Abstract is missing.
- Conference Organizations [doi]
- Preface - Message from General and Program Chairs [doi]
- A Bio-inspired Multidimensional Network Security ModelHuiqiang Wang, Ruijuan Zheng, Xueyao Li, Daxin Liu. 3-7 [doi]
- Cryptanalysis and Improvement on An ID-Based Key Issuing ProtocolLicheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian. 8-12 [doi]
- An Improvement of an Identity-Based Key Issuing ProtocolFeng Cao, Zhenfu Cao, Licheng Wang. 13-18 [doi]
- The Real-time Judging System of Figure Skating Based-on WLANJijuan Wu, Long Liu, Jibao Lai, Jun Yao. 19-24 [doi]
- Research of Mobile IPv6 Application Based On Diameter ProtocolDa Wei, Yanheng Liu, Xuegang Yu, Xiaodong Li. 25-29 [doi]
- A Novel Quantitative Analysis Method for Network SurvivabilityGuo-sheng Zhao, Huiqiang Wang, Jian Wang. 30-33 [doi]
- Secure Byzantine Fault Tolerant LDAP SystemXiuqun Wang, Honglun Hou, Yueting Zhuang. 34-39 [doi]
- Designated Verifier Proxy Signature Scheme from Bilinear PairingsRongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su. 40-47 [doi]
- A Proxy-Protected Signature Scheme Based on Finite AutomatonFeng Cao, Zhenfu Cao. 48-55 [doi]
- A Novel Model for Detecting Application Layer DDoS AttacksYi Xie, Shun-Zheng Yu. 56-63 [doi]
- Resource Efficient Hardware Design for RSAShuhua Wu, Yuefei Zhu, Qiong Pu. 64-68 [doi]
- A Secure Hierarchical Fragile Watermarking Method with Tamper LocalizationXianhai Zhang, Yongtian Yang, Yan Zhu. 69-74 [doi]
- MPoolODMRP: An Extended PoolODMRP based on Multi-path PolicyShaobin Cai, Wenbin Yao, Nianmin Yao, Guochang Gu. 75-80 [doi]
- An Efficient ID-Based Multi-proxy Multi-Signature SchemeSheng Guo, Zhenfu Cao, Rongxing Lu. 81-88 [doi]
- Group Oriented Deniable Authentication ProtocolRongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su. 89-92 [doi]
- A Security Grid Portal Using PKI and Online Proxy Certificate RepositoryJie Jiang, Deren Chen, Tim Chen, Xiaodong Shen. 93-96 [doi]
- ERAS - an Emergency Response Algorithm for Survivability of Critical ServicesJian Wang, Huiqiang Wang, Guo-sheng Zhao. 97-100 [doi]
- An Algorithm of Topology Discovery in Large Multi-Subnet Physical NetworkKaihua Xu, Jiwei Cao, Yuhua Liu, Shaohua Tao. 101-104 [doi]
- An Identification System Combined with Fingerprint and CryptographyHao Li, Peishun Liu. 105-108 [doi]
- Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using PairingsShengbao Wang, Zhenfu Cao, Haiyong Bao. 109-112 [doi]
- Cryptanalysis of Chang-Lin-Lam s ID-based Multisignature SchemeHaifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo. 113-116 [doi]
- Cryptanalysis on a Proxy Multi-Signature SchemeFeng Cao, Zhenfu Cao. 117-120 [doi]
- An Agent-Oriented Network Worm Defense System based on Optimized PathYe Guo, Miaoliang Zhu. 121-128 [doi]
- Research and Implementation of Zero-Copy Technology Based on Device Driver in LinuxHongfeng Zhu, Tianhua Liu, Chuansheng Zhou, Guiran Chang. 129-134 [doi]
- Efficient ID-based Proxy Chameleon Signature from Bilinear PairingsMiaomiao Zhang, Gongliang Chen, Jianhua Li. 135-141 [doi]
- Worm Intrusion Alarm Modeling Based on Network Traffic CharacterGuang Lu, Yu Fei, Guangxue Yue, Miaoliang Zhu. 142-147 [doi]
- Efficient ID-based Broadcast Threshold Decryption in Ad Hoc NetworkZhenchuan Chai, Zhenfu Cao, Yuan Zhou. 148-154 [doi]
- Clustering of Network Link Characteristic for Detector Placement of Macroscopical PrewarningHui He, Mingzeng Hu, Hongli Zhang. 155-159 [doi]
- A New Method of TOE Architecture Based on the ML403 Development Board in LinuxTianhua Liu, Hongfeng Zhu, Chuansheng Zhou, Guiran Chang. 160-166 [doi]
- A Structured P2P System with Match Path and Probability Balance TreeL. B. Xu, G. X. Wu, F. Q. You. 167-174 [doi]
- An Integer Wavelet Based Multiple Logo-watermarking SchemeYuan Yuan, Decai Huang, Duanyang Liu. 175-179 [doi]
- Efficient Split Scheduling Scheme for Traffic Balancing on Multi-Link NetworksYong Qin, Chenggui Zhao. 180-185 [doi]
- Adaptive Prefix Query (APQ) For Route Table Finding In OvernetYongxiang Zhao, Changjia Chen. 186-191 [doi]
- An Innovation Three Color Marker in DiffServ NetworksJunrui Hao, Shaohua Yu. 192-198 [doi]
- State-of-Art Techniques for Object Caching over the InternetKeqiu Li, Takashi Nanya, Bo Jiang, Wenyu Qu. 199-206 [doi]
- A Computer Immune System: LAN Immune System Model based on Host (LISMH)Ruijuan Zheng, Huiqiang Wang. 207-211 [doi]
- Parameters Optimization and Simulation of Transducer Based on Finite Element Method in Electrical Capacitance Tomography SystemDeyun Chen, Mouzun Li. 212-216 [doi]
- Diversity Guaranteed Ant Colony Algorithm Based on Immune StrategyLing Qin, Yixin Chen, Jianli Luo, Ling Chen, Jing Guo. 217-223 [doi]
- A Novel FCM s Initial Parameters Acquisition MethodPing Kuang, Peisu Xiang, Leiting Chen. 224-229 [doi]
- A Dynamic Stochastic Heuristical Algorithm for Flexible Workload Management *Xudong Chen, Qingxin Zhu, Yong Liao, Ping Kuang. 230-236 [doi]
- Distance Ratio Fractal for Complex Mapping z <- z:::a:::Xi-zhe Zhang, Tian-yang Lv, Shaobin Huang, Zhengxuan Wang. 237-243 [doi]
- Constructions of Euclidean Geometry LDPC Codes and Performance Analysis in MIMO-OFDM SystemFangni Chen, Lei Shen, Shiju Li. 244-248 [doi]
- A New Computing Model for C-Like Hardware Description LanguagesJimin Wang, Lingdi Ping, Jiebing Wang, Kang Sun. 249-256 [doi]
- Research of Transmission and Control of Real-time MPEG-4VideoStreaming for Multi-channel Over Wireless QoS MechanismJianghua Li, Longwen Li. 257-261 [doi]
- Application of Optimal Search Theory in the Detection of Water Pollution Accident SourceYing Liu, Dan Liu, Fan Zhang, Qingxin Zhu. 262-265 [doi]
- Emission Image Reconstruction Based on Incremental Optimization Transfer AlgorithmJianhua Yan, Jun Yu. 266-269 [doi]
- Complex Data Flow Matching Algorithm Based on TDGGuangshun Li, Guang-Sheng Ma, Donghai Li. 270-273 [doi]
- Sharing Methods of Multi-objective Functions Based on TEDJunhua Wu, Guang-Sheng Ma, Guangshun Li. 274-278 [doi]
- Mesh Generation from 3D Scattered Data in ACL Surgical Navigation SystemXuemei Huang, Wenqiang Zhang. 279-282 [doi]
- Combining Couvreur s Algorithm with Bitstate-Hashing for Emptiness CheckYige Li, Kanglin Xie, Tao Hao. 283-286 [doi]
- A New Multiple Classifiers Combination AlgorithmJianpei Zhang, Lili Cheng, Jun Ma. 287-291 [doi]
- Mean-Variance-Skewness-Kurtosis-based Portfolio OptimizationKin Keung Lai, Lean Yu, Shouyang Wang. 292-297 [doi]
- Optimized Design of Interconnected Bus on Chip for Low PowerDonghai Li, Guang-Sheng Ma, Gang Feng. 298-302 [doi]
- Application of SCE-UA to Optimize the Management Model of Groundwater Resources in Deep Aquifers of the Yangtze DeltaXiaobin Zhu, Jichun Wu, Jianfeng Wu. 303-308 [doi]
- A Vertical Handover Decision Algorithm Based on Fuzzy Control TheoryHongwei Liao, Ling Tie, Zhao Du. 309-313 [doi]
- Collaborative Planning in Supply Chains by Lagrangian RelaxationLanshun Nie, Xiaofei Xu, De-chen Zhan. 314-321 [doi]
- Problem-Solving in Multi-Agent Systems: A Novel Generalized Particle ModelDianxun Shuai, Qing Shuai, Yuming Dong, Liangjun Huang. 322-329 [doi]
- An Execution Prototype of Mobile Agent-Based Peer-to-Peer SystemsWenyu Qu, Masaru Kitsuregawa, Keqiu Li, Hong Shen. 330-338 [doi]
- Fault Diagnosis of AUV Based on Bayesian NetworksChangting Shi, Rubo Zhang, Ge Yang. 339-343 [doi]
- A Lower Bound for the Chaotic Control Parameter of Wang-Smith s CSALiying Zheng, Kai Tian. 344-346 [doi]
- Dynamic Analysis and Application of QANNRigui Zhou, Liang Zhou, Nan Jiang, Qiulin Ding. 347-351 [doi]
- An Optimal Non-adaptive Search Plan for 3D Models RetrievalBo Peng, Qingxin Zhu. 352-355 [doi]
- Design of Modular Multiplier Based on Improved Montgomery Algorithm and Systolic ArrayFeng Gang. 356-359 [doi]
- Underwater Image Segmentation with Maximum Entropy based on Particle Swarm Optimization (PSO)Rubo Zhang, Jing Liu. 360-636 [doi]
- An Ontology-Based Approach for Domain Requirements Elicitation and AnalysisYuquin Lee, Wenyun Zhao. 364-371 [doi]
- Windows DNA-based Study on the Integrated Application of Manufacturing Information SystemXi-lan Feng, Zhiquiang Jiang, Jin-fa Shi, Xue-wen Zong. 372-377 [doi]
- A Feature Oriented Approach to Managing Domain Requirements Dependencies in Software Product LinesYuquin Lee, Wenyun Zhao. 378-386 [doi]
- Uniform Service Description With Semantics for Search and CompositionXiaoqin Xie, Kaiyun Chen. 387-390 [doi]
- Research on CMMI-based Software Process MetricsRuzhi Xu, Yunjiao Xue, Peiyao Nie, Yuan Zhang, Desheng Li. 391-397 [doi]
- A Component Management System for Mass CustomizationYiyuan Li, Jianwei Yin, Jinxiang Dong. 398-404 [doi]
- AUV Modeling and Analysis using a Colored Object-Oriented Petri NetXiaoning Feng, Qun Liu, Zhuo Wang. 405-409 [doi]
- The Extension of the Unit Testing Tool Junit for Special TestingsLiangliang Kong, Zhaolin Yin. 410-415 [doi]
- Embedded Software Standardization and Re-engineering in PracticeXiaoli Zhi, Weiqin Tong. 416-419 [doi]
- A Configuration Management Supporting System Based on CMMIFei Wang, Aihua Ren. 420-423 [doi]
- Primary Research on Internetware Reliability TechnologyPing Wang, Changsong Sun, Lijie Li. 424-428 [doi]
- Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural NetworkQinming He, Jianfei Qian, Hua Chen, Fangzhong Qi. 429-432 [doi]
- A Description Model to Support Knowledge ManagementXiong Xie, Weishi Zhang, Lei Xu. 433-436 [doi]
- Development of a Sheet Metal Part Stock Layout System Based on OPENCASCADE PlatformCao Yan, Du Jiang, Yang Lina, Yang Yanli, Bai Yu, Zhang Dawei, Zhao Rujia. 437-441 [doi]
- Semantic Approach for e-learning SystemWenying Guo, Deren Chen. 442-446 [doi]
- Reverse Engineering XMLWeidong Yang, Ning Gu, Baile Shi. 447-454 [doi]
- New Generation of E-Learning TechnologiesDan Yu, Weiping Zhang, Xinmeng Chen. 455-459 [doi]
- Optimal Selection of Web Services with End-to-End ConstraintsYan Gao, Bin Zhang, Jun Na, Lei Yang, Yu Dai, Qiang Gong. 460-467 [doi]
- A Study of Chinese Web Characteristics and Their Implications on Web SearchKin Fun Li, Louis Yu, Weibin Liao. 468-474 [doi]
- Using Categorization to Further Enhance the Utilization of Semantic Web in UDDIXiaojie Dong, Weiqin Tong, Jin Feng. 475-479 [doi]
- Dynamic Behavior Specification of Web Component Based on Logic ProgrammingYukui Fei. 480-482 [doi]
- A SVR-based Fuzzy SystemXianzhong Tian, TongSen Hu. 483-487 [doi]
- Extending Tree Automata to Obtain Consistent Query Answer from Inconsistent XML DocumentZijing Tan, Wei Wang 0009, Baile Shi. 488-495 [doi]
- A New Position Updating Algorithm for Moving ObjectsXin-ying Wang, Sheng-sheng Wang, Zhengxuan Wang, Tian-yang Lv, Xi-zhe Zhang. 496-503 [doi]
- Indexing of Constrained Moving Objects for Current and Near Future Positions in GISJing Guo, Wei Guo, Dongru Zhou. 504-509 [doi]
- A Privacy Policy of P3P Based on Relational DatabaseBin Jiang, Da-fung Zhang, Chao Yang, Guangxue Yue, Fei Yu. 510-515 [doi]
- Generating Incremental ETL Processes AutomaticallyXufeng Zhang, Weiwei Sun, Wei Wang, Yahui Feng, Baile Shi. 516-521 [doi]
- Appling Association Rule to Web PredictionZhili Zhang, Lei Shi, Shen Guo, Deyu Qi, Fugang Li. 522-527 [doi]
- Mapping Relational Schemas to XML DTDs with ConstraintsTeng Lv, Ping Yan. 528-533 [doi]
- Analysis on the Drawbacks of the Commonly Used Measures of the Significance of Attributes in Decision-Table & A New MeasureDecai Huang, Lingli Wang. 534-539 [doi]
- Spatio-temporal Pattern Query Processing based on Effective Trajectory Splitting Models in Moving Object DatabaseWenjie Zhang, Jianzhong Li, Wei Zhang. 540-547 [doi]
- A Rapid Development Environment for Synthesizing Guideline-Based Decision Support SystemsKung Chen, Chung-Hsin Chen, Shin-Yuan Chang, Chiehfen Chen, Yu-Chuan Li. 548-554 [doi]
- Querying about the Near Future Positions of Moving ObjectsJing Guo, Wei Guo, Dongru Zhou. 555-559 [doi]
- A Robust Hierarchical Clustering Algorithm and its Application in 3D Model RetrievalTian-yang Lv, Shaobin Huang, Xi-zhe Zhang, Zhengxuan Wang. 560-567 [doi]
- Research on Methodology of Fuzzy Retrieve Based on Soft ComputingYangu Zhang, Min Yao, Bin Shen. 568-571 [doi]
- Particle Swarm Algorithm for Minimal Attribute Reduction of Decision Data TablesJianhua Dai, Weidong Chen, Hongying Gu, Yunhe Pan. 572-575 [doi]
- The Research and Application of the Web Maps Issuing TechnologyTao Wu, Lifan Fei. 576-581 [doi]
- A Data Fusion Approach for Power Saving in Wireless Sensor NetworksBing Liang, Qun Liu. 582-586 [doi]
- A Viable Localization Scheme for Dynamic Wireless Sensor NetworksXun Chen, Peng Han, Qiu-Sheng He, Shi-liang Tu. 587-593 [doi]
- Implementation of P2P Computing in Design of MANET Routing ProtocolZupeng Li, Xiaochuan Yin, Peiyang Yao, Jinnan Huang. 594-602 [doi]
- Implementing a SIP-based Device Communication Middleware for OSGi Framework with Extension to Wireless NetworksGuiran Chang, Chuan Zhu, Matthew Y. Ma, Weiguo Zhu, Jingbo Zhu. 603-310 [doi]
- A Wireless Intrusion Detection Method Based on Dynamic Growing Neural NetworkYanheng Liu, Daxin Tian, Bin Li. 611-615 [doi]
- Minimal Hop Count Path Routing Algorithm for Mobile Sensor NetworksJae Young Choi, Jun-Hui Lee, Yeong-Jee Chung. 616-621 [doi]
- Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor NetworkDo-Seong Kim, Yeong-Jee Chung. 622-626 [doi]
- Coordination Mechanism in Wireless Sensor and Actor NetworksHaidong Yuan, Huadong Ma, Hongyu Liao. 627-634 [doi]
- WITS: A Wireless Sensor Network for Intelligent Transportation SystemWenjie Chen, Lifeng Chen, Zhang-long Chen, Shi-liang Tu. 635-641 [doi]
- Markov-Based Analytical Model for TCP Unfairness over Wireless Mesh NetworksLei Zhang, Shoubao Yang, Weifeng Sun, Dapeng Wang. 642-648 [doi]
- The Architecture and Interlayer Adaptation of Ad Hoc & Sensor NetworksSong Han, Guochang Gu. 649-653 [doi]
- Power-Efficient Routing Mechanism in Sensor Networks based on Node-DensityQing Gao, Shanping Li, Wei Shi. 654-656 [doi]
- A Brief Review on Application of Mobile Computing in ConstructionWanhong Zou, Xiuzi Ye, Wei Peng, Zhiyang Chen. 657-661 [doi]
- An Improved Route Repair Approach of Wireless Sensor NetworksYuhua Liu, Haiyan Zhu, Kaihua Xu, Wei Teng. 662-665 [doi]
- Research of Sentence-Level Intelligent Input Method Based on Symbian OSJianguo Sun, Bingquan Liu, Xuan Wang. 666-670 [doi]
- Performance Optimization of Checkpointing Schemes with Task DuplicationZhongwen Li, Yang Xiang, Hong Chen. 671-677 [doi]
- Historical Temporal Difference Learning: Some Initial ResultsHengshuai Yao, Diao Dongcui, Zengqi Sun. 678-685 [doi]
- Bayesian Image Segmentation and the Data Preprocessing Method using Fuzzy C-mean ClusteringLi Pan, Hong Zheng. 686-691 [doi]
- On The Even-Out Effect of Probabilistic SamplingZiqian Liu, Changjia Chen. 692-698 [doi]
- A Genetic Algorithm with Dual-Structure Code and Adaptive Strategy for Link Enhancement ProblemYuhua Liu, Wei Teng, Kaihua Xu, Haiyan Zhu. 699-705 [doi]
- A Dynamic Capacity Assignment Approach for EJB Instance PoolsBaowen Zhang, Jian-hua Li, Jinyuan You. 706-710 [doi]
- Identification of GPI-(like)-Anchored Proteins by Using SVMWei Cao, Kentaro Shimizu. 711-715 [doi]
- Self-Organizing Data Clustering Based on Quantum Entanglement ModelDianxun Shuai, Yuzhe Liu, Qing Shuai, Liangjun Huang, Yuming Dong. 716-723 [doi]
- A Novel Stochastic Generalized Cellular Automata For Self-Organizing Data ClusteringDianxun Shuai, Qing Shuai, Liangjun Huang, Yuzhe Liu, Yuming Dong. 724-730 [doi]
- A Novel Mining Approach for Schemas in XML DocumentsTong Wang, Da-xin Liu, Wei Sun. 731-734 [doi]
- An Improved Cascade SVM Training Algorithm with Crossed FeedbacksJing Yang. 735-738 [doi]
- Temporal Association Rules in Mining MethodHui Ning, Haifeng Yuan, Shugang Chen. 739-742 [doi]
- Weighted Ordinal Support Vector ClusteringGuangli Liu, Yongshun Wu, Lu Yang. 743-745 [doi]
- A Privacy-Preserving Mining Algorithm of Association Rules in Distributed DatabasesJie Liu, Xiufeng Piao, Shaobin Huang. 746-750 [doi]
- Design of A Novel Asynchronous Reconfigurable Architecture for Cryptographic ApplicationsKang Sun, Xuezeng Pan, Jiebing Wang, Jimin Wang. 751-757 [doi]
- Design of Smart Phone-Oriented Embedded Real-time Operating SystemJigang Wang, Guochang Gu, Shibo Xie, Lifeng Xu. 758-763 [doi]
- System Prototyping Based on SystemC Transaction-Level ModelingLiang Liang, Bo Zhou, Xuegong Zhou, Chenglian Peng. 764-770 [doi]
- Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for LinuxGuoyin Zhang, Luyuan Chen, Aihong Yao. 771-775 [doi]
- An Advanced Timing Characterization Method Considering Global False PathXiaoxiao Liu, Guangsheng Ma, Qiang Sun. 776-779 [doi]
- Knowledge and Process Based Decision Support in Business Intelligence SystemLuan Ou, Hong Peng. 780-786 [doi]
- Verification Environment for a SCMP ArchitectureWenbin Yao, Nianmin Yao, Shaobin Cai, Jun Ni. 787-791 [doi]
- CGNS Data Format Used for A 2D/3D Finite Volume Unstructured Grid Flow SolverGuo-dong Lei, Gong-min Liu, Pingjian Ming, Wenping Zhang, Minggang Zhu. 792-799 [doi]
- A Cellular Automaton Technique for the Modeling of Solidification Microstructure in Multi-Component AlloysDaming Li, Ruo Li, Pingwen Zhang. 800-806 [doi]
- Numerical Simulation for the Transport Phenomena in Melting Processes of Blade-Like Castings Using a Continuum ModelYunfeng Bai, Daming Xu, Weisheng Bi, Jingjie Guo, Hengzhi Fu. 807-814 [doi]
- A Numerical Approach of Direct-SIMPLE Deduced Pressure Equations to Simulations of Transport Phenomena During Shaped CastingDaming Xu, Jun Ni. 815-821 [doi]