Search dblp for Publications

export results for "toc:db/conf/iitsi/iitsi2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iitsi/BiaoLL10,
  author       = {Cai Biao and
                  Zhishu Li and
                  Zhen Luo},
  title        = {Threshold Secret Sharing Based Trust Security in Structured {P2P}
                  Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {320--323},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.123},
  doi          = {10.1109/IITSI.2010.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/BiaoLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/CaoYWCC10,
  author       = {Yanyan Cao and
                  Hengjun Yue and
                  Jian Wu and
                  Jianming Chen and
                  Zhiming Cui},
  title        = {Vehicle Edge Detection Based on Multi-structure Mathematical Morphology},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {258--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.11},
  doi          = {10.1109/IITSI.2010.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/CaoYWCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Chen10,
  author       = {Juan Chen},
  title        = {A Flexible Fuzzy Comprehensive Evaluation Method},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {502--506},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.93},
  doi          = {10.1109/IITSI.2010.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Chen10a,
  author       = {Juan Chen},
  title        = {Economic Grid Resource Scheduling Based on Utility Optimization},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {522--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.94},
  doi          = {10.1109/IITSI.2010.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Chen10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ChenC10,
  author       = {Xiaodan Chen and
                  Shaobai Chen},
  title        = {The Feasible Control Lyapunov Function of Nonlinear Affine-Control
                  Systems},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {442--445},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.154},
  doi          = {10.1109/IITSI.2010.154},
  timestamp    = {Thu, 25 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iitsi/ChenC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ChenC10a,
  author       = {Xiaodan Chen and
                  Shaobai Chen},
  title        = {On the Upper Completeness of Quasi-metric Spaces},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {446--449},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.153},
  doi          = {10.1109/IITSI.2010.153},
  timestamp    = {Thu, 25 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iitsi/ChenC10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ChenCX10,
  author       = {Youqin Chen and
                  Zhide Chen and
                  Li Xu},
  title        = {{RFID} System Security Using Identity-Based Cryptography},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {460--464},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.52},
  doi          = {10.1109/IITSI.2010.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ChenCX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ChenFL10,
  author       = {Junjian Chen and
                  Dan Feng and
                  Jingning Liu},
  title        = {An Implementation of Object-Based Storage System Access Control Based
                  on {IBE}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {635--639},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.53},
  doi          = {10.1109/IITSI.2010.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ChenFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ChenL10,
  author       = {Hongli Chen and
                  ShanGuo Lv},
  title        = {Study on Ontology Model Based on Rough Set},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {105--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.169},
  doi          = {10.1109/IITSI.2010.169},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ChenL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ChenSYWLX10,
  author       = {Zhonghai Chen and
                  Yong Sun and
                  Guoli Yang and
                  Tengfei Wu and
                  Guizhu Li and
                  Longbiao Xin},
  title        = {Air Conditioning Load Prediction Based on {DE-SVM} Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {276--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.41},
  doi          = {10.1109/IITSI.2010.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ChenSYWLX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ChineWYCLC10,
  author       = {Wen{-}Huan Chine and
                  Hsiao{-}Ping Wei and
                  Keh{-}Chia Yeh and
                  Li Chen and
                  Gin{-}Rong Liu and
                  Chang{-}Hung Chiu},
  title        = {Estimating Typhoon Rainfall over Sea from {SSM/I} Satellite Data Using
                  a Back-Propagated Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {263--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.102},
  doi          = {10.1109/IITSI.2010.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ChineWYCLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/DengK10,
  author       = {Huifang Deng and
                  Haiyan Kang},
  title        = {Research on High Performance {RFID} Code Resolving Technology},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {677--681},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.21},
  doi          = {10.1109/IITSI.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/DengK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/DengSZ10,
  author       = {Zhongjun Deng and
                  Wei Song and
                  Xuefeng Zheng},
  title        = {{P2PKMM:} {A} Hybrid Clustering Algorithm over {P2P} Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {450--454},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.9},
  doi          = {10.1109/IITSI.2010.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/DengSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/DengW10,
  author       = {Zhonghua Deng and
                  Ying Wu},
  title        = {Overcoming Disadvantages by Making Full Use of Extrinsic Objects:
                  Advancing Information Resource Construction by {ISA}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {658--662},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.48},
  doi          = {10.1109/IITSI.2010.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/DengW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/DongWSC10,
  author       = {Junyu Dong and
                  Yuliang Wang and
                  Yan Song and
                  Guanglin Cheng},
  title        = {Three-Dimensional Multiscale Texture Synthesis},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {483--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.125},
  doi          = {10.1109/IITSI.2010.125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/DongWSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/FuBZ10,
  author       = {Xiangqun Fu and
                  Wansu Bao and
                  Chun Zhou},
  title        = {Design and Implementation of Quantum Factorization Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {748--752},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.150},
  doi          = {10.1109/IITSI.2010.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/FuBZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/GangF10,
  author       = {Wang Gang and
                  Yin Fengxia},
  title        = {Study on Service Selections Based on Ontology and Qos},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {43--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.75},
  doi          = {10.1109/IITSI.2010.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/GangF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/GaoHPW10,
  author       = {Feng Gao and
                  Jingsha He and
                  Shufen Peng and
                  Xu Wu},
  title        = {A Quantifying Metric for Privacy Protection Based on Information Theory},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {216--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.107},
  doi          = {10.1109/IITSI.2010.107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/GaoHPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/GaoLWY10,
  author       = {Fuxiang Gao and
                  Sha Li and
                  Xiaolu Wang and
                  Lan Yao},
  title        = {A Security Architecture for Intranet Based on Security Area Division},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {539--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.33},
  doi          = {10.1109/IITSI.2010.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/GaoLWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/GaoZZ10,
  author       = {Changyuan Gao and
                  Shuchen Zhang and
                  Xiaoxing Zhang},
  title        = {The Modeling and Simulation of Negotiation Process for High-Tech Virtual
                  Enterprise Based on {UML} and Petri Net},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {455--459},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.100},
  doi          = {10.1109/IITSI.2010.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/GaoZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/GuSH10,
  author       = {Ji{-}Hua Gu and
                  Yun Shang and
                  Bei{-}jing Huang},
  title        = {An {NPT} Watermarking Algorithm Using Wavelet Image Combination},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {378--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.116},
  doi          = {10.1109/IITSI.2010.116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/GuSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/GuoSR10,
  author       = {Yingjun Guo and
                  Lihua Sun and
                  Haichao Ran},
  title        = {The Method of Early Real-Time Fault Diagnosis for Technical Process
                  Based on Neural Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {653--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.92},
  doi          = {10.1109/IITSI.2010.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/GuoSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/GuoX10,
  author       = {Kaiqiang Guo and
                  Jiewu Xia},
  title        = {An Improved Algorithm of Collision Detection in 2D Grapple Games},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {328--331},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.176},
  doi          = {10.1109/IITSI.2010.176},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/GuoX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HeXWZ10,
  author       = {Ruhan He and
                  Weibin Xu and
                  Ying Wang and
                  Wei Zhan},
  title        = {A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing
                  Problem},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {390--393},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.144},
  doi          = {10.1109/IITSI.2010.144},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HeXWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HongY10,
  author       = {Ding Hong and
                  Zhao Yizhu},
  title        = {A Historical Role-Based Fast Negotiation Model in Open Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {289--293},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.133},
  doi          = {10.1109/IITSI.2010.133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HongY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HoushmandHM10,
  author       = {Mahboobeh Houshmand and
                  Monireh Houshmand and
                  Habib Rajabi Mashhadi},
  title        = {Game Theory Based View to the Quantum Key Distribution {BB84} Protocol},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {332--336},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.135},
  doi          = {10.1109/IITSI.2010.135},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iitsi/HoushmandHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HoushmandSSAD10,
  author       = {Mahboobeh Houshmand and
                  Elaheh Soleymanpour and
                  Hossein Salami and
                  Mahya Amerian and
                  Hossein Deldari},
  title        = {Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination
                  of Modified Simulated Annealing and List Based Scheduling},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {350--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.137},
  doi          = {10.1109/IITSI.2010.137},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iitsi/HoushmandSSAD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Hu10,
  author       = {Zhi{-}Hua Hu},
  title        = {A Quay Crane Assignment Approach for Berth Allocation Problem in Container
                  Terminal},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {17--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.97},
  doi          = {10.1109/IITSI.2010.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Hu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HuLZL10,
  author       = {Jianli Hu and
                  Xiaohua Li and
                  Bin Zhou and
                  Yonghua Li},
  title        = {SECTrust: {A} Secure and Effective Distributed {P2P} Trust Model},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {34--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.113},
  doi          = {10.1109/IITSI.2010.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HuLZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HuX10,
  author       = {Xinming Hu and
                  Huosong Xia},
  title        = {Automated Assessment System for Subjective Questions Based on {LSI}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {250--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.76},
  doi          = {10.1109/IITSI.2010.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HuX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Huang10,
  author       = {Jianjun Huang},
  title        = {A {PSO} Based Array Shape Calibration Utilizing Cyclostationarity},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {226--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.117},
  doi          = {10.1109/IITSI.2010.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Huang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HuangCL10,
  author       = {Weichun Huang and
                  Min Chen and
                  Jian Liu},
  title        = {A Small World Network Based Grid Resource Discovery Mechanism},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {8--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.24},
  doi          = {10.1109/IITSI.2010.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HuangCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HuangHWL10,
  author       = {Lei Huang and
                  Yanxiang He and
                  Furu Wei and
                  Wenjie Li},
  title        = {Modeling Document Summarization as Multi-objective Optimization},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {382--386},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.80},
  doi          = {10.1109/IITSI.2010.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HuangHWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HuangXW10,
  author       = {Xiangyang Huang and
                  Xiao Xin and
                  Wenjun Wu},
  title        = {Representing Non-deterministic Actions within the Situation Calculus
                  for Autonomous Characters},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {39--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.66},
  doi          = {10.1109/IITSI.2010.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HuangXW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HuangZ10,
  author       = {Xiaosheng Huang and
                  Fang Zhang},
  title        = {Multi-modal Medical Image Registration Based on Gradient of Mutual
                  Information and Hybrid Genetic Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {125--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.112},
  doi          = {10.1109/IITSI.2010.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HuangZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/HuangZL10,
  author       = {Jianjun Huang and
                  Jiali Zhong and
                  Pengfei Li},
  title        = {A Cloud Model Inference System Based Alpha-Beta Filter for Tracking
                  of Maneuvering Target},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {221--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.119},
  doi          = {10.1109/IITSI.2010.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/HuangZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiaLGC10,
  author       = {Yan Jia and
                  Runheng Li and
                  Liang Gan and
                  Guangqiang Chen},
  title        = {{IRC} Botnets' Homology Identifying Method Based on Improved LB{\_}PAA
                  Distance of Communication Characteristic Curves},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {360--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.69},
  doi          = {10.1109/IITSI.2010.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiaLGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiangJS10,
  author       = {Yali Jiang and
                  Xiuling Ju and
                  Feng Shi},
  title        = {New Lattice-Based Public-Key Cryptosystem},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {387--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.98},
  doi          = {10.1109/IITSI.2010.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiangJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiangJZW10,
  author       = {Chunliang Jiang and
                  Hanhong Jiang and
                  Chaoliang Zhang and
                  Jie Wang},
  title        = {A New Method of Sea-Sky-Line Detection},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {740--743},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.147},
  doi          = {10.1109/IITSI.2010.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiangJZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiangL10,
  author       = {Da{-}guo Jiang and
                  Zhao{-}hui Liu},
  title        = {Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR
                  Composite Film},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {268--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.152},
  doi          = {10.1109/IITSI.2010.152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiangMT10,
  author       = {Xiangang Jiang and
                  Dean Ma and
                  Longfeng Tao},
  title        = {The Research of High Noise Image's Restoration and Recognition of
                  Train's Plates},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {150--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.172},
  doi          = {10.1109/IITSI.2010.172},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiangMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiangPMC10,
  author       = {Chang{-}jin Jiang and
                  Hong Peng and
                  Qian{-}Li Ma and
                  Jian{-}chao Chen},
  title        = {Automatic Summarization for Chinese Text Based on Combined Words Recognition
                  and Paragraph Clustering},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {591--594},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.15},
  doi          = {10.1109/IITSI.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiangPMC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiangXM10,
  author       = {Xiangang Jiang and
                  Lunlun Xu and
                  Dean Ma},
  title        = {Volume Rendering Effect Analysis with Image Preprocessing Technology
                  Based on Three Dimension Anisotropic Diffusion},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {789--792},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.173},
  doi          = {10.1109/IITSI.2010.173},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiangXM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JiangXZW10,
  author       = {YuXiang Jiang and
                  Cheng Xu and
                  Lulu Zhang and
                  ShanQin Wang},
  title        = {Design and Implementation for Real-Time Property of Serial Communication
                  Based on {WINDOWS} {CE}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {73--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.111},
  doi          = {10.1109/IITSI.2010.111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JiangXZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JinDWZL10,
  author       = {Shaohua Jin and
                  Chongguang Ding and
                  Yongxue Wang and
                  Yanmin Zhang and
                  Jie Lv},
  title        = {A Strong Deviation Theorem Based on Laplace Transform on a Non-homogeneous
                  Tree},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {165--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.67},
  doi          = {10.1109/IITSI.2010.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JinDWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JinWLTL10,
  author       = {Shaohua Jin and
                  Yongxue Wang and
                  Huitao Liu and
                  Ying Tian and
                  Hui Li},
  title        = {Some Strong Limit Theorems for Hidden Markov Models Indexed by a Non-homogeneous
                  Tree},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {169--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.68},
  doi          = {10.1109/IITSI.2010.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JinWLTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/JuWMW10,
  author       = {Li{-}li Ju and
                  Xiu{-}fang Wang and
                  Sai Ma and
                  Chun{-}ming Wei},
  title        = {The Algorithm Study of Sensor Compensation in {MWD} Instrument Based
                  on Genetic Elman Neural Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {394--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.45},
  doi          = {10.1109/IITSI.2010.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/JuWMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LanXY10,
  author       = {Shi Lan and
                  Shao Xia and
                  Zhao Ying},
  title        = {Design and Implementation of ICAP-Client Based on Improved {LRU} Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {271--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.17},
  doi          = {10.1109/IITSI.2010.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LanXY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Li10,
  author       = {Zhixing Li},
  title        = {Product Feature Extraction with a Combined Approach},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {686--690},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.184},
  doi          = {10.1109/IITSI.2010.184},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Li10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Li10a,
  author       = {Fei Li},
  title        = {An Improved Particle Swarm Optimization Algorithm with Synthetic Update
                  Mechanism},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {695--699},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.148},
  doi          = {10.1109/IITSI.2010.148},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Li10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Li10b,
  author       = {Haisheng Li},
  title        = {Study of Privacy Preserving Data Mining},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {700--703},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.14},
  doi          = {10.1109/IITSI.2010.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Li10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiG10,
  author       = {Kai Li and
                  Hongtao Gao},
  title        = {A Novel Measure of Diversity for Support Vector Machine Ensemble},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {366--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.136},
  doi          = {10.1109/IITSI.2010.136},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiGGL10,
  author       = {Lizong Li and
                  Tiegang Gao and
                  Qiaolun Gu and
                  Bi Lei},
  title        = {A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet Transformation},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {68--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.77},
  doi          = {10.1109/IITSI.2010.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiGGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiJLS10,
  author       = {Shaobo Li and
                  Xiaohui Jia and
                  Shulin Lv and
                  Zhisheng Shao},
  title        = {Research and Application of {USB} Filter Driver Based on Windows Kernel},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {438--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.10},
  doi          = {10.1109/IITSI.2010.10},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiJLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiLJS10,
  author       = {Shaobo Li and
                  Shulin Lv and
                  Xiaohui Jia and
                  Zhisheng Shao},
  title        = {Application of Clipboard Monitoring Technology in Graphic and Document
                  Information Security Protection System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {423--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.55},
  doi          = {10.1109/IITSI.2010.55},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiLJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiLZ10,
  author       = {Huamin Li and
                  Xingsen Li and
                  Zhengxiang Zhu},
  title        = {Knowledge Mining for Intelligent Decision Making in Small and Middle
                  Business},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {734--739},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.181},
  doi          = {10.1109/IITSI.2010.181},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiPL10,
  author       = {Wei Li and
                  Zhen Peng Pang and
                  Zhi Jie Liu},
  title        = {{SPIHT} Algorithm Combined with Huffman Encoding},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {341--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.63},
  doi          = {10.1109/IITSI.2010.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiS10,
  author       = {Jian Li and
                  Wengeng Shi},
  title        = {Model of {CSR} in Chinese Medicine E-commerce Firm: Strategic Management
                  Perspective},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {704--707},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.36},
  doi          = {10.1109/IITSI.2010.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiW10,
  author       = {Lanying Li and
                  Xin Wang},
  title        = {A High Security Dynamic Secret Key Management Scheme for Wireless
                  Sensor Networks},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {507--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.46},
  doi          = {10.1109/IITSI.2010.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiWH10,
  author       = {Guorui Li and
                  Ying Wang and
                  Jingsha He},
  title        = {Efficient Group Key Management Scheme in Wireless Sensor Networks},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {411--415},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.131},
  doi          = {10.1109/IITSI.2010.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiWZ10,
  author       = {Nianqiang Li and
                  Yongbing Wang and
                  Guoyi Zhao},
  title        = {A Preferable Method on Digital Filter in {ECG} Signal's Processing
                  Based on {FPGA}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {184--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.81},
  doi          = {10.1109/IITSI.2010.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiWZ10a,
  author       = {Nianqiang Li and
                  Yongbing Wang and
                  Guoyi Zhao},
  title        = {A New Scheme on Multifunction Wireless Medical Surveillance System
                  Based on {FPGA}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {188--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.82},
  doi          = {10.1109/IITSI.2010.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiWZ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiXW10,
  author       = {Minghui Li and
                  Jingbo Xia and
                  Yaoguo Wang},
  title        = {Research on {MAC} Communication Mechanism of Air-to-Ground Data Link
                  Based on 3G: The {MSDU} Frame Subsection and {RTS/CTS} Handshake Mechanism},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {54--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.95},
  doi          = {10.1109/IITSI.2010.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiXW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiY10,
  author       = {Dong Li and
                  Chunhui Yang},
  title        = {A Test Platform for Evaluation of Web Service Composition Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {302--305},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.174},
  doi          = {10.1109/IITSI.2010.174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiY10a,
  author       = {Dong Li and
                  Chunhui Yang},
  title        = {A Trust Evaluation Model for Web Service Selection},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {306--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.175},
  doi          = {10.1109/IITSI.2010.175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiZ10,
  author       = {Yang Li and
                  Chong{-}chong Zhao},
  title        = {Aesthetic Evolution of Staged L-systems for Tiling Pattern Design},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {488--492},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.71},
  doi          = {10.1109/IITSI.2010.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Liang10,
  author       = {Ye Liang},
  title        = {Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer
                  Environment},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {667--670},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.121},
  doi          = {10.1109/IITSI.2010.121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Liang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LinZO10,
  author       = {Ying Lin and
                  Yan Zhang and
                  Yang{-}jia Ou},
  title        = {The Design and Implementation of Host-Based Intrusion Detection System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {595--598},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.127},
  doi          = {10.1109/IITSI.2010.127},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LinZO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Liu10,
  author       = {Hailin Liu},
  title        = {A Mixture Conjugate Gradient Method for Unconstrained Optimization},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {26--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.57},
  doi          = {10.1109/IITSI.2010.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Liu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiuDJ10,
  author       = {Yu Liu and
                  Junchan Du and
                  Feng Ji},
  title        = {Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {77--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.58},
  doi          = {10.1109/IITSI.2010.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiuDJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiuG10,
  author       = {Zenghui Liu and
                  Liguo Guan},
  title        = {Attack Simulation and Signature Extraction of Low-Rate DoS},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {544--548},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.38},
  doi          = {10.1109/IITSI.2010.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiuG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiuQCW10,
  author       = {Qiao Liu and
                  Zhiguang Qin and
                  Hongrong Cheng and
                  Mingcheng Wan},
  title        = {Efficient Modeling of Spam Images},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {663--666},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.40},
  doi          = {10.1109/IITSI.2010.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiuQCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiuSH10,
  author       = {Zhihua Liu and
                  Hui Sun and
                  Haizhi Hu},
  title        = {Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm
                  Based on Exchange Strategy},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {212--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.64},
  doi          = {10.1109/IITSI.2010.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiuSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LiuY10,
  author       = {Yanbin Liu and
                  Ping Yuan},
  title        = {A Study of User Downloading Behavior in Mobile Internet Using Clickstream
                  Data},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {255--257},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.79},
  doi          = {10.1109/IITSI.2010.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LiuY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LongC10,
  author       = {Chen Long and
                  Huang Chen},
  title        = {Comparative Study between the Magic Formula and the Neural Network
                  Tire Model Based on Genetic Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {280--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.138},
  doi          = {10.1109/IITSI.2010.138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LongC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LuanLW10,
  author       = {Fang{-}jun Luan and
                  Lan Lin and
                  Yong{-}hui Wang},
  title        = {4-Step Face Authentication Algorithm Based on {SVM}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {534--538},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.99},
  doi          = {10.1109/IITSI.2010.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LuanLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LuoXR10,
  author       = {Wen{-}lang Luo and
                  An{-}dong Xie and
                  Wen Ruan},
  title        = {The Construction and Test for a Small Beowulf Parallel Computing System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {767--770},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.157},
  doi          = {10.1109/IITSI.2010.157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LuoXR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LvA10,
  author       = {Rong{-}jie Lv and
                  Yu{-}hong An},
  title        = {Dynamic Evolution Simulation of Corporate Governance Based on Swarm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {173--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.22},
  doi          = {10.1109/IITSI.2010.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LvA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/LvC10,
  author       = {ShanGuo Lv and
                  Hongli Chen},
  title        = {Study on Incremental Data Mining Based on Rough Set Theory},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {101--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.168},
  doi          = {10.1109/IITSI.2010.168},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/LvC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/MaL10,
  author       = {Xinqiang Ma and
                  Youyuan Liu},
  title        = {Electronic Commerce Technology and its Security Problems},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {631--634},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.165},
  doi          = {10.1109/IITSI.2010.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/MaL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/MaLD10,
  author       = {Xiaojun Ma and
                  Sa Li and
                  Weihui Dai},
  title        = {Modeling and Simulating of Ecological Community in Digital Creative
                  Industry},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {708--712},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.130},
  doi          = {10.1109/IITSI.2010.130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/MaLD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/MaLSW10,
  author       = {Miao Ma and
                  Jian{-}hui Liang and
                  Li Sun and
                  Min Wang},
  title        = {{SAR} Image Segmentation Based on {SWT} and Improved {AFSA}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {146--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.171},
  doi          = {10.1109/IITSI.2010.171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/MaLSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/MinF10,
  author       = {Gu Min and
                  Yang Feng},
  title        = {An Improved Genetic Algorithm Based on Polygymy},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {371--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.166},
  doi          = {10.1109/IITSI.2010.166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/MinF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/NiGZ10,
  author       = {Lihui Ni and
                  Zhijin Guan and
                  Wenying Zhu},
  title        = {A General Method of Constructing the Reversible Full-Adder},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {109--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.25},
  doi          = {10.1109/IITSI.2010.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/NiGZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Pan10,
  author       = {Ding Pan},
  title        = {{DW} 2.0-Oriented Metadata Evolution Management},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {311--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.91},
  doi          = {10.1109/IITSI.2010.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Pan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/PangDZ10,
  author       = {Ming{-}bao Pang and
                  Fang Dong and
                  Xin{-}ping Zhao},
  title        = {Regional Logistics System Bi-level Programming with Elastic Demand
                  by Using Fuzzy C-means Clustering},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {160--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.19},
  doi          = {10.1109/IITSI.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/PangDZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/PangLSB10,
  author       = {Yin Pang and
                  Kan Li and
                  Xin Sun and
                  Kaili Bu},
  title        = {Dynamic Replica Selection Using Improved Kernel Density Estimation},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {470--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.49},
  doi          = {10.1109/IITSI.2010.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/PangLSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/PengXZ10,
  author       = {Xuange Peng and
                  Ying Xiao and
                  Bing Zhu},
  title        = {Research of Image Acquisition Device for River Sediment},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {771--776},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.162},
  doi          = {10.1109/IITSI.2010.162},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/PengXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/PingP10,
  author       = {Teng Ping and
                  He Ping},
  title        = {Characteristics of Network Non-optimum and Extensionality Security
                  Mode},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {627--630},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.109},
  doi          = {10.1109/IITSI.2010.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/PingP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/QiuCH10,
  author       = {Zhao Qiu and
                  Mingrui Chen and
                  Jun Huang},
  title        = {A Study on {CRL} Issue by {P2P} Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {526--529},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.145},
  doi          = {10.1109/IITSI.2010.145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/QiuCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/QiuCH10a,
  author       = {Zhao Qiu and
                  Mingrui Chen and
                  Jun Huang},
  title        = {Design of Multi-mode E-commerce Recommendation System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {530--533},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.108},
  doi          = {10.1109/IITSI.2010.108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/QiuCH10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ShenHS10,
  author       = {Yanguang Shen and
                  Junrui Han and
                  Huifang Shan},
  title        = {The Research of Privacy-Preserving Clustering Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {324--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.62},
  doi          = {10.1109/IITSI.2010.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ShenHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ShiL10,
  author       = {Hongqin Shi and
                  Fangliang Lv},
  title        = {A Blind Watermark Algorithm for Color Image Based on Dual Scrambling
                  Technique},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {781--785},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.167},
  doi          = {10.1109/IITSI.2010.167},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ShiL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ShiLG10,
  author       = {Na Shi and
                  Xumin Liu and
                  Yong Guan},
  title        = {Research on k-means Clustering Algorithm: An Improved k-means Clustering
                  Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {63--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.74},
  doi          = {10.1109/IITSI.2010.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ShiLG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/SongS10,
  author       = {Xiaoyu Song and
                  Lihua Sun},
  title        = {Study on the Convergence of Hybrid Ant Colony Algorithm for Job Shop
                  Scheduling Problems},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {493--497},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.106},
  doi          = {10.1109/IITSI.2010.106},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/SongS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Sun10,
  author       = {Hongjie Sun},
  title        = {An Integrated Network Performance Monitor System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {88--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.60},
  doi          = {10.1109/IITSI.2010.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Sun10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Sun10a,
  author       = {Guang Sun},
  title        = {An Algorithm of Webpage Information Hiding Based on Class Selectors},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {691--694},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.42},
  doi          = {10.1109/IITSI.2010.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Sun10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Sun10b,
  author       = {Jianfang Sun},
  title        = {Application of Data Mining for Decision Tree Model of Multi-variety
                  Discrete Production and Manufacture},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {724--728},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.13},
  doi          = {10.1109/IITSI.2010.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Sun10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TaihuaF10,
  author       = {Wang Taihua and
                  Guo Fan},
  title        = {Associating {IDS} Alerts by an Improved Apriori Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {478--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.47},
  doi          = {10.1109/IITSI.2010.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TaihuaF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TanZ10,
  author       = {Bin Tan and
                  Xuyan Zhou},
  title        = {Automatic Construction of Web-Based English/Chinese Parallel Corpora},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {114--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.124},
  doi          = {10.1109/IITSI.2010.124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TanZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TanZGT10,
  author       = {Xue{-}Dan Tan and
                  He{-}Ming Zhao and
                  Ji{-}Hua Gu and
                  Zhi Tao},
  title        = {A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based
                  on Empirical Mode Decomposition and Entropy},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {355--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.115},
  doi          = {10.1109/IITSI.2010.115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TanZGT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TangF10,
  author       = {Haokui Tang and
                  Zhiquan Feng},
  title        = {Skin Segmentation Based on Double-Models},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {3--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.78},
  doi          = {10.1109/IITSI.2010.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TangF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TaoTHGXZ10,
  author       = {Zhi Tao and
                  Xue{-}Dan Tan and
                  Tao Han and
                  Ji{-}Hua Gu and
                  Yi{-}Shen Xu and
                  He{-}Ming Zhao},
  title        = {Reconstruction of Normal Speech from Whispered Speech Based on {RBF}
                  Neural Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {374--377},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.118},
  doi          = {10.1109/IITSI.2010.118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TaoTHGXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TianB10,
  author       = {Li Tian and
                  Wansu Bao},
  title        = {A Medium Field Multivariate Public Key Signature Scheme with External
                  Perturbation},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {753--757},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.149},
  doi          = {10.1109/IITSI.2010.149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TianB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TianV10,
  author       = {Yukang Tian and
                  Huy Quan Vu},
  title        = {A Multiple Population Genetic Algorithm and its Application in Fuzzy
                  Controller},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {729--733},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.43},
  doi          = {10.1109/IITSI.2010.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TianV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/TianYZL10,
  author       = {Jiayin Tian and
                  Cheng Yang and
                  Yichun Zhang and
                  Jianbo Liu},
  title        = {Distributed Key Management Scheme for Large Scale Pay-TV Application},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {30--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.110},
  doi          = {10.1109/IITSI.2010.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/TianYZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangB10,
  author       = {Wu Wang and
                  Zheng{-}min Bai},
  title        = {Performance Analysis of an Improved Single Neuron Adaptive {PID} Control},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {22--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.18},
  doi          = {10.1109/IITSI.2010.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangCZWD10,
  author       = {Wenxian Wang and
                  Xingshu Chen and
                  Yongbin Zou and
                  Haizhou Wang and
                  Zongkun Dai},
  title        = {A Focused Crawler Based on Naive Bayes Classifier},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {517--521},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.30},
  doi          = {10.1109/IITSI.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangCZWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangDDZL10,
  author       = {Feng Wang and
                  Hui Deng and
                  Wei Dai and
                  Sheng Zheng and
                  Bo Liang},
  title        = {The Security Issues of Scientific-Workflow Technique in Network Grid
                  Computing},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {285--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.12},
  doi          = {10.1109/IITSI.2010.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangDDZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangFHCW10,
  author       = {Ruihu Wang and
                  Bin Fang and
                  Zhangping Hu and
                  Liang Chen and
                  Weihua Wang},
  title        = {Cascaded SVMs in Pattern Classification for Time-Sensitive Separating},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {640--644},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.56},
  doi          = {10.1109/IITSI.2010.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangFHCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangH10,
  author       = {Huajin Wang and
                  Chun{-}an Hu},
  title        = {Mining Maximal Patterns Based on Improved FP-tree and Array Technique},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {567--571},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.185},
  doi          = {10.1109/IITSI.2010.185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangJGWL10,
  author       = {Shan Wang and
                  Yang Jiang and
                  Minghua Gao and
                  Chuanyun Wang and
                  Haiwen Liu},
  title        = {Artificial Neural Network Method for the Analysis of 1-D Defected
                  Ground Structure},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {786--788},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.170},
  doi          = {10.1109/IITSI.2010.170},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangJGWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangLJX10,
  author       = {Pingjian Wang and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Yongquan Xie},
  title        = {Mediated Hierarchical Identity-Based Combined Public Key Schemes},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {614--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.20},
  doi          = {10.1109/IITSI.2010.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangLJX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangLL10,
  author       = {Lin{-}an Wang and
                  Qiang Li and
                  Xiao{-}juan Liang},
  title        = {Modeling and Dynamic Simulation of Electric Power Steering System
                  of Automobile Using Bond Graph Technique},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {744--747},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.151},
  doi          = {10.1109/IITSI.2010.151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangQ10,
  author       = {Jinbiao Wang and
                  Shu Qin},
  title        = {The Research on Two Important Counter-Examples of Four-Color Problem},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {623--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.158},
  doi          = {10.1109/IITSI.2010.158},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangSLY10,
  author       = {Huan Wang and
                  Yikai Shi and
                  Jian{-}kang Lu and
                  Xiaoqing Yuan},
  title        = {Design and Application of New Topology of Transverse Flux Permanent-Magnet
                  Motor with Driving System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {294--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.44},
  doi          = {10.1109/IITSI.2010.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangSLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangWSH10,
  author       = {Kun Wang and
                  Jin{-}dong Wang and
                  Liu{-}qing Shen and
                  Zhen{-}hua Han},
  title        = {An Intelligent Security Defensive Software Scheme and Realization},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {793--796},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.164},
  doi          = {10.1109/IITSI.2010.164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangWSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangY10,
  author       = {Geng{-}Sheng Wang and
                  Yun{-}Xin Yu},
  title        = {An Improved Ant Colony Algorithm for {VRP} Problem},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {129--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.86},
  doi          = {10.1109/IITSI.2010.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangY10a,
  author       = {Eric Ke Wang and
                  Yunming Ye},
  title        = {An Efficient and Secure Key Establishment Scheme for Wireless Sensor
                  Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {511--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.139},
  doi          = {10.1109/IITSI.2010.139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangYXZ10,
  author       = {Hongfa Wang and
                  Feng Yu and
                  Chen Xing and
                  Zhimin Zhou},
  title        = {Genetic Algorithm-Based Evaluation Model of Teaching Quality},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {97--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.59},
  doi          = {10.1109/IITSI.2010.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangYXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WeiCYWX10,
  author       = {Min Wei and
                  HaiNing Chen and
                  TianYun Yan and
                  QinZhang Wu and
                  Bin Xu},
  title        = {The Detecting Methods of Geostationary Orbit Objects},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {645--648},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.31},
  doi          = {10.1109/IITSI.2010.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WeiCYWX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WitaJT10,
  author       = {Ratsameetip Wita and
                  Nattanatch Jiamnapanon and
                  Yunyong Teng{-}Amnuay},
  title        = {An Ontology for Vulnerability Lifecycle},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {553--557},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.141},
  doi          = {10.1109/IITSI.2010.141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WitaJT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Wu10,
  author       = {Qunli Wu},
  title        = {Analysis on the Integration of {ERP} with E-business},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {81--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.16},
  doi          = {10.1109/IITSI.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Wu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WuZC10,
  author       = {Kehe Wu and
                  Tong Zhang and
                  Fei Chen},
  title        = {Research on Active Controllable Defense Model Based on Zero-PDR Model},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {572--575},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.140},
  doi          = {10.1109/IITSI.2010.140},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WuZC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/XiaL10,
  author       = {Chuanliang Xia and
                  Zhendong Liu},
  title        = {Property Preservation of Time Petri Net Reduction},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {154--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.35},
  doi          = {10.1109/IITSI.2010.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/XiaL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/XiaWCC10,
  author       = {Jie Xia and
                  Jian Wu and
                  Yanyan Cao and
                  Zhiming Cui},
  title        = {SOM-Based Classification Method for Moving Object in Traffic Video},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {138--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.54},
  doi          = {10.1109/IITSI.2010.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/XiaWCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/XieX10,
  author       = {Chengrong Xie and
                  Yuhua Xu},
  title        = {Adaptive Hybrid Function Projective Synchronization for Two Different
                  Chaotic System with Uncertain Parameters},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {12--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.120},
  doi          = {10.1109/IITSI.2010.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/XieX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/XiongC10,
  author       = {Yumei Xiong and
                  Yimin Chen},
  title        = {An Improved Task Scheduling Algorithm in Embedded Systems},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {682--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.65},
  doi          = {10.1109/IITSI.2010.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/XiongC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/XuS10,
  author       = {Liang Xu and
                  Yuanyuan Sun},
  title        = {Research on the Knowledge Flow in Supply Chain Based on the Core Enterprise},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {344--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.104},
  doi          = {10.1109/IITSI.2010.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/XuS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/XuWGQ10,
  author       = {Ruzhi Xu and
                  Quansheng Wu and
                  Hongquan Gong and
                  Leqiu Qian},
  title        = {Research on Component Composition with Formal Semantics},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {118--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.101},
  doi          = {10.1109/IITSI.2010.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/XuWGQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/XuZW10,
  author       = {Zhipeng Xu and
                  Qianting Zhou and
                  Jun Wei},
  title        = {Design of Temperature Control System for a Special Shortwave Infrared
                  Spatial Remote Sensor Based on {FPGA}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {475--477},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.143},
  doi          = {10.1109/IITSI.2010.143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/XuZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangC10,
  author       = {Guangying Yang and
                  Yue Chen},
  title        = {The Study of Electrocardiograph Based on Radial Basis Function Neural
                  Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {143--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.85},
  doi          = {10.1109/IITSI.2010.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangGP10,
  author       = {Wei Yang and
                  Chen Guo and
                  Xuan Ge Peng},
  title        = {The Solution of Printing on University Human Management System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {435--437},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.163},
  doi          = {10.1109/IITSI.2010.163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangNH10,
  author       = {Yan Yang and
                  Pengcheng Nie and
                  Yong He},
  title        = {A Method of Honey Plant Classification Based on {IR} Spectrum: Extract
                  Feature Wavelength Using Genetic Algorithm and Classify Using Linear
                  Discriminate Analysis},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {241--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.105},
  doi          = {10.1109/IITSI.2010.105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangNH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangSZ10,
  author       = {Bowei Yang and
                  Guanghua Song and
                  Yao Zheng},
  title        = {The Analysis and Enhancement of Voting Behaviors in {P2P} Networks},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {407--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.37},
  doi          = {10.1109/IITSI.2010.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangT10,
  author       = {Zhiyuan Yang and
                  Qinming Tan},
  title        = {The Application of Random Forest and Morphology Analysis to Fault
                  Diagnosis on the Chain Box of Ships},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {315--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.84},
  doi          = {10.1109/IITSI.2010.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangTZJ10,
  author       = {Fang Yang and
                  Xuedong Tian and
                  Xin Zhang and
                  Xin{-}Biao Jia},
  title        = {An Improved Method for Similar Handwritten Chinese Character Recognition},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {419--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.70},
  doi          = {10.1109/IITSI.2010.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangTZJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangW10,
  author       = {Lin Yang and
                  Hui Ting Wang},
  title        = {Classification Based on Particle Swarm Optimization for Least Square
                  Support Vector Machines Training},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {246--249},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.39},
  doi          = {10.1109/IITSI.2010.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangW10a,
  author       = {Suying Yang and
                  Xin Wang},
  title        = {A Visual Domain Recognition Method Based on Function Mode for Source
                  Code Plagiarism},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {580--584},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.114},
  doi          = {10.1109/IITSI.2010.114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangWLM10,
  author       = {Suying Yang and
                  Meng Wang and
                  Jianying Lin and
                  Kuijun Meng},
  title        = {Optimization Design of Supervising and Controlling on the {SOFC} Integration
                  System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {576--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.126},
  doi          = {10.1109/IITSI.2010.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangWLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangY10,
  author       = {Guangying Yang and
                  Shanxiao Yang},
  title        = {Emotion Recognition of Electromyography Based on Support Vector Machine},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {298--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.122},
  doi          = {10.1109/IITSI.2010.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YangonGH10,
  author       = {Qiufen Yang and
                  Weihua Gui and
                  Huosheng Hu},
  title        = {A Novel Real-Time Face Tracking Algorithm for Detection of Driver
                  Fatigue},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {671--676},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.180},
  doi          = {10.1109/IITSI.2010.180},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YangonGH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YaoDCY10,
  author       = {Xiaoming Yao and
                  Wencai Du and
                  Baodan Chen and
                  Zhongzhi Yuan},
  title        = {An Integrated {P2P} Mobile Learning Model for Timely Farming Guidance},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {84--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.26},
  doi          = {10.1109/IITSI.2010.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YaoDCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YaoDHWF10,
  author       = {Xiaoming Yao and
                  Wencai Du and
                  Mei Huang and
                  Weihua Wu and
                  Jundong Fu},
  title        = {Pattern-Based Blind Spatial Image Watermarking},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {92--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.27},
  doi          = {10.1109/IITSI.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YaoDHWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YaoDWHF10,
  author       = {Xiaoming Yao and
                  Wencai Du and
                  Weihua Wu and
                  Mei Huang and
                  Jundong Fu},
  title        = {A Robust EMD-Like Stegnographic Scheme},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {134--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.28},
  doi          = {10.1109/IITSI.2010.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YaoDWHF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YaoLZH10,
  author       = {Mingyin Yao and
                  Muhua Liu and
                  Jinhui Zhao and
                  Lin Huang},
  title        = {Identification of Nutrition Elements in Orange Leaves by Laser Induced
                  Breakdown Spectroscopy},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {398--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.83},
  doi          = {10.1109/IITSI.2010.83},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YaoLZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YeWLH10,
  author       = {Qing Ye and
                  Xiaoping Wu and
                  Yongqing Liu and
                  Gaofeng Huang},
  title        = {A Hybrid Model of {RST} and {DST} with its Application in Intrusion
                  Detection},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {202--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.87},
  doi          = {10.1109/IITSI.2010.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YeWLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YingA10,
  author       = {Sibin Ying and
                  Jianliang Ai},
  title        = {Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using
                  Artificial Neural Network},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {206--211},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.146},
  doi          = {10.1109/IITSI.2010.146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YingA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YuW10,
  author       = {Xin Yu and
                  Zhiguang Wei},
  title        = {Research on Logistics System Architecture Based on {SOA}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {763--766},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.159},
  doi          = {10.1109/IITSI.2010.159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YuW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YuYHW10,
  author       = {Chunyan Yu and
                  Dongyi Ye and
                  Xiaosheng He and
                  Minghui Wu},
  title        = {Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {604--608},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.89},
  doi          = {10.1109/IITSI.2010.89},
  timestamp    = {Mon, 09 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iitsi/YuYHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YuYW10,
  author       = {Chunyan Yu and
                  Dongyi Ye and
                  Minghui Wu},
  title        = {A New Agent Oriented Model for AutoMotive Computing Platform},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {609--613},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.88},
  doi          = {10.1109/IITSI.2010.88},
  timestamp    = {Mon, 09 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iitsi/YuYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YuanLDC10,
  author       = {Jingbo Yuan and
                  Haixiao Li and
                  Shunli Ding and
                  Limin Cao},
  title        = {Intrusion Detection Model Based on Improved Support Vector Machine},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {465--469},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.72},
  doi          = {10.1109/IITSI.2010.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YuanLDC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/YuanZD10,
  author       = {Jingbo Yuan and
                  Jisen Zheng and
                  Shunli Ding},
  title        = {An Improved Pattern Matching Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {599--603},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.73},
  doi          = {10.1109/IITSI.2010.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/YuanZD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZengLZCJ10,
  author       = {Xiao{-}hui Zeng and
                  Wen{-}lang Luo and
                  Jin{-}tao Zeng and
                  Yan{-}ping Chen and
                  Shi{-}yao Jin},
  title        = {Research on a High Efficient Intrusion Prevention Model},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {720--723},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.132},
  doi          = {10.1109/IITSI.2010.132},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZengLZCJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZengLZL10,
  author       = {Jintao Zeng and
                  Jinzhong Li and
                  Xiaohui Zeng and
                  Wenlang Luo},
  title        = {A Prototype System of Software Reliability Prediction and Estimation},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {558--561},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.90},
  doi          = {10.1109/IITSI.2010.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZengLZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhaiC10,
  author       = {Lili Zhai and
                  Fuguo Chang},
  title        = {Negotiation Problem Processing System of High-Tech Virtual Enterprise},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {498--501},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.103},
  doi          = {10.1109/IITSI.2010.103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhaiC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Zhang10,
  author       = {Wenjun Zhang},
  title        = {Integrated Security Framework for Secure Web Services},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {178--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.8},
  doi          = {10.1109/IITSI.2010.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Zhang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Zhang10a,
  author       = {Bin Zhang},
  title        = {Research on the Directional Interferences Canceling},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {549--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.96},
  doi          = {10.1109/IITSI.2010.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Zhang10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhangC10,
  author       = {Bing Zhang and
                  Li Chen},
  title        = {An Improved Key Management of ZigBee Protocol},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {416--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.129},
  doi          = {10.1109/IITSI.2010.129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhangCX10,
  author       = {Yilian Zhang and
                  Zhide Chen and
                  Li Xu},
  title        = {How to Construct a Divisible Online/Offline Signature},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {562--566},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.177},
  doi          = {10.1109/IITSI.2010.177},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhangCX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhangGY10,
  author       = {Yang Zhang and
                  Liqun Gao and
                  Shufan Ye},
  title        = {A New Method for Tracing by Using Corner Detecting and k-Nearest Neighbor},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {337--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.34},
  doi          = {10.1109/IITSI.2010.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhangGY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhangL10,
  author       = {Yan Zhang and
                  Ying Lin},
  title        = {Research on the Key Technology of Secure Computer Forensics},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {649--652},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.134},
  doi          = {10.1109/IITSI.2010.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhangL10a,
  author       = {Yuchuan Zhang and
                  Yuzhao Liu},
  title        = {A Collaborative Filtering Algorithm Based on Time Period Partition},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {777--780},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.161},
  doi          = {10.1109/IITSI.2010.161},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhangL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhangM10,
  author       = {Meiyu Zhang and
                  Jinghua Mei},
  title        = {The Design and Implementation of Electronic Farm System Based on Google
                  Maps},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {236--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.51},
  doi          = {10.1109/IITSI.2010.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhangM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhangZWD10,
  author       = {Ping Zhang and
                  Yan Zhang and
                  Zhengjiang Wu and
                  Weifeng Du},
  title        = {{IIS} Security Mechanisms},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {619--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.179},
  doi          = {10.1109/IITSI.2010.179},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhangZWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhouM10,
  author       = {Changcheng Zhou and
                  Jie Meng},
  title        = {Modeling and Simulation of Double-tube Hydraulic Damper External Characteristic},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {713--719},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.128},
  doi          = {10.1109/IITSI.2010.128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhouM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhouTZPL10,
  author       = {Xuyan Zhou and
                  Bing Tan and
                  Bing Zhu and
                  Xuange Peng and
                  Xuemou Liu},
  title        = {On the Way to Design an Optical Camera Lens for River Sediment in
                  Underwater Imaging},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {48--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.156},
  doi          = {10.1109/IITSI.2010.156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhouTZPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhouXXW10,
  author       = {Wan Zhou and
                  Zhang Xuehua and
                  Xiong Xin and
                  Jiande Wu},
  title        = {The Application Research of Wireless Sensor Network in the Prison
                  Monitoring System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {58--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.160},
  doi          = {10.1109/IITSI.2010.160},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhouXXW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhouYH10,
  author       = {Dengfeng Zhou and
                  Shuisheng Ye and
                  Shaohua Hu},
  title        = {Research on Application of Region-of-Interest in Face Detection},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {192--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.61},
  doi          = {10.1109/IITSI.2010.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhouYH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhouZ10,
  author       = {Yin Zhou and
                  Wei Zhu},
  title        = {A Multi-mode {P2P} Live Media Broadcasting Middleware},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {585--590},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.178},
  doi          = {10.1109/IITSI.2010.178},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhouZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhouZFCY10,
  author       = {Rong Zhou and
                  Chunyue Zhao and
                  Lili Fu and
                  Ao Chen and
                  Meiqian Ye},
  title        = {ZigBee-based Vehicle Access Control System},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {232--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.50},
  doi          = {10.1109/IITSI.2010.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhouZFCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/Zhu10,
  author       = {Huafei Zhu},
  title        = {Towards a Theory of Cloud Computing in the Protocol-Composition Framework},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {758--762},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.142},
  doi          = {10.1109/IITSI.2010.142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/Zhu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhuHZZ10,
  author       = {Weixing Zhu and
                  Dajun Hou and
                  Jin Zhang and
                  Jian Zhang},
  title        = {Optimization of a Subset of Apple Features Based on Modified Particle
                  Swarm Algorithm},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {427--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.23},
  doi          = {10.1109/IITSI.2010.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhuHZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhuMW10,
  author       = {Weixing Zhu and
                  Yong Ma and
                  Rixia Wang},
  title        = {An Adaptive Fast Algorithm for Coding Block Mode Selection},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {402--406},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.29},
  doi          = {10.1109/IITSI.2010.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhuMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhuZL10,
  author       = {Weixing Zhu and
                  Fangkui Zhong and
                  Xiangping Li},
  title        = {Automated Monitoring System of Pig Behavior Based on {RFID} and {ARM-LINUX}},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {431--434},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.32},
  doi          = {10.1109/IITSI.2010.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhuZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/ZhuZTPL10,
  author       = {Bing Zhu and
                  Xuyan Zhou and
                  Bin Tan and
                  Xuange Peng and
                  Xuemou Liu},
  title        = {A Study of Image-Based Algorithms of River Sediment Measurement},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {195--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.155},
  doi          = {10.1109/IITSI.2010.155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/ZhuZTPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iitsi/2010,
  title        = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5453385/proceeding},
  isbn         = {978-0-7695-4020-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iitsi/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics