Abstract is missing.
- Study and implementation of personalized searching system based on user's interest modelXue Li, Junping Du, Lingling Zi, Katsunori Shimohara. 1-5 [doi]
- Research on method of feature extraction and recognition of road condition from nighttime video without vehicle segmentationSong Bi, Dehui Sun, Liqun Han, Zhe Dong, Zhenwu Lei. 6-10 [doi]
- A new fast interpolation method based on edge extractionYun Zhang, Junping Du, JangMyung Lee. 11-15 [doi]
- Archive-shared cooperative coevolutionary algorithm using Nash equilibria preservationHaoyang Chen, Yasukuni Mori, Ikuo Matsuba. 16-20 [doi]
- An adaptive prolog programming language with machine learningBenjie Lu, Zhiqing Liu, Hui Gao. 21-24 [doi]
- A novel algorithm for generating simulated genetic data based on K-medoidsJianan Wu, Chunguang Zhou, Zhangxu Li, Xuefei Xia, Seng Zhang, You Zhou. 25-28 [doi]
- Auto-scaled Bayesian browsing model in massive dataLiyun Ru, Anhui Wang, Yingying Wu, Shaoping Ma. 29-33 [doi]
- Network coding link optimization problems based on genetic and particle swarm algorithmXinjian Zhuo, Jinrui Han, Jincheng Han. 34-37 [doi]
- An Android-based distributed test data acquisition intelligent system for mobile network optimizationJiali Bian, Lin Liu, Jian Kuang 0002. 38-42 [doi]
- Color-based maximally stable extremal region for sports genre categorizationNan Zhao, Yuan Dong, Jiwei Zhang, Xiaofu Chang. 43-46 [doi]
- Research on civil aviation aircraft registration number recognitionHongying Zhang, Zheng Hu. 47-51 [doi]
- A fast collision detection method for clothing animationHanwen Li, Yi Wan, Guanghui Ma. 52-55 [doi]
- Multi-view face detection based on cascade classifier and skin colorShuiSheng Liu, Yuan Dong, Wei Liu, Jian Zhao. 56-60 [doi]
- Pattern matching and Monte-Carlo simulation mechanism for the game of NoGoYuxia Sun, Yajie Wang, Fei Li. 61-64 [doi]
- Multi-characters interaction based on honeycombWanliang Wang, Minqian Liu, Xin Wang. 65-69 [doi]
- PCA-based dimensionality reduction method for user information in Universal NetworkYu Dai, Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang. 70-74 [doi]
- A neural network based distributed intrusion detection system on cloud platformZhe Li, Weiqing Sun, Lingfeng Wang. 75-79 [doi]
- Image scaling method based on protected regionLisha Hou, Junping Du, Lingling Zi, Min Zuo, Katsunori Shimohara. 80-84 [doi]
- Multi-focus image fusion algorithm based on NSCTYahao Yan, Junping Du, Qingping Li, Min Zuo, JangMyung Lee. 85-89 [doi]
- Research on the Apriori algorithm in extracting the key factorYan Peng, Tian Zhou. 90-93 [doi]
- Facial expression recognition from infrared thermal images using temperature difference by votingShangfei Wang, Peijia Shen, Zhilei Liu. 94-98 [doi]
- Parallel particle swarm optimization with genetic communication strategy and its implementation on GPUMin Jin, Huaxiang Lu. 99-104 [doi]
- Micro-blog category based on feature-words category dispersionYingyou Chen, Qing Wu. 105-108 [doi]
- HMM-based Tri-training algorithm in human activity recognition with smartphoneBin Xie, Qing Wu. 109-113 [doi]
- Hybrid ensemble PSO-GSO algorithmYan Shi, Qin Wang, Huiyan Zhang. 114-117 [doi]
- Improving global optimization ability of GSO using ensemble learningQin Wang, Yan Shi, Guangping Zeng, Xuyan Tu. 118-121 [doi]
- An adaptive service selection approach in mobile environmentQing Wu, Zhenbang Li. 122-126 [doi]
- Using GA-based simulation to cooperative climate strategy of climate game problemZheng Wang, Jingling Zhang, Wanliang Wang. 127-131 [doi]
- Analysis of UCT algorithm policies in imperfect information gameJiajia Zhang, Xuan Wang, Ling Yang, Jia Ji, Dongsheng Zhi. 132-137 [doi]
- Demand forecasting method based on adjacent substitution rate estimation by GAYue Liu, Liu Yang, Zaixia Teng, Junjun Gao. 138-142 [doi]
- Mandarin isolated words recognition method based on pitch contourChunming Wei, Yingchun Yang. 143-147 [doi]
- Session segmentation method based on COBWEBZhenshan Hou, Mingliang Cui, Ping Li, Liuliu Wei, Wenhao Ying, WanLi Zuo. 148-153 [doi]
- Link prediction on evolving network using tensor-based node similarityXiao Yang, Zhen Tian, Huayang Cui, Zhaoxin Zhang. 154-158 [doi]
- Kinect driven 3D character animation using semantical skeletonXin Wang, Qing Ma, Wanliang Wang. 159-163 [doi]
- Attribute characteristics of combined formal contextsMing-Wen Shao, Min Liu, Jinghua Hao. 164-169 [doi]
- Approach to complex hydrogen reactor optimization modeling based on ANFISBo Li, Zhengcai Cao, Min Liu, Jinghua Hao. 170-175 [doi]
- A face image illumination quality evaluation method based on Gaussian low-pass filterFangfang Qu, Dong Ren, Xiaobo Liu, Zhenyu Jing, Lin Yan. 176-180 [doi]
- Combining hand-drawn concept maps with RFID tagsYingying Jiang, Feng Tian, Hongan Wang, Guozhong Dai. 181-184 [doi]
- Semi-supervised image segmentation combining SSFCM and Random WalksShengguo Chen, Zhengxing Sun, Jie Zhou, Yi Li. 185-190 [doi]
- Multimodal emotion estimation and emotional synthesize for interaction virtual agentMinghao Yang, Jianhua Tao, Hao Li, Kaihui Mu. 191-196 [doi]
- 3D face model reconstruction based on stretching algorithmQinyan Zhang, Li Shi. 197-200 [doi]
- The research of intelligent method for blurring image reconstructionQing Tian, Rong Wang. 201-205 [doi]
- Research on connect 6 programming based on MTD(F) and Deeper-Always Transposition TableRuimei Zhang, Changcheng Liu, Chuandui Wang. 206-208 [doi]
- Load-based controlling scheme of virtual machine migrationChao Zou, Yueming Lu, Fangwei Zhang, Songlin Sun. 209-213 [doi]
- A simple fully homomorphic encryption scheme available in cloud computingJian Li, DanJie Song, Sicong Chen, Xiaofeng Lu. 214-217 [doi]
- Partition-based cloud data storage and processing modelYa-Wei Zhao, Yong Wang. 218-223 [doi]
- Security structure of cloud storage based on homomorphic encryption schemeJian Li, Sicong Chen, DanJie Song. 224-227 [doi]
- A scheme of data confidentiality and fault-tolerance in cloud storageYongkang Fu, Bin Sun. 228-233 [doi]
- Chinese Multimedia Messaging Service (MMS) analysis using hadoopChao Dong, Bolun Huang, Zhenming Lei, Jie Yang 0023. 234-239 [doi]
- A service integrity assurance framework for cloud computing based on MapReduceYulong Ren, Wen Tang. 240-244 [doi]
- A cloud-based system for enhancing security of Android devicesHan Qian, Qiaoyan Wen. 245-249 [doi]
- The design of the cloud mobile OA systemYang Yu, Qiaoyan Wen. 250-254 [doi]
- The research on distributed storage mechanism used in clustered opportunistic networkJinglong Lv, Yong Zhang, Yinglei Teng, Yang Liu, Yihai Xing. 255-259 [doi]
- An authorization model for multi-tenancy services in cloudZhaohai Zhang, Qiaoyan Wen. 260-263 [doi]
- An online load balancing scheduling algorithm for cloud data centers considering real-time multi-dimensional resourceMinxian Xu, Wenhong Tian. 264-268 [doi]
- Power-aware scheduling of real-time virtual machines in cloud data centers considering fixed processing intervalsWenhong Tian, Chee Shin Yeo, Ruini Xue, Yuanliang Zhong. 269-273 [doi]
- Design of dynamic fine-grained role-based access control strategyWenfang Zhao, Fei Gao. 274-278 [doi]
- The simple optimization of WLC algorithm based on LVS cluster systemXiuqin Lin, Zhonghan Du, Juan Yang. 279-282 [doi]
- An approach for secure-communication between XEN virtual machinesXiaowei Li, Hongxiang Sun, Qiaoyan Wen. 283-286 [doi]
- Multi-domain cloud social network service platform supporting online collaborations on campusZhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu. 287-291 [doi]
- Real-time remote attestation of IaaS cloudZhen Xu, Aimin Yu, Wensi Yang. 292-297 [doi]
- Flexible security rule-based system on cloud service for e-travel agentSarawut Ramjan. 298-302 [doi]
- The research and design of parallel recommendation algorithm based on mapreduceJuan Yang, Han Du, Bin Wu, Xinxin Ge. 303-307 [doi]
- Three-staged cloud computing service supply chain coordination by combined contractLingyun Wei, Shuo Qi. 308-312 [doi]
- Research and implementation of a role-based trustworthiness mechanism for IaaSXu Wu, Xiaqing Xie, Chunwen Li. 313-317 [doi]
- A functional framework for software and system of systems methodYashi Wang, Lijuan Min, Hanhua Lu. 318-322 [doi]
- Towards universal cloud service for distributed large scale scientific dataJianjun Xie, Junling Huang, Fang Qian, Jianjun Yu. 323-327 [doi]
- Towards a collaboration cloud for astronomical observationsYongzheng Ma, Xiaomeng Lu, Zhengyi Shao, Hongwei Yang, Kai Nan. 328-332 [doi]
- Desktop workload characteristics and their utility in optimizing virtual machine placement in cloudCao LeThanhMan, Makoto Kayashima. 333-337 [doi]
- SOA based cloud computing trust model research with a curve fitting methodRui Ye, Qing Wu. 338-343 [doi]
- E-commerce transaction security model based on cloud computingWasin Treesinthuros. 344-347 [doi]
- A study for task time performance dynamic prediction model in cloud resource schedulingYeqiao Wang, Chunxiao Fan, Zhigang Wen. 348-353 [doi]
- A scalable and efficient multicast system for data centerDexin Cui, Guoliang Chen, Yinlong Xu, Gaifan Li. 354-359 [doi]
- Towards a unified architecture of cloud service delivery platformYannong Huang, Yiqing Yang, Mike Rossi, Bin Xu. 360-364 [doi]
- Cross-media cloud computingZhongzhi Shi, Guang Jiang, Bo Zhang, Jinpeng Yue, Xiaofei Zhao. 365-370 [doi]
- A cloud computing based framework of group-enterprise service integration and sharingZhichao Cao, Qing Li, Ze-Yuan Wang, Weihua Li, Jun Li, Ruiyang Du. 371-375 [doi]
- Distributed agent based cooperative differential evolution: A master-slave modelYujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang. 376-380 [doi]
- Performance evaluation on data reconciliation algorithm in distributed systemXin Wang, Hongming Zhu, Qin Liu, Xiaowen Yang, Jiakai Xiao. 381-385 [doi]
- A multi-objective scheduling strategy based on MOGA in cloud computing environmentZhou Lei, Jinfeng Xiang, Zhebo Zhou, Feng Duan, Yu Lei. 386-391 [doi]
- DartCSim: An enhanced user-friendly cloud simulation system based on CloudSim with better performanceXiang Li, Xiaohong Jiang, Peng Huang, Kejiang Ye. 392-396 [doi]
- Secure cloud authentication using eIDsBernd Zwattendorfer, Arne Tauber. 397-401 [doi]
- Research on cloud resource economics management model based on Internet Innovation UnionTongrang Fan, Feng Zhao, Feng Gao. 402-406 [doi]
- An improved security service scheme in mobile cloud environmentQinyun Dai, Haijun Yang, Qinfeng Yao, Yaliang Chen. 407-412 [doi]
- An optimized load algorithm of parallel data warehouse based on the cloud computing platformZhengqiu Yang, Tong Li, Jiapeng Xiu, Chen Liu. 413-417 [doi]
- The interest community mining method of social network based on the weak association rulesChen Liu, Shan Yang, Jiapeng Xiu, Zhengqiu Yang. 418-421 [doi]
- A method to ensure data security in e-business cloudJingyi Gong, Kaifeng Han. 422-425 [doi]
- An anonymous remote attestation for trusted cloud computingYong Zhang, Xiangxue Li, Haifeng Qian. 426-429 [doi]
- Coordination mechanism with quantity discount contract for cloud service supply chainLingyun Wei, Shenghui Zhai. 430-434 [doi]
- A distributed intrusion detection model based on cloud theoryHan Li, Qiuxin Wu. 435-439 [doi]
- The research of a resource-aware cloud computing architecture based on web securityXiaoni Wang, Xuedong Gao. 440-443 [doi]
- An architecture for dynamic management and monitoring of virtual machinesWei Chen, Qiaoyan Wen. 444-448 [doi]
- A trust mechanism in Internet-Based Virtual Computing EnvironmentChunge Zhu, Xinran Liu, Yixian Yang, Hong Zhang, Qianhua Xu. 449-453 [doi]
- Research and implementation on an admission control policy for temporally correlated workloads in virtual application environmentsXiuwen Wang, Shoufeng Cao, Lihong Wang. 454-458 [doi]
- Research on security evaluation of cloud computing based on attack graphYexia Cheng, Yuejin Du, Junfeng Xu, ChunYang Yuan, Zhi Xue. 459-465 [doi]
- A dynamic aware-feedback system for service replica managementHui Zhang, Ke Xu. 466-470 [doi]
- The data reliability techniques in BC-KVDBGuangjun Wu, Yanqin Zhang, Dongan Wang, Shupeng Wang, Ming Chen. 471-475 [doi]
- A risk management framework for cloud computingFeng Xie, Yong Peng, Wei Zhao, Dongqing Chen, XiaoRan Wang, Xingmei Huo. 476-480 [doi]
- An integrated runtime monitoring method for Internet-Based Virtual Computing EnvironmentHong Zhang, Xinran Liu, Chunge Zhu, Qian Liu. 481-487 [doi]
- Study on cloud resource allocation strategy based on particle swarm ant colony optimization algorithmZhengqiu Yang, Meiling Liu, Jiapeng Xiu, Chen Liu. 488-491 [doi]
- A remote sensing image cloud processing system based on HadoopXin Pan, Suli Zhang. 492-494 [doi]
- A model for collecting virtual machine usage in cloud computing environmentYidong Cui, Fuquan Sun. 495-498 [doi]
- CloudUDDI: An extended UDDI model for cloud servicesFeng Ye, Zhijian Wang, Zhenyu Yue, Xinkun Xu, Yuansheng Lou. 499-503 [doi]
- The identification for P2P Thunder traffic based on deep flow identificationJie Liu, Fang Liu, Dazhong He. 504-507 [doi]
- RCSA-P: A remote control system architecture with high scalabilityJunfeng Xu, Wei Zhang, Bo Sun. 508-513 [doi]
- A video quality assessment method using subjective and objective mapping stategyWeitao Wang, Yuehui Jin, Tan Yang, Yidong Cui. 514-518 [doi]
- Web visualization of distributed network measurement system based on HTML5Xixi Gong, Yuehui Jin, Yidong Cui, Tan Yang. 519-523 [doi]
- A propagation model of passive social network wormWei Chen, Qiaoyan Wen, Bohou Li. 524-528 [doi]
- A rate adaptive algorithm for HTTP streamingYanan Zhao, Xiangyang Gong, Wendong Wang, Xirong Que. 529-532 [doi]
- A hybrid model based on Kalman Filter and neutral network for traffic predictionJianying Liu, Wendong Wang, Xiangyang Gong, Xirong Que, Hao Yang. 533-536 [doi]
- Research and implementation of social hot topic detection system based on mirco-blogLulin Jiao, Yan Peng. 537-542 [doi]
- An effective hybrid routing algorithm for opportunistic networksZhi Ren, Jian Zhang, Jibi Li, Hongjiang Lei. 543-547 [doi]
- A location privacy preserving algorithm for mobile LBSWei Li, Wei Jiao, Guangye Li. 548-552 [doi]
- A hybrid social search model based on the user's online social networksLiang Guo, Xirong Que, Yidong Cui, Wendong Wang, Shiduan Cheng. 553-558 [doi]
- A content delivery strategy based on resource popularity for P4P architectureQiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen. 559-562 [doi]
- A novel complex network model for Internet traffic flowsJiaxi Di, Ke Yu, Xiaofei Wu, Sixi Su. 563-567 [doi]
- Sybil-proof ID-to-locator mapping in one hopHengkui Wu, Meixia Duan, Yaping Hu, Siyun Bao. 568-571 [doi]
- The location selection for CCN router based on the network centralityJianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang. 568-582 [doi]
- The optional routing optimization strategy of Distributed Mobility ManagementShen Yan, Ze Zong, Yan Ma, Qin Zhao. 572-577 [doi]
- A metric for measuring web search results satisfaction incorporating user behaviorJinxiu Yu, Yueming Lu, Fangwei Zhang, Songlin Sun. 583-586 [doi]
- Implement of item-based recommendation on GPUZhanchun Gao, Yuying Liang, Yanjun Jiang. 587-590 [doi]
- SocialRank: Social network influence ranking methodZhengqiu Yang, Xiaozhe Huang, Jiapeng Xiu, Chen Liu. 591-595 [doi]
- A study on application of semi-supervised collaborative classification algorithmChongchong Yu, Lili Shang, Li Tan, Xuyan Tu, Yang Yang. 596-602 [doi]
- Legacy applications on the cloud: Challenges and enablers focusing on application performance analysis and providers characteristicsGeorge Kousiouris, Dimosthenis Kyriazis, Andreas Menychtas, Theodora A. Varvarigou. 603-608 [doi]
- Modeling the interactions between cloud service providersDimosthenis Kyriazis. 609-6013 [doi]
- Financial websites oriented heuristic anti-phishing researchYang Liu, Miao Zhang. 614-618 [doi]
- Research on the second-level query results cache in Web search enginesHongyuan Ma, Xuesong Zhang, Bin Wang 0004. 619-623 [doi]
- A duplicate image deduplication approach via Haar wavelet technologyMing Chen, Yang Wang, Xiaoxiang Zou, Shupeng Wang, Guangjun Wu. 624-628 [doi]
- Modified Elman neural network and its application to network traffic predictionXuqi Wang, Chuanlei Zhang, Shanwen Zhang. 629-633 [doi]
- An improved method to image copy detectionXiaoxiang Zou, Gaochao Li, Ming Chen, Shupeng Wang, Yongjian Wang, Guangjun Wu. 634-637 [doi]
- The design of industrial phased array ultrasonic flaw detection system based on Internet of Things technologyXiaoming Ni, Yucong Tian. 638-641 [doi]
- Synthetic evaluation on the performance of network coordinate systemsYifei Zhang, Hongli Zhang. 642-645 [doi]
- Exploiting Artificial Immune systems to detect unknown DoS attacks in real-timeDawei Wang, Longtao He, Yibo Xue, Yingfei Dong. 646-650 [doi]
- BCBPI: A noval behavior chain based protocol identification methodLuoshi Zhang, Dawei Wang, Yibo Xue. 651-656 [doi]
- The research and implementation of intelligent mobile video supervising system based on DSPHaihui Gao, Yong Peng, Qingtang Zheng, Xi Chen, Zhonghua Dai, Yang Gao, Feng Xie, Wei Zhao, Qi Xiong. 657-660 [doi]
- TMT: A new Tunable Mechanism of Tor based on the path lengthChenglong Li, Yibo Xue, Longtao He, Lidong Wang. 661-665 [doi]
- An approach to improve process algebra based protocol composition modelXiaoming Tian, Qiuxin Wu. 666-669 [doi]
- Research on Android browser fuzzing based on bitmap structureYuanwei Hou, Guo Tao, Zhiwei Shi, Liu Juan. 670-673 [doi]
- Cooperative Work Systems for the security of digital computing infrastructure Cooperative detection systems for Botnet detectionYongjian Wang, Junfeng Xu. 674-680 [doi]
- Stability analysis of software networksYang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu. 681-684 [doi]
- Construction of distributed LDoS attack based on one-dimensional random walk algorithmXiaoming Liu, Miao Zhang, Guoai Xu. 685-689 [doi]
- An Idea of setting weighting functions for feature selectionWeijie Li, Haiqiang Chen, Wei Cao, Xin Zhou. 690-695 [doi]
- A new algorithm for multi-mode recommendations in social tagging systemsTan Yang, Yidong Cui, Yuehui Jin, Maoqiang Song. 696-700 [doi]
- A security assessment method for Android applications based on permission modelDanyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui. 701-705 [doi]
- A worm counter-measurement strategy in P2P networks: Modeling and analysisHaokun Tang, Yanbing Liu, Jun Huang. 706-710 [doi]
- Exploiting peer's location information for improving routing and throughput performance in DHT systemsChenhui Du, Mei Song, Li Wang, Yinghe Wang, Xiaosu Zhan. 711-715 [doi]
- Distributed storage of network measurement data on HBaseHaijie Ding, Yuehui Jin, Yidong Cui, Tan Yang. 716-720 [doi]
- An improved model for cascading failures in complex networksJian Zhou, Ning Huang, Xuewang Wang, Fei Zhao. 721-725 [doi]
- A design and implementation of IPv6 transition system for DNS64 in stub-resolver modeXiaobo Lin, Qin Zhao. 726-729 [doi]
- A Service Identifier parsing mechanism for Universal Network based on BHOFutao Zhao, Shijie Jia, Jianfeng Guan, Changqiao Xu, Hongke Zhang. 730-734 [doi]
- Distributed in-network cooperative cachingXiaoyan Hu, Jian Gong. 735-740 [doi]
- A home gateway based multicast transit solution and implementation on DS-LiteJiang Li, Qin Zhao, Xiaohong Deng, Yan Ma. 741-745 [doi]
- The hitting times analysis of cognitive user in Cognitive Internet under random direction mobility modelJianfeng Guan, Changqiao Xu, Wei Quan, Hongke Zhang. 746-750 [doi]
- Design and implementation of SNS-based wireless LAN access sharing systemJ. H. Choi, Y. K. Woo, J. T. Park, Y. Shen. 751-754 [doi]
- Performance evaluation of file transmission in content-centric networkHu Yao, Shigeki Goto. 755-756 [doi]
- A novel weighted combination technique for traffic classificationJinghua Yan, Xiao-chun Yun, Zhi-Gang Wu, Hao Luo, Shuzhuang Zhang. 757-761 [doi]
- A MP2P-based VoD solution for supporting VCR-like operations in MANETsShijie Jia, Changqiao Xu, Jianfeng Guan, Hongke Zhang. 762-766 [doi]
- Design and implementation of Ethernet topology discovery algorithmWei Xiao, Ruixing Wang, Xiaohong Huang. 767-770 [doi]
- Generating adaptive network data visualization to different levels of usersDoris Hooi-Ten Wong, Sureswaran Ramadass. 771-775 [doi]
- Algorithm for distributed traffic traces AGGREGATION based on SMCHao Wang, Yujie Su, Xiaohong Huang, Pei Zhang. 776-779 [doi]
- BalanceFlow: Controller load balancing for OpenFlow networksYannan Hu, Wendong Wang, Xiangyang Gong, Xirong Que, Shiduan Cheng. 780-785 [doi]
- Internet traffic identification based on community detection by label propagationKe Yu, Xinyu Zhang, Jiaxi Di, Xiaofei Wu. 786-791 [doi]
- M-Label: A naming scheme for services in future networksWei Quan, Jianfeng Guan, Yuanlong Cao, Changqiao Xu, Hongke Zhang. 792-796 [doi]
- VNMC for network virtualization in OpenFlow networkYang Chen, Xiangyang Gong, Wendong Wang, Xirong Que. 797-801 [doi]
- A security model of flow label based QoS mechanism in Evolved Packet SystemPeipei Hu, Min Xu, Xiaohong Huang. 802-806 [doi]
- Host scurity event track for complex network environments based on the analysis of logDanfeng Yan, Rui Feng, Junlin Huang, Fangchun Yang. 807-811 [doi]
- P2P-based group service management for live video streaming communicationSeung-Man Chun, Yeung-Kyung Woo, Yang Shen, Jong-Tae Park. 812-816 [doi]
- Optimization scheme of CGN logsHong Ma, Yongjuan Wu, Yan Ma, Zhenhua Wang. 817-820 [doi]
- Estimation of 2-D DOA joint frequency of signal via a single vector hydrophoneGuolong Liang, Ke Zhang, Jin Fu, Wei Ma. 821-825 [doi]
- An autonomic wireless video transmission system based on GANAMeilian Lu, Wei Wang. 826-830 [doi]
- Cognitive-affective regulation process for micro-expressions in active field state spaceXin Liu, Lun Xie, Zhiliang Wang, Dongmei Fu. 831-835 [doi]
- Security sense of Internet product interface designShudan Lin, Shijian Luo, Xiaoxia Ding. 836-840 [doi]
- Selective spectrum leasing in Internet of Things via Nash Bargaining SolutionsBiling Zhang, Kai Chen 0013. 841-845 [doi]
- Research on the channel characteristics of low-voltage power lineYongjian Wang, Lizhong Song, Jiaxing Ye, Lijing Wang. 846-849 [doi]
- The design of belt convey safety protective systembased on Zigbee technologyXiaoming Ni, Yucong Tian. 850-853 [doi]
- Blind extraction algorithm of the harmonic signal based on the steady-state point capture in lorenz energy accumulation areaErfu Wang, Dongqing Wang, Qun Ding. 854-858 [doi]
- A relaxation algorithm for decentralized resource allocation in femtocell networksXiaoyu Wang, Yuan'an Liu, Gang Xie, Pan-liang Deng. 859-863 [doi]
- Based multi-operator Shared Network Opportunistic Spectrum SharingPeipei Wang, Ben Wang, Weidong Wang, Yinghai Zhang, Chaowei Wang. 864-868 [doi]
- The research of synchronization and consistency of data in mobile environmentJiuLing Feng, Xiuquan Qiao, Yong Li. 869-874 [doi]
- Research on RCS characteristic of three kinds of metal plateYong Li, Wenzhu Li, Li Yuan, Linxing Yang. 875-878 [doi]
- Research on the key technology of refarmingTong Liang, Dexiang Meng, Jiwei He, Shoufeng Wang. 879-883 [doi]
- A machine-to-machine application: Body posture recognition on smartphones for intelligent remote controlJia Liu, Chaowei Wang, Juyi Qiao, Weidong Wang, Yinghai Zhang. 884-888 [doi]
- An adaptive frequency allocation scheme for OFDMA femtocell networksXiaoxiao Zhang, Weidong Wang, Yinghai Zhang, Gaofeng Cui, Sixing Lu. 889-892 [doi]
- Performance of WBAN UWB system based on the measured on-body channel modelAnming Gao, Hongli Peng, Jinlong Zou, Zhengxiao Cao. 893-897 [doi]
- Distributed channel and power allocation based on hybrid spectrum access in cognitive radio networkFeiyan Yan, Yang Yu, Weidong Wang, Yinghai Zhang. 898-903 [doi]
- Coexistence studies for indoor distribution systems of TD-LTE with WLAN systemJiwei He, Tong Liang, Dexiang Meng, Chao Sun. 904-907 [doi]
- Compatability study on broadcasting system interfering with LTE systemXiaoyan Xu, Dexiang Meng, Yanming Chen, Jiwei He. 908-912 [doi]
- A semi-supervised ensemble learning algorithmZhen Jiang, Shiyong Zhang. 913-918 [doi]
- Research of improved SVM model based on GA in E-learning emotion classificationWansen Wang, Wenlan Ding. 919-923 [doi]
- Face detection based on improved AdaBoost algorithm in E-LearningWansen Wang, Huifang Niu. 924-927 [doi]
- Multistep ahead prediction for real-time VBR video traffic using deterministic echo state networkXiao-chuan Sun, Hongyan Cui, Ren Ping Liu, Jianya Chen, Yunjie Liu. 928-931 [doi]
- A new recognition algorithm with high result reliabilityXiaoyu Liu, Zhongyuan Yu, Yumin Liu, Houjian Kang, Jinhong Mu. 932-935 [doi]
- Theory of α-truth degrees in 3-valued prerough logicYingcang Ma, Lu Wang, Huan Liu, Xiaogai Wang. 936-940 [doi]
- Design and implementation of distributed collaborative virtual assembly system with three-dimensional force feedbackYan Huang, Xin Gao, Haorui Zhou, Kai Wang, Yanfeng Qu. 941-945 [doi]
- Region clustering with high level semantics for image segmentationShuzhe Wu, Xiaoru Wang, Qing Ye, Jiali Dong. 946-950 [doi]
- A novel H-infinity filtering for road constrained target trackingWeiwei Duan, Yingmin Jia. 951-955 [doi]
- A pedestrian detection method based on Dirichlet distribution and histogram of componentsXu Li, Xiaoru Wang, Jia Long, Lingpu Gong. 956-960 [doi]
- Media capacity estimation: Discovering news feed accounts for information sourcingWenwen Han, Wendong Wang, Shuigui Huang, Ye Tian, Jian Ma. 961-965 [doi]
- A novel visual servoing microassembly systemXinhan Huang, Shangqin Mao, Min Wang. 966-970 [doi]
- An approach based on TSA-tree for accurate time series classificationXiaoxu He, Chenxi Shao. 971-975 [doi]
- Accurate and fast hand-forearm segmentation algorithm based on silhouetteBosheng Wang, Jiaqi Xu. 976-979 [doi]
- Clothing retrieval based on image bundled featuresQijin Chen, Jituo Li, Guodong Lu, Xinyu Bi, Bei Wang. 980-984 [doi]
- Search engine click spam detectionXin Li, Min Zhang, Yiqun Liu, Shaoping Ma, Yijiang Jin, Liyun Ru. 985-989 [doi]
- Ontology-based production model of satellite remote sensing data parameter productsJiapeng Xiu, Xiaobo Xu, Zhengqiu Yang, Chen Liu. 990-993 [doi]
- Research and designed of a structured scalable robot control system based on real-time busLun Xie, Shanchao Ni, Zhiliang Wang. 994-998 [doi]
- An efficient tag anti-collision protocol for RFID systemsLijuan Zhang, Jin Zhang, Xiaohu Tang, Yong Wang. 999-1004 [doi]
- A new three-dimensional localization method for WSNJie Li, Zhi Li, Wantian Song. 1005-1008 [doi]
- A web service discovery computational method for IOT systemMing Zhou, Yan Ma. 1009-1012 [doi]
- An improved AODV protocol based on extension lifetime of the Ad Hoc networksJian Kuang 0002, Xianqing Meng, Jiali Bian. 1013-1016 [doi]
- A novel privacy protection scheme for participatory sensing with incentivesJunsong Zhang, Jian Ma, Wendong Wang, Yazhi Liu. 1017-1021 [doi]
- A grid optimization scheme based on progressive compensation for wireless sensor networksZhichao Qin, Zheng Zhou, Xiaochuan Zhao. 1022-1027 [doi]
- Node information in WSN from the business perspectiveHaiguo He, Jiao Mo, Qiaoyan Wen, Zishan Meng. 1028-1031 [doi]
- Semantic surface representation of physical entity in the WEB of thingsHaining Yu, Binxing Fang, Xiang-Zhan Yu, Juan Chen. 1032-1036 [doi]
- A bio-inspired distributed object-tracking approach in wireless sensor networksYanling Jin, Yongsheng Ding, Kuangrong Hao. 1037-1041 [doi]
- An Id-based Multiple Authentication scheme against attacks in wireless sensor networksSiwei Peng. 1042-1045 [doi]
- An IBE-based security scheme on Internet of ThingsWang Chen. 1046-1049 [doi]
- Survey on recent development about lightweight authentication protocol based on LPN problemYing Zhang, Hui Li, Tengfei Shi, Guanyang Deng. 1050-1056 [doi]
- A clustering routing algorithm in wireless sensor netwroksHan Li, Qiuxin Wu. 1057-1061 [doi]
- Application of dynamic variable cipher security certificate in Internet of ThingsQuangang Wen, Xinzheng Dong, Ronggao Zhang. 1062-1066 [doi]
- Design of household appliance control system based on ZigbeeXiangnan Peng, Xiaoping Zou, Zhaoxian Yu, Yuan Yang. 1067-1071 [doi]
- Wireless sphygmomanometer based on ZigbeeGuangtao Zhuang, Xiaoping Zou, Changfei Guo, Yan Liu. 1072-1075 [doi]
- Intelligent parking guidance system based on wireless sensor networksYan Liu, Xiaoping Zou, Miaojing Shi, Guangtao Zhuang. 1076-1078 [doi]
- The security problem in Wireless Sensor NetworksXiaoye Zhao. 1079-1082 [doi]
- Efficient deployment surface area for underwater wireless sensor networksShiwei Li, Wenjing Wang, Juwei Zhang. 1083-1086 [doi]
- A design of smart-home ststem based on 6LoWPAN wireless sensor networksXiong Tang, Chunxiu Xu, Muqing Wu, Jingrong Wen. 1087-1091 [doi]
- Secure network coding based on homomorpuic signature against pollution attacksZhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li. 1092-1096 [doi]
- An algorithm of MAC-based network coding for Butterfly wireless networksXianzhong Tian, Qianwei Zhou, Zhen Cheng. 1097-1101 [doi]
- The design of agricultural product's production antecedents acquisition terminal based on Hi3511 and 3G technologyChao Zhou, Chuanheng Sun, Xiaowei Du, Wen-yong Li, Xinting Yang. 1102-1105 [doi]
- Optimal packet fragmentation scheme for reliable and energy-efficient packet delivery in 6LoWPANJing Peng, Kaikai Chi, Yi-hua Zhu, Jing Wang. 1106-1111 [doi]
- A Self-learning algorithm for predicting bus arrival time based on historical data modelJian Pan, Xiuting Dai, Xiaoqi Xu, Yanjun Li. 1112-1116 [doi]
- Multiple tags identification for short id rfid networksHongbo Guo, Victor C. M. Leung. 1117-1122 [doi]
- Information-centric industrial Internet of Things: Service modelYang Wang, Peng Zeng, Xu Wang, Yangyu Zhang, Fangjun Kuang, Baohui Zhu. 1123-1128 [doi]
- A method of cloud storage algorthom for crop images informationChunjiang Zhao, RongHua Gao, Huarui Wu. 1129-1132 [doi]
- An adaptive localization algorithm based on RSSI in wireless sensor networksHaihui Zhang, Jiaming Zhang, Huarui Wu. 1133-1136 [doi]
- A self-adaptive greenhouse CO2 concentration monitoring system based on ZigBeeHaihui Zhang, Yan Liang, Qingzhen Zhou, Hongpan Fan, Jianguo Dai. 1137-1140 [doi]
- Research on power consumption weighted state machine of farmland WSN nodeYisheng Miao, Chunjiang Zhao, Huarui Wu, Huaji Zhu. 1141-1144 [doi]
- A pupil location method based on improved OTSU algorithmFan Yang, Huaiyi Sun, Dongqiang Wang, Lili Huang, Longcan Hu, Yue Gao, Haiyan Li. 1145-1148 [doi]
- Algorithm of identifying opinion leaders in BBSFusuijing Cheng, Chenghui Yan, Yongfeng Huang, Linna Zhou. 1149-1152 [doi]
- Based on intelligent voice recognition of forest illegal felling of detecting methodsYunjian Tang, Peng Han, Zaihuan Wang, Longcan Hu, Yue Gao, Haiyan Li. 1153-1156 [doi]
- Design and implementation of mirror traffic network simulation framework based on Delta3DDongqiang Wang, Aijun Fan, Lili Xiong, Longcan Hu, Yue Gao, Haiyan Li. 1157-1160 [doi]
- Multi-objective particle swarm optimization for resource allocation in cloud computingMingyue Feng, Xiao Wang, Yongjin Zhang, Jianshi Li. 1161-1165 [doi]
- Multi-sensor information fusion for unmanned cars using radar mapMu Guo, Deyi Li, Guisheng Chen, Youchun Xu, Wen He, Tianlei Zhang, Lifeng An, Minghui Lv. 1166-1170 [doi]
- From turing machine intelligence to collective intelligenceLiwei Huang, Haisu Zhang, Guisheng Chen, Yuchao Liu, Deyi Li. 1171-1177 [doi]
- Inverse perspective mapping based Urban road markings detectionHua Li, Mingyue Feng, Xiao Wang. 1178-1182 [doi]
- Traveling path tracking algorithm in virtual coordinate system for intelligent vehicleMingxi Li, Peng Jia, Youchun Xu, Yi Yuan. 1183-1187 [doi]
- Design on automatic control system for smart car based on μC/OS-IIXiao Wang, Hua Li, Yuan Zhu. 1188-1191 [doi]
- Research on intelligent vehicle autonomous overtaking based on single neuron PID controlYuan Zhu, Mingyue Feng, Xiao Wang, Xinxi Xu. 1192-1195 [doi]
- The research of obstacle detection based on AK-means clustering algprithm in crosscountryYouchun Xu, Jian Cao, Peng Jia, Zufeng Zhang. 1196-1199 [doi]
- Spirit: A lightweight programming framework for intelligent systemTianlei Zhang, Deyi Li, Guisheng Chen, Wen He, Mu Guo, Minghui Lv. 1200-1204 [doi]
- Modeling of uncertain environment based on multi-scale grid methodJianhui Zhao, Peng Jia, Shaobo Fu. 1205-1209 [doi]
- A decision-making method for unmanned cars based on drivable area cuttingMu Guo, Youchun Xu, Yongjin Zhang, Wen He, Guisheng Chen, Tianlei Zhang, Lifeng An, Minghui Lv. 1210-1215 [doi]
- Accelerometer-based fall detection sensor system for the elderlyYanjun Li, Gan Chen, Yueyun Shen, Yihua Zhu, Zhen Cheng. 1216-1220 [doi]
- The research on the control algorithm of IOT based bicycle parking systemYujia Huang, Zhongliang Yang, Shuhua Xiong. 1221-1225 [doi]
- Chain-type wireless sensor network for monitoring power lines: Topology model and routing algorithmYixin Kang, Yongli Zhu, Jing Gao. 1226-1229 [doi]
- Anatomy of the connecting architecture of Internet of ThingsYang Deng, Zhonghong Ou, Miika Komu, Vilen Looga, Antti Ylä-Jääski. 1230-1234 [doi]
- MAMMOTH: A massive-scale emulation platform for Internet of ThingsVilen Looga, Zhonghong Ou, Yang Deng, Antti Ylä-Jääski. 1235-1239 [doi]
- Provably secure identity-based authenticated key agreement protocol and its applicationShuai Shao, Bin Tian, Xin Wang, Yang Li. 1240-1244 [doi]
- Public key encryption with keyword search based on factoringWenjun Luo, Jianming Tan. 1245-1247 [doi]
- A more practical CPA attack against present hardware implementationChenxu Wang, Mingyan Yu, Jinxiang Wang, Peihe Jiang, Xiaochen Tang. 1248-1253 [doi]
- Study on the standardized method of Chinese addresses based on expert systemBin Gu, Yanfeng Jin, Chang Zhang. 1254-1258 [doi]
- Semantic similarity calculation method in ontology mappingBin Ye, Hongyu Chai, Weiping He, Xiaoting Wang, Guangwei Song. 1259-1262 [doi]
- Evaluation of land grading based on extenics theoryJie Yang, Hong Gao, Wei Liu. 1263-1266 [doi]
- A cache-splitting scheme for DNS recursive serverZhiwei Yan, Anlei Hu, Wei Wang. 1267-1271 [doi]
- A cross-platform context-aware application developing framework for mobile terminalsPingyi Wang, Jingling Zhao, Qing Liao. 1272-1276 [doi]
- Mining and analyzing the characteristic of projects collaborative relationship in open source softwareBai Wang, Meng Shi. 1277-1280 [doi]
- New delay-dependent stability criteria for linear time-delay systems with two additive time-varying delay componentsNan Xiao, Yingmin Jia. 1281-1286 [doi]
- A task-oriented computing service sharing model and its application to talent training and managementXue Jun, Zengliang Liu. 1287-1290 [doi]
- An oriented-application adaptive mobile cloud computing middlewareYe Wang, Wenchao Song, Zengliang Liu. 1291-1295 [doi]
- Evaluation to coordinating degree of systematic battle forces based on DEAYanbiao Chen, Wenji Sun, Yi Zhang. 1296-1301 [doi]
- Study on the modeling and analyzing of the role-based threats in the cyberspaceYeli Hao, Shize Guo, Hong Zhao, Zhe Chen. 1302-1306 [doi]
- Reaserch of weapons and equipment capability evaluation based on comprehensive fuzzy modelJingdong Gao, Jinshi Xiao, Jichang Dong, Xiongwei Ren. 1307-1310 [doi]
- Robust control of electric vehicle's driving systemWenxin Yang, Xiaomin Zhou, Baodong Ju, Peng Xu. 1311-1315 [doi]
- The credibility research of capability index system for weapon equipment SOSJingdong Gao, Yue Liang, Jichang Dong. 1316-1319 [doi]
- Application of fuzzy adaptive control for optimal load distribution of plantXiaodan Zhang. 1320-1323 [doi]
- Juvenile detection by LBP and SVMXianmei Wang, Yuyu Liang, Siyi Zheng, Zhiliang Wang. 1324-1327 [doi]
- An innovative implement in organizing complicated and massive intrusion detection rules of IDSJian Kuang 0002, Longkui Mei, Jiali Bian. 1328-1332 [doi]
- Improved algorithm of RBF neural networks and its applicationDong Wei, Yiqing Liu, Ning Zhang, Minzhe Zhao. 1333-1337 [doi]
- Research based on improved fuzzy immune PID algorithm optimized copper electrolysis rectifier systemJian Xue, He Zhu. 1338-1340 [doi]
- Encryption algorithm based on higher degree residues oriented to semantic securityYongdan Liu. 1341-1345 [doi]
- Online query algorithm of dynamic time sequences based on fast fourier transformZichun Zhang, Yongdan Liu, Xiaoyun Guo, Jianhua Zhu. 1346-1352 [doi]
- 4KISR systemXingfu Xiao, Hanbin Bai, Zhanbin Zhang. 1353-1356 [doi]
- A cloud service discovery approach based on FCAJianhong Xu, Weizhi Gong, Ye Wang. 1357-1361 [doi]
- Research of personalized recommender system in M-commerce: A cognitive-style approach based on FD/IWeizhi Gong, Huiyao An, Jianhong Xu, Hao Wang. 1362-1366 [doi]
- Research on FNN-based security defence architecture model of scada networkLi Yang, Xiedong Cao, Jie Li, Aomin Wang, Weibin Tan, Zhijun Yu. 1367-1371 [doi]
- A trusted information sharing skeleton for privacy preservationChao Li, Zhen Xu, Zichun Zhang. 1372-1376 [doi]
- Study of soft sets category and it's propertiesZengliang Liu, Xuehai Yuan, Yuhong Zhang, Ye Wang. 1377-1380 [doi]
- Goal-oriented action planning in partially observable stochastic domainsXiangyang Huang, Cuihuan Du, Yan Peng, Xuren Wang, Jie Liu. 1381-1385 [doi]
- Comprehensive information emotional theory - An assumption of cognitive-emotional interaction mechanismPu Jiang. 1386-1392 [doi]
- Studies on automatic recognition of preposition BA's usages based on statisticsLingling Mu, Yiya Pang, Hongying Zan. 1393-1397 [doi]
- Applying frequency and location information to keyword extraction in single documentYing Qin. 1398-1402 [doi]
- Chniese document classification using field association knowledge baseLi Wang, Kui Jiang, Xingyun Geng, Yuanpeng Zhang, Dong Zhou, Jiancheng Dong. 1403-1408 [doi]
- Multi-document summarization systems comparisonLei Li, Wei Heng, Ping'an Liu. 1409-1413 [doi]
- Research on automatic semantic classification of human-interaction instructionsShuming Yuan, Xiaojie Wang. 1414-1419 [doi]
- Estimation of earnings manipulation in U.S. listed companies based on weighted discriminative modelXiaoli Nan, Xiao Sun, Tieshan Hou. 1420-1424 [doi]
- Long sentence partitioning using top-down analysis for machine translationBaosheng Yin, Junjun Zuo, Na Ye. 1425-1429 [doi]
- Latent semantic analysis based on space integrationDongfeng Cai, Liwei Chang, Duo Ji. 1430-1434 [doi]
- Research on the semantic knowledge base in Chinese-English machine translationZhiying Liu, Yaohong Jin, Wenfei Chang. 1435-1439 [doi]
- Annotation of complex noun phrases from multilingual parallel corpusJingxiang Cao, Degen Huang. 1440-1444 [doi]
- Automatic identifying of maximal length noun phraseYegang Li, Heyan Huang. 1445-1448 [doi]
- Vibration suppression for two manipulators handling a flexible payload based on observerDongmei Ma, Zhiguo Tang. 1449-1453 [doi]
- An improved model of MST for Chinese dependency parsingGuiping Zhang, Yan Wang, Duo Ji. 1454-1458 [doi]
- Language models and classification analysis for dream of the red chamberHui Li, Ying Liu. 1459-1464 [doi]
- HLDA based text clusteringPingan Liu, Lei Li, Wei Heng, Boyuan Wang. 1465-1469 [doi]
- Sentiment classification on Chinese reviews based on ambiguous sentiment confined libraryMeijuan Liu, Shicai Yang, Qiaofen Chen. 1470-1473 [doi]
- User influence analysis on micro blogYong Zhang, Jiaqin Mo, Tingting He. 1474-1478 [doi]
- Analysis of HE(***) in patent Chinese-English machine translationYanli Liu, Yaohong Jin. 1479-1484 [doi]
- Identification of V+N compound nouns in Chinese-English machine translation based on rules in patent textsHe Zhou, Yun Zhu, Yaohong Jin. 1485-1490 [doi]
- Relation extraction from wikipedia articles by entities clusteringSong Liu, Fuji Ren. 1491-1495 [doi]
- Identification of comparative sentences with adjective predicates in patent Chinese-English machine translationRunxiang Zhang, Yaohong Jin. 1496-1500 [doi]
- Tag recommendation based on tag-topic modelRong Hu, Tingting He, Fang Li, Po Hu. 1501-1505 [doi]
- A rule-based method for commas' disambiguation in Chinese patent textQianqian Song, Yun Zhu, Lixia Wang, Yaohong Jin. 1506-1510 [doi]
- LDA based PSEUDO relevance feedback for cross language information retrievalXuwen Wang, Qiang Zhang, Xiaojie Wang, Yueping Sun. 1511-1516 [doi]
- A method of recognizing the root of an improved dependency tree for the Chinese patent literatureYun Zhu, Yaohong Jin. 1517-1523 [doi]
- The comparison of particle filter and extended Kalman filter in predicting building envelope heat transfer coefficientXiaoqin Wang, Xiaolong Wang. 1524-1528 [doi]
- Word-level information extraction from science and technology announcements corpus based on CRFYushu Cao, Jun Wang, Lei Li. 1529-1533 [doi]
- A retrieval model for question in community question answering systemYueping Sun, Xiaojie Wang, Song Liu, Caixia Yuan, Xuwen Wang. 1534-1539 [doi]