default search action
CSSE 2008: Wuhan, China
- International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China. IEEE Computer Society 2008
Grid Computing
- Xie Xiaozhu, Hong Jingxin, Xiao Sixing:
Effective Method for Moving Objects Detection on Sea Surface. 1-4 - Weifang Liang, Jihai Huang, Jianhua Huang:
A Distributed Cache Management Model for P2P VoD System. 5-8 - Jia-Bin Yuan, Jiao-Min Luo, Zhen-Yu Su:
Strategy for Tasks Scheduling in Grid Combined Neighborhood Search with Improved Adaptive Genetic Algorithm Based on Local Convergence Criterion. 9-13 - Zhang Yinnan, Gang Cen, Fang Zhigang:
Study on Application of CAD Sonification. 14-17 - Zhenchun Huang, Guoqing Li:
Building Data Grid for Spatial Information Applications by Meta-Data Adapters. 18-21 - Long Hao, Rui-Hua Di:
A Framework for Engineering Structure Experiment and Simulation Grid. 22-26 - Zhijian Wang, Ling Shang, Feng Xu:
Research and Application of Fault-Tolerance Based on Watershed Model Grid Platform. 27-30 - Hao Zhang, Yuanqiang Tan, Mingjun Li:
A Numerical Simulation of Motion of Particles under the Wafer in CMP. 31-34 - Qingfan Gu, Bing Chen, Yuping Zhang:
Dynamic Replica Placement and Location Strategies for Data Grid. 35-40 - Yu Sun, Guoqing Li:
Interoperability Research of Heterogeneous GIS Based on Spatial Information Grid. 41-44 - Congfeng Jiang, Yinghui Zhao:
GOVFiR: Grid Computing Based Online Virtual Fitting Room. 45-48 - Xingfu Wang, Lei Qina, Pingqing Wei, Fuquan Dai, Fuyou Miao:
Probabilistic Route Mechanism of Considering Communication Time - PROPHETCCT. 49-52 - Zhao Zheng, Gao Shu:
The Anatomy of Weka4WS: A WSRF-enabled Toolkit for Distributed Data Mining on Grid. 53-57 - Qing Ding, Xi Li, Xuehai Zhou:
Reputation Based Service Selection in Grid Environment. 58-61 - Xin Wang, Linpeng Huang, Yi Zhang:
A Grid Middleware DISQ for Data Integration. 62-65 - Helen X. Xiang:
A Grid-Based Distributed Database Solution for Large Astronomy Datasets. 66-69 - Yang Tao, Xing-jiang Yu:
Classified Optimization Scheduling Algorithm Driven by Multi-QoS Attributes in Economical Grid. 70-73 - Jike Ge, Yuhui Qiu, Shiqun Yin:
Web Services Composition Method Based on OWL. 74-77 - Wang Zhi-xiao, Meng Fan-rong:
Hierarchical Semantic Overlay Network. 78-81 - Gao Ren, Zhang Yun:
Scheduling Strategy in Parallel Applications Based on Ant Colony Optimization. 82-85 - Xu Xiang:
K-Chord: A Flexible Peer-to-Peer Resource Location Protocol. 86-89 - Wen Ji, Shoubao Yang, Bo Chen:
A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion. 90-93 - Wen Ji, Shoubao Yang, Fuli Liu:
Sustained Online Duration - based Reputation Management for File-Sharing Peer-to-Peer Systems. 94-97 - Feng Yang, Xiaoliang Dai, Ruzhi Xu:
The Common Problems on the Peer-to-Peer Multicast Overlay Networks. 98-101 - Chuiwei Lu, Zhitang Li, Huaiqing Lin, Qingfeng Huang:
Fault-Tolerant Routing for P2P System with Structured Topology. 102-105 - Yichuan Shao, Derong Shen:
HilbertChord: A Kind of Method for Managing Service Resources in P2P. 106-109 - Jianli Hu, Quanyuan Wu, Bin Zhou:
Distributed and Effective Reputation Mechanism in P2P Systems. 110-115 - Mande Xie, Yun Ling, Guiyi Wei:
An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping. 116-120 - Jiaqi Liu, Zhigang Chen, Deng Li, Athanasios V. Vasilakos:
A Measurement Study of Unstructured P2P Overlay. 121-124 - Changxiong Tang, Rui Wang:
Constructing a Fractal P2P Network. 125-129 - Dengyuan Xu:
A Novel Scheduling Algorithm Based on Buffered Crossbar Switch Fabric in EPFTS Switch. 130-132 - Chunhua Xiq, Chao Gui:
A Constrained QoS Multicast Routing Algorithm in Ad Hoc. 133-136 - Priyadarsi Nanda:
Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing. 137-142 - Luo Liu, Laurie G. Cuthbert:
Multi-rate QoS Enabled NDMR for Mobile Ad Hoc Networks. 143-146 - Wei Sun, Tao Wen, Quan Guo:
A Performance Comparison of Equation-Based and GAIMD Congestion Control in Mobile Ad Hoc Networks. 147-152 - Yingqiu Li, Minghua Chen, Tao Wen, Lei Sun:
Quality Driven Web Services Composition Based on an Extended Layered Graph. 153-156 - Jiemin Liu, Laiquan Han:
QoS-Satisfied Pathover Scheme in FMIPv6 Environment. 157-160 - Bing Tang, Zude Zhou, Quan Liu, Fangmin Li:
Market-Driven Based Resource Scheduling Algorithm in Computational Grid. 161-164 - Wenbo Zhang, Hongqi Zhang, Bin Zhang, Yan Yang:
An Identity-Based Authentication Model for Multi-domain in Grid Environment. 165-169 - Ran Li, Jiong Yu:
QoS Matching Offset Algorithm Based on Trust-Driven for Computing Grid. 170-173 - Wei Zhou, Jianjun Yu, Gang Xue, Shaowen Yao, Guowei Yu:
A Novel Reputation-Based Trust Architecture for P2P E-Commerce Systems. 174-177 - Li Meng, Liu Ruiyu:
An Overall Construction of SMIS in Chinese Enterprises. 178-181 - Yan He, Miaoliang Zhu, Chunying Zheng:
An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust Negotiation. 182-185 - Liang Hong, Xue-dong Qi, Xia Li, Zhen Li, Wenxing Wang:
Fast Cascading Replication Strategy for Data Grid. 186-189 - Dong-Min Huang, Pan Quan:
A New Nonlinear Filter Algorithm Based on QMC Quadrature. 190-193
Distributed and Parallel Computing
- Yunyi Zhang, Deyun Zhang, Jun Yang, Wei Wei:
Cluster-Based Error Messages Detecting and Processing for Wireless Sensor Networks. 194-197 - Zhiyi Yang, Yating Zhu, Yong Pu:
Parallel Image Processing Based on CUDA. 198-201 - Ren Xiu-li, Liang Hong-wei, Wang Yu:
Multipath Routing Based on Ant Colony System in Wireless Sensor Networks. 202-205 - Fenge Bai, Lifeng Huo, Li Bai, Junying Wang:
Distributed System for Transfusion Supervision Based on Embedded System. 206-210 - Xiang Li:
The Research of Time Efficiency in Adaptive Content Delivery. 211-214 - Guimin Huang, Ya Zhou:
A Request Handling Mechanism with the Shortest Processing-Time First in Web Servers. 215-218 - Haitao Li, Ge Chen:
Research and Development of Component-Based Marine Data Integration Middleware. 219-222 - Kangkang Zhang, Feng Yang, Wenyu Zhang, Peiguang Lin:
EDVO: A "One-Station" Emergency Response Service Model Based on Ontology and Virtual Organization. 223-226 - Dejun Wang, Linpeng Huang, Jiankun Wu, Xiaohui Xu:
Dynamic Software Upgrading for Distributed System Based on R-OSGI. 227-231 - Lina Zhang, Chun Yuan, Yuzhuo Zhong:
Reliable and Efficient Adaptive Streaming Mechanism for Multi-user SVC VoD System over GPRS/EDGE Network. 232-235 - Xiuyan Guo, Jun Li, Jian Yang, Jinlin Wang:
The Research on Dynamic Replication and Placement of File Using Dual-Threshold Dynamic File Migration Algorithm. 236-240 - Ju-Chao Zhuo, Jun Li, Gang Wu, Li-Yue Zhu:
A Novel Data Replication and Placement Scheme for Time-Shifted TV Cluster. 241-245 - Chunhua Li, Chun Yuan, Yuan Liu, Yuzhuo Zhong:
A GOP-Adaptive Priority-Based Rate-Distortion Optimization Bitstream Extraction Algorithm for Scalable Video Coding. 246-249 - Cong Zhang, Ruimin Hu:
Subjective Evaluation of Sound Quality for Mobile Spatial Digital Audio. 250-253 - Zheng-Wu Lu, Guo-Song Jiang, Long-juan Wang:
A New Method to I/O Combination on RAID Controller. 254-259 - Zheng-Wu Lu, Changsheng Xie, Guo-Song Jiang, Yu-De Wang:
Research of Improving RAID Read Performance. 260-263 - DongMei Xing:
Nonmetric Multicommodity Facility Location and K-Median Problem with Service Installation Costs. 264-269 - Jiasheng Chen, Yanqiong Ding, Xuewu Zhang, Ruiyu Liang, Dunqin Duan:
Robust Wireless Video Transmission Strategies for Video Communications. 270-274 - Huailiang Tan, Weixin Tang, Jianhua Sun:
An I/O Acceleration Technology for Network Computing: iTRM. 275-278 - Wenjun Liu, Rongqiao Wang:
Distributed Finite Element Analysis Implementation in .NET. 279-282 - Hailian Gui, Qingxue Huang:
Optimizing the FMM-BEM for 3-D Elastic Problem. 283-286 - Lilun Zhang, Xiping Gong, Junqiang Song, Jianglin Hu:
Parallel Preconditioned GMRES Solvers for 3-D Helmholtz Equations in Regional Non-hydrostatic Atmosphere Model. 287-290 - Chaojiang Fu:
Parallel Computing for Finite Element Structural Analysis on Workstation Cluster. 291-294 - Cheng Tang-pei, Wang Qun:
A Distributed Parallel Algorithm for Magnetotelluric Forward Modeling. 295-298 - Chaojiang Fu:
Parallel Finite Element Computation Based on Coarse-Fine Mesh Formulation. 299-302 - Cao Jia:
Comparison Study about Heterogeneous Size Estimation Methods. 303-306 - Xiaoqiang Zhang, Lin Peng, Lunguo Xie:
Lowering Conflicts of High Contention Software Transactional Memory. 307-310 - Wei Huang, Deyu Qi:
A Local Deadlock Detection and Resolution Algorithm for Process Networks. 311-314 - Zhang Baiyi, Cui Shangsen:
A Parallel Backward Reasoning Study Using Fuzzy Petri Net. 315-319 - Wenjun Liu:
A Parallel Algorithm for Molecule Problem Based on Interval Analysis. 320-323 - Xiaopan Zhang, Xide Fu, Xiaohui Yuan:
Simulation Based Parallel Genetic Algorithm to the Lockage Co-scheduling of the Three Gorges Project. 324-327 - Bo Li, Jun Chen, Man Yang, Erfei Wang:
Impact of Extending the Runtime of Underestimated Jobs in Backfilling Schedulers. 328-331 - Zhou Xin-lian, Gong Bo:
Intra-cluster Nodes Scheduling Algorithm Satisfying Expected Coverage Degree of Application in Distributed Clustering WSNs. 332-335 - Qian Jun, Wang Kuang:
Mobile Multimedia Distributed Share Algorithm under Multiply Access Thresholds. 336-339 - Yanhong Fan, Quanyi Lü, Yufeng Nie:
The Parallel Algorithm for Solving Cycle Block-Tridiagonal Linear Equation. 340-342 - Qingyuan Meng, Haiyang Wang, Chunyang Xu:
A New Model for Maintaining Distributed Data Consistence. 343-346 - Qian Jun, Wang Kuang:
Fast Cell Scheduling Negotiation Algorithm in HSDPA. 347-350 - Liang Tang, Junming Hou, Wanshan Wang, Ke Jing:
A Study on Customer Individual Demand-Oriented Networked Manufacturing System. 351-354 - Xiaoyan Zhu, Jin Lian:
A QoS Multicast Routing Protocol with Mobile Prediction Based on MAODV in MANETs. 355-358 - Zhe Li:
Complier-Directed Parallelization of a Multilevel Solver Algorithm for EDP. 359-362 - Qiong Wang, Chenglie Du, Chunyan Ma, Gang Li:
Extension of TD-pi Calculus in Real-Time Distributed Virtual-Test System Description. 363-369 - Lichun Li, Yang Ji, Chunhong Zhang, Yao Wang, Ma Tao:
Adaptor-Based Design and Implementation of Peer-to-Peer SIP. 370-373 - Guang Zheng, Jinzhao Wu, Lian Li:
Stochastic Process Algebra with Value-Passing. 374-377 - Xie Limei:
Demand-Driven Weak Clock Synchronization for Distributed Applications. 378-381 - Deng Jian, Liwen Huang, Yuanqiao Wen, Jinfeng Zhang:
Research of Distribution Coupling Technology in Large-Scale Science Computation and Its Application in Marine Environment Forecast System. 382-385 - Wei Wei, Yabo Dong, Dongming Lu:
Space-Time Correlation Based Fault Correction of Wireless Sensor Networks. 386-389 - Lin Huo, Yi Fang, Heping Hu:
Dynamic Service Replica on Distributed Data Mining Grid. 390-393 - Kui Fu, Guihua Nie, Donglin Chen, Huimin Wang:
A Semantic Integration Framework for E-Business and Logistics Systems. 394-397 - Conrad Mueller:
Retaining the Semantics of Data with the Data. 398-402 - Qin Jie, Li Guoping, Ma Min:
An Innovative Way to Implement Hierarchical Recovery Protocol in WAN. 403-406 - Xuejuan Huang, Xinmeng Chen, Jinshuo Liu, Jiazhen Xu:
Dynamic Selection of Best Service in Semantic Web Service Community. 407-410 - Chang Wu, Yubai Li, Song Chai, Zhongming Yang:
Lottery Router: A Customized Arbitral Priority NOC Router. 411-414 - Xiwei Feng, Chuanying Jia, Jiaxuan Yang:
Semantic Web Recommendation Model of Distributing Educational Resource. 415-418 - Jae Chul Cha, Sandeep K. Gupta:
Matrix Inversion on a PIM (Processor-in-Memory). 419-422 - Song Chai, Chang Wu, Yubai Li, Zhongming Yang:
A NoC Simulation and Verification Platform Based on SystemC. 423-426 - Xianfeng Zhao:
Structural Optimization on Superscalar Processors. 427-430 - Jian Zhang, Xiaoyong Li, Haibing Guan:
The Optimization of Xen Network Virtualization. 431-436 - Guoyong Cai, Junyan Qian, Ji Gao, Yong Huang:
A Formal Framework for Policy-Governed Institutional Agency. 437-440 - Li Zhang, Shuangfei Li, Zan Yin, Wenyuan Zhao:
A Research on an ASIP Processing Element Architecture Suitable for FPGA Implementation. 441-445 - Jiabin Ruan, Jinjie Lin, Yubin Yang, Wei Wei:
A High Performance Computing Platform for 3D Model Retrieval. 446-449 - Honggang Wang, Jide Zhao, Hongguang Li, Jianguo Wang:
Parallel Clustering Algorithms for Image Processing on Multi-core CPUs. 450-453 - Changhai Zhao, Haihua Yan, Xiaohua Shi, Lei Wang:
DECF: A Coarse-Grained Data-Parallel Programming Framework for Seismic Processing. 454-460 - Annette Bieniusa, Peter Thiemann, Stefan Wehr:
The Relation of Version Control to Concurrent Programming. 461-464 - Min Yu, Zhengyou He, Qingquan Qian:
Reliability and Safety Modeling of Fault Tolerant Control System. 465-468 - Shuzhen Wang, Lei Yu, Zhibin Liu:
A Novel Evaluating Model of CPV Vocational Ability Based on SVM Multilayer Classifier. 469-472 - Yi Liang, Lei Wang, Jianfeng Zhan, Ruihua Di:
A Performance Model for Domino Mail Server. 473-476 - Fan QingMing, Liu Geng, Liu HongJun:
Research on Evaluation of Parts Manufacturability Based on Feature. 477-480 - Shixi Liu, Zhicai Xu, Xianwen Fang:
Dependability Research of Cluster System Based on Stochastic Petri Net. 481-485 - Qilu Sun, Guanzhong Dai, Wenping Pan:
LPV Model and Its Application in Web Server Performance Control. 486-489 - Yanxiang He, Liang Zhao, Zhao Wu, Fei Li:
Formal Modeling of Transaction Behavior in WS-BPEL. 490-494 - Chunhong Zhang, Yang Ji, Lichun Li:
Bandwidth and Efficiency of P2PSIP Based Server Farm. 495-498 - Yuxuan Meng, Ralph Deters:
Research on the Runtime Behavior of Composite SOAP Web Services under Transient Loads. 499-504 - Yongsheng Fu, Xinyu Wang, Shanping Li:
Performance Comparison and Analysis of Routing Strategies in Mobile Ad Hoc Networks. 505-510 - Huang Yihua, Lui Zongyuan, Ling Guojun:
An Improved Bayesian-Based RFID Indoor Location Algorithm. 511-514 - Yun-Young Hwang, Hyung-Jun Yim, Il-Jin Oh, Kyu-Chul Lee:
The Universal Adaptor for Dynamic Ubiquitous Services Discovery and Binding. 515-518 - Jianxin Zhu, Leina Gao, Xinfang Zhang:
Preliminary Research on Wearable Healthcare in Ubiquitous Computing Age. 519-523 - Ke Zuo, Dongmin Hu, Quanyuan Wu:
A Bandwidth Efficient Overlay for Information Exchange in Pervasive Computing Environment. 524-527 - Jianbo Xu, Yong He, Renfa Li:
An Energy-Aware Distributed Clustering Algorithm in Wireless Sensor Networks. 528-531 - Ping Guo, Haiyan Zhang:
Arithmetic Operation in Single Membrane. 532-535 - Dongfang Wang, Xiaogang Qi:
An Algorithm for Dynamic Routing Based on Multi-paths in Wireless Sensor Networks. 536-539 - Kerese Manueli, Savae Latu, Donald Koh:
Enhancing Pasifika Businesses Success with ICT. 540-545 - Changguang Wang, Xu Bai, Shuai Fu, Jianfeng Ma:
Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. 546-549 - Xinhua Liu, Fangmin Li, Hailan Kuang:
An Optimal Power-Controlled Topology Control for Wireless Sensor Networks. 550-554
Information Security
- Xin Liao, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. 555-558 - Hongbin Xia, Wenbo Xu:
Research on Method of Network Abnormal Detection Based on Hurst Parameter Estimation. 559-562 - Qinghua Zhang:
A Security Design of Data Exchange Platform. 563-566 - Zhi-Dong Shen, Xiaoping Wu:
A Trusted Computing Technology Enabled Mobile Agent System. 567-570 - Yong Qi, Long Xiao, Qianmu Li:
Information Security Risk Assessment Method Based on CORAS Frame. 571-574 - Xinguang Peng, Yanyan Zhang:
Robust Host Anomaly Detector Using Strong Isolation. 575-578 - Jun Xiao, Ying Wang:
A Semi-fragile Watermarking Tolerant of Laplacian Sharpening. 579-582 - Guohua Wu, Xiaodong Zhou:
A Fast Audio Digital Watermark Method Based on Counter-Propagation Neural Networks. 583-586 - Jin Nie, Xianling Hu:
Mobile Banking Information Security and Protection Methods. 587-590 - Zhi Zhang, Guohua Cui:
A Cluster Based Secure Cryptography for Sensor Networks. 591-594 - Chunlei Fu, Li Fu:
Comprehensive Assessment Model of Network Vulnerability Based upon Refined Mealy Automata. 595-600 - Xiangdong Li, Qingxian Wang, Li Chen:
Analysis on Cyclic Multi-party Fair Exchange Protocols. 601-604 - Hao Hu, Dengguo Feng:
BIFI: Architectural Support for Information Flow Integrity Measurement. 605-609 - Diao Mingguang, Xue Tao, Pan Wenyong:
Design of Universal Authority Management Model of Online Teaching System. 610-613 - Jiemin Yan, Ru Xu, Deqing Wang, Huabin Chen, Xiaoyi Hu:
Study on MC-CDMA for Underwater Acoustic Networks. 614-617 - Zhu Na, Xiao Guo Xi:
The Application of a Scheme of Digital Signature in Electronic Government. 618-621 - Zhu Ning, Chen Xin-yuan, Zhang Yong-fu, Xin Si-yuan:
Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test. 622-626 - Yingkun Hou, Chunxia Zhao, Mingxia Liu, Deyun Yang:
The Nonsubsampled Contourlet-Wavelet Hybrid Transform: Design and Application to Image Watermarking. 627-630 - Mingyuan Yu, Xianping Huang, Li Jiang, Ronghua Liang:
Combined Public Key Cryptosystem Based on Conic Curves over the Ring Zn. 631-634 - Chen Zhuo, Zhang Zhengwen, Jiang Nan:
A Session Key Generator Based on Chaotic Sequence. 635-637 - Zhao Yang, Sun Xie-hua:
A Semi-fragile Watermarking Algorithm Based on HVS Model and DWT. 638-641 - Shaomin Zhang, Xiangjun Kong, Baoyi Wang:
Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domain. 642-645 - Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang:
A Role-Based Access Control Model for Complex Affairs. 646-650 - Chengliang Wang, Jianwei Li, Juanjuan Chen, Zhi Zhuang, Yaxin Zhou:
A Novel Strategy Enhancing Location Cloaker for Privacy in Location Based Services. 651-655 - Jiaming He, Hongbin Zhang:
Digital Right Management Model Based on Cryptography and Digital Watermarking. 656-660 - Hui Xie, Bin Zhang, Dianyou Hu:
A Role-Based Dynamic Authorization Model and Its Implementation in PMI. 661-664 - Bin Yu, Haiyan Li:
Research and Design of One Key Agreement Scheme in Bluetooth. 665-668 - Ningzhong Liu, Han Sun:
Design and Analysis of the Three-Dimensional Bar Code. 669-672 - Lei Wang, Song Ma, Xinhong Hei:
Research on an Immune Mechanism Based Intelligent Spam Filter. 673-676 - Jiping Niu, Yongchuan Zhang, Zhihua Hu, Zuqiao Yang:
A Digital Image Scrambling Method Based on AES and Error-Correcting Code. 677-680 - Lilong Han, Qingtang Liu, Zongkai Yang:
Dynamic Expression of Digital Rights by Rewriting License. 681-683 - Xia Zhuge, Koji Nakano:
An Error Diffusion Based Algorithm for Hiding an Image in Distinct Two Images. 684-687 - Qiang Zhang, Xiaowei Wang, Zhenghu Gong:
A Role-Based Automated Trust Negotiation and Authentication Design in Mobile Ad Hoc Networks. 688-691 - Qiujuan Liang, Zhizhong Ding:
Spread Spectrum Watermark for Color Image Based on Wavelet Tree Structure. 692-695 - Zhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng:
An Extended Permission-Based Delegation Authorization Model. 696-699 - Ming-ming Xiao, Liang-Xuan Yu, Chuan-Ju Liu:
A Comparative Research of Robustness for Image Watermarking. 700-703 - Sanjay Saini, Joydip Dhar:
An Eavesdropping Proof Secure Online Voting Model. 704-708 - Xianmin Wang, Ruiqing Niu:
Stegonograhpy for High-Resolution Color Remote Sensing Image. 709-712 - Sun Jing, Ma Yu-Jian, Zhao Hui-Qun, Xiao Hui-Bin:
A Study on the Design and Implementation of EPCIS Trust Model. 713-716 - Li-Xin Zhong, Bi-Hui Chen, Cai-Feng Liu, Li Liang:
Interplay between Network Growing and Benefit Competition. 717-720 - Silei Lei, Jun Liu, Junmo Xiao:
A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing Technology. 721-724 - Kang Hui, Liu Jing, Zhu Xiao-dong, Zhang Xiao-xu:
Study on Implementation of a FingerprintWatermark. 725-728 - Yachun Fan, Mingquan Zhou, Xingce Wang, Xinyu Liu:
Toward Color Logo Watermark to JPEG2000 Compressed Images. 729-732 - Shengbing Che, Zuguo Che, Bin Ma, Qiangbo Huang:
Semi-fragile Watermarking Algorithm Based on Image Character. 733-737 - Yanbin Fan, Wenyong Chen, Zhenkuan Pan:
An Adaptive Watermarking Algorithm in DWT Domain Based on Multi-scale Morphological Gradient. 738-741 - Ning Wang:
Seal Identification Based on Pixel Distribution Probability with Three-Mode and Nine-Section. 742-745 - Chengxi Dong, Dewei Wu, Haibo Liu:
Mining Method of Attribute Reduction Based on Rough Fuzzy Set Theory. 746-749 - Xiaojian Yu, Zhaozhang Ren:
The Valuation of American Put Option Based on Fuzzy Techniques. 750-753 - Feng Wu, Yan Zhong, Quanyuan Wu:
Network Threat Frequency Forecasting Based on Fuzzy Time Series and D-S Evidence Theory. 754-757 - Lan Yuqing, Zhao Tong:
Bayesian Network to Construct Interoperability Model of Open Source Software. 758-761 - Yanlin Qin, Xiaoping Wu:
Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. 762-765 - Youan Xiao, Zude Zhou:
A New Kind of Self-Certified Proxy Digital Signature Scheme. 766-769 - Li Lifen:
Trust Derivation and Transitivity in a Recommendation Trust Model. 770-773 - Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang:
ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. 774-777 - Jian-ping Qiu, Li-Chao Chen:
Trust Management for Semantec Web. 778-781 - De Wang, Shi-Liang Sun:
Replacement and Structure of S-Boxes in Rijndael. 782-784 - Xin-jie Zhao, Tao Wang, Dong Mi, Yuanyuan Zheng, Zhaoyang Lun:
Robust First Two Rounds Access Driven Cache Timing Attack on AES. 785-788 - Liu Peng, Zong Rui, Liu Sizuo:
A New Model for Authentication and Authorization across Heterogeneous Trust-Domain. 789-792 - Sheng Li-Yuan, Sheng Zhe, Xiao Yan-Yu:
How Homogenize Chaos-Based Pseudo-random Sequences. 793-796 - Ning Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi:
Group-Based Trust Model in P2P System Based on Trusted Computing. 797-801 - Liang Chen, Chengmin Gao:
Public Key Homomorphism Based on Modified ElGamal in Real Domain. 802-805 - Ge Xiuhui, Tian Hao:
Research on Application of Immune Digital Watermark Algorithm. 806-809 - Ge Xiuhui, Tian Hao:
Research on Application of Reversible Digital Watermark Algorithm. 810-813 - Jue Wang, Jian Peng, Daping Zhang:
Research on Dynamic Reputation Management Model Based on PageRank. 814-817 - Xiangdong Liu, Junxing Zhang, Jinhai Zhang, Xiqin He:
A New Chaotic Image Scrambling Algorithm Based on Dynamic Twice Interval-Division. 818-821 - Xuansen He, Zhun Luo:
A Novel Steganographic Algorithm Based on the Motion Vector Phase. 822-825 - Baoyuan Kang:
Cryptanalysis on an E-voting Scheme over Computer Network. 826-829 - Yiling Wen, Jianfeng Ma:
An Aggregate Signature Scheme with Constant Pairing Operations. 830-833 - Qi Xie, Ji-Lin Wang, Deren Chen, Xiuyuan Yu:
A Novel User Authentication Scheme Using Smart Cards. 834-836 - Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong:
Chained Threshold Proxy Signature without and with Supervision. 837-840 - Suli Wu, Yang Zhang, Xu Jing:
A Novel Encryption Algorithm Based on Shifting and Exchanging Rule of Bi-column Bi-row Circular Queue. 841-844 - Li Chen, Liang Ju:
The Research of Trust Model Based on Group-Recommend in P2P Network. 845-848 - Zhang Dinghui, Gu Qiujie, Pan Yonghua, Zhang Xinghua:
Discrete Chaotic Encryption and Decryption of Digital Images. 849-852 - Xia Hong, Ning Hui-ming, Yan Jiang-yu:
The Realization and Optimization of Secure Hash Algorithm (SHA-1) Based on LEON2 Coprocessor. 853-858 - Wei Huang, Yu Meisheng:
The Quickly Solving Method of File Recovery in Windows Environment. 859-862 - Xiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu:
Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. 863-867 - Narisa Zhao, Xianfeng Zhang:
The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. 868-871 - Xuanwu Zhou, Ping Wei:
Anonymous Proxy Authorization Signature Scheme with Forward Security. 872-875 - Ki-Jong Kim, Ki-Hyun Jung, Kee-Young Yoo:
A High Capacity Data Hiding Method Using PVD and LSB. 876-879 - Tao Liu, Chi Zhang:
Approach to Worm Detection, Early Warning Based on Local Victim Behavior. 880-884 - Xu Zhujun, Yin Sijia, Shen Jia, Zheng Xingchen:
A Chaos Forecast Research on Capital Market Model. 885-888 - Chengxi Dong, Dewei Wu, Jing He:
Knowledge Reduction of Evaluation Dataset Based on Genetic Algorithm and Fuzzy Rough Set. 889-892 - Wei Zheng, Xin Meng, Huan He:
Genetic Algorithm for TDRS Communication Scheduling with Resource Constraints. 893-897 - Hui Lei, Shi Cheng, Min-si Ao, Yiqi Wu:
Application of an Improved Genetic Algorithm in Image Segmentation. 898-901 - Zhou Lei, Sun Ying, Bu Guo-miao:
Route Research on Critical Factors of Information Construction in Textile Machinery Manufacture Business-Taking Businesses of Shaanxi Province for Example. 902-905 - Chenghua Tang, Shunzheng Yu:
Assessment of Network Security Policy Based on Security Capability. 906-910 - Zhang Yue-mei, Li Yan-xi:
Information Disclosure Quality: Factors and Measurement. 911-914 - Tianhan Gao, Nan Guo, Zhiliang Zhu:
Policy-Based Distributed Security Management Scheme in MIPv6. 915-918 - Zhengjian Zhu, Qingping Tan, Peidong Zhu, Qianbing Zheng:
Security Broadcast Based on Linear Network Coding in WSN. 919-922 - Hongye Yang, Chun Zhao, Yuewen Liu:
GIS-Based Inner Mongolia Grassland Fire Spread Simulation System. 923-925 - XiaoBing Kang, ShengMin Wei:
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics. 926-930 - Jin-Yong Byun, Ki-Hyun Jung, Kee-Young Yoo:
Improved Data Hiding Method by Block Parity for Binary Images. 931-934 - Zhao Yantao, Ma Yunfei, Li Zhiquan:
A Robust Chaos-Based DCT-Domain Watermarking Algorithm. 935-938 - Xiang Li, Jianhua Li:
A New Blind Steganalysis Method for JPEG Images. 939-942 - Xiuying Wang, Lizhong Xiao, Zhiqing Shao:
A Danger-Theory-Based Abnormal Traffic Detection Model in Local Network. 943-946 - Zhiwen Wang, Qin Xia, Ke Lu, Jie Zhang:
An Approach on Detecting Attack Based on Causality in Network Behavior. 947-950 - Chunfu Jia, Deqiang Chen, Kai Lin:
The Application of the Relative Entropy Density Divergence in Intrusion Detection Models. 951-954 - Qing-Hua Zhang, Ya-She Zhang, Long-Qiu Shao, Yu-zhen Fu, Hong-Fang Li, Ben-Lai Liang:
An Immunity-Based Technical Research into Network Intrusion Detection. 955-958 - Wan Tang, Yang Cao, Xi-Min Yang, Won-Ho So:
Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules. 959-963 - Nan Li, Chunhe Xia, Yi Yang, Haiquan Wang:
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. 964-969 - Qiang Zhang, Ying Zhuo, Zhenghu Gong:
A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. 970-973 - Fanchen Su, Zhiyi Yin, Haitao Yao, Jianming Fu, Fuxi Zhu:
Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph. 974-977 - Bin Chen, Jun Gao, Juan Li, Kun Li:
The Portable PCB Fault Detector Based on ARM and Magnetic Image. 978-981 - Jian-Xia Wang, Wan-Zhen Zhou, Yun-Feng Xu:
Embedded Intrusion Detection and Authority Management System. 982-985 - Fei Ren, Liang Hu, Hao Liang, Xiaobo Liu, Weiwu Ren:
Using Density-Based Incremental Clustering for Anomaly Detection. 986-989 - MeiLing Cai:
A Novel Immunity-Based Model for Anomaly Detection. 990-993 - Bibo Jiang, Xiulin Hu:
A Survey of Group Key Management. 994-1002 - Wenmin Li, Qiao-Yan Wen:
Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves. 1003-1006 - Xiaofeng Wang, Nanning Zheng:
ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems. 1007-1010 - M. Vipin, A. V. Sarad, Sankar Kuppan:
A Multi Way Tree for Token Based Authentication. 1011-1014 - Hou Huifang, Kaizhi Huang, Liu Guangqiang:
CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. 1015-1019 - Xiaoping Wu, Zhi-Dong Shen, Huanguo Zhang:
Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. 1020-1023 - Jiya Jiang, Tong Liu, Guifen Zhao:
A Two-Way Authentication Based on One-Time SMS4 Algorithm and Combined Symmetric Key. 1024-1027 - Zhengfeng Hou, Jianghong Han, Donghui Hu:
A New Authentication Scheme Based on Verifiable Secret Sharing. 1028-1030 - Junming Hou, Chong Su, Yingying Su, Wanshan Wang:
Knowledge Management in Collaborative Design for Manufacture. 1031-1034 - Gang Cheng, Qingyun Du, Hongli Ma:
The Design and Implementation of Ontology and Rules Based Knowledge Base for Transportation. 1035-1038 - Zhihua Hu, Jiping Niu:
Based on SpectrumCluster High Resolution Remote Sensing Image Multi-criterion Stochastic Tree Division. 1039-1042 - Cairong Yan, Zhidong Qin, Youqun Shi:
Sequence Analysis and Anomaly Detection of Web Service Composition. 1043-1048 - Weiwei Fang, Bingru Yang:
Privacy Preserving Decision Tree Learning over Vertically Partitioned Data. 1049-1052 - Ting-ting Cen, Jian-min Han, Huiqun Yu, Yu Juan:
An Efficient Microaggregation Algorithm for Mixed Data. 1053-1056 - Xiaolin Cui, Xiaobin Tan, Yong Zhang, Hongsheng Xi:
A Markov Game Theory-Based Risk Assessment Model for Network Information System. 1057-1061 - Shouxin Wang, Li Zhang, Na Ma, Shuai Wang:
An Evaluation Approach of Subjective Trust Based on Cloud Model. 1062-1068 - Hu Ruo, Xu Hong:
Ontology-Based Description Frame of Information Security Service-Ability for Customer Demands. 1069-1072 - Hu Ruo, Chen Chao Tian:
Customer Demands-Based Formalized Expression of Information Security Resources. 1073-1076 - Jie Shi, Weiling Wu:
Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative Relaying. 1077-1080 - Xiyang Li, Cong Qin:
Combinatorial Characterizations of k-Coincidence Frequency-Hopping Sequences. 1081-1083 - Yuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi:
Research on Survivability of Mobile Ad Hoc Network. 1084-1088 - Li Li, Guosun Zeng, Bo Chen:
A Trusted Transfer Protocol Based on Property-Based Seal. 1089-1092 - Guoxiong Xu, Changzheng Ma:
Interference Cancellation/Decoding for Coded Synchronous Multi-carrier DS-CDMA. 1093-1096 - He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi:
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. 1097-1103 - Yanxin Xue:
The Research on Data Synchronization of Distributed Real-Time Mobile Network. 1104-1107 - Xiaoling Yang, Qunxiong Zhu:
Application of Protocol Macro in Baking Temperature Control System. 1108-1112 - Humphrey Waita Njogu, Xiehua Li:
Combating TCP Based Attacks on Mobile Devices. 1113-1118 - Jing Gao, Ji-Yin Sun, Yan-Jie Chai, Bo Wang, Ling-Jiao Tao, Fei-Hu Bao:
Damaged Mechanism Research of RS232 Interface under ElectromagneticPulse. 1119-1122 - Jingjing Wu, Jiwu Jing, Jingqiang Lin:
A Decentralized Certification Authority Based on Real World Trust Relationships. 1123-1126 - Xuezhong Liu, Zengliang Liu:
Evaluating Method of Security Threat Based on Attacking-Path Graph Model. 1127-1132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.