default search action
CIS 2009: Beijing, China
- 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers. IEEE Computer Society 2009
Intelligent Systems and Fuzzy Systems
- Yang Zhang, Zhongxiong He:
Economic Control Based on Four-Element Connection Numbers Control. 1-5 - Jinmao Xu, Yaowen Xue, Huimin Gao, Pengzhu Zhang:
Design and Implementation of Simulation System for Monitoring Capital Flow Based on Agent. 6-9 - Wei Huang, Hong Peng:
Observation Reduction for State-Action Tables. 10-14 - Qingui Xu, Guixiong Liu:
Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection. 15-20 - Yuan-Duen Lee, Wen-Chia Tsai, Sheng-Fei Hsu:
Exploring the Relationship Between Parental Information Literacy and Regulating Rules in Family by Data Mining. 21-24 - Liping Chen, Weitao Ha, Guojun Zhang:
A New Web Service Evaluation Model with Fuzzy C-Means Artificial Immune Network Memory Classifier. 25-29 - Jiayang Li, Jianhua Xu:
A Fast Multi-label Classification Algorithm Based on Double Label Support Vector Machine. 30-35 - Dukun Ding, Cunxi Xie, Xuanzi Hu:
Immune Controller Design for Vertical-Joint Industry Robot. 36-40 - Yaolong Li, Guojun Zhang:
Rank Axioms for Poset Greedoids. 41-42 - Guojun Zhang, Yaolong Li:
Global Rank Axioms of Greedoids on Partially Ordered Set. 43-44 - Ming-dong Hou, Zhicheng Zhao, Jinggang Zhang, Jie Tian:
An IMC-PID Control Method with Set-Point Weight. 45-49
Support Vector Machines, Machine Learning, and Learning Algorithms
- Fahimeh Farahnakian, Nasser Mozayani:
Reinforcement Learning for Soccer Multi-agents System. 50-52 - Hong-jun Heng, Bing-zhong Zheng, Ya-Jing Li:
Study of SVM-Based Air-Cargo Demand Forecast Model. 53-55 - Xiaoxia Han, Gang Xie, Keming Xie, Jun Ren:
Heterogeneous Catalysis Modeling Strategy Integrating Support Vector Regression and Chaotic Particle Swarm Optimization Algorithm. 56-60 - Yi Zhong, Chunguang Zhou, Lan Huang, Yan Wang, Bin Yang:
Support Vector Regression for Prediction of Housing Values. 61-65 - Long Wan, Wenxing Bao:
Research and Application of Animal Disease Intelligent Diagnosis Based on Support Vector Machine. 66-70 - Xiaohong Hu, Xu Qian:
A Novel Graph-based Image Annotation with Two Level Bag Generators. 71-75 - Tianxiang Feng, Hongxia Liu:
The Computer Realization of the QR Decomposition on Matrices with Full Column Rank. 76-79
Evolutionary Computing: Workshop
- Jiqiang Feng, Weixin Xie, Chen Xu:
A New Population Diversity Model in Intelligence Optimization Algorithms. 80-83 - Ying Gao:
An Optimization Algorithm Based on Cloud Model. 84-87 - Xinshun Ma:
A New Hybrid Evolution Genetic Algorithm with Laplace Crossover and Power Mutation. 88-91 - Hong-biao Mei, Jiang Wang, Zi-hui Ren:
An Adaptive Dynamic Ant System Based on Acceleration for TSP. 92-96 - Zan Wang, Jin-lan Liu:
Hybrid Memetic Algorithm for Uniting Classes of University Timetabling Problem. 97-101 - Nan Lu, Chunguang Zhou, Laizhong Cui:
The Application of Association Rules Algorithm on Web Search Engine. 102-108 - Fangqing Gu, Hai-Lin Liu, Ming Li:
Evolutionary Algorithm for the Radio Planning and Coverage Optimization of 3G Cellular Networks. 109-113
Swarm Intelligence
- Zhengjia Wu, Liping Zhang, Wen Wang, Kui Wang:
Research on Job-Shop Scheduling Problem Based on Genetic Ant Colony Algorithms. 114-118 - Orlando Durán, Luiz Airton Consalter:
Integrating PSO and CAM Database for Selecting Cutting Tools. 119-124 - Wenjie You, Shanshan Wu, Guoli Ji:
The Application of an Improved Particle Swarm Optimization (PSO) Algorithm in Pairwise Sequence Alignment. 125-128 - Huirong Li, Yuelin Gao:
Particle Swarm Optimization Algorithm with Adaptive Threshold Mutation. 129-132 - Liang Li, Guangming Yu, Xuesong Chu, Shibao Lu:
The Harmony Search Algorithm in Combination with Particle Swarm Optimization and its Application in the Slope Stability Analysis. 133-136 - Yuhong Duan, Sun Ying:
A Particle Swarm Optimization Algorithm with Ant Search for Solving Traveling Salesman Problem. 137-141 - Hui Zhao, Chun Feng Zhang:
Accuracy Analysis of a Parallel Robot with Particle Swarm Optimization. 142-145 - Ji Cheng:
Integration of Access Control Policy Design into Software Development. 146-150 - Ai-juan Zhang:
Research of an Improved Access Control Model in Active Networks. 151-154 - Simin Mo, Jianchao Zeng:
Performance Analysis of the Artificial Physics Optimization Algorithm with Simple Neighborhood Topologies. 155-160
Neural Networks and Distributed Systems
- Ying Zhang, Zhe-zhao Zeng:
Neural Network Algorithm for the Simultaneous Extraction of All Roots of Algebraic Polynomial. 161-164 - Jinjian Xiao, Jingyu Liu:
Early Forecast and Recognition of the Driver Emergency Braking Behavior. 165-168 - Xinjian Zhuo, Yongmei Su:
One Application of CNN in Word-Processing. 169-172 - Guo-Jian Cheng, Lei Cai, Hua-Xian Pan:
Comparison of Extreme Learning Machine with Support Vector Regression for Reservoir Permeability Prediction. 173-176 - Jiali Hou, Nengshan Feng:
A Research on the Function Relationships in the Modularization Immunity Neural Network Model. 177-181 - Jun Wang, Jian-Wen Chen, Yongliang Wang, Di Zheng:
Intelligent Load Balancing Strategies for Complex Distributed Simulation Applications. 182-186 - Xizhe Zhang, Ying Yin, Mingwei Zhang, Bin Zhang:
Web Service Community Discovery Based on Spectrum Clustering. 187-191
Watermarking, Cryptography, and Coding
- Xuewen Xia, Yuanxiang Li, Zhuliang Xia, Rong Wang:
Data Encryption Based on Multi-granularity Reversible Cellular Automata. 192-196 - Jianqin Zhou, Wei Xiong, Zemao Zhao, Lin You:
The Tight Error Linear Complexity of Periodic Sequences. 197-201 - Yichun Zhang, Lei Yang, Pin Xu, Yong-Song Zhan:
A DRM Authentication Scheme Based on Smart-Card. 202-207 - Manman Geng, Futai Zhang:
Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing. 208-212 - Xueming Wang, Nan Cui:
Research of Security Mobile Payment Protocol in Communication Restrictions Scenarios. 213-217 - Xiaoyan Yang, Zhen Liu:
The Security Matrix Factorization Agreement with Two Parties. 218-221 - Hui Zhu, Hui Li, Yumin Wang:
An Efficient Fast Authentication Protocol. 222-225 - Yipin Lin, Xiaofeng Wang:
A Hase-based SAKA Protocol Algorithm. 226-228 - Hao Cao, Shimin Wei, Zepeng Zhuo:
Relations between Annihilator Immunity of Boolean Functions and Affine Spaces. 229-232 - Yan Wang, Ming Hu:
Timing Evaluation of the Known Cryptographic Algorithms. 233-237 - Yuan-Yuan Li:
AOP-Based Attack on Obfuscated Java Code. 238-241 - Gong Bei, Shi Guangyuan:
An Anonymous Attestation Scheme of TPM. 242-245 - Hongru Wei, Zhiyin Kou:
Research and Application of Digital Watermark for Video Copyright Protection. 246-250 - Weijia Jiang, Jiguo Li:
Authenticated Tree Based Group Key Agreement. 251-255 - Xiaoming Hu, Zhe Zhang, Yinchun Yang:
Identity Based Proxy Re-Signature Schemes without Random Oracle. 256-259 - Yali Jiang, Xiuling Ju:
Lattice-Based CCA-Secure Cryptosystem from IBE System. 260-264 - Xiu-mei Wen, Wei Zhao, Fan-xing Meng:
Research of a Digital Image Watermarking Algorithm Resisting Geometrical Attacks in Fourier Domain. 265-268 - Mingjie Chen, Kefeng Fan, Wei Mo, Subing Zhang:
Implementation and Evaluation of a Novel Audio Watermarking Scheme. 269-272 - Na Wang, Xia Li, Lingjun Liu:
An Adaptive Multi-objective Image Watermarking Scheme for QIM Using NSGA-II. 273-277 - Dexin Yang, Bo Yang:
A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card. 278-282 - Baoheng Shan, Bin Zhang:
Research on Role-Based Joint Authorization Administration Model. 283-287 - Manman Geng, Futai Zhang:
Batch Verification for Certificateless Signature Schemes. 288-292 - Lianfen Huang, Ying Huang, Zhibin Gao, Jianan Lin, Xueyuan Jiang:
Performance of Authentication Protocols in LTE Environments. 293-297 - Gang Xu, Geng Zhao, Lequan Min:
An Extended Method for Obtaining S-Boxes Based on Discrete Chaos Map System. 298-302 - Hui-long Jin, Guo-dong Liang, Zhi-Hua Liu, Cheng-qian Xu:
The Necessary Condition of Families of Odd-Periodic Perfect Complementary Sequence Pairs. 303-307 - Jian-lin Huang, Fei-peng Li:
Quick Similarity Measurement of Source Code Based on Suffix Array. 308-311 - Huijuan Xiao, Wen Zeng:
A Hard Disk Encryption System Realized by the Digital Signal Processor. 312-314 - Min-Qing Zhang, Bin Dong, Xiaoyuan Yang:
A New Self-Updating Hash Chain Structure Scheme. 315-318
Information and Security Management
- Hu Ming, Wang Yan:
The Collision Rate Tests of Two Known Message Digest Algorithms. 319-323 - Syed Muhammad Khaliq-ur-Rahman Raazi, Heejo Lee, Sungyoung Lee, Young-Koo Lee:
BARI: A Distributed Key Management Approach for Wireless Body Area Networks. 324-329 - Yinan Zhang, Ning Du, Miao Qi, Chengxi Wang, Jun Kong:
Association Analysis and Content-Based Information Hiding Approach with High Hiding Capacity. 330-334 - Xin Liu, Neng Wang:
Random Walk-Based Tor Circuit Building Protocol. 335-340 - Shijie Ren, Su Xin:
Digital Watermarking Based on Fast Independent Component Analysis and Discrete Wavelet Transform. 341-343 - Jun Gao:
Computer-Vision-Based Identification of Nail's Surface Shape. 344-347 - Guangliang Liu, Lingyun Li, Shengxian Xie, Junqing Li:
Secret Sharing System and Secret Sharing Matrix. 348-351 - Peng Wu, Guoxin Wu:
A Reputation-Based Trust Model for P2P Systems. 352-356 - Bin Qin, Jian-fei Pan, Guang-Zhong Cao, Ge-guo Du:
The Anti-spoofing Study of Vein Identification System. 357-360 - Qiming Liu, Rui Xu, Shaojie Wang:
Modelling and Analysis of an SIRS Model for Worm Propagation. 361-365 - Yangui Xu, Xiangchun Li, Jiachun Zhou, Huanyan Qian:
Worm Detection in an IPv6 Internet. 366-370 - Li Yao, Yu Liu, Yuqing Zhang:
An Integrated Approach to Worm Detection and Automatic Signature Generation. 371-375 - Xiaosong Zhang, Fei Liu, Ting Chen, Hua Li:
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention. 376-379 - Jianyong Wang, Yuling Li, Yuhua Liu, Xiu Jing:
Cluster and Recommendation Based Multi-granularity Trust Model in P2P Network. 380-384 - Yun Deng, Xiao-hui Cheng:
A Study on the Security Technology of Enterprise Mobile Information System. 385-391
Wireless Network Security
- Chuanrong Zhang, Yuqing Zhang:
New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme. 392-396 - Daowen Hua, Xuehui Du, Yanbin Qian, Shaoge Yan:
A DTN Routing Protocol Based on Hierarchy Forwarding and Cluster Control. 397-401 - Enguo Zhu, Guoliang Wu, Gongxun Yang:
Network Security Protection Solutions of Electric Power Enterprise Based on VPN Technology. 402-405 - Zhiyuan Xie, Junhui He, Shaohua Tang:
A CPK-Based Security Scheme at Network Layer. 406-410 - Kai Wei, Shaohua Tang:
A Multi-level Trust Evaluation Model Based on D-S Theory for Grid. 411-415 - Ru Li, Liaojun Pang, Qingqi Pei, Guozhen Xiao:
Anonymous Communication in Wireless Mesh Network. 416-420 - Songbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia:
SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. 421-425 - Bin Yang:
Study on Security of Wireless Sensor Network Based on ZigBee Standard. 426-430 - Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. 431-435 - Xiaonan Wang, Dongniang Cheng:
FIMFS: Failure Inferencing Based IP Multicast Fast Self-Healing Approach. 436-440 - Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks. 441-445
Data and Network Security
- Changzheng Xu, Yaqi Wang, Qiang Wei, Qingxian Wang:
A Novel Trust Model Based on Temporal Historical Data for Access Control. 446-449 - Junhao Geng, Sumei Zhang:
Full Business Model Oriented Access Control Method. 450-454 - Songyun Liu, Hejiao Huang:
Role-Based Access Control for Distributed Cooperation Environment. 455-459 - Guoqi Li, Yang Xiao, Minyan Lu, Yuchao Zhang:
A Formal Method Based Case Study for Access Control. 460-463 - Kai-mei Zheng, Xu Qian, Pei-chong Wang:
Dimension Reduction in Intrusion Detection Using Manifold Learning. 464-468 - Li-zhong Geng, Hui-bo Jia:
A Novel Intrusion Detection Scheme for Network-Attached Storage Based on Multi-source Information Fusion. 469-473 - Yang Song, Yuqing Zhang, Yingfei Sun:
Automatic Vulnerability Locating in Binary Patches. 474-477 - Ning Wang, Zhijun Liu, Yuping Huang:
Applying Dynamic Labels of the Biba Model in Forensic Evidence Analysis. 478-482 - Danfeng Zhao, Wei Zhao, Ying Wang, Feng Gao, Qi He, Guohua Liu:
Creating the Cryptograph Index by Query Frequencies in DAS Models. 483-487 - Ning Wang, Wei Zhao, Ying Wang, Qi He, Guohua Liu:
Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases. 488-492 - Jinhong Cui, Xu Wang:
SNS Based Information Authorization Delegation Mechanism and Implementation. 493-497 - Lequan Min, Xiaobo Jiang, Youyan Fu, Yunhao Yi, Yan Meng, Hai Yan:
Nonlinear Regression Based Analysis on Cyanobacteria Blooms and Water Quality in a Beijing Shallow Lake. 498-504 - Li-hua Zou, Yun-cheng Liu:
A New Algorithm of Counting Human Based on Segmentation of Human Faces in Color Image. 505-509 - Xu Xiang:
Providing Efficient Secure DHTs Routing. 510-514
Other Applications
- Yuanyuan Liu, Haibin Yu, Zhiwei He, Xueyi Ye:
Fast Robust Face Detection under a Skin Color Model with Geometry Constraints. 515-519 - Gang Yang, Ziye Yan, Hong Zhao:
Touching String Segmentation Using MRF. 520-524 - Rong Guo, Yuhui Wang:
A Hybrid Approach of Hazard Estimation for Chemical Hazard Installations. 525-528 - Yun Liu, Peng Zhang:
Vision-Based Human-Computer System Using Hand Gestures. 529-532 - Pengfei Li, Jiakun Li:
Application of Communication and Remote Control in PLC Based on ZigBee. 533-536 - Yong-bao Liu, Mi Zhou, Xing He:
Fault Diagnosis of the Gas Turbine Based on Multi-operating Condition Information Fusion. 537-540 - Han Yi, Ikou Kaku, Gengui Zhou, Jianhu Cai, Huazhen Lin:
An Application of Particle Swarm Optimization to Uncapacitated Multilevel Lot-Sizing Problems with Series Structure. 541-544 - Zhou Jia, Guo Yun Fei:
Guaranteeing Maximum Reliability and Minimum Delay QoS Routing Based on WF2Q. 545-549 - Hongge Sun, Weisheng Wang, Yi Cao, Shenxue He, Xin Yan:
Application of Fuzzy Data Fusion in Multi-sensor Environment Monitor. 550-553 - Lan Wang, Qian Zhang:
A New Method of Generating Robot-Used Maps. 554-557 - De Jun Li, Le Ping Xu:
The Design for Warp Knitting Machine Traversing Control System Based on DSP. 558-562 - Xintian Liu, Changhong Liu, Lihui Zhao, Hu Huang:
The Random Thermal Analysis with Universal Grey Number in the Electronics. 563-566 - Li Ren, Xin-yi Xiang:
Research on the Energy Analysis of Lake Ecological Functions. 567-570 - Yi Liu, Man Sha:
Research on Prediction of Traffic Flow at Non-detector Intersections Based on Ridge Trace and Fuzzy Linear Regression Analysis. 571-575 - Yunpeng Wang, Haiyang Yu, Shiwu Li, Yi Chen:
Research on Temporal and Spatial Data Models Based on GIS for Urban Traffic Planning Information Support System. 576-579 - Shichong Tan, Hui Zhu, Yumin Wang:
Some Notes on Password Authenticated Key Exchange Based on RSA. 580-583 - Yong Zeng, Jianfeng Ma, Qinqi Pei, Lihua Dong:
A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management. 584-586 - Jianwen Feng, Anding Dai, Francis R. Austin, Ling He:
Anti-synchronization of Two Different Hyperchaotic Systems with Fully Uncertain Parameters. 587-591 - Dingxie He, Hongxia Liu:
The Application of Elementary Transformation. 592-597 - Zeng-li Liu, Shuang Xu, Haiyan Quan, Yi-gang Guo:
Study of Spectrum Analysis Based on EMD Adaptive Filter. 598-600 - Bolin Liu, Shaochuan Fu:
Efficiency Measurement of Logistics Public Companies Basing on the Modified DEA Model. 601-605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.