


default search action
ICYCS 2008: Zhang Jia Jie, Hunan, China
- Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3398-8

- Ebrahim Malalla

:
Multiple-Choice Allocations with Fixed Densities. 1-8 - Dongmei Lin, Xiangbin Wu, Dong Wang:

Exact Heuristic Algorithm for Traveling Salesman Problem. 9-13 - Wanfu Ding, Ruifeng Guo

:
Design and Evaluation of Sectional Real-Time Scheduling Algorithms Based on System Load. 14-18 - Yaohui Li, Yong Feng, Jiwei Xue:

An Improved Method for Computing Dixon Polynomial. 19-24 - Xiaogang Qi

, Lifang Liu, Sanyang Liu:
An Algorithm for Dynamic Optimal Path Selection with Constraint. 25-30 - Xianxia Zou, Weijia Jia, Jiuhui Pan, Wei Du:

The Partition Transform Algorithm of Join Query. 31-35 - Bo Li, Hong Li, Min Wu, Ping Li:

Multi-label Classification based on Association Rules with Application to Scene Classification. 36-41 - Xiaohua Liu, Chunguang Zhou, Libiao Zhang, Huipeng Sheng, Jiangchun Li:

Quick Searching Based on L-K Means Hierarchical Clustering in a Huge Scale Face Database. 42-47 - Yang Li, Yan Sun, Chengshan Han, Xiaodong Wang, Shuyan Xu:

Algorithm Research of Flexible Graphplan based on Heuristic. 48-53 - Tian Xia:

An Edit Distance Algorithm with Block Swap. 54-59 - Tianyan Deng, Daoyun Xu:

Hardness of Approximation Algorithms on k-SAT and (k, s)-SAT Problems. 60-64 - Xiuqin Wang, Hao Wang, Guangsheng Ma:

Hybrid SAT Solver Considering Circuit Observability. 65-70 - Qiang Zou, Dan Feng:

OpenMail File System Workloads Analysis and Characterization. 71-76 - Yunhui Shi, Shaoyuan Yue, Baocai Yin, Yi Huo:

A Novel ROI-Based Rate Control Scheme for H.264. 77-81 - Jia Wu, Ling Chen:

A Fast Frequent Subgraph Mining Algorithm. 82-87 - Jitian Xiao, Jun Wang:

A Type of Variation of Hamilton Path Problem with Applications. 88-93 - Chenguang Luo:

From Word Automata to Tree Automata. 94-99 - Ebrahim Malalla

:
Estimation of the k-Orientability Threshold. 100-105 - Bin Yao, Haisen S. Li, Tian Zhou, Baowei Chen:

Theoretical Research on Topological Properties of Generalized K-Ary n-Cube Interconnection Network. 106-111 - Sheng Zhang, Xiaoling Bao, Jian Shu, Sha Chen:

Comparative Research of XML Compression Technologies. 112-117 - Zhiming Chang, XinJun Mao, Zhichang Qi:

Formal Analysis of Architectural Policies of Self-Adaptive Software by Bigraph. 118-123 - Guisheng Fan, Huiqun Yu, Dongmei Liu, Liqiong Chen:

Modeling and Analyzing Time Constrains for Service Composition. 124-129 - Shukuan Lin, Shaomin Zhang, Jianzhong Qiao, Hualei Liu, Ge Yu:

A Parameter Choosing Method of SVR for Time Series Prediction. 130-135 - Lasheng Yu, Fei Hong, PengRen Wang, Yang Xu, Yong Liu:

Influence Graph based Task Decomposition and State Abstraction in Reinforcement Learning. 136-141 - Chihang Yau, Yiyu Tan, Anthony Shi-Sheung Fong, Pak Lun Mok:

An Extensive Hardware/Software Co-design on a Descriptor-Based Embedded Java Processor. 142-147 - Rui Gong, Kui Dai, Zhiying Wang:

Transient Fault Recovery on Chip Multiprocessor based on Dual Core Redundancy and Context Saving. 148-153 - Wanxia Qu, Yang Guo, Zhengbin Pang, Xiaodong Yang:

Efficient Verification of Parameterized Cache Coherence Protocols. 154-159 - Yu Deng, Li Wang, Xiaobo Yan, Xuejun Yang:

A Double-Buffering Strategy for the SRF management in the Imagine Stream Processor. 160-165 - Jieqiong Li, Dan Feng:

Implementation and Evaluation of a Dynamic Schedule Policy for Multi-user Request in Network-Attached Disk Array. 166-171 - Qiong Li, Zhengbin Pang, Yufeng Guo, Enqiang Zhou, Xuejun Yang:

A GPDMA-based Distributed Shared I/O Solution for CC-NUMA System. 172-177 - Jiaxin Li, Ning Deng, Caixia Liu, Mengxiao Liu, Zuo Wang, Qi Zuo:

FG-NC: A Schedule Algorithm of Designing Concurrent Multi-direction Data Switch Structure. 178-182 - Jinbing Peng, Xiang Long, Limin Xiao:

DVMM: A Distributed VMM for Supporting Single System Image on Clusters. 183-188 - Abhijit Ray, Wu Jigang, Thambipillai Srikanthan

:
Performance Estimation: IPC. 189-193 - Yonggang Che:

Evaluating the Data Access Efficiency of Imagine Stream Processor with Scientific Applications. 194-199 - Xinbiao Gan, Kui Dai, Zhiying Wang:

Low-Level Component for OpenGL ES Oriented Heterogeneous Architecture with Optimization. 200-205 - Limin Fan, Yongbin Zhou, Dengguo Feng:

A Fast Implementation of Computing the Transparency Order of S-Boxes. 206-211 - Lei Wang, Zhiying Wang, Kui Dai:

Performance Bound Analysis and Retiming of Timed Circuits. 212-217 - Di Yao, Dan Feng:

Intrusion Detection for Object-Based Storage System. 218-222 - Yuanzhe Yao, Binxing Fang, Xinran Liu, Hong Zhang:

Autonomic Grid Node Organization and Management in RNMS. 223-228 - Yang Yang, Huanguo Zhang, Li Wan, Bingyu Zou:

Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. 229-233 - Yufeng Wang, Akihiro Nakao:

On Evolution of Cooperative Overlay Network Based on Group Selection Mechanism. 234-239 - Chuanliang Xia:

Property Preservation by Petri-Net-Based Refinements in System Design. 240-246 - Rui Yang, Shijie Zhou, Chengyu Fan:

A New Algorithm for Network Diameter. 247-252 - Rami S. Youail, Wenqing Cheng, Shaoguo Tao:

Cost Minimization for Multi-Source Multi-Sinks Network Coding. 253-258 - Jinxiang Zhang, Jiahai Yang, Jianping Wu:

A Novel Management Information Retrieval Algorithm Based on NGI. 259-263 - Zhijian Wang, Dingguo Wei:

A Class of Petri Nets for Modular and Hierarchical System Modeling. 264-269 - Laiquan Han, Jinkuan Wang, Cuirong Wang:

A Crosslayer Concurrent Multipath Random Forward Algorithm. 270-275 - Naijing Hu, Huan Zhou, Liang Zhao:

Privacy-Preserving Query based on Virtual Organization in Grid Database. 276-281 - Zhiguang Shan, Chuang Lin:

Approximate Performance Analysis of Job Scheduling on Computational Grids. 282-287 - Bin Lu, Hongbin Zhang:

Grid Load Balancing Scheduling Algorithm Based on Statistics Thinking. 288-292 - Yi Fu, Zhigang Hu, Qingjun Zhang:

Bayesian Network based QoS Trustworthiness Evaluation Method in Service Oriented Grid. 293-298 - Xin Yu

, Min Wu, Taoshen Li, Zhaowen Wei:
On Graph Embedding of Crossed Cube-Connected Ring Networks. 299-304 - Fuhong Lin

, Changjia Chen, Hongke Zhang:
Characterizing Churn in Gnutella Network in a New Aspect. 305-309 - Yijun Wang, Junbin Liang, Jianxin Wang:

An Global Uneven Clustering Protocol Based on Collision Decreasing in Environment Integrated Surveillance. 310-315 - Jiawei Huang, Jianxin Wang, Yuhong Luo, Jin Ye:

A Channel-Aware Scheduling Algorithm for Improving TCP Fairness. 316-321 - Liwei Zheng

, Jian Tang, Zhi Jin:
Requirement Driven Service Agent Coalition Formation and Negotiation. 322-329 - Youngkon Lee:

Quality Context Composition for Management of SOA Quality. 330-335 - Hui Ye, Zhigang Chen, QinHua Li:

Research of Improved QoS of Data Transmission in Bluetooth Mobile P2P Networks. 336-341 - Liping Liu, Anfeng Liu, Ya Gao:

Improved Algorithm for Dynamic Web Services Composition. 342-347 - Suke Li, Zhong Chen, Liyong Tang, Zhao Wang:

TSearch: A Self-learning Vertical Search Spider for Travel. 348-353 - Yonghua Xiong, Min Wu, Weijia Jia:

Rate Adaptive Real-Time Video Transmission Scheme over TCP Using Multi-Buffer Scheduling. 354-361 - Xiuwu Zhang, Weimin Lei, Wei Zhang:

Using P2P Network to Transmit Media Stream in SIP-based System. 362-367 - Jin Ye, Jianxin Wang, Qinghua Liu, Yuhong Luo:

An Improved TCP with Cross-layer Congestion Notification over Wired/Wireless Hybrid Networks. 368-373 - Bin Zeng, Dafang Zhang, Wenwei Li, Gaogang Xie, Guangxing Zhang:

Design and Implementation of a Network Behavior Analysis-Oriented IP Network Measurement System. 374-379 - Taoshen Li, Meng Xiao, Songqiao Chen, Zhihui Ge:

An Efficient Ant Colony Optimization Algorithm for QoS Anycast Routing. 380-385 - Taoshen Li, Ming Yang, Songqiao Chen, Zhigang Zhao, Zhihui Ge:

On QoS Anycast Routing Algorithm based on Particle Swarm Optimization. 386-391 - ZhiHui Lv, Yu Wu, Chuan Xiao, Shiyong Zhang, YiPing Zhong:

WSDSNM3: A Web Services-based Distributed System and Network Management Middleware Model and Scheme. 392-397 - Ai-Min Yang, Sheng-Yi Jiang, He Deng:

A P2P Network Traffic Classification Method Using SVM. 398-403 - Jie Zhang:

Optimal Model of Service Discovery Architecture Based on IMS. 404-409 - Jiaqi Liu, Zhigang Chen, Deng Li, Hui Liu:

Towards a Self-Adaptive Super-node P2P Overlay Based on Information Exchange. 410-415 - Xinlin Zhang, Huaikou Miao, Shenghong Li:

An Approach to Checking the Compatibility for Web Services Specification Based on the Typed Graph Category. 416-421 - Shengping Qin, Zhanlei Shang, Xin Zhang, Peide Liu, Zheng Zhou:

Symbol Time Error and Channel Estimation in Wireless OFDM LAN/MAN. 422-426 - Sahar Adabi

, Sam Jabbehdari
, Amir Masoud Rahmani
, Sepideh Adabi
:
SBCA: Score Based Clustering Algorithm for Mobile AD-hoc Networks. 427-431 - Sancheng Peng, Weijia Jia

, Guojun Wang:
Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory. 432-438 - Dayang Sun, Yanheng Liu, Aimin Wang, Bin Ge:

Research on Service-Oriented Lifetime and Network Density in WSN. 439-444 - Feng Zeng, Zhigang Chen:

Load Balancing Placement of Gateways in Wireless Mesh Networks with QoS Constraints. 445-450 - Panlong Yang, Guihai Chen

:
FAST CASH: FAir and STable Channel ASsignment on Heterogeneous Wireless Mesh Network. 451-456 - Xiao Xiao, Luming Yang, Weiping Wang, Shuai Zhang:

A Broadcasting Retransmission Approach Based on Random Linear Network Coding. 457-461 - Jinxia Liu, Naijie Gu, Songsong He:

An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor Networks. 462-468 - Quanlong Li, Luo Yu, Xiaofei Xu, Zhijia Zhao:

An Algorithm for Target Localization in Sensor Networks Based on Overlap Area Boundary of Sensor Detection. 469-474 - Anfeng Liu, Xian-You Wu, Wei-Hua Gui:

Research on Energy Hole Problem for Wireless Sensor Networks Based on Alternation between Dormancy and Work. 475-480 - Ye Yao, Vincent Hilaire

, Abder Koukam
, Wandong Cai:
A RIO Approach for Modeling Wireless Sensor Network. 481-486 - Hailan Shen, Deng Li, Pengfei Xu, Zailiang Chen:

Semi-Supervised Top-k Query in Wireless Sensor Networks. 487-492 - Huamei Qi, Zhigang Chen, Lianming Zhang

:
Towards End-to-end Delay Bounds on WMNs Based on Statistical Network Calculus. 493-497 - Wensheng Tang, Wangqiu Kuang, Dingxing Zhang:

A Novel Approach to Mobile Positioning Tracking. 498-503 - Baoyan Song, Yanyan Cong, Jiayang Zhang, Xiaoguang Li, Ge Yu:

An Effective Approach for Continuous Window Query in Wireless Sensor Networks. 504-509 - Tengfei Zhu, Jun Peng, Ying Guo, Xiaoyong Zhang, Fu Jiang, Chunming Li:

A Distributed Power Proportional Clustering Algorithm to Improve Energy Efficiency for Wireless Sensor Networks. 510-515 - Zhuonong Xu, Jianxin Wang, Yanrong Su:

A Dynamic Spatial Backoff Algorithm Based on Channel Rate and Transmit Power in Wireless Networks. 516-521 - Diwen Wu, Dongqing Xie, Lupeng Wang:

A Deployment Algorithm to Achieve both Connectivity and Coverage in Grid Sensor Networks. 522-526 - Yuan Lu, Guojun Wang, Weijia Jia

, Sancheng Peng:
Multipath-Based Segment-by-Segment Routing Protocol in MANETs. 527-532 - Weiyu Chen, Jingjing Wu, Weiwei Sun, Zhenying He:

A Location Based Execution Path Selection for Composite Service in MANETs. 533-538 - Zhuoyao Zhang, Weiwei Sun, Weiyu Chen, Jiaqi Dong:

A Lifetime Aware Approach to Service Selection in Mobile Ad Hoc Networks. 539-544 - Jin Zheng, Weijia Jia, Guojun Wang:

A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks. 545-551 - Xinhui Yuan, Songqiao Chen, Xinhua Jiang:

A Low Overhead Truthful Energy-Efficient Routing Protocol in Wireless Mobile Ad hoc Networks with Selfish Nodes. 552-557 - Baolin Sun, Chao Gui, Qifei Zhang, Bing Yan, Wei Liu:

A Multipath On-Demand Routing with Path Selection Entropy for Ad Hoc Networks. 558-563 - Jian Li, Xianwen Zeng, Qinggang Su

:
Performance Investigation of Backoff Algorithms in Multihop Wireless Networks. 564-569 - Zhiwen Zeng, Anfeng Liu, Deng Li, Jun Long:

A Highly Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks. 570-575 - Bo Peng, Weiwei Sun, Jiaqi Dong, Ping Yu:

A Self-Adaptive Service Discovery Approach in Mobile Ad Hoc Networks. 576-581 - Wei Dong, Chun Chen, Jiajun Bu, Kougen Zheng, Xiaofan Wu, Guodong Teng:

A Dynamic TimeSynchronization Scheme for Multihop Sensor Networks. 582-587 - Changgeng Tan, Songqiao Chen, Wenyan Luo:

An Optimal Local Reputation System in Mobile Ad hoc Networks. 588-593 - Ronghua Shi, Yongyan Deng:

An Improved Scheme for Reducing the Latency of AODV in Ad Hoc Networks. 594-598 - Luobei Kuang, Ming Xu, Wei Yu:

EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint. 599-604 - Xiaoli Xiao, Min Huang, Weiping Zhang:

Research and Improvement on Expected Throughput Metric in Wireless Mesh Network. 605-609 - Zhuoyao Zhang, Weiwei Sun, Ping Yu, Yongrui Qin

:
Preemptive Scheduling for Multi-item Queries in On-Demand Data Broadcast. 610-615 - Hui Cheng, Xingwei Wang, Min Huang, Shengxiang Yang

:
A Review of Personal Communications Services. 616-621 - Haijun Li, Hongbo Zou, Peirong Ji, Xuejun Zhou:

An Algorithm for Computing 4^M-Point DFT Based on 4-Point DFT Block. 622-627 - Xiaoding Liao, Jingnan Nie, Lei Zhang:

Throughput Bounds of Unslotted CDMA Packet Networks. 628-632 - Zhihui Ge, Taoshen Li:

An Adaptive QoS-Supported Backoff Mechanism for IEEE 802.11. 633-637 - Ning Chen, Xuzhi Lai, Changbing Lu:

Controlled Clipper Method to Reduce PAPR by Tone Reservation in OFDM System. 638-642 - Ying Guo, Zhigang Chen:

Fibonacci Jacket Linear Network Codes. 643-646 - Hui Tian

, Ke Zhou, Yongfeng Huang, Dan Feng, Jin Liu:
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. 647-652 - Cheng Zhang, Jianxin Liao, Xiaomin Zhu:

Probabilistic Event-Driven Heuristic Fault Localization using Incremental Bayesian Suspected Degree. 653-658 - Chun-Chao Yeh, Soun-Jan Chiang:

Revisit Bayesian Approaches for Spam Detection. 659-664 - Lasheng Yu, Emmanuel Masabo, Lian Tan, Manqing He:

Multi-Agent Automated Intelligent Shopping System (MAISS). 665-670 - Mianxiong Dong

, Minyi Guo, Long Zheng, Song Guo
:
Performance Analysis of Resource Allocation Algorithms Using Cache Technology for Pervasive Computing System. 671-676 - Bin Liu, Ning Shangguan, Junyi Lin, Kaiyong Jiang:

Transferring Landmarks to Individual Foot Using Deformable Template Models. 677-682 - Jie Li, Fangzhou Zhang, Yingying Niu, Xiaoyu Sheng:

Research on 3D Seismic Data Visualization System Based on Windows. 683-688 - Linlin Shui, Minyong Shi, Weiguo Lin, Jianxiang Cao:

A Chinese Paper Cut-out System Based on Decorative Pattern Recognition. 689-692 - Fawang Liu, Yunde Jia:

Human Action Recognition Using Manifold Learning and Hidden Conditional Random Fields. 693-698 - Lili Hao, Lizhu Hao:

Temporal Data Driven Naive Bayesian Text Classifier. 699-702 - Peng Xiao, Zhigang Hu, Xi Li, Liu Yang:

A Novel Statistic-based Relaxed Grid Resource Reservation Strategy. 703-707 - Xiaoli Qiu, Xun Xu

, Zhonghua Ni:
Digital Product Information Sharing Based on STEP and XML. 708-713 - Anrong Xue, Xiqiang Duan, Handa Ma, Weihe Chen, Shiguang Ju:

Privacy Preserving Spatial Outlier Detection. 714-719 - Yongxiang Hu, Jingtian Tang, Hong Jiang, Sancheng Peng:

A Fast Algorithm to Estimate Mutual Information for Image Registration. 720-724 - Wei Song, ShaoZhuo Liu, Qiang Liu:

Business Process Mining Based on Simulated Annealing. 725-730 - Yanhui Fan, Hongguo Xu, Xibo Liu:

Simulation on Kinematics Law of Pedestrian in Vehicle/Pedestrian Contacting Phase. 731-736 - Peng Shi, Lianhong Ding:

A Data Sharing Platform for Materials Service Safety Appraisement. 737-741 - Yong Cao, Qingxin Zhu:

Improved Metrics for Encapsulation Based on Information Hiding. 742-747 - Dongyan Liu, Wenbo Liu

, Gong Zhang:
An Adaptive Watermarking Scheme Based on Nonsubsampled Contourlet Transform for Color Image Authentication. 748-752 - Hong Shao, Yueshu Wu, Wen-cheng Cui, Jinxia Zhang:

Image Retrieval Based on MPEG-7 Dominant Color Descriptor. 753-757 - Hong Zhu, Weizhen Sun, Minhua Wu, Guixia Guan, Yong Guan:

Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter. 758-763 - Xing Yang, Chaochao Huang, Hua Yang:

Research on Adaptive Preprocessing License Plate Location. 764-768 - Wei Jiang, Dong Xiang:

A Compression Framework for Personal Image Used in Mobile RFID System. 769-774 - Jiacheng Li, Yue Chen:

A Fast Mesh Simplification Algorithm Based on Octree with Quadratic Approximation. 775-780 - Lianwei Zhang, Yan Li, Jinze Song, Meiping Shi, Xiaolin Liu, Hangen He:

A Method for Surface Reconstruction from Cloud Points Based on Segmented Support Vector Machine. 781-785 - Song Wang, Hong Li, Xia Zhu, Ping Li:

An Evaluation Index Based on Parameter Weight for Image Inpainting Quality. 786-790 - Guomin Zhang, Jianping Yin, En Zhu, Ling Mao:

On the Selection of Multi Optimal Imaging Frames in Single Time Slot for Earth Observation Satellite. 791-796 - Yan Xing, Jieqing Tan, Peilin Hong:

Quaternion Julia Fractals. 797-802 - Jianjun Qian, Weilan Wang:

Main Feature Extraction and Expression for Religious Portrait Thangka Image. 803-807 - Sen Xu, Zhimao Lu, Guochang Gu:

An Efficient Spectral Method for Document Cluster Ensemble. 808-813 - Yongmei Zhou, Jin-kuang Wang, Ai-Min Yang:

A Method of Region-based Calculating Image Similarity for RBIR System. 814-819 - Yuejian Guo, Hong Li, Wei Zhang, Yao Xiang:

Multi-source Color Transfer Based on Multi-labeled Decision Tree. 820-825 - Hailing Huang, Weiqiang Guo, Yu Zhang:

A Novel Method for Image Spam Filtering. 826-830 - Liping Lin, Pingdong Wu, Jie Huang, Jian Li:

Precise Depth Perception in Projective Stereoscopic Display. 831-836 - Zhijiao Xiao, Zhong Ming, Jianfei Yin:

Role-Oriented Workflow Modeling Based on Object Petri Net. 837-843 - WanXia Qu, Tun Li, Yang Guo, Xiaodong Yang:

Explicit Model Checking Based on Integer Pointer and Fibonacci Hash. 844-849 - Lei Jiang, Jianxun Liu:

Research on Web Services Maiden Business Trust Metrics, Appraisal and Filtration Model. 850-855 - Jian Zhang, Niya Li, Di Luo, Lili He, Chengquan Hu:

Conditional Delegation Model Based on Weighted Roles for Workflow. 856-861 - Yueping He, Ziqiang Li:

An Effective Approach for Multi-Rectangle Detection. 862-867 - Chuanming Song, Xiang-Hai Wang, Fuyan Zhang:

Research on Motion Vector Accuracy in Overcomplete Wavelet-Domain Scalable Video Coding Based on Human Visual System Characteristics. 868-873 - Jingqiao Zhang, Zhuoer Ji:

A Real-time Parallel Catmull-Clark Subdivision Algorithm on GPU. 874-879 - Guiling Wang

, Shaohua Yang, Yanbo Han:
A Spreadsheet-like Construct for Streamlining and Reusing Mashups. 880-885 - Lin Liu:

A New Method for Camera Motion Estimation in Video. 886-890 - Hongshen Wang, Shusheng Zhang, Kaixing Zhang, Xiaoliang Bai:

A Shape Distributions Retrieval Algorithm of 3D CAD Models Based on Normal Direction. 891-896 - Xin Sun, Derong Shen, Zhenhua Wang, Yue Kou, Tiezheng Nie, Ge Yu:

LAD: Layered Adaptive Data Integration Architecture. 897-902 - Guodong Tang, Aina Qin:

ECG De-noising Based on Empirical Mode Decomposition. 903-906 - Jie Zhou, Hai Chen, Yue Chen:

Reconstruction of the Visual Hull with Modified Ray-tracing and Fast Slice-based Surface Extraction. 907-912 - Yibo Li, Hongjuan Qian:

Automatic Recognition System for Numeric Characters on Ammeter Dial Plate. 913-918 - Taizong Lai, Wenjun Li, Hui Liang, Xiaocong Zhou:

FRASCS: A Framework Supporting Context Sharing. 919-924 - Xin Chen, Yueshan Xiong:

Generation of Three-Dimensional Finite Element Meshes from CT Dataset of Human Femurs. 925-930 - Yun-Qian Qu, Jian-Min Yao, Jun Sun, Meng Sun:

OOV Translation Mining from Mixed-Language Snippets from a Search Engine. 931-935 - Xingbo Jiang, Xiaoqing Lu, Chengcheng Liu, Monan Li:

A Hybrid Algorithm for Solving the Optimal Layout Problem of Rectangular Pieces. 936-941 - Qi Li, Huadong Ma, Shuo Feng:

A Robust Endpoint Detection Algorithm for Video Caption Generation. 942-946 - Jie Hao, Silong Peng:

HJ-hPl: Hierarchical Mixed-Size Placement Algorithm with Priori Wirelength Estimation. 947-952 - Yue Liu, Yafeng Yin, Junjun Gao, Chongli Tan:

Wrapper Feature Selection Optimized SVM Model for Demand Forecasting. 953-958 - Ningning Ma, Chao Li, Airong Jiang, Chunxiao Xing

:
Design and Implementation of Open Source Based Digital Preservation Experimental Platform (THDP). 959-964 - Gang Chen:

A Design of Data Rebuilding for Decision Support in E-Government System. 965-970 - Xiyuan Chen, Ouyang Yang, Miaoliang Zhu, Yan He:

Semantic-Aware Access Control for Grid Application. 971-975 - Shuqin Wang, Chunbao Zhou, Yingsi Wu, Jianxin Wang, Chunguang Zhou, Yanchun Liang:

A Novel Approach for Classifying Human Cancers. 976-981 - Shu-Xue Zou, Yanxin Huang, Yan Wang, Jianxin Wang, Chunguang Zhou:

SVM Learning from Imbalanced Data by GA Sampling for Protein Domain Prediction. 982-987 - Xingbao Liu, Zixing Cai, Chixin Xiao

:
Fast Mutation Operator Applied in Detector Generating Strategy. 988-993 - Shanhong Zheng, Chunguang Zhou, Yanwen Li, Guixia Liu:

Research on Signaling Pathway Reconstruction Based on HMM. 994-999 - Jia Liang, Yuanquan Wang

:
Improved GVF Based Left Ventricle Segmentation from Cardiac MR Images Using Radial B-Snake Model. 1000-1005 - Jing Zhang, Yang Liu, Seok-Wun Ha:

A Novel Approach of Face Detection based on Skin Color Segmentation and PCA. 1006-1011 - Jingli Wu, Jianxin Wang, Jianer Chen:

A Genetic Algorithm for Single Individual SNP Haplotype Assembly. 1012-1017 - Min Li, Jianxin Wang, Jianer Chen, Bin Hu:

Greedily Mining l-dense Subgraphs in Protein Interaction Networks. 1018-1023 - Yangyi Sui, Lili Pang, Jun Lin, Xiaotuo Zhang:

Dataflow Visual Programming Language Debugger Supported by Fisheye View. 1024-1029 - Ge Hu, Shengbing Ren, Xie Wang:

A Comparison of C/C++-based Software/Hardware Co-design Description Languages. 1030-1034 - Bin Wang, Jian Ding, Wei Zhu, Yunqiao Tan, Jinfang Sheng:

Research on Model of Dual Core Aspectual Middleware & Dynamic Weaving Technology. 1035-1040 - Lingli Li, Hongzhi Wang

, Jianzhong Li, Jizhou Luo:
Efficient Top-k Keyword Search on XML Streams. 1041-1046 - Yong Dong, Juan Chen, Xuejun Yang, Canqun Yang, Lin Peng:

Low Power Optimization for MPI Collective Operations. 1047-1052 - Xiangdong Lei, Wuke Li, Xiaoli Yuan:

Scheduling Real-Time Nested Transactions in Mobile Broadcast Environments. 1053-1058 - Zhijian Wang:

A Subsystem Division Method by Clustering. 1059-1063 - Wei Jiang, Guangze Xiong, Xuyang Ding:

Energy-Saving Service Scheduling for Low-End Cyber-Physical Systems. 1064-1069 - Lijun Lun, Hui Xu:

An Approach to Software Architecture Testing. 1070-1075 - Lili Pan, Beiji Zou, Hao Chen, Haoyu Zhou:

Research on Translucent Mechanism-Based Infeasible Path. 1076-1081 - Xiaodong Huang, Huadong Ma, Haidong Yuan:

Video Mosaic Block Detection Based on Template Matching and SVM. 1082-1086 - Huan Wang, Xiaomin Shi, Yan Li, Heng Chang, Weiliang Chen, Jie Tang, Eduardo Martins:

User Profile Management for Personalized Telecom Service. 1087-1092 - Jun Zhu, Changguo Guo, Quan Yin, Jianlu Bo, Quanyuan Wu:

A Runtime-Monitoring-Based Dependable Software Construction Method. 1093-1100 - Zhiyong He, Kerong Ben, Zhixiang Zhang:

Software Architectural Reflection Mechanism for Runtime Adaptation. 1101-1105 - Fangyuan Zheng, Hao Hu, Jian Lü:

Applying a Component Behavior Model to MVC Pattern. 1106-1111 - Hongfang Gong, Junyi Li:

Generating Test Cases of Object-Oriented Software Based on EDPN and Its Mutant. 1112-1119 - Lingfei Zhang, Gang Chen, Dong Ye, Rensheng Che:

A Fast Center of Mass Estimation Algorithm for Coordinates of IR Markers. 1120-1125 - Juntao Gao, Li Zhang, Zhiyao Wang:

Decision Support in Procuring Requirements for ERP Software. 1126-1131 - Bao Liang, Xiaoguang Hong, Lei Zhang, Shuai Li:

Extended MRI-Cube Algorithm for Mining Multi-Relational Patterns. 1132-1136 - Fengliang Qi, Beihong Jin, Haibiao Chen, Zhenyue Long:

An Efficient Primitive Subscription Matching Algorithm for RFID Applications. 1137-1144 - Haimei Zhang, Kerong Ben, Zhixiang Zhang:

A Reflective Architecture-Aware Framework to Support Software Evolution. 1145-1149 - Xiaohong Chen, Zhi Jin:

A Scenario-Based Problem Decomposition. 1150-1155 - Xiaojian Liu, Xuejun Liu, Jianxin Li, Yanzhi Zhao, Zhixue Wang:

Refinement of UML Interaction for Correct Embedded System Design. 1156-1162 - Yingqiang Wang, Qingshan Li, Chenguang Zhao, Hua Xing:

A Multi-Agent System Frame Model for Dynamic Integration. 1163-1168 - Jinyu Chen, Ten Long, Kangming Deng:

The Consistency of Materialized View Maintenance and Drill-Down in a Warehousing Environment. 1169-1174 - Yubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu:

A Role and Context Based Access Control Model with UML. 1175-1180 - Gui Gui, Paul D. Scott:

New Coupling and Cohesion Metrics for Evaluation of Software Component Reusability. 1181-1186 - Zhong Ming, Xingan Jiang, Jiancong Bai:

Partheno-Genetic Algorithm for Test Instruction Generation. 1187-1192 - Xiaochun Zhu, Bo Zhou, Li Hou, Junbo Chen

, Lu Chen:
An Experience-Based Approach for Test Execution Effort Estimation. 1193-1198 - Jing Gao, Yuqing Lan, Maozhong Jin:

A Model of Third-Party Integration Testing Process for Foundation Software Platform. 1199-1204 - Deping Zhang, Changhai Nie, Baowen Xu

:
A Markov Decision Approach to Optimize Testing Profile in Software Testing. 1205-1210 - Rui Zhang, Jianhui Jiang, Jie Yin, Ang Jin, Jungang Lou

, Ying Wu:
A New Method for Test Suite Reduction. 1211-1216 - Jun Cheng, Qiang Liu:

Using Stakeholder Analysis for Improving Statechart Merging in Software Requirement Management. 1217-1222 - Dan Wang, Maozeng Li:

Design and Implementation of a Data Stream Load Shedding Model. 1223-1228 - Tian Qiu, Pengfei Li:

Web Service Discovery Based on Semantic Matchmaking with UDDI. 1229-1234 - Hang Zhou, Zhiqiu Huang, Yi Zhu:

Polymorphism Sequence Diagrams Test Data Automatic Generation Based on OCL. 1235-1240 - Ji Wu, Yong Po Liu, Xiao-xia Jia, Chao Liu:

Mining Open Source Component Behavior and Performance for Reuse Evaluation. 1241-1247 - Jinfang Sheng, Bin Wang:

Evaluating COTS Components Using Gap Analysis. 1248-1253 - Xiaoqiang Zhang, Lin Peng, Lunguo Xie:

A Lightweight Snapshot-based Algorithm for Software Transactional Memory. 1254-1259 - Hai Yu, Fan Xiaoya:

Mitigating Soft Errors in System-on-Chip Design. 1260-1265 - Yonghee You, Hwanmun Lee, Mee Young Sung, Kyungkoo Jun, Jin-Suk Kang:

Sound-Specific Vibration Interface: Its Performance of Tactile Effects and Applications. 1266-1271 - Jianhua Zheng, Di Li, Zhaogang Shu

, Rong Zhu:
New Approach for Embedded Computer Numeric Control Development. 1272-1278 - Zhiquan Feng, Bo Yang, Yuehui Chen, Yan Jiang, Tao Xu, Haokui Tang:

A Particle Filtering for 3D Human Hand Tracking. 1279-1284 - Jianfei Yin, Zhong Ming, Zhijiao Xiao, Hui Wang:

A Web Performance Modeling Process Based on the Methodology of Learning from Data. 1285-1291 - Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao, Dan Chen:

A Novel Hardware Assisted Full Virtualization Technique. 1292-1297 - Chunsheng Qi, Xiao Zheng, Biying Kuang, Wei Zhou:

Design and Implementation of an Integrated Fault-Supervising System for Large HPCs. 1298-1302 - Yanyan Gao, Xi Li:

Formal Verification of Bypassed Processor Pipelines. 1303-1308 - Hui-Chin Yang, Li-Ming Wang, Chung-Ping Chung:

iAIM: An Intelligent Autonomous Instruction Memory with Branch Handling Capability. 1309-1313 - Shaogang Wang, Dan Wu, Zhengbin Pang, Wensheng Tang, Xiaodong Yang:

Lowering the Overhead of Hybrid Transactional Memory with Transact Cache. 1314-1319 - Caixia Liu, Jiaxin Li, Hongli Zhang, Qi Zuo:

HHMA: A Hierarchical Hybrid Memory Architecture Sharing Multi-Port Memory. 1320-1325 - Lei Li, Zheng Cao

, Mingyu Chen, Jianping Fan:
Design and Evaluation of Optical Bus in High Performance Computer. 1326-1330 - Lei Jiao, Yanyuan Zhang, Wei Lin:

Journal-based Block Images for Flash Memory Storage Systems. 1331-1336 - Yu Sheng, Weiping Wang:

Design and Implementation of Compression Algorithm Comparator for Digital Image Processing Based on Component. 1337-1341 - Hualong Zhao, Hongshi Sang, Tianxu Zhang:

The Design and Implementation of a High Performance and High Flexibility Memory Interface Architecture for Embedded Application. 1342-1347 - Wenying Zeng, Yuelong Zhao, Junwei Zeng:

Hierarchical Storage System Based on Wireless Mesh Network. 1348-1353 - Jianjun Guo, Kui Dai, Ming-che Lai, Zhiying Wang:

The P2P Communication Model for a Local Memory based Multi-core Processor. 1354-1359 - Yanqin Yang, Zili Shao

, Linfeng Pan, Minyi Guo:
ISOS: Space Overlapping Based on Iteration Access Patterns for Dynamic Scratch-pad Memory Management in Embedded Systems. 1360-1366 - Fangfang Li, Chuanwen Li, Xiaochun Yang, Ge Yu:

A Data Storage Method Based on Query Processing Region in Wireless Sensor Networks. 1367-1372 - Shengyuan Yang, Shi Shu:

Robust Feature Extraction for the Composite Surface Mesh from STL File. 1373-1378 - Hailin Guo, Xiaoyan Xue, Xingang Wang, Weiqin Tong, Weili Ni:

An Implementation of Parallel MLFMA on a Cluster of Computers with Distributed Memory. 1379-1383 - Zhenyu Wang, Qi Feng, Rui Xu, Zengjie Dou, Xin Chen:

Research on Trusted Access Technology of Grid Resource Based on the Virtual Machine. 1384-1388 - Yingjie Zhao, Nong Xiao:

Saber: Sequential Access Based cachE Replacement to Reduce the Cache Miss Penalty. 1389-1394 - Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li:

VM-based Architecture for Network Monitoring and Analysis. 1395-1400 - Changping Liu, Yong Feng, Mingyu Fan, Guangwei Wang:

PKI Mesh Trust Model Based on Trusted Computing. 1401-1405 - Huaqiang Yuan, Weimin Xiao, Guoqiang Han:

A Fingerprint Matching Algorithm Based on B-Spline Curves. 1406-1411 - Jianhong Zhang, Jianjun Xie:

Security Analysis and their Improvement of Two Signature Schemes. 1412-1417 - Buyun Qu, Lianhao Liu:

An XSL Analysis on BES. 1418-1423 - Guangxi Chen, Yan Cheng, Yinghao Wang:

A Robust Adaptive Video Watermarking Algorithm Based on HVS. 1424-1428 - Xiongjun Li:

A Generalized Matrix-based Scrambling Transformation and its Properties. 1429-1434 - Shuaijun Li, Fei Peng

:
An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems. 1435-1439 - Ying Chen, Yuping Wang:

Exposing Digital Forgeries by Detecting Traces of Smoothing. 1440-1445 - Mi He, Lizhi Cheng:

Asymmetric Watermarking Method Based on Subspace Projection. 1446-1452 - Anfeng Hu, Ning Chen:

A Blind Watermarking Algorithm for Color Image Based on Wavelet Transform and Fourier Transform. 1453-1458 - Peng Lu, Zhao Lu, Zili Zhou, Junzhong Gu:

An Optimized Natural Language Watermarking Algorithm based on TMR. 1459-1463 - Ming Zhao, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen:

A Game Theoretic Approach Based Access Control Mechanism. 1464-1469 - Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:

An Automatic Mechanism for Sanitizing Malicious Injection. 1470-1475 - Zuowen Tan, Hongguang Xiao:

Hierarchical Proxy Blind Signature: A Solution to E-cash in the Real World. 1476-1480 - Ge Cheng, Hai Jin, Deqing Zou, Alex K. Ohoussou, Feng Zhao:

A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. 1481-1487 - Hongxing Lan, Songqiao Chen, Taoshen Li, Aina Hu:

A Digital Watermarking Algorithm Based on Dual-tree Complex Wavelet Transform. 1488-1492 - Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu:

Collecting Internet Malware Based on Client-side Honeypot. 1493-1498 - Jian Wang, Yanheng Liu, Xin Sun

, Yu Jiao:
Modeling Cascading Failures in Congested Internet. 1499-1504 - Jinsong Gui, Xiaoheng Deng:

An Adaptive Topology-Based Reputation Model for Unstructured P2P Networks. 1505-1510 - Fanping Zeng, Kaitao Yin, Minghui Chen:

Research on TCP Initial Sequence Number Prediction Method Based on Adding-weight Chaotic Time Series. 1511-1515 - Jianquan Dong, Chao Tan, Yunqi Zhang:

A Reputation Evaluation Method in P2P Anonymous Environment. 1516-1521 - Qin Li

, Dongyang Long, Changji Wang:
Secure Relativistic Bit Commitment with Fixed Channel Capacity. 1522-1526 - Yanhui Wu, Weiping Wang, Jianer Chen:

A Novel Anonymous Communication Strategy with Respect to Payment Mechanism. 1527-1531 - Fenghua Li, Wei Wang, Jianfeng Ma, Zhenguo Ding:

Enhanced Architecture of TPM. 1532-1537 - Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji:

Network Security Evaluation Algorithm Based on Access Level Vectors. 1538-1544 - Lingli Deng, Yeping He, Ziyao Xu:

Enforcing Separation of Duty in Ad Hoc Collaboration. 1545-1552 - Bin Wang, Piao Ding, Jinfang Sheng:

P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy. 1553-1558 - Yanmei Zhang, Jianming Zhu:

A Hybrid Vulnerability Analysis Method against Non-Security Protocols. 1559-1564 - Xuri Chen, Weimin Xu:

Counter-Attack Trust Model Based on Vague Set for P2P Networks. 1565-1570 - Kai Bu, Zhixin Sun:

A Method Based on AMHI for DDoS Attacks Detection and Defense. 1571-1576 - Ming Luo, Yingyou Wen, Hong Zhao:

An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography. 1577-1582 - Jiahao Wang, Terry Ye

, Edward C. Wong:
Privacy Guaranteed Mutual Authentication on EPCglobal Class 1 Gen 2 Scheme. 1583-1588 - Yang Lu, Jiguo Li, Junmo Xiao:

Generic Construction of Certificate-Based Encryption. 1589-1594 - Guiliang Zhu, Xiaoqiang Zhang:

Mixed Image Element Encryption System. 1595-1600 - Lijie Yin, Jinhui Zhao, Yan Duan:

Encryption Scheme for Remote Sensing Images Based on EZW and Chaos. 1601-1605 - Jian Xu, Fucai Zhou, Xinyang Li, Muzhou Yang:

Hierarchical Data Processing Model and Complete Tree Key Management Mechanism. 1606-1612 - Shanqing Guo, Chunhua Zhang:

Identity-based Broadcast Encryption Scheme with Untrusted PKG. 1613-1618 - Leyou Zhang, Yupu Hu, Ningbo Mu:

An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. 1619-1623 - Guojun Zhang, Enmin Song, Guangzhi Ma, Wei Zhang:

Attribute Reduction Algorithm Research Based on Rough Core and Back Elimination. 1624-1628 - Bo Liu, Luming Yang, Yunlong Deng:

A Vector Matrix Iterative Self-Organizing Assistant Clustering Algorithm of XML Document. 1629-1634 - Degang Xu, Zhifang Su:

Stability Analysis of Large-scale Time-delay Fuzzy Systems with Hybrid Models. 1635-1640 - Xiaoqing Chen, Zhongxi Hou, Jianxia Liu:

Real-Parameter Optimization with Modified Differential Evolution. 1641-1646 - Lei Chen, Haiming Chen:

Efficient Type Checking for a Subclass of Regular Expression Types. 1647-1652 - Yinglong Ma

, Beihong Jin, Shipeng Zhang:
A Hybrid Model for Distributed Semantic Queries. 1653-1658 - Haitao Zhang, Jian Rong, Xiaochun Zhong:

Research of the INS/GPS Integrated Navigation System for High Speed Trains. 1659-1663 - Jintao Tang, Ting Wang, Ji Wang:

Information Flow Detection and Tracking on Web2.0 BLOGS Based on Social Networks. 1664-1670 - Xinde Li, Xianzhong Dai, Jean Dezert, Florentin Smarandache

:
DSmT Qualitative Reasoning based on 2-Tuple Linguistic Representation Model. 1671-1676 - Honglei Zhu, Dequan Zheng, Tiejun Zhao:

Research on Query Translation Disambiguation for CLIR Based on HowNet. 1677-1682 - Muyun Yang

, Junguo Zhu, Jufeng Li, Lixin Wang, Haoliang Qi, Sheng Li, Daxin Liu:
Extending BLEU Evaluation Method with Linguistic Weight. 1683-1688 - Jinwu Hu, Liuling Dai, Bin Liu:

Measure Semantic Similarity between English Words. 1689-1694 - Bofeng Zhang, Jianguo Pan, Jianbo Hu, Zhongyuan Liu, Ruimin Zhang:

A Case Study on Chinese Text Information Filtering Method Based on User Ontology Model. 1695-1700 - Mei Wang, Guohong Wang:

An Optimization Algorithm of Vehicle License Plate Correction Based on Minimum Projection Distance. 1701-1705 - Manling Huang, Pingdong Wu, Ying Liu, Luzheng Bi, Hongwei Chen:

Application and Contrast in Brain-Computer Interface between Hilbert-Huang Transform and Wavelet Transform. 1706-1710 - Shu-Bin Cai, Zhong Ming, Shixian Li:

BALC: A Belief Extension of Description Logic ALC. 1711-1716 - Jiancheng Liu, Xinhua Jiang, Baohua Lan:

Learning TSK Fuzzy Model by GA-BP Method. 1717-1721 - Jianping Wu

, Jinxiang Li, Changshui Xiao, Fangyong Tan, Caidong Gu:
Real-time Robust Algorithm for Circle Object Detection. 1722-1727 - Baifan Chen, Zixing Cai, Zheng Xiao, Jinxia Yu, Limei Liu:

Real-time Detection of Dynamic Obstacle Using Laser Radar. 1728-1732 - Wei Pan, Zixing Cai, Limei Liu, Baifan Chen:

An Approach to Cooperative Multi-Robot Map Building in Complex Environments. 1733-1737 - Limei Liu, Zixing Cai, Wei Pan, Baifan Chen, Lijue Liu:

A Map Building Method Based on Uncertain Information of Sonar Sensor. 1738-1742 - Peng Zhao, Shutao Li:

Tablets Vision Inspection Approach Using Fourier Descriptors and Support Vector Machines. 1743-1748 - Chixin Xiao

, Zixing Cai, Yong Wang, Xingbao Liu:
Tuning of the Structure and Parameters of a Neural Network Using a Good Points Set Evolutionary Strategy. 1749-1754 - Jinze Song, Tao Wu, Ping An:

Cascade Linear SVM for Object Detection. 1755-1759 - Shuren Zhou, Ximing Liang, Can Zhu:

Exploiting LCSVC Algorithm for Expression Recognition. 1760-1765 - Lichun Zhang, Junwei Chen, Yue Lu, Patrick S. P. Wang:

Face Recognition Using Scale Invariant Feature Transform and Support Vector Machine. 1766-1770 - Meng Zhang, Yi Zhang, Kuo Zhao, Liang Hu:

Automata for Weak Factor Recognition. 1771-1776 - Junmin Ye, Junjie Wang, Wei Dong, Zhichang Qi:

Implementation of String Recognition Algorithm Based on the Principle of Artificial Immunology. 1777-1782 - Yongli Ren

, Yangdong Ye, Gang Li
:
The Density Connectivity Information Bottleneck. 1783-1788 - Jing Chen, Xinqiao Lu, Qiaoling Luo, Ping Li, Xiaojuan Liu:

A Segment Extraction-Combination Algorithm Based on Polygonal Approximation and Finite State Machines for On-Line Chinese Character Recognition. 1789-1794 - Lingyu Xu, Na Zhang, Wentao Huang, Shijie Sun:

Multi-text Fusion Computation Based on Flexible Interval Control. 1795-1800 - Hongfeng Xiao, Guanzheng Tan:

A Novel Simplex Hybrid Genetic Algorithm. 1801-1806 - Yemei Qin, Ji Wang

, Weihua Gui:
Particle Clonal Genetic Algorithm Using Sequence Coding for Solving Distribution Network Reconfiguration. 1807-1812 - Guannan Zhu, Ning Xu, Zhulin An

, Yongjun Xu:
An Improved Genetic Algorithm Based on Variable Step-Size Search. 1813-1818 - Bo Liu, Peisheng Meng:

Hybrid Algorithm Combining Ant Colony Algorithm with Genetic Algorithm for Continuous Domain. 1819-1824 - Jun Mu, Hongxiao Fei, Xin Dong:

A Parameter-Free Clustering Algorithm Based on Density Model. 1825-1831 - Yantao Zhou, Zhengguo Wu, Xingdong Yi:

An Extended Grid-based Clustering Algorithm with Referential Value of Parameters. 1832-1837 - Zhifang Liao, Xiaoping Fan

, Yun Zhou, Kezhun Liu:
A Clustering Algorithm for Mixed Data Based on Lattice Theory. 1838-1842 - Weizhe Zhang, Hongli Zhang, Xinran Liu, Xuemai Gu:

Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems. 1843-1848 - Chengming Qi, Yingjie Tian

, Shoumei Cui, Yunchuan Sun:
Concept Semilattice: Construction and Complexity. 1849-1853 - Dengyuan Wu, Kai Wang, Tao He, Jicheng Ren:

A Dynamic Weighted Ensemble to Cope with Concept Drifting Classification. 1854-1859 - Hong Li:

Concept Granular System and Granular Concept Lattice. 1860-1865 - Kaifu Lu, Shukuan Lin, Jianzhong Qiao, Ge Yu, Hualei Liu:

FSMBO: Fast Time Series Similarity Matching Based on Bit Operation. 1866-1871 - Anrong Xue, Lin Yao, Shiguang Ju, Weihe Chen, Handa Ma:

Algorithm for Fast Spatial Outlier Detection. 1872-1877 - Shaochun Wu, Minfu Fang, Yinyin Li, Bofeng Zhang:

An Earthquake Sequential Pattern Mining Algorithm Based on General Constraint. 1878-1883 - Zheng Lin, Lubin Wang:

Multi-Stage Partner Selection Based on Genetic-Ant Colony Algorithm in Agile Supply Chain Network. 1884-1889 - Jinjiang Li, Da Yuan, Qingsong Xie, Caiming Zhang:

Fractal Image Compression by Ant Colony Algorithm. 1890-1894 - Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan:

Dynamic Keys Based Sensitive Information System. 1895-1901 - Yueming Deng, Guojun Wang:

A Time-Related Trust Model Based on Subjective Logic Theory. 1902-1907 - Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, Laurissa N. Tokarchuk:

Propagation Model of Active Worms in P2P Networks. 1908-1912 - Jinzhao Wu, Shihan Yang

:
Timed CSP for Safety Specification of Hybrid System. 1913-1918 - Lan Li, Shaojun Zhang, Lei Fan:

Behavior-Aware Role Based Trust Management. 1919-1924 - Ricardo Neisse, Maarten Wegdam, Marten van Sinderen

:
Trustworthiness and Quality of Context Information. 1925-1931 - Zhenhai Yang, Sheng Ge, Gang Li:

A Search Method for the Network of Interpersonal Trust. 1932-1937 - Gang Li, Sheng Ge, Zhenhai Yang:

An Affair-based Interpersonal Trust Metric Calculation Method. 1938-1943 - Shaoyin Cheng, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing:

DBTG: Demand-Driven Backtracking Test Generation. 1944-1950 - Li Li, Guosun Zeng, Bo Chen:

Trusted Transmission Protocol for Content Security. 1951-1956 - Jun Zheng, Yan Qin, Jianyong Zhu, Xinyou Li:

Constructing Trust Networks Based on Small-World Theories. 1957-1962 - Jianli Hu, Quanyuan Wu, Bin Zhou:

FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model. 1963-1968 - Yishi Zhao, Nigel Thomas:

A Cost Model Analysis of a Secure Key Distribution Centre. 1969-1974 - Zhiwen Zeng, Ya Gao, Zhigang Chen, Xiaoheng Deng:

Trust Path-Searching Algorithm Based on PSO. 1975-1979 - Nadia Nedjah

, Luiza de Macedo Mourelle
:
Efficient Hardware for Modular Exponentiation using the Sliding-Window Method with Variable-Length Partitioning. 1980-1985 - Fang Qi, Zhe Tang, Guojun Wang:

Attacks vs. Countermeasures of SSL Protected Trust Model. 1986-1991 - Nicolai Kuntze, Andreas U. Schmidt, Zaharina Velikova, Carsten Rudolph

:
Trust in Business Processes. 1992-1997 - A. S. Poornima, B. B. Amberker:

A New Approach to Securing Broadcast Data in Sensor Networks. 1998-2001 - Luiz Olavo Bonino da Silva Santos

, Luís Ferreira Pires
, Marten van Sinderen
:
A Trust-Enabling Support for Goal-Based Services. 2002-2007 - Tianle Zhang, Zongwei Luo

, Feng Zhou, Xudong Yang:
Developing a Trusted System for Tracking Asset on the Move. 2008-2013 - Desire Nguessan, José Sidnei Colombo Martini:

Study and Implementation of a Solution to Security Management for Mobile Environments Based on Tuple. 2014-2020 - Qi Cheng, Yu-Hsin Li:

A Number Theoretic Memory Bounded Function and Its Applications. 2021-2025 - Ronghua Shi, Yanhua Yan:

Protection against Mobile Adversaries in Mobile Ad-hoc Networks. 2026-2031 - Kaibo Wang, Xingshe Zhou, Shandan Zhou:

Scheduling Framework and Algorithms for Large-Scale Divisible Load Processing with Multi-Dimensional QoS Constraints. 2032-2037 - Riaz Ahmed Shaikh

, Hassan Jameel, Brian J. d'Auriol
, Sungyoung Lee, Young Jae Song, Heejo Lee:
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. 2038-2043 - Ruixuan Li, Cuihua Zuo, Yuntian He, Zhengding Lu:

A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. 2044-2049 - Qi Jiang, Dongfeng Han, Yi Li, Wenhui Li:

Copyright Protection Using a Computational Watermarking Scheme. 2050-2054 - Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri:

Validating X.509 Certificates Based on their Quality. 2055-2060 - Neyire Deniz Sarier

:
A New Biometric Identity Based Encryption Scheme. 2061-2066 - Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu:

Correlation Power Analysis Attack against Synchronous Stream Ciphers. 2067-2072 - Kun Huang, Dafang Zhang:

A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection. 2073-2078 - Yang Xu, Xiaoyao Xie:

Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic. 2079-2084 - Esam Elsheh:

On the Linear Structures of Cryptographic Rotation Symmetric Boolean Functions. 2085-2089 - Wei Zhao, Dingfeng Ye:

Modified Huang-Wang's Convertible Nominative Signature Scheme. 2090-2095 - Zecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li:

A CDH-Based Multi-Signature Scheme with Tight Security Reduction. 2096-2101 - Zhenjie Huang

, Xuanzhi Lin, Rufen Huang:
Certificateless Concurrent Signature Scheme. 2102-2107 - Weihe Chen, Zhu Tang, Shiguang Ju:

Enforcement of Spatial Separation of Duty Constraint. 2108-2114 - Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo

:
Hierarchical Identity-Based Online/Offline Encryption. 2115-2119 - Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang:

Performance Analysis of the HLLACF. 2120-2124 - Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi:

Towards Trusted Broadcast Encryption. 2125-2130 - Chengyu Fan, Shijie Zhou, Fagen Li:

Deniable Proxy-Anonymous Signatures. 2131-2136 - Kurt Dietrich:

A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. 2137-2142 - Huiyun Li, Keke Wu, Bo Peng, Yiwei Zhang, Xinjian Zheng, Fengqi Yu:

Enhanced Correlation Power Analysis Attack on Smart Card. 2143-2148 - Chi Guo, Lina Wang, Furong Zhou, Lainv Huang, Zhen Peng:

Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect. 2149-2153 - Fang Wang, Shanzhi Chen, Xin Li, Yuhong Li:

A Route Flap Suppression Mechanism Based on Dynamic Timers in OSPF Network. 2154-2159 - Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou

:
A PIN-Based Dynamic Software Fault Injection System. 2160-2167 - Chuanming Jing, Xia Yin, Zhiliang Wang, Jianping Wu:

A Formal Approach to Robustness Testing of Network Protocol with Time Constraints. 2168-2174 - Yufeng Xiao, Shanzhi Chen, Xin Li, Yuhong Li:

An Enhanced Factoring Algorithm for Reliability Evaluation of Wireless Sensor Networks. 2175-2179 - Xiaolin Chen, Hui Deng, Feng Wang, Mu Mu, Sanglu Lu:

A Deployable Architecture against Application-level DDoS Attacks. 2180-2185 - Ping Zhu, Fumin Yang, Gang Tu, Wei Luo:

Fault-Tolerant Scheduling for Periodic Tasks based on DVFS. 2186-2191 - Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang:

A Defending Mechanism against DDoS Based on Registration and Authentication. 2192-2197 - Yinqian Zhang, Xun Fan, Zhi Xue, Hao Xu:

Two Stochastic Models for Security Evaluation Based on Attack Graph. 2198-2203 - Baiqiang Chen:

Strategies on Algebraic Attacks Using SAT Solvers. 2204-2209 - Paul Rabinovich:

ECL: A TLS Extension for Authentication in Complex PKIs. 2210-2215 - Chi Guo, Lei Zhao, Lina Wang, Zhejun Fang:

A Secure Network Admission and Routing Model Based on Trust Theory. 2216-2221 - Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:

An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. 2222-2229 - Rui Zhu, Changguo Guo, Huaimin Wang, Hailin Gong:

A User Trustworthiness Based Lightweight Access Control. 2230-2234 - Seil Kim, Ji Young Chun, Dong Hoon Lee:

Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. 2235-2239 - Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, Dongsheng Peng:

TNC-UTM: A Holistic Solution to Secure Enterprise Networks. 2240-2245 - Lingli Deng, Yeping He, Ziyao Xu:

Service Authenticity in P2P File-Sharing. 2246-2253 - Zhexuan Song, Seigo Kotani, Ryusuke Masuoka:

Building an Independent Integrated Authentication Service. 2254-2259 - Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma:

A New Wireless Mesh Network Authentication Scheme Based on Threshold Method. 2260-2265 - Helen Tang, Mazda Salmanian:

Lightweight Integrated Authentication for Tactical MANETs. 2266-2271 - Tian Chen, Huaguo Liang, Minsheng Zhang, Wei Wang:

A Scheme of Test Pattern Generation Based on Reseeding of Segment-Fixing Counter. 2272-2277 - Chuliang Weng, Yuan Luo, Minglu Li, Xinda Lu:

A BLP-Based Access Control Mechanism for the Virtual Machine System. 2278-2282 - Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu:

Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. 2283-2288 - Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael Chung-Wei Phan

, Roderick Bloem
:
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. 2289-2294 - Zhifang Wang, Yiyun Chen, Zhenming Wang, Wei Wang, Bo Tian:

Implementation of Pointer Logic for Automated Verification. 2295-2301 - Junmin Ye, Zemei Zhan, Zhenfang Zhang, Wei Dong, Zhichang Qi:

Design of Some Artificial Immune Operators in Software Test Cases Generation. 2302-2307 - Xiaofeng Chen, Dengguo Feng:

A New Direct Anonymous Attestation Scheme from Bilinear Maps. 2308-2313 - Bing Duan, Yinqian Zhang, Dawu Gu:

An Easy-to-Deploy Penetration Testing Platform. 2314-2318 - Zhiyi Yin, Jianming Fu, Fuxi Zhu, Fanchen Su, Haitao Yao, Fen Liu:

Fingerprinting Executable Programs Based on Color Moments of a Novel Abstract Call Graph. 2319-2324 - Junmin Ye, Wei Dong, Zhichang Qi:

A Method to Generate Embedded Real-Time System Test Suites Based on Software Architecture Specifications. 2325-2329 - Fan He, Huanguo Zhang, Mei Tang:

A Test Method of Trusted Computing Supporting Software. 2330-2334 - Jing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li:

Research on Automated Testing of the Trusted Platform Model. 2335-2339 - Anbang Ruan, Qingni Shen, Yuanyou Yin:

A Generalized Trusted Virtualized Platform Architecture. 2340-2346 - Liang Gu, Xuhua Ding

, Robert H. Deng
, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei:
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. 2347-2353 - Zhi Guan, Huiping Sun, Zhong Chen, Xianghao Nan:

Efficient Identity-Based Key Issue with TPM. 2354-2359 - Kurt Dietrich, Johannes Winter:

Secure Boot Revisited. 2360-2365 - Thomas Tan, Mei He, Ye Yang, Qing Wang, Mingshu Li:

An Analysis to Understand Software Trustworthiness. 2366-2371 - Ziren Wang, Ronghua Liang:

Discuss on Applying SPC to Quality Management in University Education. 2372-2375 - Jian Xiang, Lv Ye:

Thought and Tentative Idea of Reform in Formative Assessment. 2376-2380 - Jianjun Xie, Junhong Li, Yi Geng:

Enhancing Foundation to Foster Competence of Independent College Students. 2381-2385 - Youtian Qu, Chaonan Wang:

Research about the Model of Quality-Oriented Education and Ability Cultivation to College Students. 2386-2390 - Jialin Cui, Yigang Wang, Shengli Fan, Zhuoyuan Wang, Shenghuai Xu:

Discussion on Computer Education Mode of Engineering Course in Independent College. 2391-2395 - Haiwei Jin:

An Approach of Multi-Tactics in Programming Language Education. 2396-2401 - Jinfeng Dou, Jiabao Cao, Yongguo Jiang, Zhongwen Guo:

Research on the Teaching Reform of Operating System Courses. 2402-2406 - Minghui Wu

, Hui Yan:
System Dynamics Modeling and Simulation in Software Engineering Education. 2407-2411 - Jianhua Li, Weibin Guo, Hong Zheng:

An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era. 2412-2416 - Penglin Li, Zhi Liu, Xingbo Guo:

Research on the Diversification Training Mode of Software Talents Based on University-Enterprise Cooperation. 2417-2421 - Hong Huang, Dongyong Yang:

Teaching Design Patterns: A Modified PBL Approach. 2422-2426 - Muyun Yang

, Lixin Wang, Haoliang Qi, Tiejun Zhao, Sheng Li:
A Reflective Learning Model to Computer Undergraduates. 2427-2431 - Yi Li:

A New Approach to Teaching Logic in Discrete Mathematics. 2432-2437 - Huifang Deng:

Exploring the Way of Training High-Level Software Talents with Global Reach in China. 2438-2443 - Xiaoqing Feng, Jianping Han:

Practice and Discussion on a New Teaching Mode of "Case Guide Learning" in Basic of Database Application. 2444-2448 - Jianfeng Yang, Yinbo Xie, Qing Geng, Jolly Wang, Nick Bao:

Using cP^2BL in Teaching Multi-Core Related Contents. 2449-2453 - Luo Li, Shaogen Wu, Jia Luo:

Learning from Practicing: Adaptation of NIIT(India) Model for Software Developer Training to Chinese Higher Vocational and Technical Colleges. 2454-2458 - Youtian Qu, Chaonan Wang:

The Discussion and Design of Innovative Education Modein the College and University. 2459-2463 - Ningning Zhou, Zhengxu Zhao, Yulong Deng:

A New Evaluation Method Based on Measuring of Medium Truth Scale. 2464-2469 - Kai Cao, Xiaoyun Zhu:

Research and Design of Educational Resource Information Center for Investors Based on J2EE. 2470-2475 - Ben Liu, Hejie Chen, Wei He:

A Framework of Deriving Adaptive Feedback from Educational Ontologies. 2476-2480 - Wen Ding, Qing Wu, Weihua Hu, Zhiling Hu, Hongbiao Xie:

A Linux-based Development and Application of Automatic Test System. 2481-2484 - Haijun Mao, Haiyan Ma, Hong Zhuang, Penyin Wang:

The Research in Grade Teaching of Elementary Course of Computer. 2485-2489 - Yu Chen, Yuefeng Zheng, Decai Huang, Song'en Sheng, Jianqing Shi:

Theory and Application of School-Based Education Quality Evaluation Model Constructed from Improved AHP Method. 2490-2494 - Huiqiang Lin, Caixing Liu, Piyuan Lin:

A Method of Elicitation Teaching for Object-Oriented Analysis and Design Curriculum. 2495-2500 - Zhi Liu, Huaguo Jia, Shanshan Han:

Research on the Teaching Method of Combining the Theory and Practice in Data Structure Course. 2501-2506 - Guanlin Chen, Wenyong Weng:

Reform and Practice in Teaching J2EE Programming. 2507-2511 - Xuming Han, Limin Wang, Wanli Zuo, Hongzhi Wang, Guojun Chen:

Research on Teaching Reform of Computer Basic Courses in Technology Universities. 2512-2516 - Liang Zhang, Xiumin Liu, Xiujuan Liu:

Personalized Instructing Recommendation System Based on Web Mining. 2517-2521 - Hongjun Dai, Zhiping Jia, Xueqing Li, Yitao Guo:

Practical Training in the Embedded System Education: A New Way to Narrow the Gap with Industry. 2522-2527 - Qingsong Shi, Wei Hu, Sha Liu, Tianzhou Chen:

Introduction to the Reform on the Course of Fundamental Logic and Computer Design. 2528-2532 - Jun Zhang, Fuxiang Gao, Jian Wang:

Teaching Plan for Assembly Language and Programming: Conditional Directives and Macro Directives. 2533-2535 - Jiangbo Qian, Rangding Wang, Guang Jin, Yuan Li:

Breaking Boundaries among Hardware Curriculums by EDA Technology. 2536-2540 - Lijie Ren, Zhongwen Guo, Yongguo Jiang, Hao Wu:

Research and Practice of Experimental Simulation Platform for Course of Digital Logic. 2541-2545 - Yijun Liu, Banghai Wang

, Guobo Xie, Pinghua Chen, Zhenkun Li:
Designing a Multi-Processor Education Board for High-Performance Embedded Processing. 2546-2551 - Qing Wu, Wen Ding, Weihua Hu, Bishui Zhou, Tianzhou Chen:

Computer Ability Assisted Assessment System for Large-Scale Heterogeneous Distributed Environments. 2552-2555 - Jinzhong Xu, Keliang Jia, Jibin Fu:

Research of Automatic Question Answering System in Network Teaching. 2556-2560 - Yunfu Shen, Yue Wu, Mingjun Xin, Yu Zheng:

A Novel Self-Studying Platform with its Application to Programming Courses. 2561-2566 - Jianguo Xing, Wenmin Zhao, Hua Hu:

An FPGA-Based Experiment Platform for Multi-Core System. 2567-2571 - Zhongwen Li, Wuling Lv:

Research on Curriculum Design of "Real-time Analysis and Design" Based on Multi-core Platform. 2572-2576 - Keliang Jia, Xiuling Pang, Zhinuo Li:

Question Answering System in Network Education Based on FAQ. 2577-2581 - Fei Hong, Yu Bai:

Research on Networking Laboratory Design and Training. 2582-2587 - Shuoping Wang, Gaoyan Zhang, Jun Liu:

Design of an Expandable Website Platform for Quality Course Cluster. 2588-2591 - Haiqing Yang, Yong He:

Experimental Design of Applying Intelligent Computation to NIR Spectral Data Mining. 2592-2597 - Jianwen Feng, Guojun Dai

, Peng Liu, Xingfa Shen:
Research on Experimental Platform and Methods for the Course "Interface and Communication". 2598-2603 - Shulong Li:

Experiences of Simulation Training with Computer Technology in Police College. 2604-2608 - Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen:

The Practice of Remote Education on Information Security. 2609-2613 - Juan Feng, Jie Zhao, Guohua Zhan:

Content-based School Assignment Cluster Algorithm. 2614-2618 - Zhenkuan Pan, Yanbin Fan:

The Exploration and Practice of Embedded System Curriculum in Computer Science field. 2619-2624 - Rongchun Chen, Lixin Xue:

Integrated Application of Project Cases in Programming Course. 2625-2629 - Qiaoming Pan, Yongqiang Zhu, Wei Zhu:

Application of the Attribution Theory in Improving Computer Study Effects of University Students. 2630-2635 - Ping Huang, Mingrui Chen, Shaofan Chen:

The Practice Training in the Software Engineering Education. 2636-2640 - Wenxiang Zhang, Siyou Xiao, Xiaoyong Wang, Xuping Zhu:

Research on Construction Mode of Using Internet to Boost Language C Teaching. 2641-2646 - Jibin Fu, Keliang Jia, Jinzhong Xu:

Domain Ontology Learning for Question Answering System in Network Education. 2647-2652 - Hai Wang, Lihe Hu, Yunhe Lu, Po Hu:

Application of Project-Based Cooperative Learning in Computer Education. 2653-2658 - Xiumin Shi

, Ji Zhang, Yanbing Ju:
Research and Practice in Undergraduate Embedded System Course. 2659-2663 - Rongliang Luo, Minghui Wu, Yong Zhu, Yunru Shen:

Exploration of Curriculum Structures and Educational Models of Database Applications. 2664-2668 - Zhi Liu, Jian Lu, Xiaochun Dai:

Dynamic Demo System of Data Structure with C++/MFC. 2669-2674 - Long Hong, Yanli Chen, Ningning Zhou, Fangwu Yao:

Investigating on the Curriculum Visions of Computing Disciplines. 2675-2680 - Weidong Zhao, Anhua Wang:

University-Industry Collaboration for Software Engineering Teaching. 2681-2685 - Joseph Timoney, Stephen Brown, Deshi Ye:

Experiences in Software Testing Education: Some Observations from an International Cooperation. 2686-2691 - Min Lu, Xiaoyu Jin:

Analysis of a C Language Teaching Example Based on the ARCS Model: The Basic Concept and Use of Structure. 2692-2695 - Jianping Han, Weihua Hu, Xiaoqing Feng:

Exploration and Practice on Teaching Java as Introductory Language for Non-CSE Major Students. 2696-2700 - Qi Wu, Hong-Sen Yan, Hongbing Yang:

A Hybrid Forecasting Model Based on Chaotic Mapping and Improved v-Support Vector Machine. 2701-2706 - Yao Zeng, Echuan Yan, Chunfeng Li, Ying Li:

Application of Multivariable Time Series Based on RBF Neural Network in Prediction of Landslide Displacement. 2707-2712 - Ling Xiang, Guiji Tang, Yongli Zhu:

Vibration Signal Analysis of Rotor System Based on Time-Frequency Attributes. 2713-2717 - Xiangdong Liu, Junxing Zhang, Jinhai Zhang, Xinqin He:

Analyzing the Self-similarity of the TCP Bulk Flow. 2718-2721 - Guoran Rao, Ping Liang:

Forecasting Air Quality Based on ChaoticFull-AreaMethod. 2722-2726 - Jinyong Zhou, Lan Gao, Qing Hua:

Prediction of Vessel Traffic Accident Based on Chaotic Theory. 2727-2731 - Jianjun Hou, Fang Dong, Yundong Han:

Chaotic Behavior of Ship Swaying Motions in Irregular Waves. 2732-2737 - Haiyan Wu, Hongbo Wang, Mingbo Sun, Jin Zhou:

Experimental and Simulation Investigation in Fractal Dimension of Supersonic Combustion. 2738-2742 - Jun Zhang, Hai Zhao, Guilan Luo, Yan Zhou:

The Study on Fractals of Internet Router-level Topology. 2743-2747 - Xiuchun Shi, Longde Wu, Hongyong Yang:

Scientific Collaboration Network Evolution Model Based on Motif Emerging. 2748-2752 - Yurong Song, Guoping Jiang:

Hash Function Construction Based on Chaotic Coupled Map Network. 2753-2758 - Yu Ji, Lequan Min, Yan Meng:

Analytical Criteria for the Local Activity of Three-Port CNN with Five State Variables: Analysis and Application. 2759-2765 - Zhiwen Zhu, Hongli Wang, Hongchen Han, Jia Xu:

Nonlinear Dynamic Characteristics of Traffic Flow based on Continuous Car-following Model with Nonintegral Exponent. 2766-2770 - Yiran Gu, Yurong Song, Guoping Jiang, Suoping Wang:

A New Susceptible-Infected Model of Malware Propagation in the Internet. 2771-2775 - Zhiliang Zhu, Jingping Song, Dong Aoshuang, Hai Yu

, Ye Yang:
Research and Analysis of Securities Market based on Multi-Fractal Generator. 2776-2781 - Bin Zhang, Chenhui Jin:

Cryptanalysis of a Chaos-based Stream Cipher. 2782-2785 - Qian Zhou

, Zengqiang Chen:
Application of Chaos in Digital Fountain Codes. 2786-2791 - Dongming Chen, Zhiliang Zhu, Guangming Yang:

An Improved Image Encryption Algorithm Based on Chaos. 2792-2796 - Tiankai Sun, Xiaogen Shao, Xingyuan Wang:

A Novel Binary Image Digital Watermarking Algorithm Based on DWT and Chaotic Encryption. 2797-2802 - Zhao Song, Hengjian Li, Yan Xu:

A Secure and Efficient Fingerprint Images Encryption Scheme. 2803-2808 - Fei Peng

, Tao Deng, Min Long:
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling. 2809-2813 - Yongliang Xiao, Limin Xia:

A New Hyper-Chaotic Algorithm for Image Encryption. 2814-2818 - Chunbiao Li

, Hankang Wang:
The Scroll Control of a New Chaotic System. 2819-2823 - Hong Chen, Qun Ding, Jing Pang:

Study on the Chaotic Wave. 2824-2829 - Jiangdong Cai, Daoming Zhang, Zhenquan Jiang:

Study on the Nonlinear Dynamic Characteristic of Cone Penetrate Test Curve. 2830-2834 - Jia Xu, Hongli Wang, Zhiwen Zhu, Gen Ge:

Research on Optimal Control of Vehicle Vibration Based on Semi-Active Suspension System. 2835-2839 - Chaoxia Zhang, Simin Yu, Jinhu Lu

, Guanrong Chen
:
Generating Multi-Wing Butterfly Attractors from the Piecewise-Linear Chen System. 2840-2845 - Yan Meng, Lequan Min

, Yu Ji:
Application of Local Activity Theory to Rossler CNN Model. 2846-2851 - Wei Ou, Fengxing Zou, Xiaohong Xu, Gao Zheng:

Targets Assignment for Cooperative Multi-UAVs Based on Chaos Optimization Algorithm. 2852-2856 - Youxin Luo, Xiguang Huang, Bin Zeng:

Forward Displacement Analysis of the 4SPS-2CCS Generalized Stewart Platform Based on Hyper-Chaotic Neural Network Mathematical Programming Method. 2857-2862 - Fangfang Chen, Fangyue Chen, Weifeng Jin

, Lin Chen:
Topological Entropy and Complexity of One Class of Cellular Automata Rules. 2863-2867 - Lin Chen, Fangyue Chen, Fangfang Chen, Weifeng Jin

:
Complex Symbolic Dynamics of Bernoulli Shift Cellular Automata Rule. 2868-2873 - Lidong Wang, Xiuying Xing, Zhenyan Chu:

On Definitions of Chaos in Discrete Dynamical System. 2874-2878 - Yongxin Gui, Zhiming Zhou:

Hausdorff Dimension of a Class of Self-affine Fractals Generated by Linear Fibre Coding. 2879-2884 - Yandong Chu, Xian-Feng Li, Jiangang Zhang, Yingxiang Chang:

Numeration and Comparison of Two Kinds of Lyapunov Dimensions in Autonomous Chaotic Flows. 2885-2889 - Nan Yang, Zhangcai Long, Xianghui Zhao:

A New Method to Estimate Additive Noise in Synchronized Oscillations. 2890-2894 - Yunlong Li, Pingjian Zhang:

Chaos Study of the Lamprey Neural System via Improved Small Dataset Method. 2895-2899 - Yun Chen, Guanrong Chen

, Xiaofeng Wu:
A Note on Chaos Synchronization of Generalized Lorenz Systems. 2900-2902 - Yuhua Xu, Wuneng Zhou, Lebin Deng, Hongqian Lu:

Modified Projective Synchronization among Three Modified Chen Chaotic Systems with Unicoupled Response System. 2903-2907 - Yin Li, Biao Li

, Yong Chen:
Generalized Cascade Synchronization of Discrete-time Henon-like Map. 2908-2913 - Xulei Bao, Guangyi Wang, Cuiping Wang, Wei Feng:

Experimental Investigation on Impulsive Synchronization of Chaotic PN Sequences Based on FPGA. 2914-2918 - Jigui Jian, Yanjun Shen, Hui Yu:

Synchronization of Rikitake Chaotic Attractor via Partial System States. 2919-2924 - Jianning Yu, Jiangang Zhang, Li Zhang:

Improved Full State Hybrid Projective Synchronization ofChaotic Systems with the Different Order. 2925-2930 - Qi Han, Chuandong Li

, Junjian Huang, Xiaofeng Liao, Tingwen Huang:
Anticipating Synchronization of Chaotic Systems with Parameter Mismatch. 2931-2936 - Hao Zhu

, Shangbo Zhou, Weiwei Zhang:
Chaos and Synchronization of Time-Delayed Fractional Neuron Network System. 2937-2941 - Zhenwei Shang, Honge Ren, Jian Zhang:

A Block Location Scrambling Algorithm of Digital Image Based on Arnold Transformation. 2942-2947 - Yanping Cai, Shu Cheng, Yanping He, Ping Xu:

Application of Image Recognition Technology based on Fractal Dimension for Diesel Engine Fault Diagnosis. 2948-2953 - Zhen Qin, Hai Yu

, Jinling Ju:
Fractal Image Compression Based on Number of Hopping and Variance of Continuing Positive and Negative Pixels. 2954-2958 - Jianhua Wu, Chunhua Jiang, Liqiang Yao:

Medical Image Retrieval Based on Fractal Dimension. 2959-2961 - Yan Wang, Lanling Zeng, Yan Qi:

Golden Section in 3D Plants IFS Reconstruction. 2962-2967 - Bowen Sun, Litao Jiang, Boling Sun, Shengtao Jiang:

Research of Plant Growth Model Based on the Combination of L-system and Sketch. 2968-2972 - Shaoqing Yang, Sihua He, Hongwen Lin:

Video Image Targets Detection Based on the Largest Lyapunov Exponent. 2973-2977 - JiXiang Ye, Guanzheng Tan:

Facial Affection Recognition Algorithm Based on Gabor Wavelet Transformation and Fractal Dimension. 2978-2982 - Bocheng Bao

, Zhong Liu, Zhusheng Kang, Jianping Xu, Xiaohua Qiao:
An Unsymmetrical Hyperchaotic Attractor. 2983-2988 - Lin Ji

, Xiufeng Lang, Guowei Deng
:
Delay Adjusted Noise Effect in Coupled Nonlinear ChemicalSystem. 2989-2993 - Shuang Ma, Aiping Jiang:

A New Method of Financial Risk Management Based on Multifractal. 2994-2998 - Junjun Tang, Jing Wang, Cheng Huang, Guolun Wang, Xiong Wang:

Subprime Mortgage Crisis Detection in U.S. Foreign Exchange Rate Market by Multifractal Analysis. 2999-3004 - Huanmei Qin:

Research on Chinese Economic Effect of Central Bank Raising Interest Rates Based on System Dynamics. 3005-3010 - Liangsheng Chen:

On the Chaotic Dynamics Analysis of China Stock Market. 3011-3015 - Hongjuan Liu, Zhiliang Zhu, Huiyan Jiang, Beilei Wang:

A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map. 3016-3021 - Wenyu Zhang, Jinzhao Liang, Jianzhou Wang, Jinxing Che

:
Chaotic Time Series Forecasting Base on Fuzzy Adaptive PSO for Feedforward Neural Network Training. 3022-3027 - Junbiao Guan, Shujuan Guo, Xinchu Fu

:
Stability and Hopf Bifurcation in a Generalized Prototype Delayed System. 3028-3032 - Wenjuan Wu, Zengqiang Chen, Zhuzhi Yuan:

A Rigorous Computer-Assisted Verification of Horseshoe Chaos in a Seasonally Forced SEIR Epidemic Model. 3033-3038 - Hongyan Jia, Zengqiang Chen, Zhuzhi Yuan:

The Analysis and Circuit Implementation of a New Hyper-Chaos System. 3039-3044 - Zhusong Liu, Simin Yu, Guobo Xie, Yijun Liu:

A Novel Fourth-Order Chaotic Circuit and Its Implementation. 3045-3050 - Heng Song, Jingbo Guo:

Optimization of One-Dimensional Coded Modulations Using Chaotic Maps. 3051-3056 - Chong Fu, Zhiliang Zhu:

A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method. 3057-3061

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














