default search action
CyberC 2011: Beijing, China
- 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2011, Beijing, China, October 10-12, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1827-4
- Yuqing Mao, Haifeng Shen, Chengzheng Sun:
A Social-Knowledge-Directed Query Suggestion Approach for Exploratory Search. 1-8 - Guo-Heng Luo, Jia-chiam Liu, Shyan-Ming Yuan:
A Two-Layer SVM Classification Mechanism for Chinese Blog Article. 9-15 - Hoang Duy Nguyen, Win-Tsung Lo, Ruey-Kai Sheu:
An AHP-Based Recommendation System for Exclusive or Specialty Stores. 16-23 - Darina Dicheva, Christo Dichev:
Can Collective Use Help for Searching? 24-31 - Yanxu Zhu, Gang Yin, Huaimin Wang, Dianxi Shi, Xiang Rao, Lin Yuan:
Efficient Approach for Repeated Patterns Mining Based on Indent Shape of HTML Documents. 32-39 - Lei Deng, Zhaoyun Ding, Bingying Xu, Bin Zhou, Yan Jia, Peng Zou:
Exploring Event Evolution Patterns at the Atomic Level. 40-47 - Yanyang Guo, Zhaoyin Jiang, Yuan Yuan Wang, Qingling Mei:
Frequent Items Mining on Data Stream Based on Weighted Counts. 48-54 - S. Tom Au, Guangqin Ma, Rensheng Wang:
Iterative Multivariate Regression Model for Correlated Responses Prediction. 55-59 - Zengfeng Zeng, Bin Wu:
Router: A Message Passing Model for Large-Scale Graph Mining. 60-67 - Yung-Wei Kao, Chia Feng Lin, Kuei-An Yang, Shyan-Ming Yuan:
A Cross-Platform Runtime Environment for Mobile Widget-Based Application. 68-71 - Dang Thanh Chuong, Vu Duy Loi, Viet Minh Nhat Vo:
A Performance Analysis of Deflection Routing and FDLs with Wavelength-Based QoS in OBS Networks. 72-78 - Chengqun Yin, Ronggang Zhang:
Access Control for the Smart Meters Based on ABE. 79-82 - Zhigang Liu, Jinkuan Wang, Han Wang:
PCRLB-Based Cluster Selection for Target Tracking in Wireless Sensor Networks. 83-87 - Deivamani Mallayya, Baskaran Ramachandran:
Aspect-Oriented Web Service Composition: A Petri Net Based Approach. 88-95 - Chin-Ling Chen, Jia-Chun Wu:
On Achieving Robustness and Fairness in Call Admission Control for Voice Services within NGN Environment. 96-99 - Hwang Kyu Choi, Yi Qi Gui, Se-Hyun Seo, Choong-Hyo Ko, Ju-Ha Seo:
TDM: Time-Driven Mesh Overlay Network for Peer-to-Peer Video-on-Demand Services. 100-106 - Xuefeng Mu, Wenjun Wu:
A Parallelized Network Traffic Classification Based on Hidden Markov Model. 107-112 - Lin Lin, Qiwu Wu:
A Label Based Greedy Algorithm for Minimum Energy Consumption Multicast Routing in Ad Hoc Networks. 113-117 - Qi Chen, Nan Cheng, Xinhong Wang, Fuqiang Liu:
Multi-metric Opportunistic Routing for VANETs in Urban Scenario. 118-122 - Jian Yang, Li Li, Subin Shen, Charlie Chen-Yui Yang:
A QoS Approach for Detecting and Managing a Fault Alarm Storm. 123-129 - Zhen Zhang, Shanping Li:
Automatic Fine-Grained Transaction Categorization for Multi-tier Applications. 130-138 - Jun-Yan Hu, Chun-Hung Wu, Chia-Chen Chu, Kuan-Hsiung Liang, Hey-Chyi Young, Yung-Yi Hsu, Chung-Hua Hu, Huan-Guo Lin:
Constructing a Cloud-Centric Service Assurance Platform for Computing as a Service. 139-145 - Flavius Pana, Ferdi Put:
Internet Service Delivery Models: Evolution and Current Issues. 146-153 - Li Li, Subin Shen, Charlie Chen-Yui Yang:
LTE CoS/QoS Harmonization Emulator. 154-161 - Charlie Chen-Yui Yang, Michael Ketcham, David Lu, David Kinsey:
Performance Monitoring with Predictive QoS Analysis of LTE Backhaul. 162-169 - Fengyi Yang, Xiaodong Lu:
QoS and Traffic Management for CDMA Network. 170-173 - Ahmad Anzar, Husain Shahnwaz, Gupta S. C.:
QoS by Multiple Cluster Head Gateway Approach in Mobile Ad Hoc Network. 174-176 - Lukman M. Audah, Zhili Sun, Haitham S. Cruickshank:
QoS Evaluation of HTTP over Satellites. 177-182 - Jianbo Lu, Guanzhong Dai, Dejun Mu, Jiang Yu, Haipeng Li:
QoS Guarantee in Tomcat Web Server: A Feedback Control Approach. 183-189 - Salvatore Distefano, Antonio Puliafito, Massimiliano Rak, Salvatore Venticinque, Umberto Villano, Antonio Cuomo, Giuseppe Di Modica, Orazio Tomarchio:
QoS Management in Cloud@Home Infrastructures. 190-197 - Xidong Wu, Zhengye Liu, Yali Liu, Menglin Liu, Charlie Chen-Yui Yang, Jin Wang:
QoS Monitoring and Troubleshooting of a Large Scale IPTV Deployment. 198-205 - Martin Manderscheid, Falk Langer:
Network Calculus for the Validation of Automotive Ethernet In-vehicle Network Configurations. 206-211 - Yung H. Tsin:
Recognizing and Embedding Outerplanar Distributed Computer Networks. 212-219 - Xiaohui Cui, Jesse St. Charles, Thomas E. Potok:
The GPU Enhanced Parallel Computing for Large Scale Data Clustering. 220-225 - Songlin Bai, Hao Wu:
The Performance Study on Several Distributed File Systems. 226-229 - Hao Chen, Bo Xiao, Zhiqing Lin:
Unknown Word Recognition Based on Maximal Cliques. 230-233 - Yali Liu, Zhengye Liu, Xidong Wu, Jin Wang, Charlie Chen-Yui Yang:
IPTV System Design: An ISP's Perspective. 234-240 - Xiaojun Li, Yang Gao, Ying Liu:
Performance Evaluation of Fast Fourier Transform Application on Heterogeneous Platforms. 241-249 - Hsiu-Pang Yeh, Yue-Shan Chang, Chia Feng Lin, Shyan-Ming Yuan:
Accelerating 3-DES Performance Using GPU. 250-256 - Yishi Zhao, Nigel Thomas:
A Simplified Solution of a PEPA Model of Kerberos Protocol. 257-264 - Weijun Chen, Li Xiao:
An Improved Solution of SOM Network Anomaly Detection Based on T-Distribution. 265-268 - Chun-I Fan, Shi-Yuan Huang:
Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage. 269-273 - Jessie J. Walker, Travis Jones, Mansour Mortazavi, Roy Blount:
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments. 274-278 - Hailun Liu, Dongmei Sun, Ke Xiong, Zhengding Qiu:
Is Fuzzy Vault Scheme Very Effective for Key Binding in Biometric Cryptosystems? 279-284 - Yung-Wei Kao, Guo-Heng Luo, Hsien Tang Lin, Yu-Kai Huang, Shyan-Ming Yuan:
Physical Access Control Based on QR Code. 285-288 - Lanxiang Chen:
Using Algebraic Signatures for Remote Data Possession Checking. 289-294 - Qiu-Yan Xu:
A New Parallel Successive Overrelaxation Iterative Algorithm for Poisson Equation. 295-300 - Xiaoyong Zhang, T. Chaoluis, Jiang Hua Sui:
Generalized Laguerre Function-Generalized Hermite Function Mixed Approximation and Its Application. 301-308 - Zhaohui Dang, Yulin Zhang:
A New Method Based on Kalman Filtering Theory for Solving Two Point Boundary Value Problems. 309-312 - Donghua Yang, Jianzhong Li, Xixian Han, Jinbao Wang:
Ad Hoc Aggregation Query Processing Algorithms Based on Bit-Store in Data Intensive Cloud. 313-320 - Wei Liu, Hang Yin, Wei Du:
Dynamic Threshold-Based Energy Efficient Scheduling Algorithm for Parallel Tasks on Homogeneous DVS-Enabled Clusters. 321-328 - Rong Ding, Haiying Du, Bing Yang:
Energy-Based Cluster-Head Inheritance Algorithm for Wireless Sensor Networks. 329-335 - Neil S. O'Brien, Steven J. Johnston, Elizabeth E. Hart, Kamal Djidjeli, Simon J. Cox:
Exploiting Cloud Computing for Algorithm Development. 336-342 - Shiyi Lu, Qing Li:
Improving the Task Stealing in Intel Threading Building Blocks. 343-346 - Genquan Ren, Li Zhang, Jianmin Wang, Yinbo Liu:
One Method for Provenance Tracking of Product Lifecycle Data in Collaborative Service Environment. 347-356 - Jing Wang, Yuchun Guo:
Unbiased Sampling of Bipartite Graph. 357-360 - Stephen S. Yau, Peng Sun:
An Approach to Improving Trust Estimation in Service-Based Systems. 361-367 - Yung-Chiao Chen, Chang-Hsu Chen, Chuan-Ching Sue, Wei-Zhi Chen:
A Reutilization Model for High Utilization and Low Delay Time Properties on Streaming Servers. 368-375 - Jasjit Singh, Eva Mishra, Yogeshwar Sonawane:
Extending Work Queue of HCA Endpoint Using Software Work Queue Approach: Experimental Evaluation with uDAPL. 376-379 - Jaechun No:
Hybrid File System Using NAND-Flash SSD. 380-385 - Hao Zhou, Yanhuang Jiang:
Research on Online Failure Prediction Model and Status Pretreatment Method for Exascale System. 386-392 - Hwang-Cheng Wang, Cheng-Wen Yao:
Task Migration for Energy Conservation in Real-Time Multi-processor Embedded Systems. 393-398 - Zhihong Shen, Jianhui Li, Chengzan Li, Xing He, Xianming Su:
VisualDB: Managing and Publishing Scientific Data on the Web. 399-404 - Bo-Xin Zuo, Xiangyun Hu:
A New Post-Filter for Removing the Edge Ringing Artifacts in Deconvolution Images. 405-407 - Bo-Xin Zuo, Xiangyun Hu:
A PDE-Based Perceptual Deconvolution Image Edge Ringing Artifact Metric. 408-411 - Han Zhongqiang:
Application of Multimedia Network Supported by Constructivism in the Teaching of College English Listening and Speaking. 412-415 - J. Octavio Gutiérrez-García, Kwang Mong Sim:
A Family of Heuristics for Agent-Based Cloud Bag-of-Tasks Scheduling. 416-423 - Zhen-heng Liu, Chang-li Zhang, Tim Reynolds:
A Framwork for a University Display Platform by Using Cloud Computing. 424-428 - S. Subashini, V. Kavitha:
A Metadata Based Storage Model for Securing Data in Cloud Environment. 429-434 - Lirui Bai, Tong Li, Xinjun Wu, Zhongwen Xie:
Charging Model Research of Infrastructure Layer in Cloud Computing Based on Cost-Profit Petri Net. 435-441 - Zongheng Liu, Weiqin Tong, Zhi-xun Gong, Jianhua Liu, Yue Hu, Shaojie Guo:
Cloud Computing Model without Resource Management Center. 442-446 - Rich Lee, Bingchiang Jeng:
Load-Balancing Tactics in Cloud. 447-454 - Yong Zhao, Xubo Fei, Ioan Raicu, Shiyong Lu:
Opportunities and Challenges in Running Scientific Workflows on the Cloud. 455-462 - Deger Cenk Erdil:
Proxy-Based Cloud Resource Sharing. 463-468 - Chia Feng Lin, Muh-Chyi Leu, Chih-Wei Chang, Shyan-Ming Yuan:
The Study and Methods for Cloud Based CDN. 469-475 - Hong Mao, Zhenzhong Zhang, Bin Zhao, Limin Xiao, Li Ruan:
Towards Deploying Elastic Hadoop in the Cloud. 476-482 - Jaeyong Kang, Kwang Mong Sim:
Towards Agents and Ontology for Cloud Service Discovery. 483-490 - Qingqi Pei, Rui Liang, Hongning Li:
A Trust Management Model in Centralized Cognitive Radio Networks. 491-496 - Xin Liu, Jinlong Wang, Qihui Wu, Yang Yang:
Frequency Allocation in Dynamic Environment of Cognitive Radio Networks Based on Stochastic Game. 497-502 - Helena Rifà-Pous, Josep Rifà:
Spectrum Sharing Models in Cognitive Radio Networks. 503-510 - Lin Lin, Ji Tian:
Stable-Aware Traffic Assignment for Multi-path Routing in Cognitive Radio Ad Hoc Networks. 511-514 - Qi Zhao, Shi Qin, Zhijie Wu:
Self-Organize Network Architecture for Multi-agent Cognitive Radio Systems. 515-518 - Qinghua Ren, Yi Zhang, Zhenyong Chu:
Mitigating Interference for MIMO Communication System. 519-522 - Md. Zahangir Alom, Hyo Jong Lee, Md. Hashem Ali Khan, M. H. Lee:
Orthogonal Space-Time Codes Based Signal Constellations for MIMO System. 523-528 - Bowen Li, Panlong Yang, Jinlong Wang, Qihui Wu, Nan Xia:
Non-Bayesian Learning of Channel Sensing Order for Dynamic Spectrum Access Networks. 529-534 - Yu-ling Duan, Hang Zhang:
A Noise-Robust EASI Algorithm for Noisy Blind Interference-Signal Separation. 535-539 - Chen Hu, Jun Yang, Meng Zhang, Xiulong Wu:
A 12T Subthreshold SRAM Bit-Cell for Medical Device Application. 540-543 - Ling Li, Hua Yang, Hang Su, Yihua Cao, Shibao Zheng:
A Web-Based HD Telemedicine System for Remote Psychotherapy. 544-550 - Oier Dominguez, Juan Lizarraga, Carlos del Rio:
An Approach to Explain the Human Hyper-acuity: Applied to THz Imaging. 551-557 - Loubna Cherrat, Mostafa Ezziyyani, Mohammed Essaaidi:
Automatic Generation of Query Order Execution Plan for Hybrid Mediator with Medical Sources. 558-565 - Miljan Vucetic, Ana Uzelac, Nenad Gligoric:
E-Health Transformation Model in Serbia: Design, Architecture and Developing. 566-573 - Weiwei Jiang, Haishun Wang, Xiaomei Xu, Chun Peng:
Individual Self-Service Electronic Health Records: Architecture, Key Technologies and Prototype System. 574-579 - Peter H. Chang:
Modeling the Management of Electronic Health Records in Healthcare Information Systems. 580-584 - Xiao Chen, Nigel Thomas, Michael D. Harrison:
Performance Evaluation of Scheduling Policies in a Smart Hospital Environment. 585-592 - Bo Sun, Gerald W. Evans, Lihui Bai:
Simulation Modeling and Analysis of a Multi-resource Medical Clinic. 593-600 - Robert Kelley, Aman Gupta, Anup Kumar, Sunderesh S. Heragu:
Using UICDS to Share Data in the Real-Time Decision Support System for Pandemic Response. 601-605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.