Abstract is missing.
- Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor NetworksYongsheng Liu, Jie Li. [doi]
- One Multi-level Data Acquisition Strategy for Parallel Pre-stack Kirchhoff Depth MigrationJianjiang Li, Lin Yan, Dan Hei, Lei Zhang. 3-8 [doi]
- A Study on the Preprocessing of MLFMA Parallel ComputationXingang Wang, Yue Hu, Bin Cheng, Weiqin Tong. 9-13 [doi]
- A Systemic Strategy for Tuning Intra-node Collective Communication on Multicore SystemsZhiqiang Liu, Junqiang Song, Kaijun Ren, Fen Xu, Xiaoling Qu. 14-21 [doi]
- Formal Approach for Performance Analysis Oriented Parallel System DesignBin Cheng, Xingang Wang, Ying Li, Weiqing Tong. 22-26 [doi]
- Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC ApplicationsYaobin Wang, Hong An, Jie Yan, Qi Li, Wenting Han, Li Wang, Gu Liu. 27-32 [doi]
- A Program Behavior Study of Block Cryptography Algorithms on GPGPUGu Liu, Hong An, Wenting Han, Guang Xu, Ping Yao, Mu Xu, Xiurui Hao, Yaobin Wang. 33-39 [doi]
- A Resource-Efficient System for Measuring Flow Length DistributionWeijiang Liu, Wenyu Qu, Hong Ye, Zhaobin Liu, Keqiu Li. 40-44 [doi]
- A Distributed Algorithm to Enumerate All Maximal Cliques in MapReduceBin Wu, Shengqi Yang, Haizhou Zhao, Bai Wang. 45-51 [doi]
- Infiniband-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel SystemsXiaoshuang Xia, Yi Liu, Yunbin Wang, Tengfei Mu. 52-58 [doi]
- A Heuristic Approach with Branch Cut to Service Substitution in Service OrchestrationJinbo Du, Hao-Peng Chen, Can Zhang. 59-67 [doi]
- Communication Latency Tolerant Parallel Algorithm for Particle Swarm OptimizationBo Li, Koichi Wada. 68-74 [doi]
- High Performance and Parallel Model for LU Decomposition on FPGAsYi Shao, Liehui Jiang, Qiuxia Zhao, Yuliang Wang. 75-79 [doi]
- A Random-Walk-Based Dynamic Tree Evolution Algorithm with Exponential Speed of Convergence to Optimality on Regular NetworksKeqin Li. 80-85 [doi]
- Performance Evaluation of Mobile Service Design Paradigm in Ubiquitous Computing EnvironmentsSongqiao Han, Yong Zhang. 89-95 [doi]
- An Improved Approach to Tag Reduction on Low Power CMP with Trade-Off of Energy and PerformanceLong Zheng, Mianxiong Dong, Hai Jin, Minyi Guo, Li Li. 96-102 [doi]
- Research on Hierarchical P2P Based RFID Code Resolution Network and Its SecurityWen Zhao, Xueyang Liu, Xinpeng Li, Dianxing Liu, Shikun Zhang. 103-111 [doi]
- A Decentralized Cooperative Autonomic Management Model in Grid SystemsJiangfeng Li, Chenxi Zhang. 112-118 [doi]
- A Markov Chain Based Resource Prediction in Computational GridLili Shi, Shoubao Yang, Liangmin Guo, Bin Wu. 119-124 [doi]
- ScudOSGi: Enabling Facility-Involved Task Migration in OSGi FrameworkYuqiong Xu, Shijian Li, Gang Pan. 125-131 [doi]
- Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part OneTomohiro Sugahara, Masato Honda, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo. 135-141 [doi]
- Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part TwoTatsuya Sakuma, Masato Honda, Tomohiro Sugahara, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo. 142-148 [doi]
- Network-Based Data Flow Processing System with Variable Data Granularity for Inter-module CommunicationMasayuki Moriguchi, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo. 149-155 [doi]
- The Application of the Adaptive Multi-mode Interactive Interface Based on Embedded EquipmentsYing Li, Chengchen Ge, Weiqin Tong, Bin Cheng, Xiaoli Zhi. 156-160 [doi]
- Emergency Software Maintenance for Individual Industrial EquipmentsLianlai Wang, Peitao Wang, Yujun Zheng. 161-167 [doi]
- Efficient VLSI Architecture for Fuzzy C-Means Clustering in Reconfigurable HardwareHui-Ya Li, Cheng-Tsun Yang, Wen-Jyi Hwang. 168-174 [doi]
- Mining Interesting Rules by Association and Classification AlgorithmsWilly Yanthy, Takayuki Sekiya, Kazunori Yamaguchi. 177-182 [doi]
- Optimization of Data Retrievals in Processing Data Integration QueriesJia Liu, Yongwei Wu, Guangwen Yang. 183-189 [doi]
- A Tree-Based Hierarchy Framework for RFID Data RepositoryYouyou Lu, Zhuzhong Qian, Sanglu Lu. 190-196 [doi]
- Reputation-Aware Scheduling for Storage Systems in Data GridsWei Liu 0011, Wei Du. 197-202 [doi]
- CWC: Compressed Write Cache for Improving Storage System PerformanceSuzhen Wu, Dan Feng, Bo Mao. 203-209 [doi]
- Combinatorial Auctions Based Network Resource Allocation Mechanism with High WelfareTingting Wang, Jinkui Xie, Bei Jin, Zongyuan Yang. 213-218 [doi]
- Automatic Data Extraction from Web Discussion ForumsSuke Li, Liyong Tang, Jian-bin Hu, Zhong Chen. 219-225 [doi]
- Flexible Data Collecting over Distributed Sensors on Enterprise Service BusJing Cao. 226-230 [doi]
- Analysis of the Availability of Composite Web ServicesTao Hu, Song Guo, Minyi Guo, Feilong Tang, Mianxiong Dong. 231-237 [doi]
- Wavelet Image Restoration and Regularization Parameters SelectionLeming Qu. 241-247 [doi]
- Shearlet-Based Adaptive Bayesian Estimator for Image DenoisingChengzhi Deng, Hui Sun, Xi Chen. 248-253 [doi]
- Image Denoising Algorithm Using Adaptive Shrinkage Threshold Based on Shearlet TransformXi Chen, Hui Sun, Chengzhi Deng. 254-257 [doi]
- A Depth-Based TDMA Scheduling for Clustering Sensor NetworksZusheng Zhang, Fengqi Yu, Baoli Zhang. 261-266 [doi]
- A Storage Node Placement Algorithm in Wireless Sensor NetworksYang Wang 0015, Xiong Fu, Liusheng Huang. 267-271 [doi]
- TCLA: A Triangular Cross-Layer Architecture for Wireless Sensor NetworksDaidi Lin, ShiNing Li. 272-278 [doi]
- Optimizing the Path-Points Identification for Data Mules in Mobile WSNsLiang He, Jingdong Xu, Yuntao Yu, Boxing Liu. 279-284 [doi]
- Mobile Robot Position Identification with Specially Designed LandmarksHuakang Li, Long Zheng, Jie Huang, Chunlei Zhao, Qunfei Zhao. 285-291 [doi]
- A Realistic Interference Model in Ad Hoc NetworksYao Shen, Feilong Tang, Minyi Guo, Song Guo. 292-297 [doi]
- An Improved Path-Based Reliability Prediction Model for Component-Based Embedded SoftwareChangde Li, Xingshe Zhou, Yuying Wang, Yunwei Dong. 301-307 [doi]
- CURRF: A Code-Based Framework for Faithful Replay Distributed ApplicationsNan Wang, Jizhong Han, Yonghao Zhou, Jinyun Fang. 308-316 [doi]
- A Chu Spaces Semantics of BPEL-Like Fault HandlingXutao Du, Chunxiao Xing, Lizhu Zhou. 317-323 [doi]
- Intrusion Detection Using Geometrical StructureAruna Jamdagni, Zhiyuan Tan, Priyadarsi Nanda, Xiangjian He, Ren Liu. 327-333 [doi]
- Analysis and Research on the Security Key Technology of GridLongjun Zhang. 334-338 [doi]
- Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for GridJunfeng Tian, Peng Yuan, Yuzhen Lu. 339-345 [doi]
- Indirect Disclosures in Data MiningRenren Dong, Ray Kresman. 346-350 [doi]
- Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6Ilsun You, Kouichi Sakurai, Yoshiaki Hori. 351-355 [doi]
- Optimizing Method for Analog Circuit Design Using Adaptive Immune Genetic AlgorithmHaiQin Xu, Yongsheng Ding. 359-363 [doi]
- The Application of Genetic Algorithm into Membership Function FLC Used Floating PointIsmail Yusuf, Nanna Suryana Herman, Siti Maryam Hj Shamsuddin. 364-370 [doi]
- A Fuzzy Clustering Algorithm with Effectiveness FactorDao-Lei Liang, Jian Jin, Guo-Xing Huang. 371-376 [doi]
- Notice of Violation of IEEE Publication PrinciplesImmune Selection Algorithm-Based User Authentication SystemJun Tang, Xiaojuan Zhao. 377-381 [doi]
- Mining Data of Buffalo and Cow Production in EgyptLaila Mohamed El Fangary. 382-387 [doi]
- Comparison of Heuristic Algorithms to Solving Mesh Network Path Finding ProblemJacek Kubacki, Leszek Koszalka, Iwona Pozniak-Koszalka, Andrzej Kasprzak. 388-392 [doi]
- A Chinese Health Care Reform Simulation Method Based on Mechanism DesignGuanqun Liang, Huanye Sheng. 393-398 [doi]
- A Local Algorithm for Checking Probabilistic BisimilarityYuxin Deng, Wenjie Du. 401-407 [doi]
- A Framework for Formalizing UML Models with Formal Language RcosJing Yang. 408-416 [doi]
- Analyzing UML Sequence Diagrams with UTPJing Yang. 417-423 [doi]
- Automatic Refinement of Platform Independent Models Using Graph Transformation SystemSattar Hashemi, M. R. ZadMiralvad. 424-428 [doi]
- Modeling Software Testing Process Using HTCPNLizhi Cai, Weiqin Tong, Bin Zhu, Juan Zhang. 429-434 [doi]
- Return Instruction Analysis and Optimization in Dynamic Binary TranslationTingtao Sun, Yindong Yang, Hongbo Yang, Haibing Guan, Alei Liang. 435-440 [doi]
- Structure and Parameter Learning of CDHMM Based on ReductionA. Vafaei, M. Miralipoor. 441-445 [doi]
- A Graph Transformation-Based Approach for Applying MDA to SOAF. Taghizadeh, S. R. Taghizadeh. 446-451 [doi]
- Research & Implementation of Lightweight ESB with Microsoft .NETJiZhe Li, Yongjun Yuan. 455-459 [doi]
- Design and Implementation of DSL via Category Theoretic ComputationsHaifeng Ling, Xianzhong Zhou, Yujun Zheng. 460-466 [doi]
- Design and Implementation of Integrated Transport Network Planning Evaluation System Based on GISDong Li, Youli Lu. 467-472 [doi]
- Signal Integrity Research of High Speed Circuit of Embedded SystemKaihua Xu, Jun Zhou, Yuhua Liu, Shuyun Dong. 473-477 [doi]
- An Embedded Software Architecture for Robot with Variable StructuresChorng-Shiuh Koong, Hung-Jui Lai, Kuan-Chou Lai. 478-484 [doi]
- The Self-Adaptive Routing Evolution Model's Research about Internetware of Architecture-centric SystemXiaona Xia, Baoxiang Cao, Jiguo Yu. 485-491 [doi]
- A General Fuzzy Modeling Approach to Detection Decision FusionBicheng Li, Huang Jie, Hujun Yin. 495-501 [doi]
- A Multi-scale Based Algorithm for Sub-pixel Measurements of Circular PartsBing Sun, Guohui Zhou. 502-509 [doi]
- A New Recursive Approach for Reconstructing Metabolic Networks from KEGGTingting Zhou, Samuel K. F. Yung, Zhenghua Wang, Yunping Zhu. 510-515 [doi]
- A Case Study on Human Learning of Four-Dimensional Objects in Virtual Reality: Passive Exploration and Display TechniquesRanxiao Frances Wang. 519-523 [doi]
- Extending BPEL to Model Business Processes Involving Human ActivitiesChunxin Lia, Chaojun Lu. 524-529 [doi]
- Design and Implementation of Online Classroom Real-Time Generating and On-Demand SystemDong Li, Youli Lu. 530-536 [doi]
- Remote Operation System Detection Base on Machine LearningBofeng Zhang, Tiezheng Zou, Yongjun Wang, Baokang Zhang. 539-542 [doi]
- An Algorithm for Unsplittable Flow Problem in Flexible Reconfigurable NetworkYuxiang Hu, Julong Lan, Chengwei Wan. 543-547 [doi]
- EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted AttacksYanxiang He, Tao Liu, Hai Zhong, Qi Xiong. 548-552 [doi]
- An Exact Model for Active P2P Worms PropagationWeimin Luo, Jing Liu, Jingbo Liu, Chengyu Fan. 553-558 [doi]
- A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor NetworksHuang Lu, Jie Li, Guojun Wang. 565-570 [doi]
- Lookup with CAM Aided Hash TableChengwei Wan, Julong Lan, Yuxiang Hu. 571-575 [doi]
- Range Matching without TCAM Entries Expansion for Packet ClassificationYang Li, Chengwei Wan, Xiumei Fan. 576-580 [doi]
- ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle CommunicationsYipin Sun, BaoKang Zhao, Jinshu Su. 581-586 [doi]
- A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh NetworksYan Xia, Zhenghu Gong, BaoKang Zhao, Jinshu Su. 587-592 [doi]
- Research on Trust Evaluation Model Based on TPMWei Ou, Xiaofeng Wang, Wenbao Han, Yongjun Wang. 593-597 [doi]
- HBSP: A Lightweight Hardware Virtualization Based Framework for Transparent Software Protection in Commodity Operating SystemsMiao Yu, Peijie Yu, Shang Gao, Qian Lin, Min Zhu, Zhengwei Qi. 601-606 [doi]
- A Database System for Effective Utilization of ISO/IEC 27002Ahmad Iqbal, Daisuke Horie, Yuichi Goto, Jingde Cheng. 607-612 [doi]
- Trust-Aware Component Service Selection Algorithm in Service CompositionGuiping Dai, Yong Wang. 613-618 [doi]
- Information Assurance, Privacy, and Security in Ubiquitous QuestionnaireYuichi Goto, Jingde Cheng. 619-624 [doi]
- Application of COBIT to Security Management in Information Systems DevelopmentShoichi Morimoto. 625-630 [doi]
- Croth: Effective Process Protection and Monitoring with Hardware VirtualizationMenglong Jiang, Zhengwei Qi, Haibing Guan, Anil Kumar Karna. 633-638 [doi]
- Self-Checking Tamper-Proofing Based on Software Behavior ModelDan Li, Yingsong Hu, Xiangxiao Hu, Hefei Ling. 639-643 [doi]
- Mining Association Rules for Intrusion DetectionHui Wang, Guoping Zhang, Huiguo Chen, Xueshu Jiang. 644-648 [doi]
- Decoupling Dynamic Test Generation from Specific Operating System Details Based on Whole System Virtual MachineGen Li 0002, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang 0027. 649-654 [doi]
- DFHR: A Design Framework for HPC ReliabilityYongqin Huang. 655-660 [doi]
- ASTVA: Traffic Validation Architecture Based on Autonomous SystemsHonghao Zhang, Guang Jin, Wei Wei, Fei Zhang, Huizhan Zhang, Zhijun Xie. 661-665 [doi]
- An Intrusion Detection Method for Ad Hoc Network Based on Class Association Rules MiningChuan-Xiang Ma, Ze-ming Fang, Rui Chen. 666-671 [doi]
- A CFSM-Based Reprogramming Scheme for Flexible Wireless Sensor NetworksJun-Zhao Sun, Jiehan Zhou. 675-680 [doi]
- Grey Model-Enhanced Risk Assessment and Prediction for P2P NodesXiaoyang Liu, Cai Fu, Jiandong Yang, Lansheng Han. 681-685 [doi]
- Pervasive Service Computing toward Accommodating Service Coordination and CollaborationJiehan Zhou, Jukka Riekki, Jun-Zhao Sun. 686-691 [doi]
- Formal Approaches to SMS Service Based on Pi CalculusHongyan Mao, Ningkang Jiang, Qin Li, Huibiao Zhu. 692-697 [doi]
- Towards User-Oriented Application CompositionIván Sánchez, Oleg Davidyuk, Jukka Riekki. 698-704 [doi]
- PSC-RM: Reference Model for Pervasive Service CompositionJiehan Zhou, Jun-Zhao Sun, Mika Rautiainen, Oleg Davidyuk, Meirong Liu, Ekaterina Gilman, Xiang Su, Mika Ylianttila, Jukka Riekki. 705-709 [doi]
- The Implementation and Design of Electronic Bag Based on ARMLinyang Sheng, LiMing Zhang. 710-714 [doi]
- Configure Care-of Address for Nested Network MobilitySonghua Huang, Heng Wang, Feng Ding. 717-721 [doi]
- DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale SensornetsJing Jin, Zhiguang Qin, Hu Xiong, Juan Wang, Zhigang Wu. 722-727 [doi]
- A Study on MAC Protocols for Wireless Sensor NetworksHaigang Gong, Xue Zhang, Lingfei Yu, Xiaomin Wang, Fasheng Yi. 728-732 [doi]
- A Distributed Cluster-Based Algorithm in Wireless Sensor NetworksXiaomin Wang, Chao Song. 733-737 [doi]