Abstract is missing.
- Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine DisasterJinyi Tao. 1-10 [doi]
- The Investigation of WEB Software System Based on Domain-Driven DesignFei Wang, LiHua Yan, Peng Zhou, Wei Sun, Yuan Ding. 11-18 [doi]
- MediaCRM: Enabling Customer Relationship Management in the BroadcastRobbie De Sutter, Mike Matton, Niels Laukens, Dieter Van Rijsselbergen, Rik Van de Walle. 19-26 [doi]
- Jordan Triple Multiplicative Maps on the Symmetric MatricesHaifeng Zhang, Yuying Li. 27-34 [doi]
- International Collaborations in Brain-Computer Interface (BCI) ResearchBrahim Hamadicharef. 35-42 [doi]
- A Classification of Cluster Validity Indexes Based on Membership Degree and ApplicationsNannan Xie, Liang Hu, Nurbol Luktarhan, Kuo Zhao. 43-50 [doi]
- Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random VariablesYuying Li, Haifeng Zhang. 51-58 [doi]
- Propagation in LHM Slab Loaded Rectangular WaveguideRui-lian Li. 59-65 [doi]
- The Study of Images Emotion Based on fMRIXiaoyan Qiao, Haifang Li, Jie Xiang 0002, Hongxia Deng. 66-72 [doi]
- The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal MineJingguo Wen, Zisheng Lian. 73-78 [doi]
- Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness SensorYinke Dou, Xiaomin Cheng. 79-85 [doi]
- False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR DetectorMiao He, Kexin Jia, Ting Cheng. 86-91 [doi]
- Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam EquationsCai-xian Wang, Jian-Wen Zhang. 92-97 [doi]
- Initial-Boundary Value Problem for Viscoelastic Rectangular Plate EquationDongbao Wang, Yinzhu Wang. 98-103 [doi]
- An Invariant Subspace Theorem for Sequentially Subdecomposable OperatorsMingxue Liu. 104-108 [doi]
- The Genetic Algorithm in the Test Paper GenerationJian-Jun Hu, Yue-Hong Sun, Qing-Zhen Xu. 109-113 [doi]
- CDMA Mobile Internet User Behavior Analysis Based on RP InterfaceKai Yu, Dazhong He, Yinan Dou, Zhenming Lei. 114-123 [doi]
- Personalizing Group Recommendation to Social Network UsersLeila Esmaeili, Mahdi Nasiri, Behrouz Minaei-Bidgoli. 124-133 [doi]
- A Novel Frequent Trajectory Mining Method Based on GSPJunhuai Li, Jinqin Wang, Lei Yu, Jing Zhang 0009. 134-140 [doi]
- Study of a Fuzzy Clustering Algorithm Based on Interval ValueHaizhou Du. 141-147 [doi]
- The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in FiberJiang Xingfang, Shao Kai. 148-154 [doi]
- A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality M×N Production ModelHuixi Li, Hao Li. 155-165 [doi]
- A Distributed Processing Method for Design Patent Retrieval SystemJiang-Zhong Cao, Jian-wei Zhu, Xian-Wei Wang, Qing-Yun Dai. 166-174 [doi]
- An Adaptive Distribution Model for Multi-dimensional Data in Decentralized EnvironmentsWei He, Li-zhen Cui. 175-183 [doi]
- Research on SOA Business Process Disaster Tolerance Recovery MethodXinfeng Zhang, Junfeng Sun, Pengyu Guo. 184-191 [doi]
- Admission Control for WebServices in Enterprise Systems Using Expert SystemsArash Jodeiri Salimi, Ayaz Isazadeh, Jaber Karimpour. 192-199 [doi]
- An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P NetworkYouming Fu, Ruimin Hu, Jun Chen, Zhongyuan Wang, Gang Tian. 200-207 [doi]
- Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy SystemVahide Rafati Porshokooh, Abolfazl Toroghi Haghighat, Farzad Tashtarian. 208-215 [doi]
- Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri LankaKanishka Karunasena, Hepu Deng, Anuradha Karunasena. 216-225 [doi]
- W-entropy Index: The Impact of the Members on Social NetworksWeigang Li, Jianya Zheng, Daniel LeZhi Li. 226-233 [doi]
- Improving Security of SET Protocol Based on ECCLai-Cheng Cao. 234-241 [doi]
- The Constrained Computing and Application for Intelligent Generalization of SettlementsLi Wang, Jin Zhang. 242-250 [doi]
- Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, BeijingJinling Zhao, Dongyan Zhang, Dacheng Wang, Wenjiang Huang. 251-258 [doi]
- An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s ProtocolsMijin Kim, Changyoung Kwon, Dongho Won. 259-270 [doi]
- A Fast and Tolerant Voting Mechanism in Wireless Sensor NetworksJian-Hua Huang, Yong-Hong Shi. 271-282 [doi]
- The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical ModelJian-Hua Huang, Fei-Fei Wang. 283-293 [doi]
- A Network-Flow-Based Method for Embedding RectificationWanqi Li, Heng Wang, Zhiwei He. 294-303 [doi]
- An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented ArchitecturePeng Li, Junhao Wen, Junping Dong, Fangfang Tang. 304-311 [doi]
- Defense against DNS Man-In-The-Middle SpoofingXiaolong Bai, Liang Hu, Zixing Song, Feiyan Chen, Kuo Zhao. 312-319 [doi]
- Defensive Steganography: A Novel Way against SteganalysisWanqi Li, Heng Wang, Zhiwei He. 320-327 [doi]
- A New Privacy-Preserving Scheme DOSPA for SaaSLin Li, Qingzhong Li, Yuliang Shi, Kun Zhang. 328-335 [doi]
- Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits RatesGuilan Yu, Jinglong Zuo, Delong Cui. 336-343 [doi]
- An Anti-collusion Trust Model in P2P NetworksXin Tang, Ruchuan Wang, Haiping Huang. 344-351 [doi]
- An Alerts Correlation Technology for Large-Scale Network Intrusion DetectionJingbo Yuan, Shunli Ding. 352-359 [doi]
- Dynamic Authorization of Grid Based on Trust MechanismRui-ping Niu, Xiao-fang Mu, Gao-feng Sun. 360-367 [doi]
- Timestamp Based Authentication Protocol for Smart Card Using ECCKakali Chatterjee, Asok De, Daya Gupta. 368-375 [doi]
- Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud ComputingKun Zhang, Qingzhong Li, Yuliang Shi. 376-383 [doi]
- A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each ParticipantYung-Cheng Lee. 384-389 [doi]
- An Encrypted Data-Transportation Method for Distributed SystemHongqian Chen, Yi Chen 0001, Jian Cao, Yuehong Sun. 390-396 [doi]
- Study on Grid Access Control Strategy Based on Trust and Security GradeYihe Liu. 397-401 [doi]
- Self-Adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service AwarenessChengjie Gu, Shunyi Zhang. 402-410 [doi]
- Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning MethodJie Yang, Yuanhao Wu, Yinan Dou, Kun Zhang. 411-418 [doi]
- Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent ClassifierBaolu Gao, Junjie Chen, Xiaoyan Xiong, Shibo Xiong. 419-425 [doi]
- Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16mZhanqiang Huo, Xiaoke Liu. 426-433 [doi]
- LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying DelaysLizi Yin, Dianwu Yang. 434-440 [doi]
- Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living TimeWei Wen, Yequn Wang, Henyang Zhang. 441-446 [doi]