


default search action
12th DASC 2014: Dalian, China
- IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, DASC 2014, Dalian, China, August 24-27, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5079-9

DASC 2014: 12th IEEE International Conference on Dependable, Autonomic and Secure Computing
- Yang Gu, Zhenchun Huang

:
Robinia-BLAST: An Extensible Parallel BLAST Based on Data-Intensive Distributed Computing. 1-6 - Anand V. Akella, Kaiqi Xiong

:
Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN). 7-13 - Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab:

A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems. 14-19 - Jinho Ahn, Yoohwan Kim:

Effective SBML Protocol for Tolerating Concurrent Failures Based on Broadcast Networks. 20-25 - Yan Wen, Jinjing Zhao, Hua Chen:

Towards Thwarting Data Leakage with Memory Page Access Interception. 26-31 - Hiroyuki Kido, Yukio Ohsawa

, Makoto Hirai, Yoshifumi Yuasa, Toshinori Takai:
Towards Argumentation Schemes for Open Systems Dependability. 32-38 - Yi Cai, Xudong Liu:

A Multi-use CCA-Secure Proxy Re-encryption Scheme. 39-44 - Wenbing Zhao:

Application-Aware Byzantine Fault Tolerance. 45-50 - Xinfeng Ye:

A Study of Security Requirements Negotiation. 51-56 - Xuewei Feng, Dongxia Wang, Minhuan Huang, Xiao Xia Sun:

An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining. 57-62 - Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:

Android App Protection via Interpretation Obfuscation. 63-68 - Gen Li, Shuangxi Wang, Ying Zhang, Xiaohui Peng:

Hunter: Online Accurate Taint Propagation Analysis Based System for Detecting Bugs in Binaries. 69-74 - Shuai Shao, Guowei Dong, Tao Guo, Tianchang Yang, Chenjie Shi:

Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications. 75-80 - Yong Zhao, Aixin Zhang, Songnian Lu:

The DWT Group Fingerprinting Scheme. 81-84 - Huaqun Wang:

Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter Ciphertext. 85-90 - Wang Jie, Yu Xiao, Zhao Ming, Wang Yong:

A Novel Dynamic Ranked Fuzzy Keyword Search over Cloud Encrypted Data. 91-96 - Wei Zhang, Yue-Ji Wang, Xiao-Lei Wang:

A Survey of Defense against P2P Botnets. 97-102 - Yang Shang, Zhiyang Li, Wenyu Qu, Yujie Xu, Zining Song, Xuefei Zhou:

Scalable Collaborative Filtering Recommendation Algorithm with MapReduce. 103-108 - Hua Chai, Wenbing Zhao:

Byzantine Fault Tolerant Event Stream Processing for Autonomic Computing. 109-114 - Xiaofeng Tang, Aiqiang Xu, Wenhai Li, Zhiyong Yang:

Fault Models of CMOS Gates: An Empirical Study Based on Mutation Analysis. 115-120 - Hui Li, Weishi Zhang, Weifu Zhou, Bo Su:

A Novel Vulnerability Detection Method for ZigBee MAC Layer. 121-124 - Muhammad Khurram Khan

, Saru Kumari
, Xiaomin Wang, Rahul Kumar:
Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme. 125-128 - Zhengjun Bi, Changzheng Gao:

Power System Dynamic Voltage Stability Analysis Considering Wind Power. 129-132 - Xu Zhou, Gen Li, Kai Lu, Shuangxi Wang:

Enhancing the Security of Parallel Programs via Reducing Scheduling Space. 133-138 - Kaiyu Wan, Vangalur S. Alagar:

Achieving Dependability of Cyber Physical Systems with Autonomic Covering. 139-145 - Tingting Wang, Zhaobin Liu, Yi Chen, Yujie Xu, Xiaoming Dai:

Load Balancing Task Scheduling Based on Genetic Algorithm in Cloud Computing. 146-152 - Yuanyuan Li, Wenyu Qu, Zhiyang Li, Yujie Xu, Changqing Ji, Junfeng Wu:

Skyline Query Based on User Preference with MapReduce. 153-158
EmbeddedCom 2014: 12th IEEE International Conference on Embedded Computing
- Rehana Begam, Dakai Zhu, Hakan Aydin:

Preference-Oriented Fixed-Priority Scheduling for Real-Time Systems. 159-165 - Mabel Mary Joy, Wolfgang Müller, Franz-Josef Rammig:

Source Code Annotated Memory Leak Detection for Soft Real Time Embedded Systems with Resource Constraints. 166-172 - Babar Shah

, Chung-Jae Lee, Ki-Il Kim
:
Fuzzy Search Controller in Unstructured Mobile Peer-to-Peer Networks. 173-178 - Jun Xia, Li Luo, Zhengbin Pang, Jun Zhang, Junsheng Chang:

A Low Overhead Last-Write-Touch Prediction Scheme. 179-183 - Tyng-Yeu Liang, Hung-Fu Li, Yu-Chih Chen:

A Ubiquitous Integrated Development Environment for C Programming on Mobile Devices. 184-189 - Chin-Fu Kuo:

Energy-Efficient Scheduling for Real-Time Tasks on Uniform Multiprocessors. 190-195 - Mohammadreza Rezaee, Yasser Sedaghat

, Masoud Khosravi Farmad:
A Confidence-Based Software Voter for Safety-Critical Systems. 196-201 - Kyung Tae Kim, Jong Chang Park, Manyun Kim, Ung-Mo Kim, Hee Yong Youn:

A Spanning Tree Based Data Collection for Real-Time Streaming Sensor Data. 202-207 - Shengyan Zhou, Yongxin Zhu, Chaojun Wang, Xiaoqi Gu, Jun Yin, Jiang Jiang, Guoguang Rong

:
An FPGA-Assisted Cloud Framework for Massive ECG Signal Processing. 208-213 - Yaying Zhang, Xiuqing Lu, Chen Ye:

Distributed Collaborative Vehicle Tracking in Embedded Smart Camera Networks. 214-218 - Byung Jun Lee, Ho Kuen Song, Youngho Suh, Kyung Hwan Oh, Hee Yong Youn:

Energy-Efficient Gossiping Protocol of WSN with Realtime Streaming Data. 219-224 - Jun Wu

:
Energy-Efficient Scheduling of Real-Time Tasks with Lock-Free Objects. 225-230 - Yantao Gao, Hao Gao, Xudong Zhang:

MIMO Radar Algorithm Parallel Implementation Based on TMS320C6678. 231-236 - Zhishan Guo

, Sanjoy K. Baruah:
Mixed-Criticality Scheduling upon Varying-Speed Multiprocessors. 237-244 - Xiaokai Chang, Xue Wei:

Parallel Implementation of Feasible Direction Algorithm for Large-Scale Sensor Network Location Problems. 245-251 - Xianfeng Li, Zhiqiang Bao:

Performance Characterization of Web Applications with HTML5 Enhancements. 252-258
PICom 2014: 12th IEEE International Conference on Pervasive Intelligence and Computing
- Qi Zhang, Zhiyang Li, Yegang Du

, Wenyu Qu, Xiaoxuan Zhang:
A Novel Progressive Transmission in Mobile Visual Search. 259-264 - Dejun Yue, Ge Yu, Derong Shen, Xiaocong Yu:

A Weighted Aggregation Rule in Crowdsourcing Systems for High Result Accuracy. 265-270 - Jean Loup Lamothe, James She, Xiaoqi Tan

:
Cyber-Physical Directory with Optimized Visualization. 271-276 - Tiantian Li, Ge Yu, Xuebing Liu, Jie Song:

Analyzing the Waiting Energy Consumption of NoSQL Databases. 277-282 - Yufeng Wang, Athanasios V. Vasilakos

, Qun Jin, Jianhua Ma:
A Wi-Fi Direct Based P2P Application Prototype for Mobile Social Networking in Proximity (MSNP). 283-288 - Soo Dong Kim, Jae Yoo Lee, Dae Young Kim, Chun Woo Park, Hyun Jung La:

Modeling BPEL-Based Collaborations with Heterogeneous IoT Devices. 289-294 - Wenxiang Li, Yunhe Wu, Chunsheng Zhu, Yajie Ma:

Performance Comparison of Source Routing Tactics for WSN of Grid Topology. 295-300 - Heng Qi, Haibo Xu, Keqiu Li, Jingyi Li:

A Shape Clustering Based Framework for Fast Context-Sensitive Shape Retrieval. 301-304 - Chien-Fu Cheng

, Chih We Huang, Meng-Shiuan Pan
:
A Matching Algorithm with Low Message Overhead for Sensor Relocation Problem. 305-309 - Tao Zhang

, Qi Zhang, Dequn Liang:
A Novel Probabilistic Latent Semantic Analysis Based Image Blur Metric. 310-315 - Hyun Jung La, Jae Yoo Lee, Zhen Zhe Piao, Soo Dong Kim:

An Efficient Context Acquisition for 'n' Mobile Apps. 316-321 - Kai Shuang, Xuan Shan, Zhengguo Sheng, Chunsheng Zhu:

An Efficient ZigBee-WebSocket Based M2M Environmental Monitoring System. 322-326 - Jicheng Hu, Xiaofeng Wei, Honglin He:

Brain Image Segmentation Based on Hypergraph Modeling. 327-332 - Zhimin Li, Weijiang Liu, Zhiyang Li, Jingxia Sun:

A Bitmap-Based Algorithm for Detecting Stealthy Superpoints. 333-337 - Junfeng Wu, Zhiyang Li, Yujie Xu, Changqing Ji, Yuanyuan Li, Xufeng Xing:

Color Image Retrieval Using Visual Weighted Blocks. 338-343 - Shuai Wang, Zhijun Li, Shouxu Jiang:

Distributed Energy-Efficient Power Control Algorithm of Delay Constrained Traffic over Multi Fading Channels. 344-349 - Yong Liu, Qiangfu Zhao, Yan Pei

:
Ensemble Learning with Correlation-Based Penalty. 350-353 - Hui Qi, Yanheng Liu, Da Wei:

GPS-Based Vehicle Moving State Recognition Method and Its Applications on Dynamic In-Car Navigation Systems. 354-360 - Xiujuan Xu, Wei Wang, Yu Liu, Hong Yu, Xiaowei Zhao:

iDBMM: A Novel Algorithm to Model Dynamic Behavior in Large Evolving Graphs. 361-366 - Chuanwei Xu, Shuo Yang, Jiting Huang, Changqing Ji:

Ontology Based Heterogeneous Data Integration Framework Facing Mobile Environment. 367-371 - Peng Ke, Wenxiang Li, Yunhe Wu:

Research on Multiple Services Scheduling Based on Priority-Queuing Model. 372-376 - Xiaowei Zhao, Hong Yu, Zhenzhen Xu, Tinlin Tian, Xiujuan Xu:

The Role of Probability of Learning and Reconnecting in the Evolution of Cooperation. 377-381 - Jaya Bhattacharjee, Anita Pal, Sajal Mukhopadhyay, Anirban Bharasa:

Incentive and Quality Aware Participatory Sensing System. 382-387
TrustData 2014: Fifth IEEE International Workshop on Trust, Security and Privacy for Big Data
- Weilong Ruan, Zhengjun Zhai:

Kernel-Level Design to Support Partitioning and Hierarchical Real-Time Scheduling of ARINC 653 for VxWorks. 388-393 - Xingzhe Hou, Chong Liu, Hongliang Sun, Yuangang Tan, Rong He, Yingchun Zheng:

A Method for Large-Scale Access in Smart Power Consumption Field Based on Stateless Load Balancing. 394-399 - Yunzhi Jin, Hua Zhou, Hongwei Kang

, Jinzhuo Liu, Na Zhao:
An Approach to Resources Management of Software Evolution Processes Based on 3S. 400-405 - Mikhail Zolotukhin, Timo Hämäläinen

, Tero Kokkonen, Jarmo Siltanen:
Analysis of HTTP Requests for Anomaly Detection of Web Attacks. 406-411 - Liang Liu, Yanjun Hu, Hua Qian, Xuming Pei:

The Low-Power and Long-Distance System Based on Wireless Sensor Networks. 412-417 - Lichen Zhang:

Convergence Approach to Model Physical World and Cyber World of Aviation Cyber Physical System. 418-423 - Xingzhe Hou, Yuangang Tan, Hongliang Sun, Gang Wang, Ying Wang, Yali Wang:

A Visualization Representation Method Based on GIS & RIA and Its Application in Interactive Power Utilization Field. 424-428
SDSN 2014: Second International Workshop on Software Defined Sensor Networks
- Xigui Wang, Xianfeng Li, Wen Wen:

WLCleaner: Reducing Energy Waste Caused by WakeLock Bugs at Runtime. 429-434 - Di Zheng, Jun Wang, Ben Kerong:

Research of QoC Based Management for Complex Sensor Networks Applications. 435-440 - Tran Van Dung, Ittetsu Taniguchi

, Hiroyuki Tomiyama:
Cache Simulation for Instruction Set Simulator QEMU. 441-446 - Guoqiang Hang, Xuanchang Zhou, Xiaohui Hu:

Design of Dynamic Digital Circuits with n-Channel Multiple-Input Floating-Gate Transistors. 447-452 - Saif-Ur Rehman, Gang Cui, Jianmin Bao:

Post Deployment Encryption Key Generation for a Fully Connected and Secure Wireless Sensor Network. 453-458 - Jun-Ho Seo, Guy Martin Tchamgoue, Kyong Hoon Kim:

Power-Aware Real-Time Virtual Machine Schedulers in Discrete DVFS Systems. 459-463 - Amjad Ali, Kyong Hoon Kim:

Compositional Real-Time Scheduling of Mixed-Criticality Real-Time Systems. 464-469 - Yuanyuan Fan, Dajun Xiao, Xu Mei, Chao Liu, Xuesong Yan, Chengyu Hu:

A Software-Defined Intelligent Method for Antenna Design. 470-474 - Qingzhong Liang, Hui Li, Yuanyuan Fan, Xuesong Yan, Chengyu Hu

, Hong Yao:
SAPSN: A Sensor Network for Signal Acquisition and Processing. 475-478 - Bin Cheng, Linlin Ci, Chengping Tian, Xuanya Li, Minghua Yang:

Contention Window-Based MAC Protocol for Wireless Sensor Networks. 479-484 - Chengping Tian, Linlin Ci, Bin Cheng, Xuanya Li:

A 3D Location-Based Energy Aware Routing Protocol in Delay Tolerant Networks. 485-490 - Xupeng Fang, Lidong Zhai, Zhaopeng Jia, Wenyan Bai:

A Game Model for Predicting the Attack Path of APT. 491-495
AEIT 2014: International Workshop on Assistive Engineering and Information Technologies
- Di Zheng, Jun Wang, Ben Kerong:

Research of Context-Aware Component Adaptation Model in Pervasive Environment. 496-501 - Fucheng Cao, Xianwei Wang, Xin Li:

Fuzzy Adaptive PID Control of a Mobile Assistive Robot Platform. 502-506 - Xin Li, Fucheng Cao:

Location Based TOA Algorithm for UWB Wireless Body Area Networks. 507-511 - Xiaoli Wang, Ping Feng, Lirong Wang, Yajuan Song:

The Study and Development of the Automatic Scoring System for Answer Sheet of Blind Students. 512-515 - Liye Ren, Lifeng Ren, Yajuan Song, Ping Feng:

Research on Identification Modeling for Rehabilitation Training Control System for Stroke Patients' Lower Limbs Based on Support Vector Machine. 516-519 - Wanli Zhang, Guoxin Li, Lirong Wang:

Research on the Control Method of Inverted Pendulum Based on Kalman Filter. 520-523 - Lifeng Ren, Liye Ren, Jing Wang, Xiaoli Wang:

Application and Optimization of RSM Algorithm in Aqueous Two-Phase Extraction. 524-527 - Yajuan Song, Ping Feng, Xiaoli Wang, Kai Xing:

The Evaluation of Massage Skill of Palm Press Based on Dynamics and Kinematical Data. 528-531 - Ping Feng, Xiaoli Wang, Ya-Juan Song, Li-Ye Ren:

The Research of Wavelet Analysis for sEMG in Massage Assessment. 532-535 - Lei Shi, Zhen Liu:

Design of Soft Human-Robot Interface Based on Neuro-Muscular-Skeletal Model. 536-541 - Xiaomei Zhang, Gang Zhao, Yongyang Xu:

Practice and Research on Construction of Corpus for Natural Sign Language. 542-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














