


default search action
17th CSE 2014: Chengdu, China
- Xingang Liu, Didier El Baz, Ching-Hsien Hsu, Kai Kang, Weifeng Chen:

17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Chengdu, China, December 19-21, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7981-3
CSE 2014 - The 17th IEEE International Conference on Computational Science and Engineering
Intelligent and Bio-Inspired Computing I
- Ting Shu

, Bob Zhang
:
Diabetes Mellitus Detection Based on Facial Block Texture Features Using the Gabor Filter. 1-6 - Huanhuan Meng, Yue Zhang:

Classification of Electrocardiogram Signals with Deep Belief Networks. 7-12 - Tong Liu, Yujuan Si, Dunwei Wen, Mujun Zang, Weiwei Song, Liuqi Lang:

Vector Quantization for ECG Beats Classification. 13-20 - Yongjun Jiang, Jinxu Tao, Weiquan Ye, Wu Wang, Zhongfu Ye:

An Isolated Sign Language Recognition System Using RGB-D Sensor with Sparse Coding. 21-26
Intelligent and Bio-inspired Computing II
- Yungang Ma, Ji Wu:

Combining N-Gram and Dependency Word Pair for Multi-document Summarization. 27-31 - Anis Yazidi, B. John Oommen

, Ole-Christoffer Granmo
, Morten Goodwin:
On Utilizing Stochastic Non-linear Fractional Bin Packing to Resolve Distributed Web Crawling. 32-37 - Yingce Liu, Bo Zhao, Yuanchun Li:

Adaptive Neural Network Position/Force Hybrid Control for Constrained Reconfigurable Manipulators. 38-43
Scientific and Engineering Computing I: Control Applications
- Xiaoshuai Xin, Jinxi Chen, Jianxiao Zou:

Vehicle State Estimation Using Cubature Kalman Filter. 44-48 - Zhengli Xiao, Dechao Chen, Mingzhi Mao

, Hongzhou Tan
, Yunong Zhang
:
Cart Velocity Tracking of General IPC Model Using ZG Control Compared with Cart Path Tracking. 49-54 - Jinglong Tong, Kuangyuh Huang:

Design and Development of Sypinge-Type Magnetorheological Damper. 55-59
Scientific and Engineering Computing II: Control Applications
- Lingjun Liu, Zhonghua Xie

, Cui Yang:
Reconstruction Algorithm of Ultrasonic CT Based on Matching Pursuit. 60-65 - Xixiao Liu, Guishu Liang:

An Algorithm for Fractional Order System Identification. 66-71 - Jinglong Tong, Kuangyuh Huang:

Semi-active Spiral Flow Channel Magnetorheological Damper. 72-77 - Chunhui Liang, Yuanchun Li:

Attitude Tracking Control Based on Adaptive Sliding Mode Technique with Double Closed Loop for Spacecraft Near Small Body. 78-82 - Yunong Zhang

, Ying Wang, Yonghua Yin, Hongzhou Tan
, Qingkai Zeng:
Theory and Substantiation of z0g1 Controller Conquering Singularity Problem of Output Tracking for a Class of Nonlinear System. 83-88
Scientific and Engineering Computing III: Applied Mathematics
- Graham Lange, Fuhua Lin

:
Modeling Well Scheduling as a Virtual Enterprise with Intelligent Agents. 89-96 - Jörg Lässig, Abhishek Awasthi, Oliver Kramer:

Common Due-Date Problem: Linear Algorithm for a Given Job Sequence. 97-104 - Jingyu Zhou, Shulin Tian, Bing Long, Chenglin Yang:

A Novel Prediction Method for Analog Circuits Based on Gaussian White Noise Estimation. 105-112
Scientific and Engineering Computing IV: Numerical Simulation
- Xingfu Wu

, Guangtai Ding, Valerie E. Taylor:
Parallel Optical Flow Processing of 4D Cardiac CT Data on Multicore Clusters. 113-120 - Xiao Nie, Leiting Chen, Tao Xiang:

A GPU-Based Method for Weakly Compressible Fluids. 121-126 - Mohaned Giess Shokrallah Ahmed, Bin Tang:

New FCM's Validity Index for Sorting Radar Signal. 127-131 - Yabo Yuan, Bin Wu:

Robust Beamforming by an Improved Neural Minor Component Analysis Algorithm. 132-136
Scientific and Engineering Computing V: Image Processing, Miscellaneous
- Ayush Shrestha, Ying Zhu

, Yan Zhu:
Visual Cluttering Reduction for Visualizing Large Spatio-temporal Data Sets. 137-143 - Mi Xiao

, Haihong Xiong, Liang Gao, Qiangzhuang Yao:
An Efficient Method for Structural Reliability Analysis Using Evidence Theory. 144-149 - Wei Zhang, Desheng Yu, Dongdong Qi, Hongling Qi, Dan Xu:

Failure Analysis and Improved Method of Batch Cracks for Certain Fighter Aircraft. 150-154 - Jingqiao Zhang, Zhe Shi, Meiling Zhang:

Identification and Marking of Molecular Surface Feature Regions Based on Spherical Mapping. 155-160 - Huixian Sun, Yuhua Zhang, Zhaorui Li:

Texture Defect Detection Using Dual-Tree Complex Wavelet Reconstruction. 161-164
Big Data Analytic I
- Wei Wang, Hai-Ning Liang:

IRIS2: A Semantic Search Engine That Does Rational Research. 165-171 - Rui Luo, Wei Zhao:

A Robust Iterative Algorithm for Parameter Estimation of the Generalized Gamma Distribution. 172-180 - Lebi Jean-Marc Dali, Zhiguang Qin:

Cold-Start Mastered: LebiD1. 181-184 - Tao Wu, Leiting Chen, Yayong Guan, Xin Li, Yuxiao Guo:

LPA Based Hierarchical Community Detection. 185-191 - Xingyi Pan, Fulian Yin, Jianping Chai:

Delayering Tagging of Television Programs and Association Rule Mining. 192-197 - Min Zhu, Shuzhen Yao:

A Collaborative Filtering Recommender Algorithm Based on the User Interest Model. 198-202 - Jingcong Wang, Shuo Zhang, James Chen:

Vehicle Detection by Sparse Deformable Template Models. 203-206 - Dunwei Wen, Geoffrey Marshall:

Automatic Twitter Topic Summarization. 207-212
Big Data Analytic II
- Haiying Huang, Wuyi Zhang, Gaochao Deng, James Chen:

Predicting Stock Trend Using Fourier Transform and Support Vector Regression. 213-216 - Shanhong Wan, Defu Zhang, Yain-Whar Si

:
Evolutionary Computation with Multi-variates Hybrid Multi-order Fuzzy Time Series for Stock Forecasting. 217-223 - Haibin Shi, Suyang Huang, Minzheng Huang, Zihong Chen, Xuemin Hong, Lingxiang Zheng, Huiru Zheng

:
Segmentation of Mobile User Groups Based on Traffic Usage and Mobility Patterns. 224-230 - Aleksander Bai, Hugo Hammer, Anis Yazidi, Paal Engelstad:

Constructing Sentiment Lexicons in Norwegian from a Large Text Corpus. 231-237 - Man Qi, Yang Liu, Lin Lu, Junyong Liu, Maozhen Li:

Big Data Management in Digital Forensics. 238-243 - Wei Song

, Mingyuan Liu:
A Visualizer for High Utility Itemset Mining. 244-248 - Pushpalatha K

, Ananthanarayana V. S.:
An Unified Approach for Multimedia Document Representation and Document Similarity. 249-256
Cluster, Grid P2P, and Cloud Computing I
- Xin Xu, Huiqun Yu, Xin Pei:

A Novel Resource Scheduling Approach in Container Based Clouds. 257-264 - Zhuoer Gu, Cheng Chang, Ligang He, Kenli Li:

Developing a Pattern Discovery Model for Host Load Data. 265-271 - Xian Li, Rui Wang, Depei Qian:

Dual Power: Integrating Renewable Energy into Green Datacenters without Grid Tie Inverter. 272-278 - Wenbo Xie

, Zhen Liu:
An Efficient Hierarchical Clustering Algorithm via Root Searching. 279-284 - Fábio Coutinho, Evandro Verdino, Jesus Ossian, Renato Santana:

GGreen: A Greedy Energy-Aware Scheduling Algorithm on Grid Systems. 285-290
Cluster, Grid P2P, and Cloud Computing II
- Yunjie Du, Xuanhua Shi, Hai Jin, Song Wu:

FITDOC: Fast Virtual Machines Checkpointing with Delta Memory Compression. 291-298 - Guangjun Zhang, Yingying Yao, Chunmiao Zheng

:
HPC Environment on Azure Cloud for Hydrological Parameter Estimation. 299-304 - Jing Chen, Yinglong Wang, Bing Xue, Zhigang Zhao, Ying Guo:

A Credit-Based Allocation Method of Resource Quotas for Cloud Users. 305-311 - Hongyu Pei Breivold, Ivica Crnkovic

, Iva Radosevic, Ivan Balatinac:
Architecting for the Cloud: A Systematic Review. 312-318
Microwave and Radar
- Zhiliang Tan, Peijiao Song, Liyun Ma, Zhaoxiang Meng:

Study on the Effect Mechanism of the Bipolar Junction Transistor Caused by ESD. 319-323 - Kebin Hu, Xiaoling Zhang, Wenjun Wu, Jun Shi, Shunjun Wei:

Three GPU-Based Parallel Schemes for SAR Back Projection Imaging Algorithm. 324-328 - Haodong Lin, Hao Peng, Yu Liu, Jun Dong, Tao Yang:

Low Loss Compact Meander Stripline Delay Lines Using LTCC. 329-333 - Shunjun Wei, Liwen Guo, Xiaoling Zhang, Jun Shi:

Millimeter-Wave Interferometric Synthetic Aperture Radar Imaging via Ground Projection. 334-339 - Lipeng Dai, Buhong Wang, Lingyue Jia:

A Method for Fast States Estimation of Multi-function Radar Based on Syntactic Derivation of Parse Chart. 340-344
Mobile Computing and Wireless Communications I
- O. O. Ogundile

, Daniel J. J. Versfeld
:
Improved Reliability Information for Rectangular 16-QAM over Flat Rayleigh Fading Channels. 345-349 - Min Wang, Hao Zhang, Wei Shi, Tingting Lu:

A STDMA-Based Collaborative Transmission Scheme for 60GHz WPANs with Directional Antenna. 350-356 - Haichao Tan, Lidong Zhu:

A Novel Routing Algorithm Based on Virtual Topology Snapshot in LEO Satellite Networks. 357-361 - Bing Zeng

, Yan Dong
:
An Energy Efficient Harmony Search Based Routing Algorithm for Small-Scale Wireless Sensor Networks. 362-367
Mobile Computing and Wireless Communications II
- Yanan Liu, Hao Liu, Tianxiang Jia, Teng Wang:

Improved Single-Stream Beamforming Algorithm in TD-LTE System. 368-372 - Mengjiao Zhang, Xiaohui Chen, Kai Ruan, Jiyuan Sun, Yangrui Zhu:

Localization Using Self-Organizing Maps Based on Spring Relaxation. 373-377 - Peng Qian, Enqing Dong, Juan Xu, Xing Lan, Wei Liu, Wentao Cui:

Multipath Routing Protocol Based on Congestion Control Mechanism Implemented by Cross-Layer Design Concept for WSN. 378-384
Mobile Computing and Wireless Communications III
- Han Han, Juan Chen, Junnan Yao, Yuzhen Huang, Ying Li, Jingchao Wang:

Resource Allocation for Energy Saving in Downlink Wireless Communication with Direction-Variable Antennas. 385-391 - Fenglien Lee, Daisy F. Sang, Tzu-Chaing Chiang:

An Efficient Algorithm for Route Discovery and Mobility Management on Mobile Ad Hoc Networks. 392-396 - Yuliang Wu, Shuzhen Yao:

A Modified Slotted Random Anti-collision Algorithm for the EPCglobal UHF Class-1 Generation-2 Standard. 397-400 - Tamal Chakraborty, Iti Saha Misra:

A Priority Based Adaptive Channel Reservation Algorithm for Improved System Capacity in Cognitive Radio Networks. 401-406 - Xiaohua Wu, Song Chen:

Identify & Measure Social Relations: Routing Algorithm Based on Social Relations in Opportunistic Networks. 407-412
CSE Education
- Rahok Yokokawa Sam Ann, Hirohisa Oneda, Shigeji Osawa, Koichi Ozaki:

Development of a Teaching Material That Can Motivate Students to Learn Control Engineering and Image Processing. 413-419 - Haiping Zhu, Xinhui Zhang, Xinhong Wang, Yan Chen, Bin Zeng:

A Case Study of Learning Action and Emotion from a Perspective of Learning Analytics. 420-424 - Isidoros Perikos

, Panagiotis Angelopoulos, Michael Paraskevas, Thomas Zarouchas, Giannis Tzimas
:
A Methodology for Evaluation and Knowledge Extraction from On-going Learning Process. 425-431 - Hadi Sutopo

:
Learning Model Development of Creating a Multimedia Application Particularly Puzzle Game. 432-437 - Martin Malchow, Matthias Bauer, Christoph Meinel:

The Future of Teleteaching in MOOC Times. 438-443
Embedded and Ubiquitous Computing I
- Jin He

, Mianxiong Dong, Kaoru Ota
, Minyu Fan, Guangwei Wang:
NSCC: Self-Service Network Security Architecture for Cloud Computing. 444-449 - Riming Wang, Jiuchao Feng:

Effective Sensors Deployment with Localization Accuracy Constraints. 450-457 - Hyun-Cheol Kim, Jihun Cha, Won Don Lee:

Eye Detection for Gaze Tracker with Near Infrared Illuminator. 458-464 - Tianxiang Jia, Yanan Liu:

Development of Attitude Determination System for Moving Carrier Based on MEMS Sensors. 465-469 - Zhiming Wang, Jiangxing Wu, Fengyu Zhang, Jianhui Zhang, Zhen Zhang, Yuxiang Hu:

A Solver for Performance-Aware Component Composition Problem in Reconfigurable Router. 470-475 - Weiguo Wu, Tao Wang, Chaohui Wang, Qing Zhang:

A Task Scheduling and Placement Strategy Based on Tasks' Aspect Ratio. 476-482
Embedded and Ubiquitous Computing II
- Lingzhi Yi, Xianjun Deng, Dexin Ding, Zenghui Zou, Wenbin Wang:

DCDF: A Distributed Clustered Decision Fusion Scheme for Target Detection in Wireless Sensor Networks. 483-486 - Atef Dorai, Virginie Fresse, El-Bay Bourennane, Abdellatif Mtibaa

:
A Novel Architecture for Inter-FPGA Traffic Collision Management. 487-495 - Virginie Fresse, Catherine Combes, Hatem Belhasseb:

Mathematical Models Applied to On-Chip Network on FPGA for Resource Estimation. 496-504 - Yuanyuan Gao, Li Zhou, Yanhu Chen, Yang Wang, Jia Wang, Tao Sun:

A Hardware Acceleration Engine for Ray Tracing. 505-508 - Zhengzhi Li, Haoqian Wang, Kai Li

:
Saliency-Aware Image Completion. 509-512
Advanced Networking and Applications I
- Huan Wu, Xuan Liu, Zhusheng Pan, Farong Zhong, Yuchang Mo:

A New Edge Ordering Heuristic in Network Reliability Analysis. 513-518 - Yi-Chih Tung, Wen-Jyi Hwang, Chih-Hsiang Ho:

A Novel QoS Mapping Algorithm for Heterogeneous Home Networks Using General Regression Neural Networks. 519-526 - Qinjiao Mao, Boqin Feng, Shanliang Pan:

A Bayesian Nonparametric Topic Model for User Interest Modeling. 527-534 - Zongming Feng, Jun Li, Haibo Wu

, Jiang Zhi:
HD: A Cache Storage Strategy Based on Hierarchical Division in Content-centric Networking. 535-540
Advanced Networking and Applications II
- Jie Xu, Jianwei Song, Qingqiang He, Jun Xu:

A Novel Queue Management Algorithm INRIO-C Based on Differentiated Services. 541-546 - Maleeha Najam, Usman Younis

, Raihan Ur Rasool
:
Multi-byte Pattern Matching Using Stride-K DFA for High Speed Deep Packet Inspection. 547-553 - Panpan Shu:

Effects of Memory on Information Spreading in Complex Networks. 554-556 - Lidu Qin, Hui Li

, Kai Pan, Fuxing Chen, Wensheng Chen, Chaoqi Yu:
Exploring Cache Coding Scheme for Information-centric Networking. 557-562 - Kai Lei

, Tao Chen, Chen Peng, Zhi Tan:
Exploring the Benefits of Introducing Network Coding into Named Data Networking. 563-568
Security, Privacy, and Trust I
- Chaohui Du, Guoqiang Bai:

A Novel Relative Frequency Based Ring Oscillator Physical Unclonable Function. 569-575 - Ting Liu, Lequan Min:

Design of Non-autonomous Chaotic Generalized Synchronization Based Pseudorandom Number Generator with Application in Avalanche Image Encryption. 576-582 - Qiuwei Yang, Changquan Cheng, Xiqiang Che:

A Cost-Aware Method of Privacy Protection for Multiple Cloud Service Requests. 583-590
Security, Privacy, and Trust II
- Jiayu Wang, Qigeng Chen:

ASPG: Generating Android Semantic Permissions. 591-598 - Cheng Cai, Yuesheng Zhu, Bojun Wang:

A Novel Mutual Authentication Scheme for Smart Card without Information Leakage. 599-604 - Jie He, Yuexiang Yang, Xiaolei Wang, Yingzhi Zeng, Chuan Tang:

PeerSorter: Classifying Generic P2P Traffic in Real-Time. 605-613 - Non Thiranant, Young-Jin Kang, Tae-Yong Kim, Won-Tae Jang, Suhyun Park, Hoonjae Lee:

A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code. 614-619 - Yan Wen, Jinjing Zhao, Shuanghui Yi, Xiang Li:

FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor. 620-626
Service and Internet Computing I
- Cheng Chang, Ligang He, Hao Chen, Jianhua Sun, Kenli Li:

Performance Analysis and Optimization for Stochastic Workflows Running under Authorization Constraints. 627-633 - Yufeng Wang, Li Wei, Qun Jin, Jianhua Ma:

Alljoyn Based Direct Proximity Service Development: Overview and Prototype. 634-641 - Chao Zhou, Bo Li:

A Heuristic Recommendation Method Based on Contextual Social Network. 642-646
Service and Internet Computing II
- Deshun Zhao, Kun Zhao, Jun Yang, Jingrong Sha:

A Complex Network Model Based on 'Friends of a Friend' in a Fixed Community. 647-652 - Kwangkyu Lee, Okjoo Choi, Jongmoon Baik:

Service Reliability Prediction Method for Service-Oriented Multi-agent System. 653-660 - Kai Lei

, Yining Ma, Zhi Tan:
Performance Comparison and Evaluation of Web Development Technologies in PHP, Python, and Node.js. 661-668 - Yuhan Wang, Qiaochu Li, Tian Lan, James Chen:

A Comparison of Content Based Image Retrieval Systems. 669-673
Distributed and Parallel Computing
- Liming Zheng, Yao Shen:

Improve Parallelism of Task Execution to Optimize Utilization of MapReduce Cluster Resources. 674-681 - Meirong Li, Yinliang Zhao, Yongqiang Si:

Dynamic Core Allocation for Energy-Efficient Thread-Level Speculation. 682-689 - Suejb Memeti

, Sabri Pllana:
PaREM: A Novel Approach for Parallel Regular Expression Matching. 690-697 - John M. Ye, Jason Chen, Tianzhou Chen, Minghui Wu, Li Liu:

Offline Data Dependence Analysis to Facilitate Runtime Parallelism Extraction. 698-703
Dependable Reliable and Autonomic Computing
- Yu Lu

, Alice Miller
, Chris W. Johnson, Zhaoguang Peng, Tingdi Zhao:
Availability Analysis of Satellite Positioning Systems for Aviation Using the PRISM Model Checker. 704-713 - Ping Zhu, Ming Hu, Xuhui Chen:

A Novel Slack-Stealing Scheduling Algorithm for Hard-Real-Time Multiple-Processors System. 714-721 - Pengfei You, Zhen Huang, Changjian Wang, Yuxing Peng:

Reducing Repair Traffic with Exact and Uncoded Repair in Distributed Storage Systems: Intersecting Zigzag Sets Codes on Hierarchical Codes. 722-728 - Mo Li, Shaoying Liu:

Tool Support for Rigorous Formal Specification Inspection. 729-734 - Zhi Tao, Hui Li

, Bing Zhu, Yunmin Wang
:
A Semi-centralized Algorithm to Detect and Resolve Distributed Deadlocks in the Generalized Model. 735-740 - Tarek A. Boghdady

, Mahmoud M. Sayed
, A. M. Emam, E. E. Abu El-Zahab:
A Novel Technique for PID Tuning by Linearized Biogeography-Based Optimization. 741-747
Workshop on Usable Mobile Security
- Weihan Bo, Yiling Zhang, Xianbin Hong

, Hanrong Sun, Xin Huang:
Usable Security Mechanisms in Smart Building. 748-753 - Haining Liang, Charles Fleming, Wei Wang:

User Authentication Interfaces in Mobile Devices: Some Design Considerations. 754-757 - Vahab Pournaghshband, David Meyer, Michael Holyland, Majid Sarrafzadeh, Peter L. Reiher:

Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices. 758-763 - Charles Fleming, Haining Liang, Ka Lok Man, Yudi An:

Mobistore: Secure Cloud-like Storage on Mobile Devices. 764-767
IUCC 2014 - The 13th IEEE International Conference on Ubiquitous Computing and Communications
Ubiquitous Computing I
- Shu Sun, Fang Liu, Jun Liu, Yinan Dou, Hua Yu:

Web Classification Using Deep Belief Networks. 768-773 - Ke Sun, Wansheng Miao, Xin Zhang, Ruonan Rao:

An Improvement to Feature Selection of Random Forests on Spark. 774-779 - Chin-Feng Lai

, Ren-Hung Hwang
, Han-Chieh Chao
, Ying-Hsun Lai
:
A Dynamic Power Features Selection Method for Multi-appliance Recognition on Cloud-Based Smart Grid. 780-785 - Bo Li, Zhi Liu, Yijian Pei, Hao Wu

:
Mobility Prediction Based Opportunistic Computational Offloading for Mobile Device Cloud. 786-792 - Marc Denojean-Mairet, Qing Tan, Frédérique C. Pivot, Mohamed Ally:

A Ubiquitous Computing Platform - Affordable Telepresence Robot Design and Applications. 793-798 - Sheng Liu, Lili He, Binfei Shao:

Research on Response Model of Data Mining. 799-802
Ubiquitous Computing II
- Chuang Zhu

, Huizhu Jia, Meng Li, Xiaofeng Huang, Xiaodong Xie:
Highly Efficient Local Non-Texture Image Inpainting Based on Partial Differential Equation. 803-807 - Chuan Jiang, Sheng Zhang, Xiaokang Lin:

An Effective Way to Improve Actigraphic Algorithm by Using Tri-axial Accelerometer in Sleep Detection. 808-811 - Xiaoliang Meng

, Yunhao Wu, Yuwei Wang:
Geospatial Sensor Network eLearning Collaboratory - A Portal for Sensor Knowledge Acquisition and Representation. 812-817 - Kamil Zeberga, Hyung-Ju Cho, Tae-Sun Chung:

A Safe-Region Approach to k-RNN Queries in Directed Road Network. 818-824 - Xuan Xie, Xifeng Li, Dongjie Bi, Qizhong Zhou, Yongle Xie, Sanshan Xie:

Rényi's Entropy Based Method for Analog Circuits Soft Fault Detection. 825-830
Ubiquitous Computing III
- Weijia Zhong, Ziqiang Huang:

The Real-Time Eye Detection for Single User Based on Template Matching. 831-834 - Deyin Liu

, Ruojin Cao, Xiaomin Mu, Lin Qi:
A Modified Greedy Algorithm for Wavelet Coefficients Reconstruction. 835-839 - Xiao-Ping Cui, Wei Hu, Xin Chen

, Shumin Wang:
A New Redundant Binary Partial Product Generator for Fast 2n-Bit Multiplier Design. 840-844 - Furkan Rabee, Yong Liao, Maolin Yang, Jian Liu, Ge Zhu:

Global Hybrid Multi-core-GPUs-OpenMPs-Resources Platform in Hard Real Time System. 845-850 - Wenyi Wang

, Jiying Zhao:
Chroma-Keying Based on Global Weighted Sampling and Laplacian Propagation. 851-854
Ubiquitous Communications I
- Xiaojun Li, Quanzhong Li, Kai Liu:

Efficient Dual Channel Multiple Access for Multihop Wireless Networks. 855-858 - Yunxiang Zhang, Zhiqin Zhao, Jinguo Wang, Gengyuan Dan:

Antenna Array Beam Pattern Synthesis Based on Trust Region Method. 859-862 - Xiang Gao, Dou Li, Zhiming Liu, Yuping Zhao:

A Hierarchical Scheduling Algorithm in Improving Quality of Wireless 3D Video Transmission. 863-867 - Mirghiasaldin Seyedebrahimi

, Xiao-Hong Peng, Rob Harrison:
Adaptive Resource Allocation for QoE-Aware Mobile Communication Networks. 868-875 - Hongcheng Yan

, Qingjun Zhang, Yong Sun:
A Novel Routing Scheme for LEO Satellite Networks Based on Link State Routing. 876-880 - Xin Cao, Zongxi Tang, Chengjie Su, Fei Wang, Yunqiu Wu:

Design of an X-Band Negative Resistance Oscillator Based on the ASIW in Modern Wireless Communication Systems. 881-883
Ubiquitous Communications II
- Zhuo Ma, Shuanyi Du:

Data Directed Estimation Based Turbo Equalization in HF Communication. 884-889 - Kun Zhang, Yourong Lu, Wei Wang:

Lattice Reduction Aided Blind Signal Separation Algorithm. 890-894 - Yong Lu, Shaohe Lv, Xiaodong Wang, Xingming Zhou:

UWBSS: Ultra-wideband Spectrum Sensing with Multiple Sub-Nyquist Sampling Rates. 895-900 - Sijun Ren, Ping Yi, Dapeng Hong, Yue Wu, Ting Zhu:

Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks. 901-908 - Hyunduk Kim

, Chulki Kim, Jae-Hun Kim
, Minah Seo
, Seok Lee, Taikjin Lee:
Distance Based Energy Efficient Clustering Method in Wireless Sensor Networks. 909-914
Ubiquitous Communications III
- Jia Hu, Hui Lin, Li Xu:

Energy-Aware Secure Routing for Hybrid Wireless Mesh Networks. 915-922 - Won-Suk Kim

, Sang-Hwa Chung, Jiameng Shi:
WiPCon: A Proxied Control Plane for Wireless Access Points in Software Defined Networks. 923-929 - Nakanya Chumsombat:

User Evaluations Service Quality on E-Tax Filing Satisfaction within the Public Sector. 930-935 - Zhaoyang Qiu, Jun Zhu, Pei Wang, Bin Tang:

Parameter Estimation of Phase Code and Linear Frequency Modulation Combined Signal Based on Fractional Autocorrelation and Haar Wavelet Transform. 936-939 - Dalaijargal Purevsuren, Saif-Ur Rehman, Gang Cui, Nwe Nwe Htay Win, Jianmin Bao:

Cone Dominance-Based Interactive Evolutionary Multiobjective Algorithm for QoS-Driven Service Selection Problem. 940-945
Ubiquitous System, Services, and Applications I
- Yuchao Zhou, Suparna De

, Wei Wang, Klaus Moessner
:
Enabling Query of Frequently Updated Data from Mobile Sensing Sources. 946-952 - Wiroon Sriborrirux, Panuwat Promsiri, Apirath Limmanee:

Multiple Secret Key Sharing Based on the Network Coding Technique for an Open Cloud DRM Service Provider. 953-959 - Chao Guo, Yinbo Liu, Xingang Liu:

Solutions for the Key Technologies of Cultural Transmission Platform under Wireless Networks. 960-963 - Zhen-Jie Yao, Zhi-Peng Zhang

, Li-Qun Xu:
An Effective Algorithm to Detect Abnormal Step Counting Based on One-Class SVM. 964-969 - Zhibo Pang, Yuxin Cheng, Morgan E. Johansson, Gargi Bag:

Preliminary Study on Wireless Home Automation Systems with Both Cloud-Based Mode and Stand-Alone Mode. 970-975 - Yide Zhang, Xiaojuan Xu, Xinling Wang, Zhipan Fang, Jie Tang:

NC-COCA: Network Coding-Based Cooperative Caching Scheme. 976-980 - Clarence Goh, John C. Devlin, Dennis Deng, Andrew McDonald, Muhammad Ramlee Kamarudin:

Uncorrelated Weighted Median Filtering for Noise Removal in SuperDARN. 981-988
Ubiquitous System, Services, and Applications II
- Yuan Zhao, Dongping Du, Ahmed Abdalla Ali, Bin Tang:

Detection of SMSP Jamming in Netted Radar System Based on Fractional Power Spectrum. 989-993 - Duksan Ryu

, Okjoo Choi, Jongmoon Baik:
Improving Prediction Robustness of VAB-SVM for Cross-Project Defect Prediction. 994-999 - Moses Olaifa, Ronell van der Merwe, Temitope Mapayi:

Agent Based Resource Discovery for Peak Request Periods in Peer-to-Peer Grid Infrastructures. 1000-1005 - Xin-Yan Xu, Zhao-Guang Liu:

Fast Intra/Inter-mode Decision for Arbitrary Downsizing Video Transcoder Using H.264/AVC Standard. 1006-1009 - Mohamed Ali, Hamza Ali, Ting Zhong, Fagen Li, Zhiguan Qin, Ahmed Abdelrahaman A. A.

:
Broadcast Searchable Keyword Encryption. 1010-1016 - Zhuo Cheng, Haitao Zhang, Yasuo Tan, Azman Osman Lim:

DPSC: A Novel Scheduling Strategy for Overloaded Real-Time Systems. 1017-1023 - Lili Lu, Song Huang, Zhengping Ren:

A Weakness-Based Attack Pattern Modeling and Relational Analysis Method. 1024-1028
Ubiquitous Media and Signal Processing I
- Pei Wang, Dongping Du, Zhaoyang Qiu, Bin Tang:

Modified Cramer-Rao Bounds for Parameter Estimation of Hybrid Modulated Signal Combining PRBC and LFM. 1029-1033 - Yunhao Li, Jun Wang, Xiaodong He, Bin Tang:

A Method for PRI Estimation of Multicomponent LFM Signals from MIMO Radars. 1034-1038 - Zhixin Shen, Xingang Liu, Lingyun Lu, Xun Wang:

A New Error Concealment Algorithm for H.264/AVC. 1039-1042 - Qi Zhang, Yunhao Li, Ying Xiong, Bin Tang:

Transmit Multi-beamforming of Wideband Signals Based on the Focusing Transform. 1043-1046 - Yinbo Liu, Xingang Liu, Binfei Shao:

Fast Intra-mode Decision Algorithm for HEVC Based on Texture Direction. 1047-1050 - Xiaoyu Luo, Ping Wei, Lu Gan:

Two-Dimensional Direction-of-Arrival Estimation Using Two Transform Matrices. 1051-1054 - Pei-Ting Wu, Shin-Hung Chang:

A Fast Media Synchronization Mechanism for Streaming Screen Recording Applications. 1055-1062
Ubiquitous Media and Signal Processing II
- Kang-Tso Wu, Shin-Hung Chang:

CRA: A Real-Time CUDA-Based Resolution Adapter in Screen Recording Applications. 1063-1070 - Guangyu Dong, Kai Lin, Keqiu Li, Huayong Luo, Xiangwen Zhang:

FMA-RRSS: Fingerprint Matching Algorithm Based on Relative Received Signal Strength in Indoor Wi-Fi Positioning. 1071-1077 - Qian Li, Weiguo Wu, Xiaxin Zhou, Zeyu Sun, Jianhang Huang:

R-FirstFit: A Reservation Based First Fit Priority Job Scheduling Strategy and Its Application for Rendering. 1078-1085 - Lingyun Lu, Xingang Liu, Xun Wang, Zhixin Shen:

Algorithm Analysis and System Implementation of Advanced Facial Information Extraction and Face Recognition under Wireless Networks. 1086-1089 - Xiaoliang Meng

, Yuwei Wang, Yunhao Wu:
Modeling Geospatial Sensor Knowledge under a Semantic Sensor Web Environment. 1090-1095 - Yingying She, Qian Wang, Yunzhe Jia, Ting Gu, Qun He, Baorong Yang

:
A Real-Time Hand Gesture Recognition Approach Based on Motion Features of Feature Points. 1096-1102 - Wei Zhang, Haofu Han, Minglu Li:

Mobile Sensing on GSM Channel Utilization at Metropolitan Scales. 1103-1108 - Chao Yang, Hua Shi, Guangtao Xue, Hongzi Zhu, Chen Qian:

Network Redundancy Elimination by Dynamic Buffer Allocation. 1109-1114
I-SPAN 2014 - The 13th International Symposium on Pervasive Systems, Algorithms, and Networks
Graphs, Algorithms, and Networks I
- Jinson Zhang, Mao Lin Huang

, Wenbo Wang, Liang Fu Lu, Zhao-Peng Meng:
Big Data Density Analytics Using Parallel Coordinate Visualization. 1115-1120 - Chuan-Min Lee, Cheng-Chien Lo:

On the Complexity of Reverse Minus Domination on Graphs. 1121-1126 - Darius A. Mulia, Charles R. Skelsey, Lihan Yao, Dougan J. McGrath, D. Frank Hsu:

When to Combine Two Visual Cognition Systems. 1127-1133 - Sheng-Lung Peng, Yin-Te Li:

On the Minimum Hub Set Problem. 1134-1137 - Bang Ye Wu, Chen-Wan Lin:

Clustered Trees with Minimum Inter-cluster Distance. 1138-1141 - Jinming Li, Laixian Peng, Yilei Ye, Renhui Xu

, Wendong Zhao, Chang Tian:
A Neighbor Discovery Algorithm in Network of Radar and Communication Integrated System. 1142-1149 - Yu-Huei Chang, Jinn-Shyong Yang, Jou-Ming Chang

, Yue-Li Wang:
Parallel Construction of Independent Spanning Trees on Parity Cubes. 1150-1154
Graphs, Algorithms, and Networks II
- Savio S. H. Tse:

Belated Analyses of Three Credit-Based Adaptive Polling Algorithms. 1155-1162 - Chia-Ping Tsai, Kuo-Yu Yang, Jui-Yu Hsieh, Hung-Chang Hsiao, Ching-Hsien Hsu:

Publish/Subscribe in NoSQL. 1163-1170 - Yi-Wen Peng, Wei-Mei Chen:

A Recursive Algorithm for General Hash Chain Traversal. 1171-1174 - Kehao Wang:

Multicast Rendezvous in Cognitive Radio Networks: A Hypercube Approach. 1175-1180 - Yuran Zhang, Ting Yue, Hongbo Wang, Anming Wei:

Predicting the Quality of Experience for Internet Video with Fuzzy Decision Tree. 1181-1187 - Lizhi Peng, Bo Yang, Yuehui Chen:

Hierarchical RBF Neural Network Using for Early Stage Internet Traffic Identification. 1188-1195 - Shidong Li, Sheng Ge:

Overlapping Local Community Detection in Directed Weighted Networks. 1196-1200
Graphs, Algorithms, and Networks III
- Yichao Cao

, Fujun Wang, Yaheng Zhang:
A Simple Voice Extraction Algorithm in a High-Noise Environment. 1201-1204 - Sijun Ren, Ping Yi, Yue Wu, Jianhua Li:

An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree. 1205-1212 - Eddie Cheng

, Ke Qiu, Zhizhang Shen
:
Connectivity Results of Hierarchical Cubic Networks as Associated with Linearly Many Faults. 1213-1220 - Zhiyong Luo, Rui Wang, Ke Chen, Yu Pang, Sheng Yang:

A Low-Power System Design of RFID Sensor Networks. 1221-1225 - Dechao Chen, Tianjian Qiao, Hongzhou Tan

, Mingming Li, Yunong Zhang
:
Solving the Problem of Runge Phenomenon by Pseudoinverse Cubic Spline. 1226-1231 - Yunong Zhang

, Jianxi Liu, Dongsheng Guo, Sitong Ding, Hongzhou Tan
:
Power-Activated WASD Neuronet Based Russian Population Estimation, Correction, and Prediction. 1232-1236
Graphs, Algorithms, and Networks IV
- Yunong Zhang

, Tianjian Qiao, Bolin Liao, Long Jin, Junwei Chen:
From Newton Fractals to Gradient Fractals in Addition to Zhang Fractals. 1237-1242 - Yunong Zhang

, Yinyan Zhang
, Dechao Chen, Zhengli Xiao, Hongzhou Tan
:
ZG Control of Populations of Lotka-Volterra Equations Using Interaction Coefficients as Inputs. 1243-1248 - Zhihua Chen, Deshi Li:

A Multiple Interfaces Routing System Embedded on FPGA. 1249-1255 - Prashant D. Joshi, Arunabha Sen, Said Hamdioui, Koen Bertels:

Region Disjoint Paths in a Class of Optimal Line Graph Networks. 1256-1260 - Huiwei Lv, Guangming Tan, Mingyu Chen, Ninghui Sun:

Reducing Communication in Parallel Breadth-First Search on Distributed Memory Systems. 1261-1268 - Puspal Bhabak, Hovhannes A. Harutyunyan, Shreelekha Tanna:

Broadcasting in Harary-Like Graphs. 1269-1276 - Liang Ma, Jianxi Fan, Lih-Hsing Hsu, Cheng-Kuan Lin:

Conditional Connectivity with Distance Requirement on Hypercube. 1277-1281
Parallel and Distributed Systems
- Ruini Xue, Zhongyang Guan, Shengli Gao, Lixiang Ao:

NM2H: Design and Implementation of NoSQL Extension for HDFS Metadata Management. 1282-1289 - Sheng-Hui Liu, Shi-Jia Liu, Shi-Xuan Chen, Kun-Ming Yu:

IOMRA - A High Efficiency Frequent Itemset Mining Algorithm Based on the MapReduce Computation Model. 1290-1295 - Jinho Ahn:

N Fault-Tolerant Sender-Based Message Logging for Group Communication-Based Message Passing Systems. 1296-1301 - Yuan Xue, Yongmei Lei:

LRU-MRU with Physical Address Cache Replacement Algorithm on FPGA Application. 1302-1307 - Cho-Chin Lin, Zong-De Jian, Ching-Hsien Hsu:

A Strategy of Service Quality Optimization for Live Virtual Machine Migration. 1308-1313 - Amar Aissani

:
Work and Sojourn Time in an M/G/1 Retrial Queue with Breakdowns. 1314-1319 - Zhen Yang, Xing Liu:

Dynamic Clone Sharing Scheme in Mobile Cloud Computing: A Delaunay Triangulation Approach. 1320-1325 - Jing Zhang, Shanshan Li, Xiangke Liao, Xiaodong Liu:

Aggregation Decoding for Multi-failure Recovery in Erasure-Coded Storage. 1326-1331 - Yongmei Wei

, Yong Wee Foo, Khai Cher Lim, Fengmin Chen:
The Auto-configurable LDPC Codes for Distributed Storage. 1332-1338
Mobile Computing and Communication I
- Mohamed Y. E. Simik

, Feng Chi, Abdeldime M. S. Abdelgader, Randa S. I. Saleh:
Design of Simple Bleeding Detector and Alarm System Using RF Transceiver and GSM System. 1339-1343 - Keqiang Xie, Jun Lin, Lei Wu:

Design and Implementation of Flow Mobility Based on D-PMIPv6. 1344-1349 - Xiaoying Chang, Kai Liu, Zhen Xu, Feng Liu:

A Relay-Optimized Cooperative MAC Protocol for Mobile Ad Hoc Networks. 1350-1355 - Xiaojun Li, Quanzhong Li, Kai Liu:

Opportunistic Spectrum Sharing with Quality-of-Service Support in Cognitive Radio Networks. 1356-1361 - Yin Li

, Xuebing Zhao, Hao Tang, Qi Wang, Sanfeng Zhang:
Dynamics Nature and Link Prediction Methods in Opportunistic Networks. 1362-1368 - Hongyan Wang, Jing Ma, Yongshan Liu, Wenyuan Liu, Lin Wang:

Bi-directional Probing for Neighbor Discovery. 1369-1375 - Peng Duan, Laixian Peng, Yilei Ye, Renhui Xu

, Wendong Zhao, Chang Tian:
An All-to-All-Broadcast Oriented MAC Protocol Using Directional Antennas in Ad Hoc Networks. 1376-1381
Mobile Computing and Communication II
- Yangda Zhu, Changhai Wang, Jianzhong Zhang, Jingdong Xu:

Human Activity Recognition Based on Similarity. 1382-1387 - Tzung-Shi Chen, Hua-Wen Tsai, Cheng-Hsien Tsai, Yow-Chwen Leu:

Crowdsensing Service by Mining Trajectory Patterns in Wireless Sensor Networks. 1388-1395 - Abdeldime M. S. Abdelgader, Lenan Wu:

A Secret Key Extraction Technique Applied in Vehicular Networks. 1396-1403 - Li Zhao, Xueyan Huang, Yong Li, Liu Liu, Huiling Jiang, Kazuki Takeda, Xiaodong Ji:

Uplink Power Control for Dual Connectivity. 1412-1416 - Huan Zhou, Shouzhi Xu, Dong Ren, Chungming Huang:

Reliable Delivery of Warning Messages in Partitioned Vehicular Ad Hoc Networks. 1417-1423
Mobile Computing and Communication III
- Chen Chen, Xiaodong Ji, Jun Wang, Tingting Wang, Yong Li, Wenbo Wang:

Full Duplex with Buffer-Aided Relay. 1424-1429 - Mhair Kashif:

Secure SMS Communication Using Encryption Gateway and Digital Signature. 1430-1434 - Peiyan Yuan

, Ping Liu, Shaojie Tang:
Exploiting Partial Centrality of Nodes for Data Forwarding in Mobile Opportunistic Networks. 1435-1442 - Xiaofei Luo, Guozhu Liu, Huawei Huang

:
Buffer Capacity-Constrained Epidemic Routing Model in Mobile Ad-Hoc Networks. 1443-1448 - Md Arquam

, C. P. Gupta, M. Amjad:
Delay Constrained Routing Algorithm for WSN with Mobile Sink. 1449-1454 - Peter He, Jie Luo, Lian Zhao, Yujun Kuang:

Optimal Power Allocation for Energy Harvesting and Grid Power Hybrid Systems. 1455-1460
Cyber Physical Systems I
- Qifan Yang, Hao Tang, Xuebing Zhao, Yin Li

, Sanfeng Zhang:
Dolphin: Ultrasonic-Based Gesture Recognition on Smartphone Platform. 1461-1468 - Yuan Yuan, Changhai Wang, Jianzhong Zhang, Jingdong Xu, Meng Li:

An Ensemble Approach for Activity Recognition with Accelerometer in Mobile-Phone. 1469-1474 - Tao Wang, Chongli Niu, Lianglun Cheng:

A Two-Phase Context-Sensitive Service Composition Method with the Workflow Model in Cyber-Physical Systems. 1475-1482 - Nirin Thanirat, Sudsanguan Ngamsuriyaroj:

The Effect of Attacks on DCT-Based Features for Image Copy Detection. 1483-1488 - Wei Li, Qibo Sun, Shangguang Wang

:
Context-Based Web Service Reputation Measurement. 1489-1496
Cyber Physical Systems II
- Michael Vogl, Jang-Yoon Kim, Shin-Dug Kim:

A Fruit Recognition Method via Image Conversion Optimized through Evolution Strategy. 1497-1502 - Mingliu Liu

, Deshi Li, Haili Mao:
A Design and Implementation of Information Service Architecture for Resource-Constraint Devices in Internet of Things. 1503-1508 - Zhen Yang, Deshi Li:

IoT Information Service Composition Driven by User Requirement. 1509-1513 - Linlin You

, Gianmario Motta, Kaixu Liu, Tianyi Ma:
A Pilot Crowdsourced City Governance System: CITY FEED. 1514-1519
Information and Cyber Security
- Rekha Kashyap

, Deo Prakash Vidyarthi:
Security-Aware Real-Time Scheduling for Hypervisors. 1520-1527 - Jie He, Yuexiang Yang, Xiaolei Wang, Chuan Tang, Yingzhi Zeng:

PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time. 1528-1535 - Quan Zhou, Xiuzhen Chen, Changsong Chen:

Authoritative Scholarly Paper Recommendation Based on Paper Communities. 1536-1540 - Minsu Park, Hyunsung Kim, Sung-Woon Lee

:
Privacy Preserving Biometric-Based User Authentication Protocol Using Smart Cards. 1541-1544 - Li Yuan:

Multimodal Cryptosystem Based on Fuzzy Commitment. 1545-1549 - Faouzi Jaïdi

, Faten Labbene Ayachi:
An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies. 1550-1557 - Yihua Ding, James Zijun Wang, Pradip K. Srimani:

Self-Stabilizing Selection of Influential Users in Social Networks. 1558-1565
FCST 2014 - The 8th International Conference on Frontier of Computer Science and Technology
Parallel and Distributed Computing I
- Jiafen Zhang, Feiyan Mu, Qingang Shi, Xiaodong He:

Design and Implementation of Multi-channel Wideband and RF Signal Generator. 1566-1569 - Sijun Ren, Ping Yi, Zhuqiulong Lin, Chenxi Guo, Yue Wu:

Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks. 1570-1576 - Yue Jia, Chris I. Phillips:

Fast and Reliable IP Recovery for Overlay Routing in Mission Critical Message Oriented Middleware. 1577-1584 - Yinbo Liu, Xingang Liu, Peicheng Wang:

A Texture Complexity Based Fast Prediction Unit Size Selection Algorithm for HEVC Intra-coding. 1585-1588 - Hongyan Mao, Li Yuan, Zhengwei Qi:

A Load Balancing and Overload Controlling Architecture in Clouding Computing. 1589-1594 - Shuyan Jiang, Jie Peng, Zhi Lu, Junjie Jiao, Shanshan Jiang:

802.11ad Key Performance Analysis and Its Application in Home Wireless Entertainment. 1595-1598
Parallel and Distributed Computing II
- Jing Zhang, Li Xu, Hui Lin:

A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast Networks. 1599-1604 - Qi Zhou, Junming Zhang, Jinglin Li, Shangguang Wang

:
Discovering Regional Taxicab Demand Based on Distribution Modeling from Trajectory Data. 1605-1610 - Guocheng Yang, Leiting Chen, Hang Qiu:

Detail-Enhanced Multimodal Medical Image Fusion. 1611-1615 - Linlin Wang, Shiji Xiahou, Yi Kang:

The Interactive Design and Performance Study of Instrument Panels Based on the Single-Handed Keyboard Mouse. 1616-1620 - Tingting Wu, Yunwei Dong, Ning Hu:

Formal Specification and Transformation Method of System Requirements from B Method to AADL Model. 1621-1628
Trust, Security, and Privacy
- Jianhong Zhang, Weina Zhen:

Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud Computing. 1629-1636 - Yan Wen, Youyuan Fang, Jinjing Zhao, Xiang Li:

Shielding Your Privacy with the Local-Booted Virtual Machine. 1637-1643 - Maryam Saeed, Ali Mackvandi, Mehdi Taghavi, Mohammad Zare Bidoki, Mehdi Ghasemi

, Ali Neshati:
Is Really NACK Protocol Secure to Be Employed in MANETs? 1644-1647 - Weidong Huang

:
Evaluating Graphs from a New Perspective. 1648-1652 - Jihong Liu, Yutao Fu, Qi Zhang, Yuting Geng:

Study of Target Face Search Algorithm for Video Advertisement. 1653-1657 - Tilong Qi, Yongmei Lei:

The Parallel Implementation of Interval Global Optimization Algorithm and Its Application. 1658-1663 - Naiyana Boonnak, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn:

Classification of Drowsiness in EEG Records Based on Energy Distribution and Wavelet-Neural Network. 1664-1668
Automation and Control Engineering
- Han Li, Yuzhuo Fu, Ting Liu, Jiafang Wang:

Fast Protocol Decoding in Parallel with FPGA Hardware. 1669-1673 - Lin Gao, Xu Tang, Ping Wei:

Real-Time Implementation of Particle-PHD Filter Based on GPU. 1674-1678 - Haitham Barkallah, Mariem Gzara

, Hanêne Ben-Abdallah
:
Dynamic and Adaptive Topology-Aware Load Balancing for Grids. 1679-1684 - Nan Li, Jianmin Pang, Zheng Shan:

Migration of CUDA Program Based on a Divide-and-Conquer Method. 1685-1691 - Bryan Barnard, Massimo Di Pierro:

Extending Collection+JSON and Automatic CRUD Interfaces. 1692-1696 - Qiaochu Li, Jian Zhang, Yuhan Wang, Kary Kang:

Credit Risk Classification Using Discriminative Restricted Boltzmann Machines. 1697-1700 - Ji Geng, Yunling Lu, Wei Chen, Zhiguang Qin:

An Improved Text Categorization Algorithm Based on VSM. 1701-1706
Pattern Recognition and Artificial Intelligence
- Yuxiang Xie, Xidao Luan, Xin Zhang, Chen Li, Liang Bai:

A Cartoon Image Annotation and Retrieval System Supporting Fast Cartoon Making. 1707-1714 - Kun Jiang, Xingshen Song, Yuexiang Yang:

Performance Evaluation of Inverted Index Traversal Techniques. 1715-1720 - Junyi Li, Jianhua Li:

Remote Sensing Image Classification Based on Hybrid Entropy and L1 Norm. 1721-1726 - Junyi Li, Jianhua Li, Shuicheng Yan:

Multi-instance Learning Using Information Entropy Theory for Image Retrieval. 1727-1733 - Xun Wang, Xingang Liu, Lingyun Lu, Zhixin Shen:

A New Facial Expression Recognition Method Based on Geometric Alignment and LBP Features. 1734-1737 - Qijun Shen, Jian Cao, Hua Gu:

A Similarity Network Based Behavior Anomaly Detection Model for Computer Systems. 1738-1745 - Zheming Dong, Lei Zhang, Jiangtao Li

:
Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing. 1746-1751 - Muhammad Asad Khan, Supeng Leng, Ahmer Khan Jadoon, Jiechen Yin:

Backup Backhaul for Femtocells. 1752-1757
Multimedia Systems and Networks
- Chen Li, Yuxiang Xie, Xidao Luan, Kaichao Zhang, Liang Bai:

Automatic Movie Summarization Based on the Visual-Audio Features. 1758-1761 - Lan Zhang, Xingang Liu, Kaixuan Lu:

SVD-Based 3D Image Quality Assessment by Using Depth Information. 1762-1765 - Juanxiong Xu, Lun Tang, Qianbin Chen

, Li Yi:
Study on Based Reinforcement Q-Learning for Mobile Load Balancing Techniques in LTE-A HetNets. 1766-1771 - Xing Gao, Jing Liu, Juncong Lin, Minghong Liao, Lisheng Xiang:

Contour-Preserved Retargeting of Cartoon Images. 1772-1778 - Juncong Lin, Guangyu Zhang, Xing Gao, Minghong Liao, Lisheng Xiang:

Realtime Illustrative Rendering of Large Scale Skinned Meshes. 1779-1784 - Kai Kang, Xingang Liu, Kaixuan Lu:

3D Image Quality Assessment Based on Texture Information. 1785-1788 - Hao Sun, Jim X. Chen, Harry Wechsler, Yongquan Jiang:

A New Segmentation Method for Broadcast Sports Video. 1789-1793 - Tao Wu:

Efficient Recording of Parallel Chien Search Results of BCH Code by Three-Staged and Group-Sorted Circuit. 1794-1798 - Mohamed Y. E. Simik

, Feng Chi, Abdeldime M. S. Abdelgader, Randa S. I. Saleh:
Automated Alarm System for Diaper Wet Using GSM. 1799-1803
Embedded Computing and Systems
- Faiz Al Faisal

, M. M. Hafizur Rahman
, Yasushi Inoguchi:
Dynamic Communication Performance of STTN under Various Traffic Patterns Using Virtual Cut-Through Flow Control. 1804-1809 - Chuang Guan, Junjian Bi, Zhiliang Tan, Zhaoxiang Meng:

Analysis and Design of Conical Equiangular Spiral Antenna Using MPIE and QGA Technique. 1810-1813 - Guohua Bai:

An Organic View of Prototyping in Information System Development. 1814-1818 - Xiaojun Zhang, Chunxiang Xu:

Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption. 1819-1826 - Zhongxing Liang, Dan Liu, Ming Zhou:

Research on Large Scale 3D Terrain Generation. 1827-1832 - Xiaoying Zhang, Alagan Anpalagan

, Lei Guo:
Performance Improvement of Energy-Aware MANET Routing Algorithm Using Load-Balancing. 1833-1837 - Wenbo Wang, Mao Lin Huang

, Liang Fu Lu, Jinson Zhang:
Improving Performance of Forensics Investigation with Parallel Coordinates Visual Analytics. 1838-1843
Emerging Software Techniques
- Xiaohui Zeng, Yibing Shi, Yi Lian:

A Particle PHD Filter with Improved Resampling Design for Multiple Target Tracking. 1844-1849 - Maoqi Luo, Xuelian Yu, Yun Zhou, Xuegang Wang:

Research on Effect of Antenna Beamwidth for Compressive Sensing Based GPR Imaging. 1850-1854 - Lina Wei, Ying Liu:

A License Plate Super-resolution Reconstruction Algorithm Based on Manifold Learning. 1855-1859 - Po-Jen Chuang, Wei-Chin Wong:

Generating Snapshot Backups in Cloud Virtual Disks. 1860-1863 - Jian Zhang, Shuo Zhang, Wuyi Zhang, Kary Kang:

Learning Sparse Representation by K-SVD for Stock Classification. 1864-1867 - B. N. Manjunatha Reddy

, H. N. Sheshagiri, B. R. Vijayakumar, Shanthala S:
Implementation of Low Power 8-Bit Multiplier Using Gate Diffusion Input Logic. 1868-1871 - Zhenpeng Liu, Xianchao Zhu, Shouhua Zhang:

Multi-authority Attribute Based Encryption with Attribute Revocation. 1872-1876
Applications, Business and Social Issues
- Jie Xu, Chengyi Gao, Yahong Yu, Jian Sun:

Optimal Control of an Improved SIR Model Based on Cholera Spreading. 1877-1881 - Jian Li, Hanyi Du, Yingru Liu

, Kai Zhang, Hui Zhou:
Extended Gradient Local Ternary Pattern for Vehicle Detection. 1882-1885 - Takenori Shimosaka, Hitoshi Murai, Mitsuhisa Sato:

A Design of a Communication Library between Multiple Sets of MPI Processes for MPMD. 1886-1893 - Xiaolin Meng, Gangyong Jia, Jian Wan, Jilin Zhang:

Pseudo Share: Bring Shared to Exclusive for Main Memory in Multi-core Systems. 1894-1899 - Jian Zhang, Song Zhang, Zhihong Dan, Chufan Jiang:

Variable Universe Fuzzy PID Control for Multi-level Gas Tank Pressure. 1900-1904 - Xiaojun Liu, Fangying Du, Junyi Li:

SSH: Image Index Based on Sparse Spectral Hashing. 1905-1908 - Qing Lei, Yingtao Jiang, Mei Yang:

Evaluating Open IaaS Cloud Platforms Based upon NIST Cloud Computing Reference Model. 1909-1914
CPS and Internet of Things
- Cui Yang, Bo Yuan, Ye Tian, Zongming Feng, Wei Mao:

A Smart Home Architecture Based on Resource Name Service. 1915-1920 - Limei Lin

, Li Xu, Shuming Zhou, Wei Wu:
The Social Feature-Based Priority Relation Graph of Mobile Social Networks. 1921-1926 - Jie Duan, Xiong Wang, Sheng Wang, Shizhong Xu:

Cache Management for Information-centric Networking. 1927-1933 - Qiu Chen, Koji Kotani, Feifei Lee, Tadahiro Ohmi:

Face Recognition Using Markov Stationary Features and Vector Quantization Histogram. 1934-1938 - Qingqiang Wu, Yan Zheng, Yingying She, Xinying An:

Emerging Topic Detection Model Based on LDA and Its Application in Stem Cell Field. 1939-1944 - Yong Li, Jizhong Han

, Wei Zhou:
Cress: Dynamic Scheduling for Resource Constrained Jobs. 1945-1952 - Yanjiang Wei, Rui Wang, Danfeng Zhu, Zhongzhi Luan, Depei Qian:

Lessons from Experimental Methodology of Cache Hierarchy Changes with the Memory Technology. 1953-1959 - Zhenpeng Liu, Ding Guo, Xizhong Zhang, Xu Wang, Xianchao Zhu:

An Improved Semi-supervised K-Means Algorithm Based on Information Gain. 1960-1963 - Jinrong Zhong, GongJian Wen, CongHui Ma, Boyuan Ding:

Time-Domain Dictionary for Sparse Representation of Radar High Resolution Range Profile. 1964-1967 - Jie Wen, Jiao Dai

, Jizhong Han
, Fangchun Di, Hu Yan:
Llama: Distributed Multi-versioned Model Data Management for SCADA. 1968-1973 - Xiaodong He, Jun Zhu, Jun Wang, Dongping Du, Bin Tang:

False Target Deceptive Jamming for Countering Missile-Borne SAR. 1974-1978

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














