


default search action
CIS 2011: Sanya, Hainan, China
- Yuping Wang, Yiu-ming Cheung, Ping Guo, Yingbin Wei:

Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2008-6
Intelligent Computation
- Junfeng Chen, Tiejun Wu:

A Cloud Model Based Computational Intelligence Algorithm for Parameter Identification of Chaotic Systems. 1-5 - Dalian Liu, Jinling Du, Xiaohua Chen:

A Genetic Algorithm Based on a New Fitness Function for Constrained Optimization Problem. 6-9 - HeCheng Li:

A Genetic Algorithm Based on Duality for Linear Bilevel Programming Problems. 10-14 - Jiafei Li, Jihong Ouyang, Mingyong Feng:

A Heuristic Genetic Process Mining Algorithm. 15-19 - Jinhua Li, Jie Liu:

A Hybrid Method for Solving Global Optimization Problems. 20-23 - Ning Dong, Yuping Wang:

A Hybrid Multiobjective Differential Evolution Algorithm Based on Improved έ-Dominance. 24-28 - Xiaofang Guo:

A Hybrid Simplex Multi-objective Evolutionary Algorithm Based on Preference Order Ranking. 29-33 - Lixiao Ma, Zhanfang Zhao, Shu-Qing Chen:

A Line-up Competition Differential Evolution Algorithm for the Generalized Assignment Problem. 34-37 - Liu Jie:

A new filled function algorithm for constrained global optimization problems. 38-41 - Yuhong Duan, Yuelin Gao:

A New Improved Particle Swarm Optimization Algorithm. 42-46 - Yun Ling, Qiu-yan Cao, Hua Zhang:

Application of the PSO-SVM Model for Credit Scoring. 47-51 - Xiao-Bin Guo:

Approximate Solution of Fuzzy Sylvester Matrix Equations. 52-56 - Xiaoli Wang, Yuping Wang:

Energy-efficient Multi-task Scheduling Based on MapReduce for Cloud Computing. 57-62 - Yun-yuan Dong, Yang Jun, Qi-jun Liu, Yong-Xian Wang

, Zhenghua Wang:
Exploring Centrality-Lethality Rule from Evolution Constraint on Essential Hub and Nonessential Hub in Yeast Protein-Protein Interaction Network. 63-65 - Deng-Xu He, Hua-Zheng Zhu, Gui-Qing Liu:

Glowworm swarm optimization algorithm for solving multi-constrained QoS multicast routing problem. 66-70 - Lai Nian, Jinhua Zheng:

Hybrid Genetic Algorithm for TSP. 71-75 - Ben Niu, Hong Wang, Lijing Tan, Li Li:

Improved BFO with Adaptive Chemotaxis Step for Global Optimization. 76-80 - Huirong Li, Yuelin Gao, Li Chao, Peng-Jun Zhao:

Improved differential evolution algorithm with adaptive mutation and control parameters. 81-85 - Junwei Ge, Xian Jiang, Yiqiu Fang:

Improvement of the MapReduce Model Based on Message Middleware Oriented Data Intensive Computing. 86-89 - Feng Chen, Xinxin Sun, Dali Wei

:
Inertia Weight Particle Swarm Optimization with Boltzmann Exploration. 90-95 - Yan-Yan Tan, Yong-Chang Jiao, Xin-Kuan Wang:

MOEA/D with Uniform Design for the Multiobjective 0/1 Knapsack Problem. 96-100 - J. Q. Feng, C. Xu, W. X. Xie:

Monitoring the PSO Process Based on Fuzzy Random Variables. 101-105 - Jinling Du, Chunxiao Wang, Feng Zhang:

Multi-objective Optimization of Bus Dispatching Based on Improved Genetic Algorithm. 106-109 - Zhendong Liu, Zhijun Zhang, Zaixue Liu, Daming Zhu:

New Heuristic Algorithm of RNA Secondary Structure Prediction with Pseudoknots. 110-114 - Xiang You Li, Qing Xiang Zhang:

Optimality Conditions for Fractional Programming with B (p, r, a) Invex Functions. 115-118 - Shulei Wu, Huandong Chen, Dachao Li:

Phylogenetic Tree of DNA Sequences Constructed by a New Method-H Curve. 119-122 - Liumei Zhang, Jianfeng Ma, Yichuan Wang, Shaowei Pan:

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction. 123-126 - Zhenqiu Liang:

Research of Blocking Factor Combined with Improved Ant Colony Algorithm in VRP. 127-130 - Bi-Ying Zhou:

Research on Nonlinear Predictive Control Rolling Optimization Strategy Based on SAPSO. 131-134 - Shengjie Sun, Sheng Zhong, Baihai Zhang:

Researching on the Growth Operator SWFZIRS of Growth Evolution Algorithms. 135-138 - Kai Peng, Jing Xu, Wei Liu, Xiaohui Chen, Jian Wu:

Resource Optimization for Uncertain Traffic Demand in Multi-radio Multi-channel Wireless Networks. 139-143 - Jihong Jia:

Sufficient Optimality Conditions and Duality for a Minmax Fractional Problem. 144-148 - Weiqi Chen

, Zhifeng Hao, Hai-Lin Liu:
The 0/1 Multi-objective Knapsack Problem Based on Regional Search. 149-153 - Chengmin Sun, Dayou Liu:

The Overview of Feature Selection Algorithms Based Swarm Intelligence and Rough Set. 154-158 - Liping Jia, Yuping Wang, Lei Fan:

Uniform Design Based Hybrid Genetic Algorithm for Multiobjective Bilevel Convex Programming. 159-163
Intelligent Systems and Complex Systems
- Fengdan Lao, Guanghui Teng:

3G-based Remote Video Surveillance and Control System for Facility Agriculture. 164-167 - Ziqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu:

A Cloud Model Approach to the Modification of the Exponential Function Model for Software Reliability. 168-170 - You Li, Yuming Lin, Lingzhong Zhao:

A Comparative Study on Appending Priority Relations of Rules in BDI-Based Agent Model. 171-175 - Jianhui Yang, Yuan Wang:

A fuzzy portfolio model considering transaction costs. 176-179 - Xin Gao, Qingxuan Jia, Huan Hu

, Hanxu Sun, Jingzhou Song:
A Human-Computer Interaction Method with Multi-Dimensional Information in the Teleoperation Augmented Reality System. 180-184 - Wei Lu, Yian Zhu

, Chunyan Ma, Longmei Zhang:
A Model Driven Approach for Self-Healing Computing System. 185-189 - Jun Hu, Chun Guan:

A Model of Emotional Agent Based on Granular Computing. 190-194 - Ziqiang Luo, Peng Cao, Guochun Tang, Lihua Wu:

A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory. 195-198 - Chunsheng Li, Kan Li:

A Practical Framework for Agent-Based Hybrid Intelligent Systems. 199-203 - Lingyan Sun, Shizhan Chen, Qixuan Liang, Zhiyong Feng:

A QoS-based Self-adaptive Framework for OpenAPI. 204-208 - Jiang-feng Luo, Luohao Tang, Cheng Zhu, Wei Ming Zhang:

Action-Seeking Team Coordination for Unmanned Vehicles Team Planning. 209-213 - Liping Chen:

Adaptive Evaluation Model of Information System by Triangular Fuzzy Number. 214-218 - Cequn Fu, Shulei Wu, Sheng Zhong:

Algorithm of Distribution Estimation for Node Localization in Wireless Sensor Network. 219-221 - Xirong Xu, Aihua Deng, Wenhua Zhai:

An Important Property about Vertex Distance of Crossed Cubes CQn. 222-225 - Wenyi Zeng, Shuang Feng:

An Improvement of Comprehensive Evaluation Model. 226-230 - Lingling Hu, Haifeng Li, Xu Xu, Jian Li:

An Intelligent Vehicle Monitoring System Based on Internet of Things. 231-233 - Xiaoya Li, Songsen Yu:

An Optimal Architecture of Middle Agents in Multi-Agent Systems. 234-238 - Camilla Schwind:

Belief Base Change on Implicant Sets: How to Give Up Elements of a Belief Based on Literal Level. 239-243 - Bo Yang:

Communities Detection with Applications to Real-World Networks Analysis. 244-248 - Zhiming Wang, Hong Bao:

Cooperative Neural Network Background Model for Multi-Modal Video Surveillance. 249-254 - Hong Han, Fengju Kang, Shengjie Wang:

Design of Intelligent Decision-making System in Multi-UUV Formation Control Simulation. 255-257 - Juan Zhao, Mingchun Wang, Kun Liu, Can Wang

:
Discretization Based on Positive Domain and Information Entropy. 258-262 - Jingyi Wang

, Jianwen Feng, Yi Zhao:
Exponentially Synchronization of Stochastic Complex Networks with Time-varying Delays and Switching Topology via Pinning Control. 263-267 - Liu Liu, Zhenhan Liu, Lu Xu, Junwei Zhang:

FBctlr - A Novel Approach for Storage Performance Virtualization. 268-272 - Limin Han, Deyuan Gao, Xiaoya Fan, Liwen Shi, Jianfeng An:

Global Prefetcher Aggressiveness Control for Chip-Multiprocessor. 273-277 - Shaojuan Yu, Junjun Song:

Iterative Learning Control of Double Servo Valve Controlled Electro Hydraulic Servo System. 278-282 - Se-Hang Cheong, Kai-Ip Lee, Yain-Whar Si

, Leong Hou U
:
Lifeline: Emergency Ad Hoc Network. 283-289 - Sheng Gao, Guohui Li, Pei Zhao:

Marshmallow: A Content-Based Publish-Subscribe System over Structured P2P Networks. 290-294 - Yajuan Yang, Lian Ren:

Multi-Agents Model Analysis for the Evolution of Industrial Clusters. 295-299 - Yi Zhao, Jianwen Feng, Jingyi Wang

:
On Cluster Synchronization for Linearly Coupled Complex Networks. 300-304 - Xia Liu, Chao Yang:

Optimization of Vehicle Routing Problem Based on Max-Min Ant System with Parameter Adaptation. 305-307 - Ziqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu:

Qualitative Modeling for Parallel Software System Reliability Evaluation. 308-311 - Jun Chen, Xiong Shi:

Real-time LOD Algorithm Based on Triangle Collapse Optimization. 312-315 - Fei Gong, Lun Xie, Nan Li, Zhi-Liang Wang:

Research of Rapid Attention-Information Extraction in Human-Robot Interaction. 316-320 - Yuan-xin Liang:

Robust Stability for Uncertain Neutral Systems with Time-varying and Distributed Delays. 321-324 - Yanfei Yu, Yonglin Min:

Simulation of Influence of Desired Velocity Distribution and Herd Effect on Pedestrian Evacuation. 325-328 - Qian Yin, Ruiyi Luo, Ping Guo

:
Software Fault Prediction Framework Based on aiNet Algorithm. 329-333 - Hao Peifeng:

Study on Friction Coefficient Mechanism Model of Tandem Cold Mill in Unstable Condition. 334-337 - Sheng-Quan Ma, Fu-chuan Chen, Qiang Wang, Zhi-qing Zhao:

The Design of Fuzzy Classifier Based on Sugeno Type Fuzzy Complex-Value Integral. 338-342 - Yao Lu, Gang Liu, Wei Chen, Jesper Ø. Olsen:

Voice-based Local Search Using a Language Model Look-ahead Structure for Efficient Pruning. 343-347 - Yong-lin Liu, Xiao-bo Cai:

Weak-pseudo-R0 Algebras. 348-352
Neural Networks and Neural Systems
- Xingbao Gao, Jing Wang:

A Neural Network for a Class of Horizontal Linear Complementary Problems. 353-357 - Ruliang Wang, Jie Li:

Adaptive Neural Control for a Class of Perturbed Time-delay Nonlinear Systems. 358-361 - Kai Zhu, Huaguang Song, Jinzhu Gao, Guojian Cheng:

Application of Evolutionary Neural Networks for Well-logging Recognition in Petroleum Reservoir. 362-366 - Quan-ju Zhang:

Artificial Neural System Method for Solving Nonlinear Programming with Linear Equality Constraints. 367-370 - Yanshuang Meng:

Existence and Global Attractivity of Almost Periodic Solution of Hopfield Neural Networks with Time Delays. 371-374 - Xuefei Wu, Chen Xu:

Global Synchronization of Hybrid Coupled Neural Networks with Time-varying Delay. 375-380 - Tzai-Der Wang, Xiaochuan Wu, Colin Fyfe:

Minimal Echo State Networks for Visualisation. 381-385 - Gaochang Zhao:

Predictions for Coal Spontaneous Combustion Stage Based on an Artificial Neural Network. 386-389 - Shuo Wang, Kaiying Xu, Yong Zhang, Fei Li:

Search Engine Optimization Based on Algorithm of BP Neural Networks. 390-394 - Feng Guo, Chen-yu Liu, Su-qin Zhang, Bin Zhou:

Spares Consumption Prediction Based on BP Neural Network. 395-397 - Chen-yu Liu, Feng Guo, Yuan-lei Li, Su-qin Zhang:

Spares Consumption Quota Model Based on BP Neural Network. 398-400 - Yingchun Fu, Xiantie Zeng, Xueyu Lu:

Spatial Prediction of Dissolved Organic Carbon Using GIS and ANN Modeling in River Networks. 401-406 - Shujun Long, Liping Jia:

Stability Analysis of Neutral-type Fuzzy Neural Networks with Distributed Delays. 407-411 - Ming Chang, Hongwei Chen, Yingying Wang, Yueou Ren, Hao Kang:

The Application of Neural Network in the Intelligent Fault Diagnosis System. 412-415
Learning Algorithms
- Yanping Zhang, Xiaoyan Chen, Bo Hua, Yuan Zhang:

A Maximal Clique Partition Method for Network Based on Granularity. 416-420 - Huamin Feng, Xinghua Yang, Biao Liu, Chao Jiang:

A Spam Filtering Method Based on Multi-modal Features Fusion. 421-426 - Haiping Zhu, Yan Chen, Yang Yang, Chao Gao:

A Topic Partition Algorithm Based on Average Sentence Similarity for Interactive Text. 427-430 - Bing Guo, Yan Shen, Xiaobin Liu, Qi Li, Jihe Wang, Yuan Sheng Wu:

An Embedded Software Fusion Power Model Based on Algorithm and Micro-architectural Level. 431-435 - Yong Liu, Shizhong Liao:

An Error Bound for Eigenvalues of Graph Laplacian with Bounded Kernel Function. 436-440 - Zhao Liu, Rui Zhang, Denghua Mei, Xi Zheng:

An Improved Software Reliability Model Considering Fault Correction Rate. 441-444 - Yunhui He:

Class-Incremental Kernel Discriminative Common Vectors. 445-449 - Meiyin Dai, Fanzhang Li:

Dynamic Fuzzy Semisupervised Multitask Learning. 450-454 - Xiaoqiang Jia:

Feature selection algorithm based on the Community discovery. 455-458 - Peng Jin, John Carroll, Yunfang Wu, Diana McCarthy:

Improved Word Similarity Computation for Chinese Using Sub-word Information. 459-462 - Shu Zhao, Chao Xu, Yanping Zhang, Jun Ma:

Multi-Side Multi-Instance Algorithm. 463-467 - Changqing Liu, Wencai Luo:

Probabilistic Trajectory Modeling of Flight Vehicles Based on Parameter Deviations. 468-471 - Juan Enrique Agudo

, Colin Fyfe:
Reinforcement Learning for the N-Persons Iterated Prisoners' Dilemma. 472-476 - Guihua Wen, Lijun Jiang:

Relative Local Mean Classifier with Optimized Decision Rule. 477-481 - Yanping Zhang, Bo Hua, Juan Jiang, Yuan Zhang, Xiaoyan Chen:

Research on the Maximum Flow in Large-scale Network. 482-486 - Jiajia Hu, Ning Wang:

The Application of Graph Theory in Old Chinese Phonology Study. 487-491 - Mengxuan Dong, Fanzhang Li:

The Estimation Algorithm of Laplacian Eigenvalues for the Tangent Bundle. 492-496 - W. Q. Zhang, C. Xu:

Time Series Forecasting Method Based on Huang Transform and BP Neural Network. 497-502
Information Security, Computer Security and Intergrity
- Baoming Qiao, Zhang Pulin, Kang Qiao:

A Digital Watermarking Algorithm Based on Wavelet Packet Transform and BP Neural Network. 503-506 - Jianhua Che, Tao Zhang, Weimin Lin, Houwei Xi:

A Markov Chain-based Availability Model of Virtual Cluster Nodes. 507-511 - Yanping Zhang, Juan Jiang, Chao Xu, Bo Hua, Xiaoyan Chen:

A New Scheme for Information Hiding Based on Digital Images. 512-516 - Yue Qi, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu:

A security testing approach for WSN protocols based on object-oriented attack model. 517-520 - Liping Qian, Lidong Wang:

A Study on IT-security Vocabulary for Domain Document Classification. 521-525 - Salvatore Distefano

, Antonio Puliafito:
Achieving Distributed System Information Security. 526-530 - Ke Wang, Weidong Yang, Ji-Zhao Liu, Dan-tuo Zhang:

An Adaptive Connectivity Data Dissemination Scheme in Vehicular Ad-hoc Networks. 531-535 - Junwei Ge, Cong Tao, Yiqiu Fang:

Architecture for Component Library Retrieval on the Cloud. 536-539 - Ning Zhu, Xingyuan Chen, Yongfu Zhang:

Construction of Overflow Attacks Based on Attack Element and Attack Template. 540-544 - Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu:

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. 545-549 - Chao Rong Li, Ming Qing Huang, Jianping Li:

Fingerprint Composition-Feature Extraction Using Directional Filter Banks. 550-554 - Shanshan Li, Yinghai Zhao:

Image Scrambling Based on Chaos Theory and Vigenère Cipher. 555-558 - Xing-Lan Zhang, Weiwei Liu:

Improving Privacy of Property-based Attestation without a Trusted Third Party. 559-563 - Jie Ling, Ju Liu, Jiande Sun, Jianping Qiao, Feng Wang, Feng Feng:

Information Hiding Algorithm Based on Stentiford Visual Attention Model. 564-567 - Bo Song, Shengwen Gong, Shengbo Chen:

Model Composition and Generating Tests for Web Applications. 568-572 - Xiang Fan, William W. Guo, Mark Looi:

Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms. 573-577 - Qi He, Huifang Li:

Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow. 578-582 - Hua Huang, Yuan Ding:

Orthogonal Test Algorithm on TD-SCDMA Network Optimization. 583-587 - Xing Yang, Yubao Liu, Zhan Li, Jiajie Mo:

Privacy Preserving Naïve Bayesian Classifier Based on Transition Probability Matrix. 588-592 - Liquan Chen, Miao Lu, Jingbo Chen:

Researches and Simulations of Information Hiding in Alamouti Transmission System. 593-597 - Huimei Wang, Ming Xian, Guoyu Wang:

Testing Anti-denial of Service Attacks Based on Mobile Agent. 598-602 - Luan Lan:

The AES Encryption and Decryption Realization Based on FPGA. 603-607 - Jihai Huang, Yu Su, Min Cao:

The Implementation of Trust Model in the P2P Patch Distribution System. 608-611
Security Methodologies and Management
- Yisheng Xue, Shulei Wu, Huandong Chen:

A Blakley Secret Sharing Scheme without Trusted Share Distributed Center. 612-614 - Jie Wang, Yongquan Cai:

A Rational Secret Sharing Scheme Based on Repeated Game. 615-619 - Chao-Qin Gao, Chuang-Bai Xiao:

A Security Model for Information Systems with Multi-level Security. 620-624 - Jianting Ning, Xinchun Yin, Ting Yang:

A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks. 625-629 - Fang Shen, Qingqi Pei, Shu-po Bu:

A Trust-based Dynamic Secure Service Discovery Model for Pervasive Computing. 630-634 - Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li:

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. 635-639 - Litao Wang, Bin Yu:

Analysis and Measurement on the Electromagnetic Compromising Emanations of Computer Keyboards. 640-643 - Haibo Wu, Shenghui Su:

Analysis of the Success Rate of the LLL Lattice Basis Reduction. 644-647 - Shuxin Liu, Jianhua Peng, Caixia Liu:

Analysis of Wireless Mesh Network Security Based on Node Function. 648-652 - Kun Gu, Liji Wu, Xiangyu Li, Xiangxin Zhang:

Design and Implementation of an Electromagnetic Analysis System for Smart Cards. 653-656 - Jiawei Wu, Guohua Liu:

Modeling the Uncertain Data in the K-anonymity Privacy Protection Model. 657-661 - JieYuan Li, Guohua Liu:

On the Representation and Querying of Sets of Possible Worlds in the K-anonymity Privacy Protecting Model. 662-664 - Ben Niu, Hui Li, Xiaoyan Zhu, Chao Lv:

Security Analysis of Some Recent Authentication Protocols for RFID. 665-669
Network & Wireless Security
- Rongrong Jiang, Tieming Chen

:
A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks. 670-673 - Yun Niu, Liji Wu, Li Wang, Xiangmin Zhang, Jun Xu:

A Configurable IPSec Processor for High Performance In-Line Security Network Processor. 674-678 - Miao Zhang, Jingying Li:

A Fast Handoff Method Based on RSSI and LQI in Wireless Sensor Network. 679-684 - Xiangdong Li, Li Chen:

A Survey on Methods of Automatic Protocol Reverse Engineering. 685-689 - Xu Xiang:

A Sybil-resilient Contribution Transaction Protocol. 690-692 - Shirui Ji, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu:

An Automated Black-box Testing Approach for WSN Security Protocols. 693-697 - JiongCheng Li, Henghui Xiao, Xibin Lin, Yanbo Zhao:

An Efficient Closed-form Solution of Synchronization and Channel Estimation in UWB. 698-702 - Weichang Li, Hongning Li, Min Xie, Shupo Bu:

An Identity-based Secure Routing Protocol in WSNs. 703-706 - Chunling Wang, Fei Yang:

An Interactive Charge Scheme with Reward and Non-repudiation. 707-711 - Xiaolong Xie, Xinsheng Ji, Caixia Liu:

Analysis of Abnormal Events in IMS and Research on the Strategy of Detection. 712-716 - Dong Li, Jiang Fei Bo:

Design of the DS-UWB Communication System Based on Chaotic Variable Spreading Factor. 717-720 - Jun Hu, Zeng Ma, Chunsheng Sun:

Energy-efficient MAC Protocol Designed for Wireless Sensor Network for IoT. 721-725 - Yong-mao Cheng, Wang-da Chen, Hui Qu, Tian-yi Cai:

Joint Synchronization and Channel Estimation Algorithm of FH-OFDM Systems in Aviation Mobile Communications. 726-730 - Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen:

Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. 731-735 - Tianzhen Cheng, Ping Li, Sencun Zhu:

Multi-jammer Localization in Wireless Sensor Networks. 736-740 - Wei Li, Guangye Li, Chunlei Liu:

Query-Aware Anonymization in Location-Based Service. 741-745 - Fei Li, Shuming Xiong, Liangmin Wang:

Recovering Coverage Holes by Using Mobile Sensors in Wireless Sensor Networks. 746-749 - Yafen Shen, Jiaxi Chen, Jing Yuan, Ning Huang:

Reliability Analysis of System-in-the-Loop Network Platform Based on Delays. 750-753 - Jiang Hong Guo, Jian Feng Ma, Xiu Qiang Wu:

Secure Data Aggregation Scheme for Clustered Wireless Sensor Networks. 754-758 - Fang Qun, Wu Xu, Xu Yong:

Stochastic Modeling File Population in P2P Network. 759-763 - Guojun Zhang, Liping Chen, Weitao Ha:

The Design of Cooperative Intrusion Detection System. 764-766 - Hao Chen, Dingyi Fang

, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Lang Qin:
The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring. 767-770
Authentication and Authorization
- Jianrong Xi:

A Design and Implement of IPS Based on Snort. 771-773 - Huixian Li, Ping Yin, Xuan Wang, Liaojun Pang:

A Novel Hash-based RFID Mutual Authentication Protocol. 774-778 - Thomas Studer

:
An Application of Justification Logic to Protocol Verification. 779-783 - Jing Qiu, Ping Wang:

An Image Encryption and Authentication Scheme. 784-787 - Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma:

Analysis of the Authentication Protocols Based on Game Theory. 788-792 - Vrizlynn L. L. Thing, Tong-Wei Chua, Ming-Lee Cheong:

Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving. 793-797 - Zhen Su, Lian-Hai Wang:

Evaluating the Effect of Loading Forensic Tools on the Volatile Memory for Digital Evidences. 798-802 - Liang Chen, Yongquan Cui, Xueming Tang, Dongping Hu, Xin Wan:

Hierarchical ID-Based Blind Signature from Lattices. 803-807 - Shaobo Wu, Chengshu Li:

Identity-based SIP Authentication and Key Agreement. 808-811 - Zhang Qun, Yingmin Wang:

Obtaining the Resonant Frequency of the Bubble in the Ship Wake by ANSYS. 812-816 - Yanqiong Zhu, Hui Xu, Zhan Gao:

Security Authentication Scheme Based on Certificateless Signature and Fingerprint Recognition. 817-820 - YunCheng Liu, Xingchun Sun, Xiaoqin Mao:

Security Problems and Countermeasures with Commercial Banking Computer Networks. 821-825 - Baojiang Cui, Ce Bian, Tao Guo, Yongle Hao, Jianxin Wang:

Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process. 826-830 - Chufeng Zeng, Qingxian Wang:

Systematical Vulnerability Detection in Browser Validation Mechanism. 831-836 - Junfeng He, Hui Sun:

The Analysis of Influence Factors of the Confidence Level on University Students' Network Shopping. 837-841 - Yi Ding, Lei Fan:

Traitor Tracing and Revocation Mechanisms with Privacy-Preserving. 842-846
Cryptography and Cryptanalysis
- Yilei Wang, Qiuliang Xu:

2-out-of-2 Rational Secret Sharing in Extensive Form. 847-851 - YinDong Chen:

A Construction of Balanced Odd-variable Boolean Function with Optimum Algebraic Immunity. 852-855 - Qing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang:

A New Cross-realm Group Password-based Authenticated Key Exchange Protocol. 856-860 - Junping Yao

, Zefeng Dong, Xinshe Li:
A Novel Group Signature Scheme Based on NTRU. 861-864 - Yonglong Luo, Chao Cheng, Cai-xia Chen, Hong Zhong:

A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space. 865-869 - Yan-yan Han, Xiao-ni Cheng, Wen-cai He:

A Watermarking-based Visual Cryptography Scheme with Meaningful Shares. 870-873 - Yaobin Wang, Hong An, Zhiqin Liu, Kang Xu, Wanli Dong:

Accelerating Block Cryptography Algorithms in Procedure Level Speculation. 874-877 - Wei Fu, Guang-liang Liu:

An ID-based (k, t, n) Threshold Group Signature Scheme. 878-881 - Fei Xiang, Xiao-cong Guo:

An Image Encryption Algorithm Based on Scrambling and Substitution Using Hybrid Chaotic Systems. 882-885 - Caifen Wang, Xiaojun Cao

:
An Improved Signcryption with Proxy Re-encryption and its Application. 886-890 - Na Zhao, Shenghui Su:

An Improvement and a New Design of Algorithms for Seeking the Inverse of an NTRU Polynomial. 891-895 - Xiaobo Feng, Mingqiang Wang:

Attack on the Cryptosystem Based on DLP. 896-899 - Hao Wang, Qiuliang Xu, Han Jiang, Rui Li:

Attribute-Based Authenticated Key Exchange Protocol with General Relations. 900-904 - Changji Wang, Jiasen Huang:

Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism. 905-909 - Ming Luo, Chun-hua Zou, Jianfeng Xu:

Certificateless Broadcast Signcryption with Forward Secrecy. 910-914 - Leibo Li, Tao Zhan:

Co-Z Addition Operation of Hessian Curve. 915-919 - Rui Li, Qiuliang Xu, Hao Wang:

Concurrent Non-malleable Statistically Hiding Commitment. 920-924 - Jing-feng Li, Weifeng Guo, Lai-shun Zhang, Yun-peng Li:

Cryptoanalysis and Improvement of Verifier-based Key Agreement Protocol in Cross-Realm Setting. 925-929 - Qian Zeng, Guorui Feng:

Differential Energy Watermarking Based on Macro-block Prediction. 930-933 - Yi Ding, Lei Fan:

Efficient Password-Based Authenticated Key Exchange from Lattices. 934-938 - Keke Wu, Huiyun Li, XuCheng Yin, Guoqing Xu:

Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks. 939-943 - Jinman Zhang, Qin Chen:

Hierarchical Identity-based Broadcast Encryption Scheme on Lattices. 944-948 - Xu An Wang

, Ziqing Wang, Yi Ding, Shujun Bai:
K-times Proxy Re-encryption. 949-953 - Xunxun Shen, Maozhi Xu, Yanhui Zhao:

Multi-Undeniable Signature Schemes. 954-958 - Xinshan Zhu, Shuoling Peng:

Novel Quantization Watermarking Based on Random Angle Modulation. 959-963 - Xinchun Yin, Ting Yang, Jianting Ning:

Optimized Approach for Computing Multi-base Chains. 964-968 - Weidong Zhong, Xu An Wang

, Ziqing Wang, Yi Ding:
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. 969-973 - Yanyan Han, Xiaoni Cheng, Dong Yao, Wencai He:

VVCS: Verifiable Visual Cryptography Scheme. 974-977
Access Control and Protection
- Yuxin Meng

, Lam-for Kwok
:
A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. 978-982 - Hassina Bensefia, Nacira Ghoualmi-Zine:

A New Approach for Adaptive Intrusion Detection. 983-987 - Adriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta:

A Security API for Multimodal Multi-biometric Continuous Authentication. 988-992 - Dingde Jiang, Peng Zhang, Zhengzheng Xu, Cheng Yao, Wenda Qin:

A Wavelet-Based Detection Approach to Traffic Anomalies. 993-997 - Chao Wang, Xing-yuan Chen, Na Li:

An Access Control Mode Based on Information Flow Graph. 998-1000 - Chen-Guang He, Cun-Zhang Cao, Shu-Di Bao:

An Enhanced Role-Based Access Control Mechanism for Hospital Information Systems. 1001-1005 - Hua Jiang, Liaojun Pang:

Fast Network Traffic Anomaly Detection Based on Iteration. 1006-1010 - Takamasa Isohara, Keisuke Takemori, Ayumu Kubota:

Kernel-based Behavior Analysis for Android Malware Detection. 1011-1015 - Jozsef Hegedus, Yoan Miche

, Alexander Ilin, Amaury Lendasse
:
Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers. 1016-1023 - Xi-hong Wu:

Performance Analysis of the Single Pattern Matching Algorithm Based on Prefix Searching. 1024-1027 - Siyuan Xin, Yong Zhao, Yu Li:

Property-Based Remote Attestation Oriented to Cloud Computing. 1028-1032 - Xiaoyi Duan, Ronglei Hu

, Xiu Ying Li:
Research and Implementation of DPA-resistant SMS4 Block Cipher. 1033-1036 - JianGuo Ju, Weihe Chen, Yongzhao Zhan:

Research of Access Control in Electronic Medical Record Based on UCON. 1037-1040 - Fenghua Li, Yinyan Xu, Dongdong Li, Jinghui Zhang:

Research on Access Control Mechanism for Digital Products Trading. 1041-1045 - Zhenghong Liu, Yuhong Jia, Tieli Sun:

Study on Role-Based Access Control with Time Constraint. 1046-1048 - Li Han:

Using a Dynamic K-means Algorithm to Detect Anomaly Activities. 1049-1052
Pattern Recognithion and Knowledge Discovery
- Haifeng Zhang, Jianzhong Cao, Linao Tang, Huawei Wang:

A New Algorithm for Auto-Exposure Based on the Analogy Histogram. 1053-1056 - Wei He, Wen-Sheng Chen, Bin Fang:

A Novel Subspace Discriminant Locality Preserving Projections for Face Recognition. 1057-1061 - Yang Zheng, Chunping Liu, Zhaohui Wang, Yi Ji, Shengrong Gong:

A Saliency Detection Model Based on Multi-feature Fusion. 1062-1066 - Chen Xu, Xiaoli Sun, Min Li:

A secondary image denoising model based on the local energy operator. 1067-1070 - Hengbo Zhao, Lixiong Liu:

Active Contours with Adaptively Normal Biased Gradient Vector Flow External Force. 1071-1075 - Yan-xin Shi, Yongmei Cheng:

Adaptive Filter for Color Impulsive Removal Based on the HSI Color Space. 1076-1080 - Ji-Wei Wu, Judy C. R. Tseng, Wen-Nung Tsai:

An Efficient Linear Text Segmentation Algorithm Using Hierarchical Agglomerative Clustering. 1081-1085 - Wang Hui, Zhou Zhi Guo, Jie Long Mei:

Automatic Detection of Lumina in Mouse Liver Immunohistochemical Color Image Using Support Vector Machine and Cellular Neural Network. 1086-1090 - Taiquan Huang, Wen-Sheng Chen:

Automatic Parameter Determination Based on a Modified Discriminant Criterion for Face Recognition. 1091-1094 - Baochuan Pang, Long Zhou, Wu Zeng, Xinge You:

Cell Nuclei Detection in Histopathological Images by Using Multi-curvature Edge Cue. 1095-1099 - Bin Li, Haibo Kuang, Xiaohe Chen, Xuri Tang, Chen Chen:

Construction of a Bilingual Cognitive Property Knowledgebase. 1100-1103 - Xin Zheng, Xiumin Zhang, Fuqing Duan, Wei Liu:

Contours-Matching in Building Reconstruction from a Single Image. 1104-1108 - Taerim Lee, Bon Min Goo, Hun Kim, Sang-Uk Shin:

Efficient e-Discovery Process Utilizing Combination Method of Machine Learning Algorithms. 1109-1113 - Zheng-Chun Sun, Jian Cheng:

Face Recognition with Statistical Local Line Binary Pattern. 1114-1117 - Donghua Huang, Fuqing Duan, Qingqiong Deng, Zhongke Wu, Mingquan Zhou:

Face Reconstruction from Skull Based on Partial Least Squares Regression. 1118-1121 - Yanjun Fu, Weiqiang Wang:

Fast and Effectively Identify Pornographic Images. 1122-1126 - Yu Li, Zhou Xue:

Fast Iris Boundary Location Based on Window Mapping Method. 1127-1130 - Yiping Xu, Jing Tan, Hongping Li, Yan Tian:

Image Matching Algorithm Based on Analysis of Reliability in Log-Polar Field. 1131-1135 - Chun-Hsien Chou, Yun-Hsiang Hsu:

Image Quality Assessment Based on Binary Structure Information. 1136-1140 - Zhenglian Su, Jun Yan, Haisong Chen, Jiaojiao Zhang:

Improving the Performance of Personalized Recommendation with Ontological User Interest Model. 1141-1145 - Yuxiang Jia

, Hongying Zan, Ming Fan:
Inducing Chinese Selectional Preference Based on HowNet. 1146-1149 - ShiSong Zhu, Liang Chen, Shuhong Cao:

Knowledge Discovery Method from Abnormal Monitoring Data. 1150-1153 - Fanyi Xiao, Yixiong Liang

, Xiaohui Qu:
Learning Local Binary Patterns with Enhanced Boosting for Face Recognition. 1154-1158 - Souleymane Balla-Arabé, Bin Wang, Xinbo Gao:

Level Set Region Based Image Segmentation Using Lattice Boltzmann Method. 1159-1163 - Yu Hou, Caikou Chen

:
Local Reconstruction Error of l2 Norm for Discriminant Feature Extraction. 1164-1168 - Junlin Hu

, Ping Guo
:
Multi-Level Kernel Machine for Scene Image Classification. 1169-1173 - Wenyao Zhang, Manrui Zhang, Bo Sun:

Multiresolution Streamline Placement for 2D Flow Fields. 1174-1178 - Wenzhang He, Rui Liu, Ruimin Zhao:

Parabolic Adjustment of Image Clearness Algorithm Based on Retinex Theory. 1179-1183 - Guolong Gan, Jian Cheng:

Pedestrian Detection Based on HOG-LBP Feature. 1184-1187 - Xingbao Wang, Chunping Liu, Gong Liu, Long Liu, Shengrong Gong:

Pedestrian Recognition Based on Saliency Detection and Kalman Filter Algorithm in Aerial Video. 1188-1192 - Liu Jing, Xiong Jie:

Research and Implementation on the Digital Medical Image Enhancement Methods Based on Gradient Smooth and Context Smooth. 1193-1196 - Zhenhuan He:

Research on Improved Greedy Algorithm for Train Rescheduling. 1197-1200 - Tanchao Zhu, Weiming Wang

, Ping Liu, Yongming Xie:
Saliency-based Adaptive Scaling for Image Retargeting. 1201-1205 - Shenhai Yan, Yang Liu, Xiantong Huang:

Schistosoma Cercariae Image Recognition via Sparse Representation. 1206-1210 - Xiaohui Tian, Rong Wang:

Soft-Voting Classification using Locally Linear Reconstruction. 1211-1214 - Bingxin Xu, Ping Guo

:
Sparse Representation for Multi-Label Image Annotation. 1215-1219 - Lifang Xue, Xiu-shuang Yi:

Speech Feature Analysis Using Temporal Linear Embedding. 1220-1223 - Yi Wang, Wenyao Zhang, Jianguo Ning:

Streamline-based Visualization of 3D Explosion Fields. 1224-1228 - Guojian Cheng, Caiyun Shi, Kai Zhu, Kevin Gong:

The Application of Binary Particle Swarm Algorithm in Face Recognition. 1229-1233 - Min Li, Chen Xu, Xiaoli Sun, Weiqiang Zhang:

The Iterative Regularization Method Based on Image Decomposition Model. 1234-1237 - Hui Liu, Chen Xu, Wenming Cao:

The Multispectral Image Edge Detection Based on Clifford Gradient. 1238-1242 - ShuangCheng Ma:

Using the Callback Function Realization Touch Screen Gestures Recognition of Computer. 1243-1245
Data Mining
- Baozhi Qiu, Shuang Wang:

A Boundary Detection algorithm of clusters based on Dual Threshold Segmentation. 1246-1250 - Jing Cai, Heng Li, Bo Lang:

A Combined Music Label Propagation Model. 1251-1255 - Rui Sun

, Peng Jin, Juan Lai:
A Method for New Word Extraction on Chinese Large-scale Query Logs. 1256-1259 - Qi Luo:

A New Community Structure Detection Method Based on Structural Similarity. 1260-1262 - Qi Wang, Xin-Ping Liu:

A Real Time Multi-Scale Correlation Analysis Method and its Application on the Data Mining in Thermodynamic Process. 1263-1267 - Haifeng Li, Ning Zhang:

A Simple But Effective Stream Maximal Frequent Itemset Mining Algorithm. 1268-1272 - Junjie Yang, Hai-Lin:

A Weighted K-hyperline Clustering Algorithm for Mixing Matrix Estimation on Bernoulli-Gaussian Sources. 1273-1278 - Wei Li, Jibiao Liao:

An Empirical Study on Credit Scoring Model for Credit Card by Using Data Mining Technology. 1279-1282 - Chun Guan, Xiaoqin Zeng:

An Improved ID3 Based on Weighted Modified Information Gain. 1283-1285 - Xing Wang:

Analysis on Cloud Computing-based Logistics Information Network Mode. 1286-1289 - Pengyuan Liu:

Another View of the Features in Supervised Chinese Word Sense Disambiguation. 1290-1293 - Ru Xue, Zong-Sheng Wu, A.-Ning Bai:

Application of Cloud Storage in Traffic Video Detection. 1294-1297 - Lin Wang, Xiuling Zhou:

Approximation Kernel 2DPCA by Mixture of Vector and Matrix Representation. 1298-1302 - Wu Zeng, Long Zhou, Xiubao Jiang, Xinge You, Mingming Gong:

Clustering Based Image Denoising Using SURE-LET. 1303-1307 - Aijun Yang, Ping Song:

Data Mining Technique in the Internal Auditing of Enterprise Groups. 1308-1311 - Longqing Shi, Qingfeng Zhao:

Data Sources of Webometrics. 1312-1315 - Wei He, Xiaoping Yang, Dupei Huang:

Measuring Semantic Relatedness between Words Using Lexical Context. 1316-1320 - Changqing Liu, Wencai Luo:

Methodology for Statistical Distribution Determination of Various Data Sources. 1321-1324 - Huaping Jia:

Neural network in the application of EEG signal classification method. 1325-1327 - Rong Wang:

Normalizing Modularity Matrices for Data Clustering. 1328-1330 - André Fabiano de Moraes, Lia Caetano Bastos

:
Pattern Recognition with Spatial Data Mining in Web: An Infrastructure to Engineering of the Urban Cadaster. 1331-1335 - Li Sun, Ming Zhu, Jiyun Li:

Promotion Analysis Based on Fitting in Multi-Level Space. 1336-1340 - Peng Lin, Jianhui Yang:

Research on characteristics of plates on Chinese stock market. 1341-1344 - Lei Zhang, Jie Liu:

Research on Industrial Building's Reliability Assessment Based on Projection Pursuit Model. 1345-1349 - Qiu Lu, Xiao-hui Cheng:

Research on Privacy-preserving in Distributed Mining Based on the Attribute Similarity. 1350-1353 - Changqing Liu, Wencai Luo:

Sequential Bayesian Method for Formulating Uncertainty in Sparse Data. 1354-1356 - Yanfei Zuo, Guohua Liu, Xiaoli Yue, Wei Wang, Honghua Wu:

Similarity Matching over Uncertain Time Series. 1357-1361 - Weidong Zhao, Xi Liu, Anhua Wang:

Simplified Business Process Model Mining Based on Structuredness Metric. 1362-1366 - Chuanyi Fu, Huandong Chen, Jieqing Xing:

Spectral Clustering and its Research Progress. 1367-1369 - Yifang Yang, Guoqiang Chen, Yanchun Guo:

SVM Combined with FCM and PSO for Fuzzy Clustering. 1370-1373 - Bingchun Lin, Guohua Liu:

The Classification of k-anonymity Data. 1374-1378 - Jiechang Wen, Taowen Wang:

The Estimation of Mixing Matrix Based on Bernoulli-Gaussian Model. 1379-1383 - Zhengfeng Ming, Rui Wen:

The Finite Element Analysis of the Electromagnetic Levitation System Based on the Large Air Gap. 1384-1386 - Yanping Cao, Chunmei Gong:

The Problem about Grey Incidence Cluster Analysis. 1387-1389 - Li Juan:

TKNN: An Improved KNN Algorithm Based on Tree Structure. 1390-1394
System Analysis and Modeling
- Wang Wei, Tan Enmin, Feng Bing:

A Data Distribution Platform Based on Event-Driven Mechanism. 1395-1399 - Qiguang Miao

, Pengfei Xu, Weisheng Li, Hai Zhu:
A General Edge Detection Method Based on the Shear Transform. 1400-1404 - Yanchun Guo, Ganglian Ren, Yifang Yang:

A Lower Bound for the Smarandache Function Value. 1405-1407 - Zhenghai Ai

:
A New Method for Interval Multiple Attribute Decision Making Based on Minimum Variance and Approach Degree. 1408-1412 - Hai Zhu, Zengfa Dou, Wengang Zhou:

A Novel Two-stage Analysis Method for Customer's Requirement. 1413-1417 - Xinhong Hei, Lining Chang, Weigang Ma, Guo Xie

:
A Safety Framework and Alarming Model for Train Operation Environment Based on CPS. 1418-1421 - Weitao Ha:

Achievement of Proxy Cache System for Streaming Media Based on Patch Algorithm. 1422-1424 - Ziqing Nie, Shiying Yang:

An Implementation Method for Converting the Erhu Music from Wav to Mid. 1425-1429 - Wei Zhao:

Analysis of the Impact of Polarization Mode Dispersion on Optical Fiber Communication. 1430-1432 - Xin Lai, Cong Liu, Zhiying Wang, Quanyou Feng:

Analytical Models for Data Dependence Violation Checking in TLS. 1433-1437 - Jun Chen, Xiong Shi:

CFD Numerical Simulation of Exhaust Muffler. 1438-1441 - Yuxiang Yang, Gengui Zhou:

Closed-loop Supply Chain Network Horizontal Integration Problem. 1442-1446 - Tianxiang Feng, Hongxia Liu:

Computer Realization of Quadratic Spline Interpolation. 1447-1450 - Rong Shan:

Constructing the Expandability Web Service Based Linux. 1451-1455 - Hong Zhang, Sheng Zhong:

Co-op Advertising Analysis within a Supply Chain Based on the Product Life Cycle. 1456-1460 - Su Zou, Chuanri Li, Fei Xu, Liang Qiao:

Correlation Factor Analysis of FEA Model Simplification Methods of Printed Circuit Board. 1461-1465 - Qiuxiang Feng, Degen Huang, Xiuying Li, Rongpei Wang:

DBS Application to Chinese Adjectives. 1466-1470 - Chuanyi Fu, Jinmei Zhan, Juntao Chen:

Design and Implement of SerialPort class on Upper machine System. 1471-1473 - Min Luo, Haiquan Wang, Chunhe Xia, Lihua Wang, Ya Wang:

Design and Implementation of Bus Net Routing Algorithm. 1474-1478 - Jianhua Kang, Fangyi She, FangZheng Yang, Tao Wang:

Design of Instrument Control System Based on LabView. 1479-1483 - Jianhui Yang, Peng Lin:

Dynamic risk measurement of futures based on wavelet theory. 1484-1487 - Lan Li:

Existence of Almost Periodic and Almost Automorphic Solutions for Second Order Differential Equations. 1488-1492 - Feng Tian, Chenghui Zhang:

Experimental Study the Measurement of Acoustic Wave Flight Time under Strong Noise in the Boiler. 1493-1496 - Zheng Lv, Hao Chen, Feng Chen, Yi Lv:

Fast Verification of Memory Consistency for Chip Multi-Processor. 1497-1502 - Chongnan He:

Finite Volume Methods for the Second Order Singular Perturbation Problems. 1503-1506 - Guoqi Li:

FTA Based Runtime Evaluation of System Reliability for Autonomous Unmanned Vehicle. 1507-1509 - Sulin Pang, ShouYang Wang

:
Geometric Recognitions Models of Fault Characteristics in Mobile Core Network. 1510-1514 - Min Jiang, Zhiqing Meng, Xinsheng Xu, Rui Shen, Gengui Zhou:

Multiobjective Interaction Programming for Two-Persons. 1515-1519 - Yanli Wang:

Multi-user Detection Method for MIMO-OFDM Uplink Transmission. 1520-1523 - Yiu-ming Cheung

, Junping Deng:
Off-line Text-independent Writer Identification Using a Mixture of Global and Local Features. 1524-1527 - Feng Tian, HaiYang Wang, Xiaoping Sun, Jia Liu, Chuanyun Wang:

Optimization Plan of Using the Arrival and Departure Track in District Station Based on Hybrid Algorithm. 1528-1531 - Wei-wei Zheng, Li-gui Luo, Lei Zhao:

Qualitative Analysis for a Kind of Predator-Prey Model of Holling III-Function Response with Nonlinear Density Dependent. 1532-1535 - Jing Zhang, Jinjie Zhang:

Relative Stability of Solution for Hua's Macroeconomic Model. 1536-1538 - Ruliang Wang, Dongmei Gao, Yanbo Li:

Robust Adaptive Sliding Mode Control Design for a Class of Uncertain Neutral Systems with Distributed Delays. 1539-1541 - Ruizhong Wang:

Stock Selection Based on Data Clustering Method. 1542-1545 - Peng Sun, Xin Guo:

Structural Health Monitoring via Dynamic Visualization. 1546-1548 - Yuanguai Lin:

The Application of the Internet of Things in Hainan Tourism Scenic Spot. 1549-1553 - Daiwen Wu:

The Application Study about Lucene in Document Retrieval for Office. 1554-1556 - Chao Deng, Sulin Pang:

The BSC Alarm Management System Based on Rough Set Theory in Mobile Communication. 1557-1561 - Jiangfeng Yu, Youju Qi:

The Construction and Application of Distance and Open Experimental Platform. 1562-1565 - Jiatong Chen, Yong Wang:

The Guidance and Control of Small Net-recovery UAV. 1566-1570 - Zong-ji Li, Shan-Zheng Cheng, Lei Ren:

The Simulation of Trajectory for Homing Depth Charge Attacking the Submarine with Different Guide Orderliness. 1571-1575 - Guang Deng, Zengyuan Li:

The Study of Improved Marker-Controlled Watershed Crown Segmentation Algorithm. 1576-1579 - Xiaoying Pan, Hao Chen:

Using Organizational Evolutionary Particle Swarm Techniques to Generate Test Cases for Combinatorial Testing. 1580-1583 - Ren Liang:

VAR Model Analysis on Japan's OFDI and Industrial Structural Upgrading. 1584-1588

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














