networks: A Hypercube Approach. 1175-1180 - Yuran Zhang, Ting Yue, Hongbo Wang, Anming Wei:
Predicting the Quality of Experience for Internet Video with Fuzzy Decision Tree. 1181-1187 - Lizhi Peng, Bo Yang, Yuehui Chen:
Hierarchical RBF Neural Network Using for Early Stage Internet Traffic Identification. 1188-1195 - Shidong Li, Sheng Ge:
Overlapping Local Community Detection in Directed Weighted Networks. 1196-1200
Graphs, Algorithms, and Networks III
- Yichao Cao, Fujun Wang, Yaheng Zhang:
A Simple Voice Extraction Algorithm in a High-Noise Environment. 1201-1204 - Sijun Ren, Ping Yi, Yue Wu, Jianhua Li:
An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree. 1205-1212 - Eddie Cheng, Ke Qiu, Zhizhang Shen:
Connectivity Results of Hierarchical Cubic Networks as Associated with Linearly Many Faults. 1213-1220 - Zhiyong Luo, Rui Wang, Ke Chen, Yu Pang, Sheng Yang:
A Low-Power System Design of RFID Sensor Networks. 1221-1225 - Dechao Chen, Tianjian Qiao, Hongzhou Tan, Mingming Li, Yunong Zhang:
Solving the Problem of Runge Phenomenon by Pseudoinverse Cubic Spline. 1226-1231 - Yunong Zhang, Jianxi Liu, Dongsheng Guo, Sitong Ding, Hongzhou Tan:
Power-Activated WASD Neuronet Based Russian Population Estimation, Correction, and Prediction. 1232-1236
Graphs, Algorithms, and Networks IV
- Yunong Zhang, Tianjian Qiao, Bolin Liao, Long Jin, Junwei Chen:
From Newton Fractals to Gradient Fractals in Addition to Zhang Fractals. 1237-1242 - Yunong Zhang, Yinyan Zhang, Dechao Chen, Zhengli Xiao, Hongzhou Tan:
ZG Control of Populations of Lotka-Volterra Equations Using Interaction Coefficients as Inputs. 1243-1248 - Zhihua Chen, Deshi Li:
A Multiple Interfaces Routing System Embedded on FPGA. 1249-1255 - Prashant D. Joshi, Arunabha Sen, Said Hamdioui, Koen Bertels:
Region Disjoint Paths in a Class of Optimal Line Graph Networks. 1256-1260 - Huiwei Lv, Guangming Tan, Mingyu Chen, Ninghui Sun:
Reducing Communication in Parallel Breadth-First Search on Distributed Memory Systems. 1261-1268 - Puspal Bhabak, Hovhannes A. Harutyunyan, Shreelekha Tanna:
Broadcasting in Harary-Like Graphs. 1269-1276 - Liang Ma, Jianxi Fan, Lih-Hsing Hsu, Cheng-Kuan Lin:
Conditional Connectivity with Distance Requirement on Hypercube. 1277-1281
Parallel and Distributed Systems
- Ruini Xue, Zhongyang Guan, Shengli Gao, Lixiang Ao:
NM2H: Design and Implementation of NoSQL Extension for HDFS Metadata Management. 1282-1289 - Sheng-Hui Liu, Shi-Jia Liu, Shi-Xuan Chen, Kun-Ming Yu:
IOMRA - A High Efficiency Frequent Itemset Mining Algorithm Based on the MapReduce Computation Model. 1290-1295 - Jinho Ahn:
N Fault-Tolerant Sender-Based Message Logging for Group Communication-Based Message Passing Systems. 1296-1301 - Yuan Xue, Yongmei Lei:
LRU-MRU with Physical Address Cache Replacement Algorithm on FPGA Application. 1302-1307 - Cho-Chin Lin, Zong-De Jian, Ching-Hsien Hsu:
A Strategy of Service Quality Optimization for Live Virtual Machine Migration. 1308-1313 - Amar Aissani:
Work and Sojourn Time in an M/G/1 Retrial Queue with Breakdowns. 1314-1319 - Zhen Yang, Xing Liu:
Dynamic Clone Sharing Scheme in Mobile Cloud Computing: A Delaunay Triangulation Approach. 1320-1325 - Jing Zhang, Shanshan Li, Xiangke Liao, Xiaodong Liu:
Aggregation Decoding for Multi-failure Recovery in Erasure-Coded Storage. 1326-1331 - Yongmei Wei, Yong Wee Foo, Khai Cher Lim, Fengmin Chen:
The Auto-configurable LDPC Codes for Distributed Storage. 1332-1338
Mobile Computing and Communication I
- Mohamed Y. E. Simik, Feng Chi, Abdeldime M. S. Abdelgader, Randa S. I. Saleh:
Design of Simple Bleeding Detector and Alarm System Using RF Transceiver and GSM System. 1339-1343 - Keqiang Xie, Jun Lin, Lei Wu:
Design and Implementation of Flow Mobility Based on D-PMIPv6. 1344-1349 - Xiaoying Chang, Kai Liu, Zhen Xu, Feng Liu:
A Relay-Optimized Cooperative MAC Protocol for Mobile Ad Hoc Networks. 1350-1355 - Xiaojun Li, Quanzhong Li, Kai Liu:
Opportunistic Spectrum Sharing with Quality-of-Service Support in Cognitive Radio Networks. 1356-1361 - Yin Li, Xuebing Zhao, Hao Tang, Qi Wang, Sanfeng Zhang:
Dynamics Nature and Link Prediction Methods in Opportunistic Networks. 1362-1368 - Hongyan Wang, Jing Ma, Yongshan Liu, Wenyuan Liu, Lin Wang:
Bi-directional Probing for Neighbor Discovery. 1369-1375 - Peng Duan, Laixian Peng, Yilei Ye, Renhui Xu, Wendong Zhao, Chang Tian:
An All-to-All-Broadcast Oriented MAC Protocol Using Directional Antennas in Ad Hoc Networks. 1376-1381
Mobile Computing and Communication II
- Yangda Zhu, Changhai Wang, Jianzhong Zhang, Jingdong Xu:
Human Activity Recognition Based on Similarity. 1382-1387 - Tzung-Shi Chen, Hua-Wen Tsai, Cheng-Hsien Tsai, Yow-Chwen Leu:
Crowdsensing Service by Mining Trajectory Patterns in Wireless Sensor Networks. 1388-1395 - Abdeldime M. S. Abdelgader, Lenan Wu:
A Secret Key Extraction Technique Applied in Vehicular Networks. 1396-1403 - Li Zhao, Xueyan Huang, Yong Li, Liu Liu, Huiling Jiang, Kazuki Takeda, Xiaodong Ji:
Uplink Power Control for Dual Connectivity. 1412-1416 - Huan Zhou, Shouzhi Xu, Dong Ren, Chungming Huang:
Reliable Delivery of Warning Messages in Partitioned Vehicular Ad Hoc Networks. 1417-1423
Mobile Computing and Communication III
- Chen Chen, Xiaodong Ji, Jun Wang, Tingting Wang, Yong Li, Wenbo Wang:
Full Duplex with Buffer-Aided Relay. 1424-1429 - Mhair Kashif:
Secure SMS Communication Using Encryption Gateway and Digital Signature. 1430-1434 - Peiyan Yuan, Ping Liu, Shaojie Tang:
Exploiting Partial Centrality of Nodes for Data Forwarding in Mobile Opportunistic Networks. 1435-1442 - Xiaofei Luo, Guozhu Liu, Huawei Huang:
Buffer Capacity-Constrained Epidemic Routing Model in Mobile Ad-Hoc Networks. 1443-1448 - Md Arquam, C. P. Gupta, M. Amjad:
Delay Constrained Routing Algorithm for WSN with Mobile Sink. 1449-1454 - Peter He, Jie Luo, Lian Zhao, Yujun Kuang:
Optimal Power Allocation for Energy Harvesting and Grid Power Hybrid Systems. 1455-1460
Cyber Physical Systems I
- Qifan Yang, Hao Tang, Xuebing Zhao, Yin Li, Sanfeng Zhang:
Dolphin: Ultrasonic-Based Gesture Recognition on Smartphone Platform. 1461-1468 - Yuan Yuan, Changhai Wang, Jianzhong Zhang, Jingdong Xu, Meng Li:
An Ensemble Approach for Activity Recognition with Accelerometer in Mobile-Phone. 1469-1474 - Tao Wang, Chongli Niu, Lianglun Cheng:
A Two-Phase Context-Sensitive Service Composition Method with the Workflow Model in Cyber-Physical Systems. 1475-1482 - Nirin Thanirat, Sudsanguan Ngamsuriyaroj:
The Effect of Attacks on DCT-Based Features for Image Copy Detection. 1483-1488 - Wei Li, Qibo Sun, Shangguang Wang:
Context-Based Web Service Reputation Measurement. 1489-1496
Cyber Physical Systems II
- Michael Vogl, Jang-Yoon Kim, Shin-Dug Kim:
A Fruit Recognition Method via Image Conversion Optimized through Evolution Strategy. 1497-1502 - Mingliu Liu, Deshi Li, Haili Mao:
A Design and Implementation of Information Service Architecture for Resource-Constraint Devices in Internet of Things. 1503-1508 - Zhen Yang, Deshi Li:
IoT Information Service Composition Driven by User Requirement. 1509-1513 - Linlin You, Gianmario Motta, Kaixu Liu, Tianyi Ma:
A Pilot Crowdsourced City Governance System: CITY FEED. 1514-1519
Information and Cyber Security
- Rekha Kashyap, Deo Prakash Vidyarthi:
Security-Aware Real-Time Scheduling for Hypervisors. 1520-1527 - Jie He, Yuexiang Yang, Xiaolei Wang, Chuan Tang, Yingzhi Zeng:
PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time. 1528-1535 - Quan Zhou, Xiuzhen Chen, Changsong Chen:
Authoritative Scholarly Paper Recommendation Based on Paper Communities. 1536-1540 - Minsu Park, Hyunsung Kim, Sung-Woon Lee:
Privacy Preserving Biometric-Based User Authentication Protocol Using Smart Cards. 1541-1544 - Li Yuan:
Multimodal Cryptosystem Based on Fuzzy Commitment. 1545-1549 - Faouzi Jaïdi, Faten Labbene Ayachi:
An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies. 1550-1557 - Yihua Ding, James Zijun Wang, Pradip K. Srimani:
Self-Stabilizing Selection of Influential Users in Social Networks. 1558-1565
FCST 2014 - The 8th International Conference on Frontier of Computer Science and Technology
Parallel and Distributed Computing I
- Jiafen Zhang, Feiyan Mu, Qingang Shi, Xiaodong He:
Design and Implementation of Multi-channel Wideband and RF Signal Generator. 1566-1569 - Sijun Ren, Ping Yi, Zhuqiulong Lin, Chenxi Guo, Yue Wu:
Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks. 1570-1576 - Yue Jia, Chris I. Phillips:
Fast and Reliable IP Recovery for Overlay Routing in Mission Critical Message Oriented Middleware. 1577-1584 - Yinbo Liu, Xingang Liu, Peicheng Wang:
A Texture Complexity Based Fast Prediction Unit Size Selection Algorithm for HEVC Intra-coding. 1585-1588 - Hongyan Mao, Li Yuan, Zhengwei Qi:
A Load Balancing and Overload Controlling Architecture in Clouding Computing. 1589-1594 - Shuyan Jiang, Jie Peng, Zhi Lu, Junjie Jiao, Shanshan Jiang:
802.11ad Key Performance Analysis and Its Application in Home Wireless Entertainment. 1595-1598
Parallel and Distributed Computing II
- Jing Zhang, Li Xu, Hui Lin:
A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast Networks. 1599-1604 - Qi Zhou, Junming Zhang, Jinglin Li, Shangguang Wang:
Discovering Regional Taxicab Demand Based on Distribution Modeling from Trajectory Data. 1605-1610 - Guocheng Yang, Leiting Chen, Hang Qiu:
Detail-Enhanced Multimodal Medical Image Fusion. 1611-1615 - Linlin Wang, Shiji Xiahou, Yi Kang:
The Interactive Design and Performance Study of Instrument Panels Based on the Single-Handed Keyboard Mouse. 1616-1620 - Tingting Wu, Yunwei Dong, Ning Hu:
Formal Specification and Transformation Method of System Requirements from B Method to AADL Model. 1621-1628
Trust, Security, and Privacy
- Jianhong Zhang, Weina Zhen:
Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud Computing. 1629-1636 - Yan Wen, Youyuan Fang, Jinjing Zhao, Xiang Li:
Shielding Your Privacy with the Local-Booted Virtual Machine. 1637-1643 - Maryam Saeed, Ali Mackvandi, Mehdi Taghavi, Mohammad Zare Bidoki, Mehdi Ghasemi, Ali Neshati:
Is Really NACK Protocol Secure to Be Employed in MANETs? 1644-1647 - Weidong Huang:
Evaluating Graphs from a New Perspective. 1648-1652 - Jihong Liu, Yutao Fu, Qi Zhang, Yuting Geng:
Study of Target Face Search Algorithm for Video Advertisement. 1653-1657 - Tilong Qi, Yongmei Lei:
The Parallel Implementation of Interval Global Optimization Algorithm and Its Application. 1658-1663 - Naiyana Boonnak, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn:
Classification of Drowsiness in EEG Records Based on Energy Distribution and Wavelet-Neural Network. 1664-1668
Automation and Control Engineering
- Han Li, Yuzhuo Fu, Ting Liu, Jiafang Wang:
Fast Protocol Decoding in Parallel with FPGA Hardware. 1669-1673 - Lin Gao, Xu Tang, Ping Wei:
Real-Time Implementation of Particle-PHD Filter Based on GPU. 1674-1678 - Haitham Barkallah, Mariem Gzara, Hanêne Ben-Abdallah:
Dynamic and Adaptive Topology-Aware Load Balancing for Grids. 1679-1684 - Nan Li, Jianmin Pang, Zheng Shan:
Migration of CUDA Program Based on a Divide-and-Conquer Method. 1685-1691 - Bryan Barnard, Massimo Di Pierro:
Extending Collection+JSON and Automatic CRUD Interfaces. 1692-1696 - Qiaochu Li, Jian Zhang, Yuhan Wang, Kary Kang:
Credit Risk Classification Using Discriminative Restricted Boltzmann Machines. 1697-1700 - Ji Geng, Yunling Lu, Wei Chen, Zhiguang Qin:
An Improved Text Categorization Algorithm Based on VSM. 1701-1706
Pattern Recognition and Artificial Intelligence
- Yuxiang Xie, Xidao Luan, Xin Zhang, Chen Li, Liang Bai:
A Cartoon Image Annotation and Retrieval System Supporting Fast Cartoon Making. 1707-1714 - Kun Jiang, Xingshen Song, Yuexiang Yang:
Performance Evaluation of Inverted Index Traversal Techniques. 1715-1720 - Junyi Li, Jianhua Li:
Remote Sensing Image Classification Based on Hybrid Entropy and L1 Norm. 1721-1726 - Junyi Li, Jianhua Li, Shuicheng Yan:
Multi-instance Learning Using Information Entropy Theory for Image Retrieval. 1727-1733 - Xun Wang, Xingang Liu, Lingyun Lu, Zhixin Shen:
A New Facial Expression Recognition Method Based on Geometric Alignment and LBP Features. 1734-1737 - Qijun Shen, Jian Cao, Hua Gu:
A Similarity Network Based Behavior Anomaly Detection Model for Computer Systems. 1738-1745 - Zheming Dong, Lei Zhang, Jiangtao Li:
Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing. 1746-1751 - Muhammad Asad Khan, Supeng Leng, Ahmer Khan Jadoon, Jiechen Yin:
Backup Backhaul for Femtocells. 1752-1757
Multimedia Systems and Networks
- Chen Li, Yuxiang Xie, Xidao Luan, Kaichao Zhang, Liang Bai:
Automatic Movie Summarization Based on the Visual-Audio Features. 1758-1761 - Lan Zhang, Xingang Liu, Kaixuan Lu:
SVD-Based 3D Image Quality Assessment by Using Depth Information. 1762-1765 - Juanxiong Xu, Lun Tang, Qianbin Chen, Li Yi:
Study on Based Reinforcement Q-Learning for Mobile Load Balancing Techniques in LTE-A HetNets. 1766-1771 - Xing Gao, Jing Liu, Juncong Lin, Minghong Liao, Lisheng Xiang:
Contour-Preserved Retargeting of Cartoon Images. 1772-1778 - Juncong Lin, Guangyu Zhang, Xing Gao, Minghong Liao, Lisheng Xiang:
Realtime Illustrative Rendering of Large Scale Skinned Meshes. 1779-1784 - Kai Kang, Xingang Liu, Kaixuan Lu:
3D Image Quality Assessment Based on Texture Information. 1785-1788 - Hao Sun, Jim X. Chen, Harry Wechsler, Yongquan Jiang:
A New Segmentation Method for Broadcast Sports Video. 1789-1793 - Tao Wu:
Efficient Recording of Parallel Chien Search Results of BCH Code by Three-Staged and Group-Sorted Circuit. 1794-1798 - Mohamed Y. E. Simik, Feng Chi, Abdeldime M. S. Abdelgader, Randa S. I. Saleh:
Automated Alarm System for Diaper Wet Using GSM. 1799-1803
Embedded Computing and Systems
- Faiz Al Faisal, M. M. Hafizur Rahman, Yasushi Inoguchi:
Dynamic Communication Performance of STTN under Various Traffic Patterns Using Virtual Cut-Through Flow Control. 1804-1809 - Chuang Guan, Junjian Bi, Zhiliang Tan, Zhaoxiang Meng:
Analysis and Design of Conical Equiangular Spiral Antenna Using MPIE and QGA Technique. 1810-1813 - Guohua Bai:
An Organic View of Prototyping in Information System Development. 1814-1818 - Xiaojun Zhang, Chunxiang Xu:
Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption. 1819-1826 - Zhongxing Liang, Dan Liu, Ming Zhou:
Research on Large Scale 3D Terrain Generation. 1827-1832 - Xiaoying Zhang, Alagan Anpalagan, Lei Guo:
Performance Improvement of Energy-Aware MANET Routing Algorithm Using Load-Balancing. 1833-1837 - Wenbo Wang, Mao Lin Huang, Liang Fu Lu, Jinson Zhang:
Improving Performance of Forensics Investigation with Parallel Coordinates Visual Analytics. 1838-1843
Emerging Software Techniques
- Xiaohui Zeng, Yibing Shi, Yi Lian:
A Particle PHD Filter with Improved Resampling Design for Multiple Target Tracking. 1844-1849 - Maoqi Luo, Xuelian Yu, Yun Zhou, Xuegang Wang:
Research on Effect of Antenna Beamwidth for Compressive Sensing Based GPR Imaging. 1850-1854 - Lina Wei, Ying Liu:
A License Plate Super-resolution Reconstruction Algorithm Based on Manifold Learning. 1855-1859 - Po-Jen Chuang, Wei-Chin Wong:
Generating Snapshot Backups in Cloud Virtual Disks. 1860-1863 - Jian Zhang, Shuo Zhang, Wuyi Zhang, Kary Kang:
Learning Sparse Representation by K-SVD for Stock Classification. 1864-1867 - B. N. Manjunatha Reddy, H. N. Sheshagiri, B. R. Vijayakumar, Shanthala S:
Implementation of Low Power 8-Bit Multiplier Using Gate Diffusion Input Logic. 1868-1871 - Zhenpeng Liu, Xianchao Zhu, Shouhua Zhang:
Multi-authority Attribute Based Encryption with Attribute Revocation. 1872-1876
Applications, Business and Social Issues
- Jie Xu, Chengyi Gao, Yahong Yu, Jian Sun:
Optimal Control of an Improved SIR Model Based on Cholera Spreading. 1877-1881 - Jian Li, Hanyi Du, Yingru Liu, Kai Zhang, Hui Zhou:
Extended Gradient Local Ternary Pattern for Vehicle Detection. 1882-1885 - Takenori Shimosaka, Hitoshi Murai, Mitsuhisa Sato:
A Design of a Communication Library between Multiple Sets of MPI Processes for MPMD. 1886-1893 - Xiaolin Meng, Gangyong Jia, Jian Wan, Jilin Zhang:
Pseudo Share: Bring Shared to Exclusive for Main Memory in Multi-core Systems. 1894-1899 - Jian Zhang, Song Zhang, Zhihong Dan, Chufan Jiang:
Variable Universe Fuzzy PID Control for Multi-level Gas Tank Pressure. 1900-1904 - Xiaojun Liu, Fangying Du, Junyi Li:
SSH: Image Index Based on Sparse Spectral Hashing. 1905-1908 - Qing Lei, Yingtao Jiang, Mei Yang:
Evaluating Open IaaS Cloud Platforms Based upon NIST Cloud Computing Reference Model. 1909-1914
CPS and Internet of Things
- Cui Yang, Bo Yuan, Ye Tian, Zongming Feng, Wei Mao:
A Smart Home Architecture Based on Resource Name Service. 1915-1920 - Limei Lin, Li Xu, Shuming Zhou, Wei Wu:
The Social Feature-Based Priority Relation Graph of Mobile Social Networks. 1921-1926 - Jie Duan, Xiong Wang, Sheng Wang, Shizhong Xu:
Cache Management for Information-centric Networking. 1927-1933 - Qiu Chen, Koji Kotani, Feifei Lee, Tadahiro Ohmi:
Face Recognition Using Markov Stationary Features and Vector Quantization Histogram. 1934-1938 - Qingqiang Wu, Yan Zheng, Yingying She, Xinying An:
Emerging Topic Detection Model Based on LDA and Its Application in Stem Cell Field. 1939-1944 - Yong Li, Jizhong Han, Wei Zhou:
Cress: Dynamic Scheduling for Resource Constrained Jobs. 1945-1952 - Yanjiang Wei, Rui Wang, Danfeng Zhu, Zhongzhi Luan, Depei Qian:
Lessons from Experimental Methodology of Cache Hierarchy Changes with the Memory Technology. 1953-1959 - Zhenpeng Liu, Ding Guo, Xizhong Zhang, Xu Wang, Xianchao Zhu:
An Improved Semi-supervised K-Means Algorithm Based on Information Gain. 1960-1963 - Jinrong Zhong, GongJian Wen, CongHui Ma, Boyuan Ding:
Time-Domain Dictionary for Sparse Representation of Radar High Resolution Range Profile. 1964-1967 - Jie Wen, Jiao Dai, Jizhong Han, Fangchun Di, Hu Yan:
Llama: Distributed Multi-versioned Model Data Management for SCADA. 1968-1973 - Xiaodong He, Jun Zhu, Jun Wang, Dongping Du, Bin Tang:
False Target Deceptive Jamming for Countering Missile-Borne SAR. 1974-1978
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.