


default search action
CSSE 2008: Wuhan, China
- International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China. IEEE Computer Society 2008

Grid Computing
- Xie Xiaozhu, Hong Jingxin, Xiao Sixing:

Effective Method for Moving Objects Detection on Sea Surface. 1-4 - Weifang Liang, Jihai Huang, Jianhua Huang:

A Distributed Cache Management Model for P2P VoD System. 5-8 - Jia-Bin Yuan, Jiao-Min Luo, Zhen-Yu Su:

Strategy for Tasks Scheduling in Grid Combined Neighborhood Search with Improved Adaptive Genetic Algorithm Based on Local Convergence Criterion. 9-13 - Yinnan Zhang, Gang Cen, Zhigang Fang:

Study on Application of CAD Sonification. 14-17 - Zhenchun Huang

, Guoqing Li:
Building Data Grid for Spatial Information Applications by Meta-Data Adapters. 18-21 - Long Hao, Rui-Hua Di:

A Framework for Engineering Structure Experiment and Simulation Grid. 22-26 - Zhijian Wang, Ling Shang, Feng Xu:

Research and Application of Fault-Tolerance Based on Watershed Model Grid Platform. 27-30 - Hao Zhang, Yuanqiang Tan, Mingjun Li:

A Numerical Simulation of Motion of Particles under the Wafer in CMP. 31-34 - Qingfan Gu, Bing Chen, Yuping Zhang:

Dynamic Replica Placement and Location Strategies for Data Grid. 35-40 - Yu Sun, Guoqing Li:

Interoperability Research of Heterogeneous GIS Based on Spatial Information Grid. 41-44 - Congfeng Jiang, Yinghui Zhao:

GOVFiR: Grid Computing Based Online Virtual Fitting Room. 45-48 - Xingfu Wang, Lei Qina, Pingqing Wei, Fuquan Dai, Fuyou Miao:

Probabilistic Route Mechanism of Considering Communication Time - PROPHETCCT. 49-52 - Zhao Zheng, Gao Shu:

The Anatomy of Weka4WS: A WSRF-enabled Toolkit for Distributed Data Mining on Grid. 53-57 - Qing Ding, Xi Li, Xuehai Zhou:

Reputation Based Service Selection in Grid Environment. 58-61 - Xin Wang, Linpeng Huang, Yi Zhang:

A Grid Middleware DISQ for Data Integration. 62-65 - Helen X. Xiang:

A Grid-Based Distributed Database Solution for Large Astronomy Datasets. 66-69 - Yang Tao, Xing-jiang Yu:

Classified Optimization Scheduling Algorithm Driven by Multi-QoS Attributes in Economical Grid. 70-73 - Jike Ge, Yuhui Qiu, Shiqun Yin:

Web Services Composition Method Based on OWL. 74-77 - Wang Zhi-xiao, Meng Fan-rong:

Hierarchical Semantic Overlay Network. 78-81 - Gao Ren, Zhang Yun:

Scheduling Strategy in Parallel Applications Based on Ant Colony Optimization. 82-85 - Xu Xiang:

K-Chord: A Flexible Peer-to-Peer Resource Location Protocol. 86-89 - Wen Ji, Shoubao Yang, Bo Chen:

A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion. 90-93 - Wen Ji, Shoubao Yang, Fuli Liu:

Sustained Online Duration - based Reputation Management for File-Sharing Peer-to-Peer Systems. 94-97 - Feng Yang, Xiaoliang Dai, Ruzhi Xu:

The Common Problems on the Peer-to-Peer Multicast Overlay Networks. 98-101 - Chuiwei Lu, Zhitang Li, Huaiqing Lin, Qingfeng Huang:

Fault-Tolerant Routing for P2P System with Structured Topology. 102-105 - Yichuan Shao, Derong Shen:

HilbertChord: A Kind of Method for Managing Service Resources in P2P. 106-109 - Jianli Hu, Quanyuan Wu, Bin Zhou:

Distributed and Effective Reputation Mechanism in P2P Systems. 110-115 - Mande Xie, Yun Ling, Guiyi Wei:

An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping. 116-120 - Jiaqi Liu, Zhigang Chen, Deng Li, Athanasios V. Vasilakos

:
A Measurement Study of Unstructured P2P Overlay. 121-124 - Changxiong Tang, Rui Wang:

Constructing a Fractal P2P Network. 125-129 - Dengyuan Xu:

A Novel Scheduling Algorithm Based on Buffered Crossbar Switch Fabric in EPFTS Switch. 130-132 - Chunhua Xiq, Chao Gui:

A Constrained QoS Multicast Routing Algorithm in Ad Hoc. 133-136 - Priyadarsi Nanda:

Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing. 137-142 - Luo Liu, Laurie G. Cuthbert

:
Multi-rate QoS Enabled NDMR for Mobile Ad Hoc Networks. 143-146 - Wei Sun, Tao Wen, Quan Guo:

A Performance Comparison of Equation-Based and GAIMD Congestion Control in Mobile Ad Hoc Networks. 147-152 - Yingqiu Li, Minghua Chen, Tao Wen, Lei Sun:

Quality Driven Web Services Composition Based on an Extended Layered Graph. 153-156 - Jiemin Liu, Laiquan Han:

QoS-Satisfied Pathover Scheme in FMIPv6 Environment. 157-160 - Bing Tang, Zude Zhou, Quan Liu, Fangmin Li:

Market-Driven Based Resource Scheduling Algorithm in Computational Grid. 161-164 - Wenbo Zhang, Hongqi Zhang, Bin Zhang, Yan Yang:

An Identity-Based Authentication Model for Multi-domain in Grid Environment. 165-169 - Ran Li, Jiong Yu:

QoS Matching Offset Algorithm Based on Trust-Driven for Computing Grid. 170-173 - Wei Zhou, Jianjun Yu, Gang Xue, Shaowen Yao, Guowei Yu:

A Novel Reputation-Based Trust Architecture for P2P E-Commerce Systems. 174-177 - Li Meng, Liu Ruiyu:

An Overall Construction of SMIS in Chinese Enterprises. 178-181 - Yan He, Miaoliang Zhu, Chunying Zheng:

An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust Negotiation. 182-185 - Liang Hong, Xue-dong Qi, Xia Li, Zhen Li, Wenxing Wang:

Fast Cascading Replication Strategy for Data Grid. 186-189 - Dong-Min Huang, Pan Quan:

A New Nonlinear Filter Algorithm Based on QMC Quadrature. 190-193
Distributed and Parallel Computing
- Yunyi Zhang, Deyun Zhang, Jun Yang, Wei Wei:

Cluster-Based Error Messages Detecting and Processing for Wireless Sensor Networks. 194-197 - Zhiyi Yang, Yating Zhu, Yong Pu:

Parallel Image Processing Based on CUDA. 198-201 - Ren Xiu-li, Liang Hong-wei, Wang Yu:

Multipath Routing Based on Ant Colony System in Wireless Sensor Networks. 202-205 - Fenge Bai, Lifeng Huo, Li Bai, Junying Wang:

Distributed System for Transfusion Supervision Based on Embedded System. 206-210 - Xiang Li:

The Research of Time Efficiency in Adaptive Content Delivery. 211-214 - Guimin Huang, Ya Zhou:

A Request Handling Mechanism with the Shortest Processing-Time First in Web Servers. 215-218 - Haitao Li, Ge Chen:

Research and Development of Component-Based Marine Data Integration Middleware. 219-222 - Kangkang Zhang, Feng Yang, Wenyu Zhang, Peiguang Lin:

EDVO: A "One-Station" Emergency Response Service Model Based on Ontology and Virtual Organization. 223-226 - Dejun Wang, Linpeng Huang, Jiankun Wu, Xiaohui Xu:

Dynamic Software Upgrading for Distributed System Based on R-OSGI. 227-231 - Lina Zhang, Chun Yuan, Yuzhuo Zhong:

Reliable and Efficient Adaptive Streaming Mechanism for Multi-user SVC VoD System over GPRS/EDGE Network. 232-235 - Xiuyan Guo, Jun Li, Jian Yang

, Jinlin Wang
:
The Research on Dynamic Replication and Placement of File Using Dual-Threshold Dynamic File Migration Algorithm. 236-240 - Ju-Chao Zhuo, Jun Li, Gang Wu, Li-Yue Zhu:

A Novel Data Replication and Placement Scheme for Time-Shifted TV Cluster. 241-245 - Chunhua Li, Chun Yuan, Yuan Liu, Yuzhuo Zhong:

A GOP-Adaptive Priority-Based Rate-Distortion Optimization Bitstream Extraction Algorithm for Scalable Video Coding. 246-249 - Cong Zhang, Ruimin Hu:

Subjective Evaluation of Sound Quality for Mobile Spatial Digital Audio. 250-253 - Zheng-Wu Lu, Guo-Song Jiang, Long-juan Wang:

A New Method to I/O Combination on RAID Controller. 254-259 - Zheng-Wu Lu, Changsheng Xie, Guo-Song Jiang, Yu-De Wang:

Research of Improving RAID Read Performance. 260-263 - DongMei Xing:

Nonmetric Multicommodity Facility Location and K-Median Problem with Service Installation Costs. 264-269 - Jiasheng Chen, Yanqiong Ding, Xuewu Zhang, Ruiyu Liang, Dunqin Duan:

Robust Wireless Video Transmission Strategies for Video Communications. 270-274 - Huailiang Tan, Weixin Tang, Jianhua Sun:

An I/O Acceleration Technology for Network Computing: iTRM. 275-278 - Wenjun Liu, Rongqiao Wang:

Distributed Finite Element Analysis Implementation in .NET. 279-282 - Hailian Gui, Qingxue Huang:

Optimizing the FMM-BEM for 3-D Elastic Problem. 283-286 - Lilun Zhang, Xiping Gong, Junqiang Song, Jianglin Hu:

Parallel Preconditioned GMRES Solvers for 3-D Helmholtz Equations in Regional Non-hydrostatic Atmosphere Model. 287-290 - Chaojiang Fu:

Parallel Computing for Finite Element Structural Analysis on Workstation Cluster. 291-294 - Cheng Tang-pei, Wang Qun:

A Distributed Parallel Algorithm for Magnetotelluric Forward Modeling. 295-298 - Chaojiang Fu:

Parallel Finite Element Computation Based on Coarse-Fine Mesh Formulation. 299-302 - Cao Jia:

Comparison Study about Heterogeneous Size Estimation Methods. 303-306 - Xiaoqiang Zhang, Lin Peng, Lunguo Xie:

Lowering Conflicts of High Contention Software Transactional Memory. 307-310 - Wei Huang, Deyu Qi:

A Local Deadlock Detection and Resolution Algorithm for Process Networks. 311-314 - Zhang Baiyi, Cui Shangsen:

A Parallel Backward Reasoning Study Using Fuzzy Petri Net. 315-319 - Wenjun Liu:

A Parallel Algorithm for Molecule Problem Based on Interval Analysis. 320-323 - Xiaopan Zhang, Xide Fu, Xiaohui Yuan:

Simulation Based Parallel Genetic Algorithm to the Lockage Co-scheduling of the Three Gorges Project. 324-327 - Bo Li, Jun Chen, Man Yang, Erfei Wang:

Impact of Extending the Runtime of Underestimated Jobs in Backfilling Schedulers. 328-331 - Zhou Xin-lian, Gong Bo:

Intra-cluster Nodes Scheduling Algorithm Satisfying Expected Coverage Degree of Application in Distributed Clustering WSNs. 332-335 - Qian Jun, Wang Kuang:

Mobile Multimedia Distributed Share Algorithm under Multiply Access Thresholds. 336-339 - Yanhong Fan, Quanyi Lü, Yufeng Nie

:
The Parallel Algorithm for Solving Cycle Block-Tridiagonal Linear Equation. 340-342 - Qingyuan Meng, Haiyang Wang, Chunyang Xu:

A New Model for Maintaining Distributed Data Consistence. 343-346 - Qian Jun, Wang Kuang:

Fast Cell Scheduling Negotiation Algorithm in HSDPA. 347-350 - Liang Tang, Junming Hou

, Wanshan Wang, Ke Jing:
A Study on Customer Individual Demand-Oriented Networked Manufacturing System. 351-354 - Xiaoyan Zhu, Jin Lian:

A QoS Multicast Routing Protocol with Mobile Prediction Based on MAODV in MANETs. 355-358 - Zhe Li:

Complier-Directed Parallelization of a Multilevel Solver Algorithm for EDP. 359-362 - Qiong Wang, Chenglie Du, Chunyan Ma, Gang Li:

Extension of TD-pi Calculus in Real-Time Distributed Virtual-Test System Description. 363-369 - Lichun Li, Yang Ji, Chunhong Zhang, Yao Wang, Ma Tao:

Adaptor-Based Design and Implementation of Peer-to-Peer SIP. 370-373 - Guang Zheng, Jinzhao Wu, Lian Li:

Stochastic Process Algebra with Value-Passing. 374-377 - Xie Limei:

Demand-Driven Weak Clock Synchronization for Distributed Applications. 378-381 - Deng Jian, Liwen Huang, Yuanqiao Wen, Jinfeng Zhang

:
Research of Distribution Coupling Technology in Large-Scale Science Computation and Its Application in Marine Environment Forecast System. 382-385 - Wei Wei, Yabo Dong, Dongming Lu:

Space-Time Correlation Based Fault Correction of Wireless Sensor Networks. 386-389 - Lin Huo, Yi Fang, Heping Hu:

Dynamic Service Replica on Distributed Data Mining Grid. 390-393 - Kui Fu, Guihua Nie, Donglin Chen, Huimin Wang:

A Semantic Integration Framework for E-Business and Logistics Systems. 394-397 - Conrad Mueller:

Retaining the Semantics of Data with the Data. 398-402 - Qin Jie, Li Guoping, Ma Min:

An Innovative Way to Implement Hierarchical Recovery Protocol in WAN. 403-406 - Xuejuan Huang, Xinmeng Chen, Jinshuo Liu, Jiazhen Xu:

Dynamic Selection of Best Service in Semantic Web Service Community. 407-410 - Chang Wu, Yubai Li, Song Chai, Zhongming Yang:

Lottery Router: A Customized Arbitral Priority NOC Router. 411-414 - Xiwei Feng, Chuanying Jia, Jiaxuan Yang:

Semantic Web Recommendation Model of Distributing Educational Resource. 415-418 - Jae Chul Cha, Sandeep K. Gupta:

Matrix Inversion on a PIM (Processor-in-Memory). 419-422 - Song Chai, Chang Wu, Yubai Li, Zhongming Yang:

A NoC Simulation and Verification Platform Based on SystemC. 423-426 - Xianfeng Zhao:

Structural Optimization on Superscalar Processors. 427-430 - Jian Zhang, Xiaoyong Li, Haibing Guan:

The Optimization of Xen Network Virtualization. 431-436 - Guoyong Cai, Junyan Qian, Ji Gao, Yong Huang:

A Formal Framework for Policy-Governed Institutional Agency. 437-440 - Li Zhang, Shuangfei Li, Zan Yin, Wenyuan Zhao:

A Research on an ASIP Processing Element Architecture Suitable for FPGA Implementation. 441-445 - Jiabin Ruan, Jinjie Lin, Yubin Yang, Wei Wei:

A High Performance Computing Platform for 3D Model Retrieval. 446-449 - Honggang Wang, Jide Zhao, Hongguang Li, Jianguo Wang:

Parallel Clustering Algorithms for Image Processing on Multi-core CPUs. 450-453 - Changhai Zhao, Haihua Yan, Xiaohua Shi, Lei Wang:

DECF: A Coarse-Grained Data-Parallel Programming Framework for Seismic Processing. 454-460 - Annette Bieniusa

, Peter Thiemann, Stefan Wehr:
The Relation of Version Control to Concurrent Programming. 461-464 - Min Yu, Zhengyou He, Qingquan Qian:

Reliability and Safety Modeling of Fault Tolerant Control System. 465-468 - Shuzhen Wang, Lei Yu, Zhibin Liu:

A Novel Evaluating Model of CPV Vocational Ability Based on SVM Multilayer Classifier. 469-472 - Yi Liang, Lei Wang, Jianfeng Zhan, Ruihua Di:

A Performance Model for Domino Mail Server. 473-476 - QingMing Fan, Geng Liu, Hongjun Liu:

Research on Evaluation of Parts Manufacturability Based on Feature. 477-480 - Shixi Liu, Zhicai Xu, Xianwen Fang:

Dependability Research of Cluster System Based on Stochastic Petri Net. 481-485 - Qilu Sun, Guanzhong Dai, Wenping Pan

:
LPV Model and Its Application in Web Server Performance Control. 486-489 - Yanxiang He, Liang Zhao, Zhao Wu, Fei Li:

Formal Modeling of Transaction Behavior in WS-BPEL. 490-494 - Chunhong Zhang, Yang Ji, Lichun Li:

Bandwidth and Efficiency of P2PSIP Based Server Farm. 495-498 - Yuxuan Meng, Ralph Deters:

Research on the Runtime Behavior of Composite SOAP Web Services under Transient Loads. 499-504 - Yongsheng Fu, Xinyu Wang, Shanping Li:

Performance Comparison and Analysis of Routing Strategies in Mobile Ad Hoc Networks. 505-510 - Huang Yihua, Lui Zongyuan, Ling Guojun:

An Improved Bayesian-Based RFID Indoor Location Algorithm. 511-514 - Yun-Young Hwang, Hyung-Jun Yim, Il-Jin Oh, Kyu-Chul Lee

:
The Universal Adaptor for Dynamic Ubiquitous Services Discovery and Binding. 515-518 - Jianxin Zhu, Leina Gao, Xinfang Zhang:

Preliminary Research on Wearable Healthcare in Ubiquitous Computing Age. 519-523 - Ke Zuo, Dongmin Hu, Quanyuan Wu:

A Bandwidth Efficient Overlay for Information Exchange in Pervasive Computing Environment. 524-527 - Jianbo Xu, Yong He, Renfa Li:

An Energy-Aware Distributed Clustering Algorithm in Wireless Sensor Networks. 528-531 - Ping Guo, Haiyan Zhang:

Arithmetic Operation in Single Membrane. 532-535 - Dongfang Wang, Xiaogang Qi:

An Algorithm for Dynamic Routing Based on Multi-paths in Wireless Sensor Networks. 536-539 - Kerese Manueli, Savae Latu, Donald Koh:

Enhancing Pasifika Businesses Success with ICT. 540-545 - Changguang Wang, Xu Bai, Shuai Fu, Jianfeng Ma:

Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. 546-549 - Xinhua Liu, Fangmin Li, Hailan Kuang:

An Optimal Power-Controlled Topology Control for Wireless Sensor Networks. 550-554
Information Security
- Xin Liao

, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. 555-558 - Hongbin Xia, Wenbo Xu:

Research on Method of Network Abnormal Detection Based on Hurst Parameter Estimation. 559-562 - Qinghua Zhang:

A Security Design of Data Exchange Platform. 563-566 - Zhi-Dong Shen, Xiaoping Wu:

A Trusted Computing Technology Enabled Mobile Agent System. 567-570 - Yong Qi, Long Xiao, Qianmu Li:

Information Security Risk Assessment Method Based on CORAS Frame. 571-574 - Xinguang Peng, Yanyan Zhang:

Robust Host Anomaly Detector Using Strong Isolation. 575-578 - Jun Xiao, Ying Wang:

A Semi-fragile Watermarking Tolerant of Laplacian Sharpening. 579-582 - Guohua Wu, Xiaodong Zhou:

A Fast Audio Digital Watermark Method Based on Counter-Propagation Neural Networks. 583-586 - Jin Nie, Xianling Hu:

Mobile Banking Information Security and Protection Methods. 587-590 - Zhi Zhang, Guohua Cui:

A Cluster Based Secure Cryptography for Sensor Networks. 591-594 - Chunlei Fu, Li Fu:

Comprehensive Assessment Model of Network Vulnerability Based upon Refined Mealy Automata. 595-600 - Xiangdong Li, Qingxian Wang, Li Chen:

Analysis on Cyclic Multi-party Fair Exchange Protocols. 601-604 - Hao Hu, Dengguo Feng:

BIFI: Architectural Support for Information Flow Integrity Measurement. 605-609 - Diao Mingguang, Xue Tao, Pan Wenyong:

Design of Universal Authority Management Model of Online Teaching System. 610-613 - Jiemin Yan, Ru Xu, Deqing Wang, Huabin Chen, Xiaoyi Hu:

Study on MC-CDMA for Underwater Acoustic Networks. 614-617 - Zhu Na, Xiao Guo Xi:

The Application of a Scheme of Digital Signature in Electronic Government. 618-621 - Zhu Ning, Chen Xin-yuan, Zhang Yong-fu, Xin Si-yuan:

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test. 622-626 - Yingkun Hou

, Chunxia Zhao, Mingxia Liu, Deyun Yang:
The Nonsubsampled Contourlet-Wavelet Hybrid Transform: Design and Application to Image Watermarking. 627-630 - Mingyuan Yu, Xianping Huang, Li Jiang, Ronghua Liang:

Combined Public Key Cryptosystem Based on Conic Curves over the Ring Zn. 631-634 - Chen Zhuo, Zhang Zhengwen, Jiang Nan:

A Session Key Generator Based on Chaotic Sequence. 635-637 - Zhao Yang, Sun Xie-hua:

A Semi-fragile Watermarking Algorithm Based on HVS Model and DWT. 638-641 - Shaomin Zhang, Xiangjun Kong, Baoyi Wang:

Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domain. 642-645 - Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang:

A Role-Based Access Control Model for Complex Affairs. 646-650 - Chengliang Wang, Jianwei Li, Juanjuan Chen, Zhi Zhuang, Yaxin Zhou:

A Novel Strategy Enhancing Location Cloaker for Privacy in Location Based Services. 651-655 - Jiaming He, Hongbin Zhang:

Digital Right Management Model Based on Cryptography and Digital Watermarking. 656-660 - Hui Xie, Bin Zhang, Dianyou Hu:

A Role-Based Dynamic Authorization Model and Its Implementation in PMI. 661-664 - Bin Yu, Haiyan Li:

Research and Design of One Key Agreement Scheme in Bluetooth. 665-668 - Ningzhong Liu, Han Sun:

Design and Analysis of the Three-Dimensional Bar Code. 669-672 - Lei Wang, Song Ma, Xinhong Hei:

Research on an Immune Mechanism Based Intelligent Spam Filter. 673-676 - Jiping Niu, Yongchuan Zhang, Zhihua Hu, Zuqiao Yang:

A Digital Image Scrambling Method Based on AES and Error-Correcting Code. 677-680 - Lilong Han, Qingtang Liu, Zongkai Yang:

Dynamic Expression of Digital Rights by Rewriting License. 681-683 - Xia Zhuge, Koji Nakano

:
An Error Diffusion Based Algorithm for Hiding an Image in Distinct Two Images. 684-687 - Qiang Zhang, Xiaowei Wang, Zhenghu Gong:

A Role-Based Automated Trust Negotiation and Authentication Design in Mobile Ad Hoc Networks. 688-691 - Qiujuan Liang, Zhizhong Ding:

Spread Spectrum Watermark for Color Image Based on Wavelet Tree Structure. 692-695 - Zhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng:

An Extended Permission-Based Delegation Authorization Model. 696-699 - Ming-ming Xiao, Liang-Xuan Yu, Chuan-Ju Liu:

A Comparative Research of Robustness for Image Watermarking. 700-703 - Sanjay Saini, Joydip Dhar

:
An Eavesdropping Proof Secure Online Voting Model. 704-708 - Xianmin Wang, Ruiqing Niu:

Stegonograhpy for High-Resolution Color Remote Sensing Image. 709-712 - Sun Jing, Ma Yu-Jian, Zhao Hui-Qun, Xiao Hui-Bin:

A Study on the Design and Implementation of EPCIS Trust Model. 713-716 - Li-Xin Zhong, Bi-Hui Chen, Cai-Feng Liu, Li Liang:

Interplay between Network Growing and Benefit Competition. 717-720 - Silei Lei, Jun Liu, Junmo Xiao:

A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing Technology. 721-724 - Kang Hui, Liu Jing, Zhu Xiao-dong, Zhang Xiao-xu:

Study on Implementation of a FingerprintWatermark. 725-728 - Yachun Fan, Mingquan Zhou, Xingce Wang, Xinyu Liu:

Toward Color Logo Watermark to JPEG2000 Compressed Images. 729-732 - Shengbing Che, Zuguo Che, Bin Ma, Qiangbo Huang:

Semi-fragile Watermarking Algorithm Based on Image Character. 733-737 - Yanbin Fan, Wenyong Chen, Zhenkuan Pan:

An Adaptive Watermarking Algorithm in DWT Domain Based on Multi-scale Morphological Gradient. 738-741 - Ning Wang:

Seal Identification Based on Pixel Distribution Probability with Three-Mode and Nine-Section. 742-745 - Chengxi Dong, Dewei Wu, Haibo Liu:

Mining Method of Attribute Reduction Based on Rough Fuzzy Set Theory. 746-749 - Xiaojian Yu, Zhaozhang Ren:

The Valuation of American Put Option Based on Fuzzy Techniques. 750-753 - Feng Wu, Yan Zhong, Quanyuan Wu:

Network Threat Frequency Forecasting Based on Fuzzy Time Series and D-S Evidence Theory. 754-757 - Lan Yuqing, Zhao Tong:

Bayesian Network to Construct Interoperability Model of Open Source Software. 758-761 - Yanlin Qin, Xiaoping Wu:

Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. 762-765 - Youan Xiao, Zude Zhou:

A New Kind of Self-Certified Proxy Digital Signature Scheme. 766-769 - Li Lifen:

Trust Derivation and Transitivity in a Recommendation Trust Model. 770-773 - Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang:

ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. 774-777 - Jian-ping Qiu, Li-Chao Chen:

Trust Management for Semantec Web. 778-781 - De Wang, Shi-Liang Sun:

Replacement and Structure of S-Boxes in Rijndael. 782-784 - Xin-jie Zhao, Tao Wang, Dong Mi, Yuanyuan Zheng, Zhaoyang Lun:

Robust First Two Rounds Access Driven Cache Timing Attack on AES. 785-788 - Liu Peng, Zong Rui, Liu Sizuo:

A New Model for Authentication and Authorization across Heterogeneous Trust-Domain. 789-792 - Sheng Li-Yuan, Sheng Zhe, Xiao Yan-Yu:

How Homogenize Chaos-Based Pseudo-random Sequences. 793-796 - Ning Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi:

Group-Based Trust Model in P2P System Based on Trusted Computing. 797-801 - Liang Chen, Chengmin Gao:

Public Key Homomorphism Based on Modified ElGamal in Real Domain. 802-805 - Ge Xiuhui, Tian Hao:

Research on Application of Immune Digital Watermark Algorithm. 806-809 - Ge Xiuhui, Tian Hao:

Research on Application of Reversible Digital Watermark Algorithm. 810-813 - Jue Wang, Jian Peng, Daping Zhang:

Research on Dynamic Reputation Management Model Based on PageRank. 814-817 - Xiangdong Liu, Junxing Zhang, Jinhai Zhang, Xiqin He:

A New Chaotic Image Scrambling Algorithm Based on Dynamic Twice Interval-Division. 818-821 - Xuansen He, Zhun Luo:

A Novel Steganographic Algorithm Based on the Motion Vector Phase. 822-825 - Baoyuan Kang

:
Cryptanalysis on an E-voting Scheme over Computer Network. 826-829 - Yiling Wen, Jianfeng Ma:

An Aggregate Signature Scheme with Constant Pairing Operations. 830-833 - Qi Xie, Ji-Lin Wang, Deren Chen, Xiuyuan Yu:

A Novel User Authentication Scheme Using Smart Cards. 834-836 - Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong:

Chained Threshold Proxy Signature without and with Supervision. 837-840 - Suli Wu, Yang Zhang, Xu Jing:

A Novel Encryption Algorithm Based on Shifting and Exchanging Rule of Bi-column Bi-row Circular Queue. 841-844 - Li Chen, Liang Ju:

The Research of Trust Model Based on Group-Recommend in P2P Network. 845-848 - Zhang Dinghui, Gu Qiujie, Pan Yonghua, Zhang Xinghua:

Discrete Chaotic Encryption and Decryption of Digital Images. 849-852 - Xia Hong, Ning Hui-ming, Yan Jiang-yu:

The Realization and Optimization of Secure Hash Algorithm (SHA-1) Based on LEON2 Coprocessor. 853-858 - Wei Huang, Yu Meisheng:

The Quickly Solving Method of File Recovery in Windows Environment. 859-862 - Xiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu:

Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. 863-867 - Narisa Zhao, Xianfeng Zhang:

The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. 868-871 - Xuanwu Zhou, Ping Wei:

Anonymous Proxy Authorization Signature Scheme with Forward Security. 872-875 - Ki-Jong Kim, Ki-Hyun Jung, Kee-Young Yoo:

A High Capacity Data Hiding Method Using PVD and LSB. 876-879 - Tao Liu, Chi Zhang:

Approach to Worm Detection, Early Warning Based on Local Victim Behavior. 880-884 - Xu Zhujun, Yin Sijia, Shen Jia, Zheng Xingchen:

A Chaos Forecast Research on Capital Market Model. 885-888 - Chengxi Dong, Dewei Wu, Jing He:

Knowledge Reduction of Evaluation Dataset Based on Genetic Algorithm and Fuzzy Rough Set. 889-892 - Wei Zheng, Xin Meng, Huan He:

Genetic Algorithm for TDRS Communication Scheduling with Resource Constraints. 893-897 - Hui Lei, Shi Cheng, Min-si Ao, Yiqi Wu

:
Application of an Improved Genetic Algorithm in Image Segmentation. 898-901 - Zhou Lei, Sun Ying, Bu Guo-miao:

Route Research on Critical Factors of Information Construction in Textile Machinery Manufacture Business-Taking Businesses of Shaanxi Province for Example. 902-905 - Chenghua Tang, Shunzheng Yu:

Assessment of Network Security Policy Based on Security Capability. 906-910 - Zhang Yue-mei, Li Yan-xi:

Information Disclosure Quality: Factors and Measurement. 911-914 - Tianhan Gao, Nan Guo, Zhiliang Zhu:

Policy-Based Distributed Security Management Scheme in MIPv6. 915-918 - Zhengjian Zhu, Qingping Tan, Peidong Zhu, Qianbing Zheng:

Security Broadcast Based on Linear Network Coding in WSN. 919-922 - Hongye Yang, Chun Zhao, Yuewen Liu:

GIS-Based Inner Mongolia Grassland Fire Spread Simulation System. 923-925 - XiaoBing Kang, ShengMin Wei:

Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics. 926-930 - Jin-Yong Byun, Ki-Hyun Jung, Kee-Young Yoo:

Improved Data Hiding Method by Block Parity for Binary Images. 931-934 - Zhao Yantao, Ma Yunfei, Li Zhiquan:

A Robust Chaos-Based DCT-Domain Watermarking Algorithm. 935-938 - Xiang Li, Jianhua Li:

A New Blind Steganalysis Method for JPEG Images. 939-942 - Xiuying Wang, Lizhong Xiao, Zhiqing Shao:

A Danger-Theory-Based Abnormal Traffic Detection Model in Local Network. 943-946 - Zhiwen Wang, Qin Xia, Ke Lu, Jie Zhang

:
An Approach on Detecting Attack Based on Causality in Network Behavior. 947-950 - Chunfu Jia, Deqiang Chen, Kai Lin:

The Application of the Relative Entropy Density Divergence in Intrusion Detection Models. 951-954 - Qing-Hua Zhang, Ya-She Zhang, Long-Qiu Shao, Yu-zhen Fu, Hong-Fang Li, Ben-Lai Liang:

An Immunity-Based Technical Research into Network Intrusion Detection. 955-958 - Wan Tang, Yang Cao, Xi-Min Yang, Won-Ho So:

Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules. 959-963 - Nan Li, Chunhe Xia, Yi Yang, Haiquan Wang:

An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. 964-969 - Qiang Zhang, Ying Zhuo, Zhenghu Gong:

A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. 970-973 - Fanchen Su, Zhiyi Yin, Haitao Yao, Jianming Fu, Fuxi Zhu:

Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph. 974-977 - Bin Chen, Jun Gao, Juan Li, Kun Li:

The Portable PCB Fault Detector Based on ARM and Magnetic Image. 978-981 - Jian-Xia Wang, Wan-Zhen Zhou, Yun-Feng Xu:

Embedded Intrusion Detection and Authority Management System. 982-985 - Fei Ren, Liang Hu, Hao Liang, Xiaobo Liu, Weiwu Ren:

Using Density-Based Incremental Clustering for Anomaly Detection. 986-989 - MeiLing Cai:

A Novel Immunity-Based Model for Anomaly Detection. 990-993 - Bibo Jiang, Xiulin Hu:

A Survey of Group Key Management. 994-1002 - Wenmin Li, Qiao-Yan Wen:

Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves. 1003-1006 - Xiaofeng Wang, Nanning Zheng:

ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems. 1007-1010 - M. Vipin

, A. V. Sarad, Sankar Kuppan:
A Multi Way Tree for Token Based Authentication. 1011-1014 - Huifang Hou, Kaizhi Huang, Liu Guangqiang:

CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. 1015-1019 - Xiaoping Wu, Zhi-Dong Shen, Huanguo Zhang:

Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. 1020-1023 - Jiya Jiang, Tong Liu, Guifen Zhao:

A Two-Way Authentication Based on One-Time SMS4 Algorithm and Combined Symmetric Key. 1024-1027 - Zhengfeng Hou, Jianghong Han, Donghui Hu:

A New Authentication Scheme Based on Verifiable Secret Sharing. 1028-1030 - Junming Hou

, Chong Su, Yingying Su, Wanshan Wang:
Knowledge Management in Collaborative Design for Manufacture. 1031-1034 - Gang Cheng, Qingyun Du, Hongli Ma:

The Design and Implementation of Ontology and Rules Based Knowledge Base for Transportation. 1035-1038 - Zhihua Hu, Jiping Niu:

Based on SpectrumCluster High Resolution Remote Sensing Image Multi-criterion Stochastic Tree Division. 1039-1042 - Cairong Yan, Zhidong Qin, Youqun Shi:

Sequence Analysis and Anomaly Detection of Web Service Composition. 1043-1048 - Weiwei Fang, Bingru Yang:

Privacy Preserving Decision Tree Learning over Vertically Partitioned Data. 1049-1052 - Ting-ting Cen, Jian-min Han, Huiqun Yu, Yu Juan:

An Efficient Microaggregation Algorithm for Mixed Data. 1053-1056 - Xiaolin Cui, Xiaobin Tan, Yong Zhang, Hongsheng Xi:

A Markov Game Theory-Based Risk Assessment Model for Network Information System. 1057-1061 - Shouxin Wang, Li Zhang, Na Ma, Shuai Wang:

An Evaluation Approach of Subjective Trust Based on Cloud Model. 1062-1068 - Hu Ruo, Xu Hong:

Ontology-Based Description Frame of Information Security Service-Ability for Customer Demands. 1069-1072 - Hu Ruo, Chen Chao Tian:

Customer Demands-Based Formalized Expression of Information Security Resources. 1073-1076 - Jie Shi, Weiling Wu:

Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative Relaying. 1077-1080 - Xiyang Li, Cong Qin:

Combinatorial Characterizations of k-Coincidence Frequency-Hopping Sequences. 1081-1083 - Yuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi:

Research on Survivability of Mobile Ad Hoc Network. 1084-1088 - Li Li, Guosun Zeng, Bo Chen:

A Trusted Transfer Protocol Based on Property-Based Seal. 1089-1092 - Guoxiong Xu, Changzheng Ma:

Interference Cancellation/Decoding for Coded Synchronous Multi-carrier DS-CDMA. 1093-1096 - He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi:

A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. 1097-1103 - Yanxin Xue:

The Research on Data Synchronization of Distributed Real-Time Mobile Network. 1104-1107 - Xiaoling Yang, Qunxiong Zhu:

Application of Protocol Macro in Baking Temperature Control System. 1108-1112 - Humphrey Waita Njogu, Xiehua Li:

Combating TCP Based Attacks on Mobile Devices. 1113-1118 - Jing Gao, Ji-Yin Sun, Yan-Jie Chai, Bo Wang, Ling-Jiao Tao, Fei-Hu Bao:

Damaged Mechanism Research of RS232 Interface under ElectromagneticPulse. 1119-1122 - Jingjing Wu, Jiwu Jing, Jingqiang Lin:

A Decentralized Certification Authority Based on Real World Trust Relationships. 1123-1126 - Xuezhong Liu, Zengliang Liu:

Evaluating Method of Security Threat Based on Attacking-Path Graph Model. 1127-1132

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














