Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/isctcs:"
@proceedings{DBLP:conf/isctcs/2014, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47401-3}, doi = {10.1007/978-3-662-47401-3}, isbn = {978-3-662-47400-6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/BaiJLT14, author = {Xu Bai and Lei Jiang and Xinxing Liu and Jianlong Tan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {{RSA} Encryption/Decryption Implementation Based on Zedboard}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {114--121}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_15}, doi = {10.1007/978-3-662-47401-3\_15}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/BaiJLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/BaiXZ14, author = {Quan Bai and Gang Xiong and Yong Zhao}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic Measurement}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {342--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_45}, doi = {10.1007/978-3-662-47401-3\_45}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/BaiXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Boegh14, author = {J{\o}rgen B{\o}egh}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Understanding Human Goal Setting as a Means for Supporting Goal Oriented Requirements Engineering}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {253--259}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_33}, doi = {10.1007/978-3-662-47401-3\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/Boegh14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ChenD14, author = {Heng Chen and Xiaoshe Dong}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Web-Based Heatmap of Physical Machines in Cloud Computing}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {107--113}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_14}, doi = {10.1007/978-3-662-47401-3\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ChenD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ChenPCSY14, author = {Yan Chen and Yiguo Pu and Xiaojun Chen and Jinqiao Shi and Xiaojie Yu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {{CAS:} Content Attribution System for Network Forensics}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {129--136}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_17}, doi = {10.1007/978-3-662-47401-3\_17}, timestamp = {Sun, 01 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ChenPCSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/CuiLYY14, author = {Dong Cui and Chuanyi Liu and Meiqi Yang and Jincui Yang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {99--106}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_13}, doi = {10.1007/978-3-662-47401-3\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/CuiLYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/DingZWPLQ14, author = {Chao Ding and Mingxia Zeng and Kui Wang and Polo Pei and Zhongzhi Luan and Depei Qian}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring Systems}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {304--310}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_40}, doi = {10.1007/978-3-662-47401-3\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/DingZWPLQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/DuY14, author = {Xuefeng Du and Xiaodong Yan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Tracking and Analysis of Hot Words and Posts for University Campus}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {137--143}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_18}, doi = {10.1007/978-3-662-47401-3\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/DuY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/FengWZHG14, author = {Weiwei Feng and Peng Wang and Chuan Zhou and Yue Hu and Li Guo}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Nonparametric Topic-Aware Sparsification of Influence Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {83--90}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_11}, doi = {10.1007/978-3-662-47401-3\_11}, timestamp = {Wed, 05 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/FengWZHG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/GaoG14, author = {Huimin Gao and Zeng Guang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {The Optimization Design of High {Q} Microwave Photonic Filters Based on Cascade Fiber Bragg Gratings}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {267--273}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_35}, doi = {10.1007/978-3-662-47401-3\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/GaoG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/GuangLMY14, author = {Zeng Guang and Yao Lin and Zhao Ming and Ma Yilan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {The Improvement and Implementation of iSLIP Algorithm Based on {FPGA}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {260--266}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_34}, doi = {10.1007/978-3-662-47401-3\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/GuangLMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HeJ14, author = {Xin He and Huiyun Jing}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Security Risk Assessment of Rich Communication Services Over {LTE}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {122--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_16}, doi = {10.1007/978-3-662-47401-3\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HeJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HeJYC14, author = {Xiaowei He and Shuyuan Jin and Yunxue Yang and Huiqiang Chi}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {DDoS Detection Based on Second-Order Features and Machine Learning}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {197--205}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_26}, doi = {10.1007/978-3-662-47401-3\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HeJYC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HuangY14, author = {Hongjie Huang and Shuqiang Yang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A Method of Evaluating Distributed Storage System Reliability}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {189--196}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_25}, doi = {10.1007/978-3-662-47401-3\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HuangY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/JiaLM14, author = {Bin Jia and Zhaowen Lin and Yan Ma}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {221--228}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_29}, doi = {10.1007/978-3-662-47401-3\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/JiaLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/JiangQL14, author = {Xinmin Jiang and Lirong Qiu and Yeqing Li}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A Tibetan Word Sense Disambiguation Method Based on HowNet and Chinese-Tibetan Parallel Corpora}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {152--159}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_20}, doi = {10.1007/978-3-662-47401-3\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/JiangQL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/JieZQ14, author = {Yuan Jie and Liu Zhishuai and Xiaoyu Qiu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Community Detection in Complex Networks: Algorithms and Analysis}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {238--244}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_31}, doi = {10.1007/978-3-662-47401-3\_31}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/JieZQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiC14, author = {Wei Li and Feng Cao}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Trusted Cloud Service Certification and Evaluation}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {175--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_23}, doi = {10.1007/978-3-662-47401-3\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiLLZ14, author = {Linghan Li and Yonghua Li and Jiaru Lin and Tianle Zhang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Enhanced AllJoyn Network with Centralized Management}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {183--188}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_24}, doi = {10.1007/978-3-662-47401-3\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiLLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiLZ14, author = {Jing Li and Yueming Lu and Xi Zhang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Extracting News Information Based on Webpage Segmentation and Parsing {DOM} Tree Reversely}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {48--55}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_7}, doi = {10.1007/978-3-662-47401-3\_7}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiWGWH14, author = {Qian Li and Weiguo Wu and Liang Gao and Lei Wang and Jianhang Huang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {41--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_6}, doi = {10.1007/978-3-662-47401-3\_6}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiWGWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiXZH14, author = {Baohui Li and Kefu Xu and Chuang Zhang and Yue Hu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {{SFAPCC:} {A} Secure and Flexible Architecture for Public Cloud Computing}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {160--165}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_21}, doi = {10.1007/978-3-662-47401-3\_21}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/LiXZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuSFLY14, author = {Xiaomei Liu and Yong Sun and Liang Fang and Junpeng Liu and Lingjing Yu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A Survey of Network Traffic Visualization in Detecting Network Security Threats}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {91--98}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_12}, doi = {10.1007/978-3-662-47401-3\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiuSFLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LuZSLS14, author = {Qiuwen Lu and Zhou Zhou and Hongzhou Sha and Qingyun Liu and Hongcheng Sun}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {74--82}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_10}, doi = {10.1007/978-3-662-47401-3\_10}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/LuZSLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/MonizY14, author = {Krishna Moniz and Yuyu Yuan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User Registration}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {359--369}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_47}, doi = {10.1007/978-3-662-47401-3\_47}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/MonizY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/PengSDT14, author = {Huailiang Peng and Majing Su and Qiong Dai and Jianlong Tan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Enhancing Security and Robustness of {P2P} Caching System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {56--64}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_8}, doi = {10.1007/978-3-662-47401-3\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/PengSDT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/RennochW0S14, author = {Axel Rennoch and Marc{-}Florian Wendland and Andreas Hoffmann and Martin A. Schneider}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Advanced Test Modelling and Execution Based on the International Standardized Techniques {TTCN-3} and {UTP}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {245--252}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_32}, doi = {10.1007/978-3-662-47401-3\_32}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/RennochW0S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ShaLLZZW14, author = {Hongzhou Sha and Xiaoqian Li and Qingyun Liu and Zhou Zhou and Liang Zhang and Lidong Wang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {{RAMID:} {A} Novel Risk Assessment Model of Information Dissemination on Social Network}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {295--303}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_39}, doi = {10.1007/978-3-662-47401-3\_39}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/ShaLLZZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ShaoLT14, author = {Yan Shao and Yanbing Liu and Jianlong Tan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Accelerating {DFA} Construction by Parallelizing Subset Construction}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {16--24}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_3}, doi = {10.1007/978-3-662-47401-3\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ShaoLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/TangZW14, author = {Jiqiang Tang and Xiaoxiang Zou and Dongbin Wang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Design and Performance Analysis of Utility Maximization-Based Cooperative {MAC} in Multi-rate WiFi Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {213--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_28}, doi = {10.1007/978-3-662-47401-3\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/TangZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuFZX14, author = {Xu Wu and Yue Fan and Xi Zhang and Jin Xu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Research of eID Mobile Identity Authentication Method}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {350--358}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_46}, doi = {10.1007/978-3-662-47401-3\_46}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuFZX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuLXX14, author = {Xu Wu and Pengchong Li and Jin Xu and Xiaqing Xie}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Domain-Specific Semantic Retrieval of Institutional Repository Based on Query Extension}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {401--411}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_51}, doi = {10.1007/978-3-662-47401-3\_51}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuLXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuSX14, author = {Xu Wu and Jiada Shi and Xiaqing Xie}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {The Design and Implementation of {APK} eBooks Online Generation System Based on FBReader}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {389--400}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_50}, doi = {10.1007/978-3-662-47401-3\_50}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuZZX14, author = {Xu Wu and Weiyi Zhang and Xi Zhang and Jin Xu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A Method to Build and Expand the Domain Dictionary Automatically Based on WordNet}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {370--381}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_48}, doi = {10.1007/978-3-662-47401-3\_48}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuZZX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XieL14, author = {Yibo Xie and Zhongzhi Luan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Information Integration of Heterogeneous Employment Service Information of College Graduates}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {336--341}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_44}, doi = {10.1007/978-3-662-47401-3\_44}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XieL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XuCG14, author = {Ling Xu and Yueyun Chen and Zheng Gong}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {An Improving Algorithm for Combined Input-Crosspoint-Queued Switches}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {281--287}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_37}, doi = {10.1007/978-3-662-47401-3\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XuCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Yan14, author = {Xiaodong Yan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A Uighur Automatic Summarization Method Based on Sub-theme Division}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {8--15}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_2}, doi = {10.1007/978-3-662-47401-3\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/Yan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YangJH14, author = {Yunxue Yang and Shuyuan Jin and Xiaowei He}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Software Vulnerability Severity Evaluation Based on Economic Losses}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {144--151}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_19}, doi = {10.1007/978-3-662-47401-3\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YangJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YangLZ14, author = {Fan Yang and Yue Li and Lidong Zhai}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {RayDroid: {A} Framework for Discovering Anomaly in Android}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {33--40}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_5}, doi = {10.1007/978-3-662-47401-3\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YangLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YangYZ14, author = {Jincui Yang and Yuyu Yuan and Tianle Zhang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Research on Modeling of Software Automatic Test}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {382--388}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_49}, doi = {10.1007/978-3-662-47401-3\_49}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YangYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YaoZXCG14, author = {Qipeng Yao and Chuan Zhou and Linbo Xiang and Yanan Cao and Li Guo}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Minimizing the Negative Influence by Blocking Links in Social Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {65--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_9}, doi = {10.1007/978-3-662-47401-3\_9}, timestamp = {Wed, 05 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/YaoZXCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YeDBL14, author = {Na Ye and Lili Dong and Genqing Bian and Jian Li}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Construction of Software and Hardware Resource Pool in Data Center Using Virtualization}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {206--212}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_27}, doi = {10.1007/978-3-662-47401-3\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YeDBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YeLY14, author = {Lin Ye and Zhongzhi Luan and Hailong Yang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Performance-Aware Based Correlated Datasets Replication Strategy}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {322--327}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_42}, doi = {10.1007/978-3-662-47401-3\_42}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YeLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YilanLGB14, author = {Ma Yilan and Yao Lin and Zeng Guang and Matturdi Bardi}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {The Implementation of {GFP} Protocol Based on {EOS} in {FPGA}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {274--280}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_36}, doi = {10.1007/978-3-662-47401-3\_36}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YilanLGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangJS14, author = {Xi Zhang and Guanhong Jiang and Yuan Su}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Monitoring Social Events on Sina Weibo}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {328--335}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_43}, doi = {10.1007/978-3-662-47401-3\_43}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangLSY14, author = {Tianle Zhang and Lixin Liu and Shouyou Song and Yuyu Yuan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Human Mobility Simulation in Smart Energy Grid}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {229--237}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_30}, doi = {10.1007/978-3-662-47401-3\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangLSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangLZ14, author = {Shuai Zhang and Yueming Lu and Xi Zhang}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Cache Replacement Improving Based on User Group Interest Degree}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {1--7}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_1}, doi = {10.1007/978-3-662-47401-3\_1}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangSH14, author = {Zilu Zhang and Jinqiao Shi and Lanlan Hu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Towards Enumeration of {NTFS} Using {USN} Journals Under {UEFI}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {166--174}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_22}, doi = {10.1007/978-3-662-47401-3\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhaoCY14, author = {Hui Zhao and Yueyun Chen and Xiaopan Yuan}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A New Network Coding Scheme in Two-relay {OFDMA} Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {288--294}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_38}, doi = {10.1007/978-3-662-47401-3\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhaoCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhengHZ14, author = {Yi Zheng and Weihong Han and Chengzhang Zhu}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {A Novel Feature Selection Method Based on Category Distribution and Phrase Attributes}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {25--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_4}, doi = {10.1007/978-3-662-47401-3\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhengHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhuWLQZC14, author = {Danfeng Zhu and Rui Wang and Zhongzhi Luan and Depei Qian and Han Zhang and Jihong Cai}, editor = {Yueming Lu and Xu Wu and Xi Zhang}, title = {Memory Centric Hardware Prefetching in Multi-core Processors}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {520}, pages = {311--321}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-47401-3\_41}, doi = {10.1007/978-3-662-47401-3\_41}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhuWLQZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isctcs/2013, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43908-1}, doi = {10.1007/978-3-662-43908-1}, isbn = {978-3-662-43907-4}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/0001B13, author = {Tingting Wang and J{\o}rgen B{\o}egh}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Multi-layer {CAPTCHA} Based on Chinese Character Deformation}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {205--211}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_27}, doi = {10.1007/978-3-662-43908-1\_27}, timestamp = {Wed, 27 Jun 2018 10:47:48 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/0001B13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/AnakpaY13, author = {Manawa Anakpa and Yuyu Yuan}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Multidisciplinary Trust Conceptualization: {A} General Model for Customer Trust Building in e-Commerce}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {366--373}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_45}, doi = {10.1007/978-3-662-43908-1\_45}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/AnakpaY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Boegh13, author = {J{\o}rgen B{\o}egh}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Trust and Trustworthiness in Human Behavior and {IT} Services - Concepts, Definitions and Relations}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {235--251}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_31}, doi = {10.1007/978-3-662-43908-1\_31}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/Boegh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ChenGZ13, author = {Luping Chen and Yongzhen Guo and Feng Zhou}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Security Risk Assessment of Mobile Internet Under Cloud Computing Mode}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {219--226}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_29}, doi = {10.1007/978-3-662-43908-1\_29}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ChenGZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ChenLSZZ13, author = {Chen Chen and Qingyun Liu and Hongzhou Sha and Zhou Zhou and Chao Zheng}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {107--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_14}, doi = {10.1007/978-3-662-43908-1\_14}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/ChenLSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/FanWGW13, author = {Yuanquan Fan and Wei Wei and Yan Gao and Weiguo Wu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Introduction and Analysis of Simulators of MapReduce}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {345--350}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_42}, doi = {10.1007/978-3-662-43908-1\_42}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/FanWGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/FengZZ13, author = {Gangfu Feng and Chen Zhang and Quan Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Design of Linkage Security Defense System Based on Honeypot}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {70--77}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_9}, doi = {10.1007/978-3-662-43908-1\_9}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/FengZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/GuanZLL013, author = {Jizeng Guan and Xiaolu Zhu and Mingtao Lei and Jianyi Liu and Cong Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Business Impact Analysis Model Based on the Analytic Hierarchy Process}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {227--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_30}, doi = {10.1007/978-3-662-43908-1\_30}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/GuanZLL013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/GuoSJ0LC13, author = {Yaoyao Guo and Songlin Sun and Xiaojun Jing and Hai Huang and Yueming Lu and Na Chen}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Effective Rate Control Algorithm for {H.264} Based on Scene Change Detection}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {93--99}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_12}, doi = {10.1007/978-3-662-43908-1\_12}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/GuoSJ0LC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HuangZT13, author = {Anqi Huang and Chen Zhang and Chaojing Tang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Another Improvement of {LMAP++:} An {RFID} Authentication Protocol}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {100--106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_13}, doi = {10.1007/978-3-662-43908-1\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HuangZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/JiangL13, author = {Yanjun Jiang and Mingshan Lei}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {{MD5} Calculation and Decryption Using {CUDA} on {GPU}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {22--28}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_3}, doi = {10.1007/978-3-662-43908-1\_3}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/JiangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiGB13, author = {Yue Li and Qingyang Gao and J{\o}rgen B{\o}egh}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {The Evaluation of Service Trustworthiness Based on BP-Neural Network}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {185--190}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_24}, doi = {10.1007/978-3-662-43908-1\_24}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiZHX13, author = {Hu Li and Peng Zou and Weihong Han and Rongze Xia}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Imbalanced Chinese Text Classification Based on Weighted Sampling}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {38--45}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_5}, doi = {10.1007/978-3-662-43908-1\_5}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiZHX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuF13, author = {Enjie Liu and Xiaohua Feng}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Trustworthiness in the Patient Centred Health Care System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {362--365}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_44}, doi = {10.1007/978-3-662-43908-1\_44}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiuF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuHZ13, author = {Qian Liu and Qianwen He and Yu Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Covert Channel Bases on {CPU} Load in Cloud Computing}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {276--282}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_35}, doi = {10.1007/978-3-662-43908-1\_35}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiuHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuTWL13, author = {Pingping Liu and Zhihong Tian and Xu Wu and Wei Liu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Improved Common Vulnerability Scoring System Based on K-means}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {62--69}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_8}, doi = {10.1007/978-3-662-43908-1\_8}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiuTWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuZW0W13, author = {Genxian Liu and Xi Zhang and Dongsheng Wang and Zhenyu Liu and Haixia Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Security Memory System for Mobile Device or Computer Against Memory Attacks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {1--8}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_1}, doi = {10.1007/978-3-662-43908-1\_1}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/LiuZW0W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LuSGQ13, author = {Lilei Lu and Yanhong Shang and Yaping Ge and Jinli Qu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research of Digital Campus Construction Based on Cloud Computing}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {198--204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_26}, doi = {10.1007/978-3-662-43908-1\_26}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LuSGQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/MeiZQB13, author = {Chengli Mei and Min Zhang and Zhongang Qi and Qi Bi}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Characterizing and Comparing User Location Preference in an Urban Mobile Network}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {389--396}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_48}, doi = {10.1007/978-3-662-43908-1\_48}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/MeiZQB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/MengYLQXD13, author = {You Meng and Lang Yu and Zhongzhi Luan and Depei Qian and Ming Xie and Zhigao Du}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Black-Box Approach for Detecting the Failure Traces}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {252--259}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_32}, doi = {10.1007/978-3-662-43908-1\_32}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/MengYLQXD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/MiandrilalaY13, author = {Miandrilala and Yuyu Yuan}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Concept of Service Trustworthiness Management System {(STMS)}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {374--381}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_46}, doi = {10.1007/978-3-662-43908-1\_46}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/MiandrilalaY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/MonizY13, author = {Krishna Moniz and Yuyu Yuan}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Filtering Training Data When Training Feed-Forward Artificial Neural Network}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {212--218}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_28}, doi = {10.1007/978-3-662-43908-1\_28}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/MonizY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/PeiZLL13, author = {Shaojie Pei and Lumin Zhang and Aiping Li and Yusha Liu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Microblog Sentiment Classification Based on Supervised and Unsupervised Combination}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {138--145}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_18}, doi = {10.1007/978-3-662-43908-1\_18}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/PeiZLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/QiuZHM13, author = {Shaolin Qiu and Laibin Zhang and Yuanqiang Huang and Yaming Mao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Effective Resource Management Architecture in {HSE} System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {260--267}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_33}, doi = {10.1007/978-3-662-43908-1\_33}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/QiuZHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/RenLYZ13, author = {Yunlong Ren and Yue Li and Fangfang Yuan and Fangjiao Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Hijacking Activity Technology Analysis and Research in Android System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {46--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_6}, doi = {10.1007/978-3-662-43908-1\_6}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/RenLYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/RennochSG13, author = {Axel Rennoch and Ina Schieferdecker and J{\"{u}}rgen Gro{\ss}mann}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Security Testing Approaches - For Research, Industry and Standardization}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {397--406}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_49}, doi = {10.1007/978-3-662-43908-1\_49}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/RennochSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ShiGLC13, author = {Xiaohong Shi and Kun Guo and Yueming Lu and Xi Chen}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Survey on Data Recovery for Cloud Storage}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {176--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_23}, doi = {10.1007/978-3-662-43908-1\_23}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ShiGLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ShiJXL13, author = {Xiaohong Shi and Ying Ji and Hui Xie and Yueming Lu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Prefetching Mechanism Based on MooseFS}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {146--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_19}, doi = {10.1007/978-3-662-43908-1\_19}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ShiJXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Song13, author = {Changning Song}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Android-Based Remote-Control with Real-Time Video Surveillance for Wi-Fi Robot}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {382--388}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_47}, doi = {10.1007/978-3-662-43908-1\_47}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/Song13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/SongMY13, author = {Ningning Song and Zhen Mei and Lin Yao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research on Efficient Dynamic Cloud Storage Ciphertext Access Control}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {297--303}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_38}, doi = {10.1007/978-3-662-43908-1\_38}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/SongMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/SongZL13, author = {Ningning Song and Longqun Zou and Yunluo Liu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research on the Inverted Index Based on Compression and Perception}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {304--310}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_39}, doi = {10.1007/978-3-662-43908-1\_39}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/SongZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/TongZGM13, author = {Zhixiang Tong and Qiankun Zhuang and Qi Guo and Peijun Ma}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research on Technologies of Software Requirements Prioritization}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {9--21}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_2}, doi = {10.1007/978-3-662-43908-1\_2}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/TongZGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangBY13, author = {Shuaisen Wang and J{\o}rgen B{\o}egh and Jincui Yang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research on Trustworthy Sensor Network Based on Zigbee Technology}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {191--197}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_25}, doi = {10.1007/978-3-662-43908-1\_25}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangBY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangLCH13, author = {Jiao Wang and Yulin Liu and Zhichao Chao and Wei He}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Modified Single-Channel Blind Separation Method Using {EMD} and {ICA}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {78--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_10}, doi = {10.1007/978-3-662-43908-1\_10}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangLCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangLL13, author = {Guofeng Wang and Chuanyi Liu and Jie Lin}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {29--37}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_4}, doi = {10.1007/978-3-662-43908-1\_4}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangLTW13, author = {Lei Wang and Chenglong Li and Qingfeng Tan and Xuebin Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Generation and Distribution of Decoy Document System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {123--129}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_16}, doi = {10.1007/978-3-662-43908-1\_16}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/WangLTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangZLZ13, author = {Peng Wang and Chengwei Zhang and Xuanya Li and Can Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Mobile Botnet Model Based on Android System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {54--61}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_7}, doi = {10.1007/978-3-662-43908-1\_7}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangZLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangZP13, author = {Shaopeng Wang and Yuan Zhang and Yan Peng}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Flexible Mechanism Research of Workflow System Based on {SOA}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {86--92}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_11}, doi = {10.1007/978-3-662-43908-1\_11}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangZP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangZZ13, author = {Wenhao Wang and Chen Zhang and Quan Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Anomaly Detection Model Based on Cloud Model and Danger Theory}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {115--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_15}, doi = {10.1007/978-3-662-43908-1\_15}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuLSJML13, author = {Di Wu and Xing Li and Yongmei Sun and Yuefeng Ji and Jie Mao and Yingting Liu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Highly Efficient Indoor Localization Scheme Based Only on Mobile Terminal}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {161--168}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_21}, doi = {10.1007/978-3-662-43908-1\_21}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuLSJML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XieYL13, author = {Xiaowei Xie and Yu Yang and Yueming Lu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Zones-Based Metadata Management Method for Distributed File System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {169--175}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_22}, doi = {10.1007/978-3-662-43908-1\_22}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XieYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YangWS13, author = {Cong Yang and Weiguo Wu and Yuanqi Su}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Level Set Method Based Image Segmentation by Combining Local Information with Global Information}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {351--361}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_43}, doi = {10.1007/978-3-662-43908-1\_43}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YangWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangL13, author = {Yu Zhang and Feiyan Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Adaptive Synchronization of Complex Networks with Time-Varying Delay Nodes and Delay Coupling}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {283--289}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_36}, doi = {10.1007/978-3-662-43908-1\_36}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangLHYS13, author = {Kuo Zhang and Juan{-}Zi Li and MingCai Hong and XueDong Yan and Qiang Song}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Semantics Enabled Intelligent Semi-structured Document Processor}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {328--344}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_41}, doi = {10.1007/978-3-662-43908-1\_41}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangLHYS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangLW13, author = {Kuo Zhang and Juanzi Li and Gang Wu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Term Committee Based Event Identification and Dependency Discovery}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {311--327}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_40}, doi = {10.1007/978-3-662-43908-1\_40}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangZLX13, author = {Ganggang Zhang and Min Zuo and Xinliang Liu and Fan Xia}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Improving the Efficiency of Storing {SNS} Small Files in {HDFS}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {154--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_20}, doi = {10.1007/978-3-662-43908-1\_20}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangZLX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangZX13, author = {Ying Zhang and Yongzheng Zhang and Jun Xiao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Detecting the DGA-Based Malicious Domain Names}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {130--137}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_17}, doi = {10.1007/978-3-662-43908-1\_17}, timestamp = {Fri, 06 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhaoYWLQ13, author = {Qi Zhao and Hailong Yang and Guang Wei and Zhongzhi Luan and Depei Qian}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi Coprocessor}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {268--275}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_34}, doi = {10.1007/978-3-662-43908-1\_34}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhaoYWLQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhouY13, author = {Shihong Zhou and Lin Yao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Gigabit Ethernet Data Transfer Based on {FPGA}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {290--296}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_37}, doi = {10.1007/978-3-662-43908-1\_37}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhouY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isctcs/2012, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-35795-4}, doi = {10.1007/978-3-642-35795-4}, isbn = {978-3-642-35794-7}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Boegh12, author = {J{\o}rgen B{\o}egh}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Trustworthiness: From a Social Phenomenon to Internet Technology}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {87--93}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_11}, doi = {10.1007/978-3-642-35795-4\_11}, timestamp = {Fri, 29 Jun 2018 13:46:09 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/Boegh12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/CaoCX012, author = {Zigang Cao and Shoufeng Cao and Gang Xiong and Li Guo}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Progress in Study of Encrypted Traffic Classification}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {78--86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_10}, doi = {10.1007/978-3-642-35795-4\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/CaoCX012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ChenSPZ12, author = {Xiaojun Chen and Jinqiao Shi and Yiguo Pu and Haoliang Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Intent-Driven Masquerader Detection Framework Based on Data Fusion}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {450--457}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_57}, doi = {10.1007/978-3-642-35795-4\_57}, timestamp = {Sun, 01 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ChenSPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ChenYW12, author = {Zhao Chen and Wenbin Yao and Cong Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Security and Trust Model for Data Disaster-Recovery Service on the Cloud}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {140--147}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_18}, doi = {10.1007/978-3-642-35795-4\_18}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ChenYW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/CuiCSZ12, author = {Xiaoyan Cui and Xiaoshuang Chen and Wei Shi and Yi Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {The Application of Robot Localization and Navigation Based on {WSN} in the Disaster Relief}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {621--628}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_78}, doi = {10.1007/978-3-642-35795-4\_78}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/CuiCSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/CuiCZZ12, author = {Xiaoyan Cui and Xiaoshuang Chen and Haitao Zhang and Shizhuo Zheng}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Wireless Sensor Network {MAC} Protocol Used in the City Fire}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {613--620}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_77}, doi = {10.1007/978-3-642-35795-4\_77}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/CuiCZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/DingFWHDW12, author = {Yan Ding and Hongyi Fu and Lifeng Wei and Lianyue He and Huadong Dai and Qingbo Wu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Lightweight Type Enforcement Access Control Approach with Role Based Authorization}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {514--521}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_65}, doi = {10.1007/978-3-642-35795-4\_65}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/DingFWHDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/DingLL12, author = {Wei Ding and Tiejun Lv and Yueming Lu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser {MIMO} Systems}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {317--324}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_40}, doi = {10.1007/978-3-642-35795-4\_40}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/DingLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Esaki12, author = {Kazuhiro Esaki}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Verification of Requirement Analysis Method for System Based on {ISO/IEC} 9126 Six Quality Characteristics}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {60--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_8}, doi = {10.1007/978-3-642-35795-4\_8}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/Esaki12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/EsakiAK12, author = {Kazuhiro Esaki and Motoei Azuma and Toshihiro Komiyama}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Introduction of Quality Requirement and Evaluation Based on {ISO/IEC} SQuaRE Series of Standard}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {94--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_12}, doi = {10.1007/978-3-642-35795-4\_12}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/EsakiAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/FanZLX12, author = {Yujian Fan and Hongli Zhang and Jiahui Liu and Dongliang Xu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Efficient Parallel String Matching Algorithm Based on {DFA}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {349--356}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_44}, doi = {10.1007/978-3-642-35795-4\_44}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/FanZLX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/FuGXM12, author = {Peipei Fu and Li Guo and Gang Xiong and Jiao Meng}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Classification Research on {SSL} Encrypted Application}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {404--411}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_51}, doi = {10.1007/978-3-642-35795-4\_51}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/FuGXM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/FuJSLW12, author = {Jing Fu and Xiaojun Jing and Songlin Sun and Yueming Lu and Ying Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {{C-SURF:} Colored Speeded Up Robust Features}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {203--210}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_26}, doi = {10.1007/978-3-642-35795-4\_26}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/FuJSLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/GaoZZ12, author = {Yuan Gao and Yaoxue Zhang and Yuezhi Zhou}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Cache Management Strategy for Transparent Computing Storage System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {651--658}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_82}, doi = {10.1007/978-3-642-35795-4\_82}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/GaoZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/GuoL12, author = {Taiping Guo and Zhongzhi Luan}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Compatible and Graphical Modeling Approach for Earth System Model}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {706--713}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_89}, doi = {10.1007/978-3-642-35795-4\_89}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/GuoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HanW012, author = {Weihong Han and Qingguang Wang and Yan Jia}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research and Implement of Security Situation Awareness System {YH-SSAS}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {721--729}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_91}, doi = {10.1007/978-3-642-35795-4\_91}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HanW012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HeT012, author = {Ying He and Yongjing Tao and Tian Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {CppIns: {A} Source Query Language for Instrumentation}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {498--505}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_63}, doi = {10.1007/978-3-642-35795-4\_63}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HeT012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HuangJSL12, author = {Fei Huang and Xiaojun Jing and Songlin Sun and Yueming Lu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Incorporate Spatial Information into pLSA for Scene Classification}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {170--177}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_22}, doi = {10.1007/978-3-642-35795-4\_22}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HuangJSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HuangLZS12, author = {Haiqi Huang and Yueming Lu and Fangwei Zhang and Songlin Sun}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Multi-modal Clustering Method for Web Videos}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {163--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_21}, doi = {10.1007/978-3-642-35795-4\_21}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HuangLZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HuangSL012, author = {Xiaopu Huang and Qingqing Sun and Jiangwei Li and Tian Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {MDE-Based Verification of SysML State Machine Diagram by {UPPAAL}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {490--497}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_62}, doi = {10.1007/978-3-642-35795-4\_62}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HuangSL012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/JiaZFL12, author = {Wentao Jia and Chunyuan Zhang and Jian Fu and Rui Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Architecting Dependable Many-Core Processors Using Core-Level Dynamic Redundancy}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {681--688}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_86}, doi = {10.1007/978-3-642-35795-4\_86}, timestamp = {Wed, 13 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/JiaZFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/JinYZY12, author = {Songchang Jin and Shuqiang Yang and Xiang Zhu and Hong Yin}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Design of a Trusted File System Based on Hadoop}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {673--680}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_85}, doi = {10.1007/978-3-642-35795-4\_85}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/JinYZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/JunXMGL12, author = {Jun Li and Zuo Xin{-}qiang and Zhou Meng{-}qi and Fan Gong{-}yuan and Li Lian{-}cun}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Mining Explainable User Interests from Scalable User Behavior Data}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {211--218}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_27}, doi = {10.1007/978-3-642-35795-4\_27}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/JunXMGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LeiYW12, author = {Mingtao Lei and Wenbin Yao and Cong Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Trust-Based Data Backup Method on the Cloud}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {178--185}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_23}, doi = {10.1007/978-3-642-35795-4\_23}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LeiYW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiW12, author = {Yuankui Li and Linzhang Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree Differencing}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {466--473}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_59}, doi = {10.1007/978-3-642-35795-4\_59}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiWLX12, author = {Chunwen Li and Xu Wu and Chuanyi Liu and Xiaqing Xie}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Implementation of Trusted Remote Attestation Oriented the IaaSCloud}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {194--202}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_25}, doi = {10.1007/978-3-642-35795-4\_25}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiWLX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiWST12, author = {Yang Li and Xiaoyan Wang and Ying Sha and Jianlong Tan}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research of Security Relationship Based on Social Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {547--554}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_69}, doi = {10.1007/978-3-642-35795-4\_69}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiWST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiX12, author = {Chengcheng Li and Yuanfang Xu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Based on Support Vector and Word Features New Word Discovery Research}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {287--294}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_36}, doi = {10.1007/978-3-642-35795-4\_36}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiZSHZ012, author = {Jiangwei Li and Jizhou Zhao and Qingqing Sun and Xiaopu Huang and Yan Zhang and Tian Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Composition of {AADL} Components by Transformation to Interface Automata}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {522--529}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_66}, doi = {10.1007/978-3-642-35795-4\_66}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/LiZSHZ012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiZWR12, author = {Yue Li and Lidong Zhai and Zhilei Wang and Yunlong Ren}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Control Method of Twitter- and SMS-Based Mobile Botnet}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {644--650}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_81}, doi = {10.1007/978-3-642-35795-4\_81}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiZWR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiangXZ0012, author = {Zheng Liang and Bingying Xu and Jie Zhao and Yan Jia and Bin Zhou}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Chinese New Words Detection Using Mutual Information}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {341--348}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_43}, doi = {10.1007/978-3-642-35795-4\_43}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiangXZ0012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Liu0H12, author = {Fei Liu and Yan Jia and Weihong Han}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Multi-phase k-anonymity Algorithm Based on Clustering Techniques}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {365--372}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_46}, doi = {10.1007/978-3-642-35795-4\_46}, timestamp = {Sun, 08 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/Liu0H12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuFD12, author = {Qingyun Liu and Wenzhong Feng and Qiong Dai}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Dynamic Strategy to Cache Out-of-Sequence Packet in {DPI} System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {564--571}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_71}, doi = {10.1007/978-3-642-35795-4\_71}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiuFD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuLW12, author = {Chuanyi Liu and Xiaojian Liu and Lei Wan}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Policy-Based De-duplication in Secure Cloud Storage}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {250--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_32}, doi = {10.1007/978-3-642-35795-4\_32}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiuLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuSWG12, author = {Peipeng Liu and Jinqiao Shi and Lihong Wang and Li Guo}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook {CAPTCHA}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {420--428}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_53}, doi = {10.1007/978-3-642-35795-4\_53}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/LiuSWG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/MaLZS12, author = {Liang Ma and Yueming Lu and Fangwei Zhang and Songlin Sun}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {156--162}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_20}, doi = {10.1007/978-3-642-35795-4\_20}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/MaLZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/NamiS12, author = {Mitra Nami and Witold Suryn}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Software Trustworthiness: Past, Present and Future}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {1--12}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_1}, doi = {10.1007/978-3-642-35795-4\_1}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/NamiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/NamiS12a, author = {Mitra Nami and Witold Suryn}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Software Testing is Necessary But Not Sufficient for Software Trustworthiness}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {34--44}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_5}, doi = {10.1007/978-3-642-35795-4\_5}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/NamiS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/NiuLS12, author = {Shuai Niu and Yanbing Liu and Xinbo Song}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Speeding Up Double-Array Trie Construction for String Matching}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {572--579}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_72}, doi = {10.1007/978-3-642-35795-4\_72}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/NiuLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/NiuLZS12, author = {Yanting Niu and Yueming Lu and Fangwei Zhang and Songlin Sun}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Distance Adaptive Embedding Method in Dimension Reduction}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {271--278}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_34}, doi = {10.1007/978-3-642-35795-4\_34}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/NiuLZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/PangJLLR12, author = {Yi Pang and Shuyuan Jin and Shicong Li and Jilei Li and Hao Ren}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {443--449}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_56}, doi = {10.1007/978-3-642-35795-4\_56}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/PangJLLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/PangZSD12, author = {Yao Pang and Xiaoxiao Zhang and Luwei Sun and Weimin Ding}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research on Identifying Method of Covert Channels in Database System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {26--33}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_4}, doi = {10.1007/978-3-642-35795-4\_4}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/PangZSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/PuSG12, author = {Yiguo Pu and Jinqiao Shi and Li Guo}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Hierarchical Method for Clustering Binary Text Image}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {388--396}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_49}, doi = {10.1007/978-3-642-35795-4\_49}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/PuSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/RaoZZTY12, author = {Bing Rao and Zhigang Zhou and Hongli Zhang and Shuofei Tang and Renfu Yao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {109--116}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_14}, doi = {10.1007/978-3-642-35795-4\_14}, timestamp = {Thu, 09 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/RaoZZTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ShaoJSL12, author = {Chenggang Shao and Xiaojun Jing and Songlin Sun and Yueming Lu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton Interpolation}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {186--193}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_24}, doi = {10.1007/978-3-642-35795-4\_24}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ShaoJSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/SuLL12, author = {Yinjie Su and Jiahui Liu and Dong Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Hiding Signatures in Variable Names}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {333--340}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_42}, doi = {10.1007/978-3-642-35795-4\_42}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/SuLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/SunHL012, author = {Qingqing Sun and Xiaopu Huang and Jiangwei Li and Tian Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Timing Aspects Construction Using {UML-MARTE} Profile}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {474--481}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_60}, doi = {10.1007/978-3-642-35795-4\_60}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/SunHL012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangBLZ12, author = {Chunlu Wang and Yu Bao and Xuesen Liang and Tianle Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Vulnerability Evaluating Based on Attack Graph}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {555--563}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_70}, doi = {10.1007/978-3-642-35795-4\_70}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangBLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangCLL12, author = {Shuai Wang and Xiang Cui and Peng Liao and Dan Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {{S-URL} Flux: {A} Novel C{\&}C Protocol for Mobile Botnets}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {412--419}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_52}, doi = {10.1007/978-3-642-35795-4\_52}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangCLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangHS12, author = {Dong Wang and Hui He and Jiantao Shi}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {The Measurement and Analysis of {KAD} Network}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {117--123}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_15}, doi = {10.1007/978-3-642-35795-4\_15}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangLZS12, author = {Fei Wang and Yueming Lu and Fangwei Zhang and Songlin Sun}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {263--270}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_33}, doi = {10.1007/978-3-642-35795-4\_33}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangLZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangLZYW12, author = {Hongqi Wang and Zongwei Luo and Tianle Zhang and Yuyu Yuan and Xu Wu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Pervasive Technology Approach to Social Trustworthiness}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {242--249}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_31}, doi = {10.1007/978-3-642-35795-4\_31}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangLZYW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangSG12, author = {Xiao Wang and Jinqiao Shi and Li Guo}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Towards Analyzing Traceability of Data Leakage by Malicious Insiders}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {148--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_19}, doi = {10.1007/978-3-642-35795-4\_19}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangSTGL12, author = {Kun Wang and Ying Sha and Jianlong Tan and Li Guo and Yang Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Finding {\(\delta\)}-Closure Property of BitTorrent System and Applications Based on This Property}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {530--538}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_67}, doi = {10.1007/978-3-642-35795-4\_67}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangSTGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangXSTG12, author = {Xiaoyan Wang and Kai Xu and Ying Sha and Jianlong Tan and Li Guo}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research of New Words Identification in Social Network for Monitoring Public Opinion}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {598--603}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_75}, doi = {10.1007/978-3-642-35795-4\_75}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangXSTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WangZML12, author = {Zhilei Wang and Lidong Zhai and Yongqiang Ma and Yue Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Analysis of Public Sentiment Based on {SMS} Content}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {637--643}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_80}, doi = {10.1007/978-3-642-35795-4\_80}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WangZML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuH0L12, author = {Mingfei Wu and Yi Han and Bin Zhou and Aiping Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Preliminary Study of Enhanced Collaborative Information Extracting and Sharing System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {698--705}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_88}, doi = {10.1007/978-3-642-35795-4\_88}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuH0L12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuLZC12, author = {Junchao Wu and Panpan Li and Hongli Zhang and Binsheng Chu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Reliable Query Scheme for Outsourced Data in Cloud}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {730--736}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_92}, doi = {10.1007/978-3-642-35795-4\_92}, timestamp = {Sun, 19 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuLZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuWT12, author = {Fuhui Wu and Qingbo Wu and Yusong Tan}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Comparison and Performance Analysis of Join Approach in MapReduce}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {629--636}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_79}, doi = {10.1007/978-3-642-35795-4\_79}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuXLL12, author = {Xu Wu and Xiaqing Xie and Chuanyi Liu and Chunwen Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Improved Design of the Trustworthiness Authentication Mechanism of IaaS}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {219--226}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_28}, doi = {10.1007/978-3-642-35795-4\_28}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuXLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/WuYF12, author = {Jinyu Wu and Lihua Yin and Binxing Fang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Novel Dynamic Self-adaptive Framework for Network Security Evaluation}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {604--612}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_76}, doi = {10.1007/978-3-642-35795-4\_76}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/WuYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XieLWSL12, author = {Peidai Xie and Xicheng Lu and Yongjun Wang and Jinshu Su and Meijian Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Automatic Approach to Detect Anti-debugging in Malware Analysis}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {436--442}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_55}, doi = {10.1007/978-3-642-35795-4\_55}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XieLWSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XinHLW12, author = {Chao Xin and Hui{-}jun Han and Xiuqin Lin and Gengyu Wei}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A {P2P} Reputation Model Based on {P2P} File-Sharing Behavioral Characteristics}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {373--379}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_47}, doi = {10.1007/978-3-642-35795-4\_47}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XinHLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XingWZ12, author = {Yuchen Xing and Hanfei Wang and Jianhua Zhao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Integration of Several Different Data Flow Analysis Techniques}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {458--465}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_58}, doi = {10.1007/978-3-642-35795-4\_58}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XingWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XiongHZSLG12, author = {Gang Xiong and Wenting Huang and Yong Zhao and Ming Song and Zhenzhen Li and Li Guo}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {132--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_17}, doi = {10.1007/978-3-642-35795-4\_17}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XiongHZSLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XiongYL12, author = {Dapeng Xiong and Zhang Yan and Aiping Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Study on Transformed Keywords Identification in Spam Filtering}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {689--697}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_87}, doi = {10.1007/978-3-642-35795-4\_87}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XiongYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/Xu0W12, author = {Qing Xu and Yu Pei and Linzhang Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented Programs}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {591--597}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_74}, doi = {10.1007/978-3-642-35795-4\_74}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/Xu0W12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XuL0012, author = {Bingying Xu and Zheng Liang and Yan Jia and Bin Zhou}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Community Detection Based on Robust Label Propagation Algorithm}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {303--310}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_38}, doi = {10.1007/978-3-642-35795-4\_38}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XuL0012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XuTSG12, author = {Fanwen Xu and Qingfeng Tan and Jinqiao Shi and Li Guo}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Unobservable Rendezvous Negotiation in {P2P} Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {380--387}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_48}, doi = {10.1007/978-3-642-35795-4\_48}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/XuTSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XuehaiJ12, author = {Liu Xuehai and Tang Jin}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Clock Synchronization Algorithm for Distributed Video Surveillance Based on {PTP}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {311--316}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_39}, doi = {10.1007/978-3-642-35795-4\_39}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XuehaiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YangFYZ12, author = {Jincui Yang and Bin{-}Xing Fang and Yuyu Yuan and Meng{-}Xiao Zhai}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex System}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {227--235}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_29}, doi = {10.1007/978-3-642-35795-4\_29}, timestamp = {Sat, 11 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YangFYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YaoHX12, author = {Yao Yao and Longtao He and Gang Xiong}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Security and Cost Analyses of {DNSSEC} Protocol}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {429--435}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_54}, doi = {10.1007/978-3-642-35795-4\_54}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YaoHX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YaoY12, author = {Xiang Yao and Wenbin Yao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Trustworthy Storage Framework on the Cloud}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {69--77}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_9}, doi = {10.1007/978-3-642-35795-4\_9}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YaoY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YinglianBQ12, author = {Liu Yinglian and J{\o}rgen B{\o}egh and Sun Qi}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Who Can Haul the {ANDON-CORD} in the Software Development Process}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {714--720}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_90}, doi = {10.1007/978-3-642-35795-4\_90}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YinglianBQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YuLSZ12, author = {Jinxiu Yu and Yueming Lu and Songlin Sun and Fangwei Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Search Results Evaluation Based on User Behavior}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {397--403}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_50}, doi = {10.1007/978-3-642-35795-4\_50}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YuLSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YuZY12, author = {Haining Yu and Hongli Zhang and Xingzhan Yu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Flexible Framework for Representations of Entities in the Internet of Things}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {295--302}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_37}, doi = {10.1007/978-3-642-35795-4\_37}, timestamp = {Sun, 19 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YuZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YuanHQ12, author = {Yuyu Yuan and Qiang Han and Sun Qi}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A New Measurement Method for Software Trustworthiness Based on Rough Sets}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {13--19}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_2}, doi = {10.1007/978-3-642-35795-4\_2}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YuanHQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YuanLWW12, author = {De{-}yu Yuan and Tong Liu and Geng{-}yu Wei and Zhi{-}zhao Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Survey on the Security of Multihop Ad Hoc Network}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {102--108}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_13}, doi = {10.1007/978-3-642-35795-4\_13}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YuanLWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/YuanZL12, author = {Yuyu Yuan and Yangyang Zhang and Jing Liu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Service Behavior Trustworthiness Management}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {20--25}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_3}, doi = {10.1007/978-3-642-35795-4\_3}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/YuanZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangC012, author = {Xuelin Zhang and Huajie Chen and Tian Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An {UML} Model Query Method Based on Structure Pattern Matching}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {506--513}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_64}, doi = {10.1007/978-3-642-35795-4\_64}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangC012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangGYYZ12, author = {Fangjiao Zhang and Wei Guo and Jincui Yang and Fangfang Yuan and Lidong Zhai}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Research on Redundant Channel Model Based on Spatial Correlation in {IOT}}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {666--672}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_84}, doi = {10.1007/978-3-642-35795-4\_84}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangGYYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangJC0P12, author = {Yaxing Zhang and Shuyuan Jin and Xiang Cui and Xi Yin and Yi Pang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Network Security Situation Prediction Based on {BP} and {RBF} Neural Network}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {659--665}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_83}, doi = {10.1007/978-3-642-35795-4\_83}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangJC0P12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangLZY12, author = {Hongli Zhang and Panpan Li and Zhigang Zhou and Xiangzhan Yu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {325--332}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_41}, doi = {10.1007/978-3-642-35795-4\_41}, timestamp = {Thu, 09 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangLZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangY12, author = {Yongzheng Zhang and Xiaochun Yun}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Modeling of Hierarchical Index System for Network Operation Security}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {580--590}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_73}, doi = {10.1007/978-3-642-35795-4\_73}, timestamp = {Fri, 06 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangYBW12, author = {Tianle Zhang and Yuyu Yuan and J{\o}rgen B{\o}egh and Xu Wu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {236--241}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_30}, doi = {10.1007/978-3-642-35795-4\_30}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangYBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangZZL12, author = {Meng Zhang and Hongli Zhang and Bo Zhang and Gang Lu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Encrypted Traffic Classification Based on an Improved Clustering Algorithm}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {124--131}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_16}, doi = {10.1007/978-3-642-35795-4\_16}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangZZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhaoLML12, author = {Xiaolong Zhao and Tiejun Lv and Yanhui Ma and Yueming Lu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {279--286}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_35}, doi = {10.1007/978-3-642-35795-4\_35}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhaoLML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhaoLZ012, author = {Jizhou Zhao and Jiangwei Li and Yan Zhang and Tian Zhang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Tool to Construct One Comprehensive Legal Environment for Behavioral Incompatible Components}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {539--546}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_68}, doi = {10.1007/978-3-642-35795-4\_68}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isctcs/ZhaoLZ012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhengWW12, author = {Shuo Zheng and Siyang Wang and Cong Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Ciphertext Data Retrieval Method Based on Cloud Storage}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {357--364}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_45}, doi = {10.1007/978-3-642-35795-4\_45}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhengWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhouZ12, author = {Xiaoyu Zhou and Jianhua Zhao}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Overtime-Detection Model-Checking Technique for Interrupt Processing Systems}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {482--489}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_61}, doi = {10.1007/978-3-642-35795-4\_61}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhouZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhuZZW12, author = {Nafei Zhu and Jiaping Zuo and Yue Zhou and Wei Wang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Overview of Monitor Selection in Computer Networks}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {52--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_7}, doi = {10.1007/978-3-642-35795-4\_7}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhuZZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZuoRK12, author = {Jiaping Zuo and Pei Ren and Hao Kong}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing Data}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {45--51}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_6}, doi = {10.1007/978-3-642-35795-4\_6}, timestamp = {Fri, 29 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZuoRK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.