default search action
8th DASC 2009: Chengdu, China
- Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, Chengdu, China, 12-14 December, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3929-4
The Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2009)
Theoretical Research and Algorithm
- Wenhong Tian:
Adaptive Dimensioning of Cloud Data Centers. 5-10 - Jan Calta, Miroslaw Malek:
Formal Analysis of Fault Recovery in Self-Organizing Systems. 11-18 - Geng Chen, Lei Luo, Rong Gong, Shenglin Gui:
Dependability Analysis for AADL Models by PVS. 19-24 - Cássio Martini Martins Pereira, Rodrigo Fernandes de Mello:
Behavioral Study of UNIX Commands in a Faulty Environment. 25-30 - Hui Gao, Yan Fu, Wim H. Hesselink:
Verification of a Lock-Free Implementation of Multiword LL/SC Object. 31-36 - Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka:
Policy Description Language for Dynamic Access Control Models. 37-42 - Salvatore Distefano:
Reliability and Dependability Modeling and Analysis of Dynamic Aspects in Complex Systems. 43-48 - Yoshitaka Arahori, Katsuhiko Gondow, Hideo Maejima:
TCBC: Trap Caching Bounds Checking for C. 49-56 - Jun Zha, Cong Lu, HongGuang Lv:
A Rare Feature Recognition Approach Based on Fuzzy ART Neural Networks. 57-62 - Jian Wan, Peipei Shan, Xianghua Xu:
A Utility-Based Adaptive Resource Allocation Policy in Virtualized Environment. 63-68
Communication and Network
- Vincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa:
Achieving Information Security in Network Computing Systems. 71-77 - Iyad Alsmairat, Rajan Shankaran, Mehmet A. Orgun, Eryk Dutkiewicz:
Securing Session Initiation Protocol in Voice over IP Domain. 78-83 - Hongwu Lv, Huiqiang Wang, Qian Zhao, Chunguang Ma:
Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA. 84-89 - Chatchawin Namman, Anirach Mingkhwan:
Composition Planning for Networked Appliances. 90-94 - Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda:
A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration. 95-102 - Qaisar Rasool, Jianzhong Li, Shuo Zhang:
Replica Placement in Multi-tier Data Grid. 103-108 - Xianghua Xu, Yanna Yan, Jian Wan:
Grey Prediction Control of Adaptive Resources Allocation in Virtualized Computing System. 109-114 - Junguo Liao, Bin Zhu, Yong He:
Security Analysis of NSSK Protocol and its Improvement. 115-118 - Zhifang Li, Wenjian Luo, Lihua Yue, Xufa Wang:
Evolutionary Design of Relatively Large Combinational Circuits with an Extended Stepwise Dimension Reduction. 119-124
Embedded System and Application
- Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang:
Research on Secure and Reconfigurable Architecture Based on Embedded Hardware. 127-131 - Yu Cai, Jianping Yuan, Xiaochuan Ma, Chaohuan Hou:
Low Power Embedded Speech Enhancement System Based on a Fixed-Point DSP. 132-136 - Huiqiang Wang, Xikun Dong, Haifeng Wang:
A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping. 137-142 - Hamid Karimi, Mehdi Kargahi, Nasser Yazdani:
Energy-Efficient Cluster-Based Scheme for Handling Node Failure in Real-Time Sensor Networks. 143-148 - Kunio Miyamoto, Hidehiko Tanaka:
Real Hardware Verification by Software for Bootstrap Using TSC. 149-152
The Eighth International Conference on Pervasive Intelligence and Computing (PICom-09)
Artificial Intelligence and Knowledge Computing
- Siliang Wang:
Solving Aircraft-Sequencing Problem Based on Bee Evolutionary Genetic Algorithm and Clustering Method. 157-161 - Jie Zhang, Wenjian Luo, Baoliang Xu:
Generating an Approximately Optimal Detector Set by Evolving Random Seeds. 162-168 - Tianying Chen, Hongguang Fu:
Learning Navigation Map on Ontology. 169-174 - Wu Chongyun, Wen Jun:
Semantic Web Services Composition Model Based on Domain Ontology Cost Graph. 175-178 - Lipeng Wang, Mingjun Xin:
An Approach to Multi-issue Active Negotiation Control Algorithm in Multi-stages. 179-182 - My Chau Tu, Dongil Shin, Dongkyoo Shin:
A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms. 183-187 - Xueting Tan, Xubo Yang, Shuangjiu Xiao:
Robust and Fast Keypoint Recognition Based on SE-FAST. 188-193 - Fan Min, Xindong Wu, Zhenyu Lu:
Pattern Matching with Independent Wildcard Gaps. 194-199
Nature-Inspired Intelligence and Soft Computing
- Zhiyong Yu, Zhiwen Yu, Xingshe Zhou, Yuichi Nakamura:
Toward an Understanding of User-Defined Conditional Preferences. 203-208 - Jinlong Hou, Yongxin Zhu, Le Zhang, Yuzhuo Fu, Feng Zhao, Li Yang, Guoguang Rong:
Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy. 209-214 - Wei-Jun Pan, Chih-Chun Lin, Leehter Yao:
Adaptive Fuzzy Control with Modulated Membership Function Applies to Path Tracking Based on Location System. 215-220
Social Intelligence and Agent-Based Computing
- Umair Abdullah, Mohammad Jamil Sawar, Aftab Ahmed:
Design of a Rule Based System Using Structured Query Language. 223-228 - Dejian Meng, Stefan Poslad, Yide Zhang:
Intelligent Context-Based Adaptation for Spatial Routing Applications in Dynamic Environment. 229-234 - Jianjiang Li, Xuechun Zhang, Yu Weng, Changjun Hu:
Blog Hotness Evaluation Model Based on Text Opinion Analysis. 235-240 - Yu Wu, Kun She, William Zhu, Xiaojun Yue, Huiqiong Luo:
A Web Text Filter Based on Rough Set Weighted Bayesian. 241-245 - Nermin Brgulja, Rico Kusber, Klaus David, Matthias Baumgarten:
Measuring the Probability of Correctness of Contextual Information in Context Aware Systems. 246-253 - Jianjiang Li, Chengxiu Xue, Yu Weng, Changjun Hu:
Cooperative Alert Topic Detection Model in Distributed Environment. 254-259 - Elodie Billionniere, David Greiman, Kinnis Gosha:
A Comparison of Social Service Selection Techniques. 260-265 - Roxanne B. Raine, Rieks op den Akker, Zhiqiang Cai, Arthur C. Graesser, Danielle S. McNamara:
Synthesis and Analysis in Artificial Intelligence: The Role of Theory in Agent Implementation. 266-269 - Yuan Miao:
A Software Agent Based Simulation Model for Systems with Decision Units. 270-275
Ubiquitous Intelligence and Cyber-Physical Computing
- Hegen Xiong, Kai Xiong, Qiuhua Tang:
A Novel Variable-Boundary-Coded Quantum Genetic Algorithm for Function Optimization. 279-285 - Jianhong Zhang, Hua Chen, Shengnan Gao:
On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes. 286-291 - Qi Xia, Chunxiang Xu:
Cryptanalysis of Two Identity Based Signcryption Schemes. 292-294 - Jie Wen, Kai Ming, Furong Wang, Benxiong Huang, Jianhua Ma:
Cyber-I: Vision of the Individual's Counterpart on Cyberspace. 295-302 - Yacine Bellik, Gaëtan Pruvost, Achilles Kameas, Christos Goumopoulos, Hani Hagras, Michael Gardner, Tobias Heinroth, Wolfgang Minker:
Multidimensional Pervasive Adaptation into Ambient Intelligent Environments. 303-308
Embedded Hardware, Software, and Systems
- Siok Kheng Tan, Zhong Fan:
Performance Study of RFID Localisation in a Challenging Indoor Environment. 311-316 - Yu-Chi Wu, Pei-Fan Chen, Zhi-Huang Hu, Chao-Hsu Chang, Gwo-Chuan Lee, Wen-Ching Yu:
A Mobile Health Monitoring System Using RFID Ring-Type Pulse Sensor. 317-322 - Darshika G. Perera, Kin Fun Li:
Similarity Computation Using Reconfigurable Embedded Hardware. 323-329 - Chunxiu Liu, Gexiang Zhang, Xuebai Zhang, Hongwen Liu:
A Memetic Algorithm Based on P Systems for IIR Digital Filter Design. 330-334 - Yulin Wang, Xuebin Liu:
Key Techniques of Interoperable DRM on Linux Platform. 335-338 - Xiaofei Liao, Xianwen Chen, Hai Jin, Zongfen Han:
VDE: Seamless Mobility on Desktop Environment. 339-344 - Nicholas Katzakis, Masahiro Hori:
Mobile Phones as 3-DOF Controllers: A Comparative Study. 345-349
Pervasive Networks and Communications
- Peiqing Zhang, Bjarne E. Helvik:
Modeling Reputation Scheme in P2P File-Sharing by Stochastic Activity Networks. 353-358 - Chunmei Chen, Hong Jiang, Shi-en Yang:
Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless Networks. 359-363 - Longjiang Li, Supeng Leng, Yuming Mao:
On-demand Query Processing in Mobile Ad Hoc Networks. 364-368 - N. Attarzadeh, Ali Barati, Ali Movaghar:
A New Method for Coverage in Wireless Sensor Networks. 369-372 - Ke Liu, Supeng Leng, Huirong Fu, Longjiang Li:
A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless Networks. 373-378 - Hong Jiang, Yujun Bao, Qiang Li, Yu Qing Huang:
Multi-objective Optimization of Cross-Layer Configuration for Cognitive Wireless Network. 379-383 - Hao Chen, Yajun Guo:
A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network. 384-388 - Zhenzhou Tang, Qian Hu:
An Adaptive Low Latency Cross-Layer MAC Protocol for Wireless Sensor Networks. 389-393 - Rabindra Bista, Kyoung-Jin Jo, Jae-Woo Chang:
A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks. 394-399 - Chunguang Ma, Xiangjun Lin, Hongwu Lv, Huiqiang Wang:
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network. 400-404
Multimedia Technologies and Applications
- Hui Zhu, Bofeng Zhang, Anping Song, Wu Zhang:
An Improved Method to Reduce Over-Segmentation of Watershed Transformation and its Application in the Contour Extraction of Brain Image. 407-412 - Xiuqin Zhong, Hongguang Fu, Junhua Yang, Weiming Wang:
Automatic Segmentation in Tongue Image by Mouth Location and Active Appearance Model. 413-417 - Gufei Sun, Kuangda Li, Xiaoqiang Li, Bofeng Zhang, Shizhong Yuan, Gengfeng Wu:
A General Framework of Brain-Computer Interface with Visualization and Virtual Reality Feedback. 418-423 - Tariq Khan, John Morris, Khurram Jawed, Georgy L. Gimel'farb:
Salmon: Precise 3D Contours in Real Time. 424-429 - Kuangda Li, Gufei Sun, Bofeng Zhang, Shaochun Wu, Gengfeng Wu:
Correlation Between Forehead EEG and Sensorimotor Area EEG in Motor Imagery Task. 430-435 - Chih-Chun Lin, She-Shang Xue, Leehter Yao:
Position Calculating and Path Tracking of Three Dimensional Location System Based on Different Wave Velocities. 436-441 - Xingang Liu, Kook-Yeol Yoo, Ho-Youl Jung, Yongwan Park:
Efficient Video Quality Assessment for Broadcasting Multimedia Signal. 442-447 - Yanru Chen, Guowei Chen, Mitsuji Matsumoto:
A Peer to Peer Large Data Parallel Computing System and its Application in High-Resolution Video Processing. 448-451
The Second International Symposium on Ubisafe Computing (UbiSafe-09)
- Daniel Schneider, Mario Trapp:
Runtime Safety Models in Open Systems of Systems. 455-460 - I. O. de Oliveira, J. L. de Souza Pio:
People Reidentification in a Camera Network. 461-466 - Hong Xia, Yan Chen, Zengzhi Li, Haichang Gao, Yanping Chen:
Web Service Selection Algorithm Based on Particle Swarm Optimization. 467-472 - Qian Zhao, Huiqiang Wang, Guangsheng Feng, Xu Lu, Hongwu Lv:
A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing Theory. 473-477 - Tengfei He, Xiaoguang Mao:
Research on Parallelization of Aspect-Oriented Program. 478-482 - Kunio Miyamoto, Hidehiko Tanaka:
Reducing Program Environment Misjudgement on VM Detection Using TSC. 483-485 - Guang Hu, Jianhua Ma, Benxiong Huang:
Password Recovery for RAR Files Using CUDA. 486-490 - Juan Wei, Bo Yang, Wei Liu:
Design Optimization under Aleatory and Epistemic Uncertainties. 491-495 - Nuno Costa, António Pereira, Carlos Serôdio:
Integration of Resource Poor Wireless Sensor Networks into Smart Spaces. 496-501 - Kyounghee Jung, Younghee Lee:
Autonomic Trust Extraction for Trustworthy Service Discovery in Urban Computing. 502-507 - Behzad Zare Moayedi, Mohammad Abdollahi Azgomi:
A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors. 508-513 - Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang:
Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform. 514-519
The 2009 International Symposium on Network Evolution and Routing Innovation (Routing-09)
- Lei Wang, Ning He:
Study on Buffer Optimal Control Algorithm Based on Infinitesimal Perturbation Analysis for Broadband Satellite Networks. 523-526 - Fangchao Yin, Xin Feng, Yonglin Han, Libai He, Huan Wang:
An Improved Intrusion Detection Method in Mobile AdHoc Network. 527-532 - Mi-Young Kang, Ji-Seung Nam, Seo-Gyun Kim:
Multicasting Tree Transformation for Concurrent Modest Multimedia Service. 533-538 - Zheng Xie, Hongze Leng, Zhi Chen, Jun Zhang:
Finding Arc and Vertex-Disjoint Paths in Networks. 539-544 - Jinsong Gui:
A Routing Misbehavior Detection and Mitigating Scheme Based on Reputation in Hybrid Wireless Mesh Networks. 545-550 - Xiao-Bo Wang, Yu-liang Yang, Jian-wei An:
Multi-metric Routing Decisions in VANET. 551-556 - Hongze Leng, Meilian Liang, Junqiang Song, Zheng Xie, Jun Zhang:
Routing on Shortest Pair of Disjoint Paths with Bandwidth Guaranteed. 557-561 - Hongbin Song, Xiaoqiang Xiao, Ming Xu, Lei Lin:
Data Caching Based on Improved DGA in Ad Hoc Networks. 562-565 - Qian He, Yang Li, Xiumei Fan:
A Study on Buffer Efficiency and Surround Routing Strategy in Delay Tolerant Network. 566-570 - Jian Xu, Xiangcai Zhu:
A Load-Balancing and Energy-Aware Routing Protocol for MANET Accessing Internet. 571-574 - Mingdong Tang, Jing Yang, Guoqing Zhang:
Compact Routing on Random Power Law Graphs. 575-578 - Jie Hou, Yaping Liu, Zhenghu Gong:
A Framework for Identifier-Based Routing for Future Internet. 579-584
The 2009 International Symposium on Social Computing and Networking (SocialNet-09)
- Gao Zhihua, B. Kerong, Cui Lilin:
Noise Source Recognition Based on Two-Level Architecture Neural Network Ensemble for Incremental Learning. 587-590 - Huilian Fan, Guangpu Zeng, Xianli Li:
Crawling Strategy of Focused Crawler Based on Niche Genetic Algorithm. 591-594 - Chengying Mao, Man Luo, Zhenmei Zhu:
A Hybrid Algorithm for Solving Two-Part Division Problem in Network Community Detection. 595-600 - Lihua Zhou, Weiyi Liu, Lizhen Wang:
Influence Diagram Model with Interval-Valued Utilities. 601-605 - Gan Tian, Mo Qian:
Research on Social Relation Extraction of Web Persons. 606-610 - A. V. Manoilo:
World Models and Technologies of Psychological Impact to Resolve International Conflicts. 611-614 - Di Jin, Dayou Liu, Bo Yang, Jie Liu:
Fast Complex Network Clustering Algorithm Using Agents. 615-619 - Aiwu Xu, Xiaolin Zheng:
Dynamic Social Network Analysis Using Latent Space Model and an Integrated Clustering Algorithm. 620-625 - Zhou Jian, Hu Longmao, Zhou Yanran:
Research on Network Flow Evaluation Benchmark Model. 626-631 - Tong Liu, Yanqin Shi, Chensheng Wu:
Research on the Application of Expert Knowledge Map Based on Social Network Analysis. 632-635 - Fei Chen, Wan-hua Cao, Yong Huang:
Research on Component-Based Model Driven Architecture Development and Assembly. 636-641 - Baojie Chai, Dawei Liu, Jie Zhao, Wenjun Yang:
A Study of High Concurrency Workload Influence on Modern Processor. 642-647 - Weimin Luo, Jingbo Liu, Jing Liu, Chengyu Fan:
An Analysis of Security in Social Networks. 648-651 - A. V. Manoilo:
Models of Information and Psychological Operations Used in International Conflicts. 652-657 - Paolo Massa, Martino Salvetti, Danilo Tomasoni:
Bowling Alone and Trust Decline in Social Network Sites. 658-663 - Pushpa Kumar, Li Wang, J. Chauhan, Kang Zhang:
Discovery and Visualization of Hierarchical Overlapping Communities from Bibliography Information. 664-669
The Second International Workshop on Ambient Computing and Intelligence (ACI-09)
- Shiping Zhu, Zaiwen Liu, Xiaoyi Wang, Jun Dai:
Water-Bloom Medium-Term Prediction Based on Gray-BP Neural Network Method. 673-676 - Xueqing Zhang, Zhen Liu, Huizhong Qiu, Yan Fu:
A Hybrid Approach for Chinese Named Entity Recognition in Music Domain. 677-681 - Xiaoyi Wang, Zaiwen Liu, Shiping Zhu, Jun Dai, Chenling Zhu, Minghua Yang:
Research on One Intelligent Prediction Method for Water Bloom. 682-685 - Guoliang Shi, Xiaorong Mou, Xu Wan:
Designing a Network Acquisition System of Competitive Intelligence. 686-689 - Jing Lin, Sahra Sedigh, Ann Miller:
Towards Integrated Simulation of Cyber-Physical Systems: A Case Study on Intelligent Water Distribution. 690-695 - George S. Oreku, Fredrick Japhet Mtenzi:
Intrusion Detection Based on Data Mining. 696-701 - George S. Oreku, Fredrick Mtenzi:
Using Nature to Best Clarify Computer Security and Threats. 702-707
The 2009 International Workshop on Security in Cloud Computing (SCC-09)
- Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. 711-716 - Kai Hwang, Sameer Kulkareni, Yue Hu:
Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement. 717-722 - Gao Xia, Xiaofei Wang, Bin Liu:
SRD-DFA: Achieving Sub-rule Distinguishing with Extended DFA Structure. 723-728 - Sebastian Roschke, Feng Cheng, Christoph Meinel:
Intrusion Detection in the Cloud. 729-734 - Ji Hu, Andreas Klein:
A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud. 735-740
The 2009 International Workshop on Software Engineering and Methodology for Reality Intelligence, Physical-World Aware Systems, and Services (RIPWASS-09)
- Wan Xiao Feng, Wang Bingyi, Zeng Pu, Liu Shung:
A Design of Data Acquisition of High Speed CCD Camera. 743-745 - Abdulrahman A. Mirza, Khaled Alghathbar:
Acceptance and Applications of Smart Cards Technology in University Settings. 746-748 - Le Zhang, Yongxin Zhu, Tingting Mo, Jinlong Hou, Hao Hu:
Design of 3D Positioning Algorithm Based on RFID Receiver Array for In Vivo Micro-Robot. 749-753 - Yuan Lin, Riping Gen, Guixian Xu:
Public-Mailbox-Based Online Homework-Automatic-Processing Platform. 754-757 - Zhiqin Liu, Xiufeng Jiang, Haihao Wang, Kai Zhang:
An On-line Monitor System on Off-Gases of Vehicles with WSN's Design Based on Zigbee Technology. 758-763
The 2009 International Workshop on Mobile, Multimedia, Ad Hoc, and Sensor Networks (MMASN-09)
- Yuan Li, BaoLin Sun, Xing Luo:
Joint Topology-Transparent Scheduling and Multipath QoS Routing in MANETs. 767-771 - Gang Hu, Pan Zhang, Wei Zhang:
The Optimal Design of Tree Structure Based on Ant Colony of Wireless Sensor Networks Routing. 772-776 - Nuno Costa, António Pereira, Carlos Serôdio:
A Practical Solution for Automatic Service Discovery and Usage over Resource Poor Ad-hoc Sensor Networks. 777-781 - Shuchao Ma, Ming Zhu, Lei Wang, Lei Shu, Suran Li, Shumin Huang:
A Remote Monitoring System of IDC Room Based on ZigBee Wireless Sensor Networks. 782-787
The Second International Workshop on Smart Homes for Tele-Health (SmarTel-09)
- Yulan Zhao, Chunfeng Jiang, Xiufeng Fang, Bin Huang:
Research of Fingerprint Image Quality Estimation. 791-795 - Yong Tang:
Interactive Pervasive Wireless Services over GPRS and Bluetooth. 796-801 - Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy:
Robust Medical Data Delivery for Wireless Pervasive Healthcare. 802-807
The 2009 International Workshop on Intellectual Information Systems and Human-computer Interfaces (IISHCI-09)
- Hui Chen, Hai-Tao Jia:
A Newly Developed Diamond Search Algorithm. 811-814 - Yuan Ren, Guangchen Bai:
Comparison of Neural Network and Kriging Method for Creating Simulation-Optimization Metamodels. 815-821
The 2009 International Workshop on Trust Management in Ubiquitous and Pervasive Systems (TMUPS-09)
- Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar, Muhammad Zubair Aziz:
REAR: Real-Time Energy Aware Routing for Wireless Adhoc Micro Sensors Network. 825-830 - Sheng Cao, Yong Chen:
An Intelligent MANet Routing Method MEC. 831-834
Short Papers
- (Withdrawn) Notice of Violation of IEEE Publication PrinciplesA Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval). 837-842
- Yan Fu, Xu Chen, Hui Gao:
A New Connected Component Analysis Algorithm Based on Max-Tree. 843-844 - Yong Ma, Xuewen Chen, Ling Li, Yaoming Luo:
P2P-Based Single Sign-On. 845-846 - Chunfeng Jiang, Yulan Zhao, Wei Xu, Xiangping Meng:
Research of Fingerprint Recognition. 847-848 - Fenggen Jia, Kangping Liu, Bin Zhuge, Weiming Wang:
A Synthetic Network Management Model Based on ForCES FE Model. 849-850 - Juseok Shin, Yongsoo Park, Sungsoo Kim, Youngbak Kim, Kyungoul Kim, Wonseok Choi, Kwangseon Ahn:
A Symmetric Key Based RFID Authentication Protocol Using Encrypted Tag ID. 851-852 - Kyoungyoul Kim, Kyungho Chung, Juseok Shin, Hyunwoo Kang, Sejin Oh, Chunho Han, Kwangseon Ahn:
A Lightweight RFID Authentication Protocol Using Step by Step Symmetric Key Change. 853-854 - Cong Wu, Shiguo Xu:
Realization of Intelligent Dynamic Topology Management in Next Generation Network. 855-856 - Guangpu Zeng, Huilian Fan:
Publish and Subscribe Model Based on WS-Notification. 857-858 - Tao Liao, Zongtian Liu:
Research of Summarization Extraction in Multiple Topics Document. 859-860 - Xiaoping Xu, Junhu Yan:
A Kind of Improved Vector Space Model. 861-862 - Kyungho Chung, Sungsoo Kim, Yonghwan Kim, Myung Sil Choi, Yongsoo Park, Kwangseon Ahn:
A Short Distance Data Dissemination Protocol for Wireless Sensor Networks. 863-864 - Jinzhong Cui, Mengzhuo Luo, Shouming Zhong:
Delay-Dependent Robust Global Asymptotic Stability for Stochastic Neural Networks with Discrete-Delay and Unbounded Distributed Delays. 865-866
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.