


default search action
10th CIS 2014: Kunming, Yunnan, China
- Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7434-4

Intelligent Computation
- Jing Zhang, Huanqin Li:

A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization Algorithm. 1-6 - Hai Zhu, Xiaoli Wang, Hongfeng Wang:

A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic Algorithm. 7-11 - Ya Wang, Ding-Cheng Ji:

A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents. 12-16 - Liu Jie:

Adaptive Central Force Optimization with Variable Population Size. 17-20 - Mingzhao Wang, Xiaoli Wang, Yuping Wang, Zhen Wei:

An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity Measure. 21-24 - Jie Liu, Yanfeng He, Aiping Zhang:

An Improved MULTI-ACS Algorithm for the Waste Collection Vehicle Arc Routing Problem with Turn Constraints. 25-29 - Deqing Li, Wenyi Zeng, Junhong Li, Ping Guo

:
Balance Function Analysis in Variable Weight Decision Making. 30-34 - Jiqiang Feng, Chen Xu, Weiqiang Zhang:

Convergence Analysis of Swarm Intelligence Based on Fuzzy Random Variables. 35-38 - Bin Gui, Xianghe Wei, Qiong Shen, Jingshan Qi, Liqiang Guo:

Financial Time Series Forecasting Using Support Vector Machine. 39-43 - Zhengyang Guo, Le Zhang:

Improved Adaptive Median Filter. 44-46 - Ben Niu, Jing Liu

, Ying Bi
, Ting Xie, Lijing Tan:
Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism. 47-51 - Haixia Long, Shulei Wu, Haiyan Fu

:
Improving Metabolic Flux Estimation of Metabolic Networks by QPSO with Penalty Function. 52-57 - Zhenhua Li, Hai-Lin Liu:

Integrating Preferred Weights with Decomposition Based Multi-objective Evolutionary Algorithm. 58-63 - Yajie Pi, Xueyan Song, Jizhou Sun:

Mathematical Models, GRASP Algorithms and Fitness Landscape Analysis for Aircraft Gate Assignment Problem. 64-68 - Yunlong Wu, Guohua Liu, Yuanyuan Liu:

Multi-user Preferences Based Top-k Query Processing Algorithm. 69-73 - Haixia Long, Shulei Wu, Haiyan Fu

:
Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization Algorithm. 74-79
Learning Algorithms
- Ruilin Xu

:
A Feedback-Based Self-Organizing Query Structure Optimization Algorithm. 80-84 - Yingjuan Xie, Xinnan Fan, Junfeng Chen:

Affinity Propagation-Based Probability Neural Network Structure Optimization. 85-89 - Xin Liu, Yiu-ming Cheung

:
An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for Lipreading. 90-93 - Huasheng Tan, Mingang Hua:

Asymptotical Stability Criteria for Time-Delay Static Neural Networks Subject to Stochastic Perturbations. 94-98 - Junfeng Chen, Yingjuan Xie, Jianjun Ni:

Brain Storm Optimization Model Based on Uncertainty Information. 99-103 - Zhenwei Meng, Junlong Qiao, Lijun Zhang:

Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural Network. 104-108 - Qiwen Yang, Shanshan Fu, Yuncan Xue, Shanna Ruan, Junfeng Chen:

Individual Intelligence Based Optimization and Its Application to ITAE Standard Forms. 109-113 - Bin Ju, Mincao Ye, Yuntao Qian, Rong Ni, Chenxi Zhu:

Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix Factorization. 114-118 - Guang-Hao Zhang, Yao Lu, Mukai Chen:

Multi-scale Monte Carlo-Based Tracking Method for Abrupt Motion. 119-123 - Wenzhang He, Hongjian Xu, Zhengyang Guo, Jie Liang, Lina Wang:

The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative. 124-128 - Zhifeng Lin, Jiechang Wen, Qiling Chen:

Wireless Location on CPN Correction Environmental Factors. 129-133
Intelligent Systems and Complex Systems
- Xiaoli Wang, Yuping Wang, Kun Meng:

A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling. 134-138 - Juntao Chen, Shulei Wu, Lan Lin, Jinmei Zhan:

Analysis of Energy Saving and Performance Characteristics of Library Computer Room Intelligent High Heat Transfer and Exchanger. 139-142 - Zhihua Jiang, Zhongwei Si, Chi Luo:

Design & Implementation to an RFID Based Conference Management System. 143-147 - Dan Wang, Mingtao Pei, Lan Zhu:

Detecting Driver Use of Mobile Phone Based on In-Car Camera. 148-151 - Hong Zhang, Hai Zhu:

Failure-Aware Resource Scheduling Policy for Hybrid Cloud. 152-156 - Jun Hu, Chun Guan:

Granular Computing Model Based on Quantum Computing Theory. 157-160 - Xirong Xu, Chun Yin, Sijia Zhang, Yazhen Huang:

Improved Feedback Vertex Sets in Kautz Digraphs K (d, n). 161-165 - Guoqiang Hang, Yang Yang, Danyan Zhang, Xiaohua Li:

Neuron-MOS-based Dynamic Circuits for Multiple-Valued Logic. 166-170
Pattern Recognition and Knowledge Discovery
- Lin Zhu, Ying Wang, Bo Zhao, Xiaozheng Zhang:

A Fast Image Stitching Algorithm Based on Improved SURF. 171-175 - Qirun Huo, Yao Lu:

A Novel Tracking Method Based on Ensemble Metric Learning. 176-179 - Bu Chen, Qian Yin, Ping Guo

:
A Study of Deep Belief Network Based Chinese Speech Emotion Recognition. 180-184 - Yan Liang, Wanxuan Lu, Wei Liang, Yucheng Wang:

Action Recognition Using Local Joints Structure and Histograms of 3D Joints. 185-188 - Jie Niu, Xiongzhu Bu, Zhong Li, Yao Wang:

An Improved Bilinear Deep Belief Network Algorithm for Image Classification. 189-192 - Shulei Wu, Huandong Chen, Xiangxiang Xu, Haixia Long, Wenjuan Jiang, Dong Xu:

An Improved Median Filter Algorithm Based on VC in Image Denoising. 193-196 - Zhan Peng, Yuping Wang, Jinfeng Xue:

An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern Sets. 197-200 - Shulei Wu, Huandong Chen, Zhizhong Zhao, Haixia Long, Chunhui Song:

An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color Feature. 201-204 - Haijiao Xu

, Peng Pan, Yansheng Lu, Chunyan Xu, Deng Chen
:
Bimodal Learning for Multi-concept Image Query. 205-209 - Wenjuan Jiang, Dong Xu, Shulei Wu, Bin Meng:

Design of a Flash Digital Watermarking Application Using MATLAB GUI. 210-212 - Qiguang Miao

, Xing Tang, Yi-Ning Quan, Kai Deng:
Detecting Circles on Ego Network Based on Structure. 213-217 - Xianxiang Yang, Heyan Huang, Xin Xin, Quanchao Liu, Xiaochi Wei:

Domain-Specific Product Named Entity Recognition from Chinese Microblog. 218-222 - Junyang Zhao, Zhili Zhang, Chongzhao Han, Lijiang Sun:

Experiments with Feature-Prior Hybrid Ensemble Method for Classification. 223-227 - Tao Li, Weiwei Wang, Long Xu, Xiangchu Feng:

Image Denoising Using Low-Rank Dictionary and Sparse Representation. 228-232 - Xin Zheng, Chenlei Lv, Qingqing Xu, Ping Guo

:
Image Up-Scaling: Based on Self Similarity and Local Information. 233-237 - Feng Lv, Huijun Di, Yao Lu:

Joint Sequential Shape Classification and Piecewise Elastic Motion Estimation. 238-241 - Xiao-Ma Xu, Ming-Tao Pei:

Multiview Face Retrieval in Surveillance Video by Active Training Sample Collection. 242-246 - Xiujun Zhang

, Chen Xu, Min Li:
Nonlocal Diffusion Tensor for Visual Saliency Detection. 247-251 - Wencai Zou, Yao Lu, Mukai Chen, Feng Lv:

Rapid Face Detection in Static Video Using Background Subtraction. 252-255 - Qingxuan Shi

, Yao Lu, Tianfei Zhou:
Spatio-Temporal Context for More Accurate Dense Point Trajectories Estimation. 256-259 - Qian Wang, Qingxuan Shi, Xuedong Tian:

Tracking Non-rigid Object Using Discriminative Features. 260-263 - Yanmei Dong

, Mingtao Pei, Xiameng Qin:
Vehicle Color Recognition Based on License Plate Color. 264-267
Data Mining
- Yun Xue, Zhengling Liao, Meihang Li, Jie Luo, Xiaohui Hu, Guiyin Luo, Wen-Sheng Chen:

A New Biclustering Algorithm for Time-Series Gene Expression Data Analysis. 268-272 - Fei Chen, Lin Jiang:

A Parallel Algorithm for Datacleansing in Incomplete Information Systems Using MapReduce. 273-277 - Zhenghai Ai

, Zhongwei Si:
Application of Investment Plan Selection Based on Variable Weight Synthesis and Mahalanobis Distance. 278-282 - Junfeng Li, Xueqiang Lv, Kehui Liu:

Extracting Hyponymy of Ontology Concepts from Patent Documents. 283-287 - Weibo Li, Chunhong Zhang, Xiaofeng Qiu, Yang Ji:

Identifying Relevant Messages for Social TV. 288-292 - Yuexia Xu, Wei Su

, Ming Cheng, Zhiyi Qu, Hui Li:
N-gram Index Structure Study for Semantic Based Mathematical Formula. 293-298 - Dingjia Liu, Guohua Liu, Yuanyuan Liu:

On Modeling and Querying of Text Corpora. 299-303 - Kai Lin, Rong Ni, Yanhua Shao, Sijing Wu, Xiao-Jiao Ma:

Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, China. 304-307 - Luoyong Niu, Jiaming Hong, Hongbo Huo, Bishi He, Zhe Xu:

The Automatic Classification Research to Medical Imaging Disease Based on Naïve Nayesion Algorithm. 308-311
Optimization Theory and New Methods
- Lei Fan, Xiyang Liu, Liping Jia:

A Minimum-Elimination-Escape Function Method for Multimodal Optimization Problems. 312-316 - Wen Li, Hecheng Li:

An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained Multi-objective Optimization Problems. 317-320 - Liping Jia, Guocheng Zou, Lei Fan:

Combining TOPSIS and Particle Swarm Optimization for a Class of Nonlinear Bilevel Programming Problems. 321-325 - Xuejun Huang, Xiaobin Qu:

Dependence System and its Structure. 326-329 - Hai Sun:

On the Field Patterns in Elliptic-Shaped Microshield Lines Loaded with Left-Handed Materials by the Edge-Based Finite Element Method. 330-333 - Xin Li

, Zhaotong Lian:
Optimal Pricing with Yield Management in M/M/c. 334-337 - Xin Yang, Linna Wang, Hongbo Zai, Yanrong Ren:

Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular Automata. 338-342 - Zhongwei Si, Lina Liang, Zhenghai Ai

, Zhihua Jiang:
The Hilbert Boundary Value Problem for Beltrami Equation in Clifford Analysis. 343-347 - Xiangyou Li, Qingxiang Zhang:

The Sufficiency of Solution for Multi-objective Semi-infinite Programming. 348-351 - Min Li, Xiaoli Sun, Chen Xu:

Variational Image Decomposition in Shearlet Smoothness Spaces. 352-355
Access Control and Protection
- Lequan Min, Xu Lan, Longjie Hao, Xiuping Yang:

A 6 Dimensional Chaotic Generalized Synchronization System and Design of Pseudorandom Number Generator with Application in Image Encryption. 356-362 - Weijun Shan, Lihui Wang, Qing Li, Limin Guo, Shanshan Liu, Zhimin Zhang:

A Chosen-Plaintext Method of CPA on SM4 Block Cipher. 363-366 - Rui-xia Liu, Yinglong Wang:

A New Sybil Attack Detection for Wireless Body Sensor Network. 367-370 - Lu Chen, Qing Zhou, Gaofeng Huang

, Liqiang Zhang:
A Trust-Role Based Context Aware Access Control Model. 371-376 - Guozhen Shi, Mang Su, Fenghua Li, Jiapeng Lou, Qiong Huang:

A User-Based Document Management Mechanism in Cloud. 377-381 - Jia-Zhi Li, Lei Zhang:

Attribute-Based Keyword Search and Data Access Control in Cloud. 382-386 - Hao Liang, Liji Wu, Xiangmin Zhang, Jiabin Wang:

Design of a Masked S-Box for SM4 Based on Composite Field. 387-391 - Kai Luo, Shouzhong Tu, Chunhe Xia, Dan Zhou:

Detecting Compromised VM via Application-Aware Anomaly Detection. 392-396 - Qiao Yan, Nan Lu, Tu-Wen Ning, Xi-Yan Yao, Bao-Guang Li:

IP Traceback Algorithm Based on Deterministic Linear Network Coding. 397-401 - Lihua Dong, Yong Zeng, Ligang Ji, Xucang Han:

Study on the Pass Rate of NIST SP800-22 Statistical Test Suite. 402-404 - Wei Liu, Liji Wu, Xiangmin Zhang, An Wang:

Wavelet-Based Noise Reduction in Power Analysis Attack. 405-409
Cryptography and Cryptanalysis
- Zeleng Zhuang, Jiachao Chen, Haosheng Zhang:

A Countermeasure for DES with Both Rotating Masks and Secured S-Boxes. 410-414 - Lili Wei, Zhaotong Luo, Qiang Qu, Qing He, Jingwei Xu:

A Low-Cost PKC-based RFID Authentication Protocol and its Implementation. 415-419 - Wei Lin, Jinlong Fei, Yuefei Zhu, Xiaolong Shi:

A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering. 420-424 - Dan Ding, Guizhen Zhu:

A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice Vectors. 425-429 - Liang Dai, Huiyun Li, Guoqing Xu, Liying Xiong:

A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs. 430-434 - Xiaowei Han, Beibei Wang, An Wang, Liji Wu, Woogeun Rhee

:
Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2. 435-439 - Changji Wang:

An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings. 440-444 - Yi Tang, Shenghui Su:

Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem. 445-449 - Jian Zhao, Hai-Ying Gao:

Attribute-Based Encryption for Restricted Circuits from Lattices. 450-454 - Hao Wang, Zhihua Zheng, Lei Wu:

Hierarchial Identity-Based Encryption Scheme from Multilinear Maps. 455-458 - Chang-Ji Wang, Hai-Tao Lin, Xi-Lei Xu, Kangjia Zheng, Xiaonan Xia:

Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme. 459-463 - Huawang Qin, Xiaohua Zhu, Yuewei Dai:

Provably Secure Identity-Based Threshold Decryption on Access Structure. 464-468 - Guodong Sun, Shenghui Su, Maozhi Xu:

Quantum Algorithm for Polynomial Root Finding Problem. 469-473 - Yanfei Liu, Sha Feng:

Scalable Lightweight Authentication Protocol with Privacy Preservation. 474-478
Data Security and Integrity
- Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang:

A Multiple-Level DCT Based Robust DWT-SVD Watermark Method. 479-483 - Guozhen Shi, Ying Shen, Fenghua Li, Mang Su:

A Reliable Supervision Model and Implementation for the Trading of Digital Works. 484-488 - Mingguang Zou, Zhitang Li:

A Wav-Audio Steganography Algorithm Based on Amplitude Modifying. 489-493 - Wenjing Hu, Liji Wu, An Wang, Xinjun Xie, Zhihui Zhu, Shun Luo:

Adaptive Chosen-Plaintext Correlation Power Analysis. 494-498 - Rui Chang, Liehui Jiang, Hui Shu, Hongqi He:

Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition. 499-504 - Yu Zhou, Guohua Liu, Biying Wang:

Diversifying Results of Top-k Querys over Bounded Regions. 505-509 - Liping Chen:

Ensuring Reliability and QoS Optimizing for Web Service Composition. 510-513 - Ye Hu, Liji Wu, An Wang, Beibei Wang:

Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC Card. 514-518 - Tong Zhang, Shuna Zhao, Xue Li:

Method of Non-reference Image Quality Assessment of SSIM Based on Regional Weighted Entropy. 519-523 - Xin Xie, Fenlin Liu, Bin Lu, Fei Xiang:

Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates. 524-528 - Sulin Pang, Yuanxiong Chen:

Stock Index Futures Basis and Liquidity of Correlation Analysis and Application Based on t-GARCH-Copula Model. 529-533 - Xiaomei Wan, Guohua Liu:

Verification of Artifact Lifecycle Model. 534-538 - Peng Wei, Tongge Xu, Xi Qin, Chao Wang:

Visualization of Police Intelligence Data Based on Word Clouds. 539-543
Information System Safety
- Wei Han, Jianchun Xie:

A Developing Method for Parallel Program Based on System Generator. 544-547 - Guo Xie

, Dan Zhang, Xinhong Hei, Fucai Qian:
A Feasible Control Strategy for LQG Control Problem with Parameter and Structure Uncertainties. 548-552 - Tingyu Jiang, Yahui Li, Yuan Dong:

A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing Technology. 553-557 - Mingyue Feng, Hua Pan:

A Modified PSO Algorithm Based on Cache Replacement Algorithm. 558-562 - Ya-Ling Zhang, Kai Liu, Shang-Ping Wang

, Qin-Dong Sun:
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption. 563-567 - Bin Wang, Ying Liu, Xinhong Hei, Lei Wang, Zhiqiang Zhang:

A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm. 568-572 - Zhoukai Wang, Yikun Zhang, Xinhong Hei, Linjing Sun, Rui Zhou, Ming Zhao:

A Rendering Algorithm for Function Call Diagram in Software Reliability Assurance. 573-577 - Wenjuan Liu, Xinhong Hei, Shinji Fukuma, Shin-ichiro Mori:

A Simple and Real-Time Parallel Compression of Time Series Scientific Simulation Data for Interactive and Cooperative Supercomputing. 578-582 - Peng Guo, Yahui Li, Peng Li, Shuai Liu, Dongya Sun:

A UML Model to Simulink Model Transformation Method in the Design of Embedded Software. 583-587 - Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang:

An Improved Method of Access Control Based on BLP Model in MILS. 588-592 - Hongning Li, Xianjun Liu, Leilei Xu:

Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm in Cognitive Radio Networks. 593-597 - Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang:

Information Flow Control Model and Method in Distribute MILS. 598-602 - Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen:

Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. 603-607
Network and Wireless Security
- Yumeng Wang, Yuping Wang, Xingsi Xue, Chen Zhang, Yuanliang Huo:

A New Packet Filter Schema Based on Multi-level Signature Hash and DFA Grouping. 608-614 - Zhongyuan Qin, Yuying Wang, Hengkang Wang, Jie Huang:

A Novel Key Pre-distribution Scheme in Wireless Sensor Networks. 615-619 - Ye Wang, Shaotsung Chang, Gongbing Shan

, Hua Li:
A Wireless Sensor System for the Training of Hammer Throwers. 620-623 - Wei Wu, Nan Cheng, Yubin Wang:

Application Research on Retrospective Analysis System in Network Intrusion Detection. 624-627 - Yubin Wang, Chao Li, Nan Cheng:

Internet Security Protection in Personal Sensitive Information. 628-632 - Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo

:
Multi-sender Broadcast Authentication in Wireless Sensor Networks. 633-637 - Majeed Alajeely, Asma'a Ahmad, Robin Doss

, Vicky H. Mak-Hau:
Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets. 638-642 - Guojun Zhang:

Selection of QoS Support on Artificial Immune Network Classifier for Dynamic Web Service Composition. 643-646
Security Methodologies and Management
- Yue Dai, Shenghui Su:

A Diploma Anti-forgery System Based on Lightweight Digital Signatures. 647-651 - Yuying Wang, Zhongyuan Qin, Qunfang Zhang, Hengkang Wang, Jie Huang:

A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks. 652-656 - Shuhui Zhang, Lianhai Wang, Xiaohui Han:

A KVM Virtual Machine Memory Forensics Method Based on VMCS. 657-661 - Zhongyuan Qin, Kerong Feng, Shuaiqi Hu, Lei Tao, Zunli Hu, Xinshuai Zhang, Jie Huang:

A Novel Identity-Based Security Scheme for Wireless Sensor Networks. 662-666 - Fei Song, Liji Wu, An Wang, Xinyu Zhao:

A Novel Subspace Template Attack Based on Symmetric Cross Entropy Criterion. 667-670 - Zhenbin Zhang, Liji Wu, Zhaoli Mu, Xiangmin Zhang:

A Novel Template Attack on wNAF Algorithm of ECC. 671-675 - Zhong Zeng, Dawu Gu, Junrong Liu, Zheng Guo:

An Improved Side-Channel Attack Based on Support Vector Machine. 676-680 - Nan Cheng, Wei Wu, Yubin Wang:

Brief Talk about the Existing Problems in Safety Management in Classification Testing and Evaluation. 681-684 - Jie Li, Gang Lei, Yong Xian, Xiaoli Wang:

Research on Ground Effect of Shipborne Flying-Wing UAV. 685-688 - Mouna Jouini, Latifa Ben Arfa Rabai

:
Surveying and Analyzing Security Problems in Cloud Computing Environments. 689-693 - Jinxin Ma, Guowei Dong, Puhan Zhang, Tao Guo:

SymWalker: Symbolic Execution in Routines of Binary Code. 694-698
System Analysis and Modeling
- Liying Lu, Yingzi Fu, Peixiao Chu, Xiaolin Zhang:

A Bayesian Analysis of Zero-Inflated Count Data: An Application to Youth Fitness Survey. 699-703 - Lianjun Zhang, Yao Lu, Mukai Chen, Wencai Zou:

A Codebook Based Background Subtraction Method for Image Defects Detection. 704-706 - Siyuan Jing, Jin Yang, Kun She:

A Parallel Method for Rough Entropy Computation Using MapReduce. 707-710 - Cong-Yi Zhu, Yu-Mei Huang

:
A Preconditioned GMRES Method for Elliptic PDE-constrained Optimization Problems. 711-713 - Ben-Bo Zha, Ru-Liang Wang, Huan-Long Sun, Lei Wang:

A Study of the Design and Parameters Optimization of BP Neural Network Using Improved GEP. 714-719 - Weijun Yang, Yan Yang, Xiaodong Wang, Liang Yang:

An Efficient Approximation Scheme for the Multiple QoS Constraints Routing. 720-723 - Qian Xu, Chuanguo Li:

An Empirical Study on Determinants of Capital Structure in Chinese Listed Companies. 724-728 - Peng Sun, Ziyan Wu

, Yunpeng Zhang, Yang Yang:
Analysis and Modeling of Learning Behaviors on Intelligent Tutoring Website. 729-731 - Jianchen Zhu, Zengli Liu:

Analysis of Hybrid Feature Research Based on Extraction LPCC and MFCC. 732-735 - Zhibin Chen, Man Wang, You-Wei Wen

, Zhining Zhu:
Choice of Regularization Parameter in Constrained Total Variational Image Restoration Model. 736-740 - Hong Zhang:

Cooperative Advertising Analysis within a Supply Chain Based on Game Theory. 741-745 - Weijun Yang, Yan Yang, Yuanfeng Chen:

Design of Detection and Control System for Diesel Injector. 746-749 - Jianhui Yang, Chuanyang Ruan:

Hesitant Fuzzy Information Aggregation Operators under Confidence Levels. 750-754 - Ming Cheng, Wei Su

, Yuexia Xu, Zhiyi Qu, Xuan Wang:
Linear Input Method of Mathematical Formula. 755-760 - Yu-Feng Zhuang, Da-Song Li:

Online Group Purchase Research Based on Commodities Trading. 761-764 - Jing Nie:

Practice and Development of Cloud Computing-Based Mobile Teaching Management and Evaluation System in Vocational Colleges. 765-769 - Mukai Chen, Yao Lu, Guang-Hao Zhang, Wencai Zou:

Real-Time Simulation in Dynamic Electromagnetic Scenes Using PipelineThread Pool. 770-774 - Jianhui Yang, Jie Wu:

Research and Application of a Stochastic Volatility Model with T-distribution Leveraged. 775-779 - Yukun Jian, Lin Dai:

Statistical Inference of DEA Model of Environmental Efficiency Considering Undesirable Outputs. 780-784 - Dongyi He, Fang Luo:

Study on Effect Evaluation of Enterprise Staff Training Based on Grey Correlation Analysis Method. 785-788 - Hongxia Liu, Tianxiang Feng:

Triangular Factorization of Strongly Row (Column) Full Rank Linear Equations. 789-793 - Na Dong, Zhengfeng Ming, Tao Wen:

Two-Phase SVPWM Modulation Method and Its Application in Stepper Motor. 794-797 - Tianxiang Feng:

Ways to Train the Statistical Capacity of Grassroots Statisticians. 798-802

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














