Abstract is missing.
- Multiple-Choice Allocations with Fixed DensitiesEbrahim Malalla. 1-8 [doi]
- Exact Heuristic Algorithm for Traveling Salesman ProblemDongmei Lin, Xiangbin Wu, Dong Wang. 9-13 [doi]
- Design and Evaluation of Sectional Real-Time Scheduling Algorithms Based on System LoadWanfu Ding, Ruifeng Guo. 14-18 [doi]
- An Improved Method for Computing Dixon PolynomialYaohui Li, Yong Feng, Jiwei Xue. 19-24 [doi]
- An Algorithm for Dynamic Optimal Path Selection with ConstraintXiaogang Qi, Lifang Liu, Sanyang Liu. 25-30 [doi]
- The Partition Transform Algorithm of Join QueryXianxia Zou, Weijia Jia, Jiuhui Pan, Wei Du. 31-35 [doi]
- Multi-label Classification based on Association Rules with Application to Scene ClassificationBo Li, Hong Li, Min Wu, Ping Li. 36-41 [doi]
- Quick Searching Based on L-K Means Hierarchical Clustering in a Huge Scale Face DatabaseXiaohua Liu, Chunguang Zhou, Libiao Zhang, Huipeng Sheng, Jiangchun Li. 42-47 [doi]
- Algorithm Research of Flexible Graphplan based on HeuristicYang Li, Yan Sun, Chengshan Han, Xiaodong Wang, Shuyan Xu. 48-53 [doi]
- An Edit Distance Algorithm with Block SwapTian Xia. 54-59 [doi]
- Hardness of Approximation Algorithms on k-SAT and (k, s)-SAT ProblemsTianyan Deng, Daoyun Xu. 60-64 [doi]
- Hybrid SAT Solver Considering Circuit ObservabilityXiuqin Wang, Hao Wang, Guangsheng Ma. 65-70 [doi]
- OpenMail File System Workloads Analysis and CharacterizationQiang Zou, Dan Feng. 71-76 [doi]
- A Novel ROI-Based Rate Control Scheme for H.264Yunhui Shi, Shaoyuan Yue, Baocai Yin, Yi Huo. 77-81 [doi]
- A Fast Frequent Subgraph Mining AlgorithmJia Wu, Ling Chen. 82-87 [doi]
- A Type of Variation of Hamilton Path Problem with ApplicationsJitian Xiao, Jun Wang. 88-93 [doi]
- From Word Automata to Tree AutomataChenguang Luo. 94-99 [doi]
- Estimation of the k-Orientability ThresholdEbrahim Malalla. 100-105 [doi]
- Theoretical Research on Topological Properties of Generalized K-Ary n-Cube Interconnection NetworkBin Yao, Haisen Li, Tian Zhou, Baowei Chen. 106-111 [doi]
- Comparative Research of XML Compression TechnologiesSheng Zhang, Xiaoling Bao, Jian Shu, Sha Chen. 112-117 [doi]
- Formal Analysis of Architectural Policies of Self-Adaptive Software by BigraphZhiming Chang, XinJun Mao, Zhichang Qi. 118-123 [doi]
- Modeling and Analyzing Time Constrains for Service CompositionGuisheng Fan, Huiqun Yu, Dongmei Liu, Liqiong Chen. 124-129 [doi]
- A Parameter Choosing Method of SVR for Time Series PredictionShukuan Lin, Shaomin Zhang, Jianzhong Qiao, Hualei Liu, Ge Yu. 130-135 [doi]
- Influence Graph based Task Decomposition and State Abstraction in Reinforcement LearningLasheng Yu, Fei Hong, PengRen Wang, Yang Xu, Yong Liu. 136-141 [doi]
- An Extensive Hardware/Software Co-design on a Descriptor-Based Embedded Java ProcessorChi-Hang Yau, Yiyu Tan, Anthony Shi-Sheung Fong, Pak Lun Mok. 142-147 [doi]
- Transient Fault Recovery on Chip Multiprocessor based on Dual Core Redundancy and Context SavingRui Gong, Kui Dai, Zhiying Wang. 148-153 [doi]
- Efficient Verification of Parameterized Cache Coherence ProtocolsWanXia Qu, Yang Guo, Zhengbin Pang, Xiaodong Yang. 154-159 [doi]
- A Double-Buffering Strategy for the SRF management in the Imagine Stream ProcessorYu Deng, Li Wang, Xiaobo Yan, Xuejun Yang. 160-165 [doi]
- Implementation and Evaluation of a Dynamic Schedule Policy for Multi-user Request in Network-Attached Disk ArrayJieqiong Li, Dan Feng. 166-171 [doi]
- A GPDMA-based Distributed Shared I/O Solution for CC-NUMA SystemQiong Li, Zhengbin Pang, Yufeng Guo, Enqiang Zhou, Xuejun Yang. 172-177 [doi]
- FG-NC: A Schedule Algorithm of Designing Concurrent Multi-direction Data Switch StructureJiaxin Li, Ning Deng, Caixia Liu, Mengxiao Liu, Zuo Wang, Qi Zuo. 178-182 [doi]
- DVMM: A Distributed VMM for Supporting Single System Image on ClustersJinbing Peng, Xiang Long, Limin Xiao. 183-188 [doi]
- Performance Estimation: IPCAbhijit Ray, Wu Jigang, Thambipillai Srikanthan. 189-193 [doi]
- Evaluating the Data Access Efficiency of Imagine Stream Processor with Scientific ApplicationsYonggang Che. 194-199 [doi]
- Low-Level Component for OpenGL ES Oriented Heterogeneous Architecture with OptimizationXinbiao Gan, Kui Dai, Zhiying Wang. 200-205 [doi]
- A Fast Implementation of Computing the Transparency Order of S-BoxesLimin Fan, Yongbin Zhou, Dengguo Feng. 206-211 [doi]
- Performance Bound Analysis and Retiming of Timed CircuitsLei Wang, Zhiying Wang, Kui Dai. 212-217 [doi]
- Intrusion Detection for Object-Based Storage SystemDi Yao, Dan Feng. 218-222 [doi]
- Autonomic Grid Node Organization and Management in RNMSYuanzhe Yao, Binxing Fang, Xinran Liu, Hong Zhang. 223-228 [doi]
- Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing PlatformYang Yang, Huanguo Zhang, Li Wan, Bingyu Zou. 229-233 [doi]
- On Evolution of Cooperative Overlay Network Based on Group Selection MechanismYufeng Wang, Akihiro Nakao. 234-239 [doi]
- Property Preservation by Petri-Net-Based Refinements in System DesignChuanliang Xia. 240-246 [doi]
- A New Algorithm for Network DiameterRui Yang, Shijie Zhou, Chengyu Fan. 247-252 [doi]
- Cost Minimization for Multi-Source Multi-Sinks Network CodingRami S. Youail, Cheng Wenqing, Tao Shaoguo. 253-258 [doi]
- A Novel Management Information Retrieval Algorithm Based on NGIJinxiang Zhang, Jiahai Yang, Jianping Wu. 259-263 [doi]
- A Class of Petri Nets for Modular and Hierarchical System ModelingZhijian Wang, Dingguo Wei. 264-269 [doi]
- A Crosslayer Concurrent Multipath Random Forward AlgorithmLaiquan Han, Jinkuan Wang, Cuirong Wang. 270-275 [doi]
- Privacy-Preserving Query based on Virtual Organization in Grid DatabaseNaijing Hu, Huan Zhou, Liang Zhao. 276-281 [doi]
- Approximate Performance Analysis of Job Scheduling on Computational GridsZhiguang Shan, Chuang Lin. 282-287 [doi]
- Grid Load Balancing Scheduling Algorithm Based on Statistics ThinkingBin Lu, Hongbin Zhang. 288-292 [doi]
- Bayesian Network based QoS Trustworthiness Evaluation Method in Service Oriented GridYi Fu, Zhigang Hu, Qingjun Zhang. 293-298 [doi]
- On Graph Embedding of Crossed Cube-Connected Ring NetworksXin Yu, Min Wu, Taoshen Li, Zhaowen Wei. 299-304 [doi]
- Characterizing Churn in Gnutella Network in a New AspectFuhong Lin, Changjia Chen, Hongke Zhang. 305-309 [doi]
- An Global Uneven Clustering Protocol Based on Collision Decreasing in Environment Integrated SurveillanceYijun Wang, Junbin Liang, Jianxin Wang. 310-315 [doi]
- A Channel-Aware Scheduling Algorithm for Improving TCP FairnessJiawei Huang, Jianxin Wang, Yuhong Luo, Jin Ye. 316-321 [doi]
- Requirement Driven Service Agent Coalition Formation and NegotiationLiwei Zheng, Jian Tang, Zhi Jin. 322-329 [doi]
- Quality Context Composition for Management of SOA QualityYoungkon Lee. 330-335 [doi]
- Research of Improved QoS of Data Transmission in Bluetooth Mobile P2P NetworksHui Ye, Zhigang Chen, QinHua Li. 336-341 [doi]
- Improved Algorithm for Dynamic Web Services CompositionLiping Liu, Anfeng Liu, Ya Gao. 342-347 [doi]
- TSearch: A Self-learning Vertical Search Spider for TravelSuke Li, Zhong Chen, Liyong Tang, Zhao Wang. 348-353 [doi]
- Rate Adaptive Real-Time Video Transmission Scheme over TCP Using Multi-Buffer SchedulingYonghua Xiong, Min Wu, Weijia Jia. 354-361 [doi]
- Using P2P Network to Transmit Media Stream in SIP-based SystemXiuwu Zhang, Weimin Lei, Wei Zhang. 362-367 [doi]
- An Improved TCP with Cross-layer Congestion Notification over Wired/Wireless Hybrid NetworksJin Ye, Jianxin Wang, Qinghua Liu, Yuhong Luo. 368-373 [doi]
- Design and Implementation of a Network Behavior Analysis-Oriented IP Network Measurement SystemBin Zeng, Dafang Zhang, Wenwei Li, Gaogang Xie, Guangxing Zhang. 374-379 [doi]
- An Efficient Ant Colony Optimization Algorithm for QoS Anycast RoutingTaoshen Li, Meng Xiao, Songqiao Chen, Zhihui Ge. 380-385 [doi]
- On QoS Anycast Routing Algorithm based on Particle Swarm OptimizationTaoshen Li, Ming Yang, Songqiao Chen, Zhigang Zhao, Zhihui Ge. 386-391 [doi]
- WSDSNM3: A Web Services-based Distributed System and Network Management Middleware Model and SchemeZhiHui Lv, Yu Wu, Chuan Xiao, Shiyong Zhang, YiPing Zhong. 392-397 [doi]
- A P2P Network Traffic Classification Method Using SVMAi-Min Yang, Sheng-Yi Jiang, He Deng. 398-403 [doi]
- Optimal Model of Service Discovery Architecture Based on IMSJie Zhang. 404-409 [doi]
- Towards a Self-Adaptive Super-node P2P Overlay Based on Information ExchangeJiaqi Liu, Zhigang Chen, Deng Li, Hui Liu. 410-415 [doi]
- An Approach to Checking the Compatibility for Web Services Specification Based on the Typed Graph CategoryXinlin Zhang, Huaikou Miao, Shenghong Li. 416-421 [doi]
- Symbol Time Error and Channel Estimation in Wireless OFDM LAN/MANShengping Qin, Zhanlei Shang, Xin Zhang, Peide Liu, Zheng Zhou. 422-426 [doi]
- SBCA: Score Based Clustering Algorithm for Mobile AD-hoc NetworksSahar Adabi, Sam Jabbehdari, Amir Masoud Rahmani, Sepideh Adabi. 427-431 [doi]
- Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability TheorySancheng Peng, Weijia Jia, Guojun Wang. 432-438 [doi]
- Research on Service-Oriented Lifetime and Network Density in WSNDayang Sun, Yanheng Liu, Aimin Wang, Bin Ge. 439-444 [doi]
- Load Balancing Placement of Gateways in Wireless Mesh Networks with QoS ConstraintsFeng Zeng, Zhigang Chen. 445-450 [doi]
- FAST CASH: FAir and STable Channel ASsignment on Heterogeneous Wireless Mesh NetworkPanlong Yang, Guihai Chen. 451-456 [doi]
- A Broadcasting Retransmission Approach Based on Random Linear Network CodingXiao Xiao, LuMing Yang, Weiping Wang, Shuai Zhang. 457-461 [doi]
- An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor NetworksJinxia Liu, Naijie Gu, Songsong He. 462-468 [doi]
- An Algorithm for Target Localization in Sensor Networks Based on Overlap Area Boundary of Sensor DetectionQuanlong Li, Luo Yu, Xiaofei Xu, Zhijia Zhao. 469-474 [doi]
- Research on Energy Hole Problem for Wireless Sensor Networks Based on Alternation between Dormancy and WorkAn-Feng Liu, Xian-You Wu, Wei-Hua Gui. 475-480 [doi]
- A RIO Approach for Modeling Wireless Sensor NetworkYe Yao, Vincent Hilaire, Abder Koukam, Wandong Cai. 481-486 [doi]
- Semi-Supervised Top-k Query in Wireless Sensor NetworksHailan Shen, Deng Li, Pengfei Xu, Zailiang Chen. 487-492 [doi]
- Towards End-to-end Delay Bounds on WMNs Based on Statistical Network CalculusHuamei Qi, Zhigang Chen, Lianming Zhang. 493-497 [doi]
- A Novel Approach to Mobile Positioning TrackingWensheng Tang, Wangqiu Kuang, Dingxing Zhang. 498-503 [doi]
- An Effective Approach for Continuous Window Query in Wireless Sensor NetworksBaoyan Song, Yanyan Cong, Jiayang Zhang, Xiaoguang Li, Ge Yu. 504-509 [doi]
- A Distributed Power Proportional Clustering Algorithm to Improve Energy Efficiency for Wireless Sensor NetworksTengfei Zhu, Jun Peng, Ying Guo, Xiaoyong Zhang, Fu Jiang, Chunming Li. 510-515 [doi]
- A Dynamic Spatial Backoff Algorithm Based on Channel Rate and Transmit Power in Wireless NetworksZhuonong Xu, Jianxin Wang, Yanrong Su. 516-521 [doi]
- A Deployment Algorithm to Achieve both Connectivity and Coverage in Grid Sensor NetworksDiwen Wu, Dongqing Xie, Lupeng Wang. 522-526 [doi]
- Multipath-Based Segment-by-Segment Routing Protocol in MANETsYuan Lu, Guojun Wang, Weijia Jia, Sancheng Peng. 527-532 [doi]
- A Location Based Execution Path Selection for Composite Service in MANETsWeiyu Chen, Jingjing Wu, Weiwei Sun, Zhenying He. 533-538 [doi]
- A Lifetime Aware Approach to Service Selection in Mobile Ad Hoc NetworksZhuoyao Zhang, Weiwei Sun, Weiyu Chen, Jiaqi Dong. 539-544 [doi]
- A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor NetworksJin Zheng, Weijia Jia, Guojun Wang. 545-551 [doi]
- A Low Overhead Truthful Energy-Efficient Routing Protocol in Wireless Mobile Ad hoc Networks with Selfish NodesXinhui Yuan, Songqiao Chen, Xinhua Jiang. 552-557 [doi]
- A Multipath On-Demand Routing with Path Selection Entropy for Ad Hoc NetworksBaolin Sun, Chao Gui, Qifei Zhang, Bing Yan, Wei Liu. 558-563 [doi]
- Performance Investigation of Backoff Algorithms in Multihop Wireless NetworksJian Li, Xianwen Zeng, Qinggang Su. 564-569 [doi]
- A Highly Efficient DAG Task Scheduling Algorithm for Wireless Sensor NetworksZhiwen Zeng, Anfeng Liu, Deng Li, Jun Long. 570-575 [doi]
- A Self-Adaptive Service Discovery Approach in Mobile Ad Hoc NetworksBo Peng, Weiwei Sun, Jiaqi Dong, Ping Yu. 576-581 [doi]
- A Dynamic TimeSynchronization Scheme for Multihop Sensor NetworksWei Dong, Chun Chen, Jiajun Bu, Kougen Zheng, Xiaofan Wu, Guodong Teng. 582-587 [doi]
- An Optimal Local Reputation System in Mobile Ad hoc NetworksChanggeng Tan, Songqiao Chen, Wenyan Luo. 588-593 [doi]
- An Improved Scheme for Reducing the Latency of AODV in Ad Hoc NetworksRonghua Shi, Yongyan Deng. 594-598 [doi]
- EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference ConstraintLuobei Kuang, Ming Xu, Wei Yu. 599-604 [doi]
- Research and Improvement on Expected Throughput Metric in Wireless Mesh NetworkXiaoli Xiao, Min Huang, Weiping Zhang. 605-609 [doi]
- Preemptive Scheduling for Multi-item Queries in On-Demand Data BroadcastZhuoyao Zhang, Weiwei Sun, Ping Yu, Yongrui Qin. 610-615 [doi]
- A Review of Personal Communications ServicesHui Cheng, Xingwei Wang, Min Huang, Shengxiang Yang. 616-621 [doi]
- An Algorithm for Computing 4^M-Point DFT Based on 4-Point DFT BlockHaijun Li, Hongbo Zou, Peirong Ji, Xuejun Zhou. 622-627 [doi]
- Throughput Bounds of Unslotted CDMA Packet NetworksXiaoding Liao, Jingnan Nie, Lei Zhang. 628-632 [doi]
- An Adaptive QoS-Supported Backoff Mechanism for IEEE 802.11Zhihui Ge, Taoshen Li. 633-637 [doi]
- Controlled Clipper Method to Reduce PAPR by Tone Reservation in OFDM SystemNing Chen, Xuzhi Lai, Changbing Lu. 638-642 [doi]
- Fibonacci Jacket Linear Network CodesYing Guo, Zhigang Chen. 643-646 [doi]
- A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IPHui Tian, Ke Zhou, Yongfeng Huang, Dan Feng, Jin Liu. 647-652 [doi]
- Probabilistic Event-Driven Heuristic Fault Localization using Incremental Bayesian Suspected DegreeCheng Zhang, Jianxin Liao, Xiaomin Zhu. 653-658 [doi]
- Revisit Bayesian Approaches for Spam DetectionChun-Chao Yeh, Soun-Jan Chiang. 659-664 [doi]
- Multi-Agent Automated Intelligent Shopping System (MAISS)Lasheng Yu, Emmanuel Masabo, Lian Tan, Manqing He. 665-670 [doi]
- Performance Analysis of Resource Allocation Algorithms Using Cache Technology for Pervasive Computing SystemMianxiong Dong, Minyi Guo, Long Zheng, Song Guo. 671-676 [doi]
- Transferring Landmarks to Individual Foot Using Deformable Template ModelsBin Liu, Ning Shangguan, Junyi Lin, Kaiyong Jiang. 677-682 [doi]
- Research on 3D Seismic Data Visualization System Based on WindowsJie Li, Fangzhou Zhang, Yingying Niu, Xiaoyu Sheng. 683-688 [doi]
- A Chinese Paper Cut-out System Based on Decorative Pattern RecognitionLinlin Shui, Minyong Shi, Weiguo Lin, Jianxiang Cao. 689-692 [doi]
- Human Action Recognition Using Manifold Learning and Hidden Conditional Random FieldsFawang Liu, Yunde Jia. 693-698 [doi]
- Temporal Data Driven Naive Bayesian Text ClassifierLili Hao, Lizhu Hao. 699-702 [doi]
- A Novel Statistic-based Relaxed Grid Resource Reservation StrategyPeng Xiao, Zhigang Hu, Xi Li, Liu Yang. 703-707 [doi]
- Digital Product Information Sharing Based on STEP and XMLXiaoli Qiu, Xun Xu, Ni Zhonghua. 708-713 [doi]
- Privacy Preserving Spatial Outlier DetectionAnrong Xue, Xiqiang Duan, Handa Ma, Weihe Chen, Shiguang Ju. 714-719 [doi]
- A Fast Algorithm to Estimate Mutual Information for Image RegistrationYongxiang Hu, Jingtian Tang, Hong Jiang, Sancheng Peng. 720-724 [doi]
- Business Process Mining Based on Simulated AnnealingWei Song, ShaoZhuo Liu, Qiang Liu. 725-730 [doi]
- Simulation on Kinematics Law of Pedestrian in Vehicle/Pedestrian Contacting PhaseYanhui Fan, Hongguo Xu, Xibo Liu. 731-736 [doi]
- A Data Sharing Platform for Materials Service Safety AppraisementPeng Shi, Lianhong Ding. 737-741 [doi]
- Improved Metrics for Encapsulation Based on Information HidingYong Cao, Qingxin Zhu. 742-747 [doi]
- An Adaptive Watermarking Scheme Based on Nonsubsampled Contourlet Transform for Color Image AuthenticationDongyan Liu, Wenbo Liu, Gong Zhang. 748-752 [doi]
- Image Retrieval Based on MPEG-7 Dominant Color DescriptorHong Shao, Yueshu Wu, Wen-cheng Cui, Jinxia Zhang. 753-757 [doi]
- Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive FilterHong Zhu, Weizhen Sun, Minhua Wu, Guixia Guan, Yong Guan. 758-763 [doi]
- Research on Adaptive Preprocessing License Plate LocationXing Yang, Chaochao Huang, Hua Yang. 764-768 [doi]
- A Compression Framework for Personal Image Used in Mobile RFID SystemWei Jiang, Dong Xiang. 769-774 [doi]
- A Fast Mesh Simplification Algorithm Based on Octree with Quadratic ApproximationJiacheng Li, Yue Chen. 775-780 [doi]
- A Method for Surface Reconstruction from Cloud Points Based on Segmented Support Vector MachineLianwei Zhang, Yan Li, Jinze Song, Meiping Shi, Xiaolin Liu, Hangen He. 781-785 [doi]
- An Evaluation Index Based on Parameter Weight for Image Inpainting QualitySong Wang, Hong Li, Xia Zhu, Ping Li. 786-790 [doi]
- On the Selection of Multi Optimal Imaging Frames in Single Time Slot for Earth Observation SatelliteGuomin Zhang, Jianping Yin, En Zhu, Ling Mao. 791-796 [doi]
- Quaternion Julia FractalsYan Xing, Jieqing Tan, Peilin Hong. 797-802 [doi]
- Main Feature Extraction and Expression for Religious Portrait Thangka ImageJianjun Qian, Weilan Wang. 803-807 [doi]
- An Efficient Spectral Method for Document Cluster EnsembleSen Xu, Zhimao Lu, Guochang Gu. 808-813 [doi]
- A Method of Region-based Calculating Image Similarity for RBIR SystemYong-mei Zhou, Jin-kuang Wang, Ai-Min Yang. 814-819 [doi]
- Multi-source Color Transfer Based on Multi-labeled Decision TreeYuejian Guo, Hong Li, Wei Zhang, Yao Xiang. 820-825 [doi]
- A Novel Method for Image Spam FilteringHailing Huang, Weiqiang Guo, Yu Zhang. 826-830 [doi]
- Precise Depth Perception in Projective Stereoscopic DisplayLiping Lin, Pingdong Wu, Jie Huang, Jian Li. 831-836 [doi]
- Role-Oriented Workflow Modeling Based on Object Petri NetZhijiao Xiao, Zhong Ming, Jianfei Yin. 837-843 [doi]
- Explicit Model Checking Based on Integer Pointer and Fibonacci HashWanXia Qu, Tun Li, Yang Guo, Xiaodong Yang. 844-849 [doi]
- Research on Web Services Maiden Business Trust Metrics, Appraisal and Filtration ModelLei Jiang, Jianxun Liu. 850-855 [doi]
- Conditional Delegation Model Based on Weighted Roles for WorkflowJian Zhang, Niya Li, Di Luo, Lili He, Chengquan Hu. 856-861 [doi]
- An Effective Approach for Multi-Rectangle DetectionYueping He, Ziqiang Li. 862-867 [doi]
- Research on Motion Vector Accuracy in Overcomplete Wavelet-Domain Scalable Video Coding Based on Human Visual System CharacteristicsChuanming Song, Xiang-Hai Wang, Fuyan Zhang. 868-873 [doi]
- A Real-time Parallel Catmull-Clark Subdivision Algorithm on GPUJingqiao Zhang, Zhuoer Ji. 874-879 [doi]
- A Spreadsheet-like Construct for Streamlining and Reusing MashupsGuiling Wang, Shaohua Yang, Yanbo Han. 880-885 [doi]
- A New Method for Camera Motion Estimation in VideoLin Liu. 886-890 [doi]
- A Shape Distributions Retrieval Algorithm of 3D CAD Models Based on Normal DirectionHongshen Wang, Shusheng Zhang, Kaixing Zhang, Xiaoliang Bai. 891-896 [doi]
- LAD: Layered Adaptive Data Integration ArchitectureXin Sun, Derong Shen, Zhenhua Wang, Yue Kou, Tiezheng Nie, Ge Yu. 897-902 [doi]
- ECG De-noising Based on Empirical Mode DecompositionGuodong Tang, Aina Qin. 903-906 [doi]
- Reconstruction of the Visual Hull with Modified Ray-tracing and Fast Slice-based Surface ExtractionJie Zhou, Hai Chen, Yue Chen. 907-912 [doi]
- Automatic Recognition System for Numeric Characters on Ammeter Dial PlateYibo Li, Hongjuan Qian. 913-918 [doi]
- FRASCS: A Framework Supporting Context SharingTaizong Lai, Wenjun Li, Hui Liang, Xiaocong Zhou. 919-924 [doi]
- Generation of Three-Dimensional Finite Element Meshes from CT Dataset of Human FemursXin Chen, Yueshan Xiong. 925-930 [doi]
- OOV Translation Mining from Mixed-Language Snippets from a Search EngineYun-Qian Qu, Jian-Min Yao, Jun Sun, Meng Sun. 931-935 [doi]
- A Hybrid Algorithm for Solving the Optimal Layout Problem of Rectangular PiecesXingbo Jiang, Xiaoqing Lu, Chengcheng Liu, Monan Li. 936-941 [doi]
- A Robust Endpoint Detection Algorithm for Video Caption GenerationQi Li, Huadong Ma, Shuo Feng. 942-946 [doi]
- HJ-hPl: Hierarchical Mixed-Size Placement Algorithm with Priori Wirelength EstimationJie Hao, Silong Peng. 947-952 [doi]
- Wrapper Feature Selection Optimized SVM Model for Demand ForecastingYue Liu, Yafeng Yin, Junjun Gao, Chongli Tan. 953-958 [doi]
- Design and Implementation of Open Source Based Digital Preservation Experimental Platform (THDP)Ningning Ma, Chao Li, Airong Jiang, Chunxiao Xing. 959-964 [doi]
- A Design of Data Rebuilding for Decision Support in E-Government SystemGang Chen. 965-970 [doi]
- Semantic-Aware Access Control for Grid ApplicationXiyuan Chen, Yang Ouyang, Miaoliang Zhu, Yan He. 971-975 [doi]
- A Novel Approach for Classifying Human CancersShuqin Wang, Chunbao Zhou, Yingsi Wu, Jianxin Wang, Chunguang Zhou, Yanchun Liang. 976-981 [doi]
- SVM Learning from Imbalanced Data by GA Sampling for Protein Domain PredictionShu-Xue Zou, Yanxin Huang, Yan Wang, Jianxin Wang, Chunguang Zhou. 982-987 [doi]
- Fast Mutation Operator Applied in Detector Generating StrategyXingbao Liu, Zixing Cai, Chixin Xiao. 988-993 [doi]
- Research on Signaling Pathway Reconstruction Based on HMMShanhong Zheng, Chunguang Zhou, Yanwen Li, Guixia Liu. 994-999 [doi]
- Improved GVF Based Left Ventricle Segmentation from Cardiac MR Images Using Radial B-Snake ModelJia Liang, Yuanquan Wang. 1000-1005 [doi]
- A Novel Approach of Face Detection based on Skin Color Segmentation and PCAJing Zhang, Yang Liu, Seok-Wun Ha. 1006-1011 [doi]
- A Genetic Algorithm for Single Individual SNP Haplotype AssemblyJingli Wu, Jianxin Wang, Jianer Chen. 1012-1017 [doi]
- Greedily Mining l-dense Subgraphs in Protein Interaction NetworksMin Li, Jianxin Wang, Jianer Chen, Bin Hu. 1018-1023 [doi]
- Dataflow Visual Programming Language Debugger Supported by Fisheye ViewYangyi Sui, Lili Pang, Jun Lin, Xiaotuo Zhang. 1024-1029 [doi]
- A Comparison of C/C++-based Software/Hardware Co-design Description LanguagesGe Hu, Shengbing Ren, Xie Wang. 1030-1034 [doi]
- Research on Model of Dual Core Aspectual Middleware & Dynamic Weaving TechnologyBin Wang, Jian Ding, Wei Zhu, Yunqiao Tan, Jinfang Sheng. 1035-1040 [doi]
- Efficient Top-k Keyword Search on XML StreamsLingli Li, Hongzhi Wang, Jianzhong Li, Jizhou Luo. 1041-1046 [doi]
- Low Power Optimization for MPI Collective OperationsYong Dong, Juan Chen, Xuejun Yang, Canqun Yang, Lin Peng. 1047-1052 [doi]
- Scheduling Real-Time Nested Transactions in Mobile Broadcast EnvironmentsXiangdong Lei, Wuke Li, Xiaoli Yuan. 1053-1058 [doi]
- A Subsystem Division Method by ClusteringZhijian Wang. 1059-1063 [doi]
- Energy-Saving Service Scheduling for Low-End Cyber-Physical SystemsWei Jiang, Guangze Xiong, Xuyang Ding. 1064-1069 [doi]
- An Approach to Software Architecture TestingLijun Lun, Hui Xu. 1070-1075 [doi]
- Research on Translucent Mechanism-Based Infeasible PathLili Pan, Beiji Zou, Hao Chen, Haoyu Zhou. 1076-1081 [doi]
- Video Mosaic Block Detection Based on Template Matching and SVMXiaodong Huang, Huadong Ma, Haidong Yuan. 1082-1086 [doi]
- User Profile Management for Personalized Telecom ServiceHuan Wang, Xiaomin Shi, Yan Li, Heng Chang, Weiliang Chen, Jie Tang, Eduardo Martins. 1087-1092 [doi]
- A Runtime-Monitoring-Based Dependable Software Construction MethodJun Zhu, Changguo Guo, Quan Yin, Jianlu Bo, Quanyuan Wu. 1093-1100 [doi]
- Software Architectural Reflection Mechanism for Runtime AdaptationZhiyong He, Kerong Ben, Zhixiang Zhang. 1101-1105 [doi]
- Applying a Component Behavior Model to MVC PatternFangyuan Zheng, Hao Hu, Jian Lü. 1106-1111 [doi]
- Generating Test Cases of Object-Oriented Software Based on EDPN and Its MutantHongfang Gong, Junyi Li. 1112-1119 [doi]
- A Fast Center of Mass Estimation Algorithm for Coordinates of IR MarkersLingfei Zhang, Gang Chen, Dong Ye, Rensheng Che. 1120-1125 [doi]
- Decision Support in Procuring Requirements for ERP SoftwareJuntao Gao, Li Zhang, Zhiyao Wang. 1126-1131 [doi]
- Extended MRI-Cube Algorithm for Mining Multi-Relational PatternsBao Liang, Xiaoguang Hong, Lei Zhang, Shuai Li. 1132-1136 [doi]
- An Efficient Primitive Subscription Matching Algorithm for RFID ApplicationsFengliang Qi, Beihong Jin, Haibiao Chen, Zhenyue Long. 1137-1144 [doi]
- A Reflective Architecture-Aware Framework to Support Software EvolutionHaimei Zhang, Kerong Ben, Zhixiang Zhang. 1145-1149 [doi]
- A Scenario-Based Problem DecompositionXiaohong Chen, Zhi Jin. 1150-1155 [doi]
- Refinement of UML Interaction for Correct Embedded System DesignXiaojian Liu, Xuejun Liu, Jianxin Li, Yanzhi Zhao, Zhixue Wang. 1156-1162 [doi]
- A Multi-Agent System Frame Model for Dynamic IntegrationYingqiang Wang, Qingshan Li, Chenguang Zhao, Hua Xing. 1163-1168 [doi]
- The Consistency of Materialized View Maintenance and Drill-Down in a Warehousing EnvironmentJinyu Chen, Ten Long, Kangming Deng. 1169-1174 [doi]
- A Role and Context Based Access Control Model with UMLYubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu. 1175-1180 [doi]
- New Coupling and Cohesion Metrics for Evaluation of Software Component ReusabilityGui Gui, Paul D. Scott. 1181-1186 [doi]
- Partheno-Genetic Algorithm for Test Instruction GenerationZhong Ming, Xingan Jiang, Jiancong Bai. 1187-1192 [doi]
- An Experience-Based Approach for Test Execution Effort EstimationXiaochun Zhu, Bo Zhou, Li Hou, Junbo Chen, Lu Chen. 1193-1198 [doi]
- A Model of Third-Party Integration Testing Process for Foundation Software PlatformJing Gao, Yuqing Lan, Maozhong Jin. 1199-1204 [doi]
- A Markov Decision Approach to Optimize Testing Profile in Software TestingDeping Zhang, Changhai Nie, Baowen Xu. 1205-1210 [doi]
- A New Method for Test Suite ReductionRui Zhang, Jianhui Jiang, Jie Yin, Ang Jin, Jungang Lou, Ying Wu. 1211-1216 [doi]
- Using Stakeholder Analysis for Improving Statechart Merging in Software Requirement ManagementJun Cheng, Qiang Liu. 1217-1222 [doi]
- Design and Implementation of a Data Stream Load Shedding ModelDan Wang, Maozeng Li. 1223-1228 [doi]
- Web Service Discovery Based on Semantic Matchmaking with UDDITian Qiu, Pengfei Li. 1229-1234 [doi]
- Polymorphism Sequence Diagrams Test Data Automatic Generation Based on OCLHang Zhou, Zhiqiu Huang, Yi Zhu. 1235-1240 [doi]
- Mining Open Source Component Behavior and Performance for Reuse EvaluationJi Wu, Yong Po Liu, Xiao-xia Jia, Chao Liu. 1241-1247 [doi]
- Evaluating COTS Components Using Gap AnalysisJinfang Sheng, Bin Wang. 1248-1253 [doi]
- A Lightweight Snapshot-based Algorithm for Software Transactional MemoryXiaoqiang Zhang, Lin Peng, Lunguo Xie. 1254-1259 [doi]
- Mitigating Soft Errors in System-on-Chip DesignHai Yu, Fan Xiaoya. 1260-1265 [doi]
- Sound-Specific Vibration Interface: Its Performance of Tactile Effects and ApplicationsYonghee You, Hwanmun Lee, Mee Young Sung, Kyungkoo Jun, Jin-Suk Kang. 1266-1271 [doi]
- New Approach for Embedded Computer Numeric Control DevelopmentJianhua Zheng, Di Li, Zhaogan Shu, Rong Zhu. 1272-1278 [doi]
- A Particle Filtering for 3D Human Hand TrackingZhiquan Feng, Bo Yang, Yuehui Chen, Yan Jiang, Tao Xu, Haokui Tang. 1279-1284 [doi]
- A Web Performance Modeling Process Based on the Methodology of Learning from DataJianfei Yin, Zhong Ming, Zhijiao Xiao, Hui Wang. 1285-1291 [doi]
- A Novel Hardware Assisted Full Virtualization TechniqueWei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao, Dan Chen. 1292-1297 [doi]
- Design and Implementation of an Integrated Fault-Supervising System for Large HPCsChunsheng Qi, Xiao Zheng, Biying Kuang, Wei Zhou. 1298-1302 [doi]
- Formal Verification of Bypassed Processor PipelinesYanyan Gao, Xi Li. 1303-1308 [doi]
- iAIM: An Intelligent Autonomous Instruction Memory with Branch Handling CapabilityHui-Chin Yang, Li-Ming Wang, Chung-Ping Chung. 1309-1313 [doi]
- Lowering the Overhead of Hybrid Transactional Memory with Transact CacheShaogang Wang, Dan Wu, Zhengbin Pang, Wensheng Tang, Xiaodong Yang. 1314-1319 [doi]
- HHMA: A Hierarchical Hybrid Memory Architecture Sharing Multi-Port MemoryCaixia Liu, Jiaxin Li, Hongli Zhang, Qi Zuo. 1320-1325 [doi]
- Design and Evaluation of Optical Bus in High Performance ComputerLei Li, Zheng Cao, Mingyu Chen, Jianping Fan. 1326-1330 [doi]
- Journal-based Block Images for Flash Memory Storage SystemsLei Jiao, Yanyuan Zhang, Wei Lin. 1331-1336 [doi]
- Design and Implementation of Compression Algorithm Comparator for Digital Image Processing Based on ComponentYu Sheng, Weiping Wang. 1337-1341 [doi]
- The Design and Implementation of a High Performance and High Flexibility Memory Interface Architecture for Embedded ApplicationHualong Zhao, Hongshi Sang, Tianxu Zhang. 1342-1347 [doi]
- Hierarchical Storage System Based on Wireless Mesh NetworkWenying Zeng, Yuelong Zhao, Junwei Zeng. 1348-1353 [doi]
- The P2P Communication Model for a Local Memory based Multi-core ProcessorJianjun Guo, Kui Dai, Ming-che Lai, Zhiying Wang. 1354-1359 [doi]
- ISOS: Space Overlapping Based on Iteration Access Patterns for Dynamic Scratch-pad Memory Management in Embedded SystemsYanqin Yang, Zili Shao, Linfeng Pan, Minyi Guo. 1360-1366 [doi]
- A Data Storage Method Based on Query Processing Region in Wireless Sensor NetworksFangfang Li, Chuanwen Li, Xiaochun Yang, Ge Yu. 1367-1372 [doi]
- Robust Feature Extraction for the Composite Surface Mesh from STL FileShengyuan Yang, Shi Shu. 1373-1378 [doi]
- An Implementation of Parallel MLFMA on a Cluster of Computers with Distributed MemoryHailin Guo, Xiaoyan Xue, Xingang Wang, Weiqin Tong, Weili Ni. 1379-1383 [doi]
- Research on Trusted Access Technology of Grid Resource Based on the Virtual MachineZhenyu Wang, Qi Feng, Rui Xu, Zengjie Dou, Xin Chen. 1384-1388 [doi]
- Saber: Sequential Access Based cachE Replacement to Reduce the Cache Miss PenaltyYingjie Zhao, Nong Xiao. 1389-1394 [doi]
- VM-based Architecture for Network Monitoring and AnalysisQiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li. 1395-1400 [doi]
- PKI Mesh Trust Model Based on Trusted ComputingChangping Liu, Yong Feng, Mingyu Fan, Guangwei Wang. 1401-1405 [doi]
- A Fingerprint Matching Algorithm Based on B-Spline CurvesHuaqiang Yuan, Weimin Xiao, Guoqiang Han. 1406-1411 [doi]
- Security Analysis and their Improvement of Two Signature SchemesJianghong Zhang, Jianjun Xie. 1412-1417 [doi]
- An XSL Analysis on BESBuyun Qu, Lianhao Liu. 1418-1423 [doi]
- A Robust Adaptive Video Watermarking Algorithm Based on HVSGuangxi Chen, Yan Cheng, Yinghao Wang. 1424-1428 [doi]
- A Generalized Matrix-based Scrambling Transformation and its PropertiesXiongjun Li. 1429-1434 [doi]
- An Encryption Algorithm for 2D Engineering Graphics Content Based on Chaos SystemsShuaijun Li, Fei Peng. 1435-1439 [doi]
- Exposing Digital Forgeries by Detecting Traces of SmoothingChen Ying, Wang Yuping. 1440-1445 [doi]
- Asymmetric Watermarking Method Based on Subspace ProjectionMi He, Lizhi Cheng. 1446-1452 [doi]
- A Blind Watermarking Algorithm for Color Image Based on Wavelet Transform and Fourier TransformAnfeng Hu, Ning Chen. 1453-1458 [doi]
- An Optimized Natural Language Watermarking Algorithm based on TMRPeng Lu, Zhao Lu, Zili Zhou, Junzhong Gu. 1459-1463 [doi]
- A Game Theoretic Approach Based Access Control MechanismMing Zhao, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen. 1464-1469 [doi]
- An Automatic Mechanism for Sanitizing Malicious InjectionJin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu. 1470-1475 [doi]
- Hierarchical Proxy Blind Signature: A Solution to E-cash in the Real WorldZuowen Tan, Hongguang Xiao. 1476-1480 [doi]
- A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine SystemsGe Cheng, Hai Jin, Deqing Zou, Alex K. Ohoussou, Feng Zhao. 1481-1487 [doi]
- A Digital Watermarking Algorithm Based on Dual-tree Complex Wavelet TransformHongxing Lan, Songqiao Chen, Taoshen Li, Aina Hu. 1488-1492 [doi]
- Collecting Internet Malware Based on Client-side HoneypotXiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu. 1493-1498 [doi]
- Modeling Cascading Failures in Congested InternetJian Wang, Yanheng Liu, Xin Sun, Yu Jiao. 1499-1504 [doi]
- An Adaptive Topology-Based Reputation Model for Unstructured P2P NetworksJinsong Gui, Xiaoheng Deng. 1505-1510 [doi]
- Research on TCP Initial Sequence Number Prediction Method Based on Adding-weight Chaotic Time SeriesFanping Zeng, Kaitao Yin, Minghui Chen. 1511-1515 [doi]
- A Reputation Evaluation Method in P2P Anonymous EnvironmentJianquan Dong, Chao Tan, Yunqi Zhang. 1516-1521 [doi]
- Secure Relativistic Bit Commitment with Fixed Channel CapacityQin Li, Dongyang Long, Changji Wang. 1522-1526 [doi]
- A Novel Anonymous Communication Strategy with Respect to Payment MechanismYanhui Wu, Weiping Wang, Jianer Chen. 1527-1531 [doi]
- Enhanced Architecture of TPMFengHua Li, Wei Wang, Jianfeng Ma, Zhenguo Ding. 1532-1537 [doi]
- Network Security Evaluation Algorithm Based on Access Level VectorsKai Li, Naijie Gu, Kun Bi, Hongzhu Ji. 1538-1544 [doi]
- Enforcing Separation of Duty in Ad Hoc CollaborationLingli Deng, Yeping He, Ziyao Xu. 1545-1552 [doi]
- P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement StrategyBin Wang, Piao Ding, Jinfang Sheng. 1553-1558 [doi]
- A Hybrid Vulnerability Analysis Method against Non-Security ProtocolsYanmei Zhang, Jianming Zhu. 1559-1564 [doi]
- Counter-Attack Trust Model Based on Vague Set for P2P NetworksXuri Chen, Weimin Xu. 1565-1570 [doi]
- A Method Based on AMHI for DDoS Attacks Detection and DefenseKai Bu, Zhixin Sun. 1571-1576 [doi]
- An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key CryptographyMing Luo, Yingyou Wen, Hong Zhao. 1577-1582 [doi]
- Privacy Guaranteed Mutual Authentication on EPCglobal Class 1 Gen 2 SchemeJiahao Wang, Terry Ye, Edward C. Wong. 1583-1588 [doi]
- Generic Construction of Certificate-Based EncryptionYang Lu, Jiguo Li, Junmo Xiao. 1589-1594 [doi]
- Mixed Image Element Encryption SystemGuiliang Zhu, Xiaoqiang Zhang. 1595-1600 [doi]
- Encryption Scheme for Remote Sensing Images Based on EZW and ChaosLijie Yin, Jinhui Zhao, Yan Duan. 1601-1605 [doi]
- Hierarchical Data Processing Model and Complete Tree Key Management MechanismJian Xu, Fucai Zhou, Xinyang Li, Muzhou Yang. 1606-1612 [doi]
- Identity-based Broadcast Encryption Scheme with Untrusted PKGShanqing Guo, Chunhua Zhang. 1613-1618 [doi]
- An Identity-based Broadcast Encryption Protocol for Ad Hoc NetworksLeyou Zhang, Yupu Hu, Ningbo Mu. 1619-1623 [doi]
- Attribute Reduction Algorithm Research Based on Rough Core and Back EliminationGuojun Zhang, Enmin Song, Guangzhi Ma, Wei Zhang. 1624-1628 [doi]
- A Vector Matrix Iterative Self-Organizing Assistant Clustering Algorithm of XML DocumentBo Liu, LuMing Yang, Yunlong Deng. 1629-1634 [doi]
- Stability Analysis of Large-scale Time-delay Fuzzy Systems with Hybrid ModelsDegang Xu, Zhifang Su. 1635-1640 [doi]
- Real-Parameter Optimization with Modified Differential EvolutionXiaoqing Chen, Zhongxi Hou, Jianxia Liu. 1641-1646 [doi]
- Efficient Type Checking for a Subclass of Regular Expression TypesLei Chen, Haiming Chen. 1647-1652 [doi]
- A Hybrid Model for Distributed Semantic QueriesYinglong Ma, Beihong Jin, Shipeng Zhang. 1653-1658 [doi]
- Research of the INS/GPS Integrated Navigation System for High Speed TrainsHaitao Zhang, Jian Rong, Xiaochun Zhong. 1659-1663 [doi]
- Information Flow Detection and Tracking on Web2.0 BLOGS Based on Social NetworksJintao Tang, Ting Wang, Ji Wang. 1664-1670 [doi]
- DSmT Qualitative Reasoning based on 2-Tuple Linguistic Representation ModelXinde Li, Xianzhong Dai, Jean Dezert, Florentin Smarandache. 1671-1676 [doi]
- Research on Query Translation Disambiguation for CLIR Based on HowNetHonglei Zhu, Dequan Zheng, Tiejun Zhao. 1677-1682 [doi]
- Extending BLEU Evaluation Method with Linguistic WeightMuyun Yang, Junguo Zhu, Jufeng Li, Lixin Wang, Haoliang Qi, Sheng Li, Daxin Liu. 1683-1688 [doi]
- Measure Semantic Similarity between English WordsJinwu Hu, Liuling Dai, Bin Liu. 1689-1694 [doi]
- A Case Study on Chinese Text Information Filtering Method Based on User Ontology ModelBofeng Zhang, Jianguo Pan, Jianbo Hu, Zhongyuan Liu, Ruimin Zhang. 1695-1700 [doi]
- An Optimization Algorithm of Vehicle License Plate Correction Based on Minimum Projection DistanceMei Wang, Guohong Wang. 1701-1705 [doi]
- Application and Contrast in Brain-Computer Interface between Hilbert-Huang Transform and Wavelet TransformManling Huang, Pingdong Wu, Ying Liu, Luzheng Bi, Hongwei Chen. 1706-1710 [doi]
- BALC: A Belief Extension of Description Logic ALCShu-Bin Cai, Zhong Ming, Shi-xian Li. 1711-1716 [doi]
- Learning TSK Fuzzy Model by GA-BP MethodJiancheng Liu, Xinhua Jiang, Baohua Lan. 1717-1721 [doi]
- Real-time Robust Algorithm for Circle Object DetectionJianping Wu, Jinxiang Li, Changshui Xiao, Fangyong Tan, Caidong Gu. 1722-1727 [doi]
- Real-time Detection of Dynamic Obstacle Using Laser RadarBaifan Chen, Zixing Cai, Zheng Xiao, Jinxia Yu, Limei Liu. 1728-1732 [doi]
- An Approach to Cooperative Multi-Robot Map Building in Complex EnvironmentsWei Pan, Zixing Cai, Limei Liu, Baifan Chen. 1733-1737 [doi]
- A Map Building Method Based on Uncertain Information of Sonar SensorLimei Liu, Zixing Cai, Wei Pan, Baifan Chen, Lijue Liu. 1738-1742 [doi]
- Tablets Vision Inspection Approach Using Fourier Descriptors and Support Vector MachinesPeng Zhao, Shutao Li. 1743-1748 [doi]
- Tuning of the Structure and Parameters of a Neural Network Using a Good Points Set Evolutionary StrategyChixin Xiao, Zixing Cai, Yong Wang, Xingbao Liu. 1749-1754 [doi]
- Cascade Linear SVM for Object DetectionJinze Song, Tao Wu, Ping An. 1755-1759 [doi]
- Exploiting LCSVC Algorithm for Expression RecognitionShuren Zhou, Ximing Liang, Can Zhu. 1760-1765 [doi]
- Face Recognition Using Scale Invariant Feature Transform and Support Vector MachineLichun Zhang, Junwei Chen, Yue Lu, Patrick Wang. 1766-1770 [doi]
- Automata for Weak Factor RecognitionMeng Zhang, Yi Zhang, Kuo Zhao, Liang Hu. 1771-1776 [doi]
- Implementation of String Recognition Algorithm Based on the Principle of Artificial ImmunologyJunmin Ye, Junjie Wang, Wei Dong, Zhichang Qi. 1777-1782 [doi]
- The Density Connectivity Information BottleneckYongli Ren, Yangdong Ye, Gang Li. 1783-1788 [doi]
- A Segment Extraction-Combination Algorithm Based on Polygonal Approximation and Finite State Machines for On-Line Chinese Character RecognitionJing Chen, Xinqiao Lu, Qiaoling Luo, Ping Li, Xiaojuan Liu. 1789-1794 [doi]
- Multi-text Fusion Computation Based on Flexible Interval ControlLingyu Xu, Na Zhang, Wentao Huang, Shijie Sun. 1795-1800 [doi]
- A Novel Simplex Hybrid Genetic AlgorithmHongfeng Xiao, Guanzheng Tan. 1801-1806 [doi]
- Particle Clonal Genetic Algorithm Using Sequence Coding for Solving Distribution Network ReconfigurationYemei Qin, Ji Wang, Weihua Gui. 1807-1812 [doi]
- An Improved Genetic Algorithm Based on Variable Step-Size SearchGuannan Zhu, Ning Xu, Zhulin An, Yongjun Xu. 1813-1818 [doi]
- Hybrid Algorithm Combining Ant Colony Algorithm with Genetic Algorithm for Continuous DomainBo Liu, Peisheng Meng. 1819-1824 [doi]
- A Parameter-Free Clustering Algorithm Based on Density ModelJun Mu, Hongxiao Fei, Xin Dong. 1825-1831 [doi]
- An Extended Grid-based Clustering Algorithm with Referential Value of ParametersYantao Zhou, Zhengguo Wu, Xingdong Yi. 1832-1837 [doi]
- A Clustering Algorithm for Mixed Data Based on Lattice TheoryZhifang Liao, Xiaoping Fan, Yun Zhou, Kezhun Liu. 1838-1842 [doi]
- Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster SystemsWeizhe Zhang, Hongli Zhang, Xinran Liu, Xuemai Gu. 1843-1848 [doi]
- Concept Semilattice: Construction and ComplexityChengming Qi, Yingjie Tian, Shoumei Cui, Yunchuan Sun. 1849-1853 [doi]
- A Dynamic Weighted Ensemble to Cope with Concept Drifting ClassificationDengyuan Wu, Kai Wang, Tao He, Jicheng Ren. 1854-1859 [doi]
- Concept Granular System and Granular Concept LatticeHong Li. 1860-1865 [doi]
- FSMBO: Fast Time Series Similarity Matching Based on Bit OperationKaifu Lu, Shukuan Lin, Jianzhong Qiao, Ge Yu, Hualei Liu. 1866-1871 [doi]
- Algorithm for Fast Spatial Outlier DetectionAnrong Xue, Lin Yao, Shiguang Ju, Weihe Chen, Handa Ma. 1872-1877 [doi]
- An Earthquake Sequential Pattern Mining AlgorithmBased onGeneral ConstraintShaochum Wu, Minfu Fang, Yinyin Li, Bofeng Zhang. 1878-1883 [doi]
- Multi-Stage Partner Selection Based on Genetic-Ant Colony Algorithm in Agile Supply Chain NetworkZheng Lin, Lubin Wang. 1884-1889 [doi]
- Fractal Image Compression by Ant Colony AlgorithmJinjiang Li, Da Yuan, Qingsong Xie, Caiming Zhang. 1890-1894 [doi]
- Dynamic Keys Based Sensitive Information SystemXianping Wu, Phu Dung Le, Balasubramaniam Srinivasan. 1895-1901 [doi]
- A Time-Related Trust Model Based on Subjective Logic TheoryYueming Deng, Guojun Wang. 1902-1907 [doi]
- Propagation Model of Active Worms in P2P NetworksChaosheng Feng, Zhiguang Qin, Laurence Cuthbet, Laurissa Tokarchuk. 1908-1912 [doi]
- Timed CSP for Safety Specification of Hybrid SystemJinzhao Wu, Shihan Yang. 1913-1918 [doi]
- Behavior-Aware Role Based Trust ManagementLan Li, Shaojun Zhang, Lei Fan. 1919-1924 [doi]
- Trustworthiness and Quality of Context InformationRicardo Neisse, Maarten Wegdam, Marten van Sinderen. 1925-1931 [doi]
- A Search Method for the Network of Interpersonal TrustZhenhai Yang, Sheng Ge, Gang Li. 1932-1937 [doi]
- An Affair-based Interpersonal Trust Metric Calculation MethodGang Li, Sheng Ge, Zhenhai Yang. 1938-1943 [doi]
- DBTG: Demand-Driven Backtracking Test GenerationShaoyin Cheng, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing. 1944-1950 [doi]
- Trusted Transmission Protocol for Content SecurityLi Li, Guosun Zeng, Bo Chen. 1951-1956 [doi]
- Constructing Trust Networks Based on Small-World TheoriesJun Zheng, Yan Qin, Jianyong Zhu, Xinyou Li. 1957-1962 [doi]
- FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust ModelJianli Hu, Quanyuan Wu, Bin Zhou. 1963-1968 [doi]
- A Cost Model Analysis of a Secure Key Distribution CentreYishi Zhao, Nigel Thomas. 1969-1974 [doi]
- Trust Path-Searching Algorithm Based on PSOZhiwen Zeng, Ya Gao, Zhigang Chen, Xiaoheng Deng. 1975-1979 [doi]
- Efficient Hardware for Modular Exponentiation using the Sliding-Window Method with Variable-Length PartitioningNadia Nedjah, Luiza de Macedo Mourelle. 1980-1985 [doi]
- Attacks vs. Countermeasures of SSL Protected Trust ModelFang Qi, Zhe Tang, Guojun Wang. 1986-1991 [doi]
- Trust in Business ProcessesNicolai Kuntze, Andreas Schmidt, Zaharina Velikova, Carsten Rudolph. 1992-1997 [doi]
- A New Approach to Securing Broadcast Data in Sensor NetworksA. S. Poornima, B. B. Amberker. 1998-2001 [doi]
- A Trust-Enabling Support for Goal-Based ServicesLuiz Olavo Bonino da Silva Santos, LuÃs Ferreira Pires, Marten van Sinderen. 2002-2007 [doi]
- Developing a Trusted System for Tracking Asset on the MoveTianle Zhang, Zongwei Luo, Feng Zhou, Xudong Yang. 2008-2013 [doi]
- Study and Implementation of a Solution to Security Management for Mobile Environments Based on TupleDesire Nguessan, José Sidnei Colombo Martini. 2014-2020 [doi]
- A Number Theoretic Memory Bounded Function and Its ApplicationsQi Cheng, Yu-Hsin Li. 2021-2025 [doi]
- Protection against Mobile Adversaries in Mobile Ad-hoc NetworksRonghua Shi, Yanhua Yan. 2026-2031 [doi]
- Scheduling Framework and Algorithms for Large-Scale Divisible Load Processing with Multi-Dimensional QoS ConstraintsKaibo Wang, Xingshe Zhou, Shandan Zhou. 2032-2037 [doi]
- Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor NetworksRiaz Ahmed Shaikh, Hassan Jameel, Brian J. d Auriol, Sungyoung Lee, Young-Jae Song, Heejo Lee. 2038-2043 [doi]
- A Credit Mechanism Based on Automatic Audit in P2P File Sharing SystemsRuixuan Li, Cuihua Zuo, Yuntian He, Zhengding Lu. 2044-2049 [doi]
- Copyright Protection Using a Computational Watermarking SchemeQi Jiang, Dongfeng Han, Yi Li, Wenhui Li. 2050-2054 [doi]
- Validating X.509 Certificates Based on their QualityAhmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri. 2055-2060 [doi]
- A New Biometric Identity Based Encryption SchemeNeyire Deniz Sarier. 2061-2066 [doi]
- Correlation Power Analysis Attack against Synchronous Stream CiphersKeke Wu, Huiyun Li, Bo Peng, Fengqi Yu. 2067-2072 [doi]
- A Byte-Filtered String Matching Algorithm for Fast Deep Packet InspectionKun Huang, Dafang Zhang. 2073-2078 [doi]
- Analysis of Electronic Commerce Protocols Based on Extended Rubin LogicYang Xu, Xiaoyao Xie. 2079-2084 [doi]
- On the Linear Structures of Cryptographic Rotation Symmetric Boolean FunctionsEsam Elsheh. 2085-2089 [doi]
- Modified Huang-Wang s Convertible Nominative Signature SchemeWei Zhao, Dingfeng Ye. 2090-2095 [doi]
- A CDH-Based Multi-Signature Scheme with Tight Security ReductionZecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li. 2096-2101 [doi]
- Certificateless Concurrent Signature SchemeZhenjie Huang, Xuanzhi Lin, Rufen Huang. 2102-2107 [doi]
- Enforcement of Spatial Separation of Duty ConstraintWeihe Chen, Zhu Tang, Shiguang Ju. 2108-2114 [doi]
- Hierarchical Identity-Based Online/Offline EncryptionZhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo. 2115-2119 [doi]
- Performance Analysis of the HLLACFXin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang. 2120-2124 [doi]
- Towards Trusted Broadcast EncryptionEmanuele Cesena, Gianluca Ramunno, Davide Vernizzi. 2125-2130 [doi]
- Deniable Proxy-Anonymous SignaturesChengyu Fan, Shijie Zhou, Fagen Li. 2131-2136 [doi]
- A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure ChannelsKurt Dietrich. 2137-2142 [doi]
- Enhanced Correlation Power Analysis Attack on Smart CardHuiyun Li, Keke Wu, Bo Peng, YiWei Zhang, Xinjian Zheng, Fengqi Yu. 2143-2148 [doi]
- Analysis on the Robust Yet Fragile Nature of Internet: Load, Capacity and the Cascading Failure Avalanche EffectChi Guo, Lina Wang, Furong Zhou, Lainv Huang, Zhen Peng. 2149-2153 [doi]
- A Route Flap Suppression Mechanism Based on Dynamic Timers in OSPF NetworkFang Wang, Shanzhi Chen, Xin Li, Yuhong Li. 2154-2159 [doi]
- A PIN-Based Dynamic Software Fault Injection SystemAng Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou. 2160-2167 [doi]
- A Formal Approach to Robustness Testing of Network Protocol with Time ConstraintsChuanming Jing, Xia Yin, Zhiliang Wang, Jianping Wu. 2168-2174 [doi]
- An Enhanced Factoring Algorithm for Reliability Evaluation of Wireless Sensor NetworksYufeng Xiao, Shanzhi Chen, Xin Li, Yuhong Li. 2175-2179 [doi]
- A Deployable Architecture against Application-level DDoS AttacksXiaolin Chen, Hui Deng, Feng Wang, Mu Mu, Sanglu Lu. 2180-2185 [doi]
- Fault-Tolerant Scheduling for Periodic Tasks based on DVFSPing Zhu, Fumin Yang, Gang Tu, Wei Luo. 2186-2191 [doi]
- A Defending Mechanism against DDoS Based on Registration and AuthenticationWei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang. 2192-2197 [doi]
- Two Stochastic Models for Security Evaluation Based on Attack GraphYinqian Zhang, Xun Fan, Zhi Xue, Hao Xu. 2198-2203 [doi]
- Strategies on Algebraic Attacks Using SAT SolversBaiqiang Chen. 2204-2209 [doi]
- ECL: A TLS Extension for Authentication in Complex PKIsPaul Rabinovich. 2210-2215 [doi]
- A Secure Network Admission and Routing Model Based on Trust TheoryChi Guo, Lei Zhao, Lina Wang, Zhejun Fang. 2216-2221 [doi]
- An Enhancement of Trusted Domain Enforcement using VMM Interruption MechanismRuo Ando, Youki Kadobayashi, Yoichi Shinoda. 2222-2229 [doi]
- A User Trustworthiness Based Lightweight Access ControlRui Zhu, Changguo Guo, Huaimin Wang, Hailin Gong. 2230-2234 [doi]
- Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User AnonymitySeil Kim, Ji Young Chun, Dong-Hoon Lee. 2235-2239 [doi]
- TNC-UTM: A Holistic Solution to Secure Enterprise NetworksFachao Deng, An an Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, Dongsheng Peng. 2240-2245 [doi]
- Service Authenticity in P2P File-SharingLingli Deng, Yeping He, Ziyao Xu. 2246-2253 [doi]
- Building an Independent Integrated Authentication ServiceZhexuan Song, Seigo Kotani, Ryusuke Masuoka. 2254-2259 [doi]
- A New Wireless Mesh Network Authentication Scheme Based on Threshold MethodYatao Yang, Yonghao Gu, Xi Tan, Lina Ma. 2260-2265 [doi]
- Lightweight Integrated Authentication for Tactical MANETsHelen Tang, Mazda Salmanian. 2266-2271 [doi]
- A Scheme of Test Pattern Generation Based on Reseeding of Segment-Fixing CounterTian Chen, Huaguo Liang, Minsheng Zhang, Wei Wang. 2272-2277 [doi]
- A BLP-Based Access Control Mechanism for the Virtual Machine SystemChuliang Weng, Yuan Luo, Minglu Li, Xinda Lu. 2278-2282 [doi]
- Dynamic Trustiness Authentication Framework Based on Software s Behavior IntegrityGuojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu. 2283-2288 [doi]
- Formal Analysis of a TPM-Based Secrets Distribution and Storage SchemeRonald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael Chung-Wei Phan, Roderick Bloem. 2289-2294 [doi]
- Implementation of Pointer Logic for Automated VerificationZhifang Wang, Yiyun Chen, Zhenming Wang, Wei Wang, Bo Tian. 2295-2301 [doi]
- Design of Some Artificial Immune Operators in Software Test Cases GenerationJunmin Ye, Zemei Zhan, Zhenfang Zhang, Wei Dong, Zhichang Qi. 2302-2307 [doi]
- A New Direct Anonymous Attestation Scheme from Bilinear MapsXiaofeng Chen 0004, Dengguo Feng. 2308-2313 [doi]
- An Easy-to-Deploy Penetration Testing PlatformBing Duan, Yinqian Zhang, Dawu Gu. 2314-2318 [doi]
- Fingerprinting Executable Programs Based on Color Moments of a Novel Abstract Call GraphZhiyi Yin, Jianming Fu, Fuxi Zhu, Fanchen Su, Haitao Yao, Fen Liu. 2319-2324 [doi]
- A Method to Generate Embedded Real-Time System Test Suites Based on Software Architecture SpecificationsJunmin Ye, Wei Dong, Zhichang Qi. 2325-2329 [doi]
- A Test Method of Trusted Computing Supporting SoftwareFan He, Huanguo Zhang, Mei Tang. 2330-2334 [doi]
- Research on Automated Testing of the Trusted Platform ModelJing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li. 2335-2339 [doi]
- A Generalized Trusted Virtualized Platform ArchitectureAnbang Ruan, Qingni Shen, Yuanyou Yin. 2340-2346 [doi]
- Model-Driven Remote Attestation: Attesting Remote System from Behavioral AspectLiang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei. 2347-2353 [doi]
- Efficient Identity-Based Key Issue with TPMZhi Guan, Huiping Sun, Zhong Chen, Xianghao Nan. 2354-2359 [doi]
- Secure Boot RevisitedKurt Dietrich, Johannes Winter. 2360-2365 [doi]
- An Analysis to Understand Software TrustworthinessThomas Tan, Mei He, Ye Yang, Qing Wang, Mingshu Li. 2366-2371 [doi]
- Discuss on Applying SPC to Quality Management in University EducationZiren Wang, Ronghua Liang. 2372-2375 [doi]
- Thought and Tentative Idea of Reform in Formative AssessmentJian Xiang, Lv Ye. 2376-2380 [doi]
- Enhancing Foundation to Foster Competence of Independent College StudentsJianjun Xie, Junhong Li, Yi Geng. 2381-2385 [doi]
- Research about the Model of Quality-Oriented Education and Ability Cultivation to College StudentsYoutian Qu, Chaonan Wang. 2386-2390 [doi]
- Discussion on Computer Education Mode of Engineering Course in Independent CollegeJialin Cui, Yigang Wang, Shengli Fan, Zhuoyuan Wang, Shenghuai Xu. 2391-2395 [doi]
- An Approach of Multi-Tactics in Programming Language EducationHaiwei Jin. 2396-2401 [doi]
- Research on the Teaching Reform of Operating System CoursesJinfeng Dou, Jiabao Cao, Yongguo Jiang, Zhongwen Guo. 2402-2406 [doi]
- System Dynamics Modeling and Simulation in Software Engineering EducationMinghui Wu, Hui Yan. 2407-2411 [doi]
- An Undergraduate Parallel and Distributed Computing Course in Multi-Core EraJianhua Li, Weibin Guo, Hong Zheng. 2412-2416 [doi]
- Research on the Diversification Training Mode of Software Talents Based on University-Enterprise CooperationPenglin Li, Zhi Liu, Xingbo Guo. 2417-2421 [doi]
- Teaching Design Patterns: A Modified PBL ApproachHong Huang, Dongyong Yang. 2422-2426 [doi]
- A Reflective Learning Model to Computer UndergraduatesMuyun Yang, Lixin Wang, Haoliang Qi, Tiejun Zhao, Sheng Li. 2427-2431 [doi]
- A New Approach to Teaching Logic in Discrete MathematicsYi Li. 2432-2437 [doi]
- Exploring the Way of Training High-Level Software Talents with Global Reach in ChinaHuifang Deng. 2438-2443 [doi]
- Practice and Discussion on a New Teaching Mode of Case Guide Learning in Basic of Database ApplicationXiaoqing Feng, Jianping Han. 2444-2448 [doi]
- Using cP^2BL in Teaching Multi-Core Related ContentsJianfeng Yang, Yinbo Xie, Qing Geng, Jolly Wang, Nick Bao. 2449-2453 [doi]
- Learning from Practicing: Adaptation of NIIT(India) Model for Software Developer Training to Chinese Higher Vocational and Technical CollegesLuo Li, Shaogen Wu, Jia Luo. 2454-2458 [doi]
- The Discussion and Design of Innovative Education Modein the College and UniversityYoutian Qu, Chaonan Wang. 2459-2463 [doi]
- A New Evaluation Method Based on Measuring of Medium Truth ScaleNingning Zhou, Zhengxu Zhao, Yulong Deng. 2464-2469 [doi]
- Research and Design of Educational Resource Information Center for Investors Based on J2EEKai Cao, Xiaoyun Zhu. 2470-2475 [doi]
- A Framework of Deriving Adaptive Feedback from Educational OntologiesBen Liu, Hejie Chen, Wei He. 2476-2480 [doi]
- A Linux-based Development and Application of Automatic Test SystemWen Ding, Qing Wu, Weihua Hu, Zhiling Hu, Hongbiao Xie. 2481-2484 [doi]
- The Research in Grade Teaching of Elementary Course of ComputerHaijun Mao, Haiyan Ma, Hong Zhuang, Penyin Wang. 2485-2489 [doi]
- Theory and Application of School-Based Education Quality Evaluation Model Constructed from Improved AHP MethodYu Chen, Yuefeng Zheng, Decai Huang, Song en Sheng, Jianqing Shi. 2490-2494 [doi]
- A Method of Elicitation Teaching for Object-Oriented Analysis and Design CurriculumHuiqiang Lin, Caixing Liu, Piyuan Lin. 2495-2500 [doi]
- Research on the Teaching Method of Combining the Theory and Practice in Data Structure CourseZhi Liu, Huaguo Jia, Shanshan Han. 2501-2506 [doi]
- Reform and Practice in Teaching J2EE ProgrammingGuanlin Chen, Wenyong Weng. 2507-2511 [doi]
- Research on Teaching Reform of Computer Basic Courses in Technology UniversitiesXuming Han, Limin Wang, WanLi Zuo, Hongzhi Wang, Guojun Chen. 2512-2516 [doi]
- Personalized Instructing Recommendation System Based on Web MiningLiang Zhang, Xiumin Liu, Xiujuan Liu. 2517-2521 [doi]
- Practical Training in the Embedded System Education: A New Way to Narrow the Gap with IndustryHongjun Dai, Zhiping Jia, Xueqing Li, Yitao Guo. 2522-2527 [doi]
- Introduction to the Reform on the Course of Fundamental Logic and Computer DesignQingsong Shi, Wei Hu, Sha Liu, Tianzhou Chen. 2528-2532 [doi]
- Teaching Plan for Assembly Language and Programming: Conditional Directives and Macro DirectivesJun Zhang, Fuxiang Gao, Jian Wang. 2533-2535 [doi]
- Breaking Boundaries among Hardware Curriculums by EDA TechnologyJiangbo Qian, Rangding Wang, Guang Jin, Yuan Li. 2536-2540 [doi]
- Research and Practice of Experimental Simulation Platform for Course of Digital LogicLijie Ren, Zhongwen Guo, Yongguo Jiang, Hao Wu. 2541-2545 [doi]
- Designing a Multi-Processor Education Board for High-Performance Embedded ProcessingYijun Liu, Banghai Wang, Guobo Xie, Pinghua Chen, Zhenkun Li. 2546-2551 [doi]
- Computer Ability Assisted Assessment System for Large-Scale Heterogeneous Distributed EnvironmentsQing Wu, Wen Ding, Weihua Hu, Bishui Zhou, Tianzhou Chen. 2552-2555 [doi]
- Research of Automatic Question Answering System in Network TeachingJinzhong Xu, Keliang Jia, Jibin Fu. 2556-2560 [doi]
- A Novel Self-Studying Platform with its Application to Programming CoursesYunfu Shen, Yue Wu, Mingjun Xin, Yu Zheng. 2561-2566 [doi]
- An FPGA-Based Experiment Platform for Multi-Core SystemJianguo Xing, Wenmin Zhao, Hua Hu. 2567-2571 [doi]
- Research on Curriculum Design of Real-time Analysis and Design Based on Multi-core PlatformZhongwen Li, Wuling Lv. 2572-2576 [doi]
- Question Answering System in Network Education Based on FAQKeliang Jia, Xiuling Pang, Zhinuo Li. 2577-2581 [doi]
- Research on Networking Laboratory Design and TrainingFei Hong, Yu Bai. 2582-2587 [doi]
- Design of an Expandable Website Platform for Quality Course ClusterShuoping Wang, Gaoyan Zhang, Jun Liu. 2588-2591 [doi]
- Experimental Design of Applying Intelligent Computation to NIR Spectral Data MiningHaiqing Yang, Yong He. 2592-2597 [doi]
- Research on Experimental Platform and Methods for the Course Interface and Communication Jianwen Feng, Guojun Dai, Peng Liu, Xingfa Shen. 2598-2603 [doi]
- Experiences of Simulation Training with Computer Technology in Police CollegeShulong Li. 2604-2608 [doi]
- The Practice of Remote Education on Information SecurityWei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen. 2609-2613 [doi]
- Content-based School Assignment Cluster AlgorithmJuan Feng, Jie Zhao, Guohua Zhan. 2614-2618 [doi]
- The Exploration and Practice of Embedded System Curriculum in Computer Science fieldZhenkuan Pan, Yanbin Fan. 2619-2624 [doi]
- Integrated Application of Project Cases in Programming CourseRongchun Chen, Lixin Xue. 2625-2629 [doi]
- Application of the Attribution Theory in Improving Computer Study Effects of University StudentsQiaoming Pan, Yongqiang Zhu, Wei Zhu. 2630-2635 [doi]
- The Practice Training in the Software Engineering EducationPing Huang, Mingrui Chen, Shaofan Chen. 2636-2640 [doi]
- Research on Construction Mode of Using Internet to Boost Language C TeachingWenxiang Zhang, Siyou Xiao, Xiaoyong Wang, Xuping Zhu. 2641-2646 [doi]
- Domain Ontology Learning for Question Answering System in Network EducationJibin Fu, Keliang Jia, Jinzhong Xu. 2647-2652 [doi]
- Application of Project-Based Cooperative Learning in Computer EducationHai Wang, Lihe Hu, Yunhe Lu, Po Hu. 2653-2658 [doi]
- Research and Practice in Undergraduate Embedded System CourseXiumin Shi, Ji Zhang, Yanbing Ju. 2659-2663 [doi]
- Exploration of Curriculum Structures and Educational Models of Database ApplicationsRongliang Luo, Minghui Wu, Yong Zhu, Yunru Shen. 2664-2668 [doi]
- Dynamic Demo System of Data Structure with C++/MFCZhi Liu, Jian Lu, Xiaochun Dai. 2669-2674 [doi]
- Investigating on the Curriculum Visions of Computing DisciplinesLong Hong, Yanli Chen, Ningning Zhou, Fangwu Yao. 2675-2680 [doi]
- University-Industry Collaboration for Software Engineering TeachingWeidong Zhao, Anhua Wang. 2681-2685 [doi]
- Experiences in Software Testing Education: Some Observations from an International CooperationJoseph Timoney, Stephen Brown, Deshi Ye. 2686-2691 [doi]
- Analysis of a C Language Teaching Example Based on the ARCS Model: The Basic Concept and Use of StructureMin Lu, Xiaoyu Jin. 2692-2695 [doi]
- Exploration and Practice on Teaching Java as Introductory Language for Non-CSE Major StudentsJianping Han, Weihua Hu, Xiaoqing Feng. 2696-2700 [doi]
- A Hybrid Forecasting Model Based on Chaotic Mapping and Improved v-Support Vector MachineQi Wu, Hongsen Yan, Hongbing Yang. 2701-2706 [doi]
- Application of Multivariable Time Series Based on RBF Neural Network in Prediction of Landslide DisplacementYao Zeng, Echuan Yan, Chunfeng Li, Ying Li. 2707-2712 [doi]
- Vibration Signal Analysis of Rotor System Based on Time-Frequency AttributesLing Xiang, Guiji Tang, Yongli Zhu. 2713-2717 [doi]
- Analyzing the Self-similarity of the TCP Bulk FlowXiangdong Liu, Junxing Zhang, Jinhai Zhang, Xinqin He. 2718-2721 [doi]
- Forecasting Air Quality Based on ChaoticFull-AreaMethodGuoran Rao, Ping Liang. 2722-2726 [doi]
- Prediction of Vessel Traffic Accident Based on Chaotic TheoryJinyong Zhou, Lan Gao, Qing Hua. 2727-2731 [doi]
- Chaotic Behavior of Ship Swaying Motions in Irregular WavesJianjun Hou, Fang Dong, Yundong Han. 2732-2737 [doi]
- Experimental and Simulation Investigation in Fractal Dimension of Supersonic CombustionHaiyan Wu, Hongbo Wang, Mingbo Sun, Jin Zhou. 2738-2742 [doi]
- The Study on Fractals of Internet Router-level TopologyJun Zhang, Hai Zhao, Guilan Luo, Yan Zhou. 2743-2747 [doi]
- Scientific Collaboration Network Evolution Model Based on Motif EmergingXiuchun Shi, Longde Wu, Hongyong Yang. 2748-2752 [doi]
- Hash Function Construction Based on Chaotic Coupled Map NetworkYurong Song, Guoping Jiang. 2753-2758 [doi]
- Analytical Criteria for the Local Activity of Three-Port CNN with Five State Variables: Analysis and ApplicationYu Ji, Lequan Min, Yan Meng. 2759-2765 [doi]
- Nonlinear Dynamic Characteristics of Traffic Flow based on Continuous Car-following Model with Nonintegral ExponentZhiwen Zhu, Hongli Wang, Hongchen Han, Jia Xu. 2766-2770 [doi]
- A New Susceptible-Infected Model of Malware Propagation in the InternetYiran Gu, Yurong Song, Guoping Jiang, Suoping Wang. 2771-2775 [doi]
- Research and Analysis of Securities Market based on Multi-Fractal GeneratorZhiliang Zhu, Jingping Song, Aoshuang Dong, Hai Yu, Ye Yang. 2776-2781 [doi]
- Cryptanalysis of a Chaos-based Stream CipherBin Zhang, Chenhui Jin. 2782-2785 [doi]
- Application of Chaos in Digital Fountain CodesQian Zhou, Zengqiang Chen. 2786-2791 [doi]
- An Improved Image Encryption Algorithm Based on ChaosDongming Chen, Zhiliang Zhu, Guangming Yang. 2792-2796 [doi]
- A Novel Binary Image Digital Watermarking Algorithm Based on DWT and Chaotic EncryptionTianKai Sun, XiaoGen Shao, Xingyuan Wang. 2797-2802 [doi]
- A Secure and Efficient Fingerprint Images Encryption SchemeZhao Song, Li Hengjian, Yan Xu. 2803-2808 [doi]
- A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos ScramblingFei Peng, Tao Deng, Min Long. 2809-2813 [doi]
- A New Hyper-Chaotic Algorithm for Image EncryptionYongliang Xiao, Limin Xia. 2814-2818 [doi]
- The Scroll Control of a New Chaotic SystemChunbiao Li, Hankang Wang. 2819-2823 [doi]
- Study on the Chaotic WaveHong Chen, Qun Ding, Jing Pang. 2824-2829 [doi]
- Study on the Nonlinear Dynamic Characteristic of Cone Penetrate Test CurveJiangdong Cai, Daoming Zhang, Zhenquan Jiang. 2830-2834 [doi]
- Research on Optimal Control of Vehicle Vibration Based on Semi-Active Suspension SystemJia Xu, Hongli Wang, Zhiwen Zhu, Gen Ge. 2835-2839 [doi]
- Generating Multi-Wing Butterfly Attractors from the Piecewise-Linear Chen SystemChaoxia Zhang, Simin Yu, Jinhu Lu, Guanrong Chen. 2840-2845 [doi]
- Application of Local Activity Theory to Rossler CNN ModelYan Meng, Lequan Min, Yu Ji. 2846-2851 [doi]
- Targets Assignment for Cooperative Multi-UAVs Based on Chaos Optimization AlgorithmWei Ou, Fengxing Zou, Xiaohong Xu, Gao Zheng. 2852-2856 [doi]
- Forward Displacement Analysis of the 4SPS-2CCS Generalized Stewart Platform Based on Hyper-Chaotic Neural Network Mathematical Programming MethodYouxin Luo, Xiguang Huang, Bin Zeng. 2857-2862 [doi]
- Topological Entropy and Complexity of One Class of Cellular Automata RulesFangfang Chen, Fangyue Chen, Weifeng Jin, Lin Chen. 2863-2867 [doi]
- Complex Symbolic Dynamics of Bernoulli Shift Cellular Automata RuleLin Chen, Fangyue Chen, Fangfang Chen, Weifeng Jin. 2868-2873 [doi]
- On Definitions of Chaos in Discrete Dynamical SystemLidong Wang, Xiuying Xing, Zhenyan Chu. 2874-2878 [doi]
- Hausdorff Dimension of a Class of Self-affine Fractals Generated by Linear Fibre CodingYongxin Gui, Zhiming Zhou. 2879-2884 [doi]
- Numeration and Comparison of Two Kinds of Lyapunov Dimensions in Autonomous Chaotic FlowsYandong Chu, Xianfeng Li, Jiangang Zhang, Yingxiang Chang. 2885-2889 [doi]
- A New Method to Estimate Additive Noise in Synchronized OscillationsNan Yang, Zhangcai Long, Xianghui Zhao. 2890-2894 [doi]
- Chaos Study of the Lamprey Neural System via Improved Small Dataset MethodYunlong Li, Pingjian Zhang. 2895-2899 [doi]
- A Note on Chaos Synchronization of Generalized Lorenz SystemsYun Chen, Guanrong Chen, Xiaofeng Wu. 2900-2902 [doi]
- Modified Projective Synchronization among Three Modified Chen Chaotic Systems with Unicoupled Response SystemXu Yuhua, Zhou Wuneng, Deng Lebin, Lu Hongqian. 2903-2907 [doi]
- Generalized Cascade Synchronization of Discrete-time Henon-like MapYin Li, Biao Li, Yong Chen. 2908-2913 [doi]
- Experimental Investigation on Impulsive Synchronization of Chaotic PN Sequences Based on FPGAXulei Bao, Guangyi Wang, Cuiping Wang, Wei Feng. 2914-2918 [doi]
- Synchronization of Rikitake Chaotic Attractor via Partial System StatesJigui Jian, Yanjun Shen, Hui Yu. 2919-2924 [doi]
- Improved Full State Hybrid Projective Synchronization ofChaotic Systems with the Different OrderJianning Yu, Jiangang Zhang, Li Zhang. 2925-2930 [doi]
- Anticipating Synchronization of Chaotic Systems with Parameter MismatchQi Han, Chuandong Li, Junjian Huang, Xiaofeng Liao, Tingwen Huang. 2931-2936 [doi]
- Chaos and Synchronization of Time-Delayed Fractional Neuron Network SystemHao Zhu, Shangbo Zhou, Weiwei Zhang. 2937-2941 [doi]
- A Block Location Scrambling Algorithm of Digital Image Based on Arnold TransformationZhenwei Shang, Honge Ren, Jian Zhang. 2942-2947 [doi]
- Application of Image Recognition Technology based on Fractal Dimension for Diesel Engine Fault DiagnosisYanping Cai, Shu Cheng, Yanping He, Ping Xu. 2948-2953 [doi]
- Fractal Image Compression Based on Number of Hopping and Variance of Continuing Positive and Negative PixelsZhen Qin, Hai Yu, Jinling Ju. 2954-2958 [doi]
- Medical Image Retrieval Based on Fractal DimensionJianhua Wu, Chunhua Jiang, Liqiang Yao. 2959-2961 [doi]
- Golden Section in 3D Plants IFS ReconstructionYan Wang, Lanling Zeng, Yan Qi. 2962-2967 [doi]
- Research of Plant Growth Model Based on the Combination of L-system and SketchBowen Sun, Litao Jiang, Boling Sun, Shengtao Jiang. 2968-2972 [doi]
- Video Image Targets Detection Based on the Largest Lyapunov ExponentShaoqing Yang, Sihua He, Hongwen Lin. 2973-2977 [doi]
- Facial Affection Recognition Algorithm Based on Gabor Wavelet Transformation and Fractal DimensionJixiang Ye, Guanzheng Tan. 2978-2982 [doi]
- An Unsymmetrical Hyperchaotic AttractorBocheng Bao, Zhong Liu, Zhusheng Kang, Jianping Xu, Xiaohua Qiao. 2983-2988 [doi]
- Delay Adjusted Noise Effect in Coupled Nonlinear ChemicalSystemLin Ji, Xiufeng Lang, Guowei Deng. 2989-2993 [doi]
- A New Method of Financial Risk Management Based on MultifractalShuang Ma, Aiping Jiang. 2994-2998 [doi]
- Subprime Mortgage Crisis Detection in U.S. Foreign Exchange Rate Market by Multifractal AnalysisJunjun Tang, Jing Wang, Cheng Huang, Guolun Wang, Xiong Wang. 2999-3004 [doi]
- Research on Chinese Economic Effect of Central Bank Raising Interest Rates Based on System DynamicsHuanmei Qin. 3005-3010 [doi]
- On the Chaotic Dynamics Analysis of China Stock MarketLiangsheng Chen. 3011-3015 [doi]
- A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat MapHongjuan Liu, Zhiliang Zhu, Huiyan Jiang, Beilei Wang. 3016-3021 [doi]
- Chaotic Time Series Forecasting Base on Fuzzy Adaptive PSO for Feedforward Neural Network TrainingWenyu Zhang, Jinzhao Liang, Jianzhou Wang, Jinxing Che. 3022-3027 [doi]
- Stability and Hopf Bifurcation in a Generalized Prototype Delayed SystemJunbiao Guan, Shujuan Guo, Xinchu Fu. 3028-3032 [doi]
- A Rigorous Computer-Assisted Verification of Horseshoe Chaos in a Seasonally Forced SEIR Epidemic ModelWenjuan Wu, Zengqiang Chen, Zhuzhi Yuan. 3033-3038 [doi]
- The Analysis and Circuit Implementation of a New Hyper-Chaos SystemHongyan Jia, Zengqiang Chen, Zhuzhi Yuan. 3039-3044 [doi]
- A Novel Fourth-Order Chaotic Circuit and Its ImplementationZhusong Liu, Simin Yu, Guobo Xie, Yijun Liu. 3045-3050 [doi]
- Optimization of One-Dimensional Coded Modulations Using Chaotic MapsHeng Song, Jingbo Guo. 3051-3056 [doi]
- A Chaotic Image Encryption Scheme Based on Circular Bit Shift MethodChong Fu, Zhiliang Zhu. 3057-3061 [doi]