Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cis/cis2009-1.bht:"
@inproceedings{DBLP:conf/cis/AnLZ09, author = {Yaozu An and Yao Lu and Hong Zhao}, title = {Neighborhood-Based Weighted Regularization of Video Sequence Super-Resolution}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {146--150}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.188}, doi = {10.1109/CIS.2009.188}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/AnLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/BaiQC09, author = {Runbo Bai and Xiumei Qiu and Maosen Cao}, title = {Factor Sensitivity Analysis for Multivariable Systems Using Bayesian Neural Networks}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {30--33}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.43}, doi = {10.1109/CIS.2009.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/BaiQC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Bo09, author = {Zhao Bo}, title = {Predicting Fiber Diameter of Polypropylene {(PP)} Spunbonding Nonwovens Process: {A} Comparison Between Physical and Artifical Neural Network Methods}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {639--642}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.129}, doi = {10.1109/CIS.2009.129}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Bo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaiW09, author = {Jian{-}hu Cai and Li{-}Ping Wang}, title = {Study on Dynamic Game Models in a Two-Echelon Supply Chain}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {138--141}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.145}, doi = {10.1109/CIS.2009.145}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaiW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoLGL09, author = {Jian Cao and Kan Li and Chunxiao Gao and Qiongxin Liu}, title = {Efficient Object Recognition Using Corner Features}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {344--348}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.201}, doi = {10.1109/CIS.2009.201}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoLGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoM09, author = {Zhengjun Cao and Olivier Markowitch}, title = {Different Authentication Properties and a Signcryption Scheme Revisited}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {395--399}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.61}, doi = {10.1109/CIS.2009.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoMZ09, author = {Li Cao and Lequan Min and Hongyan Zang}, title = {A Chaos-Based Pseudorandom Number Generator and Performance Analysis}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {494--498}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.203}, doi = {10.1109/CIS.2009.203}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChaoT09, author = {Rui Chao and Ying Tan}, title = {A Virus Detection System Based on Artificial Immune System}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {6--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.106}, doi = {10.1109/CIS.2009.106}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChaoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Chen09, author = {Dingjun Chen}, title = {The Close-Degree of Covering Rough Sets}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {176--179}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.94}, doi = {10.1109/CIS.2009.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Chen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenSY09, author = {Cai{-}Kou Chen and Jun Shi and Yiming Yu}, title = {Locally Supervised Discriminant Analysis in Kernel Space}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {358--362}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.153}, doi = {10.1109/CIS.2009.153}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChenSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenWD09, author = {Chao Chen and Ke Wang and Yiqi Dai}, title = {A Novel Architecture for Enterprise Network Security}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {537--541}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.141}, doi = {10.1109/CIS.2009.141}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChengCZY09, author = {Xiangran Cheng and Xingyuan Chen and Bin Zhang and Yan Yang}, title = {An Algebra for Composing Access Control Policies in Grid}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {526--530}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.190}, doi = {10.1109/CIS.2009.190}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChengCZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChengZYM09, author = {Jiujun Cheng and Fan Zhang and Kuifei Yu and Jian Ma}, title = {The Dynamic and Double Encryption System Based on Two-Dimensional Image}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {458--462}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.65}, doi = {10.1109/CIS.2009.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChengZYM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChiLWF09, author = {Yaping Chi and Zhaobin Li and Zhonghua Wang and Yong Fang}, title = {An Improved Bytecode Verification Algorithm on Java Card}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {552--555}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.193}, doi = {10.1109/CIS.2009.193}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChiLWF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Deng09, author = {Xiuqin Deng}, title = {System Identification Based on Particle Swarm Optimization Algorithm}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {259--263}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.167}, doi = {10.1109/CIS.2009.167}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Deng09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DingCX09, author = {Jianli Ding and Tantan Chen and Tao Xu}, title = {Propagated Analysis of Airport Delays Based on Timed Petri Nets}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {608--614}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.256}, doi = {10.1109/CIS.2009.256}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DingCX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DingHY09, author = {Xue{-}wen Ding and Wen{-}Zhang He and Zhao{-}Xuan Yang}, title = {Error Concealment Method for Embedded Wavelet codec}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {603--607}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.169}, doi = {10.1109/CIS.2009.169}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DingHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DongW09, author = {Ning Dong and Yuping Wang}, title = {Multiobjective Differential Evolution Based on Opposite Operation}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {123--127}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.166}, doi = {10.1109/CIS.2009.166}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DongW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/EstradaNS09, author = {Veronica C. Estrada and Akihiro Nakao and Enrique Carlos Segura}, title = {Classifying Computer Session Data Using Self-Organizing Maps}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {48--53}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.266}, doi = {10.1109/CIS.2009.266}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/EstradaNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FanCY09, author = {Yiming Fan and Qingzhang Chen and Jianjun Yu}, title = {Topology Control Algorithm Based on Bottleneck Node for Large-Scale WSNs}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {592--597}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.11}, doi = {10.1109/CIS.2009.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FanCY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FanHL09, author = {Yang Fan and Shuping He and Fei Liu}, title = {PD-Type Sampled-Data Iterative Learning Control for Nonlinear Systems with Time Delays and Uncertain Disturbances}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {201--205}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.211}, doi = {10.1109/CIS.2009.211}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FanHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GanHDV09, author = {Zaobin Gan and Juxia He and Qian Ding and Vijay Varadharajan}, title = {Trust Relationship Modelling in E-commerce-Based Social Network}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {206--210}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.184}, doi = {10.1109/CIS.2009.184}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GanHDV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoFZZ09, author = {Feng Gao and Weiming Fu and YiPing Zhong and Danfeng Zhao}, title = {Large-Scale Hierarchical Text Classification Based on Path Semantic Vector and Prior Information}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {54--58}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.38}, doi = {10.1109/CIS.2009.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoFZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoW09, author = {Yuelin Gao and Miaomiao Wang}, title = {Improved Differential Evolution Algorithm with Random Migration Operator}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {92--97}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.56}, doi = {10.1109/CIS.2009.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoWLC09, author = {Wei Gao and Zhenyou Wang and Fei Li and Li'e Chen}, title = {An Efficient Threshold Signature Scheme Without Random Oracles}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {400--404}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.40}, doi = {10.1109/CIS.2009.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoWLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GeHW09, author = {Weiqing Ge and Shisheng Huang and Kaiyuan Wu}, title = {The Development and Implementation of Rapid {CRC} Algorithm on Tandem Welding System}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {658--661}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.22}, doi = {10.1109/CIS.2009.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GeHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuanZL09, author = {Zhijin Guan and Yiqing Zhang and Yanming Lu}, title = {Reversible Logic Gate Cascade Network Based on Series Connection}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {468--472}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.19}, doi = {10.1109/CIS.2009.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuanZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoC09, author = {Li Guo and Xu Chen}, title = {A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy of Acceleration Coefficients}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {277--281}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.91}, doi = {10.1109/CIS.2009.91}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoS09, author = {Rong Guo and Dongchen Shi}, title = {Prediction of {C3} Concentration in {FCCU} Using Neural Estimator Based on Dynamic {PCA}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {34--37}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.242}, doi = {10.1109/CIS.2009.242}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HeGX09, author = {Zhiwei He and Mingyu Gao and Jie Xu}, title = {EKF-Ah Based State of Charge Online Estimation for Lithium-ion Power Battery}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {142--145}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.47}, doi = {10.1109/CIS.2009.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HeGX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HeM09, author = {Wenzhang He and Yunfei Ma}, title = {Clarity Algorithm of Images in the Fog and Application}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {583--586}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.33}, doi = {10.1109/CIS.2009.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HeM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuW09, author = {Xuanzi Hu and Jiafu Wan}, title = {Studying of Data Centre Architecture for Prefecture-level City}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {42--47}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.14}, doi = {10.1109/CIS.2009.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuZS09, author = {Xiaoming Hu and Zhe Zhang and Taozhi Si}, title = {ID-Based Proxy Re-Encryption Schemes Without Random Oracle}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {428--431}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.123}, doi = {10.1109/CIS.2009.123}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuaCB09, author = {Zhang Hua and Wang Cheng and Ren Bo}, title = {The New Registration Method Used in {ARDK}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {653--657}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.200}, doi = {10.1109/CIS.2009.200}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuaCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuangCLX09, author = {Dazu Huang and Zhigang Chen and Xin Li and Jianquan Xie}, title = {Deterministic Secure Bidirectional Quantum Communication}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {391--394}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.177}, doi = {10.1109/CIS.2009.177}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuangCLX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiH09, author = {Dong{-}Jiang Ji and Wen{-}Zhang He}, title = {The Correction {SART} Algorithm Based on Circular Symmetrical Object}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {151--154}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.115}, doi = {10.1109/CIS.2009.115}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiLSN09, author = {Liping Ji and Haijin Liang and Yitao Song and Xiamu Niu}, title = {A Normal-Traffic Network Covert Channel}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {499--503}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.156}, doi = {10.1109/CIS.2009.156}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiLSN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiaW09, author = {Liping Jia and Yuping Wang}, title = {A Genetic Algorithm for Multiobjective Bilevel Convex Optimization Problems}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {98--102}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.37}, doi = {10.1109/CIS.2009.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiaW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiangMZ09, author = {Min Jiang and Zhiqing Meng and Gengui Zhou}, title = {A New Support Vector Machine Model Based on the Discrete Conditional Value-at-Risk}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {188--192}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.66}, doi = {10.1109/CIS.2009.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiangMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JieWLS09, author = {Longmei Jie and Hui Wang and DeRong Li and GuoQiang Shao}, title = {Proof of Two Kinds of Fingerprint Feature Extraction {CNN}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {307--310}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.69}, doi = {10.1109/CIS.2009.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JieWLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JundingH09, author = {Sun Junding and Xu Heli}, title = {Contour-Shape Recognition and Retrieval Based on Chain Code}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {349--352}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.67}, doi = {10.1109/CIS.2009.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JundingH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KongZYYYS09, author = {Hongbin Kong and Zhengquan Zeng and Lijun Yan and Jicheng Yang and Shaowen Yao and Nuoya Sheng}, title = {Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based Ontology Encryption}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {511--515}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.99}, doi = {10.1109/CIS.2009.99}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/KongZYYYS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiL09, author = {Xuchao Li and Dongsheng Liu}, title = {Object Detection and Tracking Using Spatiotemporal Wavelet Domain Markov Random Field in Video}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {165--170}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.13}, doi = {10.1109/CIS.2009.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiLH09, author = {Rong{-}Hua Li and Zhiping Luo and Guoqiang Han}, title = {Pseudo-inverse Locality Preserving Projections}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {363--367}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.157}, doi = {10.1109/CIS.2009.157}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZLL09, author = {Xudong Li and Chunxia Zhang and Xing Lin and Shuguang Lin}, title = {{VAD:} {A} Detail Investigation into Process's Memory}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {531--536}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.130}, doi = {10.1109/CIS.2009.130}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Liu09, author = {Yulan Liu}, title = {An Approach for a Class of Bilevel Multiobjective Programming Problem}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {128--132}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.139}, doi = {10.1109/CIS.2009.139}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Liu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuC09, author = {Lihua Liu and Zhengjun Cao}, title = {Analysis of Two Signature Schemes from CIS'2006}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {405--408}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.62}, doi = {10.1109/CIS.2009.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuF09, author = {Jianhua Liu and Xiaoping Fan}, title = {The Analysis and Improvement of Binary Particle Swarm Optimization}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {254--258}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.261}, doi = {10.1109/CIS.2009.261}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuFWD09, author = {Yan Liu and Lei Fan and Yuping Wang and Qianli Dong}, title = {Optimization of Logistics Nodes in Dynamic Location with a Multi-objective Evolutionary Algorithm}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {133--137}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.101}, doi = {10.1109/CIS.2009.101}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuFWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuLZHZS09, author = {Xintian Liu and Changhong Liu and Lihui Zhao and Hu Huang and Xiaoyong Zhao and Xinyi Sun}, title = {The Finite Element Method Appling in the Flow Forming}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {556--558}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.202}, doi = {10.1109/CIS.2009.202}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuLZHZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuSHZ09, author = {Pengzhang Liu and Tingzhi Shen and Yu Hu and Sanyuan Zhao}, title = {Face Recognition Using Modular Locality Preserving Projections}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {320--324}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.119}, doi = {10.1109/CIS.2009.119}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuSHZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuWD09, author = {Dalian Liu and Xinfeng Wang and Jinling Du}, title = {A Clustering-Based Evolutionary Algorithm for Traveling Salesman Problem}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {118--122}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.80}, doi = {10.1109/CIS.2009.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuYC09, author = {Xin Liu and Xinge You and Yiu{-}ming Cheung}, title = {Texture Image Retrieval Using Non-separable Wavelets and Local Binary Patterns}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {287--291}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.181}, doi = {10.1109/CIS.2009.181}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaZZW09, author = {Liling Ma and Zhao Zhang and Xiaohang Zhou and Junzheng Wang}, title = {A Novel Classification Method Based on Artificial Immune System and Quantum Mechanics Theory}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {11--14}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.138}, doi = {10.1109/CIS.2009.138}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaZZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaoCX09, author = {Ming Mao and Shaohui Chen and Jin Xu}, title = {Construction of the Initial Structure for Preimage Attack of {MD5}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {442--445}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.214}, doi = {10.1109/CIS.2009.214}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaoCX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaoLYHGL09, author = {Cunli Mao and Lina Li and Zhengtao Yu and Lu Han and Jianyi Guo and Xiong{-}Li Lei}, title = {Research on Answer Extraction Method for Domain Question Answering System(QA)}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {79--83}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.173}, doi = {10.1109/CIS.2009.173}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaoLYHGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MiaoWD09, author = {Hongxia Miao and Honghua Wang and Zhixiang Deng}, title = {Quantum Genetic Algorithm and its Application in Power System Reactive Power Optimization}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {107--111}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.133}, doi = {10.1109/CIS.2009.133}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MiaoWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MouZPZF09, author = {Xiaozheng Mou and Wuneng Zhou and Lin Pan and Qingyu Zhu and Jian{-}An Fang}, title = {Lag Synchronization of Uncertain Chaotic Neural Networks with Mixed Time-Varying Delays Based on Adaptive Control}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {222--226}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.46}, doi = {10.1109/CIS.2009.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MouZPZF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NaYX09, author = {Na Wang and Yunjin Wang and Xia Li}, title = {A Novel Robust Watermarking Algorithm Based on {DWT} and {DCT}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {437--441}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.135}, doi = {10.1109/CIS.2009.135}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NaYX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NiZR09, author = {Jianjun Ni and Chuanbiao Zhang and Li Ren}, title = {An Intelligent Decision Support System of Lake Water Pollution Control Based on Multi-agent Model}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {217--221}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.79}, doi = {10.1109/CIS.2009.79}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NiZR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NiuYLZ09, author = {Wenxue Niu and Yajuan Yang and Xiao Luo and Quanju Zhang}, title = {Research on the Evolution of Supply Chain Based on {SWARM}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {292--295}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.114}, doi = {10.1109/CIS.2009.114}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NiuYLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PengCW09, author = {Le Peng and Zhi Cai and Guowen Wu}, title = {Predict Ranking of Object Summaries with Hidden Markov Model}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {88--91}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.154}, doi = {10.1109/CIS.2009.154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PengCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PengZW09, author = {Zhao{-}yi Peng and Yu Zhou and Ping Wang}, title = {Multi-pose Face Detection Based on Adaptive Skin Color and Structure Model}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {325--329}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.143}, doi = {10.1109/CIS.2009.143}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PengZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/QiC09, author = {Chengming Qi and Xusheng Chen}, title = {A New Digital Proxy Signature Scheme Based on {ECDLP}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {473--477}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.42}, doi = {10.1109/CIS.2009.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/QiC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/QiLJ09, author = {Yutao Qi and Fang Liu and Licheng Jiao}, title = {A Parallel Artificial Immune Model for Optimization}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {20--24}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.118}, doi = {10.1109/CIS.2009.118}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/QiLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/QinLL09, author = {Guang Qin and Feng Liu and Lijuan Li}, title = {A Quick Group Search Optimizer with Passive Congregation and its Convergence Analysis}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {249--253}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.100}, doi = {10.1109/CIS.2009.100}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/QinLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/QiuZ09, author = {Ying Qiu and Huafei Zhu}, title = {Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {446--450}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.39}, doi = {10.1109/CIS.2009.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/QiuZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Ren09, author = {Haizhen Ren}, title = {On Orderings of Some Graphs by the Extreme Roots of their Graph Polynomials}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {272--276}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.87}, doi = {10.1109/CIS.2009.87}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Ren09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/RodriguezY09, author = {Nibaldo Rodr{\'{\i}}guez and Eleuterio Ya{\~{n}}ez}, title = {Wavelet Smoothing Based Multivariate Polynomial for Anchovy Catches Forecasting}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {38--41}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.224}, doi = {10.1109/CIS.2009.224}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/RodriguezY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SantosP09, author = {Gil Melfe Mateus Santos and Hugo Pedro Martins Carrico Proen{\c{c}}a}, title = {On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {315--319}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.113}, doi = {10.1109/CIS.2009.113}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SantosP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Shao09, author = {Xiao{-}dong Shao}, title = {The Application of Improved 3D{\_}Apriori Three-Dimensional Association Rules Algorithm in Reservoir Data Mining}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {64--68}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.95}, doi = {10.1109/CIS.2009.95}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Shao09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShaoZLLG09, author = {Hui Shao and Hailin Zou and Yincheng Liang and Wenjun Li and Qian Gao}, title = {Time Scale Estimation Method Based on Anisotropic Diffusion}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {624--628}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.27}, doi = {10.1109/CIS.2009.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShaoZLLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShaoZS09, author = {Hua Shao and Xinglan Zhang and Feng Shao}, title = {Cryptanalysis of Short Signature Scheme Without Random Oracles Assumption}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {414--417}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.26}, doi = {10.1109/CIS.2009.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShaoZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShenMB09, author = {Yun Shen and Trevor P. Martin and Pete Bramhall}, title = {Intelligent Security Data Analysis}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {74--78}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.10}, doi = {10.1109/CIS.2009.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShenMB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShiYXZ09, author = {Bingxia Shi and Na Yu and Jia Xu and Quanming Zhao}, title = {Extraction and Recognition Alphabetic and Digital Characters on Industrial Containers}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {340--343}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.197}, doi = {10.1109/CIS.2009.197}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShiYXZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SongHHGLL09, author = {Jinling Song and Liming Huang and Qi He and Yan Gao and Xin Liu and Yuxiang Li}, title = {Preserving FDs in K-Anonymization by K-MSDs and Association Generalization}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {565--569}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.142}, doi = {10.1109/CIS.2009.142}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SongHHGLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SongW09, author = {Chengtian Song and Keyong Wang}, title = {Image Target Detection Using Morphological Neural Network}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {234--236}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.259}, doi = {10.1109/CIS.2009.259}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SongW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SunX09, author = {Xiaoli Sun and Chen Xu}, title = {Image Denoising and Inpainting Model Based on Taylor Expansion}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {666--670}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.120}, doi = {10.1109/CIS.2009.120}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SunX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Tan09, author = {Zuowen Tan}, title = {An Improved Identity-Based Group Signature Scheme}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {423--427}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.53}, doi = {10.1109/CIS.2009.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Tan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Tian09, author = {Yuan Tian}, title = {Discovering Temporal Similarity Pattern Based on Metamorphosis Data}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {59--63}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.71}, doi = {10.1109/CIS.2009.71}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Tian09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TianGZ09, author = {Jingwen Tian and Meijuan Gao and Shi{-}Ru Zhou}, title = {The Research of Building Logistics Cost Forecast Based on Regression Support Vector Machine}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {648--652}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.252}, doi = {10.1109/CIS.2009.252}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TianGZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TianZWW09, author = {Yun Tian and Mingquan Zhou and Zhongke Wu and Xingce Wang}, title = {A Region-Based Active Contour Model for Image Segmentation}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {376--380}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.238}, doi = {10.1109/CIS.2009.238}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TianZWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TranNT09, author = {Bao Ngoc Tran and Thuc Dinh Nguyen and Tran Dan Thu}, title = {A New S-Box Structure Based on Graph Isomorphism}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {463--467}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.110}, doi = {10.1109/CIS.2009.110}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TranNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangC09, author = {Taijun Wang and Yiu{-}ming Cheung}, title = {A Locally Gaussian Mixture Based {RBF} Network for Classification of Chinese Herbal Infrared Spectrum Fingerprint}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {381--385}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.272}, doi = {10.1109/CIS.2009.272}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangGCL09, author = {Zhenyou Wang and Wei Gao and Li'e Chen and Fei Li}, title = {Perfect Subliminal Channel in a Paring-Based Digital Signature}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {455--457}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.24}, doi = {10.1109/CIS.2009.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangGCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangHL09, author = {Fulong Wang and Cheng Huang and Xiaoliang Liu}, title = {A Fusion of Face Symmetry of Two-Dimensional Principal Component Analysis and Face Recognition}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {368--371}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.223}, doi = {10.1109/CIS.2009.223}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangHW09, author = {Jiayao Wang and Bin Hu and Quanlai Wang}, title = {The Walsh Spectrum Property of Resilient Boolean Functions}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {409--413}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.21}, doi = {10.1109/CIS.2009.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangHWC09, author = {Baohua Wang and Hejiang Huang and Xiaolong Wang and Wensheng Chen}, title = {An Ontology-Based {NLP} Approach to Semantic Annotation of Annual Report}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {180--183}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.269}, doi = {10.1109/CIS.2009.269}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangHWC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangL09, author = {Mingqiang Wang and Leibo Li}, title = {A Note on Twin Diffie-Hellman Problem}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {451--454}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.160}, doi = {10.1109/CIS.2009.160}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLH09, author = {Fulong Wang and Xiaoliang Liu and Cheng Huang}, title = {An Improved Kernel Fisher Discriminant Analysis for Face Recognition}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {353--357}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.255}, doi = {10.1109/CIS.2009.255}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangSD09, author = {Peizhen Wang and Lei Shi and Hengzhi Dong}, title = {Feature Extraction and Matching for Plant Images}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {155--159}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.247}, doi = {10.1109/CIS.2009.247}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangSD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangWACLY09, author = {Qingzhu Wang and Ke Wang and Donghong An and Bo Chen and Miao Liu and Yingying Ying}, title = {Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {160--164}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.239}, doi = {10.1109/CIS.2009.239}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangWACLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZB09, author = {Zhiming Wang and Li Zhang and Hong Bao}, title = {{PNN} Based Motion Detection with Adaptive Learning Rate}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {301--306}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.178}, doi = {10.1109/CIS.2009.178}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangZB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZTH09, author = {Wei Wang and Pengtao Zhang and Ying Tan and Xingui He}, title = {A Hierarchical Artificial Immune Model for Virus Detection}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.57}, doi = {10.1109/CIS.2009.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangZTH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZWM09, author = {Fangwei Wang and Yunkai Zhang and Changguang Wang and Jianfeng Ma}, title = {Predators Combat Good Point Set Scanning-Based Self-Learning Worms}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {418--422}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.20}, doi = {10.1109/CIS.2009.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangZWM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WeiZLL09, author = {Zhi Wei and Jianhua Zhang and Nan Li and Xu Li}, title = {Computation Model of Machining Mechanics of Glass Micromilling}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {587--591}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.183}, doi = {10.1109/CIS.2009.183}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WeiZLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuCZD09, author = {Bei Wu and Xing{-}yuan Chen and Yong{-}fui Zhang and Xiang{-}dong Dai}, title = {An Extensible Intra Access Control Policy Conflict Detection Algorithm}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {483--488}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.248}, doi = {10.1109/CIS.2009.248}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuCZD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuL09, author = {Xiao{-}Li Wu and Yan{-}Kui Liu}, title = {Measuring the Spread of Fuzzy Variable by {L-S} Integral}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {296--300}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.105}, doi = {10.1109/CIS.2009.105}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuLZL09, author = {Liming Wu and Junxiu Liu and Ji Zhang and Yuling Luo}, title = {The Intelligent Reconfigurable Measuring Node Based on Wireless Access Network}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {570--573}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.73}, doi = {10.1109/CIS.2009.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuLZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuMNWQH09, author = {Di Wu and Tianyun Ma and Pengcheng Nie and Zhiping Wang and Zhengjun Qiu and Yong He}, title = {Use of In-Situ Visible and Near-Infrared Spectroscopy for Non-invasive Discrimination of Spirulina Platensis}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {330--334}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.277}, doi = {10.1109/CIS.2009.277}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuMNWQH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuZG09, author = {Jiansheng Wu and Jie Zhou and Yuelin Gao}, title = {Support Vector Regression Based on Particle Swarm Optimization and Projection Pursuit Technology for Rainfall Forecasting}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {227--233}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.31}, doi = {10.1109/CIS.2009.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuZG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XiaoHWLC09, author = {Su Xiao and Guoqiang Han and Yan Wo and Zhan Li and Xiangji Chen}, title = {Fast Parameter Estimation in Image Restoration Based on Hierarchical Bayesian Framework}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {372--375}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.192}, doi = {10.1109/CIS.2009.192}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XiaoHWLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XieLL09, author = {Haobin Xie and Feng Liu and Lijuan Li}, title = {A Topology Optimization for Truss Based on Improved Group Search Optimizer}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {244--248}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.102}, doi = {10.1109/CIS.2009.102}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XieLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XingGC09, author = {Lixin Xing and Shanqing Gao and Yunfei Chen}, title = {A Novel Control Method Based on Fuzzy Neural Network}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {237--239}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.132}, doi = {10.1109/CIS.2009.132}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XingGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuFAZ09, author = {Chen Xu and Jianwen Feng and Francis R. Austin and Weiqiang Zhang}, title = {Adaptive Synchronization Between Hyperchaotic Lorenz System and Chen System}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {662--665}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.122}, doi = {10.1109/CIS.2009.122}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuFAZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuLW09, author = {Baoliang Xu and Wenjian Luo and Xufa Wang}, title = {A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {559--564}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.165}, doi = {10.1109/CIS.2009.165}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuYL09, author = {Bingxin Xu and Qian Yin and Guangjun Lv}, title = {Using {SVM} to Organize the Image Database}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {184--187}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.51}, doi = {10.1109/CIS.2009.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuYL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YanL09, author = {Ziye Yan and Yao Lu}, title = {Super Resolution of {MRI} Using Improved {IBP}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {643--647}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.59}, doi = {10.1109/CIS.2009.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YanL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangHX09, author = {Bo Yang and Zhengming Hu and Zibi Xiao}, title = {Efficient Certificateless Strong Designated Verifier Signature Scheme}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {432--436}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.191}, doi = {10.1109/CIS.2009.191}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangHX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangLS09, author = {Shengyi Yang and Kunqin Li and Jiao Shi}, title = {Design and Simulation of the Longitudinal Autopilot of {UAV} Based on Self-Adaptive Fuzzy {PID} Control}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {634--638}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.253}, doi = {10.1109/CIS.2009.253}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangMM09, author = {Kai Yang and Jian{-}Feng Ma and Zi{-}hui Miao}, title = {Hybrid Routing Protocol for Wireless Mesh Network}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {547--551}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.48}, doi = {10.1109/CIS.2009.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangWW09, author = {Bo Yang and Yong{-}gang Wu and Cheng Wang}, title = {A Multi-agent and {GIS} Based Simulation for Emergency Evacuation in Park and Public Square}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {211--216}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.234}, doi = {10.1109/CIS.2009.234}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangXJ09, author = {Jiadong Yang and Hua Xu and Peifa Jia}, title = {Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization Algorithm}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {112--117}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.163}, doi = {10.1109/CIS.2009.163}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangXJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YayaH09, author = {Soumah Yaya and Wang Honghua}, title = {Research on Reduction of Commutation Torque Ripple in Brushless {DC} Motor Drives Based on Fuzzy Logic Control}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {240--243}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.158}, doi = {10.1109/CIS.2009.158}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YayaH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Ye09, author = {Chengfu Ye}, title = {Minimal Merrifield-Simmons Index of 5-leaf-trees}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {264--267}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.89}, doi = {10.1109/CIS.2009.89}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Ye09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YuY09, author = {Kun Yu and Yunyang Yan}, title = {Reputation Measure for Incentive-Compatible Packet Forwarding in Ad Hoc Networks}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {542--546}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.268}, doi = {10.1109/CIS.2009.268}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YuY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZamaniMEP09, author = {Mahdi Zamani and Mahnush Movahedi and Mohammad Mehdi Ebadzadeh and Hossein Pedram}, title = {A DDoS-Aware {IDS} Model Based on Danger Theory and Mobile Agents}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {516--520}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.215}, doi = {10.1109/CIS.2009.215}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZamaniMEP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZangMC09, author = {Hongyan Zang and Lequan Min and Li Cao}, title = {An Image Encryption and Digital Signature Scheme Based on Generalized Synchronization Theorem}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {504--510}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.220}, doi = {10.1109/CIS.2009.220}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZangMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaiLZ09, author = {Zhengang Zhai and Yao Lu and Hong Zhao}, title = {Stereo Matching with Adaptive Arbitrary Support-Pixel Set and Adaptive Support-Weight}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {598--602}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.149}, doi = {10.1109/CIS.2009.149}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaiLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaiZ09, author = {Yishu Zhai and Yong Zhang}, title = {Contrast Restoration for Fog-Degraded Images}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {619--623}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.243}, doi = {10.1109/CIS.2009.243}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaiZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Zhang09, author = {Mingxi Zhang}, title = {Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {521--525}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.58}, doi = {10.1109/CIS.2009.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Zhang09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangDW09, author = {Guoli Zhang and Mingxin Dou and Siyan Wang}, title = {Hybrid Genetic Algorithm with Particle Swarm Optimization Technique}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {103--106}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.236}, doi = {10.1109/CIS.2009.236}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangDW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangGZW09, author = {Sulan Zhang and Ping Guo and Jifu Zhang and Xinxin Wang}, title = {A Batch Constructing Method of Weighted Concept Lattice Based on Deviance Analysis}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {69--73}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.86}, doi = {10.1109/CIS.2009.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangGZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangJ09, author = {Juyang Zhang and Ningkang Jiang}, title = {A Sound Dynamic Resource-Constrained Scheduling Scheme}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {311--314}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.170}, doi = {10.1109/CIS.2009.170}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangL09, author = {Lixia Zhang and Guangran Liu}, title = {Study and Design of 3D Virtual Scenes of Virtual Laboratory}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {629--633}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.246}, doi = {10.1109/CIS.2009.246}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLWC09, author = {Suxian Zhang and Hai{-}Lin Liu and Jiechang Wen and Weili Chen}, title = {A New Algorithm Estimating the Mixing Matrix for the Sparse Component Analysis}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {25--29}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.251}, doi = {10.1109/CIS.2009.251}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLWC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangNN09, author = {Juan Zhang and Yi Niu and Huabei Nie}, title = {Web Document Classification Based on Fuzzy k-NN Algorithm}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {193--196}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.28}, doi = {10.1109/CIS.2009.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangNN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangS09, author = {Wenyao Zhang and Jing Su}, title = {Extraction of Limit Streamlines in 2D Flow Field Using Virtual Boundary}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {171--175}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.194}, doi = {10.1109/CIS.2009.194}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangX09, author = {Xu Zhang and Li Xu}, title = {An Improved Immune-Based Multi-modal Function Optimization Algorithm}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {15--19}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.241}, doi = {10.1109/CIS.2009.241}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangXYW09, author = {Jianhua Zhang and Hongsheng Xu and Yang Yu and Zhi Wei}, title = {{FEM} Based Numerical Analysis on the Temperature Field in Grind-hardening}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {615--618}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.207}, doi = {10.1109/CIS.2009.207}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangXYW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangY09, author = {Da Zhang and Chai Kiat Yeo}, title = {A Distributed Court System for Intrusion Detection in {OLSR}}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {478--482}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.52}, doi = {10.1109/CIS.2009.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangYZ09, author = {Jie Zhang and Yajuan Yang and Quanju Zhang}, title = {The Particle Swarm Optimization Algorithm Based on Dynamic Chaotic Perturbations and its Application to K-Means}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {282--286}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.111}, doi = {10.1109/CIS.2009.111}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZ09, author = {Ying Zhang and Zhe{-}zhao Zeng}, title = {A New Method for Simultaneous Extraction of All Roots of Algebraic Polynomial}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {197--200}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.77}, doi = {10.1109/CIS.2009.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoLZ09, author = {Hong Zhao and Yao Lu and Zhengang Zhai}, title = {Example-Based Facial Sketch Hallucination}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {578--582}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.159}, doi = {10.1109/CIS.2009.159}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoW09, author = {Haixing Zhao and Liang Wei}, title = {Reliability Polynomials of Networks with Vertex Failure}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {268--271}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.12}, doi = {10.1109/CIS.2009.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhengFS09, author = {Cheng Zheng and Yong Fang and Yaping Shen}, title = {The Implementation of the Web Mining Based on {XML} Technology}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {84--87}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.267}, doi = {10.1109/CIS.2009.267}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhengFS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouL09, author = {Xiuzhuang Zhou and Yao Lu}, title = {Efficient Mean Shift Particle Filter for Sperm Cells Tracking}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {335--339}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.264}, doi = {10.1109/CIS.2009.264}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhouL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouSZ09, author = {Jianqin Zhou and Cheng Shangguan and Zemao Zhao}, title = {Computing the m-Tight Error Linear Complexity of Periodic Binary Sequences}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {386--390}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.72}, doi = {10.1109/CIS.2009.72}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhouSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuQ09, author = {Huafei Zhu and Ying Qiu}, title = {Mixed Commitments Mediated Transcoders: {A} Simple Implementation of Mercurial Mediated Transcoders}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {574--577}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.36}, doi = {10.1109/CIS.2009.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2009-1, title = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5375794}, isbn = {978-0-7695-3931-7}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/2009-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YanD09, title = {A Scenario-Based Test Case Generation Framework for Security Policies}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {489--493}, publisher = {{IEEE} Computer Society}, year = {2009}, note = {Withdrawn.}, url = {https://doi.org/10.1109/CIS.2009.221}, doi = {10.1109/CIS.2009.221}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YanD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.