Abstract is missing.
- Keynote speech: The usage of cloud computing in China Regional HealthcareSteve H. Chen, Yangsheng Xu, Peter Wang, Deyi Li, Dongbin Jin, Jianming Liu, Jian Wang, Fuji Ren, Jianning Zhang. [doi]
- Are the URLs really popular in microblog messages?Anqi Cui, Min Zhang, Yiqun Liu, Shaoping Ma. 1-5 [doi]
- User interest modeling by labeled LDA with topic featuresWenfeng Li, Xiaojie Wang, Rile Hu, Jilei Tian. 6-11 [doi]
- Annotation-aware web clustering based on topic model and random walksJiashen Sun, Xiaojie Wang, Caixia Yuan, Guannan Fang. 12-16 [doi]
- The smart grid multi-utility services platform based on power fiber to the homeJianming Liu, Bingzhen Zhao, Zichao Zhuang. 17-22 [doi]
- Semi-supervised logistic regression via manifold regularizationYu Mao, Muyuan Xi, Hao Yu, Xiaojie Wang. 23-28 [doi]
- A hybrid knowledge representation for the domain model of intelligent flight trainerXiaobing Geng, Shuxin Qin, Hongxing Chang, Yiping Yang. 29-33 [doi]
- Naive Bayes classification algorithm based on small sample setYuguang Huang, Lei Li. 34-39 [doi]
- Study on food safety semantic retrieval system based on domain ontologyYuehua Yang, Junping Du, MeiYu Liang. 40-44 [doi]
- The research of rainfall prediction models based on Matlab neural networkXianggen Gan, Lihong Chen, Dongbao Yang, Guang Liu. 45-48 [doi]
- The extension classification model of external knowledge sources based on open innovationXingsen Li, Zhongbiao Xiang. 49-54 [doi]
- Ontology-based multimode information fusion methodChunjiang Zhao, Huarui Wu, RongHua Gao. 55-59 [doi]
- A new hybrid collective classification method based on random walk and link patternLi-Na Li, Jihong OuYang, Dayou Liu, Hong Qi, Huiling Chen. 60-64 [doi]
- Reserch on fundamental theory of spatial directional relationKe Zhang, Xiaojie Wang, Yixin Zhong. 65-69 [doi]
- A semantics based segmentation algorithm for scene imagesXiaoru Wang, Junping Du, Jie Liu. 70-74 [doi]
- A matching-improved reparation method for incomplete fingerprintJie Zhang, Bo Zhang, Xinjing Liu, Xiaojun Jing. 75-79 [doi]
- Creating a Chinese emotion lexicon based on corpus Ren-CECpsJi Li, Fuji Ren. 80-84 [doi]
- A parallel design of computer Go engine on CUDA-enabled GPUQifei Zhang, Zhiqing Liu. 85-88 [doi]
- A non-standard-substance pesticide residue qualitative analysis method based on SVMYi Chen, Rui Wang, Hongqian Chen. 89-93 [doi]
- Multi-sensor data registration for bridge health monitoringYun Liu, Ling Zhao. 94-97 [doi]
- Data collection in wireless sensor networksKaicheng Yin, Chaosheng Zhong. 98-102 [doi]
- Application of memetic algorithm in control of linear inverted pendulumJing Zhang, Lixiang Zhang, Jing Xie. 103-107 [doi]
- A linguistic feature based text clustering methodKansheng Shi, Lemin Li, Jie He, Haitao Liu, Naitong Zhang, Wentao Song. 108-112 [doi]
- An improved KNN text classification algorithm based on densityKansheng Shi, Lemin Li, Haitao Liu, Jie He, Naitong Zhang, Wentao Song. 113-117 [doi]
- Design and implementation of Business-Driven BI platform based on cloud computingBin Wu, Lei Qin. 118-122 [doi]
- Dirichlet Process Mixture Models for lexical category acquisitionBichuan Zhang, Xiaojie Wang, Guannan Fang. 123-127 [doi]
- An extended soft set model: Type-2 fuzzy soft setsXi'ao Ma, Guoyin Wang. 128-133 [doi]
- Design and implementation of parallel statiatical algorithm based on Hadoop's MapReduce modelSongqing Duan, Bin Wu, Bai Wang, Juan Yang. 134-138 [doi]
- Improved moving objects indexing model in mobile computing environmentYe Liang. 139-143 [doi]
- Measuring the correlation between variables based on the probability density function estimationSisi Chen. 144-148 [doi]
- Camera self-calibration method based on GA-PSO algorithmJing Li, Yimin Yang, Genping Fu. 149-152 [doi]
- Paragraph act based pragmatic information extraction in question answeringSong Liu, Fuji Ren. 153-157 [doi]
- Development of servers in cloud computing to solve issues related to security and backupPalivela Hemant, Nitin. P. Chawande, Avinash Sonule, Hemant Wani. 158-163 [doi]
- Multi Cloud Management for unified cloud services across cloud sitesTiancheng Liu, Yasuharu Katsuno, Kewei Sun, Ying Li, Takayuki Kushida, Ying Chen, Mayumi Itakura. 164-169 [doi]
- Load balance optimization with replication degree customizationWei Li, Shanping Li, Xingen Wang. 170-174 [doi]
- Application on cloud computing in the future libraryLi Gao, Yinghui Zhao. 175-177 [doi]
- Research on parallel query technology of pXCube model based on cloud patternYawei Zhao, Dongri Yang. 178-182 [doi]
- The framework of a distributed file system for geospatial data managementJifeng Cui, Chao Li, Chunxiao Xing, Yong Zhang. 183-187 [doi]
- A method for improving information synchronization mechanism in EucalyptusXiuqin Lin, Xiaowei Yan, Liutong Xu, Xinyang Piao. 188-192 [doi]
- A management platform for Eucalyptus-based IaaSLiutong Xu, Jie Yang. 193-197 [doi]
- Detecting and diagnosing application misbehaviors in 'on-demand' virtual computing infrastructuresM. C. Ramya, Sumit Kumar Bose, Michael Salsburg, Venkat Shivaram, Shrisha Rao. 198-203 [doi]
- Implementation of method object in active object-based storage systemsZhipeng Tan, Yanli Yuan, Dan Feng, Tian Zhan, Xudong Tu. 204-211 [doi]
- Detecting operations that potentially violate well-formedness constraints for metadata repository systemsXiaofei Zhao, Zhongzhi Shi. 212-219 [doi]
- A dynamic load balancing strategy for cloud computing platform based on exponential smoothing forecastXiaona Ren, Rongheng Lin, Hua Zou. 220-224 [doi]
- Incident management process for the cloud computing environmentsChaojie Cao, Zhiqiang Zhan. 225-229 [doi]
- Data mining using hierarchical virtual k-means approach integrating data fragments in cloud computing environmentT. R. Gopalakrishnan Nair, K. Lakshmi Madhuri. 230-234 [doi]
- The efficient data storage management system on cluster-based private cloud data centerCho Cho Khaing, Thinn Thu Naing. 235-239 [doi]
- Ensuring the data integrity in cloud data storageWenjun Luo, Guojing Bai. 240-243 [doi]
- Gird or cloud? Survey on scientific computing infrastructureBing Yu, Jing Tian, Shilong Ma, Shengwei Yi, Dan Yu. 244-249 [doi]
- Collision-safe wavelength assignment scheme for lightpath establishment in WSONsLianxing Hou, Lin Zuo, Pei Luo, Dong Liu. 250-253 [doi]
- A revocation scheme for the cloud computing environmentXiaobiao Li, Qiaoyan Wen. 254-258 [doi]
- The architecture of cloud manufacturing and its key technologies researchFanghua Ning, Weizong Zhou, Fengying Zhang, Qian Yin, Xiajing Ni. 259-263 [doi]
- Ensuring data storage security through a novel third party auditor scheme in cloud computingShuai Han, Jianchuan Xing. 264-268 [doi]
- Fuzzy keyword search on encrypted cloud storage data with small indexChang Liu, Liehuang Zhu, Longyijia Li, Yu-an Tan. 269-273 [doi]
- Execution flow control: Simplified design of parallel applicationsJing Jin, Xin Li, Shanzhi Chen, Yan Wang. 274-279 [doi]
- Next generation broadband access networks evolving market structure and implications of network neutrality regulationAbdul Wahid Tareen. 280-284 [doi]
- ICAS: An inter-VM IDS Log Cloud Analysis SystemShun-Fa Yang, Wei-Yu Chen, Yao-Tsung Wang. 285-289 [doi]
- An improved dynamic provable data possession modelFeifei Liu, Dawu Gu, Haining Lu. 290-295 [doi]
- A load-adapative cloud resource scheduling model based on ant colony algorithmXin Lu, Zilong Gu. 296-300 [doi]
- The research and design of SQL processing in a data-mining system based on MapReduceLei Zhang, Kaiping Li, Bin Wu. 301-305 [doi]
- An analytical performance model of MapReduceXiao Yang, Jianling Sun. 306-310 [doi]
- A dynamic and integrated load-balancing scheduling algorithm for Cloud datacentersWenhong Tian, Yong Zhao 0009, Yuanliang Zhong, Minxian Xu, Chen Jing. 311-315 [doi]
- A multi-objective routing decision-making model for opportunistic networkMeng Chen, Haiquan Wang. 316-320 [doi]
- Pervasive dependability in Wireless Cloud Networking: A novel BlueGreen topological control approachWilliam Liu. 321-326 [doi]
- A channel hopping based MAC without hidden terminal problem for cognitive networksZhifeng He, Yong Zhang, Yinglei Teng, Yinghe Wang, Xiaojun Wang. 327-332 [doi]
- Virtual machine placement algorithm for virtualized desktop infrastructureCao Le Thanh Man, Makoto Kayashima. 333-337 [doi]
- Research on algorithm of point cloud MapReduce registrationSong Liu, Xiaoyao Xie. 338-341 [doi]
- Dynamic share energy provisioning service for one-hop multiple RFID tags identification systemJianhua Liu, Weiqin Tong. 342-347 [doi]
- Research on dynamic reconfiguration technology of cloud computing virtual servicesShuai Wang, Fang Du, Xinming Li, Yi Li, Xingye Han. 348-352 [doi]
- A comparative review of job scheduling for MapReduceDongjin Yoo, Kwang Mong Sim. 353-358 [doi]
- A rule-based self-management strategy for devices monitoring networkYuan Yao, Jianyong Liang. 359-363 [doi]
- Towards a ramework for automated service negotiation in cloud computingLi Pan. 364-367 [doi]
- How to move your own applications into the cloud by exploiting interfaces automation and accessibility featuresFabrizio Lamberti, Andrea Sanna, Claudio Demartini. 368-372 [doi]
- Cloud computing beyond turing machinesDeyi Li, Yuchao Liu, Haisu Zhang, Guisheng Chen. 373-381 [doi]
- Virtual execution environment for windows applicationsHailei Sun, Tianyu Wo. 382-386 [doi]
- Cooperative relay selection scheme based on geographical informationRong Wang, Xinlong Luo, Jiaru Lin. 387-390 [doi]
- A CPU-GPU hybrid computing framework for real-time clothing animationHanwen Li, Yi Wan, Guanghui Ma. 391-396 [doi]
- Efficient resource arbitration and allocation strategies in cloud computing through virtualizationT. R. Gopalakrishnan Nair, M. Vaidehi. 397-401 [doi]
- Japanese named entity recognition for question answering systemYe Liu, Fuji Ren. 402-406 [doi]
- An efficient ant colony system for solving the new Generalized Traveling Salesman ProblemLianming Mou. 407-412 [doi]
- A new intrusion detection method based on FSM and cache memory in ad hoc networksDina Sadat Jalali, Alireza Shahrbanoonezhad. 413-417 [doi]
- Tourist flows analysis and decision support system based on intelligent mobile phoneYawen Li, Xiangyun Wang, Xue Wang. 418-422 [doi]
- Modeling reputation for service-oriented AmI environmentsHuibing Zhang, Yibin Hou, Zhangqin Huang, Cuiqin Hou. 423-427 [doi]
- Digital core modeling based on CT imageHang Zhou, Haisheng Li, Qiang Cai, Peng Bo. 428-432 [doi]
- Robust COA planning with varying durationsLuohao Tang, Cheng Zhu, Weiming Zhang, Zhong Liu. 433-437 [doi]
- A Web service composition method based on Sub Web ServiceBo Zhang. 438-442 [doi]
- Research on secrecy capacity oriented relay selection for mobile cooperative networksLi Wang, Tenghui Ke, Mei Song, Yifei Wei, Yinglei Teng. 443-447 [doi]
- Web information extraction and its applicationYan Peng, Chenyue Zhang. 448-451 [doi]
- EEG-based emotion recognition in Chinese emotional wordsMengsi Cao, Guannan Fang, Fuji Ren. 452-456 [doi]
- An improved method of extracting emotional attribute of relations based on syntactical analysisJun Wang, Lei Li, Fuji Ren. 457-461 [doi]
- Reinforcement learning with EGD based hyper heuristic system for exam timetabling problemEi Shwe Sin. 462-466 [doi]
- Mobile cloud computing as future for mobile applications - Implementation methods and challenging issuesShahryar Shafique Qureshi, Toufeeq Ahmad, Khalid Rafique, Shuja-ul-islam. 467-471 [doi]
- An integrated optimization model for the location of distribution centers with multiple practical constraintsYundong Gu, Yajing An, Yanchao Chen, Jin Xu. 472-476 [doi]
- A PaaS based metadata-driven ETL frameworkLiutong Xu, Jia Liao, Ruixue Zhao, Bin Wu. 477-481 [doi]
- Iris recognition on Hadoop: A biometrics system implementation on cloud computingShelly, N. S. Raghava. 482-485 [doi]
- A novel algorithm for fingerprint singular points detection based on vecrot orthogonal theoryHang Yin, Xiaojun Jing, Songlin Sun. 486-489 [doi]
- Towards choreography-based process distribution in the cloudSebastian Wagner 0001, Oliver Kopp, Frank Leymann. 490-494 [doi]
- An improved non-parametric background model and two-level classifier for traffic information recognitionSong Bi, Liqun Han, Yixin Zhong, Xiaojie Wang, Hairu Guo. 495-499 [doi]
- Research on three-layered metadata model for oil-gas data integrationZhonggui Ma, Chengyao Wang, Zongjie Wang. 500-504 [doi]
- An automatic facial feature point localization methodQinyan Zhang, Xiaoping Li. 505-509 [doi]
- Health condition monitoring of aeroengine with unknown clustering number based on ant colony algorithmChuanchao Zhang. 510-514 [doi]
- Tactics of handling data in Internet of thingsWenchong Shi, Maohua Liu. 515-517 [doi]
- A QoS-aware system for mobile cloud computingPeng Zhang, Zheng Yan. 518-522 [doi]
- The cost effective structure for designing hybrid cloud based enterprise E-learning platformShu-Min Chuang, Kuo-En Chang, Yao-Ting Sung. 523-525 [doi]
- A novel enhanced education application of Cloud computingGuang Li, Guisheng Chen. 526-529 [doi]
- The design of indoor emergency management system based on wireless locationHan Liu, Jie Li, Hongwei Jia. 530-535 [doi]
- Business intelligence in the cloud: A case of PakistanSurat Khan, Bin Zhang, Faizullah Khan, Siqi Chen. 536-540 [doi]
- The shortest universal solutions for non-linear dynamic equationShaozhong Cao, Yang Li. 541-544 [doi]
- The communication of CAN bus used in synchronization control of multi-motor based on DSPXinhua Yu, Shaozhong Cao. 545-549 [doi]
- Mining Open Source Software data using regular expressionsQifeng Li, Bing Li. 550-554 [doi]
- A study on the reliability allocation algorithm based on rangean Jiang, Jianjun Hao. 555-558 [doi]
- Control algorithm based on shape recognitionJian Lan, Shuiqing Yu, Liangliang Xu, Xuejuan Chen. 559-563 [doi]
- Simulation experimental analysis of PZT driver circuitBo Gao, Ge Wu, Jiangdong Shan, Xiaojian Tian. 564-568 [doi]
- Chirp extraction of wave-breaking-free soliton in a passively mode-locked Yb-doped fiber laser based on STFT and WVDGe Wu, Xiaojian Tian, Bo Gao, Jiangdong Shan. 569-573 [doi]
- Scientific processing method for course evaluation data in universitiesDongmei Ai, Xiaojun Ning, Bo Yang, Jianing Li. 574-576 [doi]
- A variable parameter efficient μ-law improved proportionate affine projection algorithmXiao Xia, Songlin Sun, Xiaojun Jing, Hai Huang 0001. 577-581 [doi]
- A description algorithm for community structureLei Zhang, Zhixiong Zhao, Bin Wu, Juan Yang. 582-586 [doi]
- Detect and track the dynamic deformation human body with the active shape model modified by motion vectorsJia Ma, Fuji Ren. 587-591 [doi]
- A dynamic load balance on GPU cluster for fork-join searchYanlin Ou, Hu Chen, Lushuang Lai. 592-596 [doi]
- Two novel 60 GHz coplanar waveguide structure filters with electric and magnetic couplingHuisheng Wang, Xiuping Li. 597-601 [doi]
- Optimization method of Urban Rail Transit train running schemeJie Yang, Yongshi Xu, Ruihua Xu. 602-605 [doi]
- A domestic speech recognition based on Hidden Markov ModelJun Tao, Xiaoxiao Jiang. 606-609 [doi]
- A new algorithm of incomplete fingerprint segmentation based on LBPBo Zhang, Jie Zhang, Haixia Jiang, Xiaojun Jing. 610-613 [doi]
- Chinese event place phrase recognition of emergency event using Maximum EntropyFang Zhu, Zongtian Liu, Juanli Yang, Ping Zhu. 614-618 [doi]
- An approach to the computation of distance of concept lattice by utilizing waned value of intensionPing Yuan, Yuan Ma. 619-624 [doi]
- An incremental algorithm for formation a concept lattice based on the intent waned valueXuesong Dai, Yuan Ma. 625-632 [doi]
- Field-oriented control of synchronous motor based on adaptive extended Kalman filterLuqun Peng, Lun Xie, Fei Wu, Chongjian Li. 633-637 [doi]
- Application research of support vector machine in E-Learning for personalityWen Gong, Wansen Wang. 638-642 [doi]