Abstract is missing.
- Message from program chairWenai Song, Simon Xu, Lichao Chen. [doi]
- Message from conference chairYan Han, Roger Y. Lee. [doi]
- Some issues regarding operating system securitySihan Qing. 1 [doi]
- The future of e-service valueTokuro Matsuo. 3-4 [doi]
- A public key based PMIPv6 authentication schemeJaeHyu Kim, JooSeok Song. 5-10 [doi]
- Admissible evidence: Trustworthy cooperative spectrum sensing based on Dempster-Shafer theory in cognitive radio networksShuo Feng, Xueqiang Zheng, Ran Liu, Juan Chen, Suqin Xu, Linyuan Zhang. 11-15 [doi]
- Energy Efficient Topology Control for QoS of ad hoc wireless networkHuan Li. 17-22 [doi]
- Research on energy management in data centerSujie He, ChunLin Li. 23-26 [doi]
- Synchronization for QDPSK - Costas loop and Gardner algorithm using FPGAsJie Hua, Lingyun Zhou, Chang Chen, Lin Jiang. 27-31 [doi]
- Improving industrial production process using computer technology: An interdisciplinary curriculumJianqin Zhao, Yeong-Tae Song. 33-37 [doi]
- A contact prediction method for DTNs based on BP artificial neural networkHaiquan Wang, Ying Yang, Yifeng Hu, Zexi Li. 39-44 [doi]
- A research based on adaptive genetic algorithm optimal embattling methodYe-yang Pan, Jin-Jie Yao. 45-48 [doi]
- A scalable and flexible communication protocol in a heterogeneous networkRuiling Gao, C. Hwa Chang. 49-52 [doi]
- An improved autonomous Cross-Layer Optimization framework for wireless multimedia communicationYuping Dong, C. Hwa Chang. 53-58 [doi]
- A block cipher based on Boolean matrices using bit level operationsVidhya Saraswathi P., Venkatesulu M.. 59-63 [doi]
- Parallel botnet detection system by using GPUChe-Lun Hung, Hsiao-Hsi Wang. 65-70 [doi]
- A pruning method of joint 2D digital predistortion model for nonlinearity and I/Q imperfections in concurrent dual-band transmittersLingli Li, Falin Liu, Guang Yang, Haoyu Wang. 71-74 [doi]
- Parameter optimization in reconstruction of multiband signal from periodically non-uniform samplingLi Tong, Xiang Zhang, Peiyang Yu, Lingyun Zhou. 75-78 [doi]
- Delay tolerant network for autonomous robotic vehicle charging and hazard detectionTolga Zeybek, Hwa Chang. 79-85 [doi]
- A low-power register file based on access queues for multi-issue processorsJianqing Xiao, Wei Li, XuBang Shen. 87-92 [doi]
- An effective precision analysis method for word length optimizationRuiyi Sun, Yan Zhang. 93-98 [doi]
- Designing virtual accessing adapter and non-volatile memory management for memory-disk integrated systemSu-Kyung Yoon, Do-Heon Lee, Ashok Sharma, Shin-Dug Kim. 99-104 [doi]
- An intelligent risk detection from driving behavior based on BPNN and Fuzzy Logic combinationArkhom Songkroh, Rerkchai Fooprateepsiri, Woraphon Lilakiatsakun. 105-110 [doi]
- Data labeling for integrity in SCADA systemsYanjun Zuo. 111-118 [doi]
- Automated analysis and evaluation of SEC documentsYing Zheng, Harry Zhou, Zhijiang Chen, Nnanna Ekedebe. 119-124 [doi]
- Query integrity verification based-on MAC chain in cloud storageJun Hong, Tao Wen, Quan Gu, Gang Sheng. 125-129 [doi]
- Temporal join processing with the adaptive Replacement Cache - Temporal Data policyJaime Raigoza, Junping Sun. 131-136 [doi]
- A conceptual architecture with trust consensus to enhance group recommendationsEdson B. Santos Junior, Marcelo G. Manzato, Rudinei Goularte. 137-142 [doi]
- A neighbor selection method based on network community detection for collaborative filteringLin Guo, Qinke Peng. 143-148 [doi]
- An Automatic English Composition scoring model based on neural network algorithmYa Zhou, Taosong Fan, Guimin Huang. 149-152 [doi]
- An opinion detection algorithm based on online posts' relationSun Zhi, Peng Qinke. 153-156 [doi]
- Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail serviceHadj Ahmed Bouarara, Amine Rahmani, Reda Mohamed Hamou, Abdelmalek Amine. 157-162 [doi]
- Chinese tag analysis for foreign movie contentsXiao Lin, Eisuke Ito, Sachio Hirokawa. 163-166 [doi]
- Web navigation pattern with automatic reconfiguration of serversCaroline Raju. 167-170 [doi]
- Exploiting limited data for parsingDongchen Li, Xiantao Zhang, Xihong Wu. 171-175 [doi]
- An adaptive median filter using local texture information in imagesYuning Xie, Zhu Zhu, Xiaoguo Zhang, Qing Wang. 177-180 [doi]
- Distributed detection on holes of component based on multi-view projectionZhiqiang Wang, Jinxiao Pan, Bin Liu, Ping Chen. 181-184 [doi]
- Infrared face recognition based on local binary patterns and Kruskal-Wallis testZhengzi Wang, Zhihua Xie. 185-188 [doi]
- Rice paper classification study based on signal processing and statistical methods in image texture analysisHaotian Zhai, Hongbin Huang, Shaoyan He, Weiping Liu. 189-194 [doi]
- The progressive target search mechanism of visual sceneJiang Wu, Yan Yang, Fan Wang, Xiaopeng Hu. 195-199 [doi]
- Automatically generating abstract paintings in Malevich StyleWenyuan Tao, Yaxuan Liu, Kang Zhang. 201-205 [doi]
- Design of the linear gradient of DC high voltage power supply based on X-ray machineKang Zhao, Ping Chen. 207-210 [doi]
- Multimodal hybrid face recognition based on score level fusion using Relevance Vector MachineTaher Khadhraoui, Faouzi Benzarti, Hamid Amiri. 211-215 [doi]
- A randomized window-scanning RSA scheme resistant to power analysisYezhen Liang, Guoqiang Bai. 217-221 [doi]
- Search queries based sales forecasting on TaobaoShuaipeng Li, Geng Peng, Jiyuan Wang. 223-228 [doi]
- ICT Integrated Social Media Framework for consumer awareness in society using ICT toolsSachin Kumar, Saibal K. Pal. 229-233 [doi]
- A virtual data center deployment model based on the green cloud computingLijun Xu, ChunLin Li, Layuan Li, Yanpei Liu, Zhiyong Yang, Yunchang Liu. 235-240 [doi]
- An evolutionary algorithm with double strategy for global optimization problemsJianqin Liu, Ning Li, Yang Zhao. 241-244 [doi]
- DBN structure learning based on MI-BPSO algorithmGuoliang Li, Xiaoguang Gao, Ruohai Di. 245-250 [doi]
- EM algorithm for reconstructing overpressure field of underwater explosion induced shock waveMiaomiao Bai, Yali Guo, Liming Wang. 251-256 [doi]
- Intrusion detection based on neural networks and Artificial Bee Colony algorithmQuan Qian, Jing Cai, Rui Zhang. 257-262 [doi]
- Profit-driven resource scheduling for virtualized cloud systemsShiyang Ye, Tao Wang, Wenbo Zhang, Hua Zhong. 263-268 [doi]
- User-centered, device-aware multimedia content adaptation for mobile webDongsong Zhang, Anil Jangam, Lina Zhou, Isil Yakut. 275-280 [doi]
- A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc NetworksDongxu Jin, JooSeok Song. 281-286 [doi]
- Cloud based mobile application testingLogeshwaran Murugesan, Prakash Balasubramanian. 287-289 [doi]
- Color adaptation for improving mobile web accessibilityLina Zhou, Vikas Bensal, Dongsong Zhang. 291-296 [doi]
- A virtual machine based task scheduling approach to improving data locality for virtualized HadoopRuiqi Sun, Jie Yang, Zhan Gao, Zhiqiang He. 297-302 [doi]
- An introduction of Multiple P-adic Data Type and its parallel implementationChao Lu, Xinkai Li. 303-308 [doi]
- Distributed video transcoding based on MapReduceChenwei Song, Wenfeng Shen, Lianqiang Sun, Zhou Lei, Weimin Xu. 309-314 [doi]
- Dynamic data rebalancing in HadoopAshwin Kumar T. K, Jongyeop Kim, K. M. George, Nohpill Park. 315-320 [doi]
- GPU-in-Hadoop: Enabling MapReduce across distributed heterogeneous platformsJie Zhu, Juanjuan Li, Erikson Hardesty, Hai Jiang, Kuan-Ching Li. 321-326 [doi]
- Parallel dynamic programming based on stage ReConstruction and its application in reservoir operationHuitao Zheng, Kai Duan, Yadong Mei, Yuru Lin. 327-336 [doi]
- Dependency aware ahead of time static scheduler for multicoreSudhakar Sah, Vinay G. Vaidya. 337-342 [doi]
- Automatic generation of package diagram to understand Java packagesLi Jiang, Xiaobing Sun, Yun Li, Xiangyue Liu. 343-348 [doi]
- PFN: A novel program feature network for program comprehensionXiangyue Liu, Xiaobing Sun, Bin Li, Junwu Zhu. 349-354 [doi]
- Supporting program comprehension with program summarizationYu Liu, Xiaobing Sun, Xiangyue Liu, Yun Li. 363-368 [doi]
- Game theory semantics for PCTL model checking label-extended probabilistic Petri netYang Liu. 369-374 [doi]
- Research on generation of testing data in hybrid method of model checking and testingHuiqun Zhao, Lei Li. 375-378 [doi]
- Testing system for CAN bus-oriented embedded softwareShunkun Yang, Dongxiao Tang, Xiaohua Shi. 379-384 [doi]
- The research of subscription method of the TransactionEvent data for EPCIS based on Web ServiceHuiqun Zhao, Xiaohui Du. 385-388 [doi]
- The research of underground vibration signal detection and processing system based on LabWindows/CVIPeizhen Liu, Hupei Xia, Jinjie Yao. 389-394 [doi]
- A modification on the Chord finger table for improving search efficiencyLei Shi, Jing Zhou, Qi Huang, Wei Yan. 395-398 [doi]
- Grey discrete parameters model and its applicationYing-Jian Qi, Zhengpeng Wu, Ying Li, Jing Yu. 399-404 [doi]
- Online music integration system based on cloud computingXiuxia Chen, Wenqian Shang, Minyong Shi, Ying Li. 405-408 [doi]
- Simulation of a Semantic Web data sharing system based on NS-3Qi Huang, Jing Zhou, Lei Shi, Wei Yan. 409-414 [doi]
- The optimization of weights in weighted hybrid recommendation algorithmWenfu Lin, Ying Li, Shuang Feng, Yongbin Wang. 415-418 [doi]
- The Smart grid scheduling based on contract net protocol with trust modelXiang Zhao, Guangyu Hu, Zhigong Wu. 419-424 [doi]
- Improving Empirical Mode Decomposition based on up-samplingJialing Mo, Weiping Hu, Shasha Le. 425-428 [doi]
- Joint speech/audio coding based scalable perceptual audio codingLi Gao, Ruimin Hu, Yuhong Yang. 429-434 [doi]
- Noise robust tamil speech word recognition system by means of PAC features with ANFISS. Rojathai, M. Venkatesulu. 435-440 [doi]
- Using O-D estimation in dynamic road network traffic flow simulationLiuqing Yang, Gang Zong, Yinghua Liu. 441-447 [doi]
- Comparative analysis to validate benefits of formal and informal software model transformationsEmanuel S. Grant, Kaden K. Daley. 449-454 [doi]
- A design of mosaic line-scan camera based on FPGAHupei Xia, Xinyan Su, Peizhen Liu, Bin Liu. 455-458 [doi]
- Design and implementation of sports video player based on AndroidJing Sun, Wei Zhang, Huiqun Zhao. 459-463 [doi]
- Geometry based visualization of hierarchical structuresPeng Wang, Kang Zhang, Xiaonan Song, Tianyi Zhou, Dongwei Gong. 465-470 [doi]
- Performance optimization of 3D applications by OpenGL ES library hooking in mobile devicesChang-Woo Cho, Chung-Pyo Hong, Jin-Chun Piao, Yeong-Kyu Lim, Shin-Dug Kim. 471-476 [doi]
- An empirical study on the performance of hash tableDapeng Liu, Zengdi Cui, Shaochun Xu, Huafu Liu. 477-484 [doi]
- An integrated method for hierarchy construction of domain-specific termsYin Kang, Lina Zhou, Dongsong Zhang. 485-490 [doi]