default search action
8th SNPD 2007: Qingdao, China
- Wenying Feng, Feng Gao:
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China. IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 3
- Xuerong Gong, Linsheng Lu, Rongcai Zhao:
Communication Optimization Algorithms based on Extend Data Flow Graph. 3-8 - Guoteng Pan, Qiang Dou, Lunguo Xie:
Study on distributing pattern of shared data in CC-NUMA system. 9-14 - Huafeng Deng, Yunsheng Liu, Yingyuan Xiao:
A Novel Algorithm for Load Balancing in Distributed Systems. 15-19 - Ke Shi:
A Replication and Cache based Distributed Metadata Management System for Data Grid. 20-25 - Lifeng Qi, Hexin Chen, Yan Zhao:
New Synchronization Scheme Between Audio and Video. 26-29 - Wei Tian, Yizheng Qiao, Zhiqiang Ma:
A New Scheme for Off-line Signature Verification Using DWT and Fuzzy Net. 30-35 - Yun Liu, Xiangguang Zhang, Chuanxu Wang:
A New Kind of Hybrid Filter Based on the Peak-and-Valley Filter and PCNN. 36-39 - Lijie Zhang, Haili Yin, Hui Liu:
Slices Mining Based on Singular Value. 40-43 - Jingsong He, Jian Tan, Qiansheng Fang:
Parzen Windows Estimation Using Laplace Kernel: A Novel Parametric Analysis with Information Content. 44-49 - Wen Zhou, Zongtian Liu, Yan Zhao:
Concept Hierarchies Generation for Classification using Fuzzy Formal Concept Analysis. 50-55 - Yue Hou, Jinyun Pu:
The Intelligent Damage Assessment and Intelligent Reconfiguration System of Ship Diesel System. 56-61 - J. G. Yin, Mingjiu Gai, G. Zhou, X. H. Hou:
Periodic solution for a class of higher-dimension impulsive functional differential equations with parameter. 62-66 - Weiming Wang, Zhenbing Zeng, Lu Yang:
A new mechanical algorithm for solving system of Volterra integral equation. 67-72 - Chao Zhang, Lianghong Zhang:
Classification for a class of second order singular equations on time scales. 73-76 - Shijie Dong, Zhifeng Gao, Yunhai Wang:
Positive Solutions for Quasilinear Second Order Differential Equation. 77-80 - Bo Deng, Yajun Du:
Research on Matching between User Queries and Web Pages Based on BAM. 81-85 - Yan Chen, Benoit Boulet, Ping Chen, Mingbo Zhao:
Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force Transducers. 86-91 - Yijiang Chen, Xiaodong Shi, Changle Zhou, Chang Su:
Automatic Keyphrase Extraction from Chinese Books. 92-97 - Ping Chen, Mingbo Zhao, Shaoqing Jia:
The Application of Fuzzy Neural Network in the Iatrical Monitor. 98-103 - Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang:
Using Trust Metric to Detect Malicious Behaviors in WSNs. 104-108 - Bing Liu, Ke Yu, Lin Zhang, Huimin Zhang:
MAC Performance and Improvement in Mobile Wireless Sensor Networks. 109-114 - Fang Wang, Guifa Teng, Lisheng Ren:
The Upper Bound of The Number of Nodes On Fixed Energy Budget in Wireless Sensor Networks. 115-118 - Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao:
Agent-based Trust Model in Wireless Sensor Networks. 119-124 - Shujuan Ji, Yongquan Liang, Xingpeng Xiao, Jixue Li, Qijia Tian:
An Attitude-adaptation Negotiation Strategy in Electronic Market Environments. 125-130 - Feixiang Zhu, Yingjun Zhang, Wenhai Sang:
Web Marine Spatial Information Service Based on Electronic Nautical Charts. 131-136 - Xin Jin, Jing Xu, XueMeng Li:
The Design and Implementation of XML-based Workflow Engine. 137-142 - Nimmy Ravindran, Yao Liang:
HIDE - A Web-based Hydrological Integrated Data Environment. 143-148 - Guilin Li, Jianzhong Li:
An Energy Efficient Query Procesing Algorithm Based on Relevant Node Selection for Wireless Sensor Networks. 149-154 - Liming He:
Delay-Minimum Energy-Aware Routing Protocol (DERP) for Wireless Sensor Networks. 155-160 - Liming He:
Energy-Efficient Multi-Path Routing with Short Latency and Low Overhead for Wireless Sensor Networks. 161-167 - Yingchang Xiang, Dechang Chen, Xiuzhen Cheng, Kai Xing, Min Song:
Localized Flooding Backbone Construction for Location Privacy in Sensor Networks. 167-171 - Ligang Dong, Bin Zhuge, Weiming Wang:
Research on Logical Function Blocks in ForCES-Based Routers. 172-177 - Huaxi Gu, Kun Wang, Chu Ke, Changshan Wang, Guochang Kang:
A New Inner Congestion Control Mechanism in Terabit Routers. 178-181 - Tao Li, Xiaoming Zhang, Zhigang Sun:
DynaNP - A Coarse-grain Dataflow Network Processor Architecture with Dynamic Configurable Processing Path. 182-187 - Zheng Gong, Yu Long, Xuan Hong, Kefei Chen:
Two Certificateless Aggregate Signatures From Bilinear Maps. 188-193 - Jia Yu, Fanyu Kong, Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability. 194-199 - Chengyu Hu, Daxing Li:
Forward-Secure Traceable Ring Signature. 200-204 - Xiaoming Hu, Shangteng Huang:
An Efficient ID-Based Restrictive Partially Blind Signature Scheme. 205-209 - Junqing Yang, Min Zhou, Quanyi Lv, Hongchan Zheng:
Geometric Design of Developable Bezier and B-spline Parametric Surfaces. 210-215 - Junqing Yang, Min Zhou, Xiaohong An, Lining Zhang:
Offset Approximation Algorithm for Subdivision Surfaces. 216-221 - Guili Yuan, Ji-zhen Liu, Wen Tan, Xiangjie Liu:
The Research and Application of Fuzzy Immune PID Control in the Load Control System of Tube Mill. 222-226 - Jixin Ma:
State-based Time-Series Analysis and Prediction. 227-232 - Lizhen Wang, Ao Yang, Hong Zhang:
Data Mining Prediction of Shovel Cable Service Lifespan. 233-238 - Xu E, Shaocheng Tong, Liangshan Shao, Baiqing Ye:
Rough Set Approach for Processing Information Table. 239-243 - Jianhua Wu, Qinbao Song, Junyi Shen:
An Novel Association Rule Mining Based Missing Nominal Data Imputation Method. 244-249 - Kuixiang Gou, Xiujun Gong, Zheng Zhao:
Learning Bayesian Network structure from distributed homogeneous data. 250-254 - Xiangguang Zhang, Yun Liu, Chuanxu Wang:
Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring Element. 255-258 - Jun Zhang, Jun Liu:
Image Segmentation with Multi-Scale GVF Snake Model Based on B-Spline Wavelet. 259-263 - Lihua Fu, Hongwei Li, Meng Zhang, Yuantong Shen:
Group Delay Based Approach for Frequency Estimation in Complex Noises. 264-268 - Shengli Shi, Zhong Qin, Jianmin Xu:
Robust Algorithm of Vehicle Classification Application. 269-272 - Rupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li:
Key-Insulated Group Signature Scheme with Verifier-Local Revocation. 273-278 - Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. 279-284 - Rongbo Lu, Dake He, Changji Wang:
Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings. 285-290 - Xiaoming Hu, Shangteng Huang:
An Efficient ID-Based Partially Blind Signature Scheme. 291-296 - Junli Lu, Lizhen Wang, Yaobo Li:
A Fuzzy Clustering Method Based on Domain Knowledge. 297-302 - Yijun Bei, Gang Chen, Lihua Yu, Feng Shao, Jinxiang Dong:
XML Query Recommendation Based On Association Rules. 303-308 - Ziqiang Wang, Qingzhou Zhang, Dexian Zhang:
An IA-Based Classification Rule Mining Algorithm. 309-313 - Jing Liu, Fei Fu, Junmo Xiao, Yang Lu:
Secure Routing for Mobile Ad Hoc Networks. 314-318 - Hailun Xia, Zhimin Zeng, Wei Ding:
Adaptive Backoff Algorithm based on Network Congestion in Multi-hop Wireless Ad hoc Networks. 319-324 - Jingjing Wang, Mingbo Zhao:
Scatternet Formation Algorithm in Multi-hop Environment based on Bionics. 325-330 - Yuhua Liu, Hao Huang, Kaihua Xu:
Multi-path-based Distributed TCP Caching for Wireless Sensor Networks. 331-335 - Dongbo Zhang, Yaonan Wang, Huixian Huang:
Rough Neural Network Modeling Through Supervised G-K Fuzzy Clustering. 336-341 - Keliang Jia, Kang Chen, Xiaozhong Fan, Yu Zhang:
Chinese Question Classification Based on Ensemble Learning. 342-347 - Xiao Yang, Jiancheng Wan, Fang Tan:
A Parsing Model Based on Ordered Tree Inclusion Matching. 348-353 - Ziping Zhao, Yaoting Zhu:
Study on Prediction of Prosodic Phrase Boundaries in Chinese TTS. 354-358 - Burim Sirisanyalak, Ohm Sornil:
Artificial Immunity-Based Feature Extraction for Spam Detection. 359-364 - Shu Gao, Dingfang Chen:
Semantic Approach to Visualization Service Discovery. 365-370 - Xiangang Zhao, Liutong Xu, Bai Wang:
A Resource Allocation Model with Cost-Performance Ratio in Data Grid. 371-376 - Zhitao Guan, Yuanda Cao, Muhammad Hanif Durad, Liehuang Zhu:
An Efficient Hybrid P2P Incentive Scheme. 377-382 - Yingkun Hou, Xiangcai Zhu, Zhu Lili, Mingxia Liu:
Image with Less Information Watermarking Algorithm Based on DWT. 383-387 - Meihua Wang, Kefeng Fan, Bin Yue, Xiaojun Yu:
A Content Protection Scheme for H.264-based Video Sequence. 388-393 - Hui Gao, Shanguang Chen, Guangchuan Su:
Emotion classification of mandarin speech based on TEO nonlinear features. 394-398 - Zhi Liu, Yun Zhang:
Stochastic Network Fluid Modeling with Probabilistic Wavelet System. 399-403 - Zongyuan Deng, Xi Shao, Zhen Yang:
A Novel Approach to Detect the Presence of LSB Steganographic Messages. 404-408 - Zhenfeng Gao, Yunhai Wang, Yanping Guo:
Multiple Positive Solutions for Second Order m-Point Boundary Value Problems. 409-412 - Weihua Jiang, Xiuming Li, Bin Wang:
LATEX The existence of positive solutions for multi-point BVPs with dependence on the first order derivative. 413-416 - Jiqing Qiu, Hongjiu Yang, Jinhui Zhang:
Optimal Guaranteed Cost Control for a Class of Uncertain Systems with both State and Input Delays via Delta Operator Approach. 417-422 - Lianqing Su, Zhifeng Gao, Jiqing Qiu, Peng Shi:
Robust Stability of Uncertain Cellular Neural Networks with Time-Varying Delays. 423-426 - Limei Zhou, Liwei Zhang:
A Log-Sigmoid lagrangisn neutral network for solving nonlinear programming. 427-431 - Shujuan Ji, Qijia Tian, Yongquan Liang, Hongmei Yang:
An Ontology Framework for EC Automated Negotiation Protocol. 432-437 - Hongxia Jin, Jianna Zhao, Xiaoxuan Chen:
The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects. 438-443 - Fang Jin, Peide Liu, Xin Zhang:
The Evaluation Study of Knowledge Management Performance Based on Grey-AHP Method. 444-449 - Peide Liu:
Evaluation Model of Customer Satisfaction of B2C E-Commerce Based on Combination of Linguistic Variables and Fuzzy Triangular Numbers. 450-454 - Xuesen Ma, Jianghong Han, Zhenchun Wei, Yuefei Wang:
an Improved Adaptive Genetic Algorithm in Optimization of Partner Selection. 455-460 - Chengming Qi:
An Ant Colony System Hybridized with Randomized Algorithm for TSP. 461-465 - Jian Tang, Jingsong He, Lu Huang:
A New Optimization Engine for the LSF Vector Quantization. 466-471 - Duc Thanh Nguyen:
Solving Timetabling Problem Using Genetic and Heuristic Algorithms. 472-477 - Hongjiang Wang, Fei Ji, Shengming Jiang, Liying Huang, Gang Wei:
stability analysis of timing acquisition methods with multi-hypothesis in indoor UWB multipath and MAI channel. 478-483 - Jingyi Wang, Zhiyu Zhou, Jian Wu:
An Innovative Restoration Algorithm with Prioritized Preemption Enabled. 484-489 - Fei Nie, Zengzhi Li:
Congestion Control Model Based on Hop-by-hop Feedback for Active Networks. 490-494 - Lin Huang, Yulin Zhang, Yonghong Ren:
Two multi-constrained multicast QoS routing algorithm. 495-500 - Fengqin Zhang:
Anti-periodic boundary value problem for impulsive differential equations with delay. 501-504 - Zhen Jin, Mainul Haque:
The SIS epidemic model with impulsive effects. 505-507 - Chun Ma, Fengqin Zhang, Zhen Jin:
Global Stability of a tuberculosis model with vertical transsmission. 508-511 - Jietao Zou, Jianguo Zhang, Xiaoyou Han, Hongxia Zhu:
Oscillations of a class of second-order nonlinear delay differential equations with variable sign coefficients. 512-516 - Jing Qiu, Lejian Liao:
Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking. 517-521 - Jing Qiu, Xiaofeng Liao, Ping Wang:
A method to construct dynamic S-box based on chaotic map. 522-525 - Jiancheng Ni, Zhishu Li, Zhonghe Gao, Jirong Sun:
Threats Analysis and Prevention for Grid and Web Service Security. 526-531 - Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent:
A Framework for Revocation of Proxy Certificates in a Grid. 532-537 - Xudong Lu, Jiancheng Wan:
User Interface Design Model. 538-543 - Liyan Yuan, Meng Xue:
Xregion: A structure-based approach to Storing XML Data in Relational Databases. 544-551 - Yanping Guo, Wei Xiang, Xiujun Liu:
The existence of periodic solutions for a class impulsive differential equations. 552-555 - Hyungchoul Kim, Sungwon Kang, Jongmoon Baik, In-Young Ko:
Test Cases Generation from UML Activity Diagrams. 556-561 - Bin Wang, Silian Sui, Hongliang Zhao:
Nash Equilibrium stability of rent-sinking competition and its game analysis. 562-566 - Binbin Du, Guang Zhang:
Classification and Existence of Non-oscillatory Solutions for Two-Dimensional Neutral Difference System. 567-572 - Shuang Li, Hailun He, Jinbao Song:
An Optimized Breaking Index for the Boussinesq-Type Numerical Model. 573-577 - Hailun He, Shuang Li, Jinbao Song:
Validity Test of the Eigenfunction Expansion Method in the Transient Wave Propagation Simulation. 578-581 - Conghua Zhou, Shiguang Ju:
SAT-based Bounded Model Checking for SE-LTL. 582-587 - Yong Liu, Ai-guang Yang:
Research and Application of Software-reuse. 588-593 - Yunmei Du, Shixian Li:
The differences of COTS-based project stakeholders. 594-598 - Ming Zhong, Yaoxue Zhang, Pengwei Tian, Cunhao Fang, Yuezhi Zhou:
A Unified-Index Based Distributed Specification for Heterogeneous Components Management. 599-604 - Shihong Feng, Jiancheng Wan:
Multi-device User Interface Development with Composition-oriented User Interface Design Patterns. 605-610 - Guangdong Huang, Ping Ling, Qun Wang:
A hybrid metaheuristic ACO-GA with an Application in Sports Competition Scheduling. 611-616 - Xianmei Zhao, Haoyin Li, Jin Zhang:
GA in Optimized Control of Central Air-conditioning System Based on ANN Simulation. 617-622 - Pei He, Lishan Kang, Qiongzhang Li:
Model for Parallel Verification of Programs. 623-628 - Mikhail Chalabine, Christoph W. Keßler:
A Survey of Reasoning in Parallelization. 629-634 - Yong Li:
Non-interactive Designated Confirmer Signature with Specific Verifier. 635-640 - Ling Dong, Kefei Chen, Mi Wen, Yanfei Zheng:
Protocol Engineering Principles for Cryptographic Protocols Design. 641-646 - Yong Yu, Bo Yang, Ying Sun:
A provably secure ID-based mediated signcryption scheme. 647-652 - T. Srinivasan, N. Vidyapriyadarshini, Smrithika Appaiah:
A Business Modeled Approach for Trust Management in P2P Networks. 653-658 - Ziqiang Wang, Qingzhou Zhang, Dexian Zhang:
A PSO-Based Web Document Classification Algorithm. 659-664 - Zhenguo Chen:
Data Mining based on Clonal Selection Wavelet Network. 665-669 - Jiarong Cai, Yubao Liu, Jian Yin:
An Improved Semantic Smoothing Model for Model-Based Document Clustering. 670-675 - Wei-Dong Cai, Zhangyan Xu, Wei Song, Bingru Yang:
A Quick Algorithm for Computing Core Based on the Positive Region. 676-681 - Shuyun Wang, Hexiang Xu, Yunfa Hu:
Finding Frequent Items in Data Streams using ESBF. 682-687 - Xizheng Zhang:
Survivable and Efficient Clustered Keying In Wiresless Sensor Networks. 688-693 - Nayat Sánchez-Pi, Virginia Fuentes, Javier Carbó, José Manuel Molina:
Knowledge-based system to define context in commercial applications. 694-699 - Patrick Maeder, Ilka Philippow, Matthias Riebisch:
A Traceability Link Model for the Unified Process. 700-705 - Dan Wu, Libin Wu:
Hierarchical Junction Trees as the Secondary Structure for Inference in Bayesian Networks. 706-712 - Xia Wang, Hongmei Tang, Xiaoqun Zhao:
Noisy Speech Recognition Based on Speech Enhancement. 713-716 - Debin Pang, Ning Zhang:
Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System. 717-721 - Hongmei Yang, Yongquan Liang, Lianshan Liu, Haibin Sun:
HVS-based imperceptibility measure of watermark in watermarked color image. 722-727 - Ying Yang, Jing Sheng, Wei Zhou:
Detecting Arithmetic of Passenger's Location Based on Image Processing. 728-731 - Jinshu Han:
Speeding up Fractal Image Compression Based on Local Extreme Points. 732-737 - Aiqing Wang, Sen Zhang:
A Combining Approach for Chinese Word Segmentation. 738-743 - Haroon-Ur-Rashid Khan, Shi Feng:
Performance Evaluation of TriBA - A Novel Scalable Architecture. 744-749 - Hao Fu, Ming Cai, Liu Fang, Peng Liu, Jinxiang Dong:
Research on RTOS-Integrated TMR for Fault Tolerant Systems. 750-755 - Feng Shao, Gang Chen, Lihua Yu, Yijun Bei, Jinxiang Dong:
Bitmap Filtering: An Efficient Speedup Method for XML Structural Matching. 756-761 - Chunyong Yin, Jianshi Li, Ruxia Sun:
A Modified Model for Private Data Security Facing E-commerce. 762-765 - Xuejuan Huang, Xinmeng Chen, Jiazhen Xu, Hua Li, Jinshuo Liu:
Approach toward a flexible semantic E-business in Web Service Community. 766-771 - Changjun Hu, Xiaoming Zhang, Qian Zhao, Chongchong Zhao:
Ontology-Based Semantic Integration Method for Domain-Specific Scientific Data. 772-777 - Yuanfan Zhang, Laurence Capus, Nicole Tourigny:
A Learner Model for Learning-by-Example Context. 778-785 - Zhong Xie, Zi Ye, Liang Wu:
Research on Building Polygon Map Generalization Algorithm. 786-791 - Yuan Chen, Shengsheng Yu, Jingli Zhou, Jun Fan:
Video Transmission over Ad Hoc Networks Using Multiple Description Coding and Clustering-based Multiple Paths. 792-797 - Lei Zhang, Jun Ma, Xinshun Xu, Bo Yuan:
Rotation Invariant Image Classification based on MPEG-7 Homogeneous Texture Descriptor. 798-803 - Junhai Luo, Mingyu Fang, Danxia Ye:
Research on Topology Discovery for IPv6 Network. 804-809 - Jianyun Ni, Jing Luo:
Design of Multimedia Conference Control System based on SIP. 810-814 - Bo Xu, Zhenbao Zhang, Jiazhen Wang, Xiaoqin Liu:
Improved BSS Based Schemes for Active Steganalysis. 815-818 - Jinglei Zhang, Zhengguang Liu:
A Vision-Based Road Surveillance System Using Improved Background Subtraction and Region Growing Approach. 819-822 - Shifeng Ou, Xiaohui Zhao, Ying Gao:
Variable Step Size Technique for Adaptive Blind Decorrelation. 823-826 - Shifeng Ou, Xiaohui Zhao, Ying Gao:
Speech Enhancement Employing Modified a Priori SNR Estimation. 827-831 - Hui Li, Xin Wang, Beiqian Dai, Wei Lu:
A Kalman Smoothing Algorithm for Speech Enhancement Based on the Properties of Vocal Tract Varying Slowly. 832-836 - Lihua Ai, Siwei Luo:
Job-attention Replica Replacement Strategy. 837-840 - Ai Wu, Lianhai Yuan, Xinsong Liu, Kejian Liu:
A P2P Architecture for Large-scale VoD Service. 841-846 - Yadong Gong, Xiaola Lin:
Exploiting Heterogeneity of Nodes to Enhance Search Performance in Large-Scale Peer-to-Peer Network. 847-852 - Xizheng Zhang:
Building personalized recommendation system in E-Commerce using association rule-based mining and classification. 853-857 - Jia Xu:
A software architecture for real-time embedded systems based on pre-run-time scheduling. 858-863 - Zhang Sen, Yao Zheng:
The relation of CMM and software lifecycle model. 864-869 - Dapeng Liu, Shaochun Xu:
New Software Quality Metrics for Object-Oriented Programs. 870-875 - Fei Yang, Baolin Yin:
Address Fragment-Compact Garbage Collection Algorithm. 876-881 - Xuede Zhan:
A Formal Testing Framework for UML Statecharts. 882-887 - Yan Wang, Baoxiang Cao:
Fuzzy Many-Valued Context Analysis Based on Formal Description. 888-892 - Yuxia Lei, Yan Wang, Baoxiang Cao:
Knowledge Interconnection Based on Binary Semantic Relation Analysis. 893-898 - Tu Xu, Dake He, Yu Luo:
A New Orientation for Multi-Class SVM. 899-904 - Jun Qu, Qingshan Jiang, Fangfei Weng, Zhiling Hong:
A Hierarchical Clustering Based on Overlap Similarity Measure. 905-910 - Sirui Yang, Hai Jin, Xiaofei Liao, Hong Yao:
OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale Networks. 911-916 - Jianhua Sun, Jizha Qin, Shu Chen, Hao Chen, Dingding Li:
A Virus Immunization Model Based on Communities in Large Scale Networks. 917-922 - Fanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. 923-926 - Bangju Wang, Huanguo Zhang, Yuhua Wang:
Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). 927-931 - Fasheng Wang, Qingjie Zhao, Hongbin Deng:
A Mixed Fast Particle Filter. 932-936 - Jun Yue, Zhinong Zou, Jinsong Tang, Aiqing Wang:
Experiment of Phase Unwrapping algorithm in Interferometric Synthetic Aperture Sonar. 937-942 - Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang:
A New Data Protecting Scheme Based on TPM. 943-947 - Deyun Yang, Zhengliang Huan:
On the Encryption of Image Decompression with User's Identity. 948-951 - Haihe Shi, Jinyun Xue:
Towards Semi-Automatic Generation of Provably Correct Algorithmic Programs. 952-957 - Xin Lü:
Distributed Secure Information Sharing Model for E-Government in China. 958-962 - Dongli Zhang, Dan Ionescu:
QoS Performance Analysis in Deployment of DiffServ Aware MPLS Traffic Engineering. 963-967 - Wei Zhang, Jingsha He:
Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks. 968-973 - Ruyan Wang, Dapeng Wu, Fang Guo:
Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic. 974-978 - Jiaxin Qiao:
Research on XML United-Signature Technology and Its Implementation. 979-983 - Jun Yue, Ming Chen, Jinsong Tang:
Experimentation of Interferometric Synthetic Aperture Sonar. 984-988 - Shuguo Yang, Chunxia Li, Sheng-He Sun, Yaoqun Xu:
A Robust 3D Model Watermarking Scheme Based on Feature Recognition. 989-993 - Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang:
Trustable Ad Hoc Networks of Agent Societies. 994-1000 - Fangfei Weng, Qingshan Jiang, Lifei Chen, Zhiling Hong:
Clustering Ensemble based on the K-NN Algorithm. 1001-1006 - Haijun Wang, Shaoliang Wei, Yimin Chen:
An Improved Attribute Reduction Algorithm Based on Rough Set. 1007-1010 - Wen Ye, Hongxu Cui:
Mining of Reuse Patterns in CDMA Network Optimization. 1011-1016 - Liuling Dai, Bing Huang, Dongxiao Yang:
A Connection Degree-Based Rough Set Model and its Application to Knowledge Reduction. 1017-1021 - Frederic D. McKenzie, Herbie H. Piland III, Min Song:
Incorporating a PMF-Based Injury Model into a Multi-Agent Representation of Crowd Behavior. 1022-1027 - Qi Wang, Xiaosu Xu:
SINS/GPS Integrated Navigation for AUV with RBF-Neural Network. 1028-1033 - Wei Liang, Haibin Yu, Chang Che:
An Adaptive Probability Access Mechanism for Wireless Sensor Network. 1040-1045 - Dayin Promkotwong, Ohm Sornil:
A Mesh-Based QoS Aware Multicast Routing Protocol. 1046-1051 - Xijun Zhu, Zhimin Li, Yueming Dai:
An Improved Estimation Algorithm for User Vertical Protection Level. 1052-1055 - Chunhai Kou, Xiuyun Zhang:
Solutions of fractional differential equations with constant coefficients. 1056-1059 - Jinjun Zhao, Yang Xu:
Numerical Stability of Delay Integro-Differential Equations under Resolvent Conditions. 1060-1063 - Tingming Wang, Aiqing Wang:
Matrix Method for Principal Normal Form of Propositional Formula. 1064-1067 - Peng Wang, Baowei Song, Yonghu Wang, Lichuan Zhang:
Application of Concurrent Subspace Design to Shape Design of Automatic Underwater Vehicle. 1068-1071 - Guoyong Cai, Ji Gao, Yong Huang:
Modeling electronic institutions with extended colored Petri net. 1072-1077 - Shuaiqiang Wang, Jiancheng Wan, Jinkui Hou:
OR-ATP: An Operation Refinement Approach As a Process of Automatic Theorem Proving. 1078-1083 - Huiyang Li, Xianghong Sun, Kan Zhang:
Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests. 1084-1088 - Chuanyao Yang, Yuqin Li, Zhenghua Wang, Chenghong Zhang, Yunfa Hu:
A Collaborative Retrieval System-Full Text Base and Database. 1089-1094 - Sungchul Hong, Yeong-Tae Song:
Efficient XML query using Relational Data Model. 1095-1100 - Qingtian Zeng:
Two Symmetrical Decomposition Methods for Structure-complex Petri Net and Their Applications. 1101-1106 - Guangde Wang, Fang Miao, WenJia Zhang, Hongyang Yu:
A Dynamic and Interactive Diagnosing and Testing Method for Development of Digital TV Receiver System. 1107-1112 - Zhi Xiong, Chengcheng Guo:
Documents Distribution Strategy Based on Queuing Model and Chaotic Searching Algorithm in Web Server Cluster. 1113-1118 - Wenhui Ma, Wenbin Fang, Gang Wang, Jing Liu:
Concept Index for Document Retrieval with Peer-to-Peer Network. 1119-1123 - Junyi Li, Jiaguang Sun:
Automated Test Data Generation Algorithm Based On Reversed Binary Tree. 1124-1128 - Xiao Ma, J. Jenny Li, David M. Weiss:
Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation. 1129-1134 - D. Evangelin Geetha, Ch. Ram Mohan Reddy, T. V. Suresh Kumar, K. Rajani Kanth:
Performance Modeling and Evaluation of e-commerce Systems Using UML 2.0. 1135-1140 - Osama Dandash, Phu Dung Le, Bala Srinivasan:
Security Analysis for Internet Banking Models. 1141-1146 - Chuanyao Yang, Yuqin Li, Zhenghua Wang, Chenghong Zhang, Yunfa Hu:
A Yellow Page Information Retrieval System Based on Sorted Duality Interrelevant Successive Tree and Industry Ontology. 1147-1152 - Mingyi Mao, Zhicheng Chen, Qian Mo:
The Architecture of CAR Component Web Service. 1153-1157 - Xingkai Yang, Chengshu Lü, Yanzhang Wang:
Study on the E-Government Information Sources Exchange Based on Directory Service. 1158-1163 - Jayamsakthi Shanmugam, M. Ponnavaikko:
XSS application worms: New Internet infestation and optimized protective measures. 1164-1169 - Li Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang:
Automatic attack plan recognition from intrusion alerts. 1170-1175 - Fengyin Li, Jiguo Yu, Hongwei Ju:
A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem . 1176-1182
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.