default search action
2. CCIS 2012: Hangzhou, China
- 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2012, Hangzhou, China, October 30 - November 1, 2012. IEEE 2012, ISBN 978-1-4673-1857-0
- Xue Li, Junping Du, Lingling Zi, Katsunori Shimohara:
Study and implementation of personalized searching system based on user's interest model. 1-5 - Song Bi, Dehui Sun, Liqun Han, Zhe Dong, Zhenwu Lei:
Research on method of feature extraction and recognition of road condition from nighttime video without vehicle segmentation. 6-10 - Yun Zhang, Junping Du, Jangmyung Lee:
A new fast interpolation method based on edge extraction. 11-15 - Haoyang Chen, Yasukuni Mori, Ikuo Matsuba:
Archive-shared cooperative coevolutionary algorithm using Nash equilibria preservation. 16-20 - Benjie Lu, Zhiqing Liu, Hui Gao:
An adaptive prolog programming language with machine learning. 21-24 - Jianan Wu, Chunguang Zhou, Zhangxu Li, Xuefei Xia, Seng Zhang, You Zhou:
A novel algorithm for generating simulated genetic data based on K-medoids. 25-28 - Liyun Ru, Anhui Wang, Yingying Wu, Shaoping Ma:
Auto-scaled Bayesian browsing model in massive data. 29-33 - Xinjian Zhuo, Jinrui Han, Jincheng Han:
Network coding link optimization problems based on genetic and particle swarm algorithm. 34-37 - Jiali Bian, Lin Liu, Jian Kuang:
An Android-based distributed test data acquisition intelligent system for mobile network optimization. 38-42 - Nan Zhao, Yuan Dong, Jiwei Zhang, Xiaofu Chang:
Color-based maximally stable extremal region for sports genre categorization. 43-46 - Hongying Zhang, Zheng Hu:
Research on civil aviation aircraft registration number recognition. 47-51 - Hanwen Li, Yi Wan, Guanghui Ma:
A fast collision detection method for clothing animation. 52-55 - Shuisheng Liu, Yuan Dong, Wei Liu, Jian Zhao:
Multi-view face detection based on cascade classifier and skin color. 56-60 - Yuxia Sun, Yajie Wang, Fei Li:
Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo. 61-64 - Wanliang Wang, Minqian Liu, Xin Wang:
Multi-characters interaction based on honeycomb. 65-69 - Yu Dai, Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang:
PCA-based dimensionality reduction method for user information in Universal Network. 70-74 - Zhe Li, Weiqing Sun, Lingfeng Wang:
A neural network based distributed intrusion detection system on cloud platform. 75-79 - Lisha Hou, Junping Du, Lingling Zi, Min Zuo, Katsunori Shimohara:
Image scaling method based on protected region. 80-84 - Yahao Yan, Junping Du, Qingping Li, Min Zuo, JangMyung Lee:
Multi-focus image fusion algorithm based on NSCT. 85-89 - Yan Peng, Tian Zhou:
Research on the Apriori algorithm in extracting the key factor. 90-93 - Shangfei Wang, Peijia Shen, Zhilei Liu:
Facial expression recognition from infrared thermal images using temperature difference by voting. 94-98 - Min Jin, Huaxiang Lu:
Parallel particle swarm optimization with genetic communication strategy and its implementation on GPU. 99-104 - Yingyou Chen, Qing Wu:
Micro-blog category based on feature-words category dispersion. 105-108 - Bin Xie, Qing Wu:
HMM-based Tri-training algorithm in human activity recognition with smartphone. 109-113 - Yan Shi, Qin Wang, Huiyan Zhang:
Hybrid ensemble PSO-GSO algorithm. 114-117 - Qin Wang, Yan Shi, Guangping Zeng, Xuyan Tu:
Improving global optimization ability of GSO using ensemble learning. 118-121 - Qing Wu, Zhenbang Li:
An adaptive service selection approach in mobile environment. 122-126 - Zheng Wang, Jingling Zhang, Wanliang Wang:
Using GA-based simulation to cooperative climate strategy of climate game problem. 127-131 - Jiajia Zhang, Xuan Wang, Ling Yang, Jia Ji, Dongsheng Zhi:
Analysis of UCT algorithm policies in imperfect information game. 132-137 - Yue Liu, Liu Yang, Zaixia Teng, Junjun Gao:
Demand forecasting method based on adjacent substitution rate estimation by GA. 138-142 - Chunming Wei, Yingchun Yang:
Mandarin isolated words recognition method based on pitch contour. 143-147 - Zhenshan Hou, Mingliang Cui, Ping Li, Liuliu Wei, Wenhao Ying, Wanli Zuo:
Session segmentation method based on COBWEB. 148-153 - Xiao Yang, Zhen Tian, Huayang Cui, Zhaoxin Zhang:
Link prediction on evolving network using tensor-based node similarity. 154-158 - Xin Wang, Qing Ma, Wanliang Wang:
Kinect driven 3D character animation using semantical skeleton. 159-163 - Ming-Wen Shao, Min Liu, Jinghua Hao:
Attribute characteristics of combined formal contexts. 164-169 - Bo Li, Zhengcai Cao, Min Liu, Jinghua Hao:
Approach to complex hydrogen reactor optimization modeling based on ANFIS. 170-175 - Fangfang Qu, Dong Ren, Xiaobo Liu, Zhenyu Jing, Lin Yan:
A face image illumination quality evaluation method based on Gaussian low-pass filter. 176-180 - Yingying Jiang, Feng Tian, Hongan Wang, Guozhong Dai:
Combining hand-drawn concept maps with RFID tags. 181-184 - Shengguo Chen, Zhengxing Sun, Jie Zhou, Yi Li:
Semi-supervised image segmentation combining SSFCM and Random Walks. 185-190 - Minghao Yang, Jianhua Tao, Hao Li, Kaihui Mu:
Multimodal emotion estimation and emotional synthesize for interaction virtual agent. 191-196 - Qinyan Zhang, Li Shi:
3D face model reconstruction based on stretching algorithm. 197-200 - Qing Tian, Rong Wang:
The research of intelligent method for blurring image reconstruction. 201-205 - Ruimei Zhang, Changcheng Liu, Chuandui Wang:
Research on connect 6 programming based on MTD(F) and Deeper-Always Transposition Table. 206-208 - Chao Zou, Yueming Lu, Fangwei Zhang, Songlin Sun:
Load-based controlling scheme of virtual machine migration. 209-213 - Jian Li, DanJie Song, Sicong Chen, Xiaofeng Lu:
A simple fully homomorphic encryption scheme available in cloud computing. 214-217 - Ya-Wei Zhao, Yong Wang:
Partition-based cloud data storage and processing model. 218-223 - Jian Li, Sicong Chen, DanJie Song:
Security structure of cloud storage based on homomorphic encryption scheme. 224-227 - Yongkang Fu, Bin Sun:
A scheme of data confidentiality and fault-tolerance in cloud storage. 228-233 - Chao Dong, Bolun Huang, Zhenming Lei, Jie Yang:
Chinese Multimedia Messaging Service (MMS) analysis using hadoop. 234-239 - Yulong Ren, Wen Tang:
A service integrity assurance framework for cloud computing based on MapReduce. 240-244 - Han Qian, Qiaoyan Wen:
A cloud-based system for enhancing security of Android devices. 245-249 - Yang Yu, Qiaoyan Wen:
The design of the cloud mobile OA system. 250-254 - Jinglong Lv, Yong Zhang, Yinglei Teng, Yang Liu, Yihai Xing:
The research on distributed storage mechanism used in clustered opportunistic network. 255-259 - Zhaohai Zhang, Qiaoyan Wen:
An authorization model for multi-tenancy services in cloud. 260-263 - Minxian Xu, Wenhong Tian:
An online load balancing scheduling algorithm for cloud data centers considering real-time multi-dimensional resource. 264-268 - Wenhong Tian, Chee Shin Yeo, Ruini Xue, Yuanliang Zhong:
Power-aware scheduling of real-time virtual machines in cloud data centers considering fixed processing intervals. 269-273 - Wenfang Zhao, Fei Gao:
Design of dynamic fine-grained role-based access control strategy. 274-278 - Xiuqin Lin, Zhonghan Du, Juan Yang:
The simple optimization of WLC algorithm based on LVS cluster system. 279-282 - Xiaowei Li, Hongxiang Sun, Qiaoyan Wen:
An approach for secure-communication between XEN virtual machines. 283-286 - Zhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu:
Multi-domain cloud social network service platform supporting online collaborations on campus. 287-291 - Zhen Xu, Aimin Yu, Wensi Yang:
Real-time remote attestation of IaaS cloud. 292-297 - Sarawut Ramjan:
Flexible security rule-based system on cloud service for e-travel agent. 298-302 - Juan Yang, Han Du, Bin Wu, Xinxin Ge:
The research and design of parallel recommendation algorithm based on mapreduce. 303-307 - Lingyun Wei, Shuo Qi:
Three-staged cloud computing service supply chain coordination by combined contract. 308-312 - Xu Wu, Xiaqing Xie, Chunwen Li:
Research and implementation of a role-based trustworthiness mechanism for IaaS. 313-317 - Yashi Wang, Lijuan Min, Hanhua Lu:
A functional framework for software and system of systems method. 318-322 - Jianjun Xie, Junling Huang, Fang Qian, Jianjun Yu:
Towards universal cloud service for distributed large scale scientific data. 323-327 - Yongzheng Ma, Xiaomeng Lu, Zhengyi Shao, Hongwei Yang, Kai Nan:
Towards a collaboration cloud for astronomical observations. 328-332 - Cao LeThanhMan, Makoto Kayashima:
Desktop workload characteristics and their utility in optimizing virtual machine placement in cloud. 333-337 - Rui Ye, Qing Wu:
SOA based cloud computing trust model research with a curve fitting method. 338-343 - Wasin Treesinthuros:
E-commerce transaction security model based on cloud computing. 344-347 - Yeqiao Wang, Chunxiao Fan, Zhigang Wen:
A study for task time performance dynamic prediction model in cloud resource scheduling. 348-353 - Dexin Cui, Guoliang Chen, Yinlong Xu, Gaifan Li:
A scalable and efficient multicast system for data center. 354-359 - Yannong Huang, Yiqing Yang, Mike Rossi, Bin Xu:
Towards a unified architecture of cloud service delivery platform. 360-364 - Zhongzhi Shi, Guang Jiang, Bo Zhang, Jinpeng Yue, Xiaofei Zhao:
Cross-media cloud computing. 365-370 - Zhichao Cao, Qing Li, Ze-Yuan Wang, Weihua Li, Jun Li, Ruiyang Du:
A cloud computing based framework of group-enterprise service integration and sharing. 371-375 - Yujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang:
Distributed agent based cooperative differential evolution: A master-slave model. 376-380 - Xin Wang, Hongming Zhu, Qin Liu, Xiaowen Yang, Jiakai Xiao:
Performance evaluation on data reconciliation algorithm in distributed system. 381-385 - Zhou Lei, Jinfeng Xiang, Zhebo Zhou, Feng Duan, Yu Lei:
A multi-objective scheduling strategy based on MOGA in cloud computing environment. 386-391 - Xiang Li, Xiaohong Jiang, Peng Huang, Kejiang Ye:
DartCSim: An enhanced user-friendly cloud simulation system based on CloudSim with better performance. 392-396 - Bernd Zwattendorfer, Arne Tauber:
Secure cloud authentication using eIDs. 397-401 - Tongrang Fan, Feng Zhao, Feng Gao:
Research on cloud resource economics management model based on Internet Innovation Union. 402-406 - Qinyun Dai, Haijun Yang, Qinfeng Yao, Yaliang Chen:
An improved security service scheme in mobile cloud environment. 407-412 - Zhengqiu Yang, Tong Li, Jiapeng Xiu, Chen Liu:
An optimized load algorithm of parallel data warehouse based on the cloud computing platform. 413-417 - Chen Liu, Shan Yang, Jiapeng Xiu, Zhengqiu Yang:
The interest community mining method of social network based on the weak association rules. 418-421 - Jingyi Gong, Kaifeng Han:
A method to ensure data security in e-business cloud. 422-425 - Yong Zhang, Xiangxue Li, Haifeng Qian:
An anonymous remote attestation for trusted cloud computing. 426-429 - Lingyun Wei, Shenghui Zhai:
Coordination mechanism with quantity discount contract for cloud service supply chain. 430-434 - Han Li, Qiuxin Wu:
A distributed intrusion detection model based on cloud theory. 435-439 - Xiaoni Wang, Xuedong Gao:
The research of a resource-aware cloud computing architecture based on web security. 440-443 - Wei Chen, Qiaoyan Wen:
An architecture for dynamic management and monitoring of virtual machines. 444-448 - Chunge Zhu, Xinran Liu, Yixian Yang, Hong Zhang, Qianhua Xu:
A trust mechanism in Internet-Based Virtual Computing Environment. 449-453 - Xiuwen Wang, Shoufeng Cao, Lihong Wang:
Research and implementation on an admission control policy for temporally correlated workloads in virtual application environments. 454-458 - Yexia Cheng, Yuejin Du, Junfeng Xu, Chunyang Yuan, Zhi Xue:
Research on security evaluation of cloud computing based on attack graph. 459-465 - Hui Zhang, Ke Xu:
A dynamic aware-feedback system for service replica management. 466-470 - Guangjun Wu, Yanqin Zhang, Dongan Wang, Shupeng Wang, Ming Chen:
The data reliability techniques in BC-KVDB. 471-475 - Feng Xie, Yong Peng, Wei Zhao, Dongqing Chen, Xiaoran Wang, Xingmei Huo:
A risk management framework for cloud computing. 476-480 - Hong Zhang, Xinran Liu, Chunge Zhu, Qian Liu:
An integrated runtime monitoring method for Internet-Based Virtual Computing Environment. 481-487 - Zhengqiu Yang, Meiling Liu, Jiapeng Xiu, Chen Liu:
Study on cloud resource allocation strategy based on particle swarm ant colony optimization algorithm. 488-491 - Xin Pan, Suli Zhang:
A remote sensing image cloud processing system based on Hadoop. 492-494 - Yidong Cui, Fuquan Sun:
A model for collecting virtual machine usage in cloud computing environment. 495-498 - Feng Ye, Zhijian Wang, Zhenyu Yue, Xinkun Xu, Yuansheng Lou:
CloudUDDI: An extended UDDI model for cloud services. 499-503 - Jie Liu, Fang Liu, Dazhong He:
The identification for P2P Thunder traffic based on deep flow identification. 504-507 - Junfeng Xu, Wei Zhang, Bo Sun:
RCSA-P: A remote control system architecture with high scalability. 508-513 - Weitao Wang, Yuehui Jin, Tan Yang, Yidong Cui:
A video quality assessment method using subjective and objective mapping stategy. 514-518 - Xixi Gong, Yuehui Jin, Yidong Cui, Tan Yang:
Web visualization of distributed network measurement system based on HTML5. 519-523 - Wei Chen, Qiaoyan Wen, Bohou Li:
A propagation model of passive social network worm. 524-528 - Yanan Zhao, Xiangyang Gong, Wendong Wang, Xirong Que:
A rate adaptive algorithm for HTTP streaming. 529-532 - Jianying Liu, Wendong Wang, Xiangyang Gong, Xirong Que, Hao Yang:
A hybrid model based on Kalman Filter and neutral network for traffic prediction. 533-536 - Lulin Jiao, Yan Peng:
Research and implementation of social hot topic detection system based on mirco-blog. 537-542 - Zhi Ren, Jian Zhang, Jibi Li, Hongjiang Lei:
An effective hybrid routing algorithm for opportunistic networks. 543-547 - Wei Li, Wei Jiao, Guangye Li:
A location privacy preserving algorithm for mobile LBS. 548-552 - Liang Guo, Xirong Que, Yidong Cui, Wendong Wang, Shiduan Cheng:
A hybrid social search model based on the user's online social networks. 553-558 - Qiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen:
A content delivery strategy based on resource popularity for P4P architecture. 559-562 - Jiaxi Di, Ke Yu, Xiaofei Wu, Sixi Su:
A novel complex network model for Internet traffic flows. 563-567 - Hengkui Wu, Meixia Duan, Yaping Hu, Siyun Bao:
Sybil-proof ID-to-locator mapping in one hop. 568-571 - Shen Yan, Ze Zong, Yan Ma, Qin Zhao:
The optional routing optimization strategy of Distributed Mobility Management. 572-577 - Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang:
The location selection for CCN router based on the network centrality. 568-582 - Jinxiu Yu, Yueming Lu, Fangwei Zhang, Songlin Sun:
A metric for measuring web search results satisfaction incorporating user behavior. 583-586 - Zhanchun Gao, Yuying Liang, Yanjun Jiang:
Implement of item-based recommendation on GPU. 587-590 - Zhengqiu Yang, Xiaozhe Huang, Jiapeng Xiu, Chen Liu:
SocialRank: Social network influence ranking method. 591-595 - Chongchong Yu, Lili Shang, Li Tan, Xuyan Tu, Yang Yang:
A study on application of semi-supervised collaborative classification algorithm. 596-602 - George Kousiouris, Dimosthenis Kyriazis, Andreas Menychtas, Theodora A. Varvarigou:
Legacy applications on the cloud: Challenges and enablers focusing on application performance analysis and providers characteristics. 603-608 - Dimosthenis Kyriazis:
Modeling the interactions between cloud service providers. 609-613 - Yang Liu, Miao Zhang:
Financial websites oriented heuristic anti-phishing research. 614-618 - Hongyuan Ma, Xuesong Zhang, Bin Wang:
Research on the second-level query results cache in Web search engines. 619-623 - Ming Chen, Yang Wang, Xiaoxiang Zou, Shupeng Wang, Guangjun Wu:
A duplicate image deduplication approach via Haar wavelet technology. 624-628 - Xuqi Wang, Chuanlei Zhang, Shanwen Zhang:
Modified Elman neural network and its application to network traffic prediction. 629-633 - Xiaoxiang Zou, Gaochao Li, Ming Chen, Shupeng Wang, Yongjian Wang, Guangjun Wu:
An improved method to image copy detection. 634-637 - Xiaoming Ni, Yucong Tian:
The design of industrial phased array ultrasonic flaw detection system based on Internet of Things technology. 638-641 - Yifei Zhang, Hongli Zhang:
Synthetic evaluation on the performance of network coordinate systems. 642-645 - Dawei Wang, Longtao He, Yibo Xue, Yingfei Dong:
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time. 646-650 - Luoshi Zhang, Dawei Wang, Yibo Xue:
BCBPI: A noval behavior chain based protocol identification method. 651-656 - Haihui Gao, Yong Peng, Qingtang Zheng, Xi Chen, Zhonghua Dai, Yang Gao, Feng Xie, Wei Zhao, Qi Xiong:
The research and implementation of intelligent mobile video supervising system based on DSP. 657-660 - Chenglong Li, Yibo Xue, Longtao He, Lidong Wang:
TMT: A new Tunable Mechanism of Tor based on the path length. 661-665 - Xiaoming Tian, Qiuxin Wu:
An approach to improve process algebra based protocol composition model. 666-669 - Yuanwei Hou, Guo Tao, Zhiwei Shi, Liu Juan:
Research on Android browser fuzzing based on bitmap structure. 670-673 - Yongjian Wang, Junfeng Xu:
Cooperative Work Systems for the security of digital computing infrastructure Cooperative detection systems for Botnet detection. 674-680 - Yang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu:
Stability analysis of software networks. 681-684 - Xiaoming Liu, Miao Zhang, Guoai Xu:
Construction of distributed LDoS attack based on one-dimensional random walk algorithm. 685-689 - Weijie Li, Haiqiang Chen, Wei Cao, Xin Zhou:
An Idea of setting weighting functions for feature selection. 690-695 - Tan Yang, Yidong Cui, Yuehui Jin, Maoqiang Song:
A new algorithm for multi-mode recommendations in social tagging systems. 696-700 - Danyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui:
A security assessment method for Android applications based on permission model. 701-705 - Haokun Tang, Yanbing Liu, Jun Huang:
A worm counter-measurement strategy in P2P networks: Modeling and analysis. 706-710 - Chenhui Du, Mei Song, Li Wang, Yinghe Wang, Xiaosu Zhan:
Exploiting peer's location information for improving routing and throughput performance in DHT systems. 711-715 - Haijie Ding, Yuehui Jin, Yidong Cui, Tan Yang:
Distributed storage of network measurement data on HBase. 716-720 - Jian Zhou, Ning Huang, Xuewang Wang, Fei Zhao:
An improved model for cascading failures in complex networks. 721-725 - Xiaobo Lin, Qin Zhao:
A design and implementation of IPv6 transition system for DNS64 in stub-resolver mode. 726-729 - Futao Zhao, Shijie Jia, Jianfeng Guan, Changqiao Xu, Hongke Zhang:
A Service Identifier parsing mechanism for Universal Network based on BHO. 730-734 - Xiaoyan Hu, Jian Gong:
Distributed in-network cooperative caching. 735-740 - Jiang Li, Qin Zhao, Xiaohong Deng, Yan Ma:
A home gateway based multicast transit solution and implementation on DS-Lite. 741-745 - Jianfeng Guan, Changqiao Xu, Wei Quan, Hongke Zhang:
The hitting times analysis of cognitive user in Cognitive Internet under random direction mobility model. 746-750 - J. H. Choi, Y. K. Woo, J. T. Park, Y. Shen:
Design and implementation of SNS-based wireless LAN access sharing system. 751-754 - Hu Yao, Shigeki Goto:
Performance evaluation of file transmission in content-centric network. 755-756 - Jinghua Yan, Xiao-chun Yun, Zhi-Gang Wu, Hao Luo, Shuzhuang Zhang:
A novel weighted combination technique for traffic classification. 757-761 - Shijie Jia, Changqiao Xu, Jianfeng Guan, Hongke Zhang:
A MP2P-based VoD solution for supporting VCR-like operations in MANETs. 762-766 - Wei Xiao, Ruixing Wang, Xiaohong Huang:
Design and implementation of Ethernet topology discovery algorithm. 767-770 - Doris Hooi-Ten Wong, Sureswaran Ramadass:
Generating adaptive network data visualization to different levels of users. 771-775 - Hao Wang, Yujie Su, Xiaohong Huang, Pei Zhang:
Algorithm for distributed traffic traces AGGREGATION based on SMC. 776-779 - Yannan Hu, Wendong Wang, Xiangyang Gong, Xirong Que, Shiduan Cheng:
BalanceFlow: Controller load balancing for OpenFlow networks. 780-785 - Ke Yu, Xinyu Zhang, Jiaxi Di, Xiaofei Wu:
Internet traffic identification based on community detection by label propagation. 786-791 - Wei Quan, Jianfeng Guan, Yuanlong Cao, Changqiao Xu, Hongke Zhang:
M-Label: A naming scheme for services in future networks. 792-796 - Yang Chen, Xiangyang Gong, Wendong Wang, Xirong Que:
VNMC for network virtualization in OpenFlow network. 797-801 - Peipei Hu, Min Xu, Xiaohong Huang:
A security model of flow label based QoS mechanism in Evolved Packet System. 802-806 - Danfeng Yan, Rui Feng, Junlin Huang, Fangchun Yang:
Host scurity event track for complex network environments based on the analysis of log. 807-811 - Seung-Man Chun, Yeung-Kyung Woo, Yang Shen, Jong-Tae Park:
P2P-based group service management for live video streaming communication. 812-816 - Hong Ma, Yongjuan Wu, Yan Ma, Zhenhua Wang:
Optimization scheme of CGN logs. 817-820 - Guolong Liang, Ke Zhang, Jin Fu, Wei Ma:
Estimation of 2-D DOA joint frequency of signal via a single vector hydrophone. 821-825 - Meilian Lu, Wei Wang:
An autonomic wireless video transmission system based on GANA. 826-830 - Xin Liu, Lun Xie, Zhiliang Wang, Dongmei Fu:
Cognitive-affective regulation process for micro-expressions in active field state space. 831-835 - Shudan Lin, Shijian Luo, Xiaoxia Ding:
Security sense of Internet product interface design. 836-840 - Biling Zhang, Kai Chen:
Selective spectrum leasing in Internet of Things via Nash Bargaining Solutions. 841-845 - Yongjian Wang, Lizhong Song, Jiaxing Ye, Lijing Wang:
Research on the channel characteristics of low-voltage power line. 846-849 - Xiaoming Ni, Yucong Tian:
The design of belt convey safety protective systembased on Zigbee technology. 850-853 - Erfu Wang, Dongqing Wang, Qun Ding:
Blind extraction algorithm of the harmonic signal based on the steady-state point capture in lorenz energy accumulation area. 854-858 - Xiaoyu Wang, Yuan'an Liu, Gang Xie, Pan-liang Deng:
A relaxation algorithm for decentralized resource allocation in femtocell networks. 859-863 - Peipei Wang, Ben Wang, Weidong Wang, Yinghai Zhang, Chaowei Wang:
Based multi-operator Shared Network Opportunistic Spectrum Sharing. 864-868 - JiuLing Feng, Xiuquan Qiao, Yong Li:
The research of synchronization and consistency of data in mobile environment. 869-874 - Yong Li, Wenzhu Li, Li Yuan, Linxing Yang:
Research on RCS characteristic of three kinds of metal plate. 875-878 - Tong Liang, Dexiang Meng, Jiwei He, Shoufeng Wang:
Research on the key technology of refarming. 879-883 - Jia Liu, Chaowei Wang, Juyi Qiao, Weidong Wang, Yinghai Zhang:
A machine-to-machine application: Body posture recognition on smartphones for intelligent remote control. 884-888 - Xiaoxiao Zhang, Weidong Wang, Yinghai Zhang, Gaofeng Cui, Sixing Lu:
An adaptive frequency allocation scheme for OFDMA femtocell networks. 889-892 - Anming Gao, Hongli Peng, Jinlong Zou, Zhengxiao Cao:
Performance of WBAN UWB system based on the measured on-body channel model. 893-897 - Feiyan Yan, Yang Yu, Weidong Wang, Yinghai Zhang:
Distributed channel and power allocation based on hybrid spectrum access in cognitive radio network. 898-903 - Jiwei He, Tong Liang, Dexiang Meng, Chao Sun:
Coexistence studies for indoor distribution systems of TD-LTE with WLAN system. 904-907 - Xiaoyan Xu, Dexiang Meng, Yanming Chen, Jiwei He:
Compatability study on broadcasting system interfering with LTE system. 908-912 - Zhen Jiang, Shiyong Zhang:
A semi-supervised ensemble learning algorithm. 913-918 - Wansen Wang, Wenlan Ding:
Research of improved SVM model based on GA in E-learning emotion classification. 919-923 - Wansen Wang, Huifang Niu:
Face detection based on improved AdaBoost algorithm in E-Learning. 924-927 - Xiao-chuan Sun, Hongyan Cui, Ren Ping Liu, Jianya Chen, Yunjie Liu:
Multistep ahead prediction for real-time VBR video traffic using deterministic echo state network. 928-931 - Xiaoyu Liu, Zhongyuan Yu, Yumin Liu, Houjian Kang, Jinhong Mu:
A new recognition algorithm with high result reliability. 932-935 - Yingcang Ma, Lu Wang, Huan Liu, Xiaogai Wang:
Theory of α-truth degrees in 3-valued prerough logic. 936-940 - Yan Huang, Xin Gao, Haorui Zhou, Kai Wang, Yanfeng Qu:
Design and implementation of distributed collaborative virtual assembly system with three-dimensional force feedback. 941-945 - Shuzhe Wu, Xiaoru Wang, Qing Ye, Jiali Dong:
Region clustering with high level semantics for image segmentation. 946-950 - Weiwei Duan, Yingmin Jia:
A novel H-infinity filtering for road constrained target tracking. 951-955 - Xu Li, Xiaoru Wang, Jia Long, Lingpu Gong:
A pedestrian detection method based on Dirichlet distribution and histogram of components. 956-960 - Wenwen Han, Wendong Wang, Shuigui Huang, Ye Tian, Jian Ma:
Media capacity estimation: Discovering news feed accounts for information sourcing. 961-965 - Xinhan Huang, Shangqin Mao, Min Wang:
A novel visual servoing microassembly system. 966-970 - Xiaoxu He, Chenxi Shao:
An approach based on TSA-tree for accurate time series classification. 971-975 - Bosheng Wang, Jiaqi Xu:
Accurate and fast hand-forearm segmentation algorithm based on silhouette. 976-979 - Qijin Chen, Jituo Li, Guodong Lu, Xinyu Bi, Bei Wang:
Clothing retrieval based on image bundled features. 980-984 - Xin Li, Min Zhang, Yiqun Liu, Shaoping Ma, Yijiang Jin, Liyun Ru:
Search engine click spam detection. 985-989 - Jiapeng Xiu, Xiaobo Xu, Zhengqiu Yang, Chen Liu:
Ontology-based production model of satellite remote sensing data parameter products. 990-993 - Lun Xie, Shanchao Ni, Zhiliang Wang:
Research and designed of a structured scalable robot control system based on real-time bus. 994-998 - Lijuan Zhang, Jin Zhang, Xiaohu Tang, Yong Wang:
An efficient tag anti-collision protocol for RFID systems. 999-1004 - Jie Li, Zhi Li, Wantian Song:
A new three-dimensional localization method for WSN. 1005-1008 - Ming Zhou, Yan Ma:
A web service discovery computational method for IOT system. 1009-1012 - Jian Kuang, Xianqing Meng, Jiali Bian:
An improved AODV protocol based on extension lifetime of the Ad Hoc networks. 1013-1016 - Junsong Zhang, Jian Ma, Wendong Wang, Yazhi Liu:
A novel privacy protection scheme for participatory sensing with incentives. 1017-1021 - Zhichao Qin, Zheng Zhou, Xiaochuan Zhao:
A grid optimization scheme based on progressive compensation for wireless sensor networks. 1022-1027 - Haiguo He, Jiao Mo, Qiaoyan Wen, Zishan Meng:
Node information in WSN from the business perspective. 1028-1031 - Haining Yu, Binxing Fang, Xiang-Zhan Yu, Juan Chen:
Semantic surface representation of physical entity in the WEB of things. 1032-1036 - Yanling Jin, Yongsheng Ding, Kuangrong Hao:
A bio-inspired distributed object-tracking approach in wireless sensor networks. 1037-1041 - Siwei Peng:
An Id-based Multiple Authentication scheme against attacks in wireless sensor networks. 1042-1045 - Wang Chen:
An IBE-based security scheme on Internet of Things. 1046-1049 - Ying Zhang, Hui Li, Tengfei Shi, Guanyang Deng:
Survey on recent development about lightweight authentication protocol based on LPN problem. 1050-1056 - Han Li, Qiuxin Wu:
A clustering routing algorithm in wireless sensor netwroks. 1057-1061 - Quangang Wen, Xinzheng Dong, Ronggao Zhang:
Application of dynamic variable cipher security certificate in Internet of Things. 1062-1066 - Xiangnan Peng, Xiaoping Zou, Zhaoxian Yu, Yuan Yang:
Design of household appliance control system based on Zigbee. 1067-1071 - Guangtao Zhuang, Xiaoping Zou, Changfei Guo, Yan Liu:
Wireless sphygmomanometer based on Zigbee. 1072-1075 - Yan Liu, Xiaoping Zou, Miaojing Shi, Guangtao Zhuang:
Intelligent parking guidance system based on wireless sensor networks. 1076-1078 - Xiaoye Zhao:
The security problem in Wireless Sensor Networks. 1079-1082 - Shiwei Li, Wenjing Wang, Juwei Zhang:
Efficient deployment surface area for underwater wireless sensor networks. 1083-1086 - Xiong Tang, Chunxiu Xu, Muqing Wu, Jingrong Wen:
A design of smart-home ststem based on 6LoWPAN wireless sensor networks. 1087-1091 - Zhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li:
Secure network coding based on homomorpuic signature against pollution attacks. 1092-1096 - Xianzhong Tian, Qianwei Zhou, Zhen Cheng:
An algorithm of MAC-based network coding for Butterfly wireless networks. 1097-1101 - Chao Zhou, Chuanheng Sun, Xiaowei Du, Wen-Yong Li, Xinting Yang:
The design of agricultural product's production antecedents acquisition terminal based on Hi3511 and 3G technology. 1102-1105 - Jing Peng, Kaikai Chi, Yi-hua Zhu, Jing Wang:
Optimal packet fragmentation scheme for reliable and energy-efficient packet delivery in 6LoWPAN. 1106-1111 - Jian Pan, Xiuting Dai, Xiaoqi Xu, Yanjun Li:
A Self-learning algorithm for predicting bus arrival time based on historical data model. 1112-1116 - Hongbo Guo, Victor C. M. Leung:
Multiple tags identification for short id rfid networks. 1117-1122 - Yang Wang, Peng Zeng, Xu Wang, Yangyu Zhang, Fangjun Kuang, Baohui Zhu:
Information-centric industrial Internet of Things: Service model. 1123-1128 - Chunjiang Zhao, Ronghua Gao, Huarui Wu:
A method of cloud storage algorthom for crop images information. 1129-1132 - Haihui Zhang, Jiaming Zhang, Huarui Wu:
An adaptive localization algorithm based on RSSI in wireless sensor networks. 1133-1136 - Haihui Zhang, Yan Liang, Qingzhen Zhou, Hongpan Fan, Jianguo Dai:
A self-adaptive greenhouse CO2 concentration monitoring system based on ZigBee. 1137-1140 - Yisheng Miao, Chunjiang Zhao, Huarui Wu, Huaji Zhu:
Research on power consumption weighted state machine of farmland WSN node. 1141-1144 - Fan Yang, Huaiyi Sun, Dongqiang Wang, Lili Huang, Longcan Hu, Yue Gao, Haiyan Li:
A pupil location method based on improved OTSU algorithm. 1145-1148 - Fusuijing Cheng, Chenghui Yan, Yongfeng Huang, Linna Zhou:
Algorithm of identifying opinion leaders in BBS. 1149-1152 - Yunjian Tang, Peng Han, Zaihuan Wang, Longcan Hu, Yue Gao, Haiyan Li:
Based on intelligent voice recognition of forest illegal felling of detecting methods. 1153-1156 - Dongqiang Wang, Aijun Fan, Lili Xiong, Longcan Hu, Yue Gao, Haiyan Li:
Design and implementation of mirror traffic network simulation framework based on Delta3D. 1157-1160 - Mingyue Feng, Xiao Wang, Yongjin Zhang, Jianshi Li:
Multi-objective particle swarm optimization for resource allocation in cloud computing. 1161-1165 - Mu Guo, Deyi Li, Guisheng Chen, Youchun Xu, Wen He, Tianlei Zhang, Lifeng An, Minghui Lv:
Multi-sensor information fusion for unmanned cars using radar map. 1166-1170 - Liwei Huang, Haisu Zhang, Guisheng Chen, Yuchao Liu, Deyi Li:
From turing machine intelligence to collective intelligence. 1171-1177 - Hua Li, Mingyue Feng, Xiao Wang:
Inverse perspective mapping based Urban road markings detection. 1178-1182 - Mingxi Li, Peng Jia, Youchun Xu, Yi Yuan:
Traveling path tracking algorithm in virtual coordinate system for intelligent vehicle. 1183-1187 - Xiao Wang, Hua Li, Yuan Zhu:
Design on automatic control system for smart car based on μC/OS-II. 1188-1191 - Yuan Zhu, Mingyue Feng, Xiao Wang, Xinxi Xu:
Research on intelligent vehicle autonomous overtaking based on single neuron PID control. 1192-1195 - Youchun Xu, Jian Cao, Peng Jia, Zufeng Zhang:
The research of obstacle detection based on AK-means clustering algprithm in crosscountry. 1196-1199 - Tianlei Zhang, Deyi Li, Guisheng Chen, Wen He, Mu Guo, Minghui Lv:
Spirit: A lightweight programming framework for intelligent system. 1200-1204 - Jianhui Zhao, Peng Jia, Shaobo Fu:
Modeling of uncertain environment based on multi-scale grid method. 1205-1209 - Mu Guo, Youchun Xu, Yongjin Zhang, Wen He, Guisheng Chen, Tianlei Zhang, Lifeng An, Minghui Lv:
A decision-making method for unmanned cars based on drivable area cutting. 1210-1215 - Yanjun Li, Gan Chen, Yueyun Shen, Yihua Zhu, Zhen Cheng:
Accelerometer-based fall detection sensor system for the elderly. 1216-1220 - Yujia Huang, Zhongliang Yang, Shuhua Xiong:
The research on the control algorithm of IOT based bicycle parking system. 1221-1225 - Yixin Kang, Yongli Zhu, Jing Gao:
Chain-type wireless sensor network for monitoring power lines: Topology model and routing algorithm. 1226-1229 - Yang Deng, Zhonghong Ou, Miika Komu, Vilen Looga, Antti Ylä-Jääski:
Anatomy of the connecting architecture of Internet of Things. 1230-1234 - Vilen Looga, Zhonghong Ou, Yang Deng, Antti Ylä-Jääski:
MAMMOTH: A massive-scale emulation platform for Internet of Things. 1235-1239 - Shuai Shao, Bin Tian, Xin Wang, Yang Li:
Provably secure identity-based authenticated key agreement protocol and its application. 1240-1244 - Wenjun Luo, Jianming Tan:
Public key encryption with keyword search based on factoring. 1245-1247 - Chenxu Wang, Mingyan Yu, Jinxiang Wang, Peihe Jiang, Xiaochen Tang:
A more practical CPA attack against present hardware implementation. 1248-1253 - Bin Gu, Yanfeng Jin, Chang Zhang:
Study on the standardized method of Chinese addresses based on expert system. 1254-1258 - Bin Ye, Hongyu Chai, Weiping He, Xiaoting Wang, Guangwei Song:
Semantic similarity calculation method in ontology mapping. 1259-1262 - Jie Yang, Hong Gao, Wei Liu:
Evaluation of land grading based on extenics theory. 1263-1266 - Zhiwei Yan, Anlei Hu, Wei Wang:
A cache-splitting scheme for DNS recursive server. 1267-1271 - Pingyi Wang, Jingling Zhao, Qing Liao:
A cross-platform context-aware application developing framework for mobile terminals. 1272-1276 - Bai Wang, Meng Shi:
Mining and analyzing the characteristic of projects collaborative relationship in open source software. 1277-1280 - Nan Xiao, Yingmin Jia:
New delay-dependent stability criteria for linear time-delay systems with two additive time-varying delay components. 1281-1286 - Xue Jun, Zengliang Liu:
A task-oriented computing service sharing model and its application to talent training and management. 1287-1290 - Ye Wang, Wenchao Song, Zengliang Liu:
An oriented-application adaptive mobile cloud computing middleware. 1291-1295 - Yanbiao Chen, Wenji Sun, Yi Zhang:
Evaluation to coordinating degree of systematic battle forces based on DEA. 1296-1301 - Yeli Hao, Shize Guo, Hong Zhao, Zhe Chen:
Study on the modeling and analyzing of the role-based threats in the cyberspace. 1302-1306 - Jingdong Gao, Jinshi Xiao, Jichang Dong, Xiongwei Ren:
Reaserch of weapons and equipment capability evaluation based on comprehensive fuzzy model. 1307-1310 - Wenxin Yang, Xiaomin Zhou, Baodong Ju, Peng Xu:
Robust control of electric vehicle's driving system. 1311-1315 - Jingdong Gao, Yue Liang, Jichang Dong:
The credibility research of capability index system for weapon equipment SOS. 1316-1319 - Xiaodan Zhang:
Application of fuzzy adaptive control for optimal load distribution of plant. 1320-1323 - Xianmei Wang, Yuyu Liang, Siyi Zheng, Zhiliang Wang:
Juvenile detection by LBP and SVM. 1324-1327 - Jian Kuang, Longkui Mei, Jiali Bian:
An innovative implement in organizing complicated and massive intrusion detection rules of IDS. 1328-1332 - Dong Wei, Yiqing Liu, Ning Zhang, Minzhe Zhao:
Improved algorithm of RBF neural networks and its application. 1333-1337 - Jian Xue, He Zhu:
Research based on improved fuzzy immune PID algorithm optimized copper electrolysis rectifier system. 1338-1340 - Yongdan Liu:
Encryption algorithm based on higher degree residues oriented to semantic security. 1341-1345 - Zichun Zhang, Yongdan Liu, Xiaoyun Guo, Jianhua Zhu:
Online query algorithm of dynamic time sequences based on fast fourier transform. 1346-1352 - Xingfu Xiao, Hanbin Bai, Zhanbin Zhang:
A method of multiple-factors intelligence analysis application for C4KISR system. 1353-1356 - Jianhong Xu, Weizhi Gong, Ye Wang:
A cloud service discovery approach based on FCA. 1357-1361 - Weizhi Gong, Huiyao An, Jianhong Xu, Hao Wang:
Research of personalized recommender system in M-commerce: A cognitive-style approach based on FD/I. 1362-1366 - Li Yang, Xiedong Cao, Jie Li, Aomin Wang, Weibin Tan, Zhijun Yu:
Research on FNN-based security defence architecture model of scada network. 1367-1371 - Chao Li, Zhen Xu, Zichun Zhang:
A trusted information sharing skeleton for privacy preservation. 1372-1376 - Zengliang Liu, Xuehai Yuan, Yuhong Zhang, Ye Wang:
Study of soft sets category and it's properties. 1377-1380 - Xiangyang Huang, Cuihuan Du, Yan Peng, Xuren Wang, Jie Liu:
Goal-oriented action planning in partially observable stochastic domains. 1381-1385 - Pu Jiang:
Comprehensive information emotional theory - An assumption of cognitive-emotional interaction mechanism. 1386-1392 - Lingling Mu, Yiya Pang, Hongying Zan:
Studies on automatic recognition of preposition BA's usages based on statistics. 1393-1397 - Ying Qin:
Applying frequency and location information to keyword extraction in single document. 1398-1402 - Li Wang, Kui Jiang, Xingyun Geng, Yuanpeng Zhang, Dong Zhou, Jiancheng Dong:
Chniese document classification using field association knowledge base. 1403-1408 - Lei Li, Wei Heng, Ping'an Liu:
Multi-document summarization systems comparison. 1409-1413 - Shuming Yuan, Xiaojie Wang:
Research on automatic semantic classification of human-interaction instructions. 1414-1419 - Xiaoli Nan, Xiao Sun, Tieshan Hou:
Estimation of earnings manipulation in U.S. listed companies based on weighted discriminative model. 1420-1424 - Baosheng Yin, Junjun Zuo, Na Ye:
Long sentence partitioning using top-down analysis for machine translation. 1425-1429 - Dongfeng Cai, Liwei Chang, Duo Ji:
Latent semantic analysis based on space integration. 1430-1434 - Zhiying Liu, Yaohong Jin, Wenfei Chang:
Research on the semantic knowledge base in Chinese-English machine translation. 1435-1439 - Jingxiang Cao, Degen Huang:
Annotation of complex noun phrases from multilingual parallel corpus. 1440-1444 - Yegang Li, Heyan Huang:
Automatic identifying of maximal length noun phrase. 1445-1448 - Dongmei Ma, Zhiguo Tang:
Vibration suppression for two manipulators handling a flexible payload based on observer. 1449-1453 - Guiping Zhang, Yan Wang, Duo Ji:
An improved model of MST for Chinese dependency parsing. 1454-1458 - Hui Li, Ying Liu:
Language models and classification analysis for dream of the red chamber. 1459-1464 - Ping'an Liu, Lei Li, Wei Heng, Boyuan Wang:
HLDA based text clustering. 1465-1469 - Meijuan Liu, Shicai Yang, Qiaofen Chen:
Sentiment classification on Chinese reviews based on ambiguous sentiment confined library. 1470-1473 - Yong Zhang, Jiaqin Mo, Tingting He:
User influence analysis on micro blog. 1474-1478 - Yanli Liu, Yaohong Jin:
Analysis of HE(***) in patent Chinese-English machine translation. 1479-1484 - He Zhou, Yun Zhu, Yaohong Jin:
Identification of V+N compound nouns in Chinese-English machine translation based on rules in patent texts. 1485-1490 - Song Liu, Fuji Ren:
Relation extraction from wikipedia articles by entities clustering. 1491-1495 - Runxiang Zhang, Yaohong Jin:
Identification of comparative sentences with adjective predicates in patent Chinese-English machine translation. 1496-1500 - Rong Hu, Tingting He, Fang Li, Po Hu:
Tag recommendation based on tag-topic model. 1501-1505 - Qianqian Song, Yun Zhu, Lixia Wang, Yaohong Jin:
A rule-based method for commas' disambiguation in Chinese patent text. 1506-1510 - Xuwen Wang, Qiang Zhang, Xiaojie Wang, Yueping Sun:
LDA based PSEUDO relevance feedback for cross language information retrieval. 1511-1516 - Yun Zhu, Yaohong Jin:
A method of recognizing the root of an improved dependency tree for the Chinese patent literature. 1517-1523 - Xiaoqin Wang, Xiaolong Wang:
The comparison of particle filter and extended Kalman filter in predicting building envelope heat transfer coefficient. 1524-1528 - Yushu Cao, Jun Wang, Lei Li:
Word-level information extraction from science and technology announcements corpus based on CRF. 1529-1533 - Yueping Sun, Xiaojie Wang, Song Liu, Caixia Yuan, Xuwen Wang:
A retrieval model for question in community question answering system. 1534-1539
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.