default search action
20th CSE / 15th EUC 2017: Guangzhou, China - Volume 1
- 2017 IEEE International Conference on Computational Science and Engineering, CSE 2017, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2017, Guangzhou, China, July 21-24, 2017, Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-3220-8
- Hongli Chen:
A Personalized Recommendation Algorithm Based on the Fusion of Trust Relation and Time Series. 3-6 - Naqin Zhou, Deyu Qi, Wei Feng, Xinyang Wang, Yang Shen:
Budget-Deadline Constrained Workflow Scheduling for Heterogeneous Resources. 7-14 - Jianying Lin, Rui Liu, Quanye Jia, Yahui Zhao:
From Top to Down Hierarchical Classification Process with the Candidates' Strategy. 15-22 - Yunsheng Deng, Ping Miao, Hongyong Yang:
Cooperation of Improved Hk Networks Based on Prisoner Dilemma Game. 23-27 - Zhanying Zhang, Wenjun Xiao, Minfan He, Jianqing Xi, Yijun Mao:
Research and Analysis about the Length of Vertex-Degree Sequence of Complex Networks with Poisson Distribution. 28-31 - Ming Tao, Jiaxing Li, Jie Zhang, Xiaoyu Hong, Chao Qu:
Vehicular Data Cloud Platform with 5G Support: Architecture, Services, and Challenges. 32-37 - Xianglin Wei, Qin Sun:
Wireless Facility Scheduling for Data Center Networks. 38-43 - Min Liu, Xiaowei Xu, Ye Tao, Xiaodong Wang:
An Improved Random Forest Method Based on RELIEFF for Medical Diagnosis. 44-49 - Chao Xia, Xinye Cai, Zhun Fan, Muhammad Sulaman:
Reference Line Guided Pareto Local Search for Bi-Objective Traveling Salesman Problem. 50-56 - Yu Wu, Pengfei Chao, Weiqin Ying, Linlin He, Shiyun Chen:
A Conical Area Evolutionary Algorithm Based on Modularity Q for Community Detection from Signed Networks. 57-62 - Li Li, Xianyong Zhang, Zhongsheng Wang, Zhiyong Lin:
Consensus of Leader-Following Multi-Agent Systems with Sampling Information under Directed Networks. 63-68 - Yuanyuan Fan, Qingzhong Liang:
An Improved Method for Detection of the Pedestrian Flow Based on RFID. 69-72 - Liu Yang, Shaohong Zhang, Zuyuan Yang:
An Improved Precoding Method for Blind Separation of Spatially Correlated Signals. 73-76 - Li Yang, Xiaoqin Wang, Yaping Tian:
A Trusted Recommendation Scheme Based on the Improved Slope One Algorithm. 77-84 - Guiping Xu, Gaoyang Li, Jingqing Jiang, Yuqing Lin, Yanchun Liang, Heow Pueh Lee, Xiaohu Shi, Chunguo Wu:
A Novel Method for Analysing the Population Dynamic Behavior of Particle Swarm Optimization. 85-92 - Jiawei Zhang, Lining Xing:
A Survey of Multiobjective Evolutionary Algorithms. 93-100 - Ying Zhou:
A Decomposition-Based Multi-Objective Tabu Search Algorithm for Tri-Objective Unconstrained Binary Quadratic Programming Problem. 101-107 - Jingdong Jia, Zupeng Chen, Xiaoping Du:
Understanding Soft Skills Requirements for Mobile Applications Developers. 108-115 - Sen Qiu, Long Liu, Jinxiao Li, Zhelong Wang, Kairong Qin, Yongmei Jiang:
Gaitsense: A Potential Assistance for Physical Rehabilitation by Means of Wearable Sensors. 116-121 - Shimin Wang, Wenyan Jiang, Jihua Ye, Mingwen Wang, Xinyu Zhou:
Image Visual Saliency Feature Extraction Based on Multi-Scale Tensor Space. 122-127 - Wenjun Wang, Hui Wang, Xinyu Zhou, Jia Zhao, Li Lv, Hui Sun:
Dynamic Step Factor Based Firefly Algorithm for Optimization Problems. 128-134 - Zhifeng Hao, Ruichu Cai, Yiyang Yang, Wen Wen, Lixin Liang:
A Dynamic Conditional Random Field Based Framework for Sentence-Level Sentiment Analysis of Chinese Microblog. 135-142 - Jun Yang, Pengpeng Yang, Xiaohui Jin, Qian Ma:
Multi-Classification for Malicious URL Based on Improved Semi-Supervised Algorithm. 143-150 - Dongbin Jiao, Liangjun Ke, Weibo Yang, Jing Li:
An Estimation of Distribution Algorithm Based Load-Balanced Clustering of Wireless Sensor Networks. 151-158 - Xin Xie, Jianan Wang, Fengping Hu, Nan Jiang, Songlin Ge:
An Improved Spatial-Temporal Correlation Algorithm of Wsns Based on Compressed Sensing. 159-164 - Min Gai, Shanshan Zhao, Yan Li:
Establishment of Data Collection and Transmission Optimization Model Based on TRIZ. 165-170 - Guan Hui, Zhang Yan, Bin Zhang, Fahong Yu:
Improved RFID Anti-Collision Algorithm Based on Quad-Tree. 171-175 - Simeng Sun, Hui Zhang, Ning Li, Yong Chen:
Name Disambiguation for Chinese Scientific Authors with Multi-Level Clustering. 176-182 - Yingyi Yang, Yi You, Bochuan Gu:
A Hierarchical Framework with Consistency Trade-off Strategies for Big Data Management. 183-190 - Hadi Sutopo, Wisnu Pamungkas:
Developing Mathematics Mobile Game to Enhance Learning for Children. 191-197 - Jun Xu, Hui Liu:
Segmentation of Pulmonary CT Image by Using Convolutional Neural Network Based on Membership Function. 198-203 - Chi Shao, Guo Sun, Meng Zhao, Yiqiao Cai:
Adaptive Differential Evolution with Landscape Modality Detection for Global Optimization. 204-209 - Aourra Khaled, Quan-Xin Zhang:
An Energy Aware Mass Memory Unit for Small Satellites Using Hybrid Architecture. 210-213 - Jiamin Zheng, Yu-an Tan, Xiaosong Zhang, Chen Liang, Changyou Zhang, Jun Zheng:
An Anti-Forensics Method against Memory Acquiring for Android Devices. 214-218 - Xiaxu He, Pengfei Liu, Weifeng Zhang:
Design and Implementation of a Unified Mooc Recommendation System for Social Work Major: Experiences and Lessons. 219-223 - Zibo Qi, Wei Gao, Chen Guo, Kaili Xu:
The Development of AC Arc Fault Simulation Test Device with Arc Breaking Function. 224-227 - Xiaxu He, Pengfei Liu:
Empirical Study on the Construction of a Unified Information System with Big Data Analysis: A Case of Social Work Organizations and Civil Affairs Departments. 228-233 - Haiping Wang, Sanfeng Zhang, Yunxiao Sun:
Practical Optimization for Wireless Network with Network Coded Opportunistic Routing and SIC. 234-239 - Ping Miao, Yunsheng Deng, Hongyong Yang:
A Donation Heterogeneity Public Goods Game on High Clustering Coefficient and Adjustable Power-Law Network. 240-244 - Li Tan, Chaoyu Yang, Minghua Yang, Xiaojiang Tang:
Path Self-Deployment Algorithm of Three-Dimensional Space in Directional Sensor Networks. 245-250 - Tao Wang:
A Novel Face Recognition Method Based on ICA and Binary Tree SVM. 251-254 - Fusheng Wang, Hongyong Yang:
Swarming Movement of Dynamical Multi-Agent Systems with Modeling Errors. 255-259 - Xiao Sun, Xiaoqi Peng, Fuji Ren, Yun Xue:
Human-Machine Conversation Based on Hybrid Neural Network. 260-266 - Zhengwen Lai, Wenjun Xiao, Meisheng Li, Zhanying Zhang:
An Exponential Distribution Complex Network Model Constructed by Degree Sequence Length Iteration. 267-271 - WuYang Ding, Bo Liu, Yanshan Xiao:
Real-Time Face Recognition Based on Sparse Illumination Learning. 272-277 - Tianwen He, Hong Wang, Baofang Hu:
Evaluate the Chinese Version of Machine Translation Based on Perplexity Analysis. 278-281 - Fu Zhang, Jingwei Cheng:
Fuzzy Query over Ontologies Based on Relational Databases. 282-290 - Guizhen Mai, Shiguo Peng, Yinghan Hong, Pinghua Chen:
Fast Causal Division for Supporting High Dimensional Causal Discovery. 291-296 - Yan Zhang, Zhaobin Liu, Bin Zhang, Fahong Yu:
A Novel Adaptive Resampling Particle Filtering Algorithm. 297-300 - Xiaoling Zhong, Siyu Jiang, Hengjie Song:
ABCGA Algorithm for the Two Echelon Vehicle Routing Problem. 301-308 - Yu Wu, Bin Wu, Weiqin Ying, Yuehong Xie, Weipeng He:
Global Pareto Optimality of Cone Decomposition of Bi-Objective Optimization. 309-314 - Yuhui Jin, Jianhao Li, Dongyuan Ma, Xi Guo, Haitao Yu:
A Semi-Automatic Annotation Technology for Traffic Scene Image Labeling Based on Deep Learning Preprocessing. 315-320 - Meihua Wang, Jiaming Mai, Yun Liang, Ruichu Cai, Tom Zhengjia, Zhenjie Zhang:
Component-Based Distributed Framework for Coherent and Real-Time Video Dehazing. 321-324 - Junhua Ku, Bing Zheng:
Distributed Extreme Learning Machine with Kernels Based on Mapreduce for Spectral-Spatial Classification of Hyperspectral Image. 325-332 - Ziqi Zhou, Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu:
Research of Rough Set Model under Logical Computing of Granular. 333-336 - Xiaodong Jia, Wendong Gong, Jie Yuan:
Handwritten Yi Character Recognition with Density-Based Clustering Algorithm and Convolutional Neural Network. 337-341 - Yan Zhang, Zhaobin Liu, Bin Zhang:
A Novel Differential Evolution Algorithm for Constrained Optimization. 342-348 - Xi Zhao, Yong Ding, Quanyu Zhao:
A Multi-Candidate Electronic Voting Scheme with Unlimited Participants. 349-353 - Xiaoxiao Chen, Xiaodong Yan, Arun:
Development and Design of Micro-Course System Based on Wechat Platform. 354-357 - Xiaoting Sun, Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu:
Rough Set Model under Different Granular Computing. 358-360 - Jian Li, Rui Liu, Rui Xiong:
A Chinese Geographic Knowledge Base for GIR. 361-368 - Jialin Li, Wei Li, Ying Huang:
A New Quantum Rotation Angle of Quantum-Inspired Evolutionary Algorithm for TSP. 369-374 - Gang Liu, Liang Xiao, Caiquan Xiong:
Image Classification with Deep Belief Networks and Improved Gradient Descent. 375-380 - Yuan Yuan, Fu Xie:
Identity-Based Proxy Signature Multiple-File PDP for Mobile Cloud Computing. 381-387 - Yinghan Hong, Zhifeng Hao, Guizhen Mai, Bingfeng Chen, Rui Xie:
An Approach for Inferring Causal Directions from Multi-Dimensional Networks. 388-392 - Hui Zhang, Xiangwei Zheng, Jie Tian, Qingshui Xue:
A Virtual Network Embedding Algorithm Based on RBF Neural Network. 393-396 - Xianglin Wei, Fei Hu, Qin Sun, Tongxiang Wang:
Association Graph Based Jamming Detection in Multi-Hop Wireless Networks. 397-402 - Renchu Guan, Xu Wang, Maurizio Marchese, Yanchun Liang, Chen Yang:
A Feature Space Learning Model Based on Semi-Supervised Clustering. 403-409 - Tongxiang Wang, Xianglin Wei, Qin Sun, Fei Hu:
GSA-Based Jammer Localization in Multi-Hop Wireless Network. 410-415 - Xue-Qiang Zeng, Run Xiang, Hua-Xing Zou:
Partial Least Squares Regression Based Facial Age Estimation. 416-421 - Bing Jia, Wuyungerile Li, Tao Zhou:
A Centralized Service Discovery Algorithm via Multi-Stage Semantic Service Matching in Internet of Things. 422-427 - Dong Li, Zedan Zheng, Yi Li, Yang Xu, Deyou Tang:
Design and Implementation of Load Balancing Strategy in Openstack Cloud Platform. 428-435 - Dong Li, Jiechu Wu, Zehang Deng, Zelin Chen, Yang Xu:
QoS-Based Service Selection Method for Big Data Service Composition. 436-443 - Zhaoyi Chen, Hui Tian, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Logging and Public Audit for Operation Behavior in Cloud Storage. 444-450 - Zhishuo Zheng, Deyu Qi:
Developing a Lock-Free Scheduling on Manycore Computer. 451-458 - Xi Guo, Yuanzhen Wen, Dongyuan Ma, Yuhui Jin, Haitao Yu:
Research on Scene Parsing Algorithm Cascading Object Detection Network. 459-464 - Haiping Wang, Yunxiao Sun, Sanfeng Zhang:
Practical Optimization for Wireless Network with Intra-Session Network Coding and SIC. 465-470 - Liye Song:
Impact Analysis of Air Pollutants on the Air Quality Index in Jinan Winter. 471-474 - Wenle Wang, Yuanlong Cao, Jun Gong, Zhifen Li:
CP-TPS: A Real-Time Transaction Processing Strategy Supporting Compensatory Task. 475-482 - Kang Miao, Qinghong Yang, Xing Wei, Xiaoping Du, Jianwei Zhang:
How Perceived Factors of Review Contents Influence Consumers' Purchase Decision. 483-486 - Ye Tao, Xiaodong Wang, Xiaowei Xu, Liang Yang:
Containerized Resource Provisioning Driven by User Preference. 487-490 - Mincong Yu, Deyu Qi:
Automatic Planning on Sequence of Operations Based on Entity-Flow Model towards Pipelining Manufacturing System. 491-497 - Javier Dario Fernandez Ledesma:
Statistical Model to Validate a Metaprocess-Oriented Methodology Based on RAS. 498-503 - Dan Kang, Xiuyang Zhao, Dongmei Niu, Mingjun Liu:
A Volumetric Shape Registration Based on Locally Affine-Invariant Constraint. 504-511 - Li Tan, Chaoyu Yang, Xiaojiang Tang, Yaoyao Jiao:
A Target Tracking Algorithm Based on Path Virtual Force. 512-517 - Baojiang Cui, BaiHui Zhang, Kaiyue Wang:
A Data Masking Scheme for Sensitive Big Data Based on Format-Preserving Encryption. 518-524 - Bo Li, Zheli Liu, Ilsun You:
Partition ORAMS Combined with Novel Client Eviction Mechanism. 525-530 - Ziming Wu, Weiwei Lin, Zilong Zhang, Angzhan Wen, Longxin Lin:
An Ensemble Random Forest Algorithm for Insurance Big Data Analysis. 531-536 - Jianming Cui, Xiaojun Zhang, Yihui Liu, Ning Cao:
A More Secure and Practical Remote User Authentication Scheme for Multi-Server Environment. 537-540 - Yuxiang Feng, Wenhao Wang, Yukai Weng, Huanming Zhang:
A Replay-Attack Resistant Authentication Scheme for the Internet of Things. 541-547 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:
Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys. 548-555 - Hongwei Liu, Ping Zhu, Zehong Chen, Peng Zhang, Zoe Lin Jiang:
Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage. 556-561 - Yulin Wu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage. 562-567 - Yong Ding, Xiumin Li:
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing. 568-571 - Yingying Kong, Zhiwen Yu, Huihui Chen, Zhu Wang, Chao Chen, Bin Guo:
Detecting Type and Size of Road Crack with the Smartphone. 572-579 - Ming-Xing Wang, Dong Dai Lin:
Related Key Chosen IV Attack on Stream Cipher Espresso Variant. 580-587 - Ying Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li:
Finding Android Malware Trace from Highly Imbalanced Network Traffic. 588-595 - Meng Bi, Andi Wang, Jian Xu, Fucai Zhou:
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer. 596-599 - Xiao-Zhang Liu:
Kernel Bilinear Discriminant Analysis for Face Recognition. 603-606 - ShanGuo Lv:
Research on Personalized Hybrid Recommendation Method of Commodity Based on Context. 607-610 - Yanfeng Lyu, Xunli Fan, Kun Liu:
An Optimized Strategy for Small Files Storing and Accessing in HDFS. 611-614 - Shuxian Sun, Rui Liu, Junlong Chen, Feng Yang, Jinyu Liu:
An Improvement of Distributed Indexing Method Based on the Map/Reduce. 615-618 - Zhiping Fan, Musheng Cai, Xie Li, Jianfeng Chen:
A New Dynamic Energy-Based Clustering Model for Wireless Sensor Networks. 619-622 - Yanli Liu, Mengyu Zhu, Heng Zhang:
Processed RGB-D Slam Using Open-Source Software. 623-626 - Meisheng Li, Wenjun Xiao, Zhengwen Lai, Zhanying Zhang:
Random Walk on Undirected Networks Based on the Neighbor Nodes Degree Distribution. 627-630 - Lei Xiao, Kejiang Liu, Xincai Zhuang:
Research and Optimization of Hydraulic Simulation in Gas Pipeline Network. 631-634 - Ya-Ping Chang, Wei Li, Zhongming Yang:
Network Intrusion Detection Based on Random Forest and Support Vector Machine. 635-638 - Guangzhen Zhao, Cuixiao Zhang, Lijuan Zheng:
Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network. 639-642 - Chijun Zhang, Mingzhe Xu, Chunyan Qiu:
Complex-Network-Based Supply Chain Relationships Inference in Cloud Logistics Services. 643-646 - Zhen Li, Xiangwei Zheng, Yuang Zhang, Qingshui Xue:
Multi-Objective Virtual Network Embedding Algorithm Based on Global Resource Capacity. 647-650 - Jin Li, Qiang Li, Nanxi Chen, Yingguan Wang:
Indoor Pedestrian Trajectory Detection with LSTM Network. 651-654 - Jinhui Chen, Junying Chen, Huaqing Min:
An Evolutionary Algorithm Using Multi-Strategy Combination for Single Objective Optimization Problem. 655-658 - Weigong Lv, Fanchao Meng, Ce Zhang, Yuefei Lv, Ning Cao, Jianan Jiang:
A General Architecture of IoT System. 659-664 - Ting Xia, Changqing Song, Junqing Li, Ning Cao, Chunyan Li, Gang Xu, Feifei Xu, Jifeng Liu, Russell Higgs, Gregory M. P. O'Hare, Guofu Chang, Cuinan Yang, Qiang Zhou:
Research and Application of Cow Estrus Detection Based on the Internet of Things. 665-667 - Zizhen Wang:
Implementation of Temperature-Measuring System Based on Zigbee Technology: The Technology Research on Sensor Network. 668-672 - Wangsheng Fang, Hui Wang, Zhongdong Hu:
Filter Anchor Node Localization Algorithm Based on Rssi for Underground Mine Wireless Sensor Networks. 673-676 - Jingling Zhao, Congxian Yin, Xiaohui Jin, Weiliang Liu:
A High-Speed Network Data Acquisition System Based on Big Data Platform. 677-681 - Zhou Yong:
Dynamical Resource Allocation Controller Research Based on Flow Aware in Content Distribution Networks. 682-684 - Yanwu Zhang, Lei Li, Bin Xue, Ning Cao, Yuyan Shen:
Research on Network Driver Based on Embedded Processor. 685-687 - Xinyu Tang, Changyou Zhang, Chen Liang, Aourra Khaled, Yuanzhang Li:
A Code Self-Relocation Method for Embedded System. 688-691 - Lixin Pang, Ning Yao, Yue Wang, Zhang Yao, Xinxi Lu:
Teaching Quality Evaluation System of Part-Time Teachers. 692-695 - Jingdong Jia, Wenchao Chen:
The Ethical Dilemmas of Virtual Reality Application in Entertainment. 696-699 - Xiaoting Sun, Yujuan Sun, Muwei Jian:
The Research of Texture Transmission Algorithm Combined with Texture Synthesis. 700-703 - Shengke Wang, Shan Wu, Lianghua Duan, Changyin Yu, Yujuan Sun, Junyu Dong:
Person Re-Identification with Deep Features and Transfer Learning. 704-707 - Xiaohui Zhao, Sai Guo, Yanlei Wang:
The Node Influence Analysis in Social Networks Based on Structural Holes and Degree Centrality. 708-711 - Yan-ling Hu:
Analysis on the Internal Control of Enterprise Accounting under Computer Network Environment. 712-715 - Chen Guo, Zhenwei Liu, Zibo Qi, Wei Gao, Ying Wu:
Research on the Frequency Spectrum of Electric Bicycle DC Fault Arc. 716-719 - Zhenyu Xu, Xicheng Li, Chuanbin Du, Baojian Qiu:
Optimal Schedule on a Special Home and Away Double-Loop Rule. 720-723 - Tao Wang:
Digital Image Watermarking Using Dual-Scrambling and Singular Value Decomposition. 724-727 - Zhenyu Guo, Yujuan Sun, Muwei Jian:
Three Dimensional Surface Reconstruction Based on the Reference Object and PMS. 728-731 - Xinming Wang, Fang Xu, Sujun Liu, Ying Wu:
Analysis on Computer Automatic Identification of Low-Over Current for Conductor Insulating Lagging. 732-734 - Huili Jia, Xunli Fan, Kun Liu, Yang Qian:
An Energy Efficiency Routing Algorithm for Wireless Sensor Network. 735-739 - Hui Xu, Xiang Li, Wenyin Gong:
Research on Recognition of Landslides with Remote Sensing Images Based on Extreme Learning Machine. 740-747 - Zhen-Hao Zhang, Guo-Ping Jiang, Yurong Song, Ling-Ling Xia, Qi Chen:
An Improved Weighted LeaderRank Algorithm for Identifying Influential Spreaders in Complex Networks. 748-751 - Yannan Qin, Lin Li, Yongxin Zhang, Yanhui Ding:
A Method of Data Obfuscation Based on Monte Carlo Random Monotone Function. 752-755 - Dengpan Tian, Xiaowei Xu, Ye Tao, Xiaodong Wang:
An Improved Activity Recognition Method Based on Smart Watch Data. 756-759 - Ying Wu, Yongping Zhu, Fang Xu, Jian Xu:
Analysis Model for Fire Accidents of Electric Bicycles Based on Principal Component Analysis. 760-762 - Jinlong Wang, Zhaochan Li, Russell Higgs:
The Application of Dense Storage Integration Technology in Tobacco Logistics Centers Based on the Internet of Things. 763-767 - Xuejun Wang, Yan Zhang:
The Detection and Recognition of Bridges' Cracks Based on Deep Belief Network. 768-771 - Yeqing Li:
Research on Technology, Algorithm and Application of Web Mining. 772-775 - Jie Li, Lirong Qiu:
A Sentiment Analysis Method of Short Texts in Microblog. 776-779 - Jun Yang, Haoxiang Huang, Xiaohui Jin:
Mining Web Access Sequence with Improved Apriori Algorithm. 780-784 - Lingzhi Xu, Can Ge, Weidong Qiu, Zheng Huang, Zheng Gong, Jie Guo, Huijuan Lian:
Password Guessing Based on LSTM Recurrent Neural Networks. 785-788 - Sunyong Wu, Qiutiao Xue, Qiaojiao Ning, Congnan Gui, Xingli Gan:
Bernoulli Box-Particle Smoothing for Detection and Tracking under Interval Measurement. 789-792 - FuYong Zhang, Tiezhu Zhao:
Malware Detection and Classification Based on N-Grams Attribute Similarity. 793-796 - Chenke Luo, Feng Yuan, Qiyuan Gao, Jiateng Yang, Jian Xu:
Anti-Reverse-Engineering Tool of Executable Files on the Windows Platform. 797-800 - Chijun Zhang, Yetong Dai, Jialing Han:
Optimizing Pharmacy-Based Distribution of Pandemic Influenza Antiviral Drugs Based on Large Urban Network. 801-803 - Cuicui Ru, Mao Feng, Jianhao Li, Haitao Yu:
Incident Duration Predication Based on Traffic Boardcasting Information. 804-807 - Zizhen Wang, Chenggang Wang:
A Temperature Measure Method Based on Wireless Communication. 808-812 - Yeqing Li:
Research on Hotspot Topic Discovery Algorithm Based on Web Mining Technology. 813-816 - Pengfei Pang, Aourra Khaled, Yuan Xue, Yuanzhang Li, Quan-Xin Zhang:
A Transparent Encryption Scheme of Video Data for Android Devices. 817-822 - FanJiao Meng, Jiamin Zheng, Xiao Yu, Changyou Zhang, Yu-an Tan:
A High Efficiency Encryption Scheme of Dual Data Partitions for Android Devices. 823-828 - Yuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Xiangyang Li:
Modeling and Practise of Satellite Communication Systems Using Physical Layer Security: A Survey. 829-832 - Haonan Su, Dong Zheng, Yinghui Zhang:
An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage. 833-836 - Guo Sun, Yiqiao Cai:
A Novel Neighborhood-Dependent Mutation Operator for Differential Evolution. 837-841 - Xiaochun Yang, Hongfei Zhu, Xiaosong Zhang, Aourra Khaled:
A SDIO-Interface Wi-Fi Packet Capture Scheme Based on Android Kernel Extension. 842-845 - Zhao Hong, Guo Nan:
Java Source Code Protection Based on JNI and AES Algorithm. 846-849 - Wei Lu, Wei-qi Yuan:
Comparison of Four Local Invariant Characteristics Based on Palm Vein. 850-853 - Wei He, Bo Liu, Yanshan Xiao:
Multi-View Action Recognition Method Based on Regularized Extreme Learning Machine. 854-857 - Wei Li, Kangshun Li, Liang Zhong, Ying Huang:
A Mixed Strategies Differential Evolution Based on Fitness Landscapes Features. 858-861 - Wei Li, Zhong-Ming Yang, Ya-Ping Chang, Bin Zhang:
A Clustering Algorithm Oriented to Intrusion Detection. 862-865 - Fanyu Kong, Dashui Zhou, Yali Jiang, Jianwei Shang, Jia Yu:
Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method. 866-869 - Yinghui Zhang, Dong Zheng:
Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures. 870-874 - Zhao Jin, Guoqiang Yuan, Hui Liu:
Optimization of 3D Reconstruction Technique for CT Image and Analysis of the Derived Model. 875-878 - Lirong Qiu, Na Yang, Maierdan Maolimamuti:
Chinese-Uyghur-English Semantic Search Based on the Knowledge Graphs. 879-882 - Lirong Qiu, Huan Yang, Rong Zhou:
The Design and Implementation of Chinese-Uighur-English Online Dictionary Based on Knowledge Graph. 883-886 - Yeqing Li:
Research and Analysis of Semantic Search Technology Based on Knowledge Graph. 887-890 - Jihui Wang:
Equitable Neighbor Sum Distinguishing Edge Colorings of Some Graphs. 891-893 - Lirong Qiu, Huili Zhang:
Review of Development and Construction of Uyghur Knowledge Graph. 894-897 - Baojian Qiu, Jihui Wang, Yan Liu, Zhenyu Xu:
Neighbor Sum Distinguishing Total Colorings of Graphs with Bounded Maximum Degree and Maximum Average Degree. 898-901 - Shengke Wang, Changyin Yu, Yujuan Sun, Junyu Dong:
A Specular Reflection Removal Method for Large Scale Ocean Surface Images. 902-907 - Changsong Li, Yiqi Zhou:
The Research of Signal Processing of the Control System Based on Electromyography Signal. 908-911 - Hu Wang, Zhongming Yang, Congbo Ma, Hongyue Wu, Mingting Ouyang:
A Fast Image Matting Method Based on Interval-Line Sampling. 912-915 - Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu:
FCM-Based Image Segmentation with Kernel Functions. 916-919
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.