Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cis/cis2008-1.bht:"
@inproceedings{DBLP:conf/cis/CaiT08, author = {Yongkai Cai and Shaohua Tang}, title = {Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {453--457}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.187}, doi = {10.1109/CIS.2008.187}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaiT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Cheng08, author = {Jingde Cheng}, title = {Evolutionary Personal Information Partners}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {108--113}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.210}, doi = {10.1109/CIS.2008.210}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Cheng08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChengLB08, author = {Jinyong Cheng and Yihui Liu and Li Bai}, title = {3-D Reconstruction from Medical Images with Improved {GVF} Snake Model}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {220--224}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.191}, doi = {10.1109/CIS.2008.191}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChengLB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChinSA08, author = {Siew Wen Chin and Kah Phooi Seng and Li{-}Minn Ang}, title = {New {H} infinity Approach for Face Tracking}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {180--184}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.171}, doi = {10.1109/CIS.2008.171}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChinSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DengLT08, author = {Zerong Deng and Xingcheng Liu and Man Teng}, title = {Modified {BP} Decoding Algorithms Combined with {GA} for Low-Density Parity Check Codes}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {371--375}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.169}, doi = {10.1109/CIS.2008.169}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DengLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DerbelHO08, author = {Imen Derbel and Narjes Hachani and Habib Ounelli}, title = {Membership Functions Generation Based on Density Function}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {96--101}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.211}, doi = {10.1109/CIS.2008.211}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DerbelHO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DuH08, author = {Yongping Du and Ming He}, title = {Multi-Strategy to Improve Reading Comprehension}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {86--89}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.173}, doi = {10.1109/CIS.2008.173}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DuH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DuanDC08, author = {Sophia Xiaoxia Duan and Hepu Deng and Brian J. Corbitt}, title = {The Impacts of Government Policies on the Efficiency of Australian Universities: {A} Multi-Period Data Envelopment Analysis}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {522--527}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.213}, doi = {10.1109/CIS.2008.213}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DuanDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FanW08, author = {Lei Fan and Yuping Wang}, title = {A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated Clustering}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {162--167}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.186}, doi = {10.1109/CIS.2008.186}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FanW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FangJW08, author = {Qun Fang and Yi Ji and Guoxin Wu}, title = {A Run-Length Coding Based Dynamic Trust Model in {P2P} Network}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {534--539}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.97}, doi = {10.1109/CIS.2008.97}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FangJW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FangWRXB08, author = {Liming Fang and Jiandong Wang and Yongjun Ren and Jinyue Xia and Shizhu Bian}, title = {Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without {ROM}}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {326--330}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.32}, doi = {10.1109/CIS.2008.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FangWRXB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GangXW08, author = {Gang Li and Xiangjun Xin and Wei Li}, title = {An Enhanced Deniable Authentication Protocol}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {336--339}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.123}, doi = {10.1109/CIS.2008.123}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GangXW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoAL08, author = {Yuelin Gao and Xiaohui An and Jun{-}min Liu}, title = {A Particle Swarm Optimization Algorithm with Logarithm Decreasing Inertia Weight and Chaos Mutation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {61--65}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.183}, doi = {10.1109/CIS.2008.183}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoAL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GeT08, author = {Lina Ge and Shaohua Tang}, title = {Sharing Multi-Secret Based on Circle Properties}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {340--344}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.176}, doi = {10.1109/CIS.2008.176}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GeT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoG08, author = {Gege Guo and Ping Guo}, title = {Experimental Study of Discriminant Method with Application to Fault-Prone Module Detection}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {204--209}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.172}, doi = {10.1109/CIS.2008.172}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoHZYZ08, author = {Lin Guo and Hua Huang and Lejun Zhang and Yongtian Yang and Jianpei Zhang}, title = {Research on Disaster Tolerance System Based on Network Dataflow}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {355--360}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.76}, doi = {10.1109/CIS.2008.76}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoHZYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoW08, author = {Long Guo and Hongli Wang}, title = {Information Management System of Automobile Chassis Dynamometer Based on Multi Agent Web Serve}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {66--70}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.140}, doi = {10.1109/CIS.2008.140}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoWHZ08, author = {Chi Guo and Lina Wang and Lainv Huang and Lei Zhao}, title = {Study on the Internet Behavior's Activity Oriented to Network Survivability}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {432--435}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.17}, doi = {10.1109/CIS.2008.17}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoWHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HaichuanWJ08, author = {Lou Haichuan and Dai Wenzhan and Su Jie}, title = {Control of Time Varying Nonlinear System Based on {RBFNN-DMC} Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {134--138}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.110}, doi = {10.1109/CIS.2008.110}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HaichuanWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HaoZ08, author = {Ju{-}tao Hao and Jing{-}jing Zhao}, title = {Shape Constraint Incorporated Geometric Flows for Blood Vessels Segmentation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {560--563}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.84}, doi = {10.1109/CIS.2008.84}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HaoZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/He08, author = {Yunhui He}, title = {Modified Generalized Discriminant Analysis Using Orthogonalization in Feature Space and Difference Space}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {12--15}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.40}, doi = {10.1109/CIS.2008.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/He08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HlaCP08, author = {Khin Haymar Saw Hla and YoungSik Choi and Jong Sou Park}, title = {Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {35--40}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.108}, doi = {10.1109/CIS.2008.108}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HlaCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HouFX08, author = {Jiali Hou and Nengshan Feng and Jinzhi Xiong}, title = {A New Intelligent Security Structure for Host System}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {464--469}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.134}, doi = {10.1109/CIS.2008.134}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HouFX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuSLZ08, author = {Yu Hu and Tingzhi Shen and Kin{-}Man Lam and Sanyuan Zhao}, title = {A Novel Example-Based Super-Resolution Approach Based on Patch Classification and the {KPCA} Prior Model}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {6--11}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.30}, doi = {10.1109/CIS.2008.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuSLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuW08, author = {Xuanzi Hu and Kuanfu Wang}, title = {Application of Data Warehouse Technology in Data Center Design}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {484--488}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.124}, doi = {10.1109/CIS.2008.124}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuYX08, author = {Rongbing Hu and Chaoyuan Yue and Jun Xie}, title = {Joint Optimization of Age Replacement and Spare Ordering Policy Based on Genetic Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {156--161}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.170}, doi = {10.1109/CIS.2008.170}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuYX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuiZ08, author = {Cao Hui and Qin Zheng}, title = {A Trust Evaluation Model for {P2P} E-Commerce Systems}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {500--505}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.50}, doi = {10.1109/CIS.2008.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuiZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KezhengBH08, author = {Kezheng Lin and Bo Fan and Hong Zhao}, title = {Visual Cryptographic Scheme with High Image Quality}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {366--370}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.106}, doi = {10.1109/CIS.2008.106}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/KezhengBH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KezhengHS08, author = {Kezheng Lin and Huixin Wang and Sheng Lin}, title = {Face Feature Extraction Based on Uncorrelated Locality Information Projection}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {215--219}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.154}, doi = {10.1109/CIS.2008.154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/KezhengHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KuZH08, author = {Tao Ku and Yunlong Zhu and Kunyuan Hu}, title = {A Novel Complex Event Mining Network for RFID-Enable Supply Chain Information Security}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {516--521}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.70}, doi = {10.1109/CIS.2008.70}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/KuZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LangH08, author = {Liying Lang and Yue Hong}, title = {Study on the Core Algorithm of Access Control System Based on Face Recognition}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {76--79}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.24}, doi = {10.1109/CIS.2008.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LangH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Li08, author = {Xiongjun Li}, title = {A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information Entropy}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {350--354}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.203}, doi = {10.1109/CIS.2008.203}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Li08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiC08, author = {Meng Li and Yiu{-}ming Cheung}, title = {A Novel Motion Based Lip Feature Extraction for Lip-Reading}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {361--365}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.214}, doi = {10.1109/CIS.2008.214}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiGW08, author = {Xiangdong Li and Qingpu Guo and Qingxian Wang}, title = {Analysis of Offline Fair Exchange Protocols in Strand Spaces}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {272--276}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.167}, doi = {10.1109/CIS.2008.167}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiL08, author = {Xueqiang Li and Hai{-}Lin}, title = {One {MOEA} Uniformity Measurement Based on Generalized Spherical Transformation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {168--173}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.73}, doi = {10.1109/CIS.2008.73}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiL08a, author = {Linsheng Li and Jianning Li}, title = {Chattering-Free Support Vector Regression Sliding Mode Control}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {231--234}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.99}, doi = {10.1109/CIS.2008.99}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiLWH08, author = {Fang Li and Di Li and Jiafu Wan and Xin Huang}, title = {Towards a Component-Based Model Integration Approach for Embedded Computer Control System}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {495--499}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.218}, doi = {10.1109/CIS.2008.218}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiLWH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiPWC08, author = {Tao Li and Wenjiang Pei and Shao{-}ping Wang and Yiu{-}ming Cheung}, title = {Cooperation Controlled Competitive Learning Approach for Data Clustering}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {24--29}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.174}, doi = {10.1109/CIS.2008.174}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiPWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZ08, author = {Guimei Li and Zhezhao Zeng}, title = {A Neural-Network Algorithm for Solving Nonlinear Equation Systems}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {20--23}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.65}, doi = {10.1109/CIS.2008.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZH08, author = {Xinshe Li and Lei Zhang and Yu{-}pu Hu}, title = {A Novel Generation Key Scheme Based on {DNA}}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {264--266}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.113}, doi = {10.1109/CIS.2008.113}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZY08, author = {Xin{-}lei Li and Kangfeng Zheng and Yixian Yang}, title = {A Simulation Platform of DDoS Attack Based on Network Processor}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {421--426}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.190}, doi = {10.1109/CIS.2008.190}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LinTJ08, author = {Frank Yeong{-}Sung Lin and Po{-}Hao Tsang and Kun{-}Dao Jiang}, title = {A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {411--416}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.142}, doi = {10.1109/CIS.2008.142}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LinTJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuCMT08, author = {Wenjie Liu and Hanwu Chen and Tinghuai Ma and Wei Tian}, title = {An Efficient Deterministic Secure Quantum Communication Scheme with {W} State}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {52--55}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.48}, doi = {10.1109/CIS.2008.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuCMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuFFW08, author = {Changping Liu and Mingyu Fan and Yong Feng and Guangwei Wang}, title = {Dynamic Integrity Measurement Model Based on Trusted Computing}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {281--284}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.153}, doi = {10.1109/CIS.2008.153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuFFW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuL08, author = {Feng Liu and Zhitang Li}, title = {A Measurement and Modeling Study of {P2P} {IPTV} Applications}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {114--119}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.112}, doi = {10.1109/CIS.2008.112}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuLC08, author = {Hai{-}Lin and Xueqiang Li and Yuqing Chen}, title = {Multi-Objective Evolutionary Algorithm Based on Dynamical Crossover and Mutation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {150--155}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.81}, doi = {10.1109/CIS.2008.81}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiuLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuXL08, author = {Zhenyu Liu and Shengli Xie and Yue Lai}, title = {A Fast Suffix Matching Method in Network Processor}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {405--410}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.98}, doi = {10.1109/CIS.2008.98}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuXL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuYXC08, author = {Yuhua Liu and Chun Yang and Kaihua Xu and Hongcai Chen}, title = {Controlling Mechanism for the Hubs in Peer-to-Peer Networks}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {511--515}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.109}, doi = {10.1109/CIS.2008.109}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuYXC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LvWZZ08, author = {Shaohe Lv and Xiaodong Wang and Xin Zhao and Xingming Zhou}, title = {Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {442--446}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.69}, doi = {10.1109/CIS.2008.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LvWZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaZXY08, author = {Rui Ma and Yingnan Zhao and Yongquan Xia and Yunyang Yan}, title = {A Touching Pattern-Oriented Strategy for Handwritten Digits Segmentation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {174--179}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.149}, doi = {10.1109/CIS.2008.149}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaZXY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaoM08, author = {Liqiang Mao and Jianfeng Ma}, title = {Towards Provably Secure On-Demand Distance Vector Routing in {MANET}}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {417--420}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.61}, doi = {10.1109/CIS.2008.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaoM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MarhusinLLC08, author = {Mohd Fadzli Marhusin and Henry Larkin and Chris Lokan and David Cornforth}, title = {An Evaluation of {API} Calls Hooking Performance}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {315--319}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.199}, doi = {10.1109/CIS.2008.199}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MarhusinLLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MenLZ08, author = {Xiuhua Men and Shunming Li and Zemin Zuo}, title = {Analysis of Signal Transmission with Temperature-Dependent Electrical Parameters Using {FDTD}}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {506--510}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.150}, doi = {10.1109/CIS.2008.150}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MenLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MingTJ08, author = {Tong Ming and Yan Tao and Hongbing Ji}, title = {An Efficient Audio Watermark Algorithm with Strong Robustness}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {385--389}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.56}, doi = {10.1109/CIS.2008.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MingTJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NaseerQ08, author = {Mudasser Naseer and Shi{-}Yin Qin}, title = {Performance Comparison of Nonlinear Dimensionality Reduction Methods for Image Data Using Different Distance Measures}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {41--46}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.18}, doi = {10.1109/CIS.2008.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NaseerQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Niu08, author = {Jiping Niu}, title = {Image Encryption Algorithm Based on Rijndael S-boxes}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {277--280}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.180}, doi = {10.1109/CIS.2008.180}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Niu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NiuP08, author = {Yi Niu and Yichun Peng}, title = {Application of Radial Function Neural Network in Network Security}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {458--463}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.163}, doi = {10.1109/CIS.2008.163}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NiuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PanKG08, author = {Heng Pan and Ke Ke and Chunxiang Gu}, title = {Efficienct ID-Based Proxy Blind Signature Schemes from Pairings}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {390--393}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.101}, doi = {10.1109/CIS.2008.101}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PanKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PoorghanadSK08, author = {Alireza Poorghanad and Ali Sadr and Alireza Kashanipour}, title = {Generating High Quality Pseudo Random Number Using Evolutionary methods}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {331--335}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.220}, doi = {10.1109/CIS.2008.220}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PoorghanadSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShenT08, author = {Sunan Shen and Shaohua Tang}, title = {Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {399--404}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.185}, doi = {10.1109/CIS.2008.185}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShenT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SongYL08, author = {Chunlai Song and Xinchun Yin and Yali Liu}, title = {A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {381--384}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.165}, doi = {10.1109/CIS.2008.165}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SongYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SuYF08, author = {Purui Su and Lingyun Ying and Dengguo Feng}, title = {Exploring Malware Behaviors Based on Environment Constitution}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {320--325}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.130}, doi = {10.1109/CIS.2008.130}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SuYF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Sun08, author = {Yuehui Sun}, title = {Illumination Invariant Using {DT-CWT} and {EMD} for Face Recognition}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {225--230}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.193}, doi = {10.1109/CIS.2008.193}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Sun08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SunZ08, author = {Junding Sun and Zhaosheng Zhang}, title = {An Effective Method for Mammograph Image Retrieval}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {190--193}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.118}, doi = {10.1109/CIS.2008.118}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SunZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TengLD08, author = {Man Teng and Xingcheng Liu and Zerong Deng}, title = {Improved {BP} Decoding Algorithm for Nonbinary {LDPC} Codes Based on Bit-flipping Method}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {376--380}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.152}, doi = {10.1109/CIS.2008.152}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TengLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TianF08, author = {Jingwen Tian and Qian Feng}, title = {Modeling of Oil and Water Migration Based on Support Vector Machine}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {244--248}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.95}, doi = {10.1109/CIS.2008.95}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TianF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TranBD08, author = {Minh{-}Triet Tran and Doan Khanh Bui and Anh Duc Duong}, title = {Gray S-Box for Advanced Encryption Standard}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {253--258}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.205}, doi = {10.1109/CIS.2008.205}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TranBD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Velik08, author = {Rosemarie Velik}, title = {Discrete Fourier Transform Computation Using Neural Networks}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {120--123}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.36}, doi = {10.1109/CIS.2008.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Velik08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WanWXY08, author = {Jian Wan and Jianrong Wu and Xianghua Xu and Yanna Yan}, title = {An Efficient Gradient Mechanism of Directed Diffusion in Wireless Sensor Network}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {427--431}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.133}, doi = {10.1109/CIS.2008.133}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WanWXY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Wang08, author = {Xiaoh Wang}, title = {Posterior Probability Reconstruction for Multi-Class Support Vector Machines}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {240--243}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.10}, doi = {10.1109/CIS.2008.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Wang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangL08, author = {Jianjun Wang and Zhonghua Li}, title = {Local Stability Analysis of CNNs with Delay and Impulses}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {129--133}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.93}, doi = {10.1109/CIS.2008.93}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLC08, author = {Na Wang and Xia Li and Yingjie Cui}, title = {Semi-Supervised Dimensionality Reduction with Pairwise Constraints Using Graph Embedding for Face Analysis}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {210--214}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.55}, doi = {10.1109/CIS.2008.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLXTW08, author = {Huibin Wang and Chaoying Liu and Lizhong Xu and Min Tang and Xuewen Wu}, title = {Multiple Feature Fusion for Tracking of Moving Objects in Video Surveillance}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {554--559}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.86}, doi = {10.1109/CIS.2008.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangLXTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangML08, author = {Hui Wang and Lequan Min and Jinzhu Liu}, title = {Robust Designs for Fingerprint Feature Extraction {CNN} with Von Neumann Neighborhood}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {124--128}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.166}, doi = {10.1109/CIS.2008.166}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangML08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangRY08, author = {Huan Wang and Mingwu Ren and Jingyu Yang}, title = {Object Tracking Based on Genetic Algorithm and Kalman Filter}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {80--85}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.147}, doi = {10.1109/CIS.2008.147}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangRY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangSY08, author = {Wei{-}jiang Wang and Ting{-}zhi Shen and Xue{-}mei Yan}, title = {An Improved Alternating-Projection Demosaicing Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {528--533}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.116}, doi = {10.1109/CIS.2008.116}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangWH08, author = {Junwei Wang and Xingwei Wang and Min Huang}, title = {Tabu Artificial Fish Swarm Algorithm Based Intelligent QoS Multicast Routing Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {56--60}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.162}, doi = {10.1109/CIS.2008.162}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangWH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZ08, author = {Chuangxin Wang and Zhezhao Zeng}, title = {A Neural-Network Algorithm for the Simultaneous Inclusion of Polynomial Zeros}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {30--34}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.58}, doi = {10.1109/CIS.2008.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WenH08, author = {Jie{-}Chang Wen and Chun{-}lan He}, title = {Some Notes on Blind Source Separation Using Generalized Eigenvalues}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {546--549}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.75}, doi = {10.1109/CIS.2008.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WenH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuLG08, author = {Yahui Wu and Gang Liu and Jun Guo}, title = {A New Method for Discriminative Model Combination in Speech Recognition}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {200--203}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.128}, doi = {10.1109/CIS.2008.128}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuLG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuWBZ08, author = {Chongming Wu and Xiaodan Wang and Dongying Bai and Hongda Zhang}, title = {Fast {SVM} Incremental Learning Based on the Convex Hulls Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {249--252}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.197}, doi = {10.1109/CIS.2008.197}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuWBZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuZWW08, author = {Zhengjia Wu and Liping Zhang and Ying Wang and Kui Wang}, title = {Optimization for Multi-Resource Allocation and Leveling Based on a Self-Adaptive Ant Colony Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {47--51}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.33}, doi = {10.1109/CIS.2008.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuZWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XiaoW08, author = {Jun Xiao and Ying Wang}, title = {Semi-Fragile Watermarking Based on Image Gradient}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {285--289}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.8}, doi = {10.1109/CIS.2008.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XiaoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XiaoZZ08, author = {Xiaochun Xiao and Tiange Zhang and Gendu Zhang}, title = {An Improved Approach to Access Graph Generation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {447--452}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.68}, doi = {10.1109/CIS.2008.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XiaoZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XieCCL08, author = {Xuehui Xie and Wen{-}Sheng Chen and Bo Chen and Hui Liu}, title = {Kernel Subspace {LDA} with Self-Constructed Mercer Kernel for Face Recognition}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {194--199}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.21}, doi = {10.1109/CIS.2008.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XieCCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XieZ08, author = {Wenli Xie and Zhezhao Zeng}, title = {A Novel Algorithm for Solving Nonlinear Equations}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {16--19}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.67}, doi = {10.1109/CIS.2008.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XieZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangPW08, author = {Chuangxin Yang and Hong Peng and Jiabing Wang}, title = {A New Feature Extraction Approach Based on Sentence Element Analysis}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {90--95}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.37}, doi = {10.1109/CIS.2008.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangWL08, author = {Mo Yang and Lina Wang and Yuandong Lei}, title = {Research on Evaluation of Trust Model}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {345--349}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.41}, doi = {10.1109/CIS.2008.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangZJW08, author = {Chun Yang and Xiangrong Zhang and Licheng Jiao and Gaimei Wang}, title = {Self-Tuning Semi-Supervised Spectral Clustering}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.141}, doi = {10.1109/CIS.2008.141}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangZJW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangZW08, author = {Jianxi Yang and Jianting Zhou and Fan Wang}, title = {A Study on the Application of {GA-BP} Neural Network in the Bridge Reliability Assessment}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {540--545}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.29}, doi = {10.1109/CIS.2008.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YaoZ08, author = {Xuanxia Yao and Xuefeng Zheng}, title = {A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {436--441}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.34}, doi = {10.1109/CIS.2008.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YaoZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YeSSW08, author = {JianHong Ye and ShiXin Sun and Wen Song and Lijie Wen}, title = {The Operations and Properties of Reproducibility of the Empty Marking}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {139--144}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.23}, doi = {10.1109/CIS.2008.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YeSSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YuanCJY08, author = {Zhijian Yuan and Yingwen Chen and Yan Jia and Shuqiang Yang}, title = {Counting Evolving Data Stream Based on Hierarchical Counting Bloom Filter}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {290--294}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.216}, doi = {10.1109/CIS.2008.216}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YuanCJY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YuanCWFX08, author = {Yuan Yuan and Bing Chen and Jiandong Wang and Liming Fang and Tao Xu}, title = {Weighted Margin Multi-Class Core Vector Machines}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {235--239}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.27}, doi = {10.1109/CIS.2008.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YuanCWFX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLWB08, author = {Mengmeng Zhang and Wenkai Liu and Ruobin Wang and Huihui Bai}, title = {A Novel Multiple Description Video Coding Algorithm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {550--553}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.182}, doi = {10.1109/CIS.2008.182}, timestamp = {Thu, 14 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLWB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangMYZF08, author = {Qiuyu Zhang and Fengman Miao and Zhanting Yuan and Qikun Zhang and Zhi Fan}, title = {Construction of a Dynamic Trust Ontology Model}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {394--398}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.127}, doi = {10.1109/CIS.2008.127}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangMYZF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangNH08, author = {Juan Zhang and Yi Niu and Wenbin He}, title = {Using Genetic Algorithm to Improve Fuzzy k-NN}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {475--479}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.159}, doi = {10.1109/CIS.2008.159}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangNH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangWZWZ08, author = {Xiao{-}yan Zhang and Xiao{-}Juan Wu and Xin Zhou and Xiao{-}Gang Wang and Yuan{-}Yuan Zhang}, title = {Automatic Detection and Tracking of Maneuverable Birds in Videos}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {185--189}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.46}, doi = {10.1109/CIS.2008.46}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangWZWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZFY08, author = {Quanju Zhang and Jie Zhang and Junhong Feng and Yajuan Yang}, title = {Neurodynamic Analysis for a Class of Nonlinear Fractional Programming}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {489--494}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.158}, doi = {10.1109/CIS.2008.158}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangZFY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoHX08, author = {Min Zhao and Zhaoshui He and Shengli Xie}, title = {Blind Deconvolution Algorithm for {MIMO} Channel}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {470--474}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.136}, doi = {10.1109/CIS.2008.136}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoHX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoLDW08, author = {Yuxin Zhao and Guangjie Liu and Yuewei Dai and Zhiquan Wang}, title = {Robust Hashing Based on Persistent Points for Video Copy Detection}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {305--308}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.175}, doi = {10.1109/CIS.2008.175}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoLDW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoLJ08, author = {Mingwei Zhao and Yang Liu and Rongan Jiang}, title = {Research of WaveCluster Algorithm in Intrusion Detection System}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {259--263}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.119}, doi = {10.1109/CIS.2008.119}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoLJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoSKBS08, author = {Rongyong Zhao and Yongqing Su and Torben Knudsen and Thomas Bak and WenZhong Shen}, title = {Multi-Agent Model for Fatigue Control in Large Offshore Wind Farm}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {71--75}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.131}, doi = {10.1109/CIS.2008.131}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoSKBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoZ08, author = {Weibin Zhao and Zhiheng Zhou}, title = {Contours Location Based on Fisher Discrimination Analysis}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {480--483}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.138}, doi = {10.1109/CIS.2008.138}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhengCLFJ08, author = {Min{-}qi Zheng and Chongcheng Chen and Jiaxiang Lin and Minghui Fan and Tamas Jansco}, title = {An Algorithm for Spatial Outlier Detection Based on Delaunay Triangulation}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {102--107}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.121}, doi = {10.1109/CIS.2008.121}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhengCLFJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhengQ08, author = {Kai{-}mei Zheng and Xu Qian}, title = {Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet Transforms}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {295--299}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.71}, doi = {10.1109/CIS.2008.71}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhengQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouCMX08, author = {Gengui Zhou and Zhenyu Cao and Zhiqing Meng and Qi Xu}, title = {A GA-Based Approach on a Repair Logistics Network Design with M/M/s Model}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {145--149}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.117}, doi = {10.1109/CIS.2008.117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhouCMX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouPTX08, author = {Ruili Zhou and Jianfeng Pan and Xiaobin Tan and Hongsheng Xi}, title = {Application of {CLIPS} Expert System to Malware Detection System}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {309--314}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.100}, doi = {10.1109/CIS.2008.100}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhouPTX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouS08, author = {Jianqin Zhou and Cheng Shangguan}, title = {On the k-error Linear Complexity of Sequences}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {267--271}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.144}, doi = {10.1109/CIS.2008.144}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhouS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuX08, author = {Xiang{-}wei Zhu and Liang Xiao}, title = {Research of Multiple Watermarks Algorithm in E-commerce Copyright Protection and Tracking}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {300--304}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.19}, doi = {10.1109/CIS.2008.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2008-1, title = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=4724594}, isbn = {978-0-7695-3508-1}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/2008-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.