


default search action
CIS 2013: Emei Mountain, Sichan Province, China
- Ninth International Conference on Computational Intelligence and Security, CIS 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2548-3

Intelligent Computation
- Qun Zhang, Ying Min Wang:

The Finite Element Analysis on the Multi-bubble Model in the Ship Wake. 1-5 - Zhendong Liu, Daming Zhu, Wei Cui, Nan Liu:

An Approximation Scheme for RNA Folding Structure Prediction Including Pseudoknots. 6-10 - Deng-Xu He, Gui-Qing Liu, Hua-Zheng Zhu:

Glowworm Swarm Optimization Algorithm for Solving Multi-objective Optimization Problem. 11-15 - Ruimin Jia, Dengxu He:

Artificial Bee Colony Algorithm with Two-Stage Eagle Strategy. 16-20 - Xiaomin Hu, Jun Zhang

:
Optimizing Vaccine Distribution for Different Age Groups of Population Using DE Algorithm. 21-25 - Hong-Chao Yan, Hai-Lin Liu, Qiang Wang:

Dynamic Resource Allocation of TD-LTE System Based on Improved Quantum Evolutionary Algorithm. 26-30 - Jun Wu, Yuelin Gao, Lina Yan:

An Improved Differential Evolution Algorithm for Mixed Integer Programming Problems. 31-35 - Shilei Lv, Shunzheng Yu:

A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm. 36-40 - Hecheng Li, Lei Fang:

An Efficient Genetic Algorithm for Interval Linear Bilevel Programming Problems. 41-44 - Xiaoli Wang

, Yuping Wang, Kun Meng:
An Energy-Aware Optimization Model Based on Data Placement and Task Scheduling. 45-49 - Hong-Li Yin:

Genetic Algorithm Nested with Simulated Annealing for Big Job Shop Scheduling Problems. 50-54 - Hong Li, Li Zhang:

A Differential Evolution with Two Mutation Strategies for Linear Bilevel Programming Problems. 55-60 - Zhurong Wang, Changqing Yu, Xinhong Hei, Bin Zhang:

A Parallel Genetic Algorithm for Solving the Probabilistic Minimum Spanning Tree Problem. 61-65 - Dazhi Jiang, Chenfeng Peng, Zhun Fan

:
Evolutionary Algorithm Based on Automatically Designing of Genetic Operators. 66-70 - Yuqiang Chen, Jianlan Guo, Xuanzi Hu:

Research on Related Vehicle Routing Problem for Multiple Depots Basing on Dynamic Constraint. 71-75 - Yuqiang Chen, Xuanzi Hu, Guangzai Ye:

Research on Related Vehicle Routing Problem for Single Distribution Centre Based on Dynamic Constraint. 76-79 - Weijia Wang, Jie Hu:

A New Evolutionary Algorithm for Portfolio Optimization and Its Application. 80-84 - Wentian Mai, Hai-Lin Liu, Lei Chen, JiongCheng Li, Henghui Xiao:

Multi-objective Evolutionary Algorithm for 4G Base Station Planning. 85-89 - Huilin Yi, Jianhui Yang:

Multi-objective Portfolio Optimization Based on Fuzzy Genetic Algorithm. 90-94 - Lei Fan, Xiyang Liu:

An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems. 95-99
Intelligent Systems and Complex Systems
- Mengzhe Chen, Qingqing Zhang, Zhichao Wang, Jielin Pan, Yonghong Yan:

Web-Based Language Model Domain Adaptation for Real World Voice Retrieval. 100-104 - Liping Chen, Guojun Zhang:

A Petri Net Approach to Reliable Execution for Web Service Composition. 105-109 - Zhenghai Ai:

TOPSIS with Interval Number and Uncertain Weight Based on Tanimoto Measure. 110-114 - Guocheng Xie, Yun Jiang, Na Chen:

A Multi-class Support Vector Data Description Approach for Classification of Medical Image. 115-119 - Meng Wang, Lanfen Lin, Feng Wang:

Improving Short Text Classification through Better Feature Space Selection. 120-124 - Jun Yang, Zhonghua Li, Wei Xiang, Luxin Xiao:

An Improved Apriori Algorithm Based on Features. 125-128 - Bin Gui, Xiaoping Yang:

Research on Sentiment Tendency Analysis of Microtext Based on Sense Group. 129-133 - Shuigui Huang, Wenwen Han, Xirong Que, Wendong Wang:

Polarity Identification of Sentiment Words Based on Emoticons. 134-138 - Ting Jin, Tong Xu, Enhong Chen, Qi Liu, Haiping Ma, Jingsong Lv, Guoping Hu:

Random Walk with Pre-filtering for Social Link Prediction. 139-143 - Xin Zheng:

A Credit Scoring Model Based on Collaborative Filtering. 144-148 - Kai Liu, Xiao Wang:

A Pragmatical Option Pricing Method Combining Black-Scholes Formula, Time Series Analysis and Artificial Neural Network. 149-153 - Xueyuan Gong, Yain-Whar Si

:
Comparison of Subsequence Pattern Matching Methods for Financial Time Series. 154-158 - Yibu Ma:

The Research of Stock Predictive Model Based on the Combination of CART and DBSCAN. 159-164 - Yajuan Yang, Quanju Zhang:

Differential-Algebraic Equations Model for Quadratic Programming. 165-169 - Hui Du, Yuping Wang, LiLi Duan:

A New Method for Grayscale Image Segmentation Based on Affinity Propagation Clustering Algorithm. 170-173 - Hanhai Zhou, Jinjin Wang, Jiadong Wu, Long Zhang, Peng Lei, Xiaoyun Chen:

Application of the Hybrid SVM-KNN Model for Credit Scoring. 174-177 - Ling Xin, Philip L. H. Yu, Kin Lam:

An Application of CUSUM Chart on Financial Trading. 178-181 - Chunhong Yang, Zeng-li Liu:

The Superiority Analysis of Linear Frequency Modulation and Barker Code Composite Radar Signal. 182-184 - Wei Wang, Zeng-li Liu, Chen Lin, Weiwei Sha:

Harmonic Detection of Power System Based on SVD and EMD. 185-189 - Huichuan Duan, Naiwen Liu:

A Greedy Search Algorithm for Resolving the Lowermost C Threshold in SVM Classification. 190-193 - Jun Li, Xuefeng Zhang, Weihong Shen, Qilin Zou:

Network Topology Discovery Based on SNMP. 194-199
Learning Algorithms
- Fuhua Song, Shuiqiang Yi:

Research on Application of Improved Genetic Algorithm in Urban Full Independent Tourist Route Planning. 200-203 - Hongjian Xu, Yanjuan Shuai, Wenzhang He:

The Image Reconstruction Algorithm Based on Wiener Filtering. 204-208 - Yefei Liu, Fulong Wang, Xiang-yan Xi:

Enhanced Algorithm for Exemplar-Based Image Inpainting. 209-213 - Xiangyan Xi, Fulong Wang, Yefei Liu:

Improved Criminisi Algorithm Based on a New Priority Function with the Gray Entropy. 214-218 - Qifan Fu, Yichun Zhang, Liyong Xu, Huixin Li:

A Method of Shot-Boundary Detection Based on HSV Space. 219-223 - Haifeng Sima, Ping Guo

:
Texture Region Merging with Histogram Feature for Color Image Segmentation. 224-228 - Shaoming Zhang, Sheng Yu, Qingyu Ma, Pengchao Shang, Popo Gui, Jianmei Wang, Tiantian Feng:

Pedestrian Counting for a Large Scene Using a GigaPan Panorama and Exemplar-SVMs. 229-235 - Xiuqin Deng, Weijia Cai, Chengyan Fang, Weiqing Kong, Jianqiang Liao:

An Improved Kalman Filtering Algorithm for Moving Contact Detecting and Tracking. 236-240 - Shanwen Zhang, Chuanlei Zhang:

Orthogonal Locally Discriminant Projection for Classification of Plant Leaf Diseases. 241-245 - Renlong Pan, Xin Lin, Chenquan Huang, Lin Wang:

A Novel Vehicle Flow Detection Algorithm Based on Motion Saliency for Traffic Surveillance System. 246-249 - Xiaoguang Liu, Xingbao Gao, Qiufang Xue:

Image Restoration Combining Tikhonov with Different Order Nonconvex Nonsmooth Regularizations. 250-254 - Qifeng Lin, Wei Liu, Hongxin Peng, Yuxing Chen:

Efficient Genetic Algorithm for High-Dimensional Function Optimization. 255-259 - Bo Shuai, Haifeng Li, Mengjun Li, Quan Zhang, Chaojing Tang:

Software Defect Prediction Using Dynamic Support Vector Machine. 260-263 - Juan Li, Yuping Wang:

A Nearest Prototype Selection Algorithm Using Multi-objective Optimization and Partition. 264-268 - Peng Sun, Xin Guo, Yunpeng Zhang, Ziyan Wu

:
Analytical Model of Customer Churn Based on Bayesian Network. 269-271 - Jing Meng, Pei-Yong Zhu, Hou-Biao Li

:
QMRCGstab Algorithm for Families of Shifted Linear Systems. 272-276 - Li Baiping, Liu Dan:

Research and Realization of Coordinate Conversion in Radar Video Display. 277-279 - Xiangzhu Long, Jishen Li, Youjun Hu:

A Multiple Chaotic Video Encryption System Based on DM642. 280-283 - Jun Li, Lixin Ding, Ying Xing:

Differential Evolution Based Parameters Selection for Support Vector Machine. 284-288
Neural Networks and Neural Systems
- Xin-Lei Feng, Xiao-Li Yang, Zhi-He Zhang, Zhongwei Si:

Group Consensus with Switching Topology of Multi-agent Systems. 289-293 - Guoqiang Hang, Danyan Zhang, Xuanchang Zhou, Xiaohu You:

An Enhanced Dynamic Switch Logic with Floating-Gate MOS Transistors. 294-297 - Hong-Li Yin:

GA with Special Encoded Chromosome for FJSP with Machine Disruptions. 298-302 - Liping Jia, Xin-Lei Feng, Guocheng Zou:

Solving Multiobjective Bilevel Transportation-Distribution Planning Problem by Modified NSGA II. 303-307 - Xiuming Zou, Huaijiang Sun:

Clustering Analysis of Micro-array Data Based on the SOM Algorithm. 308-312 - Guoqiang Hang, Xiaohui Hu, Hongli Zhu, Xiaohu You:

Differential Edge-Triggered Flip-Flops Using Neuron-MOS Transistors. 313-317 - Saifeng Zeng, Ligu Zhu, Lei Zhang:

A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case Study. 318-322 - Long Wang, Yuqing Lan, Qingxin Xia:

Using CloudSim to Model and Simulate Cloud Computing Environment. 323-328 - Dongyi He, Jianhua Shuai:

The Application of Fuzzy Comprehensive Evaluation Method for the Evaluation Enterprise Training Effectiveness. 329-333 - Jinquan Li, Yongchuan Wen:

A Decision Making Model Based on Fuzzy Relation Equations Constraints and Its Algorithm. 334-338 - Yanlin Jia

, Yan Yang, Yihua Zhong:
Parametric Study of Fuzzy Number Linear Programming. 339-343 - Wei-Xin Ling, Zhen Xing, Zhuo-ming Chen, Da-Jun Tang:

Designing a Fuzzy Classifier Using Genetic Algorithm and Application in Chinese Vowel Recognition. 344-348 - Liming Song, Ming Li, Yonghong Yan:

Automatic Vocal Segments Detection in Popular Music. 349-352 - Hong-Li Yin:

A New Method for Supply Chain Optimization with Facility Fail Risks. 353-357
Pattern Recognition and Knowledge Discovery
- Zhao Li, Peng Liang

, Yi Zhao, Keqing He:
MFI Based Interoperability Measurement of Business Models in Service-Based Enterprises. 358-362 - Hong Wang, Minggang Du:

Distribution Reduction in Inconsistent Interval Ordered Information Systems Based on Dominance Relations. 363-367 - Tianxiang Feng:

The Cutting Circle Method and Romberg Algorithm. 368-371 - Qiufang Xue, Xingbao Gao, Xiaoguang Liu:

Preconditioned AOR Iterative Method for M-Matrix. 372-376 - Chao Yang, Fugen Zhou, Xiangzhi Bai:

3D Reconstruction through Measure Based Image Selection. 377-381 - Xiujun Zhang

, Chen Xu:
L1/2 Regularization Based Low-Rank Image Segmentation Model. 382-386 - Zhaohui Xia

, Jianyong Wang, Xiaogang Yang:
A Fusion Algorithm Based on Position Difference Filtering and Least Squares Estimate for Dynamic Scene Matching. 387-390 - Ya Liu, Yao Lu, Qingxuan Shi, Jianhua Ding:

Optical Flow Based Urban Road Vehicle Tracking. 391-395 - Lu Dong, Likun Qiu, Xiujuan Chen:

The Determination of Chinese Pivotal Sentences Based on Semantic Entailment. 396-400 - Peng Jin, Xingyuan Chen:

A Word Sense Probabilistic Topic Model. 401-404 - Xingyuan Chen, Xia Yang, Bingjun Su:

A Fast Algorithm of Computing Word Similarity. 405-408 - Guoyu Tang, Yunqing Xia, Erik Cambria

, Peng Jin:
Inducing Word Senses for Cross-lingual Document Clustering. 409-414 - Xueqiang Lv, Ruihong Wu, Bin Wen:

Chinese Personal Name Recognition in Web Queries via Bootstrapping. 415-419 - Jianping Zhang, Yao Liu:

Study on Construction of Semantic Metadata Structure in Professional Fields. 420-423 - Yifeng Xu, Yunfang Wu:

Chinese Discourse Relation Recognition Using Parallel Corpus. 424-427 - Sheng-Ping Zhu, Ji-Xiang Du, Chuan-Min Zhai, Zhong-Qiu Zhao:

Diversifying Plant Image Retrieval with Dimensionality Reduction. 428-431 - Yi-Ming Liu, Li-Fang Chen, Yuan Liu, Hao-Tian Wu:

An Image Matching Algorithm Based on SIFT and Improved LTP. 432-436 - Zhuang Zhang, Donghui Hu, Yang Yang, Bin Su:

A Universal Digital Image Steganalysis Method Based on Sparse Representation. 437-441
Access Control and Protection
- Lequan Min, Yuqun Zhang, Lijiao Zhang, Kexin Hu

:
A Novel 3 Dimensional Chaotic System and Design of Pseudorandom Number Generator. 442-448 - Yuxiao Ling, Zheng Guo, Zhimin Zhang, Zhigang Mao, Zeleng Zhuang:

A Block Cipher Circuit Design against Power Analysis. 449-453 - Tong Li, Shenghui Su:

Analysis of Success Rate of Attacking Knapsacks from JUNA Cryptosystem by LLL Lattice Basis Reduction. 454-458 - Hao Zhu, Shenghui Su:

The Improvement of the Commonly Used Linear Polynomial Selection Methods. 459-463 - Wenjuan Ying:

An Improved Block Lanczos Algorithm to Solve Large and Sparse Matrixes on GPUs. 464-468 - Kerui Wang, Qiuliang Xu, Guoyan Zhang:

A Secure Threshold Signature Scheme from Lattices. 469-473 - Lifeng Guo, Bo Lu, Xiangyu Li, He Xu:

A Verifiable Proxy Re-encryption with Keyword Search without Random Oracle. 474-478 - Huaijun Wang, Dingyi Fang

, Guanghui Li, Xiaoyan Yin, Bo Zhang, Yuanxiang Gu:
NISLVMP: Improved Virtual Machine-Based Software Protection. 479-483 - Zhonghua Li, Jin Yang, Jun Yang, De-Ming Wang:

GPS Route Decisions Research Based on Network Theory. 484-488 - Dang Xinxin, Chen Li:

A Design of Decoded Picture Buffer of H.264 Based on DDR2. 489-493 - Dongmei Gao, Ruliang Wang:

Stability Analysis for a Class of Systems with Time-Varying and Distributed Delays. 494-497 - Ruliang Wang, Shanshan Zhang, Wen Huang:

The Design of Output Feedback Controller for a Class of Nonlinear Systems with Time-Delay. 498-502
Authentication and Authorization
- Yi Yang, Sen Bai, Yu Guo, Jian-Bo Tang:

Video Fogging Hiding Algorithm Based on Fog Theory. 503-507 - Hao-Tian Wu, Yuan Liu, Yiu-ming Cheung

:
Reversible Image Watermarking Using a Diagonal Structure for Prediction. 508-513 - Hui Xu, Xiang Chen, Jiangmei Zhou, Zhaowen Wang, Huanxiao Xu:

Research on Basic Problems of Cognitive Network Intrusion Prevention. 514-517 - Wenjuan Li

, Yuxin Meng
, Lam-for Kwok
:
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. 518-522 - Jiachen Liu, Jianfeng Song, Qiguang Miao

, Ying Cao:
FENOC: An Ensemble One-Class Learning Framework for Malware Detection. 523-527 - Jiyun Yang, Rui Zhang, Di Xiao:

Analysis and Improvement of an Efficient and Secure Key Agreement Protocol. 528-532 - Shuqing Jiao:

Design on the Real-Time Measurement Method of Molten Metal High Temperature Based on DSP. 533-536 - Bo Zhao, Hong Du, Ying Wang, Xiaozheng Zhang:

Robust Tracking Integrated with Detection and Online Learning. 537-541 - Ruimin Lyu, Yuan Liu, Lei Meng, Xinyue Hu:

Wormhole Canvas. 542-544 - Jiajia Zhang, Shuli Zheng, Donghui Hu, Yunling Zhang:

Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions. 545-549 - Donghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang:

Secure Architecture and Protocols for Robust Perceptual Hashing. 550-554
Cryptography and Cryptanalysis
- Yuanhui Lin, Mengbo Hou, Qiuliang Xu:

Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. 555-558 - Guiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu:

A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security. 559-563 - Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang:

Identity-Based Authenticate Key Exchange Protocol from Lattice. 564-568 - Lequan Min, Kexin Hu

, Lijiao Zhang, Yuqun Zhang:
Study on Pseudorandomness of Some Pseudorandom Number Generators with Application. 569-574 - Xianglong Kong, Wei Wang, Qiuliang Xu:

Improved Rectangle Attack on SMS4 Reduced to 18 Rounds. 575-578 - Jun Sang, Bin Cai, Bing Zhang, Daxiang Hong, Haibo Hu:

Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform Domains. 579-582 - Sen Bai, Guibin Zhu, Jian Huang:

An Intelligent Algorithm for the (1, 2, 2)-Generalized Knight's Tour Problem. 583-588 - Xing Wei, Zheng Yuan, Xian Li, Xiao Feng, Jintao Liu:

Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures. 589-593 - Jie Zheng, Jun Luo:

A PG-LSH Similarity Search Method for Cloud Storage. 594-600
Data Security and Integrity
- Ning Zhang, Ahmad Iqbal Hakim Suhaimi

, Yuichi Goto
, Jingde Cheng:
An Analysis of Software Supportable Tasks Related with ISO/IEC 15408. 601-606 - Weiquan Xian, Houkui Wang:

The Design Research of Data Security Model Based on Public Cloud. 607-609 - Yan-ting Ouyang, Hui-Dang Zhang, Yu-Yao He:

The Hopf Bifurcation and Control of a Time-Delayed Dual Model in Internet Congestion Control. 610-614 - Guangcheng Liang, Lejian Liao, Xin Xu, Jianguang Du, Guoqiang Li, Henglong Zhao:

Effective Fuzzing Based on Dynamic Taint Analysis. 615-619 - Heng-Zhou Wu, Wang-da Chen, Lin-Yu Fu, Xin Zhang, Hua-Qin Liu:

Study on Digital Radio Mondiale Signal Monitor System for Wireless Communication Security. 620-623 - Yazhuo Li, Yang Luo, Zhao Wei, Chunhe Xia, Xiaoyan Liang:

A Verification Method of Enterprise Network Reachability Based on Topology Path. 624-629 - Jicheng Hu, Dongjian Fang, Xiaofeng Wei, Jian Xie:

Colluder Detection Based on Hypergraph Decomposition. 630-634 - Beichen Liu, Wenyao Zhang, Yueguang Wang, Yuezhu Pei:

Feature Emphasized OLIC for 2D Flow Visualization. 635-639 - Shuoming Li, Lan Yin:

A Study of Meta Search Interface for Retrieving Disaster Related Emergencies. 640-643
Network and Wireless Security
- Youngbok Cho, Sangho Lee:

Lite-IDE Based Hierarchical Node Authentication Protocol for Energy Efficient in WSN. 644-647 - Kelei Chen, Lijia Chen, Junyong Mao, Dong Zhao:

A Multiple Metrics Gateway Selection Algorithm for Vehicular Ad Hoc Networks in Fading Channels. 648-652 - Liming Huan, Yang Yu, Liangshuang Lv, Shiying Li, Chunhe Xia:

A Botnet-Oriented Collaborative Defense Scheme Description Language. 653-657 - Shengpei Ding, JiongCheng Li, Henghui Xiao, Haiyi Huang:

Reliability Adjustment Weighted Bit-Flipping Decoding for Low-Density Parity-Check Codes. 658-662 - Kai Zhao, Lina Ge:

A Survey on the Internet of Things Security. 663-667 - Yingjiu Guo, Xuemei Liu, Xiufeng Shao:

Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri Net. 668-672 - Lei Wang, Kuo Gao, Qiaoyong Jiang, Feng Zou:

A Distance Interaction Method Based on Pen. 673-677 - Lei Wang, Yanpeng Wang, Qiaoyong Jiang, Fen Zou:

Knowledge-Based Cooperative Particle Filter. 678-682 - Bin Wang, Yang Zhou, Xinhong Hei:

Coercion: A Distributed Clustering Algorithm for Categorical Data. 683-687 - Guo Xie

, Fucai Qian, Xinhong Hei:
A Strategy to Improve the Reliability of Object-Oriented Formal Models. 688-691 - Cheng Cheng, Zongxin Wu:

Design of a System for Safe Driving Based on the Internet of Vehicles and the Fusion of Multi-aspects Information. 692-696 - Zhipeng Jia, Ya-Ling Zhang, Shang-Ping Wang

, Qin-Dong Sun:
Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data. 697-701
Security Methodologies and Management
- Yu Liu, Shihong Chen, Shuoming Li, Yunhua Wang:

Bayes-SWRL: A Probabilistic Extension of SWRL. 702-706 - Huanyu Zhou, Yongheng Wang, Kening Cao:

Fuzzy D-S Theory Based Fuzzy Ontology Context Modeling and Similarity Based Reasoning. 707-711 - Xitong Qi, Yuling Liu:

Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document. 712-715 - Lijuan Xu, Lianhai Wang:

Research on Extracting System Logged-In Password Forensically from Windows Memory Image File. 716-720 - Ya-Ping Wang:

A Construction of Pooling Designs by Using Dn-Matrix. 721-723 - Chong Fu, Wen-Jing Li, Zhao-yu Meng, Tao Wang, Pei-Xuan Li:

A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System. 724-728 - Qian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo:

Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card. 729-733 - Wei Wang, Fenlin Liu, Xin Ge, Zheng Zhao:

A Chaotic Encryption Algorithm for Palette Image. 734-737 - Ximeng Liu

, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang:
Attribute Based Multi-signature Scheme in the Standard Model. 738-742 - Huawei Zhao, Minglei Shu, Jing Qin

, Jiankun Hu
:
A Key Management Scheme between Body Sensor Networks and the Base Station. 743-747 - Shutong Wang, Dawu Gu, Junrong Liu, Zheng Guo, Weijia Wang

, Sigang Bao:
A Power Analysis on SMS4 Using the Chosen Plaintext Method. 748-752 - Yulin Ma, Yuan Zhao:

Research on the Trade Duration of HS300 Index Based on ACD Model. 753-757 - Jian-Dong Zhang, Xuan Ma, Jin Yang, Zhonghua Li:

Load Balancing Based on Group Analytic Hierarchy Process. 758-762 - Xiaohui Zhang, Longge Wang:

The Application of Web Log in Collaborative Filtering Recommendation Algorithm. 763-765 - Jiang Zhihua:

GreenCloud for Simulating QoS-Based NaaS in Cloud Computing. 766-770 - Caiming Liu, Yan Zhang, Huaqiang Zhang:

A Novel Approach to IoT Security Based on Immunology. 771-775
Systems Analysis and Modeling
- Ji Xu, Yujing Si, Jielin Pan, Yonghong Yan:

Automatic Allophone Deriving for Korean Speech Recognition. 776-779 - Xiangyou Li, Qingxiang Zhang:

Optimality Conditions under Generalized Type I Invexity. 780-783 - Guojun Zhang:

Conformance Checking and QoS Optimizing of Web Service Composition. 784-787 - Zhongwei Si, Liang Wang, Xia Zhong, Xin-Lei Feng, Lina Liang:

A Kind of Hilbert Boundary Value Problem for Generalized Analytic Functions in Clifford Analysis. 788-792 - Lizhuo Liu, Lili Xie, Chenglong Hao, Xinhua Zheng, Bing Sun:

Analyzing of Dynamic Friction Model for the Tire and the Runway. 793-797 - Shuoting Wang, Jiechang Wen:

The Finiteness Conjecture for the Joint Spectral Radius of a Pair of Matrices. 798-802 - Zhongwei Si:

The Hilbert Boundary Value Problem for 2-Monogenic Functions in the Unit Ball. 803-806 - Jing Nie:

A Study on the Application Cost of Server Virtualisation. 807-811 - Jianhui Yang, Ying-Ying Chen:

A New Model of Minimum Variance Hedge Ratio: EGARCH-Copula-EWMA. 812-816 - Hong Zhang:

Co-op Advertising Analysis within a Supply Chain Based on the Three-Stage Non-cooperate Dynamic Game Model. 817-821 - Wang Xing, Li Wei:

Analysis on the Grey Correlation between Manufacturing and Logistics Industry in Dongguan. 822-825 - Ziqi Zhu:

Managing Public Financial Resources in a Changing World: Analyzing a Budget. 826-830 - Hong Yang:

Duality for Multiobjective Semi-Infinite Programming with Uniform K-(Fb, rho)-Convexity. 831-835 - Yueran Zu, Huichuan Duan:

Texture Synthesis Using Diagonal Quilting Wang Tiles. 836-840 - Jinling Du, Linzhi Cao:

Improved Genetic Algorithm for the Regional Multi-line Bus Dispatching. 841-845 - Jinling Du, Dalian Liu, Meisheng Zhang:

Research on the Optimal Configuration of Human Resource in Construction Enterprise Based on Two-Side Matching. 846-850

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














