default search action
1. ICICA 2010: Tangshan, China
- Rongbo Zhu, Yanchun Zhang, Baoxiang Liu, Chunfeng Liu:
Information Computing and Applications - First International Conference, ICICA 2010, Tangshan, China, October 15-18, 2010. Proceedings. Lecture Notes in Computer Science 6377, Springer 2010, ISBN 978-3-642-16166-7
Parallel and Distributed Computing
- Morteza Analoui, Mohammad Hossein Rezvani:
A Non-strategic Microeconomic Model for Single-Service Multi-rate Application Layer Multicast. 1-8 - Hong-Lin Zhang, Chunyuan Zhang, Dong Liu, Gui-Wu Xie:
Importance Measure Method for Dynamic Fault Tree Based on Isomorphic Node. 9-16 - Zhigang Li, Zhihai Wang, Weijia Guo:
Shortages of the Traditional Calculation of Interference Intensity of the Control Rules. 17-24 - M. Zarina, Mustafa Mat Deris, Ahmad Nazari Mohd Rose, Mohd Isa Awang:
Dynamic Data Replication Strategy Based on Federation Data Grid Systems. 25-32 - D. Doreen Hephzibah Miriam, K. S. Easwarakumar:
A Novel Approach for QoS Guided Metascheduler for P2P Grid System. 33-40 - Ahmad Shukri Mohd Noor, Mustafa Mat Deris:
Failure Recovery Mechanism in Neighbor Replica Distribution Architecture. 41-48 - Zhao Jin, Jian Jin, Weiyi Liu:
Autonomous Discovery of Subgoals Using Acyclic State Trajectories. 49-56 - Jing Tan, Zhigang Tao, Changcun Li:
Numerical Computing and Forecasting to Land Subsidence in Coastal Regions of Tangshan. 57-64 - Jixian Xiao, Fangling Lu, Xin Xiao:
Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and Pricing. 65-72 - Su-feng Yin, Xiao-jing Wang, Jian-hui Wu, Guo-li Wang:
Grey Correlation Analysis on the Influential Factors the Hospital Medical Expenditure. 73-78 - Ye Zhao, Shujuan Liu, Yi-li Tan:
Discrete Construction of order-k Voronoi Diagram. 79-85
Trusted and Pervasive Computing
- Chaoping Wang, Aimin Yang, Yan Sun:
Double Verifiably Encrypted Signature-Based Contract Signing Protocol. 86-93 - Sébastien Dourlens, Amar Ramdane-Cherif:
Semantic Memory for Pervasive Architecture. 94-102 - Ming Chen, Kaigui Wu, Jie Xu:
Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange. 103-110 - Leyou Zhang, Yupu Hu, Qing Wu:
Short Signature from the Bilinear Pairing. 111-118 - Jiajun Li, Liping Qin, Jia Zhao:
The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithms. 119-126 - Lei Yang, Yu Dai, Bin Zhang:
Method for Evaluating QoS Trustworthiness in the Service Composition. 127-134 - Fushan Wei, Chuangui Ma, Qingfeng Cheng:
Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings. 135-142 - Wensheng Liu, Liwen Guo, Ming Zhu:
Bayesian Network Based on FTA for Safety Evaluation on Coalmine Haulage System. 143-149
Internet and Web Computing
- Qibo Sun, Shangguang Wang, Fangchun Yang:
Multi-factor Evaluation Approach for Quality of Web Service. 150-157 - Lei Zhao, Lina Wang, Zuoting Xiong, Dongming Gao:
Execution-Aware Fault Localization Based on the Control Flow Analysis. 158-165 - (Withdrawn) The Influence of Cacheable Models on E-Voting Technology. 166-172
- Hassan Barjini, Mohamed Othman, Hamidah Ibrahim:
An Efficient HybridFlood Searching Algorithm for Unstructured Peer-to-Peer Networks. 173-180 - Jiaxuan Ji, Fenglin Bu, Hongming Cai, Junye Wang:
Ontology Model for Semantic Web Service Matching. 181-188 - Ghalem Belalem, Fatima Zohra Tayeb, Wieme Zaoui:
Approaches to Improve the Resources Management in the Simulator CloudSim. 189-196 - Saeed Parsa, Azam Peyvandi-Pour, Mojtaba Vahidi-Asl:
Introducing a New Predicate Network Model Constructed Based on Null Hypothesis Testing for Software Fault Localization. 197-204
Multimedia Networking and Computing
- Yong Zhang, Zhuoran Li, Jingying Cai, Jianying Wang:
Image Segmentation Based on FCM with Mahalanobis Distance. 205-212 - Jianqing Fu, Jiyi Wu, Jianlin Zhang, Lingdi Ping, Zhuo Li:
A Novel AHP and GRA Based Handover Decision Mechanism in Heterogeneous Wireless Networks. 213-220 - Zheng Liu, Hua Yan:
Annotating Flickr Photos by Manifold-Ranking Based Tag Ranking and Tag Expanding. 221-228 - Zhenxin Zhang, Jigang Tong, Zengqiang Chen, W. H. Ip, Ching-Yuen Chan, Kai-Leung Yung:
Application of Chaos in Network Video Security. 229-236 - Yan Deng, Weiqiang Zhang, Yanmin Qian, Jia Liu:
Integration of Complementary Phone Recognizers for Phonotactic Language Recognition. 237-244 - Feng Gao, Zehua Gao, Liu Wen, Yazhou Wang, Jie Liu, Dahsiung Hsu:
Performance Analysis of IEEE 802.11a Based on Modified Markov Model in Non-saturation Conditions. 245-252 - Norhalina Senan, Rosziati Ibrahim, Nazri Mohd Nawi, Iwan Tri Riyadi Yanto, Tutut Herawan:
Soft Set Theory for Feature Selection of Traditional Malay Musical Instrument Sounds. 253-260 - Liang Dai, Yilin Chang, Zhong Shen:
ETSA: An Efficient Task Scheduling Algorithm in Wireless Sensor Networks. 261-268 - Jian Liu:
Comparing Fuzzy Algorithms on Overlapping Communities in Networks. 269-276 - Salima Nebti:
Color Image Segmentation Using Swarm Based Optimisation Methods. 277-284 - Gang Li, Youchuan Wan:
Adaptive Seeded Region Growing for Image Segmentation Based on Edge Detection, Texture Extraction and Cloud Model. 285-292
Evolutionary Computing and Applications
- Saeed Parsa, Amir Mehrabi-Jorshary, Mohammad Hamzei:
A New Optimization Algorithm for Program Modularization. 293-300 - Chuan-Hua Zhou, An-Shie Xie, Bao-Hua Zhao:
Self-organizing Learning Algorithm for Multidimensional Non-linear Optimization Applications. 301-308 - Chunying Zhang, Jingfeng Guo:
Research on Set Pair Cognitive Map Model. 309-316 - Nazri Mohd Nawi, Rozaida Ghazali, Mohd Najib B. Mohd Salleh:
The Development of Improved Back-Propagation Neural Networks Algorithm for Predicting Patients with Heart Disease. 317-324 - Dan-Guang Pan, Su-Su Lei, Shun-Chuan Wu:
Two-Stage Damage Detection Method Using the Artificial Neural Networks and Genetic Algorithms. 325-332 - Hui-Ping Cheng, Zheng-Sheng Lin, Hsiao-Fen Hsiao, Ming-Lang Tseng:
Designing an Artificial Immune System-Based Machine Learning Classifier for Medical Diagnosis. 333-341 - Mingsheng Liu, Jianhua Li, Hui Liu:
Human-Oriented Image Retrieval of Optimized Multi-feature via Genetic Algorithm. 342-349 - Shiman Xie, Beifang Bao, Jianwei Chen:
Genetic Algorithm Based on Activities Resource Competition Relation for the RCPSP. 350-356 - Ruicheng Zhang, Xin Zheng:
A New Flatness Pattern Recognition Model Based on Variable Metric Chaos Optimization Neural Network. 357-364 - Guoli Wang, Jianhui Wu, Sufeng Yin, Liqun Yu, Jing Wang:
Comparison between BP Neural Network and Multiple Linear Regression Method. 365-370 - Chunfeng Liu, Li Feng:
Research of Granularity Pair and Similar Hierarchical Algorithm. 371-378 - Yun Tang, Junsong Luo, Yajuan Hao:
The Research and Application of Parallel Generalized Minimal Residual Algorithm Based on Grid MPI Parallel Running Framework. 379-386
Scientific and Engineering Computing
- Yuxin Zhang, Hengfei Ding, Wan-Sheng He, Xiaoya Yang:
A New Family of Methods for Nonlinear Equations. 387-394 - Jean Bosco Etoa Etoa:
A Filter Method to Solve Nonlinear Bilevel Programming Problems. 395-406 - Weijun Ma, Qimin Zhang:
Convergence of the Semi-implicit Euler Method for Stochastic Age-Dependent Population Equations with Markovian Switching. 407-414 - Xiaona Fan, Qinglun Yan:
Interior Point Algorithm for Constrained Sequential Max-Min Problems. 415-422 - Li Guo, Xiankun Du:
Representations for the Generalized Drazin Inverse of Bounded Linear Operators. 423-430 - Jacek Cichon, Rafal Kapelko, Karol Marchwicki:
Uniformity of Improved Versions of Chord. 431-438 - Xiaona Fan, Qinglun Yan:
Aggregate Homotopy Method for Solving the Nonlinear Complementarity Problem. 439-446 - Shih-Ching Ou, Hung-Yuan Chung, Chun-Yen Chung:
A Biomathematic Models for Tuberculosis Using Lyapunov Stability Functions. 447-453 - Jincai Chang, Zhao Wang, Aimin Yang:
Construction of Transition Curve between Nonadjacent Cubic T-B Spline Curves. 454-461 - Jiarui Qi, Youpo Su, Yahui Sun, Yousong Ding, Lihui Ma:
Finite Element Simulation of Reinforce-concrete Frame Beam to Resist Progressive Collapse. 462-469 - Liyan Feng, Teng Liu, Xuegang Li, Mingyu Tian:
Recognition of Linkage Curve Based on Mathematical Morphology. 470-477 - Ning Li, Jing Jiang, Wenfeng Wang:
Interval Implicitization of Parametric Surfaces. 478-485 - Shuzhao Chen, Qingxiang Cai, Yanchao Yang, Cangyan Xiao:
Calculation Method of Indirect Accident Loss Based on Life Value. 486-492 - Haibo Zhang, Weidong Song:
Hazard Source Identification of Mined-Out Area Based on Grey System Theory. 493-500
Intelligent Computing and Applications
- Hongzhen Xu, Bin Tang, Ying Gui:
Consistency Analysis of Dynamic Evolution of Software Architectures Using Constraint Hypergraph Grammars. 501-508 - Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris:
Scalable Model for Mining Critical Least Association Rules. 509-516 - Yuyuan Wen:
Research on the Spatial Structure and Landscape Patterns for the Land Use in Beijing Suburb Based on RS & GIS. 517-524 - Muhammad Sharif, Mohsin Bilal, Salabat Khan, M. Arfan Jaffar:
Adaptive Filter and Morphological Operators Using Binary PSO. 525-532 - Jiajun Li, Jia Zhao, Liping Qin:
Driving Factors' Identification Based on Derivative Process of Subjective Default Credit Risk. 533-540 - Fan Jiang, Chunliang Zhang, Yijun Wang:
Mechanical Behavior Analysis of CDIO Production-Blood Vessel Robot in Curved Blood Vessel. 541-548 - Isabelle Tamanini, Plácido Rogério Pinheiro, Mirian Calíope Dantas Pinheiro:
The Choice of Neuropathological Questionnaires to Diagnose the Alzheimer's Disease Based on Verbal Decision Analysis Methods. 549-556 - Plácido Rogério Pinheiro, Isabelle Tamanini, Francisco Chagas da Silva Filho, Moisés Ângelo de Moura Reis Filho:
Applying Verbal Decision Analysis on the Choice of Materials to the Construction Process of Earth Dams. 557-564 - Yanbo Zhang, Zhiqiang Kang, Chunhua Hou:
Research on Numerical Analysis of Landslide Cataclysm Mechanism and Reinforcement Treatment Scheme in ShengLi Open-Pit Coal Mine. 565-572 - Dianxuan Gong, Chuanan Wei, Ling Wang, Lichao Feng, Lidong Wang:
Adaptive Methods for Center Choosing of Radial Basis Function Interpolation: A Review. 573-580 - Xiaohong Huang, Zhaohua Wang:
Novel Approach for the Design of Half-Band Filter. 581-588 - Yongliang Lin, Xinxing Li:
Key Technique of GMTM for Numerical Analysis Modeling in Geotechnical Engineering: Calculation Region Cutting. 589-596 - Feng Jiang, Zhijun Wang:
Pagerank-Based Collaborative Filtering Recommendation. 597-604
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.