default search action
Search dblp for Publications
export results for "toc:db/conf/iitsi/iitsi2010.bht:"
@inproceedings{DBLP:conf/iitsi/BiaoLL10, author = {Cai Biao and Zhishu Li and Zhen Luo}, title = {Threshold Secret Sharing Based Trust Security in Structured {P2P} Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {320--323}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.123}, doi = {10.1109/IITSI.2010.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/BiaoLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/CaoYWCC10, author = {Yanyan Cao and Hengjun Yue and Jian Wu and Jianming Chen and Zhiming Cui}, title = {Vehicle Edge Detection Based on Multi-structure Mathematical Morphology}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {258--262}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.11}, doi = {10.1109/IITSI.2010.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/CaoYWCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Chen10, author = {Juan Chen}, title = {A Flexible Fuzzy Comprehensive Evaluation Method}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {502--506}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.93}, doi = {10.1109/IITSI.2010.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Chen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Chen10a, author = {Juan Chen}, title = {Economic Grid Resource Scheduling Based on Utility Optimization}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {522--525}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.94}, doi = {10.1109/IITSI.2010.94}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Chen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ChenC10, author = {Xiaodan Chen and Shaobai Chen}, title = {The Feasible Control Lyapunov Function of Nonlinear Affine-Control Systems}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {442--445}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.154}, doi = {10.1109/IITSI.2010.154}, timestamp = {Thu, 25 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iitsi/ChenC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ChenC10a, author = {Xiaodan Chen and Shaobai Chen}, title = {On the Upper Completeness of Quasi-metric Spaces}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {446--449}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.153}, doi = {10.1109/IITSI.2010.153}, timestamp = {Thu, 25 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iitsi/ChenC10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ChenCX10, author = {Youqin Chen and Zhide Chen and Li Xu}, title = {{RFID} System Security Using Identity-Based Cryptography}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {460--464}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.52}, doi = {10.1109/IITSI.2010.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ChenCX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ChenFL10, author = {Junjian Chen and Dan Feng and Jingning Liu}, title = {An Implementation of Object-Based Storage System Access Control Based on {IBE}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {635--639}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.53}, doi = {10.1109/IITSI.2010.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ChenFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ChenL10, author = {Hongli Chen and ShanGuo Lv}, title = {Study on Ontology Model Based on Rough Set}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {105--108}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.169}, doi = {10.1109/IITSI.2010.169}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ChenL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ChenSYWLX10, author = {Zhonghai Chen and Yong Sun and Guoli Yang and Tengfei Wu and Guizhu Li and Longbiao Xin}, title = {Air Conditioning Load Prediction Based on {DE-SVM} Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {276--279}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.41}, doi = {10.1109/IITSI.2010.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ChenSYWLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ChineWYCLC10, author = {Wen{-}Huan Chine and Hsiao{-}Ping Wei and Keh{-}Chia Yeh and Li Chen and Gin{-}Rong Liu and Chang{-}Hung Chiu}, title = {Estimating Typhoon Rainfall over Sea from {SSM/I} Satellite Data Using a Back-Propagated Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {263--267}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.102}, doi = {10.1109/IITSI.2010.102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ChineWYCLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/DengK10, author = {Huifang Deng and Haiyan Kang}, title = {Research on High Performance {RFID} Code Resolving Technology}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {677--681}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.21}, doi = {10.1109/IITSI.2010.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/DengK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/DengSZ10, author = {Zhongjun Deng and Wei Song and Xuefeng Zheng}, title = {{P2PKMM:} {A} Hybrid Clustering Algorithm over {P2P} Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {450--454}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.9}, doi = {10.1109/IITSI.2010.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/DengSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/DengW10, author = {Zhonghua Deng and Ying Wu}, title = {Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by {ISA}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {658--662}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.48}, doi = {10.1109/IITSI.2010.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/DengW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/DongWSC10, author = {Junyu Dong and Yuliang Wang and Yan Song and Guanglin Cheng}, title = {Three-Dimensional Multiscale Texture Synthesis}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {483--487}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.125}, doi = {10.1109/IITSI.2010.125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/DongWSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/FuBZ10, author = {Xiangqun Fu and Wansu Bao and Chun Zhou}, title = {Design and Implementation of Quantum Factorization Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {748--752}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.150}, doi = {10.1109/IITSI.2010.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/FuBZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/GangF10, author = {Wang Gang and Yin Fengxia}, title = {Study on Service Selections Based on Ontology and Qos}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {43--47}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.75}, doi = {10.1109/IITSI.2010.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/GangF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/GaoHPW10, author = {Feng Gao and Jingsha He and Shufen Peng and Xu Wu}, title = {A Quantifying Metric for Privacy Protection Based on Information Theory}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {216--220}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.107}, doi = {10.1109/IITSI.2010.107}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/GaoHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/GaoLWY10, author = {Fuxiang Gao and Sha Li and Xiaolu Wang and Lan Yao}, title = {A Security Architecture for Intranet Based on Security Area Division}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {539--543}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.33}, doi = {10.1109/IITSI.2010.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/GaoLWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/GaoZZ10, author = {Changyuan Gao and Shuchen Zhang and Xiaoxing Zhang}, title = {The Modeling and Simulation of Negotiation Process for High-Tech Virtual Enterprise Based on {UML} and Petri Net}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {455--459}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.100}, doi = {10.1109/IITSI.2010.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/GaoZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/GuSH10, author = {Ji{-}Hua Gu and Yun Shang and Bei{-}jing Huang}, title = {An {NPT} Watermarking Algorithm Using Wavelet Image Combination}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {378--381}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.116}, doi = {10.1109/IITSI.2010.116}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/GuSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/GuoSR10, author = {Yingjun Guo and Lihua Sun and Haichao Ran}, title = {The Method of Early Real-Time Fault Diagnosis for Technical Process Based on Neural Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {653--657}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.92}, doi = {10.1109/IITSI.2010.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/GuoSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/GuoX10, author = {Kaiqiang Guo and Jiewu Xia}, title = {An Improved Algorithm of Collision Detection in 2D Grapple Games}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {328--331}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.176}, doi = {10.1109/IITSI.2010.176}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/GuoX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HeXWZ10, author = {Ruhan He and Weibin Xu and Ying Wang and Wei Zhan}, title = {A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing Problem}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {390--393}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.144}, doi = {10.1109/IITSI.2010.144}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HeXWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HongY10, author = {Ding Hong and Zhao Yizhu}, title = {A Historical Role-Based Fast Negotiation Model in Open Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {289--293}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.133}, doi = {10.1109/IITSI.2010.133}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HongY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HoushmandHM10, author = {Mahboobeh Houshmand and Monireh Houshmand and Habib Rajabi Mashhadi}, title = {Game Theory Based View to the Quantum Key Distribution {BB84} Protocol}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {332--336}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.135}, doi = {10.1109/IITSI.2010.135}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iitsi/HoushmandHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HoushmandSSAD10, author = {Mahboobeh Houshmand and Elaheh Soleymanpour and Hossein Salami and Mahya Amerian and Hossein Deldari}, title = {Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {350--354}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.137}, doi = {10.1109/IITSI.2010.137}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iitsi/HoushmandSSAD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Hu10, author = {Zhi{-}Hua Hu}, title = {A Quay Crane Assignment Approach for Berth Allocation Problem in Container Terminal}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {17--21}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.97}, doi = {10.1109/IITSI.2010.97}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Hu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HuLZL10, author = {Jianli Hu and Xiaohua Li and Bin Zhou and Yonghua Li}, title = {SECTrust: {A} Secure and Effective Distributed {P2P} Trust Model}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {34--38}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.113}, doi = {10.1109/IITSI.2010.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HuLZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HuX10, author = {Xinming Hu and Huosong Xia}, title = {Automated Assessment System for Subjective Questions Based on {LSI}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {250--254}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.76}, doi = {10.1109/IITSI.2010.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HuX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Huang10, author = {Jianjun Huang}, title = {A {PSO} Based Array Shape Calibration Utilizing Cyclostationarity}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {226--231}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.117}, doi = {10.1109/IITSI.2010.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Huang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HuangCL10, author = {Weichun Huang and Min Chen and Jian Liu}, title = {A Small World Network Based Grid Resource Discovery Mechanism}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {8--11}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.24}, doi = {10.1109/IITSI.2010.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HuangCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HuangHWL10, author = {Lei Huang and Yanxiang He and Furu Wei and Wenjie Li}, title = {Modeling Document Summarization as Multi-objective Optimization}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {382--386}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.80}, doi = {10.1109/IITSI.2010.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HuangHWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HuangXW10, author = {Xiangyang Huang and Xiao Xin and Wenjun Wu}, title = {Representing Non-deterministic Actions within the Situation Calculus for Autonomous Characters}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {39--42}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.66}, doi = {10.1109/IITSI.2010.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HuangXW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HuangZ10, author = {Xiaosheng Huang and Fang Zhang}, title = {Multi-modal Medical Image Registration Based on Gradient of Mutual Information and Hybrid Genetic Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {125--128}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.112}, doi = {10.1109/IITSI.2010.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HuangZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/HuangZL10, author = {Jianjun Huang and Jiali Zhong and Pengfei Li}, title = {A Cloud Model Inference System Based Alpha-Beta Filter for Tracking of Maneuvering Target}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {221--225}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.119}, doi = {10.1109/IITSI.2010.119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/HuangZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiaLGC10, author = {Yan Jia and Runheng Li and Liang Gan and Guangqiang Chen}, title = {{IRC} Botnets' Homology Identifying Method Based on Improved LB{\_}PAA Distance of Communication Characteristic Curves}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {360--365}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.69}, doi = {10.1109/IITSI.2010.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiaLGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiangJS10, author = {Yali Jiang and Xiuling Ju and Feng Shi}, title = {New Lattice-Based Public-Key Cryptosystem}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {387--389}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.98}, doi = {10.1109/IITSI.2010.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiangJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiangJZW10, author = {Chunliang Jiang and Hanhong Jiang and Chaoliang Zhang and Jie Wang}, title = {A New Method of Sea-Sky-Line Detection}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {740--743}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.147}, doi = {10.1109/IITSI.2010.147}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiangJZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiangL10, author = {Da{-}guo Jiang and Zhao{-}hui Liu}, title = {Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR Composite Film}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {268--270}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.152}, doi = {10.1109/IITSI.2010.152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiangL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiangMT10, author = {Xiangang Jiang and Dean Ma and Longfeng Tao}, title = {The Research of High Noise Image's Restoration and Recognition of Train's Plates}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {150--153}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.172}, doi = {10.1109/IITSI.2010.172}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiangMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiangPMC10, author = {Chang{-}jin Jiang and Hong Peng and Qian{-}Li Ma and Jian{-}chao Chen}, title = {Automatic Summarization for Chinese Text Based on Combined Words Recognition and Paragraph Clustering}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {591--594}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.15}, doi = {10.1109/IITSI.2010.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiangPMC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiangXM10, author = {Xiangang Jiang and Lunlun Xu and Dean Ma}, title = {Volume Rendering Effect Analysis with Image Preprocessing Technology Based on Three Dimension Anisotropic Diffusion}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {789--792}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.173}, doi = {10.1109/IITSI.2010.173}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiangXM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JiangXZW10, author = {YuXiang Jiang and Cheng Xu and Lulu Zhang and ShanQin Wang}, title = {Design and Implementation for Real-Time Property of Serial Communication Based on {WINDOWS} {CE}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {73--76}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.111}, doi = {10.1109/IITSI.2010.111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JiangXZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JinDWZL10, author = {Shaohua Jin and Chongguang Ding and Yongxue Wang and Yanmin Zhang and Jie Lv}, title = {A Strong Deviation Theorem Based on Laplace Transform on a Non-homogeneous Tree}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {165--168}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.67}, doi = {10.1109/IITSI.2010.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JinDWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JinWLTL10, author = {Shaohua Jin and Yongxue Wang and Huitao Liu and Ying Tian and Hui Li}, title = {Some Strong Limit Theorems for Hidden Markov Models Indexed by a Non-homogeneous Tree}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {169--172}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.68}, doi = {10.1109/IITSI.2010.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JinWLTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/JuWMW10, author = {Li{-}li Ju and Xiu{-}fang Wang and Sai Ma and Chun{-}ming Wei}, title = {The Algorithm Study of Sensor Compensation in {MWD} Instrument Based on Genetic Elman Neural Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {394--397}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.45}, doi = {10.1109/IITSI.2010.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/JuWMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LanXY10, author = {Shi Lan and Shao Xia and Zhao Ying}, title = {Design and Implementation of ICAP-Client Based on Improved {LRU} Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {271--275}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.17}, doi = {10.1109/IITSI.2010.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LanXY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Li10, author = {Zhixing Li}, title = {Product Feature Extraction with a Combined Approach}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {686--690}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.184}, doi = {10.1109/IITSI.2010.184}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Li10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Li10a, author = {Fei Li}, title = {An Improved Particle Swarm Optimization Algorithm with Synthetic Update Mechanism}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {695--699}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.148}, doi = {10.1109/IITSI.2010.148}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Li10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Li10b, author = {Haisheng Li}, title = {Study of Privacy Preserving Data Mining}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {700--703}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.14}, doi = {10.1109/IITSI.2010.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Li10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiG10, author = {Kai Li and Hongtao Gao}, title = {A Novel Measure of Diversity for Support Vector Machine Ensemble}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {366--370}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.136}, doi = {10.1109/IITSI.2010.136}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiGGL10, author = {Lizong Li and Tiegang Gao and Qiaolun Gu and Bi Lei}, title = {A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet Transformation}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {68--72}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.77}, doi = {10.1109/IITSI.2010.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiGGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiJLS10, author = {Shaobo Li and Xiaohui Jia and Shulin Lv and Zhisheng Shao}, title = {Research and Application of {USB} Filter Driver Based on Windows Kernel}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {438--441}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.10}, doi = {10.1109/IITSI.2010.10}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiJLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiLJS10, author = {Shaobo Li and Shulin Lv and Xiaohui Jia and Zhisheng Shao}, title = {Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {423--426}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.55}, doi = {10.1109/IITSI.2010.55}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiLJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiLZ10, author = {Huamin Li and Xingsen Li and Zhengxiang Zhu}, title = {Knowledge Mining for Intelligent Decision Making in Small and Middle Business}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {734--739}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.181}, doi = {10.1109/IITSI.2010.181}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiPL10, author = {Wei Li and Zhen Peng Pang and Zhi Jie Liu}, title = {{SPIHT} Algorithm Combined with Huffman Encoding}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {341--343}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.63}, doi = {10.1109/IITSI.2010.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiS10, author = {Jian Li and Wengeng Shi}, title = {Model of {CSR} in Chinese Medicine E-commerce Firm: Strategic Management Perspective}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {704--707}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.36}, doi = {10.1109/IITSI.2010.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiW10, author = {Lanying Li and Xin Wang}, title = {A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {507--510}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.46}, doi = {10.1109/IITSI.2010.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiWH10, author = {Guorui Li and Ying Wang and Jingsha He}, title = {Efficient Group Key Management Scheme in Wireless Sensor Networks}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {411--415}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.131}, doi = {10.1109/IITSI.2010.131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiWZ10, author = {Nianqiang Li and Yongbing Wang and Guoyi Zhao}, title = {A Preferable Method on Digital Filter in {ECG} Signal's Processing Based on {FPGA}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {184--187}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.81}, doi = {10.1109/IITSI.2010.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiWZ10a, author = {Nianqiang Li and Yongbing Wang and Guoyi Zhao}, title = {A New Scheme on Multifunction Wireless Medical Surveillance System Based on {FPGA}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {188--191}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.82}, doi = {10.1109/IITSI.2010.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiWZ10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiXW10, author = {Minghui Li and Jingbo Xia and Yaoguo Wang}, title = {Research on {MAC} Communication Mechanism of Air-to-Ground Data Link Based on 3G: The {MSDU} Frame Subsection and {RTS/CTS} Handshake Mechanism}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {54--57}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.95}, doi = {10.1109/IITSI.2010.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiXW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiY10, author = {Dong Li and Chunhui Yang}, title = {A Test Platform for Evaluation of Web Service Composition Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {302--305}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.174}, doi = {10.1109/IITSI.2010.174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiY10a, author = {Dong Li and Chunhui Yang}, title = {A Trust Evaluation Model for Web Service Selection}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {306--310}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.175}, doi = {10.1109/IITSI.2010.175}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiZ10, author = {Yang Li and Chong{-}chong Zhao}, title = {Aesthetic Evolution of Staged L-systems for Tiling Pattern Design}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {488--492}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.71}, doi = {10.1109/IITSI.2010.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Liang10, author = {Ye Liang}, title = {Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer Environment}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {667--670}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.121}, doi = {10.1109/IITSI.2010.121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Liang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LinZO10, author = {Ying Lin and Yan Zhang and Yang{-}jia Ou}, title = {The Design and Implementation of Host-Based Intrusion Detection System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {595--598}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.127}, doi = {10.1109/IITSI.2010.127}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LinZO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Liu10, author = {Hailin Liu}, title = {A Mixture Conjugate Gradient Method for Unconstrained Optimization}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {26--29}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.57}, doi = {10.1109/IITSI.2010.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Liu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiuDJ10, author = {Yu Liu and Junchan Du and Feng Ji}, title = {Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {77--80}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.58}, doi = {10.1109/IITSI.2010.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiuDJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiuG10, author = {Zenghui Liu and Liguo Guan}, title = {Attack Simulation and Signature Extraction of Low-Rate DoS}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {544--548}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.38}, doi = {10.1109/IITSI.2010.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiuG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiuQCW10, author = {Qiao Liu and Zhiguang Qin and Hongrong Cheng and Mingcheng Wan}, title = {Efficient Modeling of Spam Images}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {663--666}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.40}, doi = {10.1109/IITSI.2010.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiuQCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiuSH10, author = {Zhihua Liu and Hui Sun and Haizhi Hu}, title = {Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm Based on Exchange Strategy}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {212--215}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.64}, doi = {10.1109/IITSI.2010.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiuSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LiuY10, author = {Yanbin Liu and Ping Yuan}, title = {A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {255--257}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.79}, doi = {10.1109/IITSI.2010.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LiuY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LongC10, author = {Chen Long and Huang Chen}, title = {Comparative Study between the Magic Formula and the Neural Network Tire Model Based on Genetic Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {280--284}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.138}, doi = {10.1109/IITSI.2010.138}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LongC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LuanLW10, author = {Fang{-}jun Luan and Lan Lin and Yong{-}hui Wang}, title = {4-Step Face Authentication Algorithm Based on {SVM}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {534--538}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.99}, doi = {10.1109/IITSI.2010.99}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LuanLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LuoXR10, author = {Wen{-}lang Luo and An{-}dong Xie and Wen Ruan}, title = {The Construction and Test for a Small Beowulf Parallel Computing System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {767--770}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.157}, doi = {10.1109/IITSI.2010.157}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LuoXR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LvA10, author = {Rong{-}jie Lv and Yu{-}hong An}, title = {Dynamic Evolution Simulation of Corporate Governance Based on Swarm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {173--177}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.22}, doi = {10.1109/IITSI.2010.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LvA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/LvC10, author = {ShanGuo Lv and Hongli Chen}, title = {Study on Incremental Data Mining Based on Rough Set Theory}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {101--104}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.168}, doi = {10.1109/IITSI.2010.168}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/LvC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/MaL10, author = {Xinqiang Ma and Youyuan Liu}, title = {Electronic Commerce Technology and its Security Problems}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {631--634}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.165}, doi = {10.1109/IITSI.2010.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/MaL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/MaLD10, author = {Xiaojun Ma and Sa Li and Weihui Dai}, title = {Modeling and Simulating of Ecological Community in Digital Creative Industry}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {708--712}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.130}, doi = {10.1109/IITSI.2010.130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/MaLD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/MaLSW10, author = {Miao Ma and Jian{-}hui Liang and Li Sun and Min Wang}, title = {{SAR} Image Segmentation Based on {SWT} and Improved {AFSA}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {146--149}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.171}, doi = {10.1109/IITSI.2010.171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/MaLSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/MinF10, author = {Gu Min and Yang Feng}, title = {An Improved Genetic Algorithm Based on Polygymy}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {371--373}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.166}, doi = {10.1109/IITSI.2010.166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/MinF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/NiGZ10, author = {Lihui Ni and Zhijin Guan and Wenying Zhu}, title = {A General Method of Constructing the Reversible Full-Adder}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {109--113}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.25}, doi = {10.1109/IITSI.2010.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/NiGZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Pan10, author = {Ding Pan}, title = {{DW} 2.0-Oriented Metadata Evolution Management}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {311--314}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.91}, doi = {10.1109/IITSI.2010.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Pan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/PangDZ10, author = {Ming{-}bao Pang and Fang Dong and Xin{-}ping Zhao}, title = {Regional Logistics System Bi-level Programming with Elastic Demand by Using Fuzzy C-means Clustering}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {160--164}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.19}, doi = {10.1109/IITSI.2010.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/PangDZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/PangLSB10, author = {Yin Pang and Kan Li and Xin Sun and Kaili Bu}, title = {Dynamic Replica Selection Using Improved Kernel Density Estimation}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {470--474}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.49}, doi = {10.1109/IITSI.2010.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/PangLSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/PengXZ10, author = {Xuange Peng and Ying Xiao and Bing Zhu}, title = {Research of Image Acquisition Device for River Sediment}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {771--776}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.162}, doi = {10.1109/IITSI.2010.162}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/PengXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/PingP10, author = {Teng Ping and He Ping}, title = {Characteristics of Network Non-optimum and Extensionality Security Mode}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {627--630}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.109}, doi = {10.1109/IITSI.2010.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/PingP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/QiuCH10, author = {Zhao Qiu and Mingrui Chen and Jun Huang}, title = {A Study on {CRL} Issue by {P2P} Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {526--529}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.145}, doi = {10.1109/IITSI.2010.145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/QiuCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/QiuCH10a, author = {Zhao Qiu and Mingrui Chen and Jun Huang}, title = {Design of Multi-mode E-commerce Recommendation System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {530--533}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.108}, doi = {10.1109/IITSI.2010.108}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/QiuCH10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ShenHS10, author = {Yanguang Shen and Junrui Han and Huifang Shan}, title = {The Research of Privacy-Preserving Clustering Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {324--327}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.62}, doi = {10.1109/IITSI.2010.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ShenHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ShiL10, author = {Hongqin Shi and Fangliang Lv}, title = {A Blind Watermark Algorithm for Color Image Based on Dual Scrambling Technique}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {781--785}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.167}, doi = {10.1109/IITSI.2010.167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ShiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ShiLG10, author = {Na Shi and Xumin Liu and Yong Guan}, title = {Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {63--67}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.74}, doi = {10.1109/IITSI.2010.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ShiLG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/SongS10, author = {Xiaoyu Song and Lihua Sun}, title = {Study on the Convergence of Hybrid Ant Colony Algorithm for Job Shop Scheduling Problems}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {493--497}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.106}, doi = {10.1109/IITSI.2010.106}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/SongS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Sun10, author = {Hongjie Sun}, title = {An Integrated Network Performance Monitor System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {88--91}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.60}, doi = {10.1109/IITSI.2010.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Sun10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Sun10a, author = {Guang Sun}, title = {An Algorithm of Webpage Information Hiding Based on Class Selectors}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {691--694}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.42}, doi = {10.1109/IITSI.2010.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Sun10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Sun10b, author = {Jianfang Sun}, title = {Application of Data Mining for Decision Tree Model of Multi-variety Discrete Production and Manufacture}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {724--728}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.13}, doi = {10.1109/IITSI.2010.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Sun10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TaihuaF10, author = {Wang Taihua and Guo Fan}, title = {Associating {IDS} Alerts by an Improved Apriori Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {478--482}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.47}, doi = {10.1109/IITSI.2010.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TaihuaF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TanZ10, author = {Bin Tan and Xuyan Zhou}, title = {Automatic Construction of Web-Based English/Chinese Parallel Corpora}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {114--117}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.124}, doi = {10.1109/IITSI.2010.124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TanZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TanZGT10, author = {Xue{-}Dan Tan and He{-}Ming Zhao and Ji{-}Hua Gu and Zhi Tao}, title = {A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based on Empirical Mode Decomposition and Entropy}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {355--359}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.115}, doi = {10.1109/IITSI.2010.115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TanZGT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TangF10, author = {Haokui Tang and Zhiquan Feng}, title = {Skin Segmentation Based on Double-Models}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {3--7}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.78}, doi = {10.1109/IITSI.2010.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TangF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TaoTHGXZ10, author = {Zhi Tao and Xue{-}Dan Tan and Tao Han and Ji{-}Hua Gu and Yi{-}Shen Xu and He{-}Ming Zhao}, title = {Reconstruction of Normal Speech from Whispered Speech Based on {RBF} Neural Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {374--377}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.118}, doi = {10.1109/IITSI.2010.118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TaoTHGXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TianB10, author = {Li Tian and Wansu Bao}, title = {A Medium Field Multivariate Public Key Signature Scheme with External Perturbation}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {753--757}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.149}, doi = {10.1109/IITSI.2010.149}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TianB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TianV10, author = {Yukang Tian and Huy Quan Vu}, title = {A Multiple Population Genetic Algorithm and its Application in Fuzzy Controller}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {729--733}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.43}, doi = {10.1109/IITSI.2010.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TianV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/TianYZL10, author = {Jiayin Tian and Cheng Yang and Yichun Zhang and Jianbo Liu}, title = {Distributed Key Management Scheme for Large Scale Pay-TV Application}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {30--33}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.110}, doi = {10.1109/IITSI.2010.110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/TianYZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangB10, author = {Wu Wang and Zheng{-}min Bai}, title = {Performance Analysis of an Improved Single Neuron Adaptive {PID} Control}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {22--25}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.18}, doi = {10.1109/IITSI.2010.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangCZWD10, author = {Wenxian Wang and Xingshu Chen and Yongbin Zou and Haizhou Wang and Zongkun Dai}, title = {A Focused Crawler Based on Naive Bayes Classifier}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {517--521}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.30}, doi = {10.1109/IITSI.2010.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangCZWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangDDZL10, author = {Feng Wang and Hui Deng and Wei Dai and Sheng Zheng and Bo Liang}, title = {The Security Issues of Scientific-Workflow Technique in Network Grid Computing}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {285--288}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.12}, doi = {10.1109/IITSI.2010.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangDDZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangFHCW10, author = {Ruihu Wang and Bin Fang and Zhangping Hu and Liang Chen and Weihua Wang}, title = {Cascaded SVMs in Pattern Classification for Time-Sensitive Separating}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {640--644}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.56}, doi = {10.1109/IITSI.2010.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangFHCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangH10, author = {Huajin Wang and Chun{-}an Hu}, title = {Mining Maximal Patterns Based on Improved FP-tree and Array Technique}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {567--571}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.185}, doi = {10.1109/IITSI.2010.185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangJGWL10, author = {Shan Wang and Yang Jiang and Minghua Gao and Chuanyun Wang and Haiwen Liu}, title = {Artificial Neural Network Method for the Analysis of 1-D Defected Ground Structure}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {786--788}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.170}, doi = {10.1109/IITSI.2010.170}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangJGWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangLJX10, author = {Pingjian Wang and Jingqiang Lin and Jiwu Jing and Yongquan Xie}, title = {Mediated Hierarchical Identity-Based Combined Public Key Schemes}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {614--618}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.20}, doi = {10.1109/IITSI.2010.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangLJX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangLL10, author = {Lin{-}an Wang and Qiang Li and Xiao{-}juan Liang}, title = {Modeling and Dynamic Simulation of Electric Power Steering System of Automobile Using Bond Graph Technique}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {744--747}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.151}, doi = {10.1109/IITSI.2010.151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangQ10, author = {Jinbiao Wang and Shu Qin}, title = {The Research on Two Important Counter-Examples of Four-Color Problem}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {623--626}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.158}, doi = {10.1109/IITSI.2010.158}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangSLY10, author = {Huan Wang and Yikai Shi and Jian{-}kang Lu and Xiaoqing Yuan}, title = {Design and Application of New Topology of Transverse Flux Permanent-Magnet Motor with Driving System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {294--297}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.44}, doi = {10.1109/IITSI.2010.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangSLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangWSH10, author = {Kun Wang and Jin{-}dong Wang and Liu{-}qing Shen and Zhen{-}hua Han}, title = {An Intelligent Security Defensive Software Scheme and Realization}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {793--796}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.164}, doi = {10.1109/IITSI.2010.164}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangWSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangY10, author = {Geng{-}Sheng Wang and Yun{-}Xin Yu}, title = {An Improved Ant Colony Algorithm for {VRP} Problem}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {129--133}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.86}, doi = {10.1109/IITSI.2010.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangY10a, author = {Eric Ke Wang and Yunming Ye}, title = {An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {511--516}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.139}, doi = {10.1109/IITSI.2010.139}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangYXZ10, author = {Hongfa Wang and Feng Yu and Chen Xing and Zhimin Zhou}, title = {Genetic Algorithm-Based Evaluation Model of Teaching Quality}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {97--100}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.59}, doi = {10.1109/IITSI.2010.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangYXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WeiCYWX10, author = {Min Wei and HaiNing Chen and TianYun Yan and QinZhang Wu and Bin Xu}, title = {The Detecting Methods of Geostationary Orbit Objects}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {645--648}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.31}, doi = {10.1109/IITSI.2010.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WeiCYWX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WitaJT10, author = {Ratsameetip Wita and Nattanatch Jiamnapanon and Yunyong Teng{-}Amnuay}, title = {An Ontology for Vulnerability Lifecycle}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {553--557}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.141}, doi = {10.1109/IITSI.2010.141}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WitaJT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Wu10, author = {Qunli Wu}, title = {Analysis on the Integration of {ERP} with E-business}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {81--83}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.16}, doi = {10.1109/IITSI.2010.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Wu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WuZC10, author = {Kehe Wu and Tong Zhang and Fei Chen}, title = {Research on Active Controllable Defense Model Based on Zero-PDR Model}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {572--575}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.140}, doi = {10.1109/IITSI.2010.140}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WuZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/XiaL10, author = {Chuanliang Xia and Zhendong Liu}, title = {Property Preservation of Time Petri Net Reduction}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {154--159}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.35}, doi = {10.1109/IITSI.2010.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/XiaL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/XiaWCC10, author = {Jie Xia and Jian Wu and Yanyan Cao and Zhiming Cui}, title = {SOM-Based Classification Method for Moving Object in Traffic Video}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {138--142}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.54}, doi = {10.1109/IITSI.2010.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/XiaWCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/XieX10, author = {Chengrong Xie and Yuhua Xu}, title = {Adaptive Hybrid Function Projective Synchronization for Two Different Chaotic System with Uncertain Parameters}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {12--16}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.120}, doi = {10.1109/IITSI.2010.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/XieX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/XiongC10, author = {Yumei Xiong and Yimin Chen}, title = {An Improved Task Scheduling Algorithm in Embedded Systems}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {682--685}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.65}, doi = {10.1109/IITSI.2010.65}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/XiongC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/XuS10, author = {Liang Xu and Yuanyuan Sun}, title = {Research on the Knowledge Flow in Supply Chain Based on the Core Enterprise}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {344--349}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.104}, doi = {10.1109/IITSI.2010.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/XuS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/XuWGQ10, author = {Ruzhi Xu and Quansheng Wu and Hongquan Gong and Leqiu Qian}, title = {Research on Component Composition with Formal Semantics}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {118--124}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.101}, doi = {10.1109/IITSI.2010.101}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/XuWGQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/XuZW10, author = {Zhipeng Xu and Qianting Zhou and Jun Wei}, title = {Design of Temperature Control System for a Special Shortwave Infrared Spatial Remote Sensor Based on {FPGA}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {475--477}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.143}, doi = {10.1109/IITSI.2010.143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/XuZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangC10, author = {Guangying Yang and Yue Chen}, title = {The Study of Electrocardiograph Based on Radial Basis Function Neural Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {143--145}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.85}, doi = {10.1109/IITSI.2010.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangGP10, author = {Wei Yang and Chen Guo and Xuan Ge Peng}, title = {The Solution of Printing on University Human Management System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {435--437}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.163}, doi = {10.1109/IITSI.2010.163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangNH10, author = {Yan Yang and Pengcheng Nie and Yong He}, title = {A Method of Honey Plant Classification Based on {IR} Spectrum: Extract Feature Wavelength Using Genetic Algorithm and Classify Using Linear Discriminate Analysis}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {241--245}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.105}, doi = {10.1109/IITSI.2010.105}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangNH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangSZ10, author = {Bowei Yang and Guanghua Song and Yao Zheng}, title = {The Analysis and Enhancement of Voting Behaviors in {P2P} Networks}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {407--410}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.37}, doi = {10.1109/IITSI.2010.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangT10, author = {Zhiyuan Yang and Qinming Tan}, title = {The Application of Random Forest and Morphology Analysis to Fault Diagnosis on the Chain Box of Ships}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {315--319}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.84}, doi = {10.1109/IITSI.2010.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangTZJ10, author = {Fang Yang and Xuedong Tian and Xin Zhang and Xin{-}Biao Jia}, title = {An Improved Method for Similar Handwritten Chinese Character Recognition}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {419--422}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.70}, doi = {10.1109/IITSI.2010.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangTZJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangW10, author = {Lin Yang and Hui Ting Wang}, title = {Classification Based on Particle Swarm Optimization for Least Square Support Vector Machines Training}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {246--249}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.39}, doi = {10.1109/IITSI.2010.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangW10a, author = {Suying Yang and Xin Wang}, title = {A Visual Domain Recognition Method Based on Function Mode for Source Code Plagiarism}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {580--584}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.114}, doi = {10.1109/IITSI.2010.114}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangWLM10, author = {Suying Yang and Meng Wang and Jianying Lin and Kuijun Meng}, title = {Optimization Design of Supervising and Controlling on the {SOFC} Integration System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {576--579}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.126}, doi = {10.1109/IITSI.2010.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangWLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangY10, author = {Guangying Yang and Shanxiao Yang}, title = {Emotion Recognition of Electromyography Based on Support Vector Machine}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {298--301}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.122}, doi = {10.1109/IITSI.2010.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YangonGH10, author = {Qiufen Yang and Weihua Gui and Huosheng Hu}, title = {A Novel Real-Time Face Tracking Algorithm for Detection of Driver Fatigue}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {671--676}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.180}, doi = {10.1109/IITSI.2010.180}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YangonGH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YaoDCY10, author = {Xiaoming Yao and Wencai Du and Baodan Chen and Zhongzhi Yuan}, title = {An Integrated {P2P} Mobile Learning Model for Timely Farming Guidance}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {84--87}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.26}, doi = {10.1109/IITSI.2010.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YaoDCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YaoDHWF10, author = {Xiaoming Yao and Wencai Du and Mei Huang and Weihua Wu and Jundong Fu}, title = {Pattern-Based Blind Spatial Image Watermarking}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {92--96}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.27}, doi = {10.1109/IITSI.2010.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YaoDHWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YaoDWHF10, author = {Xiaoming Yao and Wencai Du and Weihua Wu and Mei Huang and Jundong Fu}, title = {A Robust EMD-Like Stegnographic Scheme}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {134--137}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.28}, doi = {10.1109/IITSI.2010.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YaoDWHF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YaoLZH10, author = {Mingyin Yao and Muhua Liu and Jinhui Zhao and Lin Huang}, title = {Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {398--401}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.83}, doi = {10.1109/IITSI.2010.83}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YaoLZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YeWLH10, author = {Qing Ye and Xiaoping Wu and Yongqing Liu and Gaofeng Huang}, title = {A Hybrid Model of {RST} and {DST} with its Application in Intrusion Detection}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {202--205}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.87}, doi = {10.1109/IITSI.2010.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YeWLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YingA10, author = {Sibin Ying and Jianliang Ai}, title = {Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using Artificial Neural Network}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {206--211}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.146}, doi = {10.1109/IITSI.2010.146}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YingA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YuW10, author = {Xin Yu and Zhiguang Wei}, title = {Research on Logistics System Architecture Based on {SOA}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {763--766}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.159}, doi = {10.1109/IITSI.2010.159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YuW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YuYHW10, author = {Chunyan Yu and Dongyi Ye and Xiaosheng He and Minghui Wu}, title = {Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {604--608}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.89}, doi = {10.1109/IITSI.2010.89}, timestamp = {Mon, 09 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iitsi/YuYHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YuYW10, author = {Chunyan Yu and Dongyi Ye and Minghui Wu}, title = {A New Agent Oriented Model for AutoMotive Computing Platform}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {609--613}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.88}, doi = {10.1109/IITSI.2010.88}, timestamp = {Mon, 09 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iitsi/YuYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YuanLDC10, author = {Jingbo Yuan and Haixiao Li and Shunli Ding and Limin Cao}, title = {Intrusion Detection Model Based on Improved Support Vector Machine}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {465--469}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.72}, doi = {10.1109/IITSI.2010.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YuanLDC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/YuanZD10, author = {Jingbo Yuan and Jisen Zheng and Shunli Ding}, title = {An Improved Pattern Matching Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {599--603}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.73}, doi = {10.1109/IITSI.2010.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/YuanZD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZengLZCJ10, author = {Xiao{-}hui Zeng and Wen{-}lang Luo and Jin{-}tao Zeng and Yan{-}ping Chen and Shi{-}yao Jin}, title = {Research on a High Efficient Intrusion Prevention Model}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {720--723}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.132}, doi = {10.1109/IITSI.2010.132}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZengLZCJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZengLZL10, author = {Jintao Zeng and Jinzhong Li and Xiaohui Zeng and Wenlang Luo}, title = {A Prototype System of Software Reliability Prediction and Estimation}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {558--561}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.90}, doi = {10.1109/IITSI.2010.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZengLZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhaiC10, author = {Lili Zhai and Fuguo Chang}, title = {Negotiation Problem Processing System of High-Tech Virtual Enterprise}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {498--501}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.103}, doi = {10.1109/IITSI.2010.103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhaiC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Zhang10, author = {Wenjun Zhang}, title = {Integrated Security Framework for Secure Web Services}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {178--183}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.8}, doi = {10.1109/IITSI.2010.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Zhang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Zhang10a, author = {Bin Zhang}, title = {Research on the Directional Interferences Canceling}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {549--552}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.96}, doi = {10.1109/IITSI.2010.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Zhang10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhangC10, author = {Bing Zhang and Li Chen}, title = {An Improved Key Management of ZigBee Protocol}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {416--418}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.129}, doi = {10.1109/IITSI.2010.129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhangCX10, author = {Yilian Zhang and Zhide Chen and Li Xu}, title = {How to Construct a Divisible Online/Offline Signature}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {562--566}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.177}, doi = {10.1109/IITSI.2010.177}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhangCX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhangGY10, author = {Yang Zhang and Liqun Gao and Shufan Ye}, title = {A New Method for Tracing by Using Corner Detecting and k-Nearest Neighbor}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {337--340}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.34}, doi = {10.1109/IITSI.2010.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhangGY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhangL10, author = {Yan Zhang and Ying Lin}, title = {Research on the Key Technology of Secure Computer Forensics}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {649--652}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.134}, doi = {10.1109/IITSI.2010.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhangL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhangL10a, author = {Yuchuan Zhang and Yuzhao Liu}, title = {A Collaborative Filtering Algorithm Based on Time Period Partition}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {777--780}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.161}, doi = {10.1109/IITSI.2010.161}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhangL10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhangM10, author = {Meiyu Zhang and Jinghua Mei}, title = {The Design and Implementation of Electronic Farm System Based on Google Maps}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {236--240}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.51}, doi = {10.1109/IITSI.2010.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhangM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhangZWD10, author = {Ping Zhang and Yan Zhang and Zhengjiang Wu and Weifeng Du}, title = {{IIS} Security Mechanisms}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {619--622}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.179}, doi = {10.1109/IITSI.2010.179}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhangZWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhouM10, author = {Changcheng Zhou and Jie Meng}, title = {Modeling and Simulation of Double-tube Hydraulic Damper External Characteristic}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {713--719}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.128}, doi = {10.1109/IITSI.2010.128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhouM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhouTZPL10, author = {Xuyan Zhou and Bing Tan and Bing Zhu and Xuange Peng and Xuemou Liu}, title = {On the Way to Design an Optical Camera Lens for River Sediment in Underwater Imaging}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {48--53}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.156}, doi = {10.1109/IITSI.2010.156}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhouTZPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhouXXW10, author = {Wan Zhou and Zhang Xuehua and Xiong Xin and Jiande Wu}, title = {The Application Research of Wireless Sensor Network in the Prison Monitoring System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {58--62}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.160}, doi = {10.1109/IITSI.2010.160}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhouXXW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhouYH10, author = {Dengfeng Zhou and Shuisheng Ye and Shaohua Hu}, title = {Research on Application of Region-of-Interest in Face Detection}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {192--194}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.61}, doi = {10.1109/IITSI.2010.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhouYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhouZ10, author = {Yin Zhou and Wei Zhu}, title = {A Multi-mode {P2P} Live Media Broadcasting Middleware}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {585--590}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.178}, doi = {10.1109/IITSI.2010.178}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhouZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhouZFCY10, author = {Rong Zhou and Chunyue Zhao and Lili Fu and Ao Chen and Meiqian Ye}, title = {ZigBee-based Vehicle Access Control System}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {232--235}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.50}, doi = {10.1109/IITSI.2010.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhouZFCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/Zhu10, author = {Huafei Zhu}, title = {Towards a Theory of Cloud Computing in the Protocol-Composition Framework}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {758--762}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.142}, doi = {10.1109/IITSI.2010.142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/Zhu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhuHZZ10, author = {Weixing Zhu and Dajun Hou and Jin Zhang and Jian Zhang}, title = {Optimization of a Subset of Apple Features Based on Modified Particle Swarm Algorithm}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {427--430}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.23}, doi = {10.1109/IITSI.2010.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhuHZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhuMW10, author = {Weixing Zhu and Yong Ma and Rixia Wang}, title = {An Adaptive Fast Algorithm for Coding Block Mode Selection}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {402--406}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.29}, doi = {10.1109/IITSI.2010.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhuMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhuZL10, author = {Weixing Zhu and Fangkui Zhong and Xiangping Li}, title = {Automated Monitoring System of Pig Behavior Based on {RFID} and {ARM-LINUX}}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {431--434}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.32}, doi = {10.1109/IITSI.2010.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhuZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/ZhuZTPL10, author = {Bing Zhu and Xuyan Zhou and Bin Tan and Xuange Peng and Xuemou Liu}, title = {A Study of Image-Based Algorithms of River Sediment Measurement}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {195--201}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.155}, doi = {10.1109/IITSI.2010.155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/ZhuZTPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iitsi/2010, title = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5453385/proceeding}, isbn = {978-0-7695-4020-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iitsi/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.