Abstract is missing.
- Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine DisasterJinyi Tao. 1-10  [doi]
 - The Investigation of WEB Software System Based on Domain-Driven DesignFei Wang, LiHua Yan, Peng Zhou, Wei Sun, Yuan Ding. 11-18  [doi]
 - MediaCRM: Enabling Customer Relationship Management in the BroadcastRobbie De Sutter, Mike Matton, Niels Laukens, Dieter Van Rijsselbergen, Rik Van de Walle. 19-26  [doi]
 - Jordan Triple Multiplicative Maps on the Symmetric MatricesHaifeng Zhang, Yuying Li. 27-34  [doi]
 - International Collaborations in Brain-Computer Interface (BCI) ResearchBrahim Hamadicharef. 35-42  [doi]
 - A Classification of Cluster Validity Indexes Based on Membership Degree and ApplicationsNannan Xie, Liang Hu, Nurbol Luktarhan, Kuo Zhao. 43-50  [doi]
 - Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random VariablesYuying Li, Haifeng Zhang. 51-58  [doi]
 - Propagation in LHM Slab Loaded Rectangular WaveguideRui-lian Li. 59-65  [doi]
 - The Study of Images Emotion Based on fMRIXiaoyan Qiao, Haifang Li, Jie Xiang 0002, Hongxia Deng. 66-72  [doi]
 - The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal MineJingguo Wen, Zisheng Lian. 73-78  [doi]
 - Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness SensorYinke Dou, Xiaomin Cheng. 79-85  [doi]
 - False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR DetectorMiao He, Kexin Jia, Ting Cheng. 86-91  [doi]
 - Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam EquationsCai-xian Wang, Jian-Wen Zhang. 92-97  [doi]
 - Initial-Boundary Value Problem for Viscoelastic Rectangular Plate EquationDongbao Wang, Yinzhu Wang. 98-103  [doi]
 - An Invariant Subspace Theorem for Sequentially Subdecomposable OperatorsMingxue Liu. 104-108  [doi]
 - The Genetic Algorithm in the Test Paper GenerationJian-Jun Hu, Yue-Hong Sun, Qing-Zhen Xu. 109-113  [doi]
 - CDMA Mobile Internet User Behavior Analysis Based on RP InterfaceKai Yu, Dazhong He, Yinan Dou, Zhenming Lei. 114-123  [doi]
 - Personalizing Group Recommendation to Social Network UsersLeila Esmaeili, Mahdi Nasiri, Behrouz Minaei-Bidgoli. 124-133  [doi]
 - A Novel Frequent Trajectory Mining Method Based on GSPJunhuai Li, Jinqin Wang, Lei Yu, Jing Zhang 0009. 134-140  [doi]
 - Study of a Fuzzy Clustering Algorithm Based on Interval ValueHaizhou Du. 141-147  [doi]
 - The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in FiberJiang Xingfang, Shao Kai. 148-154  [doi]
 - A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality M×N Production ModelHuixi Li, Hao Li. 155-165  [doi]
 - A Distributed Processing Method for Design Patent Retrieval SystemJiang-Zhong Cao, Jian-wei Zhu, Xian-Wei Wang, Qing-Yun Dai. 166-174  [doi]
 - An Adaptive Distribution Model for Multi-dimensional Data in Decentralized EnvironmentsWei He, Li-zhen Cui. 175-183  [doi]
 - Research on SOA Business Process Disaster Tolerance Recovery MethodXinfeng Zhang, Junfeng Sun, Pengyu Guo. 184-191  [doi]
 - Admission Control for WebServices in Enterprise Systems Using Expert SystemsArash Jodeiri Salimi, Ayaz Isazadeh, Jaber Karimpour. 192-199  [doi]
 - An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P NetworkYouming Fu, Ruimin Hu, Jun Chen, Zhongyuan Wang, Gang Tian. 200-207  [doi]
 - Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy SystemVahide Rafati Porshokooh, Abolfazl Toroghi Haghighat, Farzad Tashtarian. 208-215  [doi]
 - Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri LankaKanishka Karunasena, Hepu Deng, Anuradha Karunasena. 216-225  [doi]
 - W-entropy Index: The Impact of the Members on Social NetworksWeigang Li, Jianya Zheng, Daniel LeZhi Li. 226-233  [doi]
 - Improving Security of SET Protocol Based on ECCLai-Cheng Cao. 234-241  [doi]
 - The Constrained Computing and Application for Intelligent Generalization of SettlementsLi Wang, Jin Zhang. 242-250  [doi]
 - Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, BeijingJinling Zhao, Dongyan Zhang, Dacheng Wang, Wenjiang Huang. 251-258  [doi]
 - An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s ProtocolsMijin Kim, Changyoung Kwon, Dongho Won. 259-270  [doi]
 - A Fast and Tolerant Voting Mechanism in Wireless Sensor NetworksJian-Hua Huang, Yong-Hong Shi. 271-282  [doi]
 - The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical ModelJian-Hua Huang, Fei-Fei Wang. 283-293  [doi]
 - A Network-Flow-Based Method for Embedding RectificationWanqi Li, Heng Wang, Zhiwei He. 294-303  [doi]
 - An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented ArchitecturePeng Li, Junhao Wen, Junping Dong, Fangfang Tang. 304-311  [doi]
 - Defense against DNS Man-In-The-Middle SpoofingXiaolong Bai, Liang Hu, Zixing Song, Feiyan Chen, Kuo Zhao. 312-319  [doi]
 - Defensive Steganography: A Novel Way against SteganalysisWanqi Li, Heng Wang, Zhiwei He. 320-327  [doi]
 - A New Privacy-Preserving Scheme DOSPA for SaaSLin Li, Qingzhong Li, Yuliang Shi, Kun Zhang. 328-335  [doi]
 - Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits RatesGuilan Yu, Jinglong Zuo, Delong Cui. 336-343  [doi]
 - An Anti-collusion Trust Model in P2P NetworksXin Tang, Ruchuan Wang, Haiping Huang. 344-351  [doi]
 - An Alerts Correlation Technology for Large-Scale Network Intrusion DetectionJingbo Yuan, Shunli Ding. 352-359  [doi]
 - Dynamic Authorization of Grid Based on Trust MechanismRui-ping Niu, Xiao-fang Mu, Gao-feng Sun. 360-367  [doi]
 - Timestamp Based Authentication Protocol for Smart Card Using ECCKakali Chatterjee, Asok De, Daya Gupta. 368-375  [doi]
 - Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud ComputingKun Zhang, Qingzhong Li, Yuliang Shi. 376-383  [doi]
 - A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each ParticipantYung-Cheng Lee. 384-389  [doi]
 - An Encrypted Data-Transportation Method for Distributed SystemHongqian Chen, Yi Chen 0001, Jian Cao, Yuehong Sun. 390-396  [doi]
 - Study on Grid Access Control Strategy Based on Trust and Security GradeYihe Liu. 397-401  [doi]
 - Self-Adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service AwarenessChengjie Gu, Shunyi Zhang. 402-410  [doi]
 - Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning MethodJie Yang, Yuanhao Wu, Yinan Dou, Kun Zhang. 411-418  [doi]
 - Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent ClassifierBaolu Gao, Junjie Chen, Xiaoyan Xiong, Shibo Xiong. 419-425  [doi]
 - Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16mZhanqiang Huo, Xiaoke Liu. 426-433  [doi]
 - LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying DelaysLizi Yin, Dianwu Yang. 434-440  [doi]
 - Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living TimeWei Wen, Yequn Wang, Henyang Zhang. 441-446  [doi]