Abstract is missing.
- Finding the best tradeoff between multi resolution content reproduction quality and multi resolution content distribution efficiencyRomain Cavagna, Maha Abdallah. 1-2 [doi]
- Hybrid Differential Evolution and Sequential Quadratic Programming AlgorithmWenhui Shou, Wenhui Fan, Zhenxiao Gao, Boyuan Liu. 3-6 [doi]
- Research of the Computer Virus Evolution Model Based on Immune Genetic AlgorithmLihua Wu, Yu Zhang. 9-13 [doi]
- Geospatially-Aware Access Control for Distributed Spatial Database Based on View MechanismLi Shu, Jiayuan Lin, Jiliu Zhou. 17-20 [doi]
- Identifying the ß-Hairpin Motifs in Enzymes by Using Support Vector MachineXingxing Liu, Xiuzhen Hu. 21-26 [doi]
- Predicting of Oxidoreductase and Lyase Subclasses by Using Support Vector MachineYing Wang, Xiuzhen Hu. 27-31 [doi]
- Achieve Load Balancing with a Re-routable LB-BvN Switching SchemeHongchang Chen, Hongchao Hu, Peng Yi, Shuqiao Chen. 35-41 [doi]
- Adaptive Vehicle Traces Routing for Vehicular Ad-Hoc NetworkSaeid Ahmadi Arzil, Majid Hosseinpour Aghdam, Mohammad Ali Jabraeil Jamali. 42-47 [doi]
- Multihomed HWN Policy Framework Signalling DeliveryChong Shen, Wencai Du, Yonghui Zhang, Shipu Zheng, Yong Bai. 48-52 [doi]
- Power Function Companding Scheme for Peak-to-Average Power Ratio Reduction of SC-FDMA SignalsEnchang Sun, Pengbo Si, Ruizhe Yang, Yanhua Sun, Yanhua Zhang. 53-57 [doi]
- Game-Theoretic Approach against Selfish Attacks in Cognitive Radio NetworksMi Yan, Liang Du, Lianfen Huang, Liang Xiao, Jianbin Tang. 58-61 [doi]
- Multiprocessor System-on-Chip Design with Fuzzy Dynamic Scheduling for Parallel Video ProcessingDa Li, Yibin Hou, Zhangqin Huang, Chunhua Xiao. 65-70 [doi]
- Automatic Detection Model of Malware Signature for Anti-virus Cloud ComputingLihua Wu, Yu Zhang. 73-75 [doi]
- Enforcing Relaxed Declassifications with Reference PointsCong Sun, Liyong Tang, Zhong Chen. 76-81 [doi]
- Keep Consistency: A Data Backup and Recovery Mechanism in TPMYumeng Feng, Guangyuan Shi. 82-87 [doi]
- Clustering XML Elements for Efficient Code GenerationShah Yaser Maqnoon Nadvi, Rashedur M. Rahman. 91-96 [doi]
- Automating Data Preprocessing with DMPML and KDDMLPaulo M. Goncalves, Roberto Souto Maior de Barros. 97-103 [doi]
- Detecting and Visualizing Profile Correlation in SubspaceXin Xu, Wei Wang, Xin Chen. 104-109 [doi]
- DOPCA: A New Method for Calculating Ontology-Based Semantic SimilarityMingxin Gan, Xue Dou, Daoping Wang, Rui Jiang. 110-115 [doi]
- Evaluation of Social Stability Based on Multi-class Support Vector MachineQianqian Li, Yijun Liu, Wenyuan Niu. 116-119 [doi]
- Global and Local Spatial Data Mining on Literacy Rates of BangladeshRashedur M. Rahman, Mridul Khan, A. K. M. Zahiduzzaman, Nahyan Kashem. 120-125 [doi]
- Scaling Behavior of Time Series and an Empirical Indication to Financial PredictionErbo Zhao, Shijie Jiang, Dan Luo, Yun Bao, Zhangang Han. 126-131 [doi]
- Functional Dependency Mining: Harnessing Multicore SystemsGhada Gasmi, Amira Béji, Yahya Slimani, Lotfi Lakhal. 135-139 [doi]
- Detection of Regular Predicates in a Whole Space in Distributed ComputationHongtao Huang. 143-148 [doi]
- A Discussion on the Legal Issues When Selling Hotel Rooms Online: A Case of MacaoLoi Mei Kun. 151-159 [doi]
- Imitation of Real Market Dynamics by Construction of Multi-agent Based Evolutionary Artificial MarketChi Xu, Na Jia. 163-167 [doi]
- Embracement of E-Tourism in Ecotourism: A Case Study of Tourism Websites for GalapagosMeng Zhang, Wei Yu, Jun Yuan. 171-176 [doi]
- A Warped Document Image Mosaicing Method Based on Registration and TRS TransformLijing Tong, Yan Zhang, Huiqun Zhao. 179-183 [doi]
- Cross Survival Entropy and Its Application in Image RegistrationShiwei Yu, Xiaoyun Liu, Wufan Chen. 184-188 [doi]
- Face Hallucination via Using the Graph-Optimal Locality Preserving ProjectionsRongfang Yang, Yunqiong Wang, Deqiang Yang, Tianwei Xu, Juxiang Zhou. 189-193 [doi]
- Stereoscopic Building Reconstruction Using High-Resolution Satellite Image DataDong-Min Woo, Dong-Chul Park. 194-198 [doi]
- German Speech Recognition: A Solution for the Analysis and Processing of Lecture RecordingsHaojin Yang, Christoph Oehlke, Christoph Meinel. 201-206 [doi]
- An IR Image Gray-Scale Transformation Algorithm Based on Human Visual SystemYang Cao, Weiqi Jin, Chongliang Liu, Xiu Liu. 207-211 [doi]
- State Power Modeling and Power Optimization Algorithm for Signal ProcessorJianchuan Li. 212-216 [doi]
- An Improvement in Lossless Data Compression via Substring EnumerationKen-ichi Iwata, Mitsuharu Arimura, Yuki Shima. 219-223 [doi]
- Atomicity Maintenance in EPCreport of ALEJing Sun, Huiqun Zhao, Wenwen Wang, Gongzhu Hu. 224-229 [doi]
- Design and Implementation of a RF Signal Record & Playback System Based on PCI Express BusYantao Pan, Huotu Wu, Jianghong Shi. 230-234 [doi]
- Implementation of LDPC Encoding to DTMB Standard Based on FPGAXiang Ouyang, Changcheng Ruan, Lingxiang Zheng. 235-238 [doi]
- Newcomers' Socialization by Intranet SystemLing-E. Chang, Shang-Ping Lin. 239-243 [doi]
- The Evaluation and Analysis of Student E-Learning BehaviourBaodan Chen, Chong Shen, Ganqing Ma, Yonghui Zhang, Youling Zhou. 244-248 [doi]
- PSO Based Passive Satellite Localization Using TDOA and FDOA MeasurementsYang Zheng Bin, Qiu Yan, Lu An Nan. 251-254 [doi]
- The Evaluation of Museum Websites in MacauWang Liang. 257-262 [doi]
- A Vectorization Method of Export Branch for SIMD ExtensionJiafeng Zhu, Rongcai Zhao, Lin Han, Yunlong Hao, Lili Bai. 265-269 [doi]
- Comparative Analysis of Java and AspectJ on the Basis of Various MetricsInderjit Singh Dhanoa, Er. Dalwinder Singh Salaria, H. S. Johal. 270-275 [doi]
- Framework of Rich Internet Applications Based on SmartGWTDongjin Yu, Pei Zhang, Jianwei Shao. 279-283 [doi]
- Formal Derivation of Two Algorithms Involving SequencesHaihe Shi, Jinyun Xue. 287-291 [doi]
- Improving Software Engineering Education through Enhanced Practical ExperiencesKun Tian, Kendra Cooper, Kang Zhang. 292-297 [doi]
- Solutions of Permissions Management for Website Group System Based on Graduation AuthorizationSilv Liang, Xinyu Zhang. 298-303 [doi]
- Test Generation by Using Component Composition Abstraction RefinementYing Chen, Ye Tian, Hongwei Zeng. 307-311 [doi]
- Application of CAD/CAE Integrating Technology for the Three-Dimensional Design of Hydropower IndustryLei Yan, Sherong Zhang, Wenqi Sa, Bo Sun, Chao Wang. 315-320 [doi]
- Deciding Substitutability of Web Services with Petri Net Reduction TechniquesFeng Guo, Yi Wang, Huiqun Zhao. 323-327 [doi]
- Model Checking WS-BPEL with Universal Modal Sequence DiagramsWenrui Li, Zhongxue Yang, Pengcheng Zhang, Zhijian Wang. 328-333 [doi]
- Improving Quality in Misuse Case Models: A Risk-Based ApproachMohamed El-Attar, Irfan Ahmad. 337-342 [doi]
- 4th Generation Flexible Query Language for Ontology QueryingMuhammad Shoaib, Amna Basharat. 345-350 [doi]
- A Novel Solution of Distributed Memory NoSQL Database for Cloud ComputingJing Han, Meina Song, Junde Song. 351-355 [doi]
- Finding Relational Community through Two NodesPengli Lu, ChunXu Jia. 356-359 [doi]
- Research on the Construction and Functional Connection of Resting-State Brain Networks in Patients with SchizophreniaXuhui Chen, Jingjing Jiao, Ming Ke. 360-364 [doi]
- Design and Application of RuBee-Based Telemedicine Data Acquisition SystemXiaohua Yu, Xiangling Xia, Xuhui Chen. 365-370 [doi]
- A Preliminary Study on the Use of the ICTs in the Tourism Industry in ChinaWencai Du, Qinling Xin, Shaochun Xu, Hui Zhou, Jingjing Guo. 373-376 [doi]
- A SCA-Based System for e-TourismMengxing Huang, Weiqiang Wu, Wencai Du, Wenlong Feng. 377-380 [doi]
- Information and Communication Technologies in Destination Management and Marketing: The China SceneWencai Du, Qinling Xin, Shaochun Xu, Hui Zhou. 381-384 [doi]
- A Survey of Research on Mobile Cloud ComputingGuan Le, Ke Xu, Meina Song, Junde Song. 387-392 [doi]
- Resource Gathering and Application Mode towards Group Integrated SuperiorityZhen Cheng, De-chen Zhan, Lanshun Nie, Xiaofei Xu. 393-398 [doi]
- Design of Hainan Ecological Software Park Management Model Based on Cloud ComputingJie-Zhuo Zhong. 399-402 [doi]
- Experimental Estimation and Analysis of the Power Efficiency of CUDA Processing Element on SIMD ComputingDa Qi Ren, Reiji Suda. 405-408 [doi]
- Closing the Blackbox? A Status on Enterprise Resource Planning (ERP) Studies in Information Systems ResearchChristian Koch. 409-414 [doi]
- Empirical Evaluation of Cost Overrun Prediction with Imbalance DataMasateru Tsunoda, Akito Monden, Jun-ichiro Shibata, Ken-ichi Matsumoto. 415-420 [doi]