


default search action
10th TrustCom 2011: Changsha, China
- IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2135-9

- Ivan Stojmenovic:

Access Control in Distributed Systems: Merging Theory with Practice. 1-2 - Huaimin Wang:

TRUSTIE: Design of a Trustworthy Software Production Environment. 3-4 - Moon Ho Lee:

Jacket Matrix and Its Applications to Signal Processing. 5-6 - Yang Xiang

:
Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments. 7-8 - Valtteri Niemi:

Privacy, Identity and Trust in Context-Aware Mobile Services. 9-10 - Hakem Beitollahi, Geert Deconinck

:
A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks. 11-20 - Teodor Sommestad, Hannes Holm

, Mathias Ekstedt:
Estimates of Success Rates of Denial-of-Service Attacks. 21-28 - Lin Liu

:
Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets. 29-36 - Limin Liu, Jin Han, Debin Gao

, Jiwu Jing, Daren Zha:
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. 37-44 - Ben S. Y. Fung, Patrick P. C. Lee

:
A Privacy-Preserving Defense Mechanism against Request Forgery Attacks. 45-52 - Lei Zhang, Shui Yu

, Di Wu
, Paul A. Watters
:
A Survey on Latest Botnet Attack and Defense. 53-60 - Zorana Bankovic, José Manuel Moya

, Juan Carlos Vallejo, David Fraga, Pedro Malagón:
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques. 61-72 - Jianan Hao, Wentong Cai

:
Trusted Block as a Service: Towards Sensitive Applications on the Cloud. 73-82 - Miao Zhou, Yi Mu, Willy Susilo

, Man Ho Au
, Jun Yan
:
Privacy-Preserved Access Control for Cloud Computing. 83-90 - Sushmita Ruj, Amiya Nayak

, Ivan Stojmenovic:
DACC: Distributed Access Control in Clouds. 91-98 - Imad M. Abbadi, Muntaha Alawneh, Andrew P. Martin

:
Secure Virtual Layer Management in Clouds. 99-110 - Mahbub Ahmed, Yang Xiang

:
Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing. 111-117 - Jemal H. Abawajy:

Establishing Trust in Hybrid Cloud Computing Environments. 118-125 - Lingfeng Chen, Doan B. Hoang:

Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud. 126-133 - Mark Heydenrych, Elizabeth Marie Ehlers:

A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection. 134-141 - Ji Guo, Alan Marshall, Bosheng Zhou:

A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks. 142-149 - Shaoyin Cheng

, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang:
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code. 150-159 - Hong Song, Xiao Xiao, Weiping Wang, Luming Yang:

DENNC: A Wireless Malicious Detection Approach Based on Network Coding. 160-165 - Chi-Man Pun

, Xiaochen Yuan
, C. L. Philip Chen
:
Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution. 166-172 - Christian Callegari

, Stefano Giordano
, Michele Pagano
, Teresa Pepe:
Forecasting the Distribution of Network Traffic for Anomaly Detection. 173-180 - Silvio Cesare, Yang Xiang

:
Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs. 181-189 - Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:

A Method for Detecting Unknown Malicious Executables. 190-196 - Shao-Yu Wu, Ming-Hung Wang

, Kuan-Ta Chen:
Privacy Crisis Due to Crisis Response on the Web. 197-205 - Mahdi Asadpour, Mohammad Torabi Dashti

:
A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets. 206-213 - Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser:

Learning Whom to Trust in a Privacy-Friendly Way. 214-225 - Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala:

Semantics-Enhanced Privacy Recommendation for Social Networking Sites. 226-233 - Hervais Simo Fhom, Kpatcha M. Bayarou:

Towards a Holistic Privacy Engineering Approach for Smart Grid Systems. 234-241 - Ricardo Jorge Santos, Jorge Bernardino

, Marco Vieira
:
Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses. 242-249 - Lili Sun, Hua Wang

, Xiaohui Tao
, Yanchun Zhang, Jing Yang:
Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems. 250-257 - Wanita Sherchan, Surya Nepal

, Athman Bouguettaya
:
A Trust Prediction Model for Service Web. 258-265 - Lizi Zhang, Hui Fang, Wee Keong Ng

, Jie Zhang:
IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation. 266-273 - Zheng Yan

, Raimo Kantola, Peng Zhang:
A Research Model for Human-Computer Trust Interaction. 274-281 - Sancheng Peng, Guojun Wang:

Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. 282-287 - Aarthi Krishna, Vijay Varadharajan

:
A Hybrid Trust Model for Authorisation Using Trusted Platforms. 288-295 - Partheeban Chandrasekaran, Babak Esfandiari:

A Model for a Testbed for Evaluating Reputation Systems. 296-303 - Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang:

SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup. 304-311 - Hui Fang, Jie Zhang, Murat Sensoy

, Nadia Magnenat-Thalmann:
A Reputation Mechanism for Virtual Reality - Five-Sense Oriented Feedback Provision and Subjectivity Alignment. 312-319 - Wenjun Jiang, Guojun Wang:

SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks. 320-327 - Jianming Fu, Xinwen Liu, Binling Cheng:

Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing. 328-335 - Quan Bai

, Xing Su, Qing Liu, Andrew Terhorst
, Minjie Zhang
, Yi Mu:
Case-Based Trust Evaluation from Provenance Information. 336-343 - Han Jiao, Jixue Liu

, Jiuyong Li
, Chengfei Liu
:
A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories. 344-351 - Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai:

Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration. 352-361 - Rehab Alnemr, Maxim Schnjakin, Christoph Meinel:

Towards Context-Aware Service-Oriented Semantic Reputation Framework. 362-372 - Xiaolin Cao, Máire O'Neill:

A Private and Scalable Authentication for RFID Systems Using Reasonable Storage. 373-380 - Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma:

SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk. 381-388 - Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy:

An EAP Framework for Unified Authentication in Wireless Networks. 389-397 - Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu:

Inter-Chip Authentication through I/O Character. 398-402 - Fuwen Liu, Hartmut König:

A Simple Balanced Password-Authenticated Key Agreement Protocol. 403-408 - Tassos Dimitriou, Ahmad Sabouri:

Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks. 409-416 - Harinda Fernando

, Jemal H. Abawajy:
Mutual Authentication Protocol for Networked RFID Systems. 417-424 - Wei Feng, Yu Qin, Aimin Yu, Dengguo Feng:

A DRTM-Based Method for Trusted Network Connection. 425-435 - Julian Jang

, Hon Hwang
, Surya Nepal
:
Biometric Enabled Portable Trusted Computing Platform. 436-442 - André Seffrin, Sorin A. Huss:

Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis. 443-450 - Firas Bader, Andra Radoveneanu, Hani Ragab Hassen:

A New Security Architecture for BitTorrent. 451-455 - Owen Sacco, Alexandre Passant, Stefan Decker

:
An Access Control Framework for the Web of Data. 456-463 - Gonzalo Huerta Cánepa, Dongman Lee, Seon-Yeong Han:

Trust ME: A Trust Decision Framework for Mobile Environments. 464-471 - Yanjun Zuo, Suhas Lande:

A Logical Framework of Proof-Carrying Survivability. 472-481 - Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang:

CNSSA: A Comprehensive Network Security Situation Awareness System. 482-487 - Daniel Granlund, Christer Åhlund

:
A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support. 488-493 - Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu:

Secret Sharing Scheme with Fairness. 494-500 - Yongming Xie, Guojun Wang:

Distributed Private-Key Generation Scheme with Self-Certified Identity. 501-508 - Qian Sun, Min Wu:

A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks. 509-516 - Ahmed Al-Khazzar

, Nick Savage:
Biometric Identification Using User Interactions with Virtual Worlds. 517-524 - Jianyong Huang, Willy Susilo

, Jennifer Seberry:
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. 525-532 - Andriy Panchenko, Otto Spaniol, André Egners, Thomas Engel:

Lightweight Hidden Services. 533-540 - Lior Okman, Nurit Gal-Oz

, Yaron Gonen, Ehud Gudes, Jenny Abramov:
Security Issues in NoSQL Databases. 541-547 - Muhammad Bashir Abdullahi

, Guojun Wang, Felix Musau:
A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks. 548-555 - Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:

Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. 556-563 - Miao Xie, Song Han, Biming Tian:

Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks. 564-571 - Junjie Xiong, Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu:

RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks. 572-581 - Fabio Marturana, Gianluigi Me

, Rosamaria Berte, Simone Tacconi:
A Quantitative Approach to Triaging in Mobile Forensics. 582-588 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:

Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks. 589-596 - Raja Naeem Akram, Konstantinos Markantonakis

, Keith Mayes:
Cross-Platform Application Sharing Mechanism. 597-605 - Udaya Kiran Tupakula, Vijay Varadharajan

:
TVLAN: Trusted and Virtualised Local Area Networks. 606-612 - Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin:

A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems. 613-620 - Helen Balinsky, Neil C. A. Moore, Steven J. Simske:

Intelligent Assistant for Context-Aware Policies. 621-630 - Helen Balinsky, Liqun Chen

, Steven J. Simske:
Publicly Posted Composite Documents in Variably Ordered Workflows. 631-638 - Trey Reece

, Daniel B. Limbrick
, William H. Robinson
:
Design Comparison to Identify Malicious Hardware in External Intellectual Property. 639-646 - Zheng Yan

, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Global Trust Management. 647-654 - Andreu Pere Isern-Deyà

, M. Francisca Hinarejos
, Josep Lluís Ferrer-Gomila
, Magdalena Payeras-Capellà
:
A Secure Multicoupon Solution for Multi-merchant Scenarios. 655-663 - Stephen W. Neville, Michael Horie:

Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions. 664-672 - Haiyang Jiang, Jianhua Yang, Gaogang Xie:

Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors. 673-680 - Bhume Bhumiratana:

A Model for Automating Persistent Identity Clone in Online Social Network. 681-686 - Kaiyu Wan, Vangalur S. Alagar:

Dependable Context-Sensitive Services in Cyber Physical Systems. 687-694 - Rongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin:

Statistical Fault Localization via Semi-dynamic Program Slicing. 695-700 - Chunlei Mei, Maoxiang Yi, Zhifei Shen:

Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination. 701-705 - Carlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur

:
Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service. 706-713 - Fatemeh Barani, Mahdi Abadi

:
An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs. 714-720 - Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari

:
An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology. 721-725 - Tong Liu, Prathima Agrawal:

A Trusted Integrity Measurement Architecture for Securing Enterprise Network. 726-731 - Fang Huang, Cai-xia Wang, Jun Long:

Design and Implementation of Single Sign on System with Cluster CAS for Public Service Platform of Science and Technology Evaluation. 732-737 - Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:

A Framework for the Assessment of the Trustworthiness of Digital Records over Time. 738-744 - Mei Liu, Ge Fu, Jiwu Jing:

eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems. 745-750 - Aimin Yu, Shijun Zhao:

Enhancing Flexibility of TCG's TNC through Layered Property Attestation. 751-756 - Md. Tanzim Khorshed, A. B. M. Shawkat Ali

, Saleh A. Wasimi
:
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning. 757-764 - Ryan K. L. Ko

, Peter Jagadpramana, Bu-Sung Lee
:
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. 765-771 - Xinxin Fan, Guang Gong, Honggang Hu:

Remedying the Hummingbird Cryptographic Algorithm. 772-778 - Jinfang Sheng, Wen Zou, Liu Yang, Bin Wang:

A RFID-Based Context-Aware Service Model. 779-784 - Muntaha Alawneh, Imad M. Abbadi:

Defining and Analyzing Insiders and Their Threats in Organizations. 785-794 - Chi-Man Pun

, Jing-Jing Jiang, C. L. Philip Chen
:
Adaptive Client-Side LUT-Based Digital Watermarking. 795-799 - Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang:

Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability. 800-805 - Hyun-Jung Lee, Kwang-Woo Lee, Dongho Won:

Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System. 806-811 - Chi-won Song, Sungmin Park, Dongwook Kim, Sooyong Kang:

Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service. 812-817 - Warodom Werapun

, Julien Fasson, Béatrice Paillassa:
Home Service Communities and Authentication. 818-823 - Qiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang:

Key Privacy in McEliece Public Key Cryptosystem. 824-828 - Ronald Petrlic:

Integrity Protection for Automated Teller Machines. 829-834 - Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi

:
Group Formation with Neighbor Similarity Trust in P2P E-Commerce. 835-840 - Surya Nepal

, Wanita Sherchan, Cécile Paris:
STrust: A Trust Model for Social Networks. 841-846 - Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:

Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing. 847-852 - Zheng Yan

, Raimo Kantola, Peng Zhang:
Theoretical Issues in the Study of Trust in Human-Computer Interaction. 853-856 - Yu Chen, Zheng Yan

, Valtteri Niemi:
Implementation of a Reputation System for Pervasive Social Networking. 857-862 - Marc Barisch:

Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems. 863-872 - Peng Zhang, Hanlin Sun, Zheng Yan

:
Building up Trusted Identity Management in Mobile Heterogeneous Environment. 873-877 - Giampaolo Bella

, Lizzie Coles-Kemp:
Internet Users' Security and Privacy While They Interact with Amazon. 878-883 - Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang

:
A New Multivariate Hash Function with HAIFA Construction. 884-888 - Dong Yan, Wang Qi:

The Role of Trust in Social Life. 889-892 - Timo Kiravuo:

Reputation Based Collaboration among Ethernet Switches. 893-896 - Xunru Yin, Wenping Ma:

Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2. 897-899 - Ronghua Shi, Qian Su, Ying Guo, Moon Ho Lee:

Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem. 900-904 - Ronghua Shi, Jinjing Shi

, Ying Guo, Moon Ho Lee:
Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation. 905-910 - Xiaoping Lou, Zhigang Chen:

Quantum Distributed Ballot Scheme Based on Entanglement Swapping. 911-915 - Isredza Rahmi A. Hamid

, Jemal H. Abawajy:
Phishing Email Feature Selection Approach. 916-921 - Yujing Liu, Wei Peng

, Jinshu Su
:
Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning. 922-926 - Adeela Waqar

, Asad Raza, Haider Abbas
:
User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment. 927-932 - Sheikh Mahbub Habib

, Sebastian Ries, Max Mühlhäuser
:
Towards a Trust Management System for Cloud Computing. 933-939 - Chew-Yean Yam, Adrian Baldwin, Simon Shiu, Christos Ioannidis:

Migration to Cloud as Real Option: Investment Decision under Uncertainty. 940-949 - Chaitanya Belwal, Albert M. K. Cheng

, Walid Taha:
Release Offset Bounds for Response Time Analysis of P-FRP Using Exhaustive Enumeration. 950-957 - Ekain Azketa

, Juan P. Uribe, Marga Marcos
, Luís Almeida
, J. Javier Gutiérrez:
Permutational Genetic Algorithm for the Optimized Assignment of Priorities to Tasks and Messages in Distributed Real-Time Systems. 958-965 - Chaitanya Belwal, Albert M. K. Cheng

:
Feasibility Interval for the Transactional Event Handlers of P-FRP. 966-973 - Mohamed-Lamine Boukhanoufa, Ansgar Radermacher, François Terrier:

Offline Validation of Real-Time Application Constraints Considering Adaptation Rules. 974-980 - Ricardo Marau

, Karthik Lakshmanan, Paulo Pedreiras
, Luís Almeida
, Raj Rajkumar:
Efficient Elastic Resource Management for Dynamic Embedded Systems. 981-990 - Miao Zhou, Santiago Bock, Alexandre Peixoto Ferreira, Bruce R. Childers, Rami G. Melhem, Daniel Mossé:

Real-Time Scheduling for Phase Change Main Memory Systems. 991-998 - Borislav Nikolic, Muhammad Ali Awan

, Stefan M. Petters
:
SPARTS: Simulator for Power Aware and Real-Time Systems. 999-1004 - Ankita Arora, Sri Parameswaran

, Roshan G. Ragel, Darshana Jayasinghe:
A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel Attacks. 1005-1014 - Guangjun Xie, Guangzhi Xu, Gang Wang, Jing Liu, Rui Cao, Yan Gao:

hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs. 1015-1022 - Ming-Feng Chang, Wen-Yew Liang:

Learning-Directed Dynamic Voltage and Frequency Scaling for Computation Time Prediction. 1023-1029 - Xiaowen Chen, Shuming Chen:

DSBS: Distributed and Scalable Barrier Synchronization in Many-Core Network-on-Chips. 1030-1037 - Yazhi Huang, Qing'an Li

, Chun Jason Xue
:
Minimizing Schedule Length via Cooperative Register Allocation and Loop Scheduling for Embedded Systems. 1038-1044 - Yibo Guo, Qingfeng Zhuge, Jingtong Hu

, Edwin Hsing-Mean Sha:
Optimal Data Placement for Memory Architectures with Scratch-Pad Memories. 1045-1050 - Owen R. Kelly, Hakan Aydin, Baoxian Zhao:

On Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task Sets. 1051-1059 - Chaitanya Belwal, Albert M. K. Cheng

:
A Sufficient Schedulability Test for Real-Time Software Transactional Memory. 1060-1067 - Dakshina Dasari

, Björn Andersson, Vincent Nélis
, Stefan M. Petters
, Arvind Easwaran
, Jinkyu Lee:
Response Time Analysis of COTS-Based Multicores Considering the Contention on the Shared Memory Bus. 1068-1075 - Xiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang

, Yuzhuo Fu, Meikang Qiu:
Efficient Implementation of Thermal-Aware Scheduler on a Quad-core Processor. 1076-1082 - Buyoung Yun, Kang G. Shin, Shige Wang:

Thermal-Aware Scheduling of Critical Applications Using Job Migration and Power-Gating on Multi-core Chips. 1083-1090 - Chaitanya Belwal, Albert M. K. Cheng

:
Schedulability Analysis of Transactions in Software Transactional Memory Using Timed Automata. 1091-1098 - Stefan Schäckeler, Nityananda Jayadevaprakash:

Visualization of Computational Processes of Procedural Abstraction Optimization Passes. 1099-1108 - Christian Wiederseiner, Vahid Garousi

, Michael Smith:
Tool Support for Automated Traceability of Test/Code Artifacts in Embedded Software Systems. 1109-1117 - Xiaoli Gong, Jie Ma, Qingcheng Li, Jin Zhang:

Automatic Model Building and Verification of Embedded Software with UPPAAL. 1118-1124 - Geng Chen, Lei Luo, Lijie Wang:

A Precise Memory Model for Operating System Code Verification. 1125-1132 - Takahiro Chiba, Yuichi Itami, Myungryun Yoo, Takanori Yokoyama

:
A Distributed Real-Time Operating System with Location-Transparent System Calls for Task Management and Inter-task Synchronization. 1133-1138 - Dong Jin, Tatsuo Tsuji:

Parallel Data Cube Construction Based on an Extendible Multidimensional Array. 1139-1145 - Hallstein Asheim Hansen:

Safety Verification of Non-linear, Planar Proportional Control with Differential Inclusions. 1146-1153 - Hüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat

, Rolf Johansson:
Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts. 1154-1163 - Risat Mahmud Pathan, Jan Jonsson:

FTGS: Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors. 1164-1175 - Sara Tucci Piergiovanni, Chokri Mraidha

, Ernest Wozniak, Agnes Lanusse, Sébastien Gérard:
A UML Model-Based Approach for Replication Assessment of AUTOSAR Safety-Critical Applications. 1176-1187 - Hongfei Yin, Hongjun Dai, Zhiping Jia:

Verification-Based Multi-backup Firmware Architecture, an Assurance of Trusted Boot Process for the Embedded Systems. 1188-1195 - Matthias Hagner, Adina Aniculaesei, Ursula Goltz:

UML-Based Analysis of Power Consumption for Real-Time Embedded Systems. 1196-1201 - Yann-Hang Lee, Preetham Chandrian, Bo Li:

Efficient Java Native Interface for Android Based Mobile Devices. 1202-1209 - Yi-Zong Ou, Edward T.-H. Chu, Wen-wei Lu, Jane W.-S. Liu, Ta-Chih Hung, Jwu-Sheng Hu:

Resource Management for Robotic Applications. 1210-1216 - Shaohua Liang, Md. Zakirul Alam Bhuiyan

, Guojun Wang:
Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs. 1217-1223 - Feng Zeng, Lan Yao, Zhigang Chen, Huamei Qi:

A Distributed and Shortest-Path-Based Algorithm for Maximum Cover Sets Problem in Wireless Sensor Networks. 1224-1228 - Kenichi Asami, Hayato Hagiwara, Mochimitsu Komori:

Visual Navigation System with Real-Time Image Processing for Patrol Service Robot. 1229-1234 - Hao Liu, Wei Guo, Chao Lu, Jizeng Wei:

An Efficient Stereoscopic Game Conversion System for Embedded Platform. 1235-1240 - Patrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, Bernd Niehoff:

Autonomous Parameter and Schedule Configuration for TDMA-Based Communication Protocols Such as FlexRay. 1241-1246 - Alexandre Wagner Chagas Faria, Leandro Pfleger de Aguiar, Daniel S. D. Lara, Antonio Alfredo Ferreira Loureiro:

Comparative Analysis of Power Consumption in the Implementation of Arithmetic Algorithms. 1247-1254 - Xiaojian Liu, Zhixue Wang:

Extending EAST-ADL2 to Support Aspectual Requirement Specification and Analysis for Automotive Software. 1255-1263 - Qiong Wang, Cong Liu, Zhiying Wang:

An Advanced and Effective Literature Search Algorithm Based on Analytic Hierarchy Process. 1264-1270 - Taner Tuncer

, Yetkin Tatar:
Detection DoS Attack on FPGA Using Fuzzy Association Rules. 1271-1276 - Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu:

Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks. 1277-1282 - Zhou Lu, Kailong Zhang, Xingshe Zhou:

A Software Fault-Tolerant Method Based on Exception Handling in RT/E System. 1283-1287 - Hongzhi Song, Guodong Si, Lei Yang, Huakun Liang, Lixia Zhang:

Using Project-Based Learning and Collaborative Learning in Software Engineering Talent Cultivation. 1288-1293 - Li Cheng, Cong Wang:

Study of Experiment Structure in the Computer Networks Course Using PBL Methodology. 1294-1297 - Yinbo Xie, Chengcheng Guo, Jianfeng Yang:

The Effective Second Classroom on Embedded System Education. 1298-1302 - Zhenzhou Tang

, Chang Li, Chunrong Zhang, Xiaoqiu Shi:
The Practice Teaching Reform of Modern Communication Technologies Course for Non-communication Majors. 1303-1307 - Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li:

Reform and Practice of Training Engineering Professionals in 2C+E Computer Science. 1308-1312 - Chaoxiang Chen, Shiping Ye

, Binbin Zhou, Guoyong Dai:
Study and Practice on Teaching Team Construction of Computer Specialties in Private Undergraduate Universities and Colleges. 1313-1318 - Qifan Yang, Jianping Cai, Jianzhong Wu, Meimei Huo:

Course Improvements to 'the Principle of Computer Organization' Based on the Goal of Disciplinary Education: Taking the Examples of the Computing Science Faculty of Zhejiang University City College. 1319-1322 - Yikui Zhang, Yunfen Tian, Liwei Zhu, Haoxiang Zuo:

Teaching Method Practicing on Embedded Software Engineering Curriculum. 1323-1327 - Weihua Cao, Gang Chen, Xin Chen, Min Wu:

Optimal Tracking Agent: A New Framework for Multi-agent Reinforcement Learning. 1328-1334 - Xing Gu, Qun Yang, Dechang Pi, He-yang Ke:

A Global Scheduling Algorithm Based on Dynamic Critical Path. 1335-1338 - Yisong Lin, Tao Tang, Guibin Wang:

Power Optimization for GPU Programs Based on Software Prefetching. 1339-1346 - Xia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, Pingpeng Yuan:

I/O Scheduling by Using Multi-network Interfaces of Virtualization System. 1347-1354 - Lingjie Zhang, Ying Zhao, Kaixi Hou:

The Research of Levenberg-Marquardt Algorithm in Curve Fittings on Multiple GPUs. 1355-1360 - Jun Zhang, Renjun Shao:

Object-Level Data Model for Keyword Search over Relational Databases. 1361-1366 - Che-Lun Hung, Yaw-Ling Lin

, Kuan-Ching Li
, Hsiao-Hsi Wang, Shih-Wei Guo
:
Efficient GPGPU-Based Parallel Packet Classification. 1367-1374 - Jun Peng, Huiyuan Xian, Xiaoyong Zhang, Zheqin Li:

Context-Aware Vertical Handoff Decision Scheme in Heterogeneous Wireless Networks. 1375-1380 - Wei Liu, Feiyan Shi, Wei Du:

An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications. 1381-1386 - Bingning Han, Lihong Jiang, Hongming Cai:

Abnormal Process Instances Identification Method in Healthcare Environment. 1387-1392 - Deng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, Zhong Ren:

A Simulation Study of Unstructured P2P Overlay for Multimedia Streaming. 1393-1399 - Haibo Yu, Tsunenori Mine, Makoto Amamiya:

Towards User Intent Based Searching. 1400-1407 - Kun-Ming Yu, Shu-Hao Wu:

An Efficient Load Balancing Multi-core Frequent Patterns Mining Algorithm. 1408-1412 - Tian-Liang Huang, Tian-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li

, Ching-Hsien Hsu, Hsi-Ya Chang:
Fault Tolerance Policy on Dynamic Load Balancing in P2P Grids. 1413-1420 - Sheng Liu, Hongdan Liu, Zhenguo Gao:

Power Control Game Algorithm Based on Combination Pricing Function. 1421-1424 - Libing Wu

, Yalin Ke, Yanxiang He, Nan Liu:
A Block Gathering Based on Mobile Web Page Segmentation Algorithm. 1425-1430 - Chuncong Xu, Xiaomeng Huang, Guangwen Yang, Yang Zhou:

A Two-Layered Replica Management Method. 1431-1436 - Yi Li, Mingzhe Zhang, Jiaqi Gu:

An Email Server Optimized for Storage Issues. 1437-1443 - Kefei Wang, Heying Zhang, Lihong Peng, Baohua Fan:

Improving the Adaptiveness of FAST TCP Based on the Stability with Time-Delay. 1444-1451 - Ming Fang, Songqiao Chen, Kefei Wang:

Achieving High Throughput in High-Radix Switch. 1452-1456 - Xiaohua Zhang, Yuto Yoshida, Ning Xie:

Anisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from Real Image. 1457-1463 - Atsushi Mizoguchi

, Kazunori Miyata
:
Modeling Trees with Rugged Surfaces. 1464-1471 - Emmanuel Kondela, Huang Dong Jun:

A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space Detection. 1472-1476 - Muhammad Hassan, Ahsen Mehmood, Muhammad Faisal Khan:

An Efficient Method of Tracking across Multiple Cameras. 1477-1481 - Jinshun Li, Yanyu Hu:

Nose Surgery Simulation Based on Volumetric Laplacian Deformation. 1482-1487 - Yizhi Liu, Xiangdong Wang, Yongdong Zhang, Sheng Tang:

Fusing Audio-Words with Visual Features for Pornographic Video Detection. 1488-1493 - Sanding Luo, Xiaomin Fang, Cong Zhao, Yisha Luo:

Text Line Based Correction of Distorted Document Images. 1494-1499 - Cuiqin Hou, Yibin Hou, Zhangqin Huang, Qian Liu:

Overlapping One-Class SVMs for Utterance Verification in Speech Recognition. 1500-1504 - Fan Guo, Zixing Cai, Jin Tang:

Chinese Traffic Police Gesture Recognition in Complex Scene. 1505-1511 - Yunlong Zhang, Jingyu Zhou, Jia Cheng:

Preference-Based Top-K Influential Nodes Mining in Social Networks. 1512-1518 - Xiaoping Fan

, Yueshan Xie, Zhifang Liao, Xiaoqing Li, Li-min Liu:
A Weighted Cluster Ensemble Algorithm Based on Graph. 1519-1523 - Yan Gao, Jin Liu, PeiXun Ma:

The Hot Keyphrase Extraction Based on TF*PDF. 1524-1528 - Fahmi Bargui, Hanêne Ben-Abdallah

, Jamel Feki:
A Decision Making Ontology Building Process for Analytical Requirements Elicitation. 1529-1536 - Weiguo Liu, Jia OuYang:

Clustering Algorithm for High Dimensional Data Stream over Sliding Windows. 1537-1542 - Jiang Cao, XinJun Mao, Huining Yan, Yushi Huang, Huaimin Wang, Xicheng Lu:

Capability as Requirement Metaphor. 1543-1549 - Chengying Mao

:
Variable Precision Rough Set-Based Fault Diagnosis for Web Services. 1550-1555 - Jianhua Li, Songqiao Chen, Lin Jian, Hongyu Zhang:

A Web Services Composition Model and Its Verification Algorithm Based on Interface Automata. 1556-1563 - Zaiwen Feng, Keqing He, Rong Peng, Buqing Cao:

Towards a Behavior-Based Restructure Approach for Service Composition. 1564-1571 - Yi Guo, XinJun Mao, Cuiyun Hu:

Design Pattern for Self-Organization Multi-agent Systems Based on Policy. 1572-1577 - Bin Wang, Dan Yin, Taiwen Wu, Jinfang Sheng:

Plug-In Based Integrated Development Platform for Industrial Control System-P-IDP4ICS. 1578-1583 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:

A Certificate Driven Access Control Strategy for Service Composition and Its Analysis. 1584-1591 - Nan Zhang, Jiwu Jing, Peng Liu:

CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era. 1592-1599 - Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen:

Towards Detecting Thread Deadlock in Java Programs with JVM Introspection. 1600-1607 - Jiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, Jiangchun Ren:

VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT File System. 1608-1615 - Yu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang:

A Property-Based Attestation Scheme with the Variable Privacy. 1616-1623 - Jun Peng, Junbo Li, Shuo Li, Jing Li:

Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor Networks. 1624-1629 - Zhongke Zhang, Yun Wang:

An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks. 1630-1637 - Muhammad Bilal, Pauline M. L. Chan

:
A Game Theoretic Coalitional Bidding Scheme for Efficient Routing in Vehicular Ad Hoc Networks. 1638-1645 - Zhiwu Huang, Yuan Cheng, Weirong Liu:

A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless Sensor Networks. 1646-1651 - Weike Chen, Heng Shou, Wenfeng Li:

A Method for Searching the Centroid of a 3D Cluster Based on RSSI. 1652-1656 - Zheng Ma, Weijia Jia

, Guojun Wang:
Routing with Virtual Region Coordinates in Wireless Sensor Networks. 1657-1661 - Jin Zheng, Xinlin Xu, Guojun Wang:

Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks. 1662-1667 - Poonam Goyal

, Navneet Goyal, Rohan Sunil Karwa, Matthew John:
Phase-Wise Clustering of Time Series Gene Expression Data. 1668-1674 - Emanuele Covino

, Giovanni Pani
:
A Formal Approach for Modeling Interactive Visual Interfaces. 1675-1683 - WenQi Huang, Liang Yu:

A Quasi Physical Method for the Equal Sphere Packing Problem. 1684-1690 - Hailin Chen, Zuping Zhang, Jing Xia:

A Refined and Heuristic Algorithm for LD tagSNPs Selection. 1691-1694 - Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Minghui Wang, Wenyue Zhang:

Improved Partial Parallel Decision Feedback Multiuser Detection for Multiuser-MIMO System. 1695-1698 - Kim-Yung Lu:

A Data Simulator for ZigBee-Base Wireless Sensor Network System. 1699-1703 - Balázs Karlócai, Andras Bojárszky, János Levendovszky:

Energy Aware Routing Protocols for Wireless Sensor Networks Using Discrete Transmission Energies. 1704-1707 - Zaid Ahmed Zabanoot, Geyong Min:

Performance Design and Analysis of Handoff in Hierarchical Wireless Networks. 1708-1714 - Xinqing Yan, Yan Xu, Bin Li:

A Biased Modified Binary Query Tree Protocol for RFID Tag Collision Resolution. 1715-1720 - Fei Shi, Dongxu Jin, Weijie Liu, JooSeok Song:

Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks. 1721-1726 - Dongxu Jin, Fei Shi, JooSeok Song:

Energy-Efficiency Media Independent Handover Mechanism. 1727-1732 - Yinghui Meng, Jian Chen, Yingyou Wen, Hong Zhao:

The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network. 1733-1738 - Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:

Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. 1739-1744 - Li Gao, Xiaomin Wang, Wenfang Zhang:

Chaotic Hash Function Based on Tandem-DM Construction. 1745-1749 - Annapurna P. Patil, K. Rajani Kanth, Apoorva Yadhava, H. P. Rakshith, Joseph Tom:

Implementation and Performance Evaluation of an Adaptive Routing Algorithm in MANETs. 1750-1755 - Younchan Jung

, Enrique Festijo:
Session Key Generation for a Group Call and Device for Security Control. 1756-1762 - Wenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, Jianzhong Wang

:
Identification of Masses in Digital Mammogram Using an Optimal Set of Features. 1763-1768 - Wenfei Chen, Zuohua Miao, Delie Ming:

Automated Inspection Using X-Ray Imaging. 1769-1772 - Jianhua Li, Songqiao Chen, Yongjun Li, Qian Zhang:

Semantic Web Service Automatic Composition Based on Service Parameter Relationship Graph. 1773-1778 - Yanhua Zhang, Chunhong Zhang, Gang Wang:

Exploit TIVs to Find Faster Paths. 1779-1782 - Zhen Chen, Chunhong Zhang, Yang Ji:

Context Awareness for Self-Adaptiveness in Smart Terminals. 1783-1788 - Andreas Bontozoglou, Kun Yang, Ken Guild:

Simulation Tools Enabling Research in Convergence of Fixed and Mobile Networks. 1789-1794 - Sha Sha, Rosemary Halliwell

:
Performance Modelling and Analysis of Dynamic Class-Based Call Admission Control Algorithm Using Fuzzy Logic for Heterogeneous Wireless Networks. 1795-1800

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














