


default search action
CIS 2016: Wuxi, China
- 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4840-3

Regular Papers
Intelligent Computation
- Zhendong Liu, Shimin Zhao, Hongchao Ye, Jiwei Wang, Dehui Kong, Hui Wang:

The PTAS of Prediction for RNA Pseudoknotted Structure. 1-4 - Wenjing Li, Jie Zhou, Zhongming Lin, Xiang-bo Zhang:

Hadoop-Based Dynamic Load Balance Scheduling Algorithm of Logistics Inventory. 5-8 - Xiaoli Wang, Yuping Wang, Junfan Lai:

Divisible-Load Scheduling for Network-Based Computing Systems with Processor Startup Overheads and Release Times. 9-13 - Jing Lv, Yingzi Fu:

Bayesian Quantile Regression and Variable Selection for Count Data with an Application to Youth Fitness Survey. 14-18 - Tianqi Luo, Xin Huang:

Exact Solutions of the Higher Order Nonlinear Schrödinger Equation. 19-22 - MingWei Yang, Yahui Li, Yadi Zhang, WanRen Wang:

H-DAT: An Improved Buffer Scheduling Algorithm for Multi-Channel SSD. 23-27
Intelligent Algorithms
- Mengnan Tian, Xingbao Gao, Xueqing Yan:

An Improved Differential Evolution with a Novel Restart Mechanism. 28-32 - Cai Dai, Xiujuan Lei:

A New Evolutionary Algorithm Based on Decomposition for Multi-Objective Optimization Problems. 33-38 - Ning Dong:

Properly Pareto Optimality Based Multiobjective Evolutionary Algorithm for Constrained Optimization. 39-43 - Hai Jing Zhu, Bo Qiu, Bo Chong Han, Yuanyuan Liu, Xiaodong Fan:

A Novel Spectrum Profile Fitting Method of Non-Gaussian Model. 44-47 - Xiangyou Li:

Mixed Duality of Multi-Objective Programming Involving a Kind of Generalized Convexity. 48-51 - Liping Jia, Zhonghua Li:

An Ameliorated Teaching-Learning Based Optimization Algorithm for Nonlinear Bilevel Programming. 52-56 - Qizhen Zhou, Jianchun Xing, Juelong Li, Qiliang Yang:

A Device-Free Number Gesture Recognition Approach Based on Deep Learning. 57-63
Intelligent Systems and Complex Systems
- Rong Huang, Xinhong Hei, Xiao Fan Wang, Jing Zhao:

The Assessment Study of Airport Staff Work Performance Based on Fuzzy Comprehensive Evaluation. 64-68 - Vahid Behravan, Gurjeet Singh, Patrick Yin Chiang:

A Framework for Compressive-Sensing of 3D Point Clouds. 69-72 - Wenjing Li, Zhongming Lin, Xiang-bo Zhang, Jie Zhou:

Research on Distributed Logistics Inventory Model Based on Cloud Computing. 73-77 - Aihong Ren, Xingsi Xue:

A Solution Approach to Bilevel Linear Programming with Fuzzy Coefficients. 78-81 - Guoqiang Hang, Yang Yang, Danyan Zhang, Xiaohui Hu:

Dynamic Ternary Logic Gate Using Neuron-MOS Literal Circuit and Double Pass-Transistor Logic. 82-86 - Shun Long, Qunhao Feng, Wenwei Chen:

A Novel Approach to Automatic Rating of Subjective Answers Based on Semantic Matching of Keywords. 87-90 - Weiheng Zhu, Yuanfeng Liu, Liang Hao:

A Novel OCR Approach Based on Document Layout Analysis and Text Block Classification. 91-94
Pattern Recognition and Knowledge Discovery
- Lei Zhang, Zhengjun Zhai, Yue Cheng, Wensheng Niu:

Analysis of Projection Accuracy of Synthetic Image in Combined Vision System. 95-99 - Xingsi Xue, Jinshui Wang, Aihong Ren:

A Novel System Architecture for Ontology Matching. 100-102 - Min Li, Xiaoli Sun:

Curvelet Shrinkage Based Iterative Regularization Method for Image Denoising. 103-106 - Wensheng Chen, Qian Wang, Binbin Pan, Yugao Li:

Local and Non-Local Feature-Based Kernel Nonnegative Matrix Factorization Method for Face Recognition. 107-110 - Juan Li, Xiaofang Guo:

A Prototype Selection Algorithm Based on Extended Near Neighbor and Affinity Change. 111-115 - Baohua Wang, Junlian Huang, Haihong Zheng, Hui Wu:

Semi-Supervised Recursive Autoencoders for Social Review Spam Detection. 116-119 - Yao Yao, Xin Xin, Ping Guo:

Pulsar Candidate Selection by Assembling Positive Sample Emphasized Classifiers. 120-124 - Bo Chong Han, Bo Qiu, Haijing Zhu, Yuanyuan Liu, Xiaodong Fan:

Comparison of Two Cosmic Rays Positioning Algorithms. 125-128
Data Mining and Clustering
- Haiyan Fu, Dong Xu:

Data Dynamic Mining and Its Attribute Logic Relation. 129-133 - Hui Du, Yuping Wang, Chuchu Ren, Junkun Zhong, Xiaozhi Gao:

Multi-Level Clustering Algorithm for Star/Galaxy Separation. 134-137 - Fei Qin, Jie Liu, Jing Li, Bin Zhou:

A Multi-Subgroup Hierarchical Hybrid of Central Force Optimization and Gravity Search Algorithm. 138-141 - Bin Wang, Zheng Lv, Jinwei Zhao, Xiaofan Wang, Tong Zhang:

An Adaptively Disperse Centroids K-Means Algorithm Based on MapReduce Model. 142-146 - Yifeng Cheng, Zengli Liu:

Image Denoising Algorithm Based on Structure and Texture Part. 147-151 - Jingsi Ou, Wensheng Chen, Binbin Pan, Yugao Li:

A New Image Inpainting Algorithm Based on DCT Similar Patches Features. 152-155 - Xue Zhou, Zhengqun Wang, Zhibo Guo, Dongling Zhai:

Face Recognition Based on Discriminative Low-Rank Matrix Recovery with Sparse Constraint. 156-160 - Huijian Han, Kai Fu, Xiusheng Sun, Zhenxian Li:

Semantic Word Rank Algorithm Based on the Relation Degree of the Words. 161-164 - Lei Zhang, Chengcai Chen

:
Sentiment Classification with Convolutional Neural Networks: An Experimental Study on a Large-Scale Chinese Conversation Corpus. 165-169
Optimization Theory and Methods
- Haiyan Liu, Yuping Wang, Liwen Liu, Xiaodong Li, Xiaozhi Gao:

A Two Phase Approach Based on Dynamic Variable Grouping and Self-Adaptive Group Search for Large Scale Optimization. 170-174 - Jiawei Yuan

, Hai-Lin Liu:
A New Dominance Relation Based on Simplex for Many Objective Optimization Problems. 175-178 - Jie Liu, Xiaofang Guo:

An Improved Differential Evolution Algorithm for Unconstrained Optimization Problems. 179-181 - Fei Wei, Shugang Li, Jing Li:

A New Cooperative Coevolution with a New Auxiliary Function for Large Scale Global Optimization. 182-185 - Jingyu Wang, Junfeng Chen, Shi Cheng, Yingjuan Xie:

Double Heuristic Optimization Based on Hierarchical Partitioning for Coverage Path Planning of Robot Mowers. 186-189 - Zhoudong Hua, Junfeng Chen, Yingjuan Xie:

Brain Storm Optimization with Discrete Particle Swarm Optimization for TSP. 190-193 - Qiang Wang, Hai-Lin Liu, Yiu-Ming Cheung:

A Renewable Energy Cooperation Scheme for OFDM Systems Using Evolutionary Many-Objective Optimization Algorithm. 194-197 - Hongwei Lin:

Hybridizing Differential Evolution and Nelder-Mead Simplex Algorithm for Global Optimization. 198-202
Access Control and Protection
- Sulong Tang, Liji Wu, Xiangmin Zhang, Xingjun Wu, Beibei Wang:

A Novel Method of Correlation Power Analysis on SM4 Hardware Implementation. 203-207 - Yan Chang, Yong Xian, Jie Li, Daqiao Zhang, Jing Gao:

Perturbation Correction Calculation Method for Remote Rendezvous between Non-Coplanar Elliptic Orbits. 208-212 - Qin Zhao, Zeyu Chen, Yiyun Zhu, Zhe Li, Xinhong Hei:

Toward Automatic Review of Building Energy Efficiency Based on Building Information Modeling. 213-217 - Lei Huang, Bin Luo:

Salient Object Detection via Video Spatio-Temporal Difference and Coherence. 218-222
Cryptography and Cryptanalysis
- Yaling Zhang, Lijun Liu, Shangping Wang:

Multi-User and Keyword-Based Searchable Encryption Scheme. 223-227 - Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Qin Wang:

An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem. 228-232 - Kun Jiang, Bing Zhao, Weijun Shan, Lihui Wang, Jing Liu:

Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography. 233-236 - Zhenyue Long, Linbin Zhan, Guiteng Chen:

A Dynamic Trust Management Mechanism in Distributed CRNs. 237-242 - Junfeng Zhao, Yongmei Wang, Yuanyi Xia:

Analysis of Information Security of Electric Power Big Data and Its Countermeasures. 243-248 - Huilin Chen, Da Bao, Hongbiao Gao, Jingde Cheng:

A Security Evaluation and Certification Management Database Based on ISO/IEC Standards. 249-253
Information Security and Integrity
- Rui Chang, Liehui Jiang, Qing Yin, Wei Liu, Shengqiao Zhang:

A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment. 254-258 - Yingjiu Guo, Xuemei Liu:

Research on the Reasoning Mechanism of Copyright Protection of Digital Content Based on the Petri Net. 259-262 - Jiujun Cheng:

Discussion on the Intension and Value of Design Techniques of Chinese Character in Word Stock. 263-266 - Fu Miao, Zhenxing Wang, Yi Guo, Liancheng Zhang:

A Security Threats Taxonomy for Routing System Intrusion Detection. 267-270 - Toan-Thinh Truong, Vi-Minh Luong, Minh-Triet Tran, Anh Duc Duong:

Secure Identity-Based Authentication Scheme Suitable for Limited-Resource Devices. 271-276 - Zhonglei Gu, Yang Liu:

Scalable Group Audio-Based Authentication Scheme for IoT Devices. 277-281 - Jinglin Wu, Yihong Long, Qiang Huang, Wei Wang:

Design and Application of IBE Email Encryption Based on Pseudo RSA Certificate. 282-286 - Ying Xue, Zhenqiang Yao, Wei Niu:

The Distributed Dissimilar Redundancy Architecture of Fly-by-Wire Flight Control System. 287-293
Network Security
- Hejun Xuan, Yuping Wang, Shanshan Hao, Zhanqi Xu, Xiaodong Li, Xiaozhi Gao:

Security-Aware Routing and Core Allocation in Elastic Optical Network with Multi-core. 294-298 - Shuangyan Yi, Hongpeng Wang, Zhenyu He, Yi Li, Wensheng Chen:

Multiple Object Tracking Based on Robust Network Flow Model. 299-303 - Jing Fang, Jingsha He, Muhammad Salman Pathan, Mengchen Gao:

A Novel Storage and Search Scheme in Cloud Computing. 304-308 - Ran Ji, Haifeng Li, Chaojing Tang:

Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning. 309-313 - Liancheng Zhang, Yi Guo, Huiqiang Yuwen, Yu Wang:

A Port Hopping Based DoS Mitigation Scheme in SDN Network. 314-317 - Shameng Wen, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, Chaojing Tang:

Testing Network Protocol Binary Software with Selective Symbolic Execution. 318-322 - Peilin Chen, Lei Zhao, Zongyu Xin, Yumeng Qiang, Ming Zhang, Tiemeng Li:

A Scheme of MIDI Music Emotion Classification Based on Fuzzy Theme Extraction and Neural Network. 323-326
Security Methodologies and Management
- Hai Zhu, Guoheng Ren, Dongxia Qin, Wei Wang, Fei Wei, Ying Cao:

Predicting User Retweet Behaviors Based on Energy Optimization. 327-330 - Zhan Huang, Shun Long, Yuying Jiang, Qian Chen:

An Outlier Detection Method Based on PageRank Algorithm. 331-335 - Pengfei Xu, Nana Ding, Feng Chen:

The Threat Assessments of the Cracks to the Soil Sites via Image Analysis. 336-339 - Hongwei Han, Shuwen Dang:

Research on Performance of Motion Platform of 3-RPS Flight Simulator. 340-344 - Jinhua Li, Shuancheng Gu, Huaqiang Fang, Xing Hong:

Research on Surface Movement Parameters of Shallow Buried Coal Seam with Central Force Optimization. 345-348 - Guo Xie, Zhuxin Wang, Xinhong Hei, Sei Takahashi, Hideo Nakamura:

Data-Based Axle Temperature Prediction of High Speed Train by Multiple Regression Analysis. 349-353
System Analysis and Modeling
- Yubin Wang, Wei Wu, Gaofeng Zhan:

An Optimized Algorithm in Risk Calculating. 354-357 - Jian Yang, Ruonan Rao, Pei Hong, Peng Ding:

Ensemble Model for Stock Price Movement Trend Prediction on Different Investing Periods. 358-361 - Xing Wang, Mingyun Chen:

A Comprehensive Research on Evaluation of Port Competitiveness Factors. 362-365 - Congmou Yuan, Wenxue Niu, Dansong Zhang:

Research on the Urbanization Strategy of Rural Population. 366-369 - Fangfang Guo, Yaoguang Zhong, Quanju Zhang:

Study on Logistics Outsourcing Strategy of E-Commerce Based on Revenue Sharing Contract. 370-373 - Huijian Han, Rongjun Song, Yanqiang Fu:

One Algorithm of Gesture Animation Synthesis. 374-377 - Qiang Chen:

Research on Cloud Computing Resource Management Model Based on Multi-Agent System. 378-381 - Feng Wang, Junhuai Li, Jing Zhang, Qiang Huang:

Research on the Multi-Tenant Placement Genetic Algorithm Based on Eucalyptus Platform. 382-385 - Weigang Ma, Siyu Tan, Xinhong Hei, Jinwei Zhao, Guo Xie:

A Prediction Method Based on Stepwise Regression Analysis for Train Axle Temperature. 386-390
Short Papers
Intelligent Computation
- Xuemei Liu, Xiang Zhang, Tianlai Huang, Zhe Yang, Wen Li, Yuzhong Ye, Shan Hu, Jing Li:

Study on the Relation between Virus and Host Cell by Alignment-Free Sequence Comparison. 391-394 - Chaoling Li, Lin Lu:

Evaluation of Regional Logistics Industry Development Level Based on Grey Entropy. 395-398 - Shuwen Dang, Kangle Wang, Hongwei Han, Pengzhan Cheng:

A Hybrid LWNN-Based Stochastic Noise Eliminating Method for Fiber Optic Gyro. 399-402 - Naiguo Wang, Xiangwei Zhu, Jian Zhang:

License Plate Segmentation and Recognition of Chinese Vehicle Based on BPNN. 403-406 - Taoran Cheng, Pengcheng Wen, Yang Li:

Research Status of Artificial Neural Network and Its Application Assumption in Aviation. 407-410 - Yan Kang, Hao Li, Chunhui Wang, Li Dai:

A Job Shop Scheduling Algorithm Using Big Bang-Big Crunch Strategy. 411-414 - Hao Li, Hai Zhu, Guoheng Ren, Hongfeng Wang, Hong Zhang, Liyong Chen:

Energy-Aware Scheduling of Workflow in Cloud Center with Deadline Constraint. 415-418
Intelligent Systems and Learning Algorithms
- Yang Sun, Yiwen Wang:

Prosodic Head Motion Generation from Text for a Chinese Talking Avatar. 419-422 - Si-Yuan Jing, Gaorong Yan, Xingyuan Chen, Peng Jin, Zhaoyi Guo:

Parallel Acceleration of IBM Alignment Model based on Lock-Free Hash Table. 423-427 - Junbing Li:

Comparisons of Central Force Optimization and Gravitational Search Algorithm. 428-430 - Shu Gong, Wei Gao:

Ontology Learning Algorithm via WMW Optimization Model. 431-434 - Peng Guo, Yunming Sun, Wei Niu, Chong Qin:

An Architecture Modeling and Simulation Methods of Integrated Electromechanical Management System. 435-439 - Rongrong Li, Kangshun Li:

The Research of Multi-Source Information Fusion Based on Cloud Computing. 440-443 - Pengcheng Wen, Yahui Li, Yadi Zhang:

Methods to Capability Improvement for Multiple UAVs' Control. 444-447 - Shiyu Zhang, Ruliang Wang:

Stability Analysis for a Class of Uncertain Time Varying Delay Systems. 448-451 - Dongbo Zhang, Lu Xiong:

The Research of Dynamic Shortest Path Based on Cloud Computing. 452-455 - Tianjun Zhang, Yun Bai, Gao-chang Zhao, Jie Liu:

Parameter Establishment of Differential Evolution Algorithm Based on Uniform Design and the Effect of Different Number of Levels. 456-460 - Yifeng Han, Hongbiao Gao, Jingde Cheng:

Autonomous Evolution in Evolutionary Personal Information Partners: Mechanism and a Case Study. 461-465
Pattern Recognition and Knowledge Discovery
- Xu Zhao, Xuefei Li, Hua Liang, Fei Deng, Long Zhou, Weizhen Chen:

The Detecting Method of Building Deformation Based on Terrestrial Laser Point Cloud. 466-469 - Baoming Qiao, Liu Jin, Yufan Yang:

An Adaptive Algorithm for Grey Image Edge Detection Based on Grey Correlation Analysis. 470-474 - Peng Sun, Ziyan Wu, Haifeng Yang, Xin Guo:

Sensors Validation Based on TAN Classifiers. 475-478 - Lixia Zhang, Kangshun Li:

Improved BOF Method for Person Re-Identification. 479-482 - Huijian Han, Luyu Wang, Kai Liu:

One Method of Cloth Simulation Based on Adaptive Meshes. 483-486 - Jianjun Xie, Junhong Li, Hong Wang, Wenyi Zeng, Ping Guo:

The Methods for Two-Dimensional Fiber Spectra Extraction. 487-490 - Yuanyuan Liu, Bo Qiu, Xiaodong Fan, Hai Jing Zhu, Bo Chong Han:

Spectra Stacking for LAMOST Low SNR Spectra. 491-493
Data Mining
- Huali Deng, Liangjun Zhang, Weikang Su:

Clustering the Families Successfully Applying for Minimum Living Standard Security System Based on K-Means Algorithm. 494-498 - Yiwen Wang, Haolan Zhang

, Ke Huang, Changbin Yu, Honglei Cui:
Clustering by Creating a Graph. 499-502 - Jianping Chen, Xingsen Li:

Automated Data Mining Platform for Large Volume Data Processing. 503-506 - Jianwei Yang, Zhengda Lu:

A Shape Representation Based on Polar Vector Fourier Descriptors. 507-510
Optimization Theory and New Methods
- Rui Sun:

A Modified Adaptive Particle Swarm Optimization Algorithm. 511-513 - Wang Ding:

A New Improved Gravitational Search Algorithm Based on Chaos. 514-517 - Caitao Zhan, Changhe Li:

Shape Formation in Games: A Probability-Based Evolutionary Approach. 518-521 - Yuanjian Zhou, Xiaohui Yang:

A Novel Adaptive Beamforming Algorithm for Smart Antenna System. 522-525 - Fahui Gu, Kangshun Li, Yue Liu:

A Hybrid Evolutionary Algorithm for Solving Function Optimization Problems. 526-529 - Yu Sun:

Symbiosis Co-Evolutionary Population Topology Differential Evolution. 530-533 - Shuiping Zhang, Yang Chen, Yangdan Geng:

Fruit Fly Algorithm Based on Extremal Optimization. 534-537 - Meng Zhang, Dengxu He, Chonglong Zhu:

Cuckoo Search Algorithm Based on Hybrid-Mutation. 538-542 - Lei Fan, Yanfang Liang, Xiyang Liu, Xin Gu:

A Hybrid Evolutionary Algorithm Based on Dominated Clustering for Constrained Bi-Objective Optimization Problems. 543-546
Access Control and Protection
- Fengli Zhang, Junxin Chen, Hongchuan Zhou, Zhengwei Geng:

A Dynamic Access Control Model for Spatial Data. 547-550 - Jiazhe Chen

:
A Note on the Impossible Differential Attacks on Block Cipher SM4. 551-554 - Jing Li, Fei Qin, Jie Liu, Bin Zhou:

A New Iterative Method for Solving Absolute Value Equations. 555-556 - Tianjun Wu, Yuexiang Yang:

Crafting Intents to Detect ICC Vulnerabilities of Android Apps. 557-560 - Sulin Pang, Yizhou He, Li Wang:

The Intelligent Control Model and Application for Commercial Bank Systems Emergence under Risk Status Based on Big Data. 561-565
Cryptography and Cryptanalysis
- Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng:

A Formal Analysis Method with Reasoning for Cryptographic Protocols. 566-570 - Zhouquan Du, Jie Zhang, Qiong Zhang, Zhibo Liu, Bo Zhu:

The Research of S-Box Based on Reconstruction Design Method. 571-577 - Bing Zhao, Lihui Wang, Kun Jiang, Xiaobing Liang, Weijun Shan, Jing Liu:

An Improved Power Attack on Small RSA Public Exponent. 578-581 - Jing Nie, Xueling Dai:

On the Information Security Issue in the Information Construction Process of Colleges and Universities. 582-585 - Hui Zou:

Protection of Personal Information Security in the Age of Big Data. 586-589 - Hsieh-Tsen Pan, Chiu-Shu Pan, Shyh-Chang Tsaur, Min-Shiang Hwang:

Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart Card. 590-593
Data Security and Integrity
- Qingshuang Han, Liji Wu, Xiangmin Zhang:

Research on Side Channel Attack for USB Key. 594-597 - Kun Wang, Tao Song, Alei Liang:

Mmda: Metadata Based Malware Detection on Android. 598-602 - Hongbiao Gao, Zhe Wang, Yuan Zhou, Jingde Cheng:

Development of a General-Purpose Offline E-Testing Environment. 603-607 - Zhengyang Ding, Binbin Zhang, Gaopan Huang:

Security Operation and Maintenance of Information Infrastructure Based on Minicomputer Typical Troubleshooting. 608-611 - Yuxiang Yang, Dan Wu:

Research on Environmental Impact Assessment of E-Waste Reverse Logistics. 612-615 - Mi Wang, Dong Kang:

Research on Decomposition and Correlation Design of Micro-Video Course Content. 616-619
Information System Safety
- Huali Deng, Liangjun Zhang, Zhenwei He:

Research on the Object Recognition of Minimum Living Standard Security System Based on Neural Network. 620-623 - Junfeng Zhao, Jing Wang, Lei Yin:

Detection and Control against Replay Attacks in Smart Grid. 624-627 - Huaijun Wang, Dingyi Fang, Junhuai Li, Yong Chang, Lei Yu:

The Research and Discussion on Effectiveness Evaluation of Software Protection. 628-632 - Yinghui Xia, Haotian Wu:

Reversible Data Hiding in Medical Image for Contrast Enhancement of ROI. 633-637 - Haiyan Jin, Shaopeng Zhao:

A New Parallel Instruction Model Based on Multi-Tasking Bluetooth Communication. 638-641 - Xiang He, Yihong Long, Liheng Zheng:

A Transparent File Encryption Scheme Based on FUSE. 642-645 - Dong Xu, Haiyan Fu, Wenjuan Jiang:

Research on Liver Disease Diagnosis Based on RS_LMBP Neural Network. 646-649 - Bin Gui, Fubin Chen:

Research on Identifying Emotion Sentence Based on Emotional Feature Density. 650-653
Network Security and Security Methodologies
- Shuai Jiang, Jian Wang:

Hierarchical MAC Protocol Greedy Behavior Detection in Wireless Sensor Networks. 654-659 - Yanjun Li, Ping Guo, Xin Xin:

A Divide and Conquer Method for Automatic Image Annotation. 660-664 - Yameng Li, Jingsha He, Na Huang, Chengyue Chang:

On the Recoverability of Data in Android YAFFS2. 665-668 - Yang Li, Xiaodong Zhao, Taoran Cheng:

Heterogeneous Computing Platform Based on CPU+FPGA and Working Modes. 669-672 - Xinhua Li, Juntao Chen, Jinmei Zhan, Lin Liu:

A Study on Sports Tourism Competitiveness Based on Factor Analysis Method. 673-676 - Leen Zhang, Weiwei Qian, Zhenhua Zhang, Youyuan Wang:

Research on Knowledge Demand Information Acquisition for Product Design. 677-680
System Analysis and Modeling
- Jiandong Meng:

Fast Password Authentication Protocol in Auto-Guard of Car Based on Cellphone. 681-684 - Le Wang, Taoran Cheng, Yang Li:

Preliminary Research of Secure Integrated Computing in Future Avionics. 685-688 - Huijian Han, Jingchao Wang, Kai Liu, Lingli Zhou:

Particle Sorting Algorithm Based on Stretching Tensor. 689-692 - Linrun Qiu, Kangshun Li:

The Research of Intelligent Agent System Architecture Based on Cloud Computing. 693-696 - Lu Bai, Jiansheng Wang, Baolei Huang:

The Effect of Shared L2 Cache on Determinism in Airborne Embedded System. 697-700

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














