


default search action
8th SNPD 2007: Qingdao, China
- Wenying Feng, Feng Gao:

Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China. IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 3
- Xuerong Gong, Linsheng Lu, Rongcai Zhao:

Communication Optimization Algorithms based on Extend Data Flow Graph. 3-8 - Guoteng Pan, Qiang Dou, Lunguo Xie:

Study on distributing pattern of shared data in CC-NUMA system. 9-14 - Huafeng Deng, Yunsheng Liu, Yingyuan Xiao:

A Novel Algorithm for Load Balancing in Distributed Systems. 15-19 - Ke Shi

:
A Replication and Cache based Distributed Metadata Management System for Data Grid. 20-25 - Lifeng Qi, Hexin Chen, Yan Zhao:

New Synchronization Scheme Between Audio and Video. 26-29 - Wei Tian, Yizheng Qiao, Zhiqiang Ma:

A New Scheme for Off-line Signature Verification Using DWT and Fuzzy Net. 30-35 - Yun Liu, Xiangguang Zhang, Chuanxu Wang:

A New Kind of Hybrid Filter Based on the Peak-and-Valley Filter and PCNN. 36-39 - Lijie Zhang, Haili Yin, Hui Liu:

Slices Mining Based on Singular Value. 40-43 - Jingsong He, Jian Tan, Qiansheng Fang:

Parzen Windows Estimation Using Laplace Kernel: A Novel Parametric Analysis with Information Content. 44-49 - Wen Zhou, Zongtian Liu, Yan Zhao:

Concept Hierarchies Generation for Classification using Fuzzy Formal Concept Analysis. 50-55 - Yue Hou, Jinyun Pu:

The Intelligent Damage Assessment and Intelligent Reconfiguration System of Ship Diesel System. 56-61 - J. G. Yin, Mingjiu Gai, G. Zhou, X. H. Hou:

Periodic solution for a class of higher-dimension impulsive functional differential equations with parameter. 62-66 - Weiming Wang, Zhenbing Zeng, Lu Yang:

A new mechanical algorithm for solving system of Volterra integral equation. 67-72 - Chao Zhang, Lianghong Zhang:

Classification for a class of second order singular equations on time scales. 73-76 - Shijie Dong, Zhifeng Gao, Yunhai Wang:

Positive Solutions for Quasilinear Second Order Differential Equation. 77-80 - Bo Deng, Yajun Du:

Research on Matching between User Queries and Web Pages Based on BAM. 81-85 - Yan Chen, Benoit Boulet, Ping Chen, Mingbo Zhao:

Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force Transducers. 86-91 - Yijiang Chen, Xiaodong Shi, Changle Zhou, Chang Su:

Automatic Keyphrase Extraction from Chinese Books. 92-97 - Ping Chen, Mingbo Zhao, Shaoqing Jia:

The Application of Fuzzy Neural Network in the Iatrical Monitor. 98-103 - Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang:

Using Trust Metric to Detect Malicious Behaviors in WSNs. 104-108 - Bing Liu, Ke Yu, Lin Zhang, Huimin Zhang:

MAC Performance and Improvement in Mobile Wireless Sensor Networks. 109-114 - Fang Wang, Guifa Teng, Lisheng Ren:

The Upper Bound of The Number of Nodes On Fixed Energy Budget in Wireless Sensor Networks. 115-118 - Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao:

Agent-based Trust Model in Wireless Sensor Networks. 119-124 - Shujuan Ji, Yongquan Liang, Xingpeng Xiao, Jixue Li, Qijia Tian:

An Attitude-adaptation Negotiation Strategy in Electronic Market Environments. 125-130 - Feixiang Zhu, Yingjun Zhang, Wenhai Sang:

Web Marine Spatial Information Service Based on Electronic Nautical Charts. 131-136 - Xin Jin, Jing Xu, XueMeng Li:

The Design and Implementation of XML-based Workflow Engine. 137-142 - Nimmy Ravindran, Yao Liang:

HIDE - A Web-based Hydrological Integrated Data Environment. 143-148 - Guilin Li, Jianzhong Li:

An Energy Efficient Query Procesing Algorithm Based on Relevant Node Selection for Wireless Sensor Networks. 149-154 - Liming He:

Delay-Minimum Energy-Aware Routing Protocol (DERP) for Wireless Sensor Networks. 155-160 - Liming He:

Energy-Efficient Multi-Path Routing with Short Latency and Low Overhead for Wireless Sensor Networks. 161-167 - Yingchang Xiang, Dechang Chen, Xiuzhen Cheng, Kai Xing, Min Song:

Localized Flooding Backbone Construction for Location Privacy in Sensor Networks. 167-171 - Ligang Dong, Bin Zhuge, Weiming Wang:

Research on Logical Function Blocks in ForCES-Based Routers. 172-177 - Huaxi Gu, Kun Wang, Chu Ke, Changshan Wang, Guochang Kang:

A New Inner Congestion Control Mechanism in Terabit Routers. 178-181 - Tao Li, Xiaoming Zhang, Zhi-gang Sun:

DynaNP - A Coarse-grain Dataflow Network Processor Architecture with Dynamic Configurable Processing Path. 182-187 - Zheng Gong, Yu Long, Xuan Hong, Kefei Chen:

Two Certificateless Aggregate Signatures From Bilinear Maps. 188-193 - Jia Yu, Fanyu Kong, Rong Hao:

Publicly Verifiable Secret Sharing with Enrollment Ability. 194-199 - Chengyu Hu, Daxing Li:

Forward-Secure Traceable Ring Signature. 200-204 - Xiaoming Hu, Shangteng Huang:

An Efficient ID-Based Restrictive Partially Blind Signature Scheme. 205-209 - Junqing Yang, Min Zhou, Quanyi Lv, Hongchan Zheng:

Geometric Design of Developable Bezier and B-spline Parametric Surfaces. 210-215 - Junqing Yang, Min Zhou, Xiaohong An, Lining Zhang:

Offset Approximation Algorithm for Subdivision Surfaces. 216-221 - Guili Yuan, Ji-zhen Liu, Wen Tan

, Xiangjie Liu:
The Research and Application of Fuzzy Immune PID Control in the Load Control System of Tube Mill. 222-226 - Jixin Ma:

State-based Time-Series Analysis and Prediction. 227-232 - Lizhen Wang, Ao Yang, Hong Zhang:

Data Mining Prediction of Shovel Cable Service Lifespan. 233-238 - Xu E, Shaocheng Tong, Liangshan Shao, Baiqing Ye:

Rough Set Approach for Processing Information Table. 239-243 - Jianhua Wu, Qinbao Song, Junyi Shen:

An Novel Association Rule Mining Based Missing Nominal Data Imputation Method. 244-249 - Kuixiang Gou, Xiujun Gong, Zheng Zhao:

Learning Bayesian Network structure from distributed homogeneous data. 250-254 - Xiangguang Zhang, Yun Liu, Chuanxu Wang:

Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring Element. 255-258 - Jun Zhang, Jun Liu:

Image Segmentation with Multi-Scale GVF Snake Model Based on B-Spline Wavelet. 259-263 - Lihua Fu, Hongwei Li, Meng Zhang, Yuantong Shen:

Group Delay Based Approach for Frequency Estimation in Complex Noises. 264-268 - Shengli Shi, Zhong Qin, Jianmin Xu:

Robust Algorithm of Vehicle Classification Application. 269-272 - Rupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li:

Key-Insulated Group Signature Scheme with Verifier-Local Revocation. 273-278 - Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:

Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. 279-284 - Rongbo Lu, Dake He, Changji Wang:

Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings. 285-290 - Xiaoming Hu, Shangteng Huang:

An Efficient ID-Based Partially Blind Signature Scheme. 291-296 - Junli Lu, Lizhen Wang, Yaobo Li:

A Fuzzy Clustering Method Based on Domain Knowledge. 297-302 - Yijun Bei, Gang Chen, Lihua Yu, Feng Shao, Jinxiang Dong:

XML Query Recommendation Based On Association Rules. 303-308 - Ziqiang Wang, Qingzhou Zhang, Dexian Zhang:

An IA-Based Classification Rule Mining Algorithm. 309-313 - Jing Liu, Fei Fu, Junmo Xiao, Yang Lu:

Secure Routing for Mobile Ad Hoc Networks. 314-318 - Hailun Xia, Zhimin Zeng, Wei Ding:

Adaptive Backoff Algorithm based on Network Congestion in Multi-hop Wireless Ad hoc Networks. 319-324 - Jingjing Wang, Mingbo Zhao:

Scatternet Formation Algorithm in Multi-hop Environment based on Bionics. 325-330 - Yuhua Liu, Hao Huang, Kaihua Xu:

Multi-path-based Distributed TCP Caching for Wireless Sensor Networks. 331-335 - Dongbo Zhang, Yaonan Wang, Huixian Huang:

Rough Neural Network Modeling Through Supervised G-K Fuzzy Clustering. 336-341 - Keliang Jia, Kang Chen, Xiaozhong Fan, Yu Zhang:

Chinese Question Classification Based on Ensemble Learning. 342-347 - Xiao Yang, Jiancheng Wan, Fang Tan:

A Parsing Model Based on Ordered Tree Inclusion Matching. 348-353 - Ziping Zhao, Yaoting Zhu:

Study on Prediction of Prosodic Phrase Boundaries in Chinese TTS. 354-358 - Burim Sirisanyalak, Ohm Sornil:

Artificial Immunity-Based Feature Extraction for Spam Detection. 359-364 - Shu Gao, Dingfang Chen:

Semantic Approach to Visualization Service Discovery. 365-370 - Xiangang Zhao, Liutong Xu, Bai Wang:

A Resource Allocation Model with Cost-Performance Ratio in Data Grid. 371-376 - Zhitao Guan, Yuanda Cao, Muhammad Hanif Durad, Liehuang Zhu:

An Efficient Hybrid P2P Incentive Scheme. 377-382 - Yingkun Hou

, Xiangcai Zhu, Zhu Lili, Mingxia Liu:
Image with Less Information Watermarking Algorithm Based on DWT. 383-387 - Meihua Wang, Kefeng Fan, Bin Yue, Xiaojun Yu:

A Content Protection Scheme for H.264-based Video Sequence. 388-393 - Hui Gao, Shanguang Chen, Guangchuan Su:

Emotion classification of mandarin speech based on TEO nonlinear features. 394-398 - Zhi Liu, Yun Zhang:

Stochastic Network Fluid Modeling with Probabilistic Wavelet System. 399-403 - Zongyuan Deng, Xi Shao, Zhen Yang:

A Novel Approach to Detect the Presence of LSB Steganographic Messages. 404-408 - Zhenfeng Gao, Yunhai Wang, Yanping Guo:

Multiple Positive Solutions for Second Order m-Point Boundary Value Problems. 409-412 - Weihua Jiang, Xiuming Li, Bin Wang:

LATEX The existence of positive solutions for multi-point BVPs with dependence on the first order derivative. 413-416 - Jiqing Qiu, Hongjiu Yang, Jinhui Zhang:

Optimal Guaranteed Cost Control for a Class of Uncertain Systems with both State and Input Delays via Delta Operator Approach. 417-422 - Lianqing Su, Zhifeng Gao, Jiqing Qiu, Peng Shi:

Robust Stability of Uncertain Cellular Neural Networks with Time-Varying Delays. 423-426 - Limei Zhou, Liwei Zhang:

A Log-Sigmoid lagrangisn neutral network for solving nonlinear programming. 427-431 - Shujuan Ji, Qijia Tian, Yongquan Liang, Hongmei Yang:

An Ontology Framework for EC Automated Negotiation Protocol. 432-437 - Hongxia Jin, Jianna Zhao, Xiaoxuan Chen:

The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects. 438-443 - Fang Jin, Peide Liu, Xin Zhang:

The Evaluation Study of Knowledge Management Performance Based on Grey-AHP Method. 444-449 - Peide Liu:

Evaluation Model of Customer Satisfaction of B2C E-Commerce Based on Combination of Linguistic Variables and Fuzzy Triangular Numbers. 450-454 - Xuesen Ma, Jianghong Han, Zhenchun Wei, Yuefei Wang:

an Improved Adaptive Genetic Algorithm in Optimization of Partner Selection. 455-460 - Chengming Qi:

An Ant Colony System Hybridized with Randomized Algorithm for TSP. 461-465 - Jian Tang, Jingsong He, Lu Huang:

A New Optimization Engine for the LSF Vector Quantization. 466-471 - Duc Thanh Nguyen:

Solving Timetabling Problem Using Genetic and Heuristic Algorithms. 472-477 - Hongjiang Wang, Fei Ji, Shengming Jiang, Liying Huang, Gang Wei:

stability analysis of timing acquisition methods with multi-hypothesis in indoor UWB multipath and MAI channel. 478-483 - Jingyi Wang, Zhiyu Zhou, Jian Wu:

An Innovative Restoration Algorithm with Prioritized Preemption Enabled. 484-489 - Fei Nie, Zengzhi Li:

Congestion Control Model Based on Hop-by-hop Feedback for Active Networks. 490-494 - Lin Huang, Yulin Zhang, Yonghong Ren:

Two multi-constrained multicast QoS routing algorithm. 495-500 - Fengqin Zhang:

Anti-periodic boundary value problem for impulsive differential equations with delay. 501-504 - Zhen Jin

, Mainul Haque
:
The SIS epidemic model with impulsive effects. 505-507 - Chun Ma, Fengqin Zhang, Zhen Jin

:
Global Stability of a tuberculosis model with vertical transsmission. 508-511 - Jietao Zou, Jianguo Zhang, Xiaoyou Han, Hongxia Zhu:

Oscillations of a class of second-order nonlinear delay differential equations with variable sign coefficients. 512-516 - Jing Qiu, Lejian Liao:

Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking. 517-521 - Jing Qiu, Xiaofeng Liao, Ping Wang:

A method to construct dynamic S-box based on chaotic map. 522-525 - Jiancheng Ni, Zhishu Li, Zhonghe Gao, Jirong Sun:

Threats Analysis and Prevention for Grid and Web Service Security. 526-531 - Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent:

A Framework for Revocation of Proxy Certificates in a Grid. 532-537 - Xudong Lu, Jiancheng Wan:

User Interface Design Model. 538-543 - Liyan Yuan, Meng Xue:

Xregion: A structure-based approach to Storing XML Data in Relational Databases. 544-551 - Yanping Guo, Wei Xiang, Xiujun Liu:

The existence of periodic solutions for a class impulsive differential equations. 552-555 - Hyungchoul Kim, Sungwon Kang, Jongmoon Baik, In-Young Ko:

Test Cases Generation from UML Activity Diagrams. 556-561 - Bin Wang, Silian Sui, Hongliang Zhao:

Nash Equilibrium stability of rent-sinking competition and its game analysis. 562-566 - Binbin Du, Guang Zhang:

Classification and Existence of Non-oscillatory Solutions for Two-Dimensional Neutral Difference System. 567-572 - Shuang Li, Hailun He

, Jinbao Song:
An Optimized Breaking Index for the Boussinesq-Type Numerical Model. 573-577 - Hailun He

, Shuang Li, Jinbao Song:
Validity Test of the Eigenfunction Expansion Method in the Transient Wave Propagation Simulation. 578-581 - Conghua Zhou, Shiguang Ju:

SAT-based Bounded Model Checking for SE-LTL. 582-587 - Yong Liu, Ai-guang Yang:

Research and Application of Software-reuse. 588-593 - Yunmei Du, Shixian Li:

The differences of COTS-based project stakeholders. 594-598 - Ming Zhong, Yaoxue Zhang, Pengwei Tian, Cunhao Fang, Yuezhi Zhou:

A Unified-Index Based Distributed Specification for Heterogeneous Components Management. 599-604 - Shihong Feng, Jiancheng Wan:

Multi-device User Interface Development with Composition-oriented User Interface Design Patterns. 605-610 - Guangdong Huang, Ping Ling, Qun Wang:

A hybrid metaheuristic ACO-GA with an Application in Sports Competition Scheduling. 611-616 - Xianmei Zhao, Haoyin Li, Jin Zhang:

GA in Optimized Control of Central Air-conditioning System Based on ANN Simulation. 617-622 - Pei He, Lishan Kang, Qiongzhang Li:

Model for Parallel Verification of Programs. 623-628 - Mikhail Chalabine, Christoph W. Keßler:

A Survey of Reasoning in Parallelization. 629-634 - Yong Li

:
Non-interactive Designated Confirmer Signature with Specific Verifier. 635-640 - Ling Dong, Kefei Chen, Mi Wen, Yanfei Zheng:

Protocol Engineering Principles for Cryptographic Protocols Design. 641-646 - Yong Yu, Bo Yang, Ying Sun:

A provably secure ID-based mediated signcryption scheme. 647-652 - T. Srinivasan, N. Vidyapriyadarshini, Smrithika Appaiah:

A Business Modeled Approach for Trust Management in P2P Networks. 653-658 - Ziqiang Wang, Qingzhou Zhang, Dexian Zhang:

A PSO-Based Web Document Classification Algorithm. 659-664 - Zhenguo Chen:

Data Mining based on Clonal Selection Wavelet Network. 665-669 - Jiarong Cai, Yubao Liu, Jian Yin:

An Improved Semantic Smoothing Model for Model-Based Document Clustering. 670-675 - Wei-Dong Cai, Zhangyan Xu, Wei Song

, Bingru Yang:
A Quick Algorithm for Computing Core Based on the Positive Region. 676-681 - Shuyun Wang, Hexiang Xu, Yunfa Hu:

Finding Frequent Items in Data Streams using ESBF. 682-687 - Xizheng Zhang:

Survivable and Efficient Clustered Keying In Wiresless Sensor Networks. 688-693 - Nayat Sánchez-Pi

, Virginia Fuentes, Javier Carbó, José Manuel Molina:
Knowledge-based system to define context in commercial applications. 694-699 - Patrick Maeder, Ilka Philippow, Matthias Riebisch:

A Traceability Link Model for the Unified Process. 700-705 - Dan Wu, Libin Wu:

Hierarchical Junction Trees as the Secondary Structure for Inference in Bayesian Networks. 706-712 - Xia Wang, Hongmei Tang, Xiaoqun Zhao:

Noisy Speech Recognition Based on Speech Enhancement. 713-716 - Debin Pang, Ning Zhang:

Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System. 717-721 - Hongmei Yang, Yongquan Liang, Lianshan Liu, Haibin Sun:

HVS-based imperceptibility measure of watermark in watermarked color image. 722-727 - Ying Yang, Jing Sheng, Wei Zhou:

Detecting Arithmetic of Passenger's Location Based on Image Processing. 728-731 - Jinshu Han:

Speeding up Fractal Image Compression Based on Local Extreme Points. 732-737 - Aiqing Wang, Sen Zhang:

A Combining Approach for Chinese Word Segmentation. 738-743 - Haroon-Ur-Rashid Khan, Shi Feng:

Performance Evaluation of TriBA - A Novel Scalable Architecture. 744-749 - Hao Fu, Ming Cai, Liu Fang, Peng Liu, Jinxiang Dong:

Research on RTOS-Integrated TMR for Fault Tolerant Systems. 750-755 - Feng Shao, Gang Chen, Lihua Yu, Yijun Bei, Jinxiang Dong:

Bitmap Filtering: An Efficient Speedup Method for XML Structural Matching. 756-761 - Chunyong Yin, Jianshi Li, Ruxia Sun:

A Modified Model for Private Data Security Facing E-commerce. 762-765 - Xuejuan Huang, Xinmeng Chen, Jiazhen Xu, Hua Li, Jinshuo Liu:

Approach toward a flexible semantic E-business in Web Service Community. 766-771 - Changjun Hu, Xiaoming Zhang, Qian Zhao, Chongchong Zhao:

Ontology-Based Semantic Integration Method for Domain-Specific Scientific Data. 772-777 - Yuanfan Zhang, Laurence Capus, Nicole Tourigny:

A Learner Model for Learning-by-Example Context. 778-785 - Zhong Xie, Zi Ye, Liang Wu:

Research on Building Polygon Map Generalization Algorithm. 786-791 - Yuan Chen, Shengsheng Yu, Jingli Zhou, Jun Fan:

Video Transmission over Ad Hoc Networks Using Multiple Description Coding and Clustering-based Multiple Paths. 792-797 - Lei Zhang, Jun Ma, Xinshun Xu, Bo Yuan:

Rotation Invariant Image Classification based on MPEG-7 Homogeneous Texture Descriptor. 798-803 - Junhai Luo, Mingyu Fang, Danxia Ye:

Research on Topology Discovery for IPv6 Network. 804-809 - Jianyun Ni, Jing Luo:

Design of Multimedia Conference Control System based on SIP. 810-814 - Bo Xu, Zhenbao Zhang, Jiazhen Wang, Xiaoqin Liu:

Improved BSS Based Schemes for Active Steganalysis. 815-818 - Jinglei Zhang, Zhengguang Liu:

A Vision-Based Road Surveillance System Using Improved Background Subtraction and Region Growing Approach. 819-822 - Shifeng Ou, Xiaohui Zhao, Ying Gao:

Variable Step Size Technique for Adaptive Blind Decorrelation. 823-826 - Shifeng Ou, Xiaohui Zhao, Ying Gao:

Speech Enhancement Employing Modified a Priori SNR Estimation. 827-831 - Hui Li, Xin Wang, Beiqian Dai, Wei Lu:

A Kalman Smoothing Algorithm for Speech Enhancement Based on the Properties of Vocal Tract Varying Slowly. 832-836 - Lihua Ai, Siwei Luo:

Job-attention Replica Replacement Strategy. 837-840 - Ai Wu, Lianhai Yuan, Xinsong Liu, Kejian Liu:

A P2P Architecture for Large-scale VoD Service. 841-846 - Yadong Gong, Xiaola Lin:

Exploiting Heterogeneity of Nodes to Enhance Search Performance in Large-Scale Peer-to-Peer Network. 847-852 - Xizheng Zhang:

Building personalized recommendation system in E-Commerce using association rule-based mining and classification. 853-857 - Jia Xu:

A software architecture for real-time embedded systems based on pre-run-time scheduling. 858-863 - Zhang Sen, Yao Zheng:

The relation of CMM and software lifecycle model. 864-869 - Dapeng Liu, Shaochun Xu:

New Software Quality Metrics for Object-Oriented Programs. 870-875 - Fei Yang, Baolin Yin:

Address Fragment-Compact Garbage Collection Algorithm. 876-881 - Xuede Zhan:

A Formal Testing Framework for UML Statecharts. 882-887 - Yan Wang, Baoxiang Cao:

Fuzzy Many-Valued Context Analysis Based on Formal Description. 888-892 - Yuxia Lei, Yan Wang, Baoxiang Cao:

Knowledge Interconnection Based on Binary Semantic Relation Analysis. 893-898 - Tu Xu, Dake He, Yu Luo:

A New Orientation for Multi-Class SVM. 899-904 - Jun Qu, Qingshan Jiang, Fangfei Weng, Zhiling Hong:

A Hierarchical Clustering Based on Overlap Similarity Measure. 905-910 - Sirui Yang, Hai Jin, Xiaofei Liao, Hong Yao:

OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale Networks. 911-916 - Jianhua Sun, Jizha Qin, Shu Chen, Hao Chen, Dingding Li:

A Virus Immunization Model Based on Communities in Large Scale Networks. 917-922 - Fanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li:

Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. 923-926 - Bangju Wang, Huanguo Zhang, Yuhua Wang:

Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). 927-931 - Fasheng Wang, Qingjie Zhao, Hongbin Deng:

A Mixed Fast Particle Filter. 932-936 - Jun Yue, Zhinong Zou, Jinsong Tang, Aiqing Wang:

Experiment of Phase Unwrapping algorithm in Interferometric Synthetic Aperture Sonar. 937-942 - Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang:

A New Data Protecting Scheme Based on TPM. 943-947 - Deyun Yang, Zhengliang Huan:

On the Encryption of Image Decompression with User's Identity. 948-951 - Haihe Shi, Jinyun Xue:

Towards Semi-Automatic Generation of Provably Correct Algorithmic Programs. 952-957 - Xin Lü:

Distributed Secure Information Sharing Model for E-Government in China. 958-962 - Dongli Zhang, Dan Ionescu:

QoS Performance Analysis in Deployment of DiffServ Aware MPLS Traffic Engineering. 963-967 - Wei Zhang, Jingsha He

:
Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks. 968-973 - Ruyan Wang, Dapeng Wu, Fang Guo:

Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic. 974-978 - Jiaxin Qiao:

Research on XML United-Signature Technology and Its Implementation. 979-983 - Jun Yue, Ming Chen, Jinsong Tang:

Experimentation of Interferometric Synthetic Aperture Sonar. 984-988 - Shuguo Yang, Chunxia Li, Sheng-He Sun, Yaoqun Xu:

A Robust 3D Model Watermarking Scheme Based on Feature Recognition. 989-993 - Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang:

Trustable Ad Hoc Networks of Agent Societies. 994-1000 - Fangfei Weng, Qingshan Jiang, Lifei Chen, Zhiling Hong:

Clustering Ensemble based on the K-NN Algorithm. 1001-1006 - Haijun Wang, Shaoliang Wei, Yimin Chen:

An Improved Attribute Reduction Algorithm Based on Rough Set. 1007-1010 - Wen Ye, Hongxu Cui:

Mining of Reuse Patterns in CDMA Network Optimization. 1011-1016 - Liuling Dai, Bing Huang, Dongxiao Yang:

A Connection Degree-Based Rough Set Model and its Application to Knowledge Reduction. 1017-1021 - Frederic D. McKenzie, Herbie H. Piland III, Min Song:

Incorporating a PMF-Based Injury Model into a Multi-Agent Representation of Crowd Behavior. 1022-1027 - Qi Wang, Xiaosu Xu:

SINS/GPS Integrated Navigation for AUV with RBF-Neural Network. 1028-1033 - Wei Liang, Haibin Yu, Chang Che:

An Adaptive Probability Access Mechanism for Wireless Sensor Network. 1040-1045 - Dayin Promkotwong, Ohm Sornil:

A Mesh-Based QoS Aware Multicast Routing Protocol. 1046-1051 - Xijun Zhu, Zhimin Li, Yueming Dai:

An Improved Estimation Algorithm for User Vertical Protection Level. 1052-1055 - Chunhai Kou, Xiuyun Zhang:

Solutions of fractional differential equations with constant coefficients. 1056-1059 - Jinjun Zhao, Yang Xu:

Numerical Stability of Delay Integro-Differential Equations under Resolvent Conditions. 1060-1063 - Tingming Wang, Aiqing Wang:

Matrix Method for Principal Normal Form of Propositional Formula. 1064-1067 - Peng Wang, Baowei Song, Yonghu Wang, Lichuan Zhang:

Application of Concurrent Subspace Design to Shape Design of Automatic Underwater Vehicle. 1068-1071 - Guoyong Cai

, Ji Gao, Yong Huang:
Modeling electronic institutions with extended colored Petri net. 1072-1077 - Shuaiqiang Wang

, Jiancheng Wan, Jinkui Hou:
OR-ATP: An Operation Refinement Approach As a Process of Automatic Theorem Proving. 1078-1083 - Huiyang Li, Xianghong Sun, Kan Zhang:

Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests. 1084-1088 - Chuanyao Yang, Yuqin Li, Zhenghua Wang, Chenghong Zhang, Yunfa Hu:

A Collaborative Retrieval System-Full Text Base and Database. 1089-1094 - Sungchul Hong, Yeong-Tae Song:

Efficient XML query using Relational Data Model. 1095-1100 - Qingtian Zeng:

Two Symmetrical Decomposition Methods for Structure-complex Petri Net and Their Applications. 1101-1106 - Guangde Wang, Fang Miao, WenJia Zhang, Hongyang Yu:

A Dynamic and Interactive Diagnosing and Testing Method for Development of Digital TV Receiver System. 1107-1112 - Zhi Xiong, Chengcheng Guo:

Documents Distribution Strategy Based on Queuing Model and Chaotic Searching Algorithm in Web Server Cluster. 1113-1118 - Wenhui Ma, Wenbin Fang, Gang Wang, Jing Liu:

Concept Index for Document Retrieval with Peer-to-Peer Network. 1119-1123 - Junyi Li, Jiaguang Sun:

Automated Test Data Generation Algorithm Based On Reversed Binary Tree. 1124-1128 - Xiao Ma, J. Jenny Li, David M. Weiss:

Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation. 1129-1134 - D. Evangelin Geetha, Ch. Ram Mohan Reddy, T. V. Suresh Kumar, K. Rajani Kanth:

Performance Modeling and Evaluation of e-commerce Systems Using UML 2.0. 1135-1140 - Osama Dandash, Phu Dung Le, Bala Srinivasan:

Security Analysis for Internet Banking Models. 1141-1146 - Chuanyao Yang, Yuqin Li, Zhenghua Wang, Chenghong Zhang, Yunfa Hu:

A Yellow Page Information Retrieval System Based on Sorted Duality Interrelevant Successive Tree and Industry Ontology. 1147-1152 - Mingyi Mao, Zhicheng Chen, Qian Mo:

The Architecture of CAR Component Web Service. 1153-1157 - Xingkai Yang, Chengshu Lü, Yanzhang Wang:

Study on the E-Government Information Sources Exchange Based on Directory Service. 1158-1163 - Jayamsakthi Shanmugam, M. Ponnavaikko:

XSS application worms: New Internet infestation and optimized protective measures. 1164-1169 - Li Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang:

Automatic attack plan recognition from intrusion alerts. 1170-1175 - Fengyin Li, Jiguo Yu, Hongwei Ju:

A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem . 1176-1182

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














