


default search action
CIS 2009: Beijing, China
- 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers. IEEE Computer Society 2009, ISBN 978-0-7695-3931-7

Artificial Immune Systems and Artificial Neural Systems
- Wei Wang, Pengtao Zhang, Ying Tan

, Xingui He:
A Hierarchical Artificial Immune Model for Virus Detection. 1-5 - Rui Chao, Ying Tan

:
A Virus Detection System Based on Artificial Immune System. 6-10 - Liling Ma, Zhao Zhang, Xiaohang Zhou, Junzheng Wang:

A Novel Classification Method Based on Artificial Immune System and Quantum Mechanics Theory. 11-14 - Xu Zhang, Li Xu:

An Improved Immune-Based Multi-modal Function Optimization Algorithm. 15-19 - Yutao Qi, Fang Liu, Licheng Jiao:

A Parallel Artificial Immune Model for Optimization. 20-24 - Suxian Zhang, Hai-Lin Liu, Jiechang Wen, Weili Chen:

A New Algorithm Estimating the Mixing Matrix for the Sparse Component Analysis. 25-29 - Runbo Bai, Xiumei Qiu, Maosen Cao

:
Factor Sensitivity Analysis for Multivariable Systems Using Bayesian Neural Networks. 30-33 - Rong Guo, Dongchen Shi:

Prediction of C3 Concentration in FCCU Using Neural Estimator Based on Dynamic PCA. 34-37
Data Mining and Statistical Data Analysis
- Nibaldo Rodríguez

, Eleuterio Yañez:
Wavelet Smoothing Based Multivariate Polynomial for Anchovy Catches Forecasting. 38-41 - Xuanzi Hu, Jiafu Wan:

Studying of Data Centre Architecture for Prefecture-level City. 42-47 - Veronica C. Estrada

, Akihiro Nakao, Enrique Carlos Segura:
Classifying Computer Session Data Using Self-Organizing Maps. 48-53 - Feng Gao, Weiming Fu, YiPing Zhong, Danfeng Zhao:

Large-Scale Hierarchical Text Classification Based on Path Semantic Vector and Prior Information. 54-58 - Yuan Tian:

Discovering Temporal Similarity Pattern Based on Metamorphosis Data. 59-63 - Xiao-dong Shao:

The Application of Improved 3D_Apriori Three-Dimensional Association Rules Algorithm in Reservoir Data Mining. 64-68 - Sulan Zhang, Ping Guo

, Jifu Zhang, Xinxin Wang:
A Batch Constructing Method of Weighted Concept Lattice Based on Deviance Analysis. 69-73 - Yun Shen, Trevor P. Martin, Pete Bramhall:

Intelligent Security Data Analysis. 74-78 - Cunli Mao, Lina Li, Zhengtao Yu, Lu Han, Jianyi Guo, Xiong-Li Lei:

Research on Answer Extraction Method for Domain Question Answering System(QA). 79-83 - Cheng Zheng, Yong Fang, Yaping Shen:

The Implementation of the Web Mining Based on XML Technology. 84-87 - Le Peng, Zhi Cai, Guowen Wu:

Predict Ranking of Object Summaries with Hidden Markov Model. 88-91
Evolutionary Computing
- Yuelin Gao, Miaomiao Wang:

Improved Differential Evolution Algorithm with Random Migration Operator. 92-97 - Liping Jia, Yuping Wang:

A Genetic Algorithm for Multiobjective Bilevel Convex Optimization Problems. 98-102 - Guoli Zhang, Mingxin Dou, Siyan Wang:

Hybrid Genetic Algorithm with Particle Swarm Optimization Technique. 103-106 - Hongxia Miao, Honghua Wang, Zhixiang Deng:

Quantum Genetic Algorithm and its Application in Power System Reactive Power Optimization. 107-111 - Jiadong Yang, Hua Xu, Peifa Jia:

Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization Algorithm. 112-117 - Dalian Liu, Xinfeng Wang, Jinling Du:

A Clustering-Based Evolutionary Algorithm for Traveling Salesman Problem. 118-122 - Ning Dong, Yuping Wang:

Multiobjective Differential Evolution Based on Opposite Operation. 123-127 - Yulan Liu:

An Approach for a Class of Bilevel Multiobjective Programming Problem. 128-132 - Yan Liu, Lei Fan, Yuping Wang, Qianli Dong:

Optimization of Logistics Nodes in Dynamic Location with a Multi-objective Evolutionary Algorithm. 133-137 - Jian-hu Cai, Li-Ping Wang:

Study on Dynamic Game Models in a Two-Echelon Supply Chain. 138-141 - Zhiwei He, Mingyu Gao, Jie Xu:

EKF-Ah Based State of Charge Online Estimation for Lithium-ion Power Battery. 142-145
Image Understanding and Knowledge Discovery
- Yaozu An, Yao Lu, Hong Zhao:

Neighborhood-Based Weighted Regularization of Video Sequence Super-Resolution. 146-150 - Dong-Jiang Ji, Wen-Zhang He:

The Correction SART Algorithm Based on Circular Symmetrical Object. 151-154 - Peizhen Wang, Lei Shi, Hengzhi Dong:

Feature Extraction and Matching for Plant Images. 155-159 - Qingzhu Wang, Ke Wang, Donghong An, Bo Chen, Miao Liu, Yingying Ying:

Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient. 160-164 - Xuchao Li, Dongsheng Liu:

Object Detection and Tracking Using Spatiotemporal Wavelet Domain Markov Random Field in Video. 165-170 - Wenyao Zhang, Jing Su:

Extraction of Limit Streamlines in 2D Flow Field Using Virtual Boundary. 171-175 - Dingjun Chen:

The Close-Degree of Covering Rough Sets. 176-179 - Baohua Wang, Hejiang Huang, Xiaolong Wang, Wensheng Chen:

An Ontology-Based NLP Approach to Semantic Annotation of Annual Report. 180-183
Support Vector Machines, Machine Learning, and Learning Algorithms
- Bingxin Xu, Qian Yin, Guangjun Lv:

Using SVM to Organize the Image Database. 184-187 - Min Jiang, Zhiqing Meng, Gengui Zhou:

A New Support Vector Machine Model Based on the Discrete Conditional Value-at-Risk. 188-192 - Juan Zhang, Yi Niu, Huabei Nie:

Web Document Classification Based on Fuzzy k-NN Algorithm. 193-196 - Ying Zhang, Zhe-zhao Zeng:

A New Method for Simultaneous Extraction of All Roots of Algebraic Polynomial. 197-200 - Yang Fan, Shuping He

, Fei Liu:
PD-Type Sampled-Data Iterative Learning Control for Nonlinear Systems with Time Delays and Uncertain Disturbances. 201-205
Multi-agent Systems and Neural Networks
- Zaobin Gan, Juxia He, Qian Ding, Vijay Varadharajan

:
Trust Relationship Modelling in E-commerce-Based Social Network. 206-210 - Bo Yang, Yong-gang Wu, Cheng Wang:

A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public Square. 211-216 - Jianjun Ni, Chuanbiao Zhang, Li Ren:

An Intelligent Decision Support System of Lake Water Pollution Control Based on Multi-agent Model. 217-221 - Xiaozheng Mou, Wuneng Zhou, Lin Pan, Qingyu Zhu, Jian-An Fang:

Lag Synchronization of Uncertain Chaotic Neural Networks with Mixed Time-Varying Delays Based on Adaptive Control. 222-226 - Jiansheng Wu, Jie Zhou, Yuelin Gao:

Support Vector Regression Based on Particle Swarm Optimization and Projection Pursuit Technology for Rainfall Forecasting. 227-233 - Chengtian Song, Keyong Wang:

Image Target Detection Using Morphological Neural Network. 234-236 - Lixin Xing, Shanqing Gao, Yunfei Chen:

A Novel Control Method Based on Fuzzy Neural Network. 237-239
Swarm Intelligence
- Soumah Yaya, Wang Honghua:

Research on Reduction of Commutation Torque Ripple in Brushless DC Motor Drives Based on Fuzzy Logic Control. 240-243 - Haobin Xie, Feng Liu

, Lijuan Li
:
A Topology Optimization for Truss Based on Improved Group Search Optimizer. 244-248 - Guang Qin, Feng Liu

, Lijuan Li:
A Quick Group Search Optimizer with Passive Congregation and its Convergence Analysis. 249-253 - Jianhua Liu, Xiaoping Fan:

The Analysis and Improvement of Binary Particle Swarm Optimization. 254-258 - Xiuqin Deng:

System Identification Based on Particle Swarm Optimization Algorithm. 259-263 - Chengfu Ye:

Minimal Merrifield-Simmons Index of 5-leaf-trees. 264-267 - Haixing Zhao, Liang Wei:

Reliability Polynomials of Networks with Vertex Failure. 268-271 - Haizhen Ren:

On Orderings of Some Graphs by the Extreme Roots of their Graph Polynomials. 272-276 - Li Guo, Xu Chen:

A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy of Acceleration Coefficients. 277-281 - Jie Zhang

, Yajuan Yang, Quanju Zhang:
The Particle Swarm Optimization Algorithm Based on Dynamic Chaotic Perturbations and its Application to K-Means. 282-286 - Xin Liu, Xinge You, Yiu-ming Cheung

:
Texture Image Retrieval Using Non-separable Wavelets and Local Binary Patterns. 287-291 - Wenxue Niu, Yajuan Yang, Xiao Luo, Quanju Zhang:

Research on the Evolution of Supply Chain Based on SWARM. 292-295
Fuzzy Systems and Intelligent Systems
- Xiao-Li Wu, Yan-Kui Liu

:
Measuring the Spread of Fuzzy Variable by L-S Integral. 296-300 - Zhiming Wang, Li Zhang, Hong Bao

:
PNN Based Motion Detection with Adaptive Learning Rate. 301-306 - Longmei Jie, Hui Wang, DeRong Li, GuoQiang Shao:

Proof of Two Kinds of Fingerprint Feature Extraction CNN. 307-310 - Juyang Zhang, Ningkang Jiang:

A Sound Dynamic Resource-Constrained Scheduling Scheme. 311-314
Pattern Recognition
- Gil Melfe Mateus Santos, Hugo Pedro Martins Carrico Proença

:
On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images. 315-319 - Pengzhang Liu, Tingzhi Shen, Yu Hu, Sanyuan Zhao:

Face Recognition Using Modular Locality Preserving Projections. 320-324 - Zhao-yi Peng, Yu Zhou, Ping Wang:

Multi-pose Face Detection Based on Adaptive Skin Color and Structure Model. 325-329 - Di Wu, Tianyun Ma, Pengcheng Nie, Zhiping Wang, Zhengjun Qiu, Yong He:

Use of In-Situ Visible and Near-Infrared Spectroscopy for Non-invasive Discrimination of Spirulina Platensis. 330-334 - Xiuzhuang Zhou, Yao Lu:

Efficient Mean Shift Particle Filter for Sperm Cells Tracking. 335-339 - Bingxia Shi, Na Yu, Jia Xu, Quanming Zhao:

Extraction and Recognition Alphabetic and Digital Characters on Industrial Containers. 340-343 - Jian Cao, Kan Li, Chunxiao Gao, Qiongxin Liu:

Efficient Object Recognition Using Corner Features. 344-348 - Sun Junding, Xu Heli:

Contour-Shape Recognition and Retrieval Based on Chain Code. 349-352 - Fulong Wang, Xiaoliang Liu, Cheng Huang:

An Improved Kernel Fisher Discriminant Analysis for Face Recognition. 353-357 - Cai-Kou Chen

, Jun Shi
, Yiming Yu:
Locally Supervised Discriminant Analysis in Kernel Space. 358-362 - Rong-Hua Li, Zhiping Luo, Guoqiang Han:

Pseudo-inverse Locality Preserving Projections. 363-367 - Fulong Wang, Cheng Huang, Xiaoliang Liu:

A Fusion of Face Symmetry of Two-Dimensional Principal Component Analysis and Face Recognition. 368-371 - Su Xiao, Guoqiang Han, Yan Wo, Zhan Li, Xiangji Chen:

Fast Parameter Estimation in Image Restoration Based on Hierarchical Bayesian Framework. 372-375 - Yun Tian, Mingquan Zhou, Zhongke Wu, Xingce Wang:

A Region-Based Active Contour Model for Image Segmentation. 376-380 - Taijun Wang, Yiu-ming Cheung

:
A Locally Gaussian Mixture Based RBF Network for Classification of Chinese Herbal Infrared Spectrum Fingerprint. 381-385
Cryptograph, Watermarking, and Applications
- Jianqin Zhou, Cheng Shangguan, Zemao Zhao:

Computing the m-Tight Error Linear Complexity of Periodic Binary Sequences. 386-390 - Dazu Huang, Zhigang Chen, Xin Li, Jianquan Xie:

Deterministic Secure Bidirectional Quantum Communication. 391-394 - Zhengjun Cao, Olivier Markowitch:

Different Authentication Properties and a Signcryption Scheme Revisited. 395-399 - Wei Gao, Zhenyou Wang, Fei Li, Li'e Chen:

An Efficient Threshold Signature Scheme Without Random Oracles. 400-404 - Lihua Liu, Zhengjun Cao:

Analysis of Two Signature Schemes from CIS'2006. 405-408 - Jiayao Wang, Bin Hu, Quanlai Wang:

The Walsh Spectrum Property of Resilient Boolean Functions. 409-413 - Hua Shao, Xinglan Zhang, Feng Shao:

Cryptanalysis of Short Signature Scheme Without Random Oracles Assumption. 414-417 - Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma:

Predators Combat Good Point Set Scanning-Based Self-Learning Worms. 418-422 - Zuowen Tan:

An Improved Identity-Based Group Signature Scheme. 423-427 - Xiaoming Hu, Zhe Zhang, Taozhi Si:

ID-Based Proxy Re-Encryption Schemes Without Random Oracle. 428-431 - Bo Yang, Zhengming Hu, Zibi Xiao:

Efficient Certificateless Strong Designated Verifier Signature Scheme. 432-436 - Na Wang, Yunjin Wang, Xia Li:

A Novel Robust Watermarking Algorithm Based on DWT and DCT. 437-441 - Ming Mao, Shaohui Chen, Jin Xu:

Construction of the Initial Structure for Preimage Attack of MD5. 442-445 - Ying Qiu, Huafei Zhu:

Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism. 446-450 - Mingqiang Wang, Leibo Li:

A Note on Twin Diffie-Hellman Problem. 451-454 - Zhenyou Wang, Wei Gao, Li'e Chen, Fei Li:

Perfect Subliminal Channel in a Paring-Based Digital Signature. 455-457 - Jiujun Cheng, Fan Zhang, Kuifei Yu, Jian Ma:

The Dynamic and Double Encryption System Based on Two-Dimensional Image. 458-462
Security Management and Intrusion Detection
- Bao Ngoc Tran, Thuc Dinh Nguyen, Tran Dan Thu:

A New S-Box Structure Based on Graph Isomorphism. 463-467 - Zhijin Guan, Yiqing Zhang, Yanming Lu:

Reversible Logic Gate Cascade Network Based on Series Connection. 468-472 - Chengming Qi, Xusheng Chen:

A New Digital Proxy Signature Scheme Based on ECDLP. 473-477 - Da Zhang, Chai Kiat Yeo

:
A Distributed Court System for Intrusion Detection in OLSR. 478-482 - Bei Wu, Xing-yuan Chen, Yong-fui Zhang, Xiang-dong Dai:

An Extensible Intra Access Control Policy Conflict Detection Algorithm. 483-488 - (Withdrawn) A Scenario-Based Test Case Generation Framework for Security Policies. 489-493

- Li Cao, Lequan Min

, Hongyan Zang:
A Chaos-Based Pseudorandom Number Generator and Performance Analysis. 494-498 - Liping Ji, Haijin Liang, Yitao Song, Xiamu Niu:

A Normal-Traffic Network Covert Channel. 499-503 - Hongyan Zang, Lequan Min

, Li Cao:
An Image Encryption and Digital Signature Scheme Based on Generalized Synchronization Theorem. 504-510 - Hongbin Kong, Zhengquan Zeng, Lijun Yan, Jicheng Yang, Shaowen Yao, Nuoya Sheng:

Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based Ontology Encryption. 511-515
Applied Security
- Mahdi Zamani, Mahnush Movahedi, Mohammad Mehdi Ebadzadeh

, Hossein Pedram:
A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents. 516-520 - Mingxi Zhang:

Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness. 521-525 - Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:

An Algebra for Composing Access Control Policies in Grid. 526-530 - Xudong Li, Chunxia Zhang, Xing Lin, Shuguang Lin:

VAD: A Detail Investigation into Process's Memory. 531-536 - Chao Chen, Ke Wang, Yiqi Dai:

A Novel Architecture for Enterprise Network Security. 537-541 - Kun Yu, Yunyang Yan:

Reputation Measure for Incentive-Compatible Packet Forwarding in Ad Hoc Networks. 542-546 - Kai Yang, Jian-Feng Ma, Zi-hui Miao:

Hybrid Routing Protocol for Wireless Mesh Network. 547-551 - Yaping Chi, Zhaobin Li, Zhonghua Wang, Yong Fang:

An Improved Bytecode Verification Algorithm on Java Card. 552-555 - Xintian Liu

, Changhong Liu, Lihui Zhao, Hu Huang, Xiaoyong Zhao, Xinyi Sun:
The Finite Element Method Appling in the Flow Forming. 556-558 - Baoliang Xu, Wenjian Luo, Xufa Wang:

A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems. 559-564 - Jinling Song, Liming Huang, Qi He, Yan Gao, Xin Liu, Yuxiang Li:

Preserving FDs in K-Anonymization by K-MSDs and Association Generalization. 565-569 - Liming Wu, Junxiu Liu, Ji Zhang, Yuling Luo:

The Intelligent Reconfigurable Measuring Node Based on Wireless Access Network. 570-573 - Huafei Zhu, Ying Qiu:

Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated Transcoders. 574-577
Other Applications
- Hong Zhao, Yao Lu, Zhengang Zhai:

Example-Based Facial Sketch Hallucination. 578-582 - Wenzhang He, Yunfei Ma:

Clarity Algorithm of Images in the Fog and Application. 583-586 - Zhi Wei, Jianhua Zhang, Nan Li, Xu Li:

Computation Model of Machining Mechanics of Glass Micromilling. 587-591 - Yiming Fan, Qingzhang Chen, Jianjun Yu:

Topology Control Algorithm Based on Bottleneck Node for Large-Scale WSNs. 592-597 - Zhengang Zhai, Yao Lu, Hong Zhao:

Stereo Matching with Adaptive Arbitrary Support-Pixel Set and Adaptive Support-Weight. 598-602 - Xue-wen Ding, Wen-Zhang He, Zhao-Xuan Yang:

Error Concealment Method for Embedded Wavelet codec. 603-607 - Jianli Ding, Tantan Chen, Tao Xu:

Propagated Analysis of Airport Delays Based on Timed Petri Nets. 608-614 - Jianhua Zhang, Hongsheng Xu, Yang Yu, Zhi Wei:

FEM Based Numerical Analysis on the Temperature Field in Grind-hardening. 615-618 - Yishu Zhai, Yong Zhang:

Contrast Restoration for Fog-Degraded Images. 619-623 - Hui Shao, Hailin Zou, Yincheng Liang, Wenjun Li, Qian Gao:

Time Scale Estimation Method Based on Anisotropic Diffusion. 624-628 - Lixia Zhang, Guangran Liu:

Study and Design of 3D Virtual Scenes of Virtual Laboratory. 629-633 - Shengyi Yang, Kunqin Li, Jiao Shi:

Design and Simulation of the Longitudinal Autopilot of UAV Based on Self-Adaptive Fuzzy PID Control. 634-638 - Bo Zhao:

Predicting Fiber Diameter of Polypropylene (PP) Spunbonding Nonwovens Process: A Comparison Between Physical and Artifical Neural Network Methods. 639-642 - Ziye Yan

, Yao Lu:
Super Resolution of MRI Using Improved IBP. 643-647 - Jingwen Tian, Meijuan Gao, Shi-Ru Zhou:

The Research of Building Logistics Cost Forecast Based on Regression Support Vector Machine. 648-652 - Zhang Hua, Wang Cheng, Ren Bo:

The New Registration Method Used in ARDK. 653-657 - Weiqing Ge, Shisheng Huang, Kaiyuan Wu:

The Development and Implementation of Rapid CRC Algorithm on Tandem Welding System. 658-661 - Chen Xu, Jianwen Feng, Francis R. Austin, Weiqiang Zhang:

Adaptive Synchronization Between Hyperchaotic Lorenz System and Chen System. 662-665 - Xiaoli Sun, Chen Xu:

Image Denoising and Inpainting Model Based on Taylor Expansion. 666-670

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














