default search action
8th SNPD 2007: Qingdao, China
- Wenying Feng, Feng Gao:
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China. IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 3
- Xuerong Gong, Linsheng Lu, Rongcai Zhao:
Communication Optimization Algorithms based on Extend Data Flow Graph. 3-8 - Guoteng Pan, Qiang Dou, Lunguo Xie:
Study on distributing pattern of shared data in CC-NUMA system. 9-14 - Huafeng Deng, Yunsheng Liu, Yingyuan Xiao:
A Novel Algorithm for Load Balancing in Distributed Systems. 15-19 - Ke Shi:
A Replication and Cache based Distributed Metadata Management System for Data Grid. 20-25 - Lifeng Qi, Hexin Chen, Yan Zhao:
New Synchronization Scheme Between Audio and Video. 26-29 - Wei Tian, Yizheng Qiao, Zhiqiang Ma:
A New Scheme for Off-line Signature Verification Using DWT and Fuzzy Net. 30-35 - Yun Liu, Xiangguang Zhang, Chuanxu Wang:
A New Kind of Hybrid Filter Based on the Peak-and-Valley Filter and PCNN. 36-39 - Lijie Zhang, Haili Yin, Hui Liu:
Slices Mining Based on Singular Value. 40-43 - Jingsong He, Jian Tan, Qiansheng Fang:
Parzen Windows Estimation Using Laplace Kernel: A Novel Parametric Analysis with Information Content. 44-49 - Wen Zhou, Zongtian Liu, Yan Zhao:
Concept Hierarchies Generation for Classification using Fuzzy Formal Concept Analysis. 50-55 - Yue Hou, Jinyun Pu:
The Intelligent Damage Assessment and Intelligent Reconfiguration System of Ship Diesel System. 56-61 - J. G. Yin, Mingjiu Gai, G. Zhou, X. H. Hou:
Periodic solution for a class of higher-dimension impulsive functional differential equations with parameter. 62-66 - Weiming Wang, Zhenbing Zeng, Lu Yang:
A new mechanical algorithm for solving system of Volterra integral equation. 67-72 - Chao Zhang, Lianghong Zhang:
Classification for a class of second order singular equations on time scales. 73-76 - Shijie Dong, Zhifeng Gao, Yunhai Wang:
Positive Solutions for Quasilinear Second Order Differential Equation. 77-80 - Bo Deng, Yajun Du:
Research on Matching between User Queries and Web Pages Based on BAM. 81-85 - Yan Chen, Benoit Boulet, Ping Chen, Mingbo Zhao:
Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force Transducers. 86-91 - Yijiang Chen, Xiaodong Shi, Changle Zhou, Chang Su:
Automatic Keyphrase Extraction from Chinese Books. 92-97 - Ping Chen, Mingbo Zhao, Shaoqing Jia:
The Application of Fuzzy Neural Network in the Iatrical Monitor. 98-103 - Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang:
Using Trust Metric to Detect Malicious Behaviors in WSNs. 104-108 - Bing Liu, Ke Yu, Lin Zhang, Huimin Zhang:
MAC Performance and Improvement in Mobile Wireless Sensor Networks. 109-114 - Fang Wang, Guifa Teng, Lisheng Ren:
The Upper Bound of The Number of Nodes On Fixed Energy Budget in Wireless Sensor Networks. 115-118 - Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao:
Agent-based Trust Model in Wireless Sensor Networks. 119-124 - Shujuan Ji, Yongquan Liang, Xingpeng Xiao, Jixue Li, Qijia Tian:
An Attitude-adaptation Negotiation Strategy in Electronic Market Environments. 125-130 - Feixiang Zhu, Yingjun Zhang, Wenhai Sang:
Web Marine Spatial Information Service Based on Electronic Nautical Charts. 131-136 - Xin Jin, Jing Xu, XueMeng Li:
The Design and Implementation of XML-based Workflow Engine. 137-142 - Nimmy Ravindran, Yao Liang:
HIDE - A Web-based Hydrological Integrated Data Environment. 143-148 - Guilin Li, Jianzhong Li:
An Energy Efficient Query Procesing Algorithm Based on Relevant Node Selection for Wireless Sensor Networks. 149-154 - Liming He:
Delay-Minimum Energy-Aware Routing Protocol (DERP) for Wireless Sensor Networks. 155-160 - Liming He:
Energy-Efficient Multi-Path Routing with Short Latency and Low Overhead for Wireless Sensor Networks. 161-167 - Yingchang Xiang, Dechang Chen, Xiuzhen Cheng, Kai Xing, Min Song:
Localized Flooding Backbone Construction for Location Privacy in Sensor Networks. 167-171 - Ligang Dong, Bin Zhuge, Weiming Wang:
Research on Logical Function Blocks in ForCES-Based Routers. 172-177 - Huaxi Gu, Kun Wang, Chu Ke, Changshan Wang, Guochang Kang:
A New Inner Congestion Control Mechanism in Terabit Routers. 178-181 - Tao Li, Xiaoming Zhang, Zhigang Sun:
DynaNP - A Coarse-grain Dataflow Network Processor Architecture with Dynamic Configurable Processing Path. 182-187 - Zheng Gong, Yu Long, Xuan Hong, Kefei Chen:
Two Certificateless Aggregate Signatures From Bilinear Maps. 188-193 - Jia Yu, Fanyu Kong, Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability. 194-199 - Chengyu Hu, Daxing Li:
Forward-Secure Traceable Ring Signature. 200-204 - Xiaoming Hu, Shangteng Huang:
An Efficient ID-Based Restrictive Partially Blind Signature Scheme. 205-209 - Junqing Yang, Min Zhou, Quanyi Lv, Hongchan Zheng:
Geometric Design of Developable Bezier and B-spline Parametric Surfaces. 210-215 - Junqing Yang, Min Zhou, Xiaohong An, Lining Zhang:
Offset Approximation Algorithm for Subdivision Surfaces. 216-221 - Guili Yuan, Ji-zhen Liu, Wen Tan, Xiangjie Liu:
The Research and Application of Fuzzy Immune PID Control in the Load Control System of Tube Mill. 222-226 - Jixin Ma:
State-based Time-Series Analysis and Prediction. 227-232 - Lizhen Wang, Ao Yang, Hong Zhang:
Data Mining Prediction of Shovel Cable Service Lifespan. 233-238 - Xu E, Shaocheng Tong, Liangshan Shao, Baiqing Ye:
Rough Set Approach for Processing Information Table. 239-243 - Jianhua Wu, Qinbao Song, Junyi Shen:
An Novel Association Rule Mining Based Missing Nominal Data Imputation Method. 244-249 - Kuixiang Gou, Xiujun Gong, Zheng Zhao:
Learning Bayesian Network structure from distributed homogeneous data. 250-254 - Xiangguang Zhang, Yun Liu, Chuanxu Wang:
Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring Element. 255-258 - Jun Zhang, Jun Liu:
Image Segmentation with Multi-Scale GVF Snake Model Based on B-Spline Wavelet. 259-263 - Lihua Fu, Hongwei Li, Meng Zhang, Yuantong Shen:
Group Delay Based Approach for Frequency Estimation in Complex Noises. 264-268 - Shengli Shi, Zhong Qin, Jianmin Xu:
Robust Algorithm of Vehicle Classification Application. 269-272 - Rupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li:
Key-Insulated Group Signature Scheme with Verifier-Local Revocation. 273-278 - Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. 279-284 - Rongbo Lu, Dake He, Changji Wang:
Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings. 285-290 - Xiaoming Hu, Shangteng Huang:
An Efficient ID-Based Partially Blind Signature Scheme. 291-296 - Junli Lu, Lizhen Wang, Yaobo Li:
A Fuzzy Clustering Method Based on Domain Knowledge. 297-302 - Yijun Bei, Gang Chen, Lihua Yu, Feng Shao, Jinxiang Dong:
XML Query Recommendation Based On Association Rules. 303-308 - Ziqiang Wang, Qingzhou Zhang, Dexian Zhang:
An IA-Based Classification Rule Mining Algorithm. 309-313 - Jing Liu, Fei Fu, Junmo Xiao, Yang Lu:
Secure Routing for Mobile Ad Hoc Networks. 314-318 - Hailun Xia, Zhimin Zeng, Wei Ding:
Adaptive Backoff Algorithm based on Network Congestion in Multi-hop Wireless Ad hoc Networks. 319-324 - Jingjing Wang, Mingbo Zhao:
Scatternet Formation Algorithm in Multi-hop Environment based on Bionics. 325-330 - Yuhua Liu, Hao Huang, Kaihua Xu:
Multi-path-based Distributed TCP Caching for Wireless Sensor Networks. 331-335 - Dongbo Zhang, Yaonan Wang, Huixian Huang:
Rough Neural Network Modeling Through Supervised G-K Fuzzy Clustering. 336-341 - Keliang Jia, Kang Chen, Xiaozhong Fan, Yu Zhang:
Chinese Question Classification Based on Ensemble Learning. 342-347 - Xiao Yang, Jiancheng Wan, Fang Tan:
A Parsing Model Based on Ordered Tree Inclusion Matching. 348-353 - Ziping Zhao, Yaoting Zhu:
Study on Prediction of Prosodic Phrase Boundaries in Chinese TTS. 354-358 - Burim Sirisanyalak, Ohm Sornil:
Artificial Immunity-Based Feature Extraction for Spam Detection. 359-364 - Shu Gao, Dingfang Chen:
Semantic Approach to Visualization Service Discovery. 365-370 - Xiangang Zhao, Liutong Xu, Bai Wang:
A Resource Allocation Model with Cost-Performance Ratio in Data Grid. 371-376 - Zhitao Guan, Yuanda Cao, Muhammad Hanif Durad, Liehuang Zhu:
An Efficient Hybrid P2P Incentive Scheme. 377-382 - Yingkun Hou, Xiangcai Zhu, Zhu Lili, Mingxia Liu:
Image with Less Information Watermarking Algorithm Based on DWT. 383-387 - Meihua Wang, Kefeng Fan, Bin Yue, Xiaojun Yu:
A Content Protection Scheme for H.264-based Video Sequence. 388-393 - Hui Gao, Shanguang Chen, Guangchuan Su:
Emotion classification of mandarin speech based on TEO nonlinear features. 394-398 - Zhi Liu, Yun Zhang:
Stochastic Network Fluid Modeling with Probabilistic Wavelet System. 399-403 - Zongyuan Deng, Xi Shao, Zhen Yang:
A Novel Approach to Detect the Presence of LSB Steganographic Messages. 404-408 - Zhenfeng Gao, Yunhai Wang, Yanping Guo:
Multiple Positive Solutions for Second Order m-Point Boundary Value Problems. 409-412 - Weihua Jiang, Xiuming Li, Bin Wang:
LATEX The existence of positive solutions for multi-point BVPs with dependence on the first order derivative. 413-416 - Jiqing Qiu, Hongjiu Yang, Jinhui Zhang:
Optimal Guaranteed Cost Control for a Class of Uncertain Systems with both State and Input Delays via Delta Operator Approach. 417-422 - Lianqing Su, Zhifeng Gao, Jiqing Qiu, Peng Shi:
Robust Stability of Uncertain Cellular Neural Networks with Time-Varying Delays. 423-426 - Limei Zhou, Liwei Zhang:
A Log-Sigmoid lagrangisn neutral network for solving nonlinear programming. 427-431 - Shujuan Ji, Qijia Tian, Yongquan Liang, Hongmei Yang:
An Ontology Framework for EC Automated Negotiation Protocol. 432-437 - Hongxia Jin, Jianna Zhao, Xiaoxuan Chen:
The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects. 438-443 - Fang Jin, Peide Liu, Xin Zhang:
The Evaluation Study of Knowledge Management Performance Based on Grey-AHP Method. 444-449 - Peide Liu:
Evaluation Model of Customer Satisfaction of B2C E-Commerce Based on Combination of Linguistic Variables and Fuzzy Triangular Numbers. 450-454 - Xuesen Ma, Jianghong Han, Zhenchun Wei, Yuefei Wang:
an Improved Adaptive Genetic Algorithm in Optimization of Partner Selection. 455-460 - Chengming Qi:
An Ant Colony System Hybridized with Randomized Algorithm for TSP. 461-465 - Jian Tang, Jingsong He, Lu Huang:
A New Optimization Engine for the LSF Vector Quantization. 466-471 - Duc Thanh Nguyen:
Solving Timetabling Problem Using Genetic and Heuristic Algorithms. 472-477 - Hongjiang Wang, Fei Ji, Shengming Jiang, Liying Huang, Gang Wei:
stability analysis of timing acquisition methods with multi-hypothesis in indoor UWB multipath and MAI channel. 478-483 - Jingyi Wang, Zhiyu Zhou, Jian Wu:
An Innovative Restoration Algorithm with Prioritized Preemption Enabled. 484-489 - Fei Nie, Zengzhi Li:
Congestion Control Model Based on Hop-by-hop Feedback for Active Networks. 490-494 - Lin Huang, Yulin Zhang, Yonghong Ren:
Two multi-constrained multicast QoS routing algorithm. 495-500 - Fengqin Zhang:
Anti-periodic boundary value problem for impulsive differential equations with delay. 501-504 - Zhen Jin, Mainul Haque:
The SIS epidemic model with impulsive effects. 505-507 - Chun Ma, Fengqin Zhang, Zhen Jin:
Global Stability of a tuberculosis model with vertical transsmission. 508-511 - Jietao Zou, Jianguo Zhang, Xiaoyou Han, Hongxia Zhu:
Oscillations of a class of second-order nonlinear delay differential equations with variable sign coefficients. 512-516 - Jing Qiu, Lejian Liao:
Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking. 517-521 - Jing Qiu, Xiaofeng Liao, Ping Wang:
A method to construct dynamic S-box based on chaotic map. 522-525 - Jiancheng Ni, Zhishu Li, Zhonghe Gao, Jirong Sun:
Threats Analysis and Prevention for Grid and Web Service Security. 526-531 - Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent:
A Framework for Revocation of Proxy Certificates in a Grid. 532-537 - Xudong Lu, Jiancheng Wan:
User Interface Design Model. 538-543 - Liyan Yuan, Meng Xue:
Xregion: A structure-based approach to Storing XML Data in Relational Databases. 544-551 - Yanping Guo, Wei Xiang, Xiujun Liu:
The existence of periodic solutions for a class impulsive differential equations. 552-555 - Hyungchoul Kim, Sungwon Kang, Jongmoon Baik, In-Young Ko:
Test Cases Generation from UML Activity Diagrams. 556-561 - Bin Wang, Silian Sui, Hongliang Zhao:
Nash Equilibrium stability of rent-sinking competition and its game analysis. 562-566 - Binbin Du, Guang Zhang:
Classification and Existence of Non-oscillatory Solutions for Two-Dimensional Neutral Difference System. 567-572 - Shuang Li, Hailun He, Jinbao Song:
An Optimized Breaking Index for the Boussinesq-Type Numerical Model. 573-577 - Hailun He, Shuang Li, Jinbao Song:
Validity Test of the Eigenfunction Expansion Method in the Transient Wave Propagation Simulation. 578-581 - Conghua Zhou, Shiguang Ju:
SAT-based Bounded Model Checking for SE-LTL. 582-587 - Yong Liu, Ai-guang Yang:
Research and Application of Software-reuse. 588-593 - Yunmei Du, Shixian Li:
The differences of COTS-based project stakeholders. 594-598 - Ming Zhong, Yaoxue Zhang, Pengwei Tian, Cunhao Fang, Yuezhi Zhou:
A Unified-Index Based Distributed Specification for Heterogeneous Components Management. 599-604 - Shihong Feng, Jiancheng Wan:
Multi-device User Interface Development with Composition-oriented User Interface Design Patterns. 605-610 - Guangdong Huang, Ping Ling, Qun Wang:
A hybrid metaheuristic ACO-GA with an Application in Sports Competition Scheduling. 611-616 - Xianmei Zhao, Haoyin Li, Jin Zhang:
GA in Optimized Control of Central Air-conditioning System Based on ANN Simulation. 617-622 - Pei He, Lishan Kang, Qiongzhang Li:
Model for Parallel Verification of Programs. 623-628 - Mikhail Chalabine, Christoph W. Keßler:
A Survey of Reasoning in Parallelization. 629-634 - Yong Li:
Non-interactive Designated Confirmer Signature with Specific Verifier. 635-640 - Ling Dong, Kefei Chen, Mi Wen, Yanfei Zheng:
Protocol Engineering Principles for Cryptographic Protocols Design. 641-646 - Yong Yu, Bo Yang, Ying Sun:
A provably secure ID-based mediated signcryption scheme. 647-652