


default search action
2. CCIS 2012: Hangzhou, China
- 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2012, Hangzhou, China, October 30 - November 1, 2012. IEEE 2012, ISBN 978-1-4673-1857-0

- Xue Li, Junping Du, Lingling Zi, Katsunori Shimohara:

Study and implementation of personalized searching system based on user's interest model. 1-5 - Song Bi, Dehui Sun, Liqun Han, Zhe Dong, Zhenwu Lei:

Research on method of feature extraction and recognition of road condition from nighttime video without vehicle segmentation. 6-10 - Yun Zhang, Junping Du, Jangmyung Lee:

A new fast interpolation method based on edge extraction. 11-15 - Haoyang Chen, Yasukuni Mori, Ikuo Matsuba:

Archive-shared cooperative coevolutionary algorithm using Nash equilibria preservation. 16-20 - Benjie Lu, Zhiqing Liu, Hui Gao:

An adaptive prolog programming language with machine learning. 21-24 - Jianan Wu, Chunguang Zhou, Zhangxu Li, Xuefei Xia, Seng Zhang, You Zhou:

A novel algorithm for generating simulated genetic data based on K-medoids. 25-28 - Liyun Ru, Anhui Wang, Yingying Wu, Shaoping Ma:

Auto-scaled Bayesian browsing model in massive data. 29-33 - Xinjian Zhuo, Jinrui Han, Jincheng Han:

Network coding link optimization problems based on genetic and particle swarm algorithm. 34-37 - Jiali Bian, Lin Liu, Jian Kuang:

An Android-based distributed test data acquisition intelligent system for mobile network optimization. 38-42 - Nan Zhao, Yuan Dong, Jiwei Zhang, Xiaofu Chang:

Color-based maximally stable extremal region for sports genre categorization. 43-46 - Hongying Zhang, Zheng Hu:

Research on civil aviation aircraft registration number recognition. 47-51 - Hanwen Li, Yi Wan, Guanghui Ma:

A fast collision detection method for clothing animation. 52-55 - Shuisheng Liu, Yuan Dong, Wei Liu, Jian Zhao:

Multi-view face detection based on cascade classifier and skin color. 56-60 - Yuxia Sun, Yajie Wang, Fei Li:

Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo. 61-64 - Wanliang Wang, Minqian Liu, Xin Wang:

Multi-characters interaction based on honeycomb. 65-69 - Yu Dai, Jianfeng Guan

, Wei Quan, Changqiao Xu, Hongke Zhang:
PCA-based dimensionality reduction method for user information in Universal Network. 70-74 - Zhe Li, Weiqing Sun, Lingfeng Wang:

A neural network based distributed intrusion detection system on cloud platform. 75-79 - Lisha Hou, Junping Du, Lingling Zi, Min Zuo, Katsunori Shimohara:

Image scaling method based on protected region. 80-84 - Yahao Yan, Junping Du, Qingping Li, Min Zuo, JangMyung Lee:

Multi-focus image fusion algorithm based on NSCT. 85-89 - Yan Peng, Tian Zhou:

Research on the Apriori algorithm in extracting the key factor. 90-93 - Shangfei Wang, Peijia Shen, Zhilei Liu

:
Facial expression recognition from infrared thermal images using temperature difference by voting. 94-98 - Min Jin, Huaxiang Lu:

Parallel particle swarm optimization with genetic communication strategy and its implementation on GPU. 99-104 - Yingyou Chen, Qing Wu:

Micro-blog category based on feature-words category dispersion. 105-108 - Bin Xie, Qing Wu:

HMM-based Tri-training algorithm in human activity recognition with smartphone. 109-113 - Yan Shi, Qin Wang, Huiyan Zhang:

Hybrid ensemble PSO-GSO algorithm. 114-117 - Qin Wang, Yan Shi, Guangping Zeng

, Xuyan Tu:
Improving global optimization ability of GSO using ensemble learning. 118-121 - Qing Wu, Zhenbang Li:

An adaptive service selection approach in mobile environment. 122-126 - Zheng Wang, Jingling Zhang, Wanliang Wang:

Using GA-based simulation to cooperative climate strategy of climate game problem. 127-131 - Jiajia Zhang, Xuan Wang, Ling Yang, Jia Ji, Dongsheng Zhi:

Analysis of UCT algorithm policies in imperfect information game. 132-137 - Yue Liu, Liu Yang, Zaixia Teng, Junjun Gao:

Demand forecasting method based on adjacent substitution rate estimation by GA. 138-142 - Chunming Wei, Yingchun Yang:

Mandarin isolated words recognition method based on pitch contour. 143-147 - Zhenshan Hou, Mingliang Cui, Ping Li, Liuliu Wei, Wenhao Ying, Wanli Zuo:

Session segmentation method based on COBWEB. 148-153 - Xiao Yang, Zhen Tian, Huayang Cui, Zhaoxin Zhang:

Link prediction on evolving network using tensor-based node similarity. 154-158 - Xin Wang, Qing Ma, Wanliang Wang:

Kinect driven 3D character animation using semantical skeleton. 159-163 - Ming-Wen Shao, Min Liu, Jinghua Hao:

Attribute characteristics of combined formal contexts. 164-169 - Bo Li, Zhengcai Cao, Min Liu, Jinghua Hao:

Approach to complex hydrogen reactor optimization modeling based on ANFIS. 170-175 - Fangfang Qu, Dong Ren, Xiaobo Liu, Zhenyu Jing, Lin Yan:

A face image illumination quality evaluation method based on Gaussian low-pass filter. 176-180 - Yingying Jiang, Feng Tian, Hongan Wang, Guozhong Dai:

Combining hand-drawn concept maps with RFID tags. 181-184 - Shengguo Chen, Zhengxing Sun

, Jie Zhou, Yi Li:
Semi-supervised image segmentation combining SSFCM and Random Walks. 185-190 - Minghao Yang, Jianhua Tao, Hao Li, Kaihui Mu:

Multimodal emotion estimation and emotional synthesize for interaction virtual agent. 191-196 - Qinyan Zhang, Li Shi:

3D face model reconstruction based on stretching algorithm. 197-200 - Qing Tian, Rong Wang:

The research of intelligent method for blurring image reconstruction. 201-205 - Ruimei Zhang, Changcheng Liu, Chuandui Wang:

Research on connect 6 programming based on MTD(F) and Deeper-Always Transposition Table. 206-208 - Chao Zou, Yueming Lu, Fangwei Zhang, Songlin Sun:

Load-based controlling scheme of virtual machine migration. 209-213 - Jian Li, DanJie Song, Sicong Chen, Xiaofeng Lu:

A simple fully homomorphic encryption scheme available in cloud computing. 214-217 - Ya-Wei Zhao, Yong Wang:

Partition-based cloud data storage and processing model. 218-223 - Jian Li, Sicong Chen, DanJie Song:

Security structure of cloud storage based on homomorphic encryption scheme. 224-227 - Yongkang Fu, Bin Sun:

A scheme of data confidentiality and fault-tolerance in cloud storage. 228-233 - Chao Dong, Bolun Huang, Zhenming Lei, Jie Yang:

Chinese Multimedia Messaging Service (MMS) analysis using hadoop. 234-239 - Yulong Ren, Wen Tang:

A service integrity assurance framework for cloud computing based on MapReduce. 240-244 - Han Qian, Qiaoyan Wen:

A cloud-based system for enhancing security of Android devices. 245-249 - Yang Yu, Qiaoyan Wen:

The design of the cloud mobile OA system. 250-254 - Jinglong Lv, Yong Zhang, Yinglei Teng, Yang Liu, Yihai Xing:

The research on distributed storage mechanism used in clustered opportunistic network. 255-259 - Zhaohai Zhang, Qiaoyan Wen:

An authorization model for multi-tenancy services in cloud. 260-263 - Minxian Xu

, Wenhong Tian:
An online load balancing scheduling algorithm for cloud data centers considering real-time multi-dimensional resource. 264-268 - Wenhong Tian, Chee Shin Yeo

, Ruini Xue, Yuanliang Zhong:
Power-aware scheduling of real-time virtual machines in cloud data centers considering fixed processing intervals. 269-273 - Wenfang Zhao, Fei Gao:

Design of dynamic fine-grained role-based access control strategy. 274-278 - Xiuqin Lin, Zhonghan Du, Juan Yang:

The simple optimization of WLC algorithm based on LVS cluster system. 279-282 - Xiaowei Li, Hongxiang Sun, Qiaoyan Wen:

An approach for secure-communication between XEN virtual machines. 283-286 - Zhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu:

Multi-domain cloud social network service platform supporting online collaborations on campus. 287-291 - Zhen Xu, Aimin Yu, Wensi Yang:

Real-time remote attestation of IaaS cloud. 292-297 - Sarawut Ramjan:

Flexible security rule-based system on cloud service for e-travel agent. 298-302 - Juan Yang, Han Du, Bin Wu, Xinxin Ge:

The research and design of parallel recommendation algorithm based on mapreduce. 303-307 - Lingyun Wei, Shuo Qi:

Three-staged cloud computing service supply chain coordination by combined contract. 308-312 - Xu Wu, Xiaqing Xie, Chunwen Li:

Research and implementation of a role-based trustworthiness mechanism for IaaS. 313-317 - Yashi Wang, Lijuan Min, Hanhua Lu:

A functional framework for software and system of systems method. 318-322 - Jianjun Xie, Junling Huang, Fang Qian, Jianjun Yu:

Towards universal cloud service for distributed large scale scientific data. 323-327 - Yongzheng Ma, Xiaomeng Lu, Zhengyi Shao, Hongwei Yang, Kai Nan:

Towards a collaboration cloud for astronomical observations. 328-332 - Cao LeThanhMan, Makoto Kayashima:

Desktop workload characteristics and their utility in optimizing virtual machine placement in cloud. 333-337 - Rui Ye, Qing Wu:

SOA based cloud computing trust model research with a curve fitting method. 338-343 - Wasin Treesinthuros:

E-commerce transaction security model based on cloud computing. 344-347 - Yeqiao Wang, Chunxiao Fan, Zhigang Wen:

A study for task time performance dynamic prediction model in cloud resource scheduling. 348-353 - Dexin Cui, Guoliang Chen, Yinlong Xu, Gaifan Li:

A scalable and efficient multicast system for data center. 354-359 - Yannong Huang, Yiqing Yang, Mike Rossi, Bin Xu:

Towards a unified architecture of cloud service delivery platform. 360-364 - Zhongzhi Shi, Guang Jiang, Bo Zhang, Jinpeng Yue, Xiaofei Zhao:

Cross-media cloud computing. 365-370 - Zhichao Cao, Qing Li, Ze-Yuan Wang, Weihua Li, Jun Li, Ruiyang Du:

A cloud computing based framework of group-enterprise service integration and sharing. 371-375 - Yujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang:

Distributed agent based cooperative differential evolution: A master-slave model. 376-380 - Xin Wang, Hongming Zhu, Qin Liu, Xiaowen Yang, Jiakai Xiao:

Performance evaluation on data reconciliation algorithm in distributed system. 381-385 - Zhou Lei, Jinfeng Xiang, Zhebo Zhou, Feng Duan

, Yu Lei:
A multi-objective scheduling strategy based on MOGA in cloud computing environment. 386-391 - Xiang Li, Xiaohong Jiang, Peng Huang, Kejiang Ye:

DartCSim: An enhanced user-friendly cloud simulation system based on CloudSim with better performance. 392-396 - Bernd Zwattendorfer, Arne Tauber:

Secure cloud authentication using eIDs. 397-401 - Tongrang Fan, Feng Zhao, Feng Gao:

Research on cloud resource economics management model based on Internet Innovation Union. 402-406 - Qinyun Dai, Haijun Yang, Qinfeng Yao, Yaliang Chen:

An improved security service scheme in mobile cloud environment. 407-412 - Zhengqiu Yang, Tong Li, Jiapeng Xiu, Chen Liu:

An optimized load algorithm of parallel data warehouse based on the cloud computing platform. 413-417 - Chen Liu, Shan Yang, Jiapeng Xiu, Zhengqiu Yang:

The interest community mining method of social network based on the weak association rules. 418-421 - Jingyi Gong, Kaifeng Han:

A method to ensure data security in e-business cloud. 422-425 - Yong Zhang, Xiangxue Li, Haifeng Qian:

An anonymous remote attestation for trusted cloud computing. 426-429 - Lingyun Wei, Shenghui Zhai:

Coordination mechanism with quantity discount contract for cloud service supply chain. 430-434 - Han Li, Qiuxin Wu:

A distributed intrusion detection model based on cloud theory. 435-439 - Xiaoni Wang, Xuedong Gao:

The research of a resource-aware cloud computing architecture based on web security. 440-443 - Wei Chen, Qiaoyan Wen:

An architecture for dynamic management and monitoring of virtual machines. 444-448 - Chunge Zhu, Xinran Liu, Yixian Yang, Hong Zhang, Qianhua Xu:

A trust mechanism in Internet-Based Virtual Computing Environment. 449-453 - Xiuwen Wang, Shoufeng Cao, Lihong Wang:

Research and implementation on an admission control policy for temporally correlated workloads in virtual application environments. 454-458 - Yexia Cheng, Yuejin Du, Junfeng Xu, Chunyang Yuan, Zhi Xue:

Research on security evaluation of cloud computing based on attack graph. 459-465 - Hui Zhang, Ke Xu:

A dynamic aware-feedback system for service replica management. 466-470 - Guangjun Wu, Yanqin Zhang, Dongan Wang, Shupeng Wang, Ming Chen:

The data reliability techniques in BC-KVDB. 471-475 - Feng Xie, Yong Peng, Wei Zhao, Dongqing Chen, Xiaoran Wang, Xingmei Huo:

A risk management framework for cloud computing. 476-480 - Hong Zhang, Xinran Liu, Chunge Zhu, Qian Liu:

An integrated runtime monitoring method for Internet-Based Virtual Computing Environment. 481-487 - Zhengqiu Yang, Meiling Liu, Jiapeng Xiu, Chen Liu:

Study on cloud resource allocation strategy based on particle swarm ant colony optimization algorithm. 488-491 - Xin Pan, Suli Zhang:

A remote sensing image cloud processing system based on Hadoop. 492-494 - Yidong Cui, Fuquan Sun:

A model for collecting virtual machine usage in cloud computing environment. 495-498 - Feng Ye, Zhijian Wang, Zhenyu Yue, Xinkun Xu, Yuansheng Lou:

CloudUDDI: An extended UDDI model for cloud services. 499-503 - Jie Liu, Fang Liu, Dazhong He:

The identification for P2P Thunder traffic based on deep flow identification. 504-507 - Junfeng Xu, Wei Zhang, Bo Sun:

RCSA-P: A remote control system architecture with high scalability. 508-513 - Weitao Wang, Yuehui Jin, Tan Yang, Yidong Cui:

A video quality assessment method using subjective and objective mapping stategy. 514-518 - Xixi Gong, Yuehui Jin, Yidong Cui, Tan Yang:

Web visualization of distributed network measurement system based on HTML5. 519-523 - Wei Chen, Qiaoyan Wen, Bohou Li:

A propagation model of passive social network worm. 524-528 - Yanan Zhao, Xiangyang Gong, Wendong Wang, Xirong Que:

A rate adaptive algorithm for HTTP streaming. 529-532 - Jianying Liu, Wendong Wang, Xiangyang Gong, Xirong Que, Hao Yang:

A hybrid model based on Kalman Filter and neutral network for traffic prediction. 533-536 - Lulin Jiao, Yan Peng:

Research and implementation of social hot topic detection system based on mirco-blog. 537-542 - Zhi Ren, Jian Zhang, Jibi Li, Hongjiang Lei

:
An effective hybrid routing algorithm for opportunistic networks. 543-547 - Wei Li, Wei Jiao, Guangye Li:

A location privacy preserving algorithm for mobile LBS. 548-552 - Liang Guo, Xirong Que, Yidong Cui, Wendong Wang, Shiduan Cheng:

A hybrid social search model based on the user's online social networks. 553-558 - Qiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen:

A content delivery strategy based on resource popularity for P4P architecture. 559-562 - Jiaxi Di, Ke Yu, Xiaofei Wu, Sixi Su:

A novel complex network model for Internet traffic flows. 563-567 - Hengkui Wu, Meixia Duan, Yaping Hu, Siyun Bao:

Sybil-proof ID-to-locator mapping in one hop. 568-571 - Shen Yan, Ze Zong, Yan Ma, Qin Zhao:

The optional routing optimization strategy of Distributed Mobility Management. 572-577 - Jianfeng Guan

, Wei Quan, Changqiao Xu, Hongke Zhang:
The location selection for CCN router based on the network centrality. 568-582 - Jinxiu Yu, Yueming Lu, Fangwei Zhang, Songlin Sun:

A metric for measuring web search results satisfaction incorporating user behavior. 583-586 - Zhanchun Gao, Yuying Liang, Yanjun Jiang:

Implement of item-based recommendation on GPU. 587-590 - Zhengqiu Yang, Xiaozhe Huang, Jiapeng Xiu, Chen Liu:

SocialRank: Social network influence ranking method. 591-595 - Chongchong Yu, Lili Shang, Li Tan, Xuyan Tu, Yang Yang:

A study on application of semi-supervised collaborative classification algorithm. 596-602 - George Kousiouris, Dimosthenis Kyriazis

, Andreas Menychtas
, Theodora A. Varvarigou:
Legacy applications on the cloud: Challenges and enablers focusing on application performance analysis and providers characteristics. 603-608 - Dimosthenis Kyriazis

:
Modeling the interactions between cloud service providers. 609-613 - Yang Liu, Miao Zhang:

Financial websites oriented heuristic anti-phishing research. 614-618 - Hongyuan Ma, Xuesong Zhang, Bin Wang:

Research on the second-level query results cache in Web search engines. 619-623 - Ming Chen, Yang Wang, Xiaoxiang Zou, Shupeng Wang, Guangjun Wu:

A duplicate image deduplication approach via Haar wavelet technology. 624-628 - Xuqi Wang, Chuanlei Zhang, Shanwen Zhang:

Modified Elman neural network and its application to network traffic prediction. 629-633 - Xiaoxiang Zou, Gaochao Li, Ming Chen, Shupeng Wang, Yongjian Wang, Guangjun Wu:

An improved method to image copy detection. 634-637 - Xiaoming Ni, Yucong Tian:

The design of industrial phased array ultrasonic flaw detection system based on Internet of Things technology. 638-641 - Yifei Zhang, Hongli Zhang:

Synthetic evaluation on the performance of network coordinate systems. 642-645 - Dawei Wang, Longtao He, Yibo Xue, Yingfei Dong:

Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time. 646-650 - Luoshi Zhang, Dawei Wang, Yibo Xue:

BCBPI: A noval behavior chain based protocol identification method. 651-656 - Haihui Gao, Yong Peng, Qingtang Zheng, Xi Chen, Zhonghua Dai, Yang Gao, Feng Xie, Wei Zhao, Qi Xiong:

The research and implementation of intelligent mobile video supervising system based on DSP. 657-660 - Chenglong Li, Yibo Xue, Longtao He, Lidong Wang:

TMT: A new Tunable Mechanism of Tor based on the path length. 661-665 - Xiaoming Tian, Qiuxin Wu:

An approach to improve process algebra based protocol composition model. 666-669 - Yuanwei Hou, Guo Tao, Zhiwei Shi, Liu Juan:

Research on Android browser fuzzing based on bitmap structure. 670-673 - Yongjian Wang, Junfeng Xu:

Cooperative Work Systems for the security of digital computing infrastructure Cooperative detection systems for Botnet detection. 674-680 - Yang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu:

Stability analysis of software networks. 681-684 - Xiaoming Liu, Miao Zhang, Guoai Xu:

Construction of distributed LDoS attack based on one-dimensional random walk algorithm. 685-689 - Weijie Li, Haiqiang Chen, Wei Cao, Xin Zhou:

An Idea of setting weighting functions for feature selection. 690-695 - Tan Yang, Yidong Cui, Yuehui Jin, Maoqiang Song:

A new algorithm for multi-mode recommendations in social tagging systems. 696-700 - Danyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui:

A security assessment method for Android applications based on permission model. 701-705 - Haokun Tang, Yanbing Liu, Jun Huang:

A worm counter-measurement strategy in P2P networks: Modeling and analysis. 706-710 - Chenhui Du, Mei Song, Li Wang, Yinghe Wang, Xiaosu Zhan:

Exploiting peer's location information for improving routing and throughput performance in DHT systems. 711-715 - Haijie Ding, Yuehui Jin, Yidong Cui, Tan Yang:

Distributed storage of network measurement data on HBase. 716-720 - Jian Zhou, Ning Huang, Xuewang Wang, Fei Zhao:

An improved model for cascading failures in complex networks. 721-725 - Xiaobo Lin, Qin Zhao:

A design and implementation of IPv6 transition system for DNS64 in stub-resolver mode. 726-729 - Futao Zhao, Shijie Jia, Jianfeng Guan

, Changqiao Xu, Hongke Zhang:
A Service Identifier parsing mechanism for Universal Network based on BHO. 730-734 - Xiaoyan Hu

, Jian Gong:
Distributed in-network cooperative caching. 735-740 - Jiang Li, Qin Zhao, Xiaohong Deng, Yan Ma:

A home gateway based multicast transit solution and implementation on DS-Lite. 741-745 - Jianfeng Guan

, Changqiao Xu, Wei Quan, Hongke Zhang:
The hitting times analysis of cognitive user in Cognitive Internet under random direction mobility model. 746-750 - J. H. Choi, Y. K. Woo, J. T. Park, Y. Shen:

Design and implementation of SNS-based wireless LAN access sharing system. 751-754 - Hu Yao, Shigeki Goto:

Performance evaluation of file transmission in content-centric network. 755-756 - Jinghua Yan, Xiao-chun Yun, Zhi-Gang Wu, Hao Luo, Shuzhuang Zhang:

A novel weighted combination technique for traffic classification. 757-761 - Shijie Jia, Changqiao Xu, Jianfeng Guan

, Hongke Zhang:
A MP2P-based VoD solution for supporting VCR-like operations in MANETs. 762-766 - Wei Xiao, Ruixing Wang, Xiaohong Huang:

Design and implementation of Ethernet topology discovery algorithm. 767-770 - Doris Hooi-Ten Wong

, Sureswaran Ramadass:
Generating adaptive network data visualization to different levels of users. 771-775 - Hao Wang, Yujie Su, Xiaohong Huang, Pei Zhang:

Algorithm for distributed traffic traces AGGREGATION based on SMC. 776-779 - Yannan Hu, Wendong Wang, Xiangyang Gong, Xirong Que, Shiduan Cheng:

BalanceFlow: Controller load balancing for OpenFlow networks. 780-785 - Ke Yu, Xinyu Zhang, Jiaxi Di, Xiaofei Wu:

Internet traffic identification based on community detection by label propagation. 786-791 - Wei Quan, Jianfeng Guan

, Yuanlong Cao, Changqiao Xu, Hongke Zhang:
M-Label: A naming scheme for services in future networks. 792-796 - Yang Chen, Xiangyang Gong, Wendong Wang, Xirong Que:

VNMC for network virtualization in OpenFlow network. 797-801 - Peipei Hu, Min Xu, Xiaohong Huang:

A security model of flow label based QoS mechanism in Evolved Packet System. 802-806 - Danfeng Yan, Rui Feng, Junlin Huang, Fangchun Yang:

Host scurity event track for complex network environments based on the analysis of log. 807-811 - Seung-Man Chun, Yeung-Kyung Woo, Yang Shen, Jong-Tae Park:

P2P-based group service management for live video streaming communication. 812-816 - Hong Ma, Yongjuan Wu, Yan Ma, Zhenhua Wang:

Optimization scheme of CGN logs. 817-820 - Guolong Liang, Ke Zhang, Jin Fu, Wei Ma:

Estimation of 2-D DOA joint frequency of signal via a single vector hydrophone. 821-825 - Meilian Lu, Wei Wang:

An autonomic wireless video transmission system based on GANA. 826-830 - Xin Liu, Lun Xie, Zhiliang Wang, Dongmei Fu:

Cognitive-affective regulation process for micro-expressions in active field state space. 831-835 - Shudan Lin, Shijian Luo, Xiaoxia Ding:

Security sense of Internet product interface design. 836-840 - Biling Zhang, Kai Chen:

Selective spectrum leasing in Internet of Things via Nash Bargaining Solutions. 841-845 - Yongjian Wang, Lizhong Song, Jiaxing Ye

, Lijing Wang:
Research on the channel characteristics of low-voltage power line. 846-849 - Xiaoming Ni, Yucong Tian:

The design of belt convey safety protective systembased on Zigbee technology. 850-853 - Erfu Wang, Dongqing Wang, Qun Ding:

Blind extraction algorithm of the harmonic signal based on the steady-state point capture in lorenz energy accumulation area. 854-858 - Xiaoyu Wang, Yuan'an Liu, Gang Xie, Pan-liang Deng:

A relaxation algorithm for decentralized resource allocation in femtocell networks. 859-863 - Peipei Wang, Ben Wang, Weidong Wang, Yinghai Zhang, Chaowei Wang:

Based multi-operator Shared Network Opportunistic Spectrum Sharing. 864-868 - JiuLing Feng, Xiuquan Qiao, Yong Li:

The research of synchronization and consistency of data in mobile environment. 869-874 - Yong Li, Wenzhu Li, Li Yuan, Linxing Yang:

Research on RCS characteristic of three kinds of metal plate. 875-878 - Tong Liang, Dexiang Meng, Jiwei He, Shoufeng Wang:

Research on the key technology of refarming. 879-883 - Jia Liu, Chaowei Wang, Juyi Qiao, Weidong Wang, Yinghai Zhang:

A machine-to-machine application: Body posture recognition on smartphones for intelligent remote control. 884-888 - Xiaoxiao Zhang, Weidong Wang, Yinghai Zhang, Gaofeng Cui, Sixing Lu:

An adaptive frequency allocation scheme for OFDMA femtocell networks. 889-892 - Anming Gao, Hongli Peng, Jinlong Zou, Zhengxiao Cao:

Performance of WBAN UWB system based on the measured on-body channel model. 893-897 - Feiyan Yan, Yang Yu, Weidong Wang, Yinghai Zhang:

Distributed channel and power allocation based on hybrid spectrum access in cognitive radio network. 898-903 - Jiwei He, Tong Liang, Dexiang Meng, Chao Sun:

Coexistence studies for indoor distribution systems of TD-LTE with WLAN system. 904-907 - Xiaoyan Xu, Dexiang Meng, Yanming Chen, Jiwei He:

Compatability study on broadcasting system interfering with LTE system. 908-912 - Zhen Jiang

, Shiyong Zhang:
A semi-supervised ensemble learning algorithm. 913-918 - Wansen Wang, Wenlan Ding:

Research of improved SVM model based on GA in E-learning emotion classification. 919-923 - Wansen Wang, Huifang Niu:

Face detection based on improved AdaBoost algorithm in E-Learning. 924-927 - Xiao-chuan Sun, Hongyan Cui, Ren Ping Liu, Jianya Chen, Yunjie Liu:

Multistep ahead prediction for real-time VBR video traffic using deterministic echo state network. 928-931 - Xiaoyu Liu, Zhongyuan Yu, Yumin Liu, Houjian Kang, Jinhong Mu:

A new recognition algorithm with high result reliability. 932-935 - Yingcang Ma, Lu Wang, Huan Liu, Xiaogai Wang:

Theory of α-truth degrees in 3-valued prerough logic. 936-940 - Yan Huang, Xin Gao, Haorui Zhou, Kai Wang, Yanfeng Qu:

Design and implementation of distributed collaborative virtual assembly system with three-dimensional force feedback. 941-945 - Shuzhe Wu, Xiaoru Wang, Qing Ye, Jiali Dong:

Region clustering with high level semantics for image segmentation. 946-950 - Weiwei Duan, Yingmin Jia:

A novel H-infinity filtering for road constrained target tracking. 951-955 - Xu Li, Xiaoru Wang, Jia Long, Lingpu Gong:

A pedestrian detection method based on Dirichlet distribution and histogram of components. 956-960 - Wenwen Han, Wendong Wang, Shuigui Huang, Ye Tian, Jian Ma:

Media capacity estimation: Discovering news feed accounts for information sourcing. 961-965 - Xinhan Huang, Shangqin Mao, Min Wang:

A novel visual servoing microassembly system. 966-970 - Xiaoxu He, Chenxi Shao:

An approach based on TSA-tree for accurate time series classification. 971-975 - Bosheng Wang, Jiaqi Xu:

Accurate and fast hand-forearm segmentation algorithm based on silhouette. 976-979 - Qijin Chen, Jituo Li, Guodong Lu, Xinyu Bi, Bei Wang:

Clothing retrieval based on image bundled features. 980-984 - Xin Li, Min Zhang, Yiqun Liu, Shaoping Ma, Yijiang Jin, Liyun Ru:

Search engine click spam detection. 985-989 - Jiapeng Xiu, Xiaobo Xu, Zhengqiu Yang, Chen Liu:

Ontology-based production model of satellite remote sensing data parameter products. 990-993 - Lun Xie, Shanchao Ni, Zhiliang Wang:

Research and designed of a structured scalable robot control system based on real-time bus. 994-998 - Lijuan Zhang, Jin Zhang, Xiaohu Tang, Yong Wang:

An efficient tag anti-collision protocol for RFID systems. 999-1004 - Jie Li, Zhi Li, Wantian Song:

A new three-dimensional localization method for WSN. 1005-1008 - Ming Zhou, Yan Ma:

A web service discovery computational method for IOT system. 1009-1012 - Jian Kuang, Xianqing Meng, Jiali Bian:

An improved AODV protocol based on extension lifetime of the Ad Hoc networks. 1013-1016 - Junsong Zhang, Jian Ma, Wendong Wang, Yazhi Liu:

A novel privacy protection scheme for participatory sensing with incentives. 1017-1021 - Zhichao Qin, Zheng Zhou, Xiaochuan Zhao:

A grid optimization scheme based on progressive compensation for wireless sensor networks. 1022-1027 - Haiguo He, Jiao Mo, Qiaoyan Wen, Zishan Meng:

Node information in WSN from the business perspective. 1028-1031 - Haining Yu, Binxing Fang, Xiang-Zhan Yu, Juan Chen:

Semantic surface representation of physical entity in the WEB of things. 1032-1036 - Yanling Jin, Yongsheng Ding, Kuangrong Hao

:
A bio-inspired distributed object-tracking approach in wireless sensor networks. 1037-1041 - Siwei Peng:

An Id-based Multiple Authentication scheme against attacks in wireless sensor networks. 1042-1045 - Wang Chen:

An IBE-based security scheme on Internet of Things. 1046-1049 - Ying Zhang, Hui Li, Tengfei Shi, Guanyang Deng:

Survey on recent development about lightweight authentication protocol based on LPN problem. 1050-1056 - Han Li, Qiuxin Wu:

A clustering routing algorithm in wireless sensor netwroks. 1057-1061 - Quangang Wen, Xinzheng Dong, Ronggao Zhang:

Application of dynamic variable cipher security certificate in Internet of Things. 1062-1066 - Xiangnan Peng, Xiaoping Zou, Zhaoxian Yu, Yuan Yang:

Design of household appliance control system based on Zigbee. 1067-1071 - Guangtao Zhuang, Xiaoping Zou, Changfei Guo, Yan Liu:

Wireless sphygmomanometer based on Zigbee. 1072-1075 - Yan Liu, Xiaoping Zou, Miaojing Shi, Guangtao Zhuang:

Intelligent parking guidance system based on wireless sensor networks. 1076-1078 - Xiaoye Zhao:

The security problem in Wireless Sensor Networks. 1079-1082 - Shiwei Li, Wenjing Wang, Juwei Zhang:

Efficient deployment surface area for underwater wireless sensor networks. 1083-1086 - Xiong Tang, Chunxiu Xu, Muqing Wu, Jingrong Wen:

A design of smart-home ststem based on 6LoWPAN wireless sensor networks. 1087-1091 - Zhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li:

Secure network coding based on homomorpuic signature against pollution attacks. 1092-1096 - Xianzhong Tian, Qianwei Zhou

, Zhen Cheng:
An algorithm of MAC-based network coding for Butterfly wireless networks. 1097-1101 - Chao Zhou, Chuanheng Sun, Xiaowei Du, Wen-Yong Li, Xinting Yang

:
The design of agricultural product's production antecedents acquisition terminal based on Hi3511 and 3G technology. 1102-1105 - Jing Peng, Kaikai Chi, Yi-hua Zhu, Jing Wang:

Optimal packet fragmentation scheme for reliable and energy-efficient packet delivery in 6LoWPAN. 1106-1111 - Jian Pan, Xiuting Dai, Xiaoqi Xu, Yanjun Li:

A Self-learning algorithm for predicting bus arrival time based on historical data model. 1112-1116 - Hongbo Guo, Victor C. M. Leung

:
Multiple tags identification for short id rfid networks. 1117-1122 - Yang Wang, Peng Zeng

, Xu Wang, Yangyu Zhang, Fangjun Kuang, Baohui Zhu:
Information-centric industrial Internet of Things: Service model. 1123-1128 - Chunjiang Zhao, Ronghua Gao, Huarui Wu:

A method of cloud storage algorthom for crop images information. 1129-1132 - Haihui Zhang, Jiaming Zhang, Huarui Wu:

An adaptive localization algorithm based on RSSI in wireless sensor networks. 1133-1136 - Haihui Zhang, Yan Liang, Qingzhen Zhou, Hongpan Fan, Jianguo Dai:

A self-adaptive greenhouse CO2 concentration monitoring system based on ZigBee. 1137-1140 - Yisheng Miao, Chunjiang Zhao, Huarui Wu, Huaji Zhu:

Research on power consumption weighted state machine of farmland WSN node. 1141-1144 - Fan Yang, Huaiyi Sun, Dongqiang Wang, Lili Huang, Longcan Hu, Yue Gao, Haiyan Li:

A pupil location method based on improved OTSU algorithm. 1145-1148 - Fusuijing Cheng, Chenghui Yan, Yongfeng Huang, Linna Zhou:

Algorithm of identifying opinion leaders in BBS. 1149-1152 - Yunjian Tang, Peng Han, Zaihuan Wang, Longcan Hu, Yue Gao, Haiyan Li:

Based on intelligent voice recognition of forest illegal felling of detecting methods. 1153-1156 - Dongqiang Wang, Aijun Fan, Lili Xiong, Longcan Hu, Yue Gao, Haiyan Li:

Design and implementation of mirror traffic network simulation framework based on Delta3D. 1157-1160 - Mingyue Feng, Xiao Wang, Yongjin Zhang, Jianshi Li:

Multi-objective particle swarm optimization for resource allocation in cloud computing. 1161-1165 - Mu Guo, Deyi Li, Guisheng Chen, Youchun Xu, Wen He, Tianlei Zhang, Lifeng An, Minghui Lv:

Multi-sensor information fusion for unmanned cars using radar map. 1166-1170 - Liwei Huang, Haisu Zhang, Guisheng Chen, Yuchao Liu, Deyi Li:

From turing machine intelligence to collective intelligence. 1171-1177 - Hua Li, Mingyue Feng, Xiao Wang:

Inverse perspective mapping based Urban road markings detection. 1178-1182 - Mingxi Li, Peng Jia, Youchun Xu, Yi Yuan:

Traveling path tracking algorithm in virtual coordinate system for intelligent vehicle. 1183-1187 - Xiao Wang, Hua Li, Yuan Zhu:

Design on automatic control system for smart car based on μC/OS-II. 1188-1191 - Yuan Zhu, Mingyue Feng, Xiao Wang, Xinxi Xu:

Research on intelligent vehicle autonomous overtaking based on single neuron PID control. 1192-1195 - Youchun Xu, Jian Cao, Peng Jia, Zufeng Zhang:

The research of obstacle detection based on AK-means clustering algprithm in crosscountry. 1196-1199 - Tianlei Zhang, Deyi Li, Guisheng Chen, Wen He, Mu Guo, Minghui Lv:

Spirit: A lightweight programming framework for intelligent system. 1200-1204 - Jianhui Zhao, Peng Jia, Shaobo Fu:

Modeling of uncertain environment based on multi-scale grid method. 1205-1209 - Mu Guo, Youchun Xu, Yongjin Zhang, Wen He, Guisheng Chen, Tianlei Zhang, Lifeng An, Minghui Lv:

A decision-making method for unmanned cars based on drivable area cutting. 1210-1215 - Yanjun Li, Gan Chen, Yueyun Shen, Yihua Zhu, Zhen Cheng:

Accelerometer-based fall detection sensor system for the elderly. 1216-1220 - Yujia Huang, Zhongliang Yang, Shuhua Xiong:

The research on the control algorithm of IOT based bicycle parking system. 1221-1225 - Yixin Kang, Yongli Zhu, Jing Gao:

Chain-type wireless sensor network for monitoring power lines: Topology model and routing algorithm. 1226-1229 - Yang Deng, Zhonghong Ou, Miika Komu, Vilen Looga

, Antti Ylä-Jääski:
Anatomy of the connecting architecture of Internet of Things. 1230-1234 - Vilen Looga

, Zhonghong Ou, Yang Deng, Antti Ylä-Jääski:
MAMMOTH: A massive-scale emulation platform for Internet of Things. 1235-1239 - Shuai Shao, Bin Tian, Xin Wang, Yang Li:

Provably secure identity-based authenticated key agreement protocol and its application. 1240-1244 - Wenjun Luo, Jianming Tan:

Public key encryption with keyword search based on factoring. 1245-1247 - Chenxu Wang, Mingyan Yu, Jinxiang Wang, Peihe Jiang, Xiaochen Tang:

A more practical CPA attack against present hardware implementation. 1248-1253 - Bin Gu, Yanfeng Jin, Chang Zhang:

Study on the standardized method of Chinese addresses based on expert system. 1254-1258 - Bin Ye, Hongyu Chai, Weiping He, Xiaoting Wang, Guangwei Song:

Semantic similarity calculation method in ontology mapping. 1259-1262 - Jie Yang, Hong Gao, Wei Liu:

Evaluation of land grading based on extenics theory. 1263-1266 - Zhiwei Yan, Anlei Hu, Wei Wang:

A cache-splitting scheme for DNS recursive server. 1267-1271 - Pingyi Wang, Jingling Zhao, Qing Liao:

A cross-platform context-aware application developing framework for mobile terminals. 1272-1276 - Bai Wang, Meng Shi:

Mining and analyzing the characteristic of projects collaborative relationship in open source software. 1277-1280 - Nan Xiao, Yingmin Jia:

New delay-dependent stability criteria for linear time-delay systems with two additive time-varying delay components. 1281-1286 - Xue Jun, Zengliang Liu:

A task-oriented computing service sharing model and its application to talent training and management. 1287-1290 - Ye Wang, Wenchao Song, Zengliang Liu:

An oriented-application adaptive mobile cloud computing middleware. 1291-1295 - Yanbiao Chen, Wenji Sun, Yi Zhang:

Evaluation to coordinating degree of systematic battle forces based on DEA. 1296-1301 - Yeli Hao, Shize Guo, Hong Zhao, Zhe Chen:

Study on the modeling and analyzing of the role-based threats in the cyberspace. 1302-1306 - Jingdong Gao, Jinshi Xiao, Jichang Dong, Xiongwei Ren:

Reaserch of weapons and equipment capability evaluation based on comprehensive fuzzy model. 1307-1310 - Wenxin Yang, Xiaomin Zhou, Baodong Ju, Peng Xu:

Robust control of electric vehicle's driving system. 1311-1315 - Jingdong Gao, Yue Liang, Jichang Dong:

The credibility research of capability index system for weapon equipment SOS. 1316-1319 - Xiaodan Zhang:

Application of fuzzy adaptive control for optimal load distribution of plant. 1320-1323 - Xianmei Wang, Yuyu Liang, Siyi Zheng, Zhiliang Wang:

Juvenile detection by LBP and SVM. 1324-1327 - Jian Kuang, Longkui Mei, Jiali Bian:

An innovative implement in organizing complicated and massive intrusion detection rules of IDS. 1328-1332 - Dong Wei, Yiqing Liu, Ning Zhang, Minzhe Zhao:

Improved algorithm of RBF neural networks and its application. 1333-1337 - Jian Xue, He Zhu:

Research based on improved fuzzy immune PID algorithm optimized copper electrolysis rectifier system. 1338-1340 - Yongdan Liu:

Encryption algorithm based on higher degree residues oriented to semantic security. 1341-1345 - Zichun Zhang, Yongdan Liu, Xiaoyun Guo, Jianhua Zhu:

Online query algorithm of dynamic time sequences based on fast fourier transform. 1346-1352 - Xingfu Xiao, Hanbin Bai, Zhanbin Zhang:

A method of multiple-factors intelligence analysis application for C4KISR system. 1353-1356 - Jianhong Xu, Weizhi Gong, Ye Wang:

A cloud service discovery approach based on FCA. 1357-1361 - Weizhi Gong, Huiyao An, Jianhong Xu, Hao Wang:

Research of personalized recommender system in M-commerce: A cognitive-style approach based on FD/I. 1362-1366 - Li Yang, Xiedong Cao, Jie Li, Aomin Wang, Weibin Tan, Zhijun Yu:

Research on FNN-based security defence architecture model of scada network. 1367-1371 - Chao Li, Zhen Xu, Zichun Zhang:

A trusted information sharing skeleton for privacy preservation. 1372-1376 - Zengliang Liu, Xuehai Yuan, Yuhong Zhang, Ye Wang:

Study of soft sets category and it's properties. 1377-1380 - Xiangyang Huang, Cuihuan Du, Yan Peng, Xuren Wang, Jie Liu:

Goal-oriented action planning in partially observable stochastic domains. 1381-1385 - Pu Jiang:

Comprehensive information emotional theory - An assumption of cognitive-emotional interaction mechanism. 1386-1392 - Lingling Mu, Yiya Pang, Hongying Zan:

Studies on automatic recognition of preposition BA's usages based on statistics. 1393-1397 - Ying Qin:

Applying frequency and location information to keyword extraction in single document. 1398-1402 - Li Wang

, Kui Jiang, Xingyun Geng, Yuanpeng Zhang
, Dong Zhou, Jiancheng Dong
:
Chniese document classification using field association knowledge base. 1403-1408 - Lei Li, Wei Heng, Ping'an Liu:

Multi-document summarization systems comparison. 1409-1413 - Shuming Yuan, Xiaojie Wang:

Research on automatic semantic classification of human-interaction instructions. 1414-1419 - Xiaoli Nan, Xiao Sun

, Tieshan Hou:
Estimation of earnings manipulation in U.S. listed companies based on weighted discriminative model. 1420-1424 - Baosheng Yin, Junjun Zuo, Na Ye:

Long sentence partitioning using top-down analysis for machine translation. 1425-1429 - Dongfeng Cai, Liwei Chang, Duo Ji:

Latent semantic analysis based on space integration. 1430-1434 - Zhiying Liu, Yaohong Jin, Wenfei Chang:

Research on the semantic knowledge base in Chinese-English machine translation. 1435-1439 - Jingxiang Cao, Degen Huang:

Annotation of complex noun phrases from multilingual parallel corpus. 1440-1444 - Yegang Li, Heyan Huang:

Automatic identifying of maximal length noun phrase. 1445-1448 - Dongmei Ma, Zhiguo Tang:

Vibration suppression for two manipulators handling a flexible payload based on observer. 1449-1453 - Guiping Zhang, Yan Wang, Duo Ji:

An improved model of MST for Chinese dependency parsing. 1454-1458 - Hui Li, Ying Liu:

Language models and classification analysis for dream of the red chamber. 1459-1464 - Ping'an Liu, Lei Li, Wei Heng, Boyuan Wang:

HLDA based text clustering. 1465-1469 - Meijuan Liu, Shicai Yang, Qiaofen Chen:

Sentiment classification on Chinese reviews based on ambiguous sentiment confined library. 1470-1473 - Yong Zhang, Jiaqin Mo, Tingting He:

User influence analysis on micro blog. 1474-1478 - Yanli Liu, Yaohong Jin:

Analysis of HE(***) in patent Chinese-English machine translation. 1479-1484 - He Zhou, Yun Zhu, Yaohong Jin:

Identification of V+N compound nouns in Chinese-English machine translation based on rules in patent texts. 1485-1490 - Song Liu, Fuji Ren:

Relation extraction from wikipedia articles by entities clustering. 1491-1495 - Runxiang Zhang, Yaohong Jin:

Identification of comparative sentences with adjective predicates in patent Chinese-English machine translation. 1496-1500 - Rong Hu, Tingting He, Fang Li, Po Hu:

Tag recommendation based on tag-topic model. 1501-1505 - Qianqian Song, Yun Zhu, Lixia Wang, Yaohong Jin:

A rule-based method for commas' disambiguation in Chinese patent text. 1506-1510 - Xuwen Wang, Qiang Zhang, Xiaojie Wang, Yueping Sun:

LDA based PSEUDO relevance feedback for cross language information retrieval. 1511-1516 - Yun Zhu, Yaohong Jin:

A method of recognizing the root of an improved dependency tree for the Chinese patent literature. 1517-1523 - Xiaoqin Wang, Xiaolong Wang:

The comparison of particle filter and extended Kalman filter in predicting building envelope heat transfer coefficient. 1524-1528 - Yushu Cao, Jun Wang, Lei Li:

Word-level information extraction from science and technology announcements corpus based on CRF. 1529-1533 - Yueping Sun, Xiaojie Wang, Song Liu, Caixia Yuan, Xuwen Wang:

A retrieval model for question in community question answering system. 1534-1539

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














