


default search action
CIS 2009: Beijing, China
- 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers. IEEE Computer Society 2009

Intelligent Systems and Fuzzy Systems
- Yang Zhang, Zhongxiong He:

Economic Control Based on Four-Element Connection Numbers Control. 1-5 - Jinmao Xu, Yaowen Xue, Huimin Gao, Pengzhu Zhang:

Design and Implementation of Simulation System for Monitoring Capital Flow Based on Agent. 6-9 - Wei Huang, Hong Peng:

Observation Reduction for State-Action Tables. 10-14 - Qingui Xu, Guixiong Liu:

Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection. 15-20 - Yuan-Duen Lee, Wen-Chia Tsai, Sheng-Fei Hsu:

Exploring the Relationship Between Parental Information Literacy and Regulating Rules in Family by Data Mining. 21-24 - Liping Chen, Weitao Ha, Guojun Zhang:

A New Web Service Evaluation Model with Fuzzy C-Means Artificial Immune Network Memory Classifier. 25-29 - Jiayang Li, Jianhua Xu:

A Fast Multi-label Classification Algorithm Based on Double Label Support Vector Machine. 30-35 - Dukun Ding, Cunxi Xie, Xuanzi Hu:

Immune Controller Design for Vertical-Joint Industry Robot. 36-40 - Yaolong Li, Guojun Zhang:

Rank Axioms for Poset Greedoids. 41-42 - Guojun Zhang, Yaolong Li:

Global Rank Axioms of Greedoids on Partially Ordered Set. 43-44 - Ming-dong Hou, Zhicheng Zhao, Jinggang Zhang, Jie Tian:

An IMC-PID Control Method with Set-Point Weight. 45-49
Support Vector Machines, Machine Learning, and Learning Algorithms
- Fahimeh Farahnakian, Nasser Mozayani

:
Reinforcement Learning for Soccer Multi-agents System. 50-52 - Hong-jun Heng, Bing-zhong Zheng, Ya-Jing Li:

Study of SVM-Based Air-Cargo Demand Forecast Model. 53-55 - Xiaoxia Han, Gang Xie, Keming Xie, Jun Ren:

Heterogeneous Catalysis Modeling Strategy Integrating Support Vector Regression and Chaotic Particle Swarm Optimization Algorithm. 56-60 - Yi Zhong, Chunguang Zhou, Lan Huang, Yan Wang, Bin Yang:

Support Vector Regression for Prediction of Housing Values. 61-65 - Long Wan, Wenxing Bao

:
Research and Application of Animal Disease Intelligent Diagnosis Based on Support Vector Machine. 66-70 - Xiaohong Hu, Xu Qian:

A Novel Graph-based Image Annotation with Two Level Bag Generators. 71-75 - Tianxiang Feng, Hongxia Liu:

The Computer Realization of the QR Decomposition on Matrices with Full Column Rank. 76-79
Evolutionary Computing: Workshop
- Jiqiang Feng, Weixin Xie, Chen Xu:

A New Population Diversity Model in Intelligence Optimization Algorithms. 80-83 - Ying Gao:

An Optimization Algorithm Based on Cloud Model. 84-87 - Xinshun Ma:

A New Hybrid Evolution Genetic Algorithm with Laplace Crossover and Power Mutation. 88-91 - Hong-biao Mei, Jiang Wang, Zi-hui Ren:

An Adaptive Dynamic Ant System Based on Acceleration for TSP. 92-96 - Zan Wang, Jin-lan Liu:

Hybrid Memetic Algorithm for Uniting Classes of University Timetabling Problem. 97-101 - Nan Lu, Chunguang Zhou, Laizhong Cui:

The Application of Association Rules Algorithm on Web Search Engine. 102-108 - Fangqing Gu, Hai-Lin Liu, Ming Li:

Evolutionary Algorithm for the Radio Planning and Coverage Optimization of 3G Cellular Networks. 109-113
Swarm Intelligence
- Zhengjia Wu, Liping Zhang

, Wen Wang, Kui Wang:
Research on Job-Shop Scheduling Problem Based on Genetic Ant Colony Algorithms. 114-118 - Orlando Durán

, Luiz Airton Consalter
:
Integrating PSO and CAM Database for Selecting Cutting Tools. 119-124 - Wenjie You, Shanshan Wu, Guoli Ji:

The Application of an Improved Particle Swarm Optimization (PSO) Algorithm in Pairwise Sequence Alignment. 125-128 - Huirong Li, Yuelin Gao:

Particle Swarm Optimization Algorithm with Adaptive Threshold Mutation. 129-132 - Liang Li, Guangming Yu, Xuesong Chu, Shibao Lu:

The Harmony Search Algorithm in Combination with Particle Swarm Optimization and its Application in the Slope Stability Analysis. 133-136 - Yuhong Duan, Sun Ying:

A Particle Swarm Optimization Algorithm with Ant Search for Solving Traveling Salesman Problem. 137-141 - Hui Zhao, Chun Feng Zhang:

Accuracy Analysis of a Parallel Robot with Particle Swarm Optimization. 142-145 - Ji Cheng:

Integration of Access Control Policy Design into Software Development. 146-150 - Ai-juan Zhang:

Research of an Improved Access Control Model in Active Networks. 151-154 - Simin Mo, Jianchao Zeng:

Performance Analysis of the Artificial Physics Optimization Algorithm with Simple Neighborhood Topologies. 155-160
Neural Networks and Distributed Systems
- Ying Zhang, Zhe-zhao Zeng:

Neural Network Algorithm for the Simultaneous Extraction of All Roots of Algebraic Polynomial. 161-164 - Jinjian Xiao, Jingyu Liu:

Early Forecast and Recognition of the Driver Emergency Braking Behavior. 165-168 - Xinjian Zhuo, Yongmei Su:

One Application of CNN in Word-Processing. 169-172 - Guo-Jian Cheng, Lei Cai, Hua-Xian Pan:

Comparison of Extreme Learning Machine with Support Vector Regression for Reservoir Permeability Prediction. 173-176 - Jiali Hou, Nengshan Feng:

A Research on the Function Relationships in the Modularization Immunity Neural Network Model. 177-181 - Jun Wang, Jian-Wen Chen, Yongliang Wang, Di Zheng:

Intelligent Load Balancing Strategies for Complex Distributed Simulation Applications. 182-186 - Xizhe Zhang

, Ying Yin, Mingwei Zhang, Bin Zhang:
Web Service Community Discovery Based on Spectrum Clustering. 187-191
Watermarking, Cryptography, and Coding
- Xuewen Xia, Yuanxiang Li, Zhuliang Xia, Rong Wang:

Data Encryption Based on Multi-granularity Reversible Cellular Automata. 192-196 - Jianqin Zhou, Wei Xiong, Zemao Zhao, Lin You:

The Tight Error Linear Complexity of Periodic Sequences. 197-201 - Yichun Zhang, Lei Yang, Pin Xu, Yong-Song Zhan:

A DRM Authentication Scheme Based on Smart-Card. 202-207 - Manman Geng, Futai Zhang:

Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing. 208-212 - Xueming Wang, Nan Cui:

Research of Security Mobile Payment Protocol in Communication Restrictions Scenarios. 213-217 - Xiaoyan Yang, Zhen Liu:

The Security Matrix Factorization Agreement with Two Parties. 218-221 - Hui Zhu, Hui Li, Yumin Wang:

An Efficient Fast Authentication Protocol. 222-225 - Yipin Lin, Xiaofeng Wang:

A Hase-based SAKA Protocol Algorithm. 226-228 - Hao Cao

, Shimin Wei, Zepeng Zhuo:
Relations between Annihilator Immunity of Boolean Functions and Affine Spaces. 229-232 - Yan Wang, Ming Hu:

Timing Evaluation of the Known Cryptographic Algorithms. 233-237 - Yuan-Yuan Li:

AOP-Based Attack on Obfuscated Java Code. 238-241 - Gong Bei, Shi Guangyuan:

An Anonymous Attestation Scheme of TPM. 242-245 - Hongru Wei, Zhiyin Kou:

Research and Application of Digital Watermark for Video Copyright Protection. 246-250 - Weijia Jiang, Jiguo Li:

Authenticated Tree Based Group Key Agreement. 251-255 - Xiaoming Hu, Zhe Zhang, Yinchun Yang:

Identity Based Proxy Re-Signature Schemes without Random Oracle. 256-259 - Yali Jiang, Xiuling Ju:

Lattice-Based CCA-Secure Cryptosystem from IBE System. 260-264 - Xiu-mei Wen, Wei Zhao, Fan-xing Meng:

Research of a Digital Image Watermarking Algorithm Resisting Geometrical Attacks in Fourier Domain. 265-268 - Mingjie Chen, Kefeng Fan, Wei Mo, Subing Zhang:

Implementation and Evaluation of a Novel Audio Watermarking Scheme. 269-272 - Na Wang, Xia Li, Lingjun Liu:

An Adaptive Multi-objective Image Watermarking Scheme for QIM Using NSGA-II. 273-277 - Dexin Yang, Bo Yang:

A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card. 278-282 - Baoheng Shan, Bin Zhang:

Research on Role-Based Joint Authorization Administration Model. 283-287 - Manman Geng, Futai Zhang:

Batch Verification for Certificateless Signature Schemes. 288-292 - Lianfen Huang, Ying Huang, Zhibin Gao, Jianan Lin, Xueyuan Jiang:

Performance of Authentication Protocols in LTE Environments. 293-297 - Gang Xu, Geng Zhao, Lequan Min

:
An Extended Method for Obtaining S-Boxes Based on Discrete Chaos Map System. 298-302 - Hui-long Jin, Guo-dong Liang, Zhi-Hua Liu, Cheng-qian Xu:

The Necessary Condition of Families of Odd-Periodic Perfect Complementary Sequence Pairs. 303-307 - Jian-lin Huang, Fei-peng Li:

Quick Similarity Measurement of Source Code Based on Suffix Array. 308-311 - Huijuan Xiao, Wen Zeng:

A Hard Disk Encryption System Realized by the Digital Signal Processor. 312-314 - Min-Qing Zhang, Bin Dong, Xiaoyuan Yang:

A New Self-Updating Hash Chain Structure Scheme. 315-318
Information and Security Management
- Hu Ming, Wang Yan:

The Collision Rate Tests of Two Known Message Digest Algorithms. 319-323 - Syed Muhammad Khaliq-ur-Rahman Raazi

, Heejo Lee, Sungyoung Lee, Young-Koo Lee:
BARI: A Distributed Key Management Approach for Wireless Body Area Networks. 324-329 - Yinan Zhang, Ning Du, Miao Qi, Chengxi Wang, Jun Kong:

Association Analysis and Content-Based Information Hiding Approach with High Hiding Capacity. 330-334 - Xin Liu, Neng Wang:

Random Walk-Based Tor Circuit Building Protocol. 335-340 - Shijie Ren, Su Xin:

Digital Watermarking Based on Fast Independent Component Analysis and Discrete Wavelet Transform. 341-343 - Jun Gao:

Computer-Vision-Based Identification of Nail's Surface Shape. 344-347 - Guangliang Liu, Lingyun Li, Shengxian Xie, Junqing Li:

Secret Sharing System and Secret Sharing Matrix. 348-351 - Peng Wu, Guoxin Wu:

A Reputation-Based Trust Model for P2P Systems. 352-356 - Bin Qin, Jian-fei Pan, Guang-Zhong Cao, Ge-guo Du:

The Anti-spoofing Study of Vein Identification System. 357-360 - Qiming Liu, Rui Xu, Shaojie Wang:

Modelling and Analysis of an SIRS Model for Worm Propagation. 361-365 - Yangui Xu, Xiangchun Li, Jiachun Zhou, Huanyan Qian:

Worm Detection in an IPv6 Internet. 366-370 - Li Yao, Yu Liu, Yuqing Zhang:

An Integrated Approach to Worm Detection and Automatic Signature Generation. 371-375 - Xiaosong Zhang, Fei Liu, Ting Chen, Hua Li:

Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention. 376-379 - Jianyong Wang, Yuling Li, Yuhua Liu, Xiu Jing:

Cluster and Recommendation Based Multi-granularity Trust Model in P2P Network. 380-384 - Yun Deng, Xiao-hui Cheng:

A Study on the Security Technology of Enterprise Mobile Information System. 385-391
Wireless Network Security
- Chuanrong Zhang, Yuqing Zhang:

New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme. 392-396 - Daowen Hua, Xuehui Du, Yanbin Qian, Shaoge Yan:

A DTN Routing Protocol Based on Hierarchy Forwarding and Cluster Control. 397-401 - Enguo Zhu, Guoliang Wu, Gongxun Yang:

Network Security Protection Solutions of Electric Power Enterprise Based on VPN Technology. 402-405 - Zhiyuan Xie, Junhui He

, Shaohua Tang:
A CPK-Based Security Scheme at Network Layer. 406-410 - Kai Wei, Shaohua Tang:

A Multi-level Trust Evaluation Model Based on D-S Theory for Grid. 411-415 - Ru Li, Liaojun Pang, Qingqi Pei, Guozhen Xiao:

Anonymous Communication in Wireless Mesh Network. 416-420 - Songbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia:

SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. 421-425 - Bin Yang:

Study on Security of Wireless Sensor Network Based on ZigBee Standard. 426-430 - Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. 431-435 - Xiaonan Wang, Dongniang Cheng:

FIMFS: Failure Inferencing Based IP Multicast Fast Self-Healing Approach. 436-440 - Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:

A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks. 441-445
Data and Network Security
- Changzheng Xu, Yaqi Wang, Qiang Wei, Qingxian Wang:

A Novel Trust Model Based on Temporal Historical Data for Access Control. 446-449 - Junhao Geng

, Sumei Zhang:
Full Business Model Oriented Access Control Method. 450-454 - Songyun Liu, Hejiao Huang:

Role-Based Access Control for Distributed Cooperation Environment. 455-459 - Guoqi Li, Yang Xiao, Minyan Lu, Yuchao Zhang:

A Formal Method Based Case Study for Access Control. 460-463 - Kai-mei Zheng, Xu Qian, Pei-chong Wang:

Dimension Reduction in Intrusion Detection Using Manifold Learning. 464-468 - Li-zhong Geng, Hui-bo Jia:

A Novel Intrusion Detection Scheme for Network-Attached Storage Based on Multi-source Information Fusion. 469-473 - Yang Song, Yuqing Zhang, Yingfei Sun:

Automatic Vulnerability Locating in Binary Patches. 474-477 - Ning Wang, Zhijun Liu, Yuping Huang:

Applying Dynamic Labels of the Biba Model in Forensic Evidence Analysis. 478-482 - Danfeng Zhao, Wei Zhao, Ying Wang, Feng Gao, Qi He, Guohua Liu:

Creating the Cryptograph Index by Query Frequencies in DAS Models. 483-487 - Ning Wang, Wei Zhao, Ying Wang, Qi He, Guohua Liu:

Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases. 488-492 - Jinhong Cui, Xu Wang:

SNS Based Information Authorization Delegation Mechanism and Implementation. 493-497 - Lequan Min, Xiaobo Jiang, Youyan Fu, Yunhao Yi, Yan Meng, Hai Yan:

Nonlinear Regression Based Analysis on Cyanobacteria Blooms and Water Quality in a Beijing Shallow Lake. 498-504 - Li-hua Zou, Yun-cheng Liu:

A New Algorithm of Counting Human Based on Segmentation of Human Faces in Color Image. 505-509 - Xu Xiang:

Providing Efficient Secure DHTs Routing. 510-514
Other Applications
- Yuanyuan Liu, Haibin Yu, Zhiwei He, Xueyi Ye:

Fast Robust Face Detection under a Skin Color Model with Geometry Constraints. 515-519 - Gang Yang, Ziye Yan

, Hong Zhao:
Touching String Segmentation Using MRF. 520-524 - Rong Guo, Yuhui Wang:

A Hybrid Approach of Hazard Estimation for Chemical Hazard Installations. 525-528 - Yun Liu, Peng Zhang:

Vision-Based Human-Computer System Using Hand Gestures. 529-532 - Pengfei Li, Jiakun Li:

Application of Communication and Remote Control in PLC Based on ZigBee. 533-536 - Yong-bao Liu, Mi Zhou, Xing He:

Fault Diagnosis of the Gas Turbine Based on Multi-operating Condition Information Fusion. 537-540 - Han Yi, Ikou Kaku, Gengui Zhou, Jianhu Cai, Huazhen Lin:

An Application of Particle Swarm Optimization to Uncapacitated Multilevel Lot-Sizing Problems with Series Structure. 541-544 - Zhou Jia, Guo Yun Fei:

Guaranteeing Maximum Reliability and Minimum Delay QoS Routing Based on WF2Q. 545-549 - Hongge Sun, Weisheng Wang, Yi Cao, Shenxue He, Xin Yan:

Application of Fuzzy Data Fusion in Multi-sensor Environment Monitor. 550-553 - Lan Wang, Qian Zhang:

A New Method of Generating Robot-Used Maps. 554-557 - De Jun Li, Le Ping Xu:

The Design for Warp Knitting Machine Traversing Control System Based on DSP. 558-562 - Xintian Liu

, Changhong Liu, Lihui Zhao, Hu Huang:
The Random Thermal Analysis with Universal Grey Number in the Electronics. 563-566 - Li Ren, Xin-yi Xiang:

Research on the Energy Analysis of Lake Ecological Functions. 567-570 - Yi Liu, Man Sha:

Research on Prediction of Traffic Flow at Non-detector Intersections Based on Ridge Trace and Fuzzy Linear Regression Analysis. 571-575 - Yunpeng Wang, Haiyang Yu, Shiwu Li, Yi Chen:

Research on Temporal and Spatial Data Models Based on GIS for Urban Traffic Planning Information Support System. 576-579 - Shichong Tan, Hui Zhu, Yumin Wang:

Some Notes on Password Authenticated Key Exchange Based on RSA. 580-583 - Yong Zeng, Jianfeng Ma, Qinqi Pei, Lihua Dong:

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management. 584-586 - Jianwen Feng, Anding Dai, Francis R. Austin, Ling He:

Anti-synchronization of Two Different Hyperchaotic Systems with Fully Uncertain Parameters. 587-591 - Dingxie He, Hongxia Liu:

The Application of Elementary Transformation. 592-597 - Zeng-li Liu, Shuang Xu, Haiyan Quan, Yi-gang Guo:

Study of Spectrum Analysis Based on EMD Adaptive Filter. 598-600 - Bolin Liu, Shaochuan Fu:

Efficiency Measurement of Logistics Public Companies Basing on the Modified DEA Model. 601-605

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














