


default search action
CIS 2013: Emei Mountain, Sichan Province, China
- Ninth International Conference on Computational Intelligence and Security, CIS 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2548-3
Intelligent Computation
- Qun Zhang, Ying Min Wang:
The Finite Element Analysis on the Multi-bubble Model in the Ship Wake. 1-5 - Zhendong Liu, Daming Zhu, Wei Cui, Nan Liu:
An Approximation Scheme for RNA Folding Structure Prediction Including Pseudoknots. 6-10 - Deng-Xu He, Gui-Qing Liu, Hua-Zheng Zhu:
Glowworm Swarm Optimization Algorithm for Solving Multi-objective Optimization Problem. 11-15 - Ruimin Jia, Dengxu He:
Artificial Bee Colony Algorithm with Two-Stage Eagle Strategy. 16-20 - Xiaomin Hu, Jun Zhang
:
Optimizing Vaccine Distribution for Different Age Groups of Population Using DE Algorithm. 21-25 - Hong-Chao Yan, Hai-Lin Liu, Qiang Wang:
Dynamic Resource Allocation of TD-LTE System Based on Improved Quantum Evolutionary Algorithm. 26-30 - Jun Wu, Yuelin Gao, Lina Yan:
An Improved Differential Evolution Algorithm for Mixed Integer Programming Problems. 31-35 - Shilei Lv, Shunzheng Yu:
A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm. 36-40 - Hecheng Li, Lei Fang:
An Efficient Genetic Algorithm for Interval Linear Bilevel Programming Problems. 41-44 - Xiaoli Wang
, Yuping Wang, Kun Meng:
An Energy-Aware Optimization Model Based on Data Placement and Task Scheduling. 45-49 - Hong-Li Yin:
Genetic Algorithm Nested with Simulated Annealing for Big Job Shop Scheduling Problems. 50-54 - Hong Li, Li Zhang:
A Differential Evolution with Two Mutation Strategies for Linear Bilevel Programming Problems. 55-60 - Zhurong Wang, Changqing Yu, Xinhong Hei, Bin Zhang:
A Parallel Genetic Algorithm for Solving the Probabilistic Minimum Spanning Tree Problem. 61-65 - Dazhi Jiang, Chenfeng Peng, Zhun Fan
:
Evolutionary Algorithm Based on Automatically Designing of Genetic Operators. 66-70 - Yuqiang Chen, Jianlan Guo, Xuanzi Hu:
Research on Related Vehicle Routing Problem for Multiple Depots Basing on Dynamic Constraint. 71-75 - Yuqiang Chen, Xuanzi Hu, Guangzai Ye:
Research on Related Vehicle Routing Problem for Single Distribution Centre Based on Dynamic Constraint. 76-79 - Weijia Wang, Jie Hu:
A New Evolutionary Algorithm for Portfolio Optimization and Its Application. 80-84 - Wentian Mai, Hai-Lin Liu, Lei Chen, JiongCheng Li, Henghui Xiao:
Multi-objective Evolutionary Algorithm for 4G Base Station Planning. 85-89 - Huilin Yi, Jianhui Yang:
Multi-objective Portfolio Optimization Based on Fuzzy Genetic Algorithm. 90-94 - Lei Fan, Xiyang Liu:
An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems. 95-99
Intelligent Systems and Complex Systems
- Mengzhe Chen, Qingqing Zhang, Zhichao Wang, Jielin Pan, Yonghong Yan:
Web-Based Language Model Domain Adaptation for Real World Voice Retrieval. 100-104 - Liping Chen, Guojun Zhang:
A Petri Net Approach to Reliable Execution for Web Service Composition. 105-109 - Zhenghai Ai:
TOPSIS with Interval Number and Uncertain Weight Based on Tanimoto Measure. 110-114 - Guocheng Xie, Yun Jiang, Na Chen:
A Multi-class Support Vector Data Description Approach for Classification of Medical Image. 115-119 - Meng Wang, Lanfen Lin, Feng Wang:
Improving Short Text Classification through Better Feature Space Selection. 120-124 - Jun Yang, Zhonghua Li, Wei Xiang, Luxin Xiao:
An Improved Apriori Algorithm Based on Features. 125-128 - Bin Gui, Xiaoping Yang:
Research on Sentiment Tendency Analysis of Microtext Based on Sense Group. 129-133 - Shuigui Huang, Wenwen Han, Xirong Que, Wendong Wang:
Polarity Identification of Sentiment Words Based on Emoticons. 134-138 - Ting Jin, Tong Xu, Enhong Chen, Qi Liu, Haiping Ma, Jingsong Lv, Guoping Hu:
Random Walk with Pre-filtering for Social Link Prediction. 139-143 - Xin Zheng:
A Credit Scoring Model Based on Collaborative Filtering. 144-148 - Kai Liu, Xiao Wang:
A Pragmatical Option Pricing Method Combining Black-Scholes Formula, Time Series Analysis and Artificial Neural Network. 149-153 - Xueyuan Gong, Yain-Whar Si
:
Comparison of Subsequence Pattern Matching Methods for Financial Time Series. 154-158 - Yibu Ma:
The Research of Stock Predictive Model Based on the Combination of CART and DBSCAN. 159-164 - Yajuan Yang, Quanju Zhang:
Differential-Algebraic Equations Model for Quadratic Programming. 165-169 - Hui Du, Yuping Wang, LiLi Duan:
A New Method for Grayscale Image Segmentation Based on Affinity Propagation Clustering Algorithm. 170-173 - Hanhai Zhou, Jinjin Wang, Jiadong Wu, Long Zhang, Peng Lei, Xiaoyun Chen:
Application of the Hybrid SVM-KNN Model for Credit Scoring. 174-177 - Ling Xin, Philip L. H. Yu, Kin Lam:
An Application of CUSUM Chart on Financial Trading. 178-181 - Chunhong Yang, Zeng-li Liu:
The Superiority Analysis of Linear Frequency Modulation and Barker Code Composite Radar Signal. 182-184 - Wei Wang, Zeng-li Liu, Chen Lin, Weiwei Sha:
Harmonic Detection of Power System Based on SVD and EMD. 185-189 - Huichuan Duan, Naiwen Liu:
A Greedy Search Algorithm for Resolving the Lowermost C Threshold in SVM Classification. 190-193 - Jun Li, Xuefeng Zhang, Weihong Shen, Qilin Zou:
Network Topology Discovery Based on SNMP. 194-199
Learning Algorithms
- Fuhua Song, Shuiqiang Yi:
Research on Application of Improved Genetic Algorithm in Urban Full Independent Tourist Route Planning. 200-203 - Hongjian Xu, Yanjuan Shuai, Wenzhang He:
The Image Reconstruction Algorithm Based on Wiener Filtering. 204-208 - Yefei Liu, Fulong Wang, Xiang-yan Xi:
Enhanced Algorithm for Exemplar-Based Image Inpainting. 209-213 - Xiangyan Xi, Fulong Wang, Yefei Liu:
Improved Criminisi Algorithm Based on a New Priority Function with the Gray Entropy. 214-218 - Qifan Fu, Yichun Zhang, Liyong Xu, Huixin Li:
A Method of Shot-Boundary Detection Based on HSV Space. 219-223 - Haifeng Sima, Ping Guo
:
Texture Region Merging with Histogram Feature for Color Image Segmentation. 224-228 - Shaoming Zhang, Sheng Yu, Qingyu Ma, Pengchao Shang, Popo Gui, Jianmei Wang, Tiantian Feng:
Pedestrian Counting for a Large Scene Using a GigaPan Panorama and Exemplar-SVMs. 229-235 - Xiuqin Deng, Weijia Cai, Chengyan Fang, Weiqing Kong, Jianqiang Liao:
An Improved Kalman Filtering Algorithm for Moving Contact Detecting and Tracking. 236-240 - Shanwen Zhang, Chuanlei Zhang:
Orthogonal Locally Discriminant Projection for Classification of Plant Leaf Diseases. 241-245 - Renlong Pan, Xin Lin, Chenquan Huang, Lin Wang:
A Novel Vehicle Flow Detection Algorithm Based on Motion Saliency for Traffic Surveillance System. 246-249 - Xiaoguang Liu, Xingbao Gao, Qiufang Xue:
Image Restoration Combining Tikhonov with Different Order Nonconvex Nonsmooth Regularizations. 250-254 - Qifeng Lin, Wei Liu, Hongxin Peng, Yuxing Chen:
Efficient Genetic Algorithm for High-Dimensional Function Optimization. 255-259 - Bo Shuai, Haifeng Li, Mengjun Li, Quan Zhang, Chaojing Tang:
Software Defect Prediction Using Dynamic Support Vector Machine. 260-263 - Juan Li, Yuping Wang:
A Nearest Prototype Selection Algorithm Using Multi-objective Optimization and Partition. 264-268 - Peng Sun, Xin Guo, Yunpeng Zhang, Ziyan Wu
:
Analytical Model of Customer Churn Based on Bayesian Network. 269-271 - Jing Meng, Pei-Yong Zhu, Hou-Biao Li
:
QMRCGstab Algorithm for Families of Shifted Linear Systems. 272-276 - Li Baiping, Liu Dan:
Research and Realization of Coordinate Conversion in Radar Video Display. 277-279 - Xiangzhu Long, Jishen Li, Youjun Hu:
A Multiple Chaotic Video Encryption System Based on DM642. 280-283 - Jun Li, Lixin Ding, Ying Xing:
Differential Evolution Based Parameters Selection for Support Vector Machine. 284-288
Neural Networks and Neural Systems
- Xin-Lei Feng, Xiao-Li Yang, Zhi-He Zhang, Zhongwei Si:
Group Consensus with Switching Topology of Multi-agent Systems. 289-293 - Guoqiang Hang, Danyan Zhang, Xuanchang Zhou, Xiaohu You:
An Enhanced Dynamic Switch Logic with Floating-Gate MOS Transistors. 294-297 - Hong-Li Yin:
GA with Special Encoded Chromosome for FJSP with Machine Disruptions. 298-302 - Liping Jia, Xin-Lei Feng, Guocheng Zou:
Solving Multiobjective Bilevel Transportation-Distribution Planning Problem by Modified NSGA II. 303-307 - Xiuming Zou, Huaijiang Sun:
Clustering Analysis of Micro-array Data Based on the SOM Algorithm. 308-312 - Guoqiang Hang, Xiaohui Hu, Hongli Zhu, Xiaohu You:
Differential Edge-Triggered Flip-Flops Using Neuron-MOS Transistors. 313-317 - Saifeng Zeng, Ligu Zhu, Lei Zhang:
A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case Study. 318-322 - Long Wang, Yuqing Lan, Qingxin Xia:
Using CloudSim to Model and Simulate Cloud Computing Environment. 323-328 - Dongyi He, Jianhua Shuai:
The Application of Fuzzy Comprehensive Evaluation Method for the Evaluation Enterprise Training Effectiveness. 329-333 - Jinquan Li, Yongchuan Wen:
A Decision Making Model Based on Fuzzy Relation Equations Constraints and Its Algorithm. 334-338 - Yanlin Jia
, Yan Yang, Yihua Zhong:
Parametric Study of Fuzzy Number Linear Programming. 339-343 - Wei-Xin Ling, Zhen Xing, Zhuo-ming Chen, Da-Jun Tang:
Designing a Fuzzy Classifier Using Genetic Algorithm and Application in Chinese Vowel Recognition. 344-348 - Liming Song, Ming Li, Yonghong Yan:
Automatic Vocal Segments Detection in Popular Music. 349-352 - Hong-Li Yin:
A New Method for Supply Chain Optimization with Facility Fail Risks. 353-357
Pattern Recognition and Knowledge Discovery
- Zhao Li, Peng Liang
, Yi Zhao, Keqing He:
MFI Based Interoperability Measurement of Business Models in Service-Based Enterprises. 358-362 - Hong Wang, Minggang Du:
Distribution Reduction in Inconsistent Interval Ordered Information Systems Based on Dominance Relations. 363-367 - Tianxiang Feng:
The Cutting Circle Method and Romberg Algorithm. 368-371 - Qiufang Xue, Xingbao Gao, Xiaoguang Liu:
Preconditioned AOR Iterative Method for M-Matrix. 372-376 - Chao Yang, Fugen Zhou, Xiangzhi Bai:
3D Reconstruction through Measure Based Image Selection. 377-381 - Xiujun Zhang, Chen Xu:
L1/2 Regularization Based Low-Rank Image Segmentation Model. 382-386 - Zhaohui Xia, Jianyong Wang, Xiaogang Yang:
A Fusion Algorithm Based on Position Difference Filtering and Least Squares Estimate for Dynamic Scene Matching. 387-390 - Ya Liu, Yao Lu, Qingxuan Shi, Jianhua Ding:
Optical Flow Based Urban Road Vehicle Tracking. 391-395 - Lu Dong, Likun Qiu, Xiujuan Chen:
The Determination of Chinese Pivotal Sentences Based on Semantic Entailment. 396-400 - Peng Jin, Xingyuan Chen:
A Word Sense Probabilistic Topic Model. 401-404 - Xingyuan Chen, Xia Yang, Bingjun Su:
A Fast Algorithm of Computing Word Similarity. 405-408 - Guoyu Tang, Yunqing Xia, Erik Cambria
, Peng Jin:
Inducing Word Senses for Cross-lingual Document Clustering. 409-414 - Xueqiang Lv, Ruihong Wu, Bin Wen:
Chinese Personal Name Recognition in Web Queries via Bootstrapping. 415-419 - Jianping Zhang, Yao Liu:
Study on Construction of Semantic Metadata Structure in Professional Fields. 420-423 - Yifeng Xu, Yunfang Wu:
Chinese Discourse Relation Recognition Using Parallel Corpus. 424-427 - Sheng-Ping Zhu, Ji-Xiang Du, Chuan-Min Zhai, Zhong-Qiu Zhao:
Diversifying Plant Image Retrieval with Dimensionality Reduction. 428-431 - Yi-Ming Liu, Li-Fang Chen, Yuan Liu, Hao-Tian Wu:
An Image Matching Algorithm Based on SIFT and Improved LTP. 432-436 - Zhuang Zhang, Donghui Hu, Yang Yang, Bin Su:
A Universal Digital Image Steganalysis Method Based on Sparse Representation. 437-441
Access Control and Protection
- Lequan Min, Yuqun Zhang, Lijiao Zhang, Kexin Hu
:
A Novel 3 Dimensional Chaotic System and Design of Pseudorandom Number Generator. 442-448 - Yuxiao Ling, Zheng Guo, Zhimin Zhang, Zhigang Mao, Zeleng Zhuang:
A Block Cipher Circuit Design against Power Analysis. 449-453 - Tong Li, Shenghui Su:
Analysis of Success Rate of Attacking Knapsacks from JUNA Cryptosystem by LLL Lattice Basis Reduction. 454-458 - Hao Zhu, Shenghui Su:
The Improvement of the Commonly Used Linear Polynomial Selection Methods. 459-463 - Wenjuan Ying:
An Improved Block Lanczos Algorithm to Solve Large and Sparse Matrixes on GPUs. 464-468 - Kerui Wang, Qiuliang Xu, Guoyan Zhang:
A Secure Threshold Signature Scheme from Lattices. 469-473 - Lifeng Guo, Bo Lu, Xiangyu Li, He Xu:
A Verifiable Proxy Re-encryption with Keyword Search without Random Oracle. 474-478 - Huaijun Wang, Dingyi Fang
, Guanghui Li, Xiaoyan Yin, Bo Zhang, Yuanxiang Gu:
NISLVMP: Improved Virtual Machine-Based Software Protection. 479-483 - Zhonghua Li, Jin Yang, Jun Yang, De-Ming Wang:
GPS Route Decisions Research Based on Network Theory. 484-488 - Dang Xinxin, Chen Li:
A Design of Decoded Picture Buffer of H.264 Based on DDR2. 489-493 - Dongmei Gao, Ruliang Wang:
Stability Analysis for a Class of Systems with Time-Varying and Distributed Delays. 494-497 - Ruliang Wang, Shanshan Zhang, Wen Huang:
The Design of Output Feedback Controller for a Class of Nonlinear Systems with Time-Delay. 498-502
Authentication and Authorization
- Yi Yang, Sen Bai, Yu Guo, Jian-Bo Tang:
Video Fogging Hiding Algorithm Based on Fog Theory. 503-507 - Hao-Tian Wu, Yuan Liu, Yiu-ming Cheung
:
Reversible Image Watermarking Using a Diagonal Structure for Prediction. 508-513 - Hui Xu, Xiang Chen, Jiangmei Zhou, Zhaowen Wang, Huanxiao Xu:
Research on Basic Problems of Cognitive Network Intrusion Prevention. 514-517 - Wenjuan Li
, Yuxin Meng
, Lam-for Kwok
:
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. 518-522 - Jiachen Liu, Jianfeng Song, Qiguang Miao
, Ying Cao:
FENOC: An Ensemble One-Class Learning Framework for Malware Detection. 523-527 - Jiyun Yang, Rui Zhang, Di Xiao:
Analysis and Improvement of an Efficient and Secure Key Agreement Protocol. 528-532 - Shuqing Jiao:
Design on the Real-Time Measurement Method of Molten Metal High Temperature Based on DSP. 533-536 - Bo Zhao, Hong Du, Ying Wang, Xiaozheng Zhang:
Robust Tracking Integrated with Detection and Online Learning. 537-541 - Ruimin Lyu, Yuan Liu, Lei Meng, Xinyue Hu:
Wormhole Canvas. 542-544 - Jiajia Zhang, Shuli Zheng, Donghui Hu, Yunling Zhang:
Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions. 545-549 - Donghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang:
Secure Architecture and Protocols for Robust Perceptual Hashing. 550-554
Cryptography and Cryptanalysis
- Yuanhui Lin, Mengbo Hou, Qiuliang Xu:
Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. 555-558 - Guiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu:
A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security. 559-563 - Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang:
Identity-Based Authenticate Key Exchange Protocol from Lattice. 564-568 - Lequan Min, Kexin Hu
, Lijiao Zhang, Yuqun Zhang:
Study on Pseudorandomness of Some Pseudorandom Number Generators with Application. 569-574 - Xianglong Kong, Wei Wang, Qiuliang Xu:
Improved Rectangle Attack on SMS4 Reduced to 18 Rounds. 575-578 - Jun Sang, Bin Cai, Bing Zhang, Daxiang Hong, Haibo Hu:
Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform Domains. 579-582 - Sen Bai, Guibin Zhu, Jian Huang:
An Intelligent Algorithm for the (1, 2, 2)-Generalized Knight's Tour Problem. 583-588 - Xing Wei, Zheng Yuan, Xian Li, Xiao Feng, Jintao Liu:
Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures. 589-593 - Jie Zheng, Jun Luo:
A PG-LSH Similarity Search Method for Cloud Storage. 594-600
Data Security and Integrity
- Ning Zhang, Ahmad Iqbal Hakim Suhaimi
, Yuichi Goto
, Jingde Cheng:
An Analysis of Software Supportable Tasks Related with ISO/IEC 15408. 601-606 - Weiquan Xian, Houkui Wang:
The Design Research of Data Security Model Based on Public Cloud. 607-609 - Yan-ting Ouyang, Hui-Dang Zhang, Yu-Yao He:
The Hopf Bifurcation and Control of a Time-Delayed Dual Model in Internet Congestion Control. 610-614 - Guangcheng Liang, Lejian Liao, Xin Xu, Jianguang Du, Guoqiang Li, Henglong Zhao:
Effective Fuzzing Based on Dynamic Taint Analysis. 615-619 - Heng-Zhou Wu, Wang-da Chen, Lin-Yu Fu, Xin Zhang, Hua-Qin Liu:
Study on Digital Radio Mondiale Signal Monitor System for Wireless Communication Security. 620-623 - Yazhuo Li, Yang Luo, Zhao Wei, Chunhe Xia, Xiaoyan Liang:
A Verification Method of Enterprise Network Reachability Based on Topology Path. 624-629 - Jicheng Hu, Dongjian Fang, Xiaofeng Wei, Jian Xie:
Colluder Detection Based on Hypergraph Decomposition. 630-634 - Beichen Liu, Wenyao Zhang, Yueguang Wang, Yuezhu Pei:
Feature Emphasized OLIC for 2D Flow Visualization. 635-639 - Shuoming Li, Lan Yin:
A Study of Meta Search Interface for Retrieving Disaster Related Emergencies. 640-643
Network and Wireless Security
- Youngbok Cho, Sangho Lee:
Lite-IDE Based Hierarchical Node Authentication Protocol for Energy Efficient in WSN. 644-647 - Kelei Chen, Lijia Chen, Junyong Mao, Dong Zhao:
A Multiple Metrics Gateway Selection Algorithm for Vehicular Ad Hoc Networks in Fading Channels. 648-652 - Liming Huan, Yang Yu, Liangshuang Lv, Shiying Li, Chunhe Xia:
A Botnet-Oriented Collaborative Defense Scheme Description Language. 653-657 - Shengpei Ding, JiongCheng Li, Henghui Xiao, Haiyi Huang:
Reliability Adjustment Weighted Bit-Flipping Decoding for Low-Density Parity-Check Codes. 658-662 - Kai Zhao, Lina Ge:
A Survey on the Internet of Things Security. 663-667 - Yingjiu Guo, Xuemei Liu, Xiufeng Shao:
Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri Net. 668-672 - Lei Wang, Kuo Gao, Qiaoyong Jiang, Feng Zou:
A Distance Interaction Method Based on Pen. 673-677 - Lei Wang, Yanpeng Wang, Qiaoyong Jiang, Fen Zou:
Knowledge-Based Cooperative Particle Filter. 678-682 - Bin Wang, Yang Zhou, Xinhong Hei:
Coercion: A Distributed Clustering Algorithm for Categorical Data. 683-687 - Guo Xie
, Fucai Qian, Xinhong Hei:
A Strategy to Improve the Reliability of Object-Oriented Formal Models. 688-691 - Cheng Cheng, Zongxin Wu:
Design of a System for Safe Driving Based on the Internet of Vehicles and the Fusion of Multi-aspects Information. 692-696 - Zhipeng Jia, Ya-Ling Zhang, Shang-Ping Wang
, Qin-Dong Sun:
Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data. 697-701
Security Methodologies and Management
- Yu Liu, Shihong Chen, Shuoming Li, Yunhua Wang:
Bayes-SWRL: A Probabilistic Extension of SWRL. 702-706 - Huanyu Zhou, Yongheng Wang, Kening Cao:
Fuzzy D-S Theory Based Fuzzy Ontology Context Modeling and Similarity Based Reasoning. 707-711 - Xitong Qi, Yuling Liu:
Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document. 712-715 - Lijuan Xu, Lianhai Wang:
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File. 716-720 - Ya-Ping Wang:
A Construction of Pooling Designs by Using Dn-Matrix. 721-723 - Chong Fu, Wen-Jing Li, Zhao-yu Meng, Tao Wang, Pei-Xuan Li:
A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System. 724-728 - Qian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo:
Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card. 729-733 - Wei Wang, Fenlin Liu, Xin Ge, Zheng Zhao:
A Chaotic Encryption Algorithm for Palette Image. 734-737 - Ximeng Liu
, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang:
Attribute Based Multi-signature Scheme in the Standard Model. 738-742 - Huawei Zhao, Minglei Shu, Jing Qin
, Jiankun Hu
:
A Key Management Scheme between Body Sensor Networks and the Base Station. 743-747 - Shutong Wang, Dawu Gu, Junrong Liu, Zheng Guo, Weijia Wang
, Sigang Bao:
A Power Analysis on SMS4 Using the Chosen Plaintext Method. 748-752 - Yulin Ma, Yuan Zhao:
Research on the Trade Duration of HS300 Index Based on ACD Model. 753-757 - Jian-Dong Zhang, Xuan Ma, Jin Yang, Zhonghua Li:
Load Balancing Based on Group Analytic Hierarchy Process. 758-762 - Xiaohui Zhang, Longge Wang:
The Application of Web Log in Collaborative Filtering Recommendation Algorithm. 763-765 - Jiang Zhihua:
GreenCloud for Simulating QoS-Based NaaS in Cloud Computing. 766-770 - Caiming Liu, Yan Zhang, Huaqiang Zhang:
A Novel Approach to IoT Security Based on Immunology. 771-775
Systems Analysis and Modeling
- Ji Xu, Yujing Si, Jielin Pan, Yonghong Yan:
Automatic Allophone Deriving for Korean Speech Recognition. 776-779 - Xiangyou Li, Qingxiang Zhang:
Optimality Conditions under Generalized Type I Invexity. 780-783 - Guojun Zhang:
Conformance Checking and QoS Optimizing of Web Service Composition. 784-787 - Zhongwei Si, Liang Wang, Xia Zhong, Xin-Lei Feng, Lina Liang:
A Kind of Hilbert Boundary Value Problem for Generalized Analytic Functions in Clifford Analysis. 788-792 - Lizhuo Liu, Lili Xie, Chenglong Hao, Xinhua Zheng, Bing Sun:
Analyzing of Dynamic Friction Model for the Tire and the Runway. 793-797 - Shuoting Wang, Jiechang Wen:
The Finiteness Conjecture for the Joint Spectral Radius of a Pair of Matrices. 798-802 - Zhongwei Si:
The Hilbert Boundary Value Problem for 2-Monogenic Functions in the Unit Ball. 803-806 - Jing Nie:
A Study on the Application Cost of Server Virtualisation. 807-811 - Jian-Hui Yang, Ying-Ying Chen:
A New Model of Minimum Variance Hedge Ratio: EGARCH-Copula-EWMA. 812-816 - Hong Zhang:
Co-op Advertising Analysis within a Supply Chain Based on the Three-Stage Non-cooperate Dynamic Game Model. 817-821 - Wang Xing, Li Wei:
Analysis on the Grey Correlation between Manufacturing and Logistics Industry in Dongguan. 822-825 - Ziqi Zhu:
Managing Public Financial Resources in a Changing World: Analyzing a Budget. 826-830 - Hong Yang:
Duality for Multiobjective Semi-Infinite Programming with Uniform K-(Fb, rho)-Convexity. 831-835 - Yueran Zu, Huichuan Duan:
Texture Synthesis Using Diagonal Quilting Wang Tiles. 836-840 - Jinling Du, Linzhi Cao:
Improved Genetic Algorithm for the Regional Multi-line Bus Dispatching. 841-845 - Jinling Du, Dalian Liu, Meisheng Zhang:
Research on the Optimal Configuration of Human Resource in Construction Enterprise Based on Two-Side Matching. 846-850

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.