


default search action
7th APSCC 2012: Guilin, China
- 2012 IEEE Asia-Pacific Services Computing Conference, APSCC 2012, Guilin, China, December 6-8, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4825-6

- Huafeng Kong, YunTing Lei, Zhang Zhang, Deqing Zou:

A Cloud Computing Management System Platform Based on Power-Sensitive Resource. 3-7 - Linchen Yu, Xiaofei Liao:

A Peer-to-Peer Massive Battle Observing System to Support Game Live. 8-13 - Jian Cao, Jie Wang, Liang Hu, Rujie Lai:

A Service Intermediary Agent Framework for Web Service Integration. 14-21 - Xia Xie, Jie Cao

, Hai Jin, Xijiang Ke, Wenzhi Cao:
JRBridge: A Framework of Large-Scale Statistical Computing for R. 27-34 - Li Qi, Jie Dai:

Orchestrating Provisioning among Heterogeneous Grid Middleware. 35-42 - Feng Xie, Tianbo Lu

, Bing Xu, Dongqing Chen, Yong Peng:
Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management. 43-49 - Yisheng Wang, Haopeng Chen:

Dynamic Resource Arrangement in Cloud Federation. 50-57 - Huiqun Zhao, Jing Sun, Xiaodong Liu:

A Model Checking Based Approach to Automatic Test Suite Generation for Testing Web Services and BPEL. 61-69 - Wenbo Xu, Jian Cao, Haiyan Zhao, Lei Wang:

A Multi-agent Learning Model for Service Composition. 70-75 - Yulong Liu, Lei Wu, Shijun Liu:

A Novel QoS-Aware Service Composition Approach Based on Path Decomposition. 76-82 - Naiqiao Du, Xiaojun Ye, Jianmin Wang

:
Approaches on Getting Workflow Task Execution Number of Times. 83-90 - Kahina Bessai, Selmin Nurcan, Claude Godart, Samir Youcef:

Business Process Compositions Preserving k-Soundness Property. 91-97 - Li Wang, Liangjie Zhang

, Wei Wang, Weiwei Xiao, Susheng Wang:
Research on the Effect of Business Models on Enterprise Performance: Based on Information Technology Industry Listed Companies in China. 98-105 - Junhua Ding, Jidong Ge:

An Approach for Modeling and Analyzing Code Mobility. 109-116 - Ping Gong, Jianmin Jiang, Shi Zhang, Zhi Qin Chen:

Executability Analysis for Semantically Annotated Process Model. 117-124 - Yaqin Luo, Li Qi:

Failure-Aware Virtual Machine Configuration for Cloud Computing. 125-132 - Binbin Zhang, Xiaolin Wang, Yingwei Luo, Xiaoming Li, Zhenlin Wang:

Live Migrating the Virtual Machine Directly Accessing a Physical NIC. 133-137 - Pingpeng Yuan, Wenya Zhang, Hai Jin, Buwen Wu:

Statement Hypergraph as Partitioning Model for RDF Data Processing. 138-145 - Ke Ning, Ning Li, Liang-Jie Zhang

:
Using Graph Analysis Approach to Support Question & Answer on Enterprise Social Network. 146-153 - Wenbin Jiang

, Shuguang Wang, Hai Jin, Yong Huang:
A Novel Task Management System for Modelica-Based Multi-discipline Virtual Experiment Platform. 157-164 - Qiang Lin, Daqing Zhang, Hongbo Ni, Xingshe Zhou, Zhiwen Yu:

An Integrated Service Platform for Pervasive Elderly Care. 165-172 - Yang Yuan, Kejian Miao, Daqing Zhang, Lin Sun, Chao Chen:

An OSGi-Based Smart Taxi Service Platform. 173-178 - Sejin Chun, Jooik Jung, Hyun-Bae Jeon, Beom-Jun Kim, Kyong-Ho Lee

:
Context-Aware Mashup for Smart Mobile Devices. 179-186 - Yi Zhong, Shan Gao, Yan He:

Empirical Study of Communication Connectivity Quality for Mobile Robots. 187-191 - Yan Wang, Liang-Jie Zhang

, Hui Cai, Jian Sun, Ning Li:
Evaluating the Quality of Distance Education Services by Using Modern Information Technology. 192-199 - Nabil Hameurlain:

Controllability Preservation and Behavioural Refinement for Service Protocols. 203-210 - Kotomi Ishida, Jungpil Shin:

Educational Effect of Kanji Learning System. 211-216 - Wuhui Chen, Incheon Paik, Patrick C. K. Hung:

Linked Social Service: Connecting Isolated Services into a Global Social Service Network. 217-224 - Wei Song, Gongxuan Zhang, Yang Zou, Qiliang Yang, Xiaoxing Ma

:
Towards Dynamic Evolution of Service Choreographies. 225-232 - Ou Ruan, Jing Zhou, Minghui Zheng, Guohua Cui:

Efficient Fair Secure Two-Party Computation. 243-248 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:

Model Based Byzantine Fault Detection Technique for Cloud Computing. 249-256 - Jinxiao Zhu, Xiaohong Jiang, Yuezhi Zhou, Yaoxue Zhang, Osamu Takahashi, Norio Shiratori:

Outage Performance for Secure Communication over Correlated Fading Channels with Partial CSI. 257-262 - Ayad Ibrahim, Hai Jin, Ali A. Yassin

, Deqing Zou:
Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data. 263-270 - Zhiyong Yu

, Daqing Zhang, Dingqi Yang, Guolong Chen
:
Selecting the Best Solvers: Toward Community Based Crowdsourcing for Disaster Management. 271-277 - Nicolas Liampotis

, Nikos Kalatzis
, Ioanna Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, Eystathios D. Sykas, Miltiades E. Anagnostou
, Stavros Xynogalas:
Addressing the Context-Awareness Requirements in Personal Smart Spaces. 281-285 - Guiyue Jin, Jiyu Jin, Xueheng Tao, Baoying Li:

A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 Standard. 286-290 - Lin Ma, Qing Liao:

A Middleware for Cross-Platform and Context-Aware of Mobile Terminals. 291-294 - Li Jiang, Jin Cao, Peifeng Li, Qiaoming Zhu:

A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application. 295-300 - Ling Wang, Meiling Sui, Qin Li, Haijun Xiao:

A New Method of Sample Reduction for Support Vector Classification. 301-304 - Shaojun Qin, Hongming Cai, Lihong Jiang:

A Product Lifecycle Data Management Framework Based on Resource Meta-model. 305-308 - Ming He, Lin Chen, Hong Wang, Zhenghu Gong, Fan Dai, Zhihong Liu:

Adapkeys: An Adaptive Security Scheme for Network Coding. 309-314 - Min Luo, Liu Song, Shi-dong Li:

An Improved Face Recognition Based on ICA and WT. 315-318 - Fa-Gui Liu, Fen Xiao, Yue-Dong Lin, Yang Zhang:

An Intuitionistic Fuzzy Set Model for Concept Similarity Using Ontological Relations. 319-324 - Cui Xian-Peng, Lin Bi-Ying, Mo Rui-Fang:

An ITIL v3-Based Solution to SOA Governance. 325-328 - Balwinder Sodhi, T. V. Prabhakar:

Cloud Platforms: Impact on Guest Application Quality Attributes. 329-334 - Chaiwat Sathawornwichit, Shigeru Hosono:

Consistency Reflection for Automatic Update of Testing Environment. 335-340 - Xiaolin Chang, Bin Xing, Jogesh K. Muppala

:
E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure. 341-344 - Ning Li, Ke Ning, Liangjie Zhang

, Yan Wang:
Experts Ranking on the Enterprise Microblogging Based on the PageRank Algorithm. 345-349 - Jing Zhao, Ruisheng Zhang

, Zhili Zhao, Dianwei Chen, Lujie Hou:
Hadoop MapReduce Framework to Implement Molecular Docking of Large-Scale Virtual Screening. 350-353 - Pengfei You, Yuxing Peng, Hang Gao:

Providing Information Services for Wireless Sensor Networks through Cloud Computing. 362-364 - Xiaopan Gao, Ruisheng Zhang

, Yan Zhang, Shui Jing:
Research Focus on MES Oriented Communication among Enterprise Informatization System. 365-368 - Ning Li, Liangjie Zhang

, YueJun Chen, ShengPing Wu:
Research of Strategic Transformation Model of the Fast Moving Consumer Goods Industry. 369-373 - Hui Liu, Fenglin Bu, Hongming Cai:

SLA-Based Service Composition Model with Semantic Support. 374-379 - Dewei Peng, Liang Cheng, Hongmei Zhou, Xia Zhang:

Study and Application of Business Process Optimization and Evaluation. 380-383 - Cunchen Li, Jun Yang, Jing Han, Haihong E:

The Distributed Storage System Based on MPP for Mass Data. 384-387 - Song Zhou, Yong Li:

Using Fuzzy Measures to Assess Service Satisfaction Values of Retailers. 388-392 - Yingsong Hu, Dan Li, Jun Xiao, Liang Guo:

A Fast Accurate Interpretive Simulator Based on Shared Basic Block Cache Technique. 395-398 - Shi Li, Dan Li:

A Progressive Method on Studying and Practicing of Computer Graphics. 399-402 - Yunfeng He, Yizhu Zhao:

Reform and Exploration of the Computer Graphics. 403-405 - Yizhu Zhao, Yunfeng He:

Some Key Issues of Teaching Reform about Digital Logic. 406-409 - Lingfang Huang:

The Firewall Technology Study of Network Perimeter Security. 410-413

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














