Abstract is missing.
- Mining with Noise Knowledge: Error Aware Data MiningXindong Wu. [doi]
- Towards an Understanding of the Brain via Microscopic and Macroscopic StudiesL. M. Patnaik. [doi]
- Modeling Network Security Services in Tactical NetworksStephen D. Wolthusen. [doi]
- DRM InteroperabilityTon Kalker. [doi]
- Mixing Matrix Recovery of Underdetermined Source Separation Based on Sparse RepresentationChu-Jun Yao, Hai-lin Liu, Zhi-Tao Cui. 1-5 [doi]
- Region Assessment of Soil Erosion Based on Naive BayesWeihua Lin, Yonggang Wu, Dianhui Mao. 6-9 [doi]
- A Bayesian Network Based Approach for Root-Cause-Analysis in Manufacturing ProcessSatyabrata Pradhan, Rajveer Singh, Komal Kachru, Srinivas Narasimhamurthy. 10-14 [doi]
- Step-Size Optimization EASI Algorithm for Blind Source SeparationWeihong Fu, Xiaoniu Yang, Naian Liu. 15-18 [doi]
- Variable Step-Size Online Algorithm for Blind Separation Based on the Extended InfomaxXuansen He, Shouke Ma. 19-22 [doi]
- A Novel Learning Method for ANFIS Using EM Algorithm and Emotional LearningHongsheng Su, Feng Zhao. 23-27 [doi]
- A Novel Method for Intelligence of Sensors ModelingYi Hu, Yue Chang, Yong Ni. 28-31 [doi]
- An Effective Feature-Weighting Model for Question ClassificationPeng Huang, Jiajun Bu, Chun Chen, Guang Qiu. 32-36 [doi]
- P2P Traffic Identification TechniqueLi Jun, Zhang Shunyi, Liu Shidong, Xuan Ye. 37-41 [doi]
- Study on PIGA Test Method on CentrifugeYong-hui Qiao, Yu Liu, Bao-ku Su. 42-47 [doi]
- Parameters Selection for SVR Based on the SCEM-UA Algorithm and its Application on Monthly Runoff PredictionLiu Ji, Wang Bende. 48-51 [doi]
- Estimate and Track the PN Sequence of Weak DS-SS SignalsTianqi Zhang, Shaosheng Dai, Liufei Yang, Xuesong Li. 52-56 [doi]
- A Smoothing Support Vector Machine Based on Quarter Penalty FunctionMin Jiang, Zhiqing Meng, Gengui Zhou. 57-59 [doi]
- Fast Forecasting with Simplified Kernel Regression MachinesWenwu He, Zhizhong Wang. 60-64 [doi]
- An Accelerated SMO-Type Online Learning AlgorithmZhifeng Hao, Zhenhua He, Xiaowei Yang. 65-69 [doi]
- An Improved MRF Based Unsupervised Change Detection MethodQi Yuan, Rong-chun Zhao. 70-74 [doi]
- Intrinsic Dimensionality Estimation with Neighborhood Convex HullChun-Guang Li, Jun Guo, Xiangfei Nie. 75-79 [doi]
- A Novel Evolutionary Algorithm for Function Optimization Using MECLijie Li, Yongmei Lei, Ying Zhang. 80-84 [doi]
- A New Tree Encoding for the Degree-Constrained Spanning Tree ProblemGengui Zhou, Zhiqing Meng, Zhenyu Cao, Jian Cao. 85-90 [doi]
- A Novel Hybrid Real-Valued Genetic Algorithm for Optimization ProblemsHong-qi Li, Li Li. 91-95 [doi]
- Global Optimization Method Based on the Statistical Genetic Algorithm for Solving Nonlinear Bilevel Programming ProblemsHong Li, Yong-Chang Jiao, Li Zhang, Fushun Zhang. 96-100 [doi]
- Prediction of MHC Class II Binding Peptides Using a Multi-Objective Evolutionary AlgorithmWang Lian, Liu Juan, Luo Fei. 101-104 [doi]
- A New Evolutionary Algorithm for Constrained Optimization ProblemsYibo Hu, Yuping Wang. 105-109 [doi]
- An Improved Genetic Algorithm for Optimal Operation of Cascaded ReservoirsNa Li, Ya-dong Mei. 110-113 [doi]
- A Decision-Tree-Based Multi-objective Estimation of Distribution AlgorithmXiaoping Zhong, Weiji Li. 114-118 [doi]
- Performance Scalability of a Cooperative Coevolution Multiobjective Evolutionary AlgorithmTse Guan Tan, Jason Teo, Hui Keng Lau. 119-123 [doi]
- Comparison between Particle Swarm Optimization, Differential Evolution and Multi-Parents CrossoverXing Xu, Yuanxiang Li. 124-127 [doi]
- PSO Algorithm Based Online Self-Tuning of PID ControllerXuzhou Li, Fei Yu, You-bo Wang. 128-132 [doi]
- A Self-Adaptive Particle Swarm Optimization Algorithm with Individual Coefficients AdjustmentZhengjia Wu, Jianzhong Zhou. 133-136 [doi]
- A GA Based Combinatorial Auction Algorithm for Multi-Robot Cooperative HuntingJianwei Gong, Jianyong Qi, Guangming Xiong, Huiyan Chen, Wanning Huang. 137-141 [doi]
- An Adaptive Parameter Control Strategy for Ant Colony OptimizationWeixin Ling, Huanping Luo. 142-146 [doi]
- A Multi-Focus Image Fusion Algorithm with DT-CWTSun Wei, Wang Ke. 147-151 [doi]
- A Fuzzy Fusion in Multitarget Tracking with MultisensorXiaohui Chen, Yang Zhang. 152-156 [doi]
- An Algorithm for Extracting Referential Integrity Relations Using Similarity during RDB-to-XML TranslationJang-won Kim, Dongwon Jeong, Jinhyung Kim, Doo-Kwon Baik. 157-161 [doi]
- Research on Algorithm of Web Classification Based on EP and FFSSZufeng Wang, Weiping Wang. 162-166 [doi]
- Discovery of Direct and Indirect Association Patterns in Large Transaction DatabasesWeimin Ouyang, Shuanghu Luo, Qinhua Huang. 167-170 [doi]
- Associative Classification Using SVM-Based DiscretizationCheong Hee Park, Moonhwi Lee. 171-175 [doi]
- An Efficient Graph-Based Multi-Relational Data Mining AlgorithmJingfeng Guo, Lizhen Zheng, Tieying Li. 176-180 [doi]
- Analysis on Time-lagged Gene Clusters in Time Series Gene Expression DataTao Zeng, Juan Liu. 181-185 [doi]
- A Novel Local Features-Based Approach for Clustering Microarray DataZhipeng Wang, Yuhai Zhao, Ying Yin. 186-190 [doi]
- Improved Variable Precision Rough Set Model and its Application to Distance LearningAyad R. Abbas, Liu Juan, Safaa O. Mahdi. 191-195 [doi]
- A New Attribute Reduction Algorithm in Continuous Information SystemsYue-Jin Lv, Hong-yun Zhang, Fen Quan, Zhi-cheng Chen. 196-200 [doi]
- Realization of a New Association Rule Mining AlgorithmJun Gao. 201-204 [doi]
- A Study on the Method of Attribute Reduction Based on Rough Set under Fuzzy Equivalent RelationGuorui Jiang, Guojun Zang. 205-208 [doi]
- Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth MethodJuryon Paik, Joochang Lee, Junghyun Nam, Ung-Mo Kim. 209-213 [doi]
- The Algorithm of Objective Association Rules Mining Based on BinaryGang Fang, Zukuan Wei, Qian Yin. 214-217 [doi]
- Fuzzy Factor in Switching Regression ModelsXiaobing Yang, Lingmin He, Jin Tan. 218-221 [doi]
- Personalized Web Search Using User ProfileJingqiu Xu, Zhengyu Zhu, Xiang Ren, Yunyan Tian, Ying Luo. 222-226 [doi]
- Mining Temporal Web Interesting PatternsXianwei Hu, Ying Yin, Bin Zhang. 227-231 [doi]
- Frequent Closed Informative Itemset MiningHuaiguo Fu, MÃÂcheál Ó Foghlú, Willie Donnelly. 232-236 [doi]
- Data Extraction from Deep Web PagesJufeng Yang, Guangshun Shi, Yan Zheng, Qingren Wang. 237-241 [doi]
- Web pages Classification Using Domain Ontology and ClusteringSima Soltani, Ahmad Abdollahzadeh Barforoush. 242-246 [doi]
- A Multi-Agent Based Autonomic Management Architecture for Large-Scale Server ClustersZhenghua Xue, Xiaoshe Dong, Weizhe Liu, Junyang Li, Shihua Liao. 247-251 [doi]
- Quantum Varying Deficit Round Robin Scheduling Over Priority QueuesWeiming Tong, Jing Zhao. 252-256 [doi]
- iRBO: Intelligent Role-Based Object for Object-Based Storage DeviceYinliang Yue, Fang Wang, Dan Feng. 257-26 [doi]
- L-Chord: Routing Model for Chord Based on Layer-DividingBiqing Wang, Peng He. 262-265 [doi]
- Implementation and Performance Evaluation of an Adaptable Failure Detector for Distributed SystemJingli Zhou, Guang Yang 0005, Lijun Dong, Gang Liu. 266-270 [doi]
- An Adaptive Join Strategy in Distributed Data Stream Management SystemXiaojing Li, Yu Gu, Dejun Yue, Ge Yu. 271-275 [doi]
- Topic-Oriented Search Model Based on Multi-AgentJie Shen, Rong-shuang Sun, Liu-hua Wei, Hui Zhang, Yan Zhu, Chen Chen. 276-280 [doi]
- A Formal Open Framework Based on Agent for Testing Web ApplicationsHuaikou Miao, Shengbo Chen, Zhong-sheng Qian. 281-285 [doi]
- A Recognition Approach for Adversarial Planning Based on Complete Goal GraphJi-Li Yin, Ying Liu, Jin-Yan Wang, Wen-xiang Gu, Yin-Ping Zhang. 286-290 [doi]
- A Quantifiable Trust Model for Multi-agent System Based on Equal RelationsLi Li, Hao Li, Gehao Lu, Shaowen Yao. 291-295 [doi]
- A Multi-Agent and PSO Based Simulation for Human Behavior in Emergency EvacuationYang Bo, Wang Cheng, Huang Hua, Li Lijun. 296-300 [doi]
- Theoretical Investigation on Post-Processed LDA for Face and Palmprint RecognitionJianye Hao, Wangmeng Zuo, Kuanquan Wang. 301-305 [doi]
- New Parallel Models for Face RecognitionHeng Fui Liau, Kah Phooi Seng, Yee Wan Wong, Li-minn Ang. 306-309 [doi]
- A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information AuditQin-dong Sun, Qian Wang, Xin-bo Huang. 310-314 [doi]
- Face Detection from Greyscale Images Using Details from Categorized Wavelet Coefficients as Features for a Dynamic Counterpropagation NetworkLee Seng Yeong, Li-minn Ang, Kah Phooi Seng. 315-319 [doi]
- An Improved Competitive and Cooperative Learning Approach for Data ClusteringShao-ping Wang, Wenjiang Pei, Yiu-ming Cheung. 320-324 [doi]
- Shape Modification of B-Spline Curve with Geometric ConstraintsSiyuan Cheng, Xiangwei Zhang, Kelun Tang. 325-329 [doi]
- A New Anisotropic Diffusion Equation with Adaptive Fidelity TermXiaoli Sun, Guoxiang Song. 330-334 [doi]
- An Effective Approach towards Contour-Shape RetrievalJunding Sun, Xiaosheng Wu. 335-338 [doi]
- A Fast and Robust People Counting Method in Video SurveillanceEnwei Zhang, Feng Chen. 339-343 [doi]
- A Hard Decision Error Correction Scheme for Corrupted Arithmetic CodesMengmeng Zhang, Yuehai Wang, Jingzhong Wang, Shumin Zhou. 344-346 [doi]
- Level Set Method for License Plate Localization TechnologyYuwang Yang, Jun Tao, Jingyu Yang. 347-350 [doi]
- A New MRF Framework with Dual Adaptive Contexts for Image SegmentationPing Zhong, Fang Liu, Runsheng Wang. 351-355 [doi]
- Human Body Segmentation in the Presence of OcclusionBi Sheng, Xiaoyan Shen, Wang Qiang. 356-360 [doi]
- An Effective Approach to Content-Based 3D Model Retrieval and ClassificationKe Lu, Feng Zhao, Ning He. 361-365 [doi]
- 3D Feature Extraction of Head based on Target Region MatchingHaibin Yu, Jilin Liu, Jingbiao Liu. 366-370 [doi]
- Extraction of Semantic Keyframes Based on Visual Attention and Affective ModelsZhi-Cheng Zhao, An-Ni Cai. 371-375 [doi]
- A Color and Texture Feature Based Approach to License Plate LocationJia Li, Mei Xie. 376-380 [doi]
- Salience-Based Evaluation Strategy for Image AnnotationYong Ge, Jishang Wei, Xin Yang, Xiuqing Wu. 381-385 [doi]
- Study on Conversion Method of Color Space under a Big Color GamutHongxia Zhao, Tao Wang. 386-390 [doi]
- Image Restoration Using Gaussian Particle FiltersYuelu Liu, Tingzhi Shen, Xinyi Wang. 391-394 [doi]
- Spectral Correspondence Using Local Similarity AnalysisJun Tang, Dong Liang, Nian Wang, Zhao-Hong Jia. 395-399 [doi]
- A Combined Feature for Fingerprint RecognitionMonireh Abdoos, Nasser Mozayani. 400-404 [doi]
- Face Recognition Using Topology Preserving Nonnegative Matrix FactorizationTaiping Zhang, Bin Fang, Guanghui He, Jing Wen, Yuanyan Tang. 405-409 [doi]
- 2D-NPP: An Extension of Neighborhood Preserving ProjectionZirong Li, Minghui Du. 410-414 [doi]
- Laser Printer Fuzzy Identification Based on Correlative Specific Area of Character ImageNing Wang, Guo-qiang Han. 415-419 [doi]
- Improved Facial Feature Points Calibration Algorithm Based on ASMDai Liming, Liu Miao, Chen Yuanyuan. 420-423 [doi]
- A Constrained Genetic Algorithm for Efficient Dimensionality Reduction for Pattern ClassificationRajesh Chandrasekhara Panicker, Sadasivan Puthusserypady. 424-427 [doi]
- Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised ClassificationChun-Guang Li, Jun Guo, Honggang Zhang. 428-432 [doi]
- Traffic Signs Detection and Recognition by Improved RBFNNYangping Wang, Jianwu Dang, Zhengping Zhu. 433-437 [doi]
- Extracting Digital Fingerprints from Chinese DocumentsGuo-hua Liu, Huidong Ma, Xu Li, Peng Liang. 438-441 [doi]
- A Model for Fitting the Yield Curve Based on a Continuous Penalty FunctionXuan Wang, Shi An. 442-445 [doi]
- Case-Based Reasoning Combined with Information Entropy and Principal Component Analysis for Short-Term Load ForecastingJinsha Yuan, Li Qu, Weihua Zhang, Li Li. 446-450 [doi]
- MPIDA: A Sensor Network Topology Inference AlgorithmTao Zhao, Wandong Cai, Yongjun Li. 451-455 [doi]
- Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule MiningSheng-Fei Hsu, Dong-Her Shih, Hui-Ling Yu. 456-460 [doi]
- Image Retrieval with Simple Invariant Features Based Hierarchical Uniform SegmentationMingxin Zhang, Zhaogan Lu, Junyi Shen. 461-465 [doi]
- A New Topic Influence Model Research in Online CommunityJun-bo Gao, Bo-wen An, An-jun Song, Xiao Feng Wang. 466-469 [doi]
- Study of Immune PID Adaptive Controller and Its Applications in Thermal Control SystemDaogang Peng, Hao Zhang, Li Yang, Longhu Xu. 470-474 [doi]
- A Fuzzy Clustering Algorithm Based on Artificial Immune PrinciplesFurong Liu, Changhong Wang, X. Z. Gao, Qiaoling Wang. 475-479 [doi]
- Construct a Real-time Selective Neural Group Network Controller for Internet-Based Teleoperation SystemXiang Li, Yuechao Wang. 480-484 [doi]
- Neurodynamic Analysis for Symmetric Schur Decomposition ProblemsQuanju Zhang, Yi Niu, Yajuan Yang, Wenxue Niu. 485-489 [doi]
- Fuzzy Control System Based on Wavelet AnalysisRui Wang, Zhaoming Lei, HeXu Sun, Yi Zheng. 490-494 [doi]
- Some Geometric Aggregation Operators Based on Interval-Valued Intuitionistic Fuzzy Sets and their Application to Group Decision MakingGuiwu Wei, Xiaorong Wang. 495-499 [doi]
- Fuzzy Distribution Games with Minimum Risk CriteriaBin Sun, Yan-Kui Liu. 500-504 [doi]
- Bounds on the Value of Fuzzy Solution to Fuzzy Programming ProblemMing-Fa Zheng, Yan-Kui Liu. 505-509 [doi]
- On Fuzzy Modulator for the PMSM Step Motion ControlZhaoming Lei, HeXu Sun, Yan Dong, Yi Zheng. 510-514 [doi]
- Fuzzy Random Portfolio Selection ProblemFang-Fang Hao, Yan-Kui Liu. 515-519 [doi]
- A Fuzzy Model of Interval speed Continuous Petri NetsYueying Peng, Weizhi Liao, Kaoru Hirota. 520-525 [doi]
- Selection of Delay Time Window and Delay Time in Phase Space ReconstructionWei-Dong Cai, Yi-Qing Qin, Bing-Ru Yang. 526-530 [doi]
- A Novel Architecture for the Computation of the 2D-DWTKaleem Fatima, Vijay Gopal Sarvepalli, Zeeshan Nadeem Nakhi. 531-535 [doi]
- Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm OptimizationFuqing Zhao, Qiuyu Zhang, Aihong Zhu. 536-539 [doi]
- A Dish Parallel BP for Traffic Flow ForecastingGuozhen Tan, Qing-qing Deng, Zhu Tian, Ji-xiang Yang. 546-549 [doi]
- An Improved Neural Network Model for Graduate Education EvaluationQiong Bao, Xingsheng Gu, Yongjun Shen. 550-554 [doi]
- Supervised FCNN Classification for Garment SeamsYonghui Pan, Fang Bao, Shitong Wang. 555-559 [doi]
- Simulation of T-S Fuzzy Neural Network to UASB Reactor Shocked by Toxic LoadingGang Cao, Mingyu Li, Cehui Mo. 560-564 [doi]
- The Off-Line and On-Line Fuzzy Backstepping Controllers for Rotary Inverted Pendulum SystemMahsa Rahmanian, Mahdi Aliyari Shoorehdeli, Mohammad Teshnehlab. 565-569 [doi]
- Dynamic System Modeling with Multilayer Recurrent Fuzzy Neural NetworkHe Liu, Dao Huang, Li Jia. 570-574 [doi]
- Study of an Adaptive Immune Detection Algorithm for Anomaly DetectionYa Jing Zhang, Yi-ming Zhai, Zhen-bin Du, Dian-tong Liu. 574-578 [doi]
- A Method of Fine-Grained Authorization and Access Control for ASP PagesTing Wang, Xingyuan Chen, Bin Zhang, Lichun Pei. 579-583 [doi]
- The Research and Application of Resource Dissemination Based on Credibility and UCONFengying Wang, Fei Wang. 584-588 [doi]
- A Flexible Subscription Model for Broadcasted Digital ContentsFranz Kollmann. 589-593 [doi]
- A Biometric Verification System Addressing Privacy ConcernsStelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti. 594-598 [doi]
- A New Forward-Secure Threshold Signature Scheme Based on Schnorr CryptosystemGuosheng Cheng, Cuilan Yun. 599-603 [doi]
- A Novel Trust Community Based on Direct Certifying for Pervasive Computing SystemsZhiyu Peng, Shanping Li, Xin Lin. 604-608 [doi]
- Audio-Visual Recognition System with Intra-Modal FusionYee Wan Wong, Kah Phooi Seng, Li-minn Ang, Wan Yong Khor, Fui Liau. 609-613 [doi]
- An Efficient Credential-Based Scheme for Cross-Domain File SharingLanxiang Chen, Dan Feng. 614-617 [doi]
- An Effective Genetic Algorithm for Self-Inverse S-BoxesHua Chen, Dengguo Feng. 618-622 [doi]
- Design of an Instruction for Fast and Efficient S-Box ImplementationMeifeng Li, Guanzhong Dai, Hang Liu, Wei Hu. 623-626 [doi]
- Pairing-Based Proxy Signature Scheme with Proxy Signer?s Privacy ProtectionZhao Jianjun, Liu Jingsen. 627-631 [doi]
- An Improved Key Agreement Protocol Based on Key Association Set for Dynamic Peer GroupChuyuan Wei, Ying Hao, Cheng Lv, Liping Qian. 632-636 [doi]
- Efficient Zaps and Signatures of KnowledgeChunming Tang, Dingyi Pei, Zheng-an Yao. 637-641 [doi]
- Game-Based Analysis of Multi-Party Non-Repudiation ProtocolsXueming Wang, Xiang Li. 642-646 [doi]
- Forward Security for an Efficient Password-Based Authenticated Key ExchangeTingjun Liu, Shuhua Wu, Yuefei Zhu. 647-651 [doi]
- A Note on Shacham and Waters Ring SignaturesPuwen Wei, Mingqiang Wang, Wei Wang. 652-656 [doi]
- Generalized Synchronization Theorem for Undirectional Discrete Systems with Application in Encryption SchemeYe Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin. 657-661 [doi]
- A Provable Secure Key Management Program for Wireless Sensor NetworkLiufei Wu, Yuqing Zhang, Fengjiao Wang. 662-666 [doi]
- A Single Key MAC Based on Hash127Jin Xu, Dayin Wang. 667-671 [doi]
- To Solve the High Degree CongruenceShenghui Su, Shuwang Lv. 672-676 [doi]
- Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic CurvesZuowen Tan. 677-681 [doi]
- A Robust Estimator for Evaluating Internet Worm Infection RateYan Deng, Guanzhong Dai, Shuxin Chen. 682-686 [doi]
- A Typical Set Method of Intrusion Detection Technology Base on Computer Audit DataXuetao Duan, Chunfu Jia, Yubing Fu. 687-691 [doi]
- A Context-Based Analysis of Intrusion Detection for Policy ViolationKaiyu Wan, Vasu S. Alagar, Zongyuan Yang. 692-696 [doi]
- DDoS Attack Detection Based on RLT FeaturesTu Xu, Dake He, Yu Luo. 697-701 [doi]
- Scenario Discovery Using Abstracted Correlation GraphSafaa O. Al-Mamory, Hongli Zhang. 702-706 [doi]
- A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSsChun Yang, Haidong Yang, Fei-qi Deng. 707-711 [doi]
- A Hybrid Approach for Real-Time Network Intrusion Detection SystemsSang Min Lee, Dong Seong Kim, Jong Sou Park. 712-715 [doi]
- Research on the Resilience of Key Management in Sensor NetworksYulong Shen, Jianfeng Ma, Qingqi Pei. 716-720 [doi]
- A New Centralized Group Key Distribution and Revocation in Sensor NetworkTegshbayar Gerelbayar, Jong Sou Park. 721-724 [doi]
- An Efficient Identity-Based Short Signature Scheme from Bilinear PairingsHongzhen Du, Qiaoyan Wen. 725-729 [doi]
- A Tight Security Reduction Identity-Based Signature SchemeLi Kang, Xiaohu Tang, Xianhui Lu, Jia-Fan. 730-734 [doi]
- Security Assurance for Dynamic Role Mapping in a Multi-Domain EnvironmentCuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu. 735-739 [doi]
- Toward Assessing Vulnerability and Risk of Sensor Networks under Node CompromiseDong Seong Kim, Yoonk Kyung Suh, Jong Sou Park. 740-744 [doi]
- A Security Model for Networked Manufacturing SystemLujiong Wang, Aiping Li, Liyun Xu. 745-749 [doi]
- An Email Geographic Path-Based Technique for Spam FilteringYu Jiang, Ni Zhang, Binxing Fang. 750-753 [doi]
- An Improved DAD Check Scheme MLD-Based in FHMIPv6Wei Sun, Lin Chen, Jian Song. 754-758 [doi]
- An Efficient Survivability Hierarchy Analysis Model for Networked Information SystemLejun Zhang, Lin Guo, Wu Yang, Wei Wang, Yongtian Yang. 759-762 [doi]
- Testing Approach of Component Security Based on Fault InjectionJinfu Chen, Yansheng Lu, Xiaodong Xie. 763-767 [doi]
- A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective AnalysisZhang Yong, Xiaobin Tan, Hongsheng Xi. 768-772 [doi]
- A Quantitative Evaluation Model for Network SecurityDapeng Man, Wu Yang, Yongtian Yang, Wei Wang, Lejun Zhang. 773-777 [doi]
- A Period-Finding Method for Shor?s AlgorithmWeiqiang Zhang, Chen Xu, Feipeng Li, Jiqiang Feng. 778-780 [doi]
- Hidden-ID Authentication Scheme and its SVO-Logic Based Formal AnalysisJin Jiang, Lei Li, Zhihong Huang. 781-784 [doi]
- Research of Software Reliability Based on Synthetic ArchitectureJun Wang, Jun Liu, Weiru Chen. 785-788 [doi]
- An EMAIL Based Automated Trust Negotiation ModelZhensong Liao, Hai Jin, Deqing Zou, Chisong Li. 789-793 [doi]
- An Artificial Intelligence Based Approach for Risk Management Using Attack GraphSomak Bhattacharya, S. K. Ghosh. 794-798 [doi]
- Game Theory Based Optimization of Security ConfigurationJin Shi, Yin Lu, Li Xie. 799-803 [doi]
- Adaptive Trust Management in MANETYunfang Feng. 804-808 [doi]
- A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key CryptographyFengjiao Wang, Yuqing Zhang. 809-814 [doi]
- A Model of Hierarchical Key Assignment Scheme with CRTJing Zhao, Zhigang Zhang, MaoZhi Xu. 815-818 [doi]
- A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense StrategyWei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song. 819-823 [doi]
- Handling Information Release and Erasure in Multi-Threaded ProgramsLi Jiang, Lingdi Ping, Xuezeng Pan. 824-828 [doi]
- A Quantitative Security Model of IMS SystemXiaofeng Qiu, Ning Zhi, Xinxin Niu. 829-832 [doi]
- An Efficient Authentication Strategy for Reprogramming of Sensor NetworksJin Tan, JinTan Chen, YanQiu Liu. 833-837 [doi]
- Protecting XML Databases against Ontology-Based Inference AttackYang Lu, Junmo Xiao, Jing Liu. 838-842 [doi]
- Image Encryption Algorithm of Double Scrambling Based on ASCII Code of Matrix ElementGuodong Ye, Xiaoling Huang, Changqing Zhu. 843-847 [doi]
- SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor NetworksShih-I Huang, Shiuhpyng Shieh. 848-852 [doi]
- Multi-Perspective Quantization Model for Cyberspace Security Situation AwarenessXiaobin Tan, Zhang Yong, Hongsheng Xi. 853-857 [doi]
- Reinforcing Business Leaders? Role in Striving for Information SecurityJuhani Anttila. 858-862 [doi]
- Secure and Flexible Digital Rights Management in a Pervasive Usage ModeZhaofeng Ma, Yixian Yang, Xinxin Niu. 863-867 [doi]
- Controlled Secret LeakageTianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo. 868-872 [doi]
- A New Method Considering Creditability Degree and Connection of Buyers and Sellers in E-Broker SystemShaomin Zhang, Wei Wang. 873-878 [doi]
- Modified Original Smart Cards and Smart Card Clone CountermeasuresAlfredo De Santis, Claudio Soriente. 878-882 [doi]
- Design of a New Selective Video Encryption Scheme Based on H.264Yajun Wang, Mian Cai, Feng Tang. 883-882 [doi]
- CMS System of DRM Technology Base that Use Web Contents Certification CodeYoung-Bok Cho, Yong-Zhen Li, Ning Sun, Sang Ho Lee. 888-891 [doi]
- A Context-Aware Trust Establishment and Mapping Framework for Web ApplicationsYong Wang, Ming Li, Jingfeng Xue, Jing-jing Hu, Longfei Zhang, Lejian Liao. 892-896 [doi]
- A Digital Fingerprint Coding Based on Turbo CodesZhiguang Zhang, Xiaosu Chen, Miao Zhou. 897-901 [doi]
- A Stream Cipher Engine for Ad-Hoc SecurityMasa-Aki Fukase, Tomoaki Sato. 902-906 [doi]
- Secure Hop-Count Based Localization in Wireless Sensor NetworksYingpei Zeng, Shigeng Zhang, Shanqing Guo, Xie Li. 907-911 [doi]
- A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking TechnologyJiehong Wu, Yujie Zhang, Xiaowei Wang, Guiran Chang. 912-916 [doi]
- Identity-Based Key Issuing Protocol for Ad Hoc NetworksYongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang. 917-921 [doi]
- A New Statistical Hitting Set Attack on Anonymity ProtocolsJing Liu, Hong-yun Xu, Cheng Xie. 922-925 [doi]
- Research on Video Watermarking Scheme Based on Chaos, DWT and JND ModelShuguo Yang, Sheng-He Sun, Chunxia Li. 926-930 [doi]
- Robust Watermark Model Based on Subliminal ChannelCheng Yang, Jianbo Liu, Yaqing Niu. 931-934 [doi]
- Two-Dimensional Wavelet Filters for WatermarkingJianwei Yang, Wenbing Chen, Guosheng Cheng. 935-939 [doi]
- Analysis on the Sensitivity Attack to Watermarking Schemes with Patchwork Detection BoundariesQiyang Zhao, Zhonglin Wang, Baolin Yin. 940-944 [doi]
- A Blind Video Watermarking Algorithm Based on 3D Wavelet TransformDa-Wen Xu. 945-949 [doi]
- Adaptive Encrypted Information Hiding Scheme for ImagesBin Zhao, Kai Fan, Yue Wang, Weidong Kou. 950-953 [doi]
- Using Chain Graphical Model to Analyze the Efficacy of a Chinese MedicineHui Zhao, Zhongguo Zheng. 954-958 [doi]
- Gene Selection Using Neighborhood Rough Set from Gene Expression ProfilesShulin Wang, Huowang Chen, Shutao Li. 959-963 [doi]
- An Improved Algorithm for Iris LocationXuehu Yan, Shenhong Chen, Xiamu Niu. 964-967 [doi]
- Dynamical Behavior of Three-Order Cellular Neural Network with Application in Image Secure CommunicationFei Xiang, Huijuan Xiao, Shuisheng Qiu, Chengliang Deng. 968-971 [doi]
- Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption SchemeTing Liu, Ye Ji, Lequan Min, Geng Zhao, Xiaohong Qin. 972-976 [doi]
- The Representation of Chinese Semantic Knowledge and its Application in the Document Copy DetectionXu Li, Guo-hua Liu, Huidong Ma, Lei Wang. 977-980 [doi]
- Defaults Assessment of Mortgage Loan with Rough Set and SVMBo Wang, Yongkui Liu, Yanyou Hao, Shuang Liu. 981-985 [doi]
- Optimistic Design of Jetty Road Height Based on Genetic AlgorithmsYan-Long Qin, Ming-Chang Li, Zhao-Chen Sun, Yu-Xia Yang, Hai-Bin Xu. 986-990 [doi]
- Calculation and Analysis of Double-Fed VSCF Induction Generator Operating PerformancePeng Cheng, Weili Li, Wenbiao Chen, Deyuan Xia. 991-994 [doi]
- Research on Refining Mesh of Ship Hatch Corner Based on Transition ElementPei-lin Liu, Feng Li, Yi-jun Tan. 995-999 [doi]
- Speech Tagging Based Improvement of the RSS Polymerization NewsYing Bi, Peijun Ma, Yixin Jing, Doo-Kwon Baik. 1000-1004 [doi]
- Low-Complexity Line-Based Motion Estimation AlgorithmLi Wern Chew, Li-minn Ang, Kah Phooi Seng. 1005-1009 [doi]
- A Particle Swarm Optimization for Resource-Constrained Multi-Project Scheduling ProblemDeng Linyi, Lin Yan. 1010-1014 [doi]
- A Data Engine for Controller Area NetworkWeiming Tong, Chengde Tong, Yong Liu. 1015-1019 [doi]
- A Supply Chain Network Design Model for Deteriorating ItemsKai Tang, Chao Yang, Jun Yang. 1020-1024 [doi]
- The Study of Compost Quality Evaluation Modeling Method Based on Wavelet Neural Network for Sewage TreatmentJingwen Tian, Meijuan Gao, Yanxia Liu, Hao Zhou. 1025-1029 [doi]
- Structural Analysis of Printed Mathematical ExpressionXue-dong Tian, Si Wang, Xiao-yu Liu. 1030-1034 [doi]
- Design of Automatic Database Schema Generator Based on XML SchemaJongSeon Lim, Kyung-Soo Joo, Kyungsoo Kim, Mun-Young Choi. 1039-1043 [doi]
- Application of Least Squares-Support Vector Machine for Measurement of Soluble Solids Content of Rice Vinegars Using Vis/NIR SpectroscopyFei Liu, Yong He, Li Wang. 1044-1047 [doi]
- Test Case Automate Generation from UML Sequence Diagram and OCL ExpressionBao-Lin Li, Zhi-shu Li, Li Qing, Yan-Hong Chen. 1048-1052 [doi]
- A Novel Cluster-Based Routing Algorithm in Ad Hoc NetworksDongni Li. 1053-1057 [doi]
- Estimation of System Power Consumption on Mobile Computing DevicesNiu Limin, Xiaobin Tan, Baoqun Yin. 1058-1061 [doi]
- Cluster-Based System-Level Fault Diagnosis in Hierarchical Ad-Hoc NetworksDongni Li. 1062-1066 [doi]
- An Energy Efficient Directed Diffusion Routing ProtocolShousheng Zhao, Fengqi Yu, Baohua Zhao. 1067-1072 [doi]