Abstract is missing.
- Effective Method for Moving Objects Detection on Sea SurfaceXie Xiaozhu, Hong Jingxin, Xiao Sixing. 1-4 [doi]
- A Distributed Cache Management Model for P2P VoD SystemWeifang Liang, Jihai Huang, Jianhua Huang. 5-8 [doi]
- Strategy for Tasks Scheduling in Grid Combined Neighborhood Search with Improved Adaptive Genetic Algorithm Based on Local Convergence CriterionYuan Jia-bin, Luo Jiao-min, Su Zhen-yu. 9-13 [doi]
- Study on Application of CAD SonificationZhang Yinnan, Cen Gang, Fang Zhigang. 14-17 [doi]
- Building Data Grid for Spatial Information Applications by Meta-Data AdaptersZhenchun Huang, Guoqing Li. 18-21 [doi]
- A Framework for Engineering Structure Experiment and Simulation GridLong Hao, Rui-Hua Di. 22-26 [doi]
- Research and Application of Fault-Tolerance Based on Watershed Model Grid PlatformZhijian Wang, Ling Shang, Feng Xu. 27-30 [doi]
- A Numerical Simulation of Motion of Particles under the Wafer in CMPHao Zhang, Yuanqiang Tan, Mingjun Li. 31-34 [doi]
- Dynamic Replica Placement and Location Strategies for Data GridQingfan Gu, Bing Chen, Yuping Zhang. 35-40 [doi]
- Interoperability Research of Heterogeneous GIS Based on Spatial Information GridYu Sun, Li Guoqing. 41-44 [doi]
- GOVFiR: Grid Computing Based Online Virtual Fitting RoomCongfeng Jiang, Yinghui Zhao. 45-48 [doi]
- Probabilistic Route Mechanism of Considering Communication Time - PROPHETCCTXingfu Wang, Lei Qina, Pingqing Wei, Fuquan Dai, Fuyou Miao. 49-52 [doi]
- The Anatomy of Weka4WS: A WSRF-enabled Toolkit for Distributed Data Mining on GridZhao Zheng, Gao Shu. 53-57 [doi]
- Reputation Based Service Selection in Grid EnvironmentQing Ding, Xi Li, Xuehai Zhou. 58-61 [doi]
- A Grid Middleware DISQ for Data IntegrationXin Wang, Linpeng Huang, Yi Zhang. 62-65 [doi]
- A Grid-Based Distributed Database Solution for Large Astronomy DatasetsHelen X. Xiang. 66-69 [doi]
- Classified Optimization Scheduling Algorithm Driven by Multi-QoS Attributes in Economical GridYang Tao, Xing-jiang Yu. 70-73 [doi]
- Web Services Composition Method Based on OWLJike Ge, Yuhui Qiu, Shiqun Yin. 74-77 [doi]
- Hierarchical Semantic Overlay NetworkWang Zhi-xiao, Meng Fan-rong. 78-81 [doi]
- Scheduling Strategy in Parallel Applications Based on Ant Colony OptimizationGao Ren, Zhang Yun. 82-85 [doi]
- K-Chord: A Flexible Peer-to-Peer Resource Location ProtocolXu Xiang. 86-89 [doi]
- A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and CollusionWen Ji, Shoubao Yang, Bo Chen. 90-93 [doi]
- Sustained Online Duration - based Reputation Management for File-Sharing Peer-to-Peer SystemsWen Ji, Shoubao Yang, Fuli Liu. 94-97 [doi]
- The Common Problems on the Peer-to-Peer Multicast Overlay NetworksYang Feng, Dai Xiao-liang, Xu Ru-zhi. 98-101 [doi]
- Fault-Tolerant Routing for P2P System with Structured TopologyChuiwei Lu, Zhitang Li, Huaiqin Lin, Qingfeng Huang. 102-105 [doi]
- HilbertChord: A Kind of Method for Managing Service Resources in P2PYichuan Shao, Derong Shen. 106-109 [doi]
- Distributed and Effective Reputation Mechanism in P2P SystemsJianli Hu, Quanyuan Wu, Bin Zhou. 110-115 [doi]
- An Exhaustive Resource Search Algorithm Based on Ping-Pang MappingMande Xie, Yun Ling, Guiyi Wei. 116-120 [doi]
- A Measurement Study of Unstructured P2P OverlayJiaqi Liu, Zhigang Chen, Deng Li, Athanasios Vasilakos. 121-124 [doi]
- Constructing a Fractal P2P NetworkChangxiong Tang, Rui Wang. 125-129 [doi]
- A Novel Scheduling Algorithm Based on Buffered Crossbar Switch Fabric in EPFTS SwitchDengyuan Xu. 130-132 [doi]
- A Constrained QoS Multicast Routing Algorithm in Ad HocXia Chunhua, Gui Chao. 133-136 [doi]
- Supporting QoS Guarantees Using Traffic Engineering and Policy Based RoutingPriyadarsi Nanda. 137-142 [doi]
- Multi-rate QoS Enabled NDMR for Mobile Ad Hoc NetworksLuo Liu, Laurie G. Cuthbert. 143-146 [doi]
- A Performance Comparison of Equation-Based and GAIMD Congestion Control in Mobile Ad Hoc NetworksWei Sun, Tao Wen, Quan Guo. 147-152 [doi]
- Quality Driven Web Services Composition Based on an Extended Layered GraphYingqiu Li, Minghua Chen, Tao Wen, Lei Sun. 153-156 [doi]
- QoS-Satisfied Pathover Scheme in FMIPv6 EnvironmentJiemin Liu, Laiquan Han. 157-160 [doi]
- Market-Driven Based Resource Scheduling Algorithm in Computational GridBing Tang, Zude Zhou, Quan Liu, Fangmin Li. 161-164 [doi]
- An Identity-Based Authentication Model for Multi-domain in Grid EnvironmentWenbo Zhang, Hongqi Zhang, Bin Zhang, Yan Yang. 165-169 [doi]
- QoS Matching Offset Algorithm Based on Trust-Driven for Computing GridRan Li, Jiong Yu. 170-173 [doi]
- A Novel Reputation-Based Trust Architecture for P2P E-Commerce SystemsWei Zhou, Jianjun Yu, Gang Xue, Shaowen Yao, Guowei Yu. 174-177 [doi]
- An Overall Construction of SMIS in Chinese EnterprisesLi Meng, Liu Ruiyu. 178-181 [doi]
- An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust NegotiationYan He, Miaoliang Zhu, Chunying Zheng. 182-185 [doi]
- Fast Cascading Replication Strategy for Data GridLiang Hong, Qi Xue-dong, Li Xia, Li Zhen, Wang Wen-xing. 186-189 [doi]
- A New Nonlinear Filter Algorithm Based on QMC QuadratureHuang Dong-min, Pan Quan. 190-193 [doi]
- Cluster-Based Error Messages Detecting and Processing for Wireless Sensor NetworksYunyi Zhang, Deyun Zhang, Jun Yang, Wei Wei. 194-197 [doi]
- Parallel Image Processing Based on CUDAZhiyi Yang, Yating Zhu, Yong Pu. 198-201 [doi]
- Multipath Routing Based on Ant Colony System in Wireless Sensor NetworksRen Xiu-li, Liang Hong-wei, Wang Yu. 202-205 [doi]
- Distributed System for Transfusion Supervision Based on Embedded SystemFenge Bai, Lifeng Huo, Li Bai, Junying Wang. 206-210 [doi]
- The Research of Time Efficiency in Adaptive Content DeliveryXiang Li. 211-214 [doi]
- A Request Handling Mechanism with the Shortest Processing-Time First in Web ServersGuimin Huang, Ya Zhou. 215-218 [doi]
- Research and Development of Component-Based Marine Data Integration MiddlewareHai-tao Li, Ge Chen. 219-222 [doi]
- EDVO: A One-Station Emergency Response Service Model Based on Ontology and Virtual OrganizationZhang Kang-kang, Yang Feng, Zhang Wen-yu, Lin Pei-guang. 223-226 [doi]
- Dynamic Software Upgrading for Distributed System Based on R-OSGIDejun Wang, Linpeng Huang, Jiankun Wu, Xiaohui Xu. 227-231 [doi]
- Reliable and Efficient Adaptive Streaming Mechanism for Multi-user SVC VoD System over GPRS/EDGE NetworkLina Zhang, Chun Yuan, Yuzhuo Zhong. 232-235 [doi]
- The Research on Dynamic Replication and Placement of File Using Dual-Threshold Dynamic File Migration AlgorithmXiuyan Guo, Jun Li, Jian Yang, Jinlin Wang. 236-240 [doi]
- A Novel Data Replication and Placement Scheme for Time-Shifted TV ClusterJu-Chao Zhuo, Jun Li, Gang Wu, Li-Yue Zhu. 241-245 [doi]
- A GOP-Adaptive Priority-Based Rate-Distortion Optimization Bitstream Extraction Algorithm for Scalable Video CodingChunhua Li, Chun Yuan, Yuan Liu, Yuzhuo Zhong. 246-249 [doi]
- Subjective Evaluation of Sound Quality for Mobile Spatial Digital AudioCong Zhang, Ruimin Hu. 250-253 [doi]
- A New Method to I/O Combination on RAID ControllerLu Zheng-wu, Jiang Guo-song, Wang Long-juan. 254-259 [doi]
- Research of Improving RAID Read PerformanceZheng-Wu Lu, Chang-Sheng Xie, Guo-Song Jiang, Yu-De Wang. 260-263 [doi]
- Nonmetric Multicommodity Facility Location and K-Median Problem with Service Installation CostsDongMei Xing. 264-269 [doi]
- Robust Wireless Video Transmission Strategies for Video CommunicationsJiasheng Chen, Yanqiong Ding, Xuewu Zhang, Ruiyu Liang, Dunqin Duan. 270-274 [doi]
- An I/O Acceleration Technology for Network Computing: iTRMTan Huai-liang, Tang Wei-xin, Sun Jian-hua. 275-278 [doi]
- Distributed Finite Element Analysis Implementation in .NETWenjun Liu, Rongqiao Wang. 279-282 [doi]
- Optimizing the FMM-BEM for 3-D Elastic ProblemHailian Gui, Qingxue Huang. 283-286 [doi]
- Parallel Preconditioned GMRES Solvers for 3-D Helmholtz Equations in Regional Non-hydrostatic Atmosphere ModelLilun Zhang, Xiping Gong, Junqiang Song, Jianglin Hu. 287-290 [doi]
- Parallel Computing for Finite Element Structural Analysis on Workstation ClusterChaojiang Fu. 291-294 [doi]
- A Distributed Parallel Algorithm for Magnetotelluric Forward ModelingCheng Tang-pei, Wang Qun. 295-298 [doi]
- Parallel Finite Element Computation Based on Coarse-Fine Mesh FormulationChaojiang Fu. 299-302 [doi]
- Comparison Study about Heterogeneous Size Estimation MethodsCao Jia. 303-306 [doi]
- Lowering Conflicts of High Contention Software Transactional MemoryZhang Xiaoqiang, Peng Lin, Xie Lunguo. 307-310 [doi]
- A Local Deadlock Detection and Resolution Algorithm for Process NetworksWei Huang, Deyu Qi. 311-314 [doi]
- A Parallel Backward Reasoning Study Using Fuzzy Petri NetZhang Baiyi, Cui Shangsen. 315-319 [doi]
- A Parallel Algorithm for Molecule Problem Based on Interval AnalysisWenjun Liu. 320-323 [doi]
- Simulation Based Parallel Genetic Algorithm to the Lockage Co-scheduling of the Three Gorges ProjectXiaopan Zhang, Xide Fu, Xiaohui Yuan. 324-327 [doi]
- Impact of Extending the Runtime of Underestimated Jobs in Backfilling SchedulersBo Li, Jun Chen, Man Yang, Erfei Wang. 328-331 [doi]
- Intra-cluster Nodes Scheduling Algorithm Satisfying Expected Coverage Degree of Application in Distributed Clustering WSNsZhou Xin-lian, Gong Bo. 332-335 [doi]
- Mobile Multimedia Distributed Share Algorithm under Multiply Access ThresholdsQian Jun, Wang Kuang. 336-339 [doi]
- The Parallel Algorithm for Solving Cycle Block-Tridiagonal Linear EquationFan Yanhong, Lü Quanyi, Nie Yufeng. 340-342 [doi]
- A New Model for Maintaining Distributed Data ConsistenceMeng Qingyuan, Wang Haiyang, Xu Chunyang. 343-346 [doi]
- Fast Cell Scheduling Negotiation Algorithm in HSDPAQian Jun, Wang Kuang. 347-350 [doi]
- A Study on Customer Individual Demand-Oriented Networked Manufacturing SystemLiang Tang, Junming Hou, Wanshan Wang, Ke Jing. 351-354 [doi]
- A QoS Multicast Routing Protocol with Mobile Prediction Based on MAODV in MANETsXiaoyan Zhu, Jin Lian. 355-358 [doi]
- Complier-Directed Parallelization of a Multilevel Solver Algorithm for EDPZhe Li. 359-362 [doi]
- Extension of TD-pi Calculus in Real-Time Distributed Virtual-Test System DescriptionQiong Wang, Chenglie Du, Chunyan Ma, Gang Li. 363-369 [doi]
- Adaptor-Based Design and Implementation of Peer-to-Peer SIPLichun Li, Yang Ji, Chunhong Zhang, Yao Wang, Tao Ma. 370-373 [doi]
- Stochastic Process Algebra with Value-PassingGuang Zheng, Jinzhao Wu, Lian Li. 374-377 [doi]
- Demand-Driven Weak Clock Synchronization for Distributed ApplicationsXie Limei. 378-381 [doi]
- Research of Distribution Coupling Technology in Large-Scale Science Computation and Its Application in Marine Environment Forecast SystemDeng Jian, Liwen Huang, Wen Yuanqiao, Zhang Jinfeng. 382-385 [doi]
- Space-Time Correlation Based Fault Correction of Wireless Sensor NetworksWei Wei, Yabo Dong, Dongming Lu. 386-389 [doi]
- Dynamic Service Replica on Distributed Data Mining GridLin Huo, Yi Fang, Heping Hu. 390-393 [doi]
- A Semantic Integration Framework for E-Business and Logistics SystemsKui Fu, Guihua Nie, Donglin Chen, Huimin Wang. 394-397 [doi]
- Retaining the Semantics of Data with the DataConrad Mueller. 398-402 [doi]
- An Innovative Way to Implement Hierarchical Recovery Protocol in WANQin Jie, Li Guoping, Ma Min. 403-406 [doi]
- Dynamic Selection of Best Service in Semantic Web Service CommunityXuejuan Huang, Xinmeng Chen, Jinshuo Liu, Jiazhen Xu. 407-410 [doi]
- Lottery Router: A Customized Arbitral Priority NOC RouterChang Wu, Yubai Li, Song Chai, Zhongming Yang. 411-414 [doi]
- Semantic Web Recommendation Model of Distributing Educational ResourceXiwei Feng, Chuanying Jia, Jiaxuan Yang. 415-418 [doi]
- Matrix Inversion on a PIM (Processor-in-Memory)Jae Chul Cha, Sandeep K. Gupta. 419-422 [doi]
- A NoC Simulation and Verification Platform Based on SystemCSong Chai, Chang Wu, Yubai Li, Zhongming Yang. 423-426 [doi]
- Structural Optimization on Superscalar ProcessorsZhao Xianfeng. 427-430 [doi]
- The Optimization of Xen Network VirtualizationZhang Jian, Li Xiaoyong, Guan Haibing. 431-436 [doi]
- A Formal Framework for Policy-Governed Institutional AgencyGuoyong Cai, Junyan Qian, Ji Gao, Yong Huang. 437-440 [doi]
- A Research on an ASIP Processing Element Architecture Suitable for FPGA ImplementationLi Zhang, Shuangfei Li, Zan Yin, Wenyuan Zhao. 441-445 [doi]
- A High Performance Computing Platform for 3D Model RetrievalJiabin Ruan, Jinjie Lin, Yubin Yang, Wei Wei. 446-449 [doi]
- Parallel Clustering Algorithms for Image Processing on Multi-core CPUsHonggang Wang, Jide Zhao, Hongguang Li, Jianguo Wang. 450-453 [doi]
- DECF: A Coarse-Grained Data-Parallel Programming Framework for Seismic ProcessingChanghai Zhao, Haihua Yan, Xiaohua Shi, Lei Wang. 454-460 [doi]
- The Relation of Version Control to Concurrent ProgrammingAnnette Bieniusa, Peter Thiemann, Stefan Wehr. 461-464 [doi]
- Reliability and Safety Modeling of Fault Tolerant Control SystemYu Min, He Zhengyou, Qian Qingquan. 465-468 [doi]
- A Novel Evaluating Model of CPV Vocational Ability Based on SVM Multilayer ClassifierShuzhen Wang, Lei Yu, Zhibin Liu. 469-472 [doi]
- A Performance Model for Domino Mail ServerYi Liang, Lei Wang, Jianfeng Zhan, Ruihua Di. 473-476 [doi]
- Research on Evaluation of Parts Manufacturability Based on FeatureFan QingMing, Liu Geng, Liu HongJun. 477-480 [doi]
- Dependability Research of Cluster System Based on Stochastic Petri NetLiu Shixi, Xu Zhicai, Fang Xianwen. 481-485 [doi]
- LPV Model and Its Application in Web Server Performance ControlQilu Sun, Guanzhong Dai, Wenping Pan. 486-489 [doi]
- Formal Modeling of Transaction Behavior in WS-BPELYanxiang He, Liang Zhao, Zhao Wu, Fei Li. 490-494 [doi]
- Bandwidth and Efficiency of P2PSIP Based Server FarmChunhong Zhang, Yang Ji, Lichun Li. 495-498 [doi]
- Research on the Runtime Behavior of Composite SOAP Web Services under Transient LoadsYuxuan Meng, Ralph Deters. 499-504 [doi]
- Performance Comparison and Analysis of Routing Strategies in Mobile Ad Hoc NetworksFu Yongsheng, Wang Xinyu, Li Shanping. 505-510 [doi]
- An Improved Bayesian-Based RFID Indoor Location AlgorithmHuang Yihua, Lui Zongyuan, Ling Guojun. 511-514 [doi]
- The Universal Adaptor for Dynamic Ubiquitous Services Discovery and BindingYun-Young Hwang, Hyung-Jun Yim, Il-Jin Oh, Kyu-Chul Lee. 515-518 [doi]
- Preliminary Research on Wearable Healthcare in Ubiquitous Computing AgeJianxin Zhu, Leina Gao, Xinfang Zhang. 519-523 [doi]
- A Bandwidth Efficient Overlay for Information Exchange in Pervasive Computing EnvironmentKe Zuo, Dongmin Hu, Quanyuan Wu. 524-527 [doi]
- An Energy-Aware Distributed Clustering Algorithm in Wireless Sensor NetworksJianbo Xu, Yong He, Renfa Li. 528-531 [doi]
- Arithmetic Operation in Single MembranePing Guo, Haiyan Zhang. 532-535 [doi]
- An Algorithm for Dynamic Routing Based on Multi-paths in Wireless Sensor NetworksDongfang Wang, Xiaogang Qi. 536-539 [doi]
- Enhancing Pasifika Businesses Success with ICTKerese Manueli, Savae Latu, Donald Koh. 540-545 [doi]
- Modeling Malicious Code Spread in Scale-Free Networks of Moving AgentsChangguang Wang, Xu Bai, Shuai Fu, Jianfeng Ma. 546-549 [doi]
- An Optimal Power-Controlled Topology Control for Wireless Sensor NetworksXinhua Liu, Fangmin Li, Hailan Kuang. 550-554 [doi]
- Embedding in Two Least Significant Bits with Wet Paper CodingXin Liao, Qiao-Yan Wen. 555-558 [doi]
- Research on Method of Network Abnormal Detection Based on Hurst Parameter EstimationHongbin Xia, Wenbo Xu. 559-562 [doi]
- A Security Design of Data Exchange PlatformQinghua Zhang. 563-566 [doi]
- A Trusted Computing Technology Enabled Mobile Agent SystemZhi-Dong Shen, Xiaoping Wu. 567-570 [doi]
- Information Security Risk Assessment Method Based on CORAS FrameQi Yong, Xiao Long, Li Qianmu. 571-574 [doi]
- Robust Host Anomaly Detector Using Strong IsolationPeng Xinguang, Zhang Yanyan. 575-578 [doi]
- A Semi-fragile Watermarking Tolerant of Laplacian SharpeningJun Xiao, Ying Wang. 579-582 [doi]
- A Fast Audio Digital Watermark Method Based on Counter-Propagation Neural NetworksGuohua Wu, Xiaodong Zhou. 583-586 [doi]
- Mobile Banking Information Security and Protection MethodsJin Nie, Xianling Hu. 587-590 [doi]
- A Cluster Based Secure Cryptography for Sensor NetworksZhi Zhang, Guohua Cui. 591-594 [doi]
- Comprehensive Assessment Model of Network Vulnerability Based upon Refined Mealy AutomataChunlei Fu, Li Fu. 595-600 [doi]
- Analysis on Cyclic Multi-party Fair Exchange ProtocolsXiangdong Li, QingXian Wang, Li Chen. 601-604 [doi]
- BIFI: Architectural Support for Information Flow Integrity MeasurementHao Hu, Dengguo Feng. 605-609 [doi]
- Design of Universal Authority Management Model of Online Teaching SystemDiao Mingguang, Xue Tao, Pan Wenyong. 610-613 [doi]
- Study on MC-CDMA for Underwater Acoustic NetworksJiemin Yan, Ru Xu, Deqing Wang, Huabin Chen, Xiaoyi Hu. 614-617 [doi]
- The Application of a Scheme of Digital Signature in Electronic GovernmentZhu Na, Xiao Guo Xi. 618-621 [doi]
- Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance TestZhu Ning, Chen Xin-yuan, Zhang Yong-fu, Xin Si-yuan. 622-626 [doi]
- The Nonsubsampled Contourlet-Wavelet Hybrid Transform: Design and Application to Image WatermarkingHou Yingkun, Zhao Chunxia, Liu Mingxia, Yang Deyun. 627-630 [doi]
- Combined Public Key Cryptosystem Based on Conic Curves over the Ring ZnMingyuan Yu, Xianping Huang, Li Jiang, Ronghua Liang. 631-634 [doi]
- A Session Key Generator Based on Chaotic SequenceChen Zhuo, Zhang Zhengwen, Jiang Nan. 635-637 [doi]
- A Semi-fragile Watermarking Algorithm Based on HVS Model and DWTZhao Yang, Sun Xie-hua. 638-641 [doi]
- Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domainShaomin Zhang, Xiangjun Kong, Baoyi Wang. 642-645 [doi]
- A Role-Based Access Control Model for Complex AffairsHaoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang. 646-650 [doi]
- A Novel Strategy Enhancing Location Cloaker for Privacy in Location Based ServicesChengliang Wang, Jianwei Li, Juanjuan Chen, Zhi Zhuang, Yaxin Zhou. 651-655 [doi]
- Digital Right Management Model Based on Cryptography and Digital WatermarkingJiaming He, Hongbin Zhang. 656-660 [doi]
- A Role-Based Dynamic Authorization Model and Its Implementation in PMIHui Xie, Bin Zhang, Dianyou Hu. 661-664 [doi]
- Research and Design of One Key Agreement Scheme in BluetoothBin Yu, Haiyan Li. 665-668 [doi]
- Design and Analysis of the Three-Dimensional Bar CodeNingzhong Liu, Han Sun. 669-672 [doi]
- Research on an Immune Mechanism Based Intelligent Spam FilterLei Wang, Song Ma, Xin-hong Hei. 673-676 [doi]
- A Digital Image Scrambling Method Based on AES and Error-Correcting CodeNiu Jiping, Zhang Yongchuan, Hu Zhihua, Yang Zuqiao. 677-680 [doi]
- Dynamic Expression of Digital Rights by Rewriting LicenseLilong Han, Qingtang Liu, Zongkai Yang. 681-683 [doi]
- An Error Diffusion Based Algorithm for Hiding an Image in Distinct Two ImagesXi Zhuge, Koji Nakano. 684-687 [doi]
- A Role-Based Automated Trust Negotiation and Authentication Design in Mobile Ad Hoc NetworksQiang Zhang, Xiaowei Wang, Zhenghu Gong. 688-691 [doi]
- Spread Spectrum Watermark for Color Image Based on Wavelet Tree StructureQiujuan Liang, Zhizhong Ding. 692-695 [doi]
- An Extended Permission-Based Delegation Authorization ModelZhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng. 696-699 [doi]
- A Comparative Research of Robustness for Image WatermarkingMing-ming Xiao, Liang-Xuan Yu, Chuan-Ju Liu. 700-703 [doi]
- An Eavesdropping Proof Secure Online Voting ModelSanjay Saini, Joydip Dhar. 704-708 [doi]
- Stegonograhpy for High-Resolution Color Remote Sensing ImageXianmin Wang, Ruiqing Niu. 709-712 [doi]
- A Study on the Design and Implementation of EPCIS Trust ModelSun Jing, Ma Yu-Jian, Zhao Hui-Qun, Xiao Hui-Bin. 713-716 [doi]
- Interplay between Network Growing and Benefit CompetitionLi-Xin Zhong, Bi-Hui Chen, Cai-Feng Liu, Li Liang. 717-720 [doi]
- A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing TechnologySilei Lei, Jun Liu, Junmo Xiao. 721-724 [doi]
- Study on Implementation of a FingerprintWatermarkKang Hui, Liu Jing, Zhu Xiao-dong, Zhang Xiao-xu. 725-728 [doi]
- Toward Color Logo Watermark to JPEG2000 Compressed ImagesFan Yachun, Zhou Mingquan, Wang Xingce, Liu Xinyu. 729-732 [doi]
- Semi-fragile Watermarking Algorithm Based on Image CharacterChe Shengbing, Che Zuguo, Ma Bin, Huang Qiangbo. 733-737 [doi]
- An Adaptive Watermarking Algorithm in DWT Domain Based on Multi-scale Morphological GradientYanbin Fan, Wenyong Chen, Zhenkuan Pan. 738-741 [doi]
- Seal Identification Based on Pixel Distribution Probability with Three-Mode and Nine-SectionNing Wang. 742-745 [doi]
- Mining Method of Attribute Reduction Based on Rough Fuzzy Set TheoryChengxi Dong, Dewei Wu, Haibo Liu. 746-749 [doi]
- The Valuation of American Put Option Based on Fuzzy TechniquesXiaojian Yu, Zhaozhang Ren. 750-753 [doi]
- Network Threat Frequency Forecasting Based on Fuzzy Time Series and D-S Evidence TheoryFeng Wu, Yan Zhong, Quanyuan Wu. 754-757 [doi]
- Bayesian Network to Construct Interoperability Model of Open Source SoftwareLan Yuqing, Zhao Tong. 758-761 [doi]
- Cryptanalysis and Improvement of Two Blind Proxy Signature SchemesYanlin Qin, Xiaoping Wu. 762-765 [doi]
- A New Kind of Self-Certified Proxy Digital Signature SchemeYouan Xiao, Zude Zhou. 766-769 [doi]
- Trust Derivation and Transitivity in a Recommendation Trust ModelLi Lifen. 770-773 [doi]
- ID-Based Convertible Limited (Multi-)Verifier Signature SchemeXiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang. 774-777 [doi]
- Trust Management for Semantec WebJian-ping Qiu, Li-Chao Chen. 778-781 [doi]
- Replacement and Structure of S-Boxes in RijndaelDe Wang, Shi-Liang Sun. 782-784 [doi]
- Robust First Two Rounds Access Driven Cache Timing Attack on AESZhao Xinjie, Wang Tao, Mi Dong, Zheng Yuanyuan, Lun Zhaoyang. 785-788 [doi]
- A New Model for Authentication and Authorization across Heterogeneous Trust-DomainLiu Peng, Zong Rui, Liu Sizuo. 789-792 [doi]
- How Homogenize Chaos-Based Pseudo-random SequencesSheng Li-Yuan, Sheng Zhe, Xiao Yan-Yu. 793-796 [doi]
- Group-Based Trust Model in P2P System Based on Trusted ComputingNing Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi. 797-801 [doi]
- Public Key Homomorphism Based on Modified ElGamal in Real DomainLiang Chen, Chengmin Gao. 802-805 [doi]
- Research on Application of Immune Digital Watermark AlgorithmGe Xiuhui, Tian Hao. 806-809 [doi]
- Research on Application of Reversible Digital Watermark AlgorithmGe Xiuhui, Tian Hao. 810-813 [doi]
- Research on Dynamic Reputation Management Model Based on PageRankJue Wang, Jian Peng, Daping Zhang. 814-817 [doi]
- A New Chaotic Image Scrambling Algorithm Based on Dynamic Twice Interval-DivisionLiu Xiangdong, Zhang Junxing, Zhang Jinhai, He Xiqin. 818-821 [doi]
- A Novel Steganographic Algorithm Based on the Motion Vector PhaseXuansen He, Zhun Luo. 822-825 [doi]
- Cryptanalysis on an E-voting Scheme over Computer NetworkBaoyuan Kang. 826-829 [doi]
- An Aggregate Signature Scheme with Constant Pairing OperationsYiling Wen, Jianfeng Ma. 830-833 [doi]
- A Novel User Authentication Scheme Using Smart CardsQi Xie, Ji-Lin Wang, De-ren Chen, Xiu-Yuan Yu. 834-836 [doi]
- Chained Threshold Proxy Signature without and with SupervisionZoe L. Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong. 837-840 [doi]
- A Novel Encryption Algorithm Based on Shifting and Exchanging Rule of Bi-column Bi-row Circular QueueSuli Wu, Yang Zhang, Xu Jing. 841-844 [doi]
- The Research of Trust Model Based on Group-Recommend in P2P NetworkLi Chen, Liang Ju. 845-848 [doi]
- Discrete Chaotic Encryption and Decryption of Digital ImagesZhang Dinghui, Gu Qiujie, Pan Yonghua, Zhang Xinghua. 849-852 [doi]
- The Realization and Optimization of Secure Hash Algorithm (SHA-1) Based on LEON2 CoprocessorXia Hong, Ning Hui-ming, Yan Jiang-yu. 853-858 [doi]
- The Quickly Solving Method of File Recovery in Windows EnvironmentWei Huang, Yu Meisheng. 859-862 [doi]
- Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm PropagationXiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu. 863-867 [doi]
- The Worm Propagation Model and Control Strategy Based on Distributed HoneynetNarisa Zhao, Xianfeng Zhang. 868-871 [doi]
- Anonymous Proxy Authorization Signature Scheme with Forward SecurityXuanwu Zhou, Ping Wei. 872-875 [doi]
- A High Capacity Data Hiding Method Using PVD and LSBKi-Jong Kim, Ki-Hyun Jung, Kee-Young Yoo. 876-879 [doi]
- Approach to Worm Detection, Early Warning Based on Local Victim BehaviorTao Liu, Chi Zhang. 880-884 [doi]
- A Chaos Forecast Research on Capital Market ModelXu Zhujun, Yin Sijia, Shen Jia, Zheng Xingchen. 885-888 [doi]
- Knowledge Reduction of Evaluation Dataset Based on Genetic Algorithm and Fuzzy Rough SetChengxi Dong, Dewei Wu, Jing He. 889-892 [doi]
- Genetic Algorithm for TDRS Communication Scheduling with Resource ConstraintsZheng Wei, Meng Xin, He Huan. 893-897 [doi]
- Application of an Improved Genetic Algorithm in Image SegmentationLei Hui, Cheng Shi, Ao Min-Si, Wu Yi-qi. 898-901 [doi]
- Route Research on Critical Factors of Information Construction in Textile Machinery Manufacture Business-Taking Businesses of Shaanxi Province for ExampleZhou Lei, Sun Ying, Bu Guo-miao. 902-905 [doi]
- Assessment of Network Security Policy Based on Security CapabilityChenghua Tang, Shunzheng Yu. 906-910 [doi]
- Information Disclosure Quality: Factors and MeasurementZhang Yue-mei, Li Yan-xi. 911-914 [doi]
- Policy-Based Distributed Security Management Scheme in MIPv6Tian-han Gao, Nan Guo, Zhiliang Zhu. 915-918 [doi]
- Security Broadcast Based on Linear Network Coding in WSNZhengjian Zhu, Qingping Tan, Peidong Zhu, Qianbing Zheng. 919-922 [doi]
- GIS-Based Inner Mongolia Grassland Fire Spread Simulation SystemHongye Yang, Chun Zhao, Yuewen Liu. 923-925 [doi]
- Identifying Tampered Regions Using Singular Value Decomposition in Digital Image ForensicsXiaoBing Kang, ShengMin Wei. 926-930 [doi]
- Improved Data Hiding Method by Block Parity for Binary ImagesJin-Yong Byun, Ki-Hyun Jung, Kee-Young Yoo. 931-934 [doi]
- A Robust Chaos-Based DCT-Domain Watermarking AlgorithmZhao Yantao, Ma Yunfei, Li Zhiquan. 935-938 [doi]
- A New Blind Steganalysis Method for JPEG ImagesXiang Li, Jianhua Li. 939-942 [doi]
- A Danger-Theory-Based Abnormal Traffic Detection Model in Local NetworkWang Xiuying, Xiao Lizhong, Shao Zhiqing. 943-946 [doi]
- An Approach on Detecting Attack Based on Causality in Network BehaviorZhiwen Wang, Qin Xia, Ke Lu, Jie Zhang. 947-950 [doi]
- The Application of the Relative Entropy Density Divergence in Intrusion Detection ModelsChunfu Jia, Deqiang Chen, Kai Lin. 951-954 [doi]
- An Immunity-Based Technical Research into Network Intrusion DetectionQing-Hua Zhang, Ya-She Zhang, Long-Qiu Shao, Yu-zhen Fu, Hong-Fang Li, Ben-Lai Liang. 955-958 [doi]
- Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming RulesWan Tang, Yang Cao, Xi-Min Yang, Won-Ho So. 959-963 [doi]
- An Algorithm for Generation of Attack Signatures Based on Sequences AlignmentNan Li, Chunhe Xia, Yi Yang, Haiquan Wang. 964-969 [doi]
- A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic NetworksQiang Zhang, Ying Zhuo, Zhenghu Gong. 970-973 [doi]
- Fingerprint Extraction of Executables Based on the Potential Field Graph of CallgraphSu Fanchen, Yin Zhiyi, Yao Haitao, Fu Jianming, Zhu Fuxi. 974-977 [doi]
- The Portable PCB Fault Detector Based on ARM and Magnetic ImageChen Bin, Gao Jun, Li Juan, Li Kun. 978-981 [doi]
- Embedded Intrusion Detection and Authority Management SystemJian-Xia Wang, Wan-Zhen Zhou, Yun-Feng Xu. 982-985 [doi]
- Using Density-Based Incremental Clustering for Anomaly DetectionFei Ren, Liang Hu, Hao Liang, Xiaobo Liu, Weiwu Ren. 986-989 [doi]
- A Novel Immunity-Based Model for Anomaly DetectionMeiling Cai. 990-993 [doi]
- A Survey of Group Key ManagementBibo Jiang, Xiulin Hu. 994-1002 [doi]
- Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic CurvesWen-Min Li, Qiao-Yan Wen. 1003-1006 [doi]
- ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications SystemsXiaofeng Wang, Nanning Zheng. 1007-1010 [doi]
- A Multi Way Tree for Token Based AuthenticationM. Vipin, A. V. Sarad, K. Sankar. 1011-1014 [doi]
- CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless NetworkHou Huifang, Huang Kaizhi, Liu Guangqiang. 1015-1019 [doi]
- Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing PlatformXiaoping Wu, Zhi-Dong Shen, Huanguo Zhang. 1020-1023 [doi]
- A Two-Way Authentication Based on One-Time SMS4 Algorithm and Combined Symmetric KeyJiya Jiang, Tong Liu, Guifen Zhao. 1024-1027 [doi]
- A New Authentication Scheme Based on Verifiable Secret SharingZhengfeng Hou, Jianghong Han, Donghui Hu. 1028-1030 [doi]
- Knowledge Management in Collaborative Design for ManufactureJunming Hou, Chong Su, Yingying Su, Wanshan Wang. 1031-1034 [doi]
- The Design and Implementation of Ontology and Rules Based Knowledge Base for TransportationGang Cheng, Qingyun Du, Hongli Ma. 1035-1038 [doi]
- Based on SpectrumCluster High Resolution Remote Sensing Image Multi-criterion Stochastic Tree DivisionHu Zhihua, Niu Jiping. 1039-1042 [doi]
- Sequence Analysis and Anomaly Detection of Web Service CompositionCairong Yan, Zhidong Qin, Youqun Shi. 1043-1048 [doi]
- Privacy Preserving Decision Tree Learning over Vertically Partitioned DataWeiwei Fang, Bingru Yang. 1049-1052 [doi]
- An Efficient Microaggregation Algorithm for Mixed DataCen Ting-ting, Han Jian-min, Yu Hui-qun, Yu Juan. 1053-1056 [doi]
- A Markov Game Theory-Based Risk Assessment Model for Network Information SystemCui Xiaolin, Tan Xiaobin, Zhang Yong, Xi Hongsheng. 1057-1061 [doi]
- An Evaluation Approach of Subjective Trust Based on Cloud ModelShouxin Wang, Li Zhang, Na Ma, Shuai Wang. 1062-1068 [doi]
- Ontology-Based Description Frame of Information Security Service-Ability for Customer DemandsHu Ruo, Xu Hong. 1069-1072 [doi]
- Customer Demands-Based Formalized Expression of Information Security ResourcesHu Ruo, Chen Chao Tian. 1073-1076 [doi]
- Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative RelayingJie Shi, Weiling Wu. 1077-1080 [doi]
- Combinatorial Characterizations of k-Coincidence Frequency-Hopping SequencesXiyang Li, Cong Qin. 1081-1083 [doi]
- Research on Survivability of Mobile Ad Hoc NetworkYuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi. 1084-1088 [doi]
- A Trusted Transfer Protocol Based on Property-Based SealLi Li, Guosun Zeng, Bo Chen. 1089-1092 [doi]
- Interference Cancellation/Decoding for Coded Synchronous Multi-carrier DS-CDMAXu Guoxiong, Ma Changzheng. 1093-1096 [doi]
- A Game Theoretical Attack-Defense Model Oriented to Network Security Risk AssessmentHe Wei, Xia Chunhe, Wang Haiquan, Zhang Cheng, Ji Yi. 1097-1103 [doi]
- The Research on Data Synchronization of Distributed Real-Time Mobile NetworkYanxin Xue. 1104-1107 [doi]
- Application of Protocol Macro in Baking Temperature Control SystemXiaoling Yang, Qunxiong Zhu. 1108-1112 [doi]
- Combating TCP Based Attacks on Mobile DevicesHumphrey Waita Njogu, Xiehua Li. 1113-1118 [doi]
- Damaged Mechanism Research of RS232 Interface under ElectromagneticPulseJing Gao, Ji-Yin Sun, Yan-Jie Chai, Bo Wang, Ling-Jiao Tao, Fei-Hu Bao. 1119-1122 [doi]
- A Decentralized Certification Authority Based on Real World Trust RelationshipsJingjing Wu, Jiwu Jing, Jingqiang Lin. 1123-1126 [doi]
- Evaluating Method of Security Threat Based on Attacking-Path Graph ModelXuezhong Liu, Zengliang Liu. 1127-1132 [doi]