


default search action
EIDWT 2013: Xi'an, Shaanxi, China
- 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5044-2 [contents]

EIDWT 2013-Fourth International Conference on Emerging Intelligent Data and Web Technologies
Session 1: Database and Web Services
- Wei Lin, Changjun Hu, Yang Li, Xin Cheng:

Virtual Dataspace - A Service Oriented Model for Scientific Big Data. 1-5 - Gui-Cheng Wu, Jie Yang, De-You Tang:

Web Service Automatically Layout Generation Method. 6-10 - Lingyan Bi, Jie Yang:

Web Service Combination Algorithm by Using QoS Constraint. 11-16
Session 2: Wireless Networks
- Jan Sang, Daxiang Hong:

Protection Profile for the Smart Phone Operating System. 17-20 - Dongyan Zhang, Tao Zhang:

A Multi-channel and Real-Time Disaster Recovery Backup Method Based on P2P Streaming. 21-26 - Lei Gao, Yuan-Dong Lan:

Transmission Distance Estimation and Testing for 2.4GHz ZigBee Applications. 27-32 - Evjola Spaho

, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
, Vladi Kolici
:
Multiflow TCP Traffic in VANETs: Performance Comparison of OLSR and AODV Routing Protocols. 33-38 - Elis Kulla, Shinji Sakamoto

, Makoto Ikeda, Leonard Barolli:
Analyzing AODV Control Packets and Throughput for Different Mobility Degrees and Multiflow Traffic. 39-45
Session 3: Data Centers and Cloud Computing I
- Wenhong Wei, Qingxia Li, Ming Tao:

Parallel Prefix Algorithm on BSN-Mesh. 46-50 - Dong Liu, Yue-Long Zhao:

A New Approach to Scalable ROIA in Cloud. 51-55 - Fen Guo, Hua-Qing Min, Jie Yang:

Performance Weighted Deploying and Scheduling Strategy Research for Virtual Machine on Clouds. 56-60 - Dong Liu, Yue-Long Zhao:

An Overlapping Architecture for ROIA in Cloud. 61-65
Session 4: Data Centers and Cloud Computing II
- Peili Li, Haixia Xu:

Homomorphic Signatures for Correct Computation of Group Elements. 66-71 - Haiwen Han, Deyu Qi, Weiping Zheng, Feng Bin:

A Qos Guided Task Scheduling Model in Cloud Computing Environment. 72-76 - Weiwei Lin, Baoyun Peng, Chen Liang, Bo Liu:

Novel Resource Allocation Model and Algorithms for Cloud Computing. 77-82 - Pang Xiong Wen, Li Dong:

Quality Model for Evaluating SaaS Service. 83-87
Session 5: Data Management and Information Retrieval
- Wenliang Xie, Yanmin Li, Yijun Zhang:

Applying Information Retrieval Technology in Analyzing the Journals. 88-94 - Liying Wu, Bo Liu, Weiwei Lin:

A Dynamic Data Fault-Tolerance Mechanism for Cloud Storage. 95-99 - Zhiguang Xiong, Kang Deng, Yanping Liu, Xiaocui Yan:

The Finite Volume Element Method for a Class of Parameter Identification Problem with Overspecified-Data. 100-103 - Qun Zeng, Weihua Xu:

The Construction of Knowledge Sharing Platform in Universities under the Ubiquitous Network Environment. 104-108
Session 6: Data Modeling, Visualization, and Representation Tools
- Decheng Miao, Jianqing Xi, Jindian Su:

A Category Theoretic Method of Temporal Data Model. 109-114 - Gansen Zhao, Weichai Huang, Shunlin Liang, Yong Tang:

Modeling MongoDB with Relational Model. 115-121 - Gansen Zhao, Ziliu Li, Fujiao Liu, Yong Tang:

A Concept Drifting Based Clustering Framework for Data Streams. 122-129
Session 7: Parallel Processing and Superconvergence
- Ji Wu, Dongqing Xie, Lin Tang, Hao Wang:

Cost Evaluation of Three-Dimensional Many-Core Processors. 130-132 - Ji Wu, Dongqing Xie, Lin Tang, Hao Wang:

Cost Evaluation of Three-Dimensional Network-on-Chip. 133-136 - Bin Hu, Xiaotong Zhang, Xiaolu Zhang:

Automatic Balancing Chord: A Dynamic Load Balancing Mechanism for High Efficient. 137-144 - Kang Deng, Zhiguang Xiong, Xiaocui Yan, Yanping Liu:

Superconvergence of Discontinuous Finite Element Method for Delay-Differential Equations. 145-148 - Bin Feng, Deyu Qi, Haiwen Han:

Parallel and Multiplex Architecture of AES-CCM Coprocessor Implementation for IEEE 802.15.4. 149-153
Session 8: Knowledge Discovery and Data Mining
- Yuan-Dong Lan, Lei Gao:

A New Model of Combining Multiple Classifiers Based on Neural Network. 154-159 - Yong Hu, Bin Feng, Xiangzhou Zhang

, Kang Liu, Kang Xie, Mei Liu:
iTrade: An Adaptive Risk-Adjusted Intelligent Stock Trading System from the Perspective of Concept Drift. 160-167 - Soufiane Boulehouache, Ramdane Maamri

, Kroun Imen, Zaïdi Sahnoun:
A Fractal Component Based Knowledge Domain Model. 168-173
Session 9: Natural Inspired Computing for Collective Intelligence I
- De-Jiang Luo:

A KFDA Based on Regularization Method for Multi-classification. 174-177 - Jiahai Wang, Chenglin Zhong, Ying Zhou:

Single Objective Guided Multiobjective Optimization Algorithm. 178-183 - (Withdrawn) Enhancing Query Performance by Avoiding Negative Interactions. 184-190

Session 10: Natural Inspired Computing for Collective Intelligence II
- Xueqiang Li, Jiang Wang, Jing Xiao, Xiaoling Zhang:

Multi-objective Optimization Evolutionary Algorithm Based on Point-to-Weight Method. 191-196 - Chunlei Wu, Hao Zhang, Xue-rong Cui

, Guoping Zhang:
Codebook Beam Switching Based Relay Scheme for 60 GHz Anti-blockage Communication. 197-203 - Yiqiao Cai, Weibin Chen:

Adaptive Differential Evolution with Competent Leaders. 204-210 - Hongwei Ye, Linfang Yang, Xiaozhang Liu:

Optimizing Weight and Threshold of BP Neural Network Using SFLA: Applications to Nonlinear Function Fitting. 211-214
Session 11: Cryptographic Techniques for Data Security I
- Xiaoqing Tan, Qiong Zhang:

A Kind of Verifiable Visual Cryptography Scheme. 215-219 - Zheli Liu, Chunfu Jia, Jun Yang, Ke Yuan:

Format-Preserving Fuzzy Query Mechanism. 220-226 - Xiaoqing Tan, Zhihong Feng, Lianxia Jiang, Afen Fang:

Verifiable Quantum Secret Sharing Protocol. 227-230 - Chang-Ji Wang, Yuan Li, Xi-Lei Xu:

Forgery Attack on Two ID-Based Proxy Signature Schemes from Bilinear Pairings. 231-235
Session 12: Cryptographic Techniques for Data Security II
- Xiaoqing Tan:

A Family of Quadratic Residue Codes over Z2m. 236-240 - Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lü:

Public Key Timed-Release Searchable Encryption. 241-248 - Zheli Liu, Zhi Wang, Xiaochun Cheng

, Chunfu Jia, Ke Yuan:
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud. 249-255 - Chundong Wang, Chaoran Feng:

Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm. 256-260 - Xuan Li:

Image Encryption Scheme Based on Multiple Chaotic Maps. 261-266
Session 13: Cryptographic Techniques for Data Security III
- Baojiang Cui, Ziyue Wang, Tao Guo, Guowei Dong, Bing Zhao:

UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks. 267-272 - Jing Zhang, Ting Yang:

Clustering Model Based on Node Local Density Load Balancing of Wireless Sensor Network. 273-276 - Chang-Ji Wang, Wen-Long Lin, Hai-Tao Lin:

Design of an Instant Messaging System Using Identity Based Cryptosystems. 277-281 - Ding Yong, Wang Zheng, Xinguo Li:

A Novel Somewhat Homomorphic Encryption over Integers. 282-284
Session 14: New Cryptographic Techniques for Data Security IV
- Ping Wang

, Fangguo Zhang
:
Improving the Parallelized Pollard Rho Method for Computing Elliptic Curve Discrete Logarithms. 285-291 - Zhusong Liu:

A Secure Anonymous Identity-Based Access Control over Cloud Data. 292-295 - Xiaodan Liang, Jigang Wu, Liangyu Li:

Bio-inspired Algorithms for FPGA Implementation of RFID Base-Band Transmission Model & IP Core. 296-301 - Yanbin Zheng:

A Note on a Class of Permutation Polynomials. 302-306 - Yulin Zheng, Shaohua Tang, Chaowen Guan, Min-Rong Chen:

Cryptanalysis of a Certificateless Proxy Re-encryption Scheme. 307-312
Session 15: Web Science, Business Intelligence, and WSNs
- Salam Fraihat

:
New Semantic Indexing and Search System Based on Ontology. 313-318 - Fu-Bao Liao, Wen-Mei Zhang, Xiang-Yang Li:

An Access Control Model Based on Web Application. 319-322 - Jing Zhang, Ting Yang:

Event Driven Self-Adaptive Routing Algorithm in Wireless Sensor Network. 323-328 - Quan Zhou, Daixian Wu, Deqin Xiao, Yang Zhang, Chunming Tang:

An Energy Efficiency Trusted Dynamic Routing Protocol for Wireless Sensor Networks. 329-334
Session 16: Security and Authentication
- Zhiqiang Lin:

The Transformation from the Galois NLFSR to the Fibonacci Configuration. 335-339 - Qun Lin:

A Provably Secure Server-Aided Verification Signature. 340-343 - Quan Zhou, Deqin Xiao, Daixian Wu, Chunming Tang, Chunming Rong

:
TSHC: Trusted Scheme for Hadoop Cluster. 344-349 - Xiaoqing Tan, Lianxia Jiang, Qiong Zhang:

Controlled Quantum Teleportation with Identity Authentication. 350-355
Session 17: Security, Trust, and Reputation I
- Liyuan Xin, Zhiyong Feng, Shizhan Chen:

Experimental Study of Web Service Availability Based on WSDL Documents. 356-362 - Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lv:

Multi-user Public Key Timed-Release Searchable Encryption. 363-370 - Ruoyu Wang, Ling Zhang, Zhen Liu:

A Novel Method of Filtering Internet Background Radiation Traffic. 371-376 - Min Liu, Chunfu Jia, Lu Liu, Zhi Wang:

Extracting Sent Message Formats from Executables Using Backward Slicing. 377-384
Session 18: Security, Trust, and Reputation II
- Jie Shi, Ge Fu, Jian Weng

, Hong Zhu:
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases. 385-392 - Jianglang Feng, Baojiang Cui, Kunfeng Xia:

A Code Comparison Algorithm Based on AST for Plagiarism Detection. 393-397 - Hai-Fei Li, Li-Hua Dong, Jian-Fei Han:

A Mobile Ordering Scheme Based on LBS. 398-401 - Jian-Fei Han, Li-Hua Dong, Hai-Fei Li:

A Scalable Clock Controlled Generator Based on Cellular Automata. 402-406 - Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang:

Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security. 407-413
Session 19: Security, Trust, and Reputation III
- Lingling Xu, Shaohua Tang:

Server-Aided Verification Signatures with Privacy. 414-421 - Haiyu Wang, Gansen Zhao, Qi Chen, Yong Tang:

Trust Management for IaaS with Group Signature. 422-430 - Rufen Huang, Qiang Nong:

An Efficient Provably Secure Certificate-Based Blind Signature Scheme. 431-436
Session 20: Security, Trust, and Reputation IV
- Chao Yang, Weiwei Lin, Mingqi Liu:

A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security. 437-442 - Jiang Zhang

, Zhenfeng Zhang:
Secure and Efficient Data-Sharing in Clouds. 443-450 - Xu Ma, Fangguo Zhang

, Jin Li:
Verifiable Evaluation of Private Polynomials. 451-458 - Zhongwen Li, Jun Fu, Wenjie Fan, Rongyu Long:

A Security Information Transmission Scheme for Internet of Things. 459-465
Session 21: Social Networking I
- Xiangyang Li:

Implementation and Transmission Error Handling of Multi-channel LVDS. 466-470 - Xin Liu, Zhaojun Xin, Leyi Shi:

Automatic Patching Based on Social Computing in P2P Network. 471-478 - Chao Wang, Ke Xu, Gaoyu Zhang:

A SEIR-based Model for Virus Propagation on SNS. 479-482
Session 22: Social Networking II
- Guangyi Zhang, Yu Liu, Junting Chen, Yi Cai, Huaqing Min:

Latent Factor Model Based on Simple Singular Value Decomposition for Personalized Comment Recommendation. 483-489 - Qing Du, Qixuan Wang, Jiaying Cheng, Yi Cai, Tao Wang, Huaqing Min:

Explore Social Question and Answer System Based on Relationships in Social Network. 490-495 - Jian Chen, Yu Liu, Guangyi Zhang, Yi Cai, Tao Wang, Huaqing Min:

Sentiment Analysis for Cantonese Opinion Mining. 496-500
Session 23: DTNs and Secure Systems
- Xia Deng, Le Chang:

A Multicast Routing Scheme Based on Social Differences in Delay-Tolerant Networks. 501-507 - Xia Deng, Le Chang:

Sociality-Based Buffer Management for Multicast in DTNs. 508-514 - Xunjun Chen, Yuelong Zhu, Zheng Gong, Yiyuan Luo:

Cryptanalysis of the Lightweight Block Cipher Hummingbird-1. 515-518
Session 24: Algorithms, Models, and Protocols
- Xiaohua Meng, Dasheng Qin, Yuhui Deng:

Designing a GPU Based Heat Conduction Algorithm by Leveraging CUDA. 519-526 - Yang Li, Changjun Hu:

A New Evaluation Model to Building Materials Science Domain-Specific Search Engine. 527-534 - Ming Tao, Huaqiang Yuan, Wenhong Wei, Zhixiong Li, Yong Qin:

Performance Compensation for the False Alarm of L2 Trigger in FMIPv6. 535-540 - Liying Yang, Huaquan Wei, Chengqun Li:

The S-Quasinormal Embedding Property of Subgroups in a Finite Group. 541-546
CEWE 2013-Second International Workshop on Cybercrimes and Emerging Web Environments
Session 1: Secure Schemes
- Jianglang Feng, Jindong Li:

A New Certificate-Based Digital Signature Scheme. 547-549 - Hongbin Wang, Yan Ren:

Code-Based Designated Verifier Signature Scheme. 550-554 - Jianglang Feng, Jindong Li:

A Secure Proxy Signature Scheme in Bilinear Group. 555-557 - Konstantinia Charitoudi, Andrew J. C. Blyth:

An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense. 558-563
Session 2: Intelligent Algorithms and Systems
- Chundong Wang, Guangming Bo, Yaohui Zhang:

Design and Implementation of Authentication and Authorization Flow in ESCP System. 564-568 - Hongbin Wang, Yan Ren:

An Attribute-Based Anonymous Authentication Scheme. 569-573 - Chunying Wu, Shundong Li, Yiying Zhang:

Key Management Scheme Based on Secret Sharing for Wireless Sensor Network. 574-578 - Caiyun Chen, Junshan Yu:

An Adaptive Algorithm for Blind MMSE Equalization of SIMO Channels. 579-582
Session 3: Security Frameworks and Models
- Baojiang Cui, Fuwei Wang

, Tao Guo, Guowei Dong, Bing Zhao:
FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework. 583-588 - Shahrzad Zargari, Anthony Smith:

Policing as a Service in the Cloud. 589-596 - Oghendefejiro Winnie Makinde:

Social Network Message Credibility: An Agent-Based Modelling Approach. 597-602 - Nathaniel James Healey, Olga Angelopoulou

, David Evans:
A Discussion on the Recovery of Data from a Virtual Machine. 603-606
DINST 2013-Second International Workshop on Development and Implementation of New Systems and Tools
- Shinji Sakamoto

, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
:
Performance Comparison of a WMN-SA System for Different Distributions of Mesh Clients. 607-611 - Xinyue Chang, Tetsuya Oda, Evjola Spaho

, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
:
Performance Analysis of WMNs Using Hill Climbing Algorithm Considering Different Iterations per Phase. 612-616 - Qi Wang, Shinji Sakamoto

, Leonard Barolli, Elis Kulla, Gjergji Mino, Makoto Ikeda:
A Fuzzy-Based Simulation System for Controlling Sensor Sleep Time through Lifetime of Sensors in WSNs. 617-623 - Liqiong Ma:

A Generic Construction of Identity-Based Group Signature. 624-626
FEIDWT 2013-First International Workshop on Frontiers in Emerging Intelligent Data and Web Technologies
Session 1: Optimization and Clustering
- Jianxin Wang, Fan Yang, Xiaoli Dong, Ben Xu, Baojiang Cui:

Improving Association Rules by Optimizing Discretization Based on a Hybrid GA: A Case Study of Data from Forest Ecology Stations in China. 627-632 - Yanling Zhang, Minghao Zhang, Li Li:

Image Feature Analysis of Lymph Node Based on Cloud-Model and FCM Clustering. 633-638 - Yanan Jin, Fei Xiao:

Eliminating Error Accumulation in Hierarchical Clustering Algorithms. 639-642
Session 2: Secure Systems
- Jin Li, Dongqing Xie, Xiaofeng Chen:

Server-Aided Hierarchical Identity-Based Encryption. 643-647 - Xiuni Wang, Dongqing Xie:

The Systematic Form of a Class of Regular Structured LDPC Codes. 648-651 - Yijun Mao, Xi Zhang, Min-Rong Chen, Yiju Zhan:

Constant Size Hierarchical Identity-Based Encryption Tightly Secure in the Full Model without Random Oracles. 652-657 - Liqiong Ma:

Two Efficient Identity Based Signature Schemes. 658-660
IIPTC 2013-First International Workshop on Intelligence Information Processing and Trusted Computing
Session 1: Intelligent Information Processing
- Chunlei Zhao, Chunfu Jia:

Research on Spatial Adaptive Strategy of End-Hopping System. 661-666 - Mingju Gong, Shexiang Ma, Xin Meng, Shuanggen Zhang, Huibo Wu, Xue Rui:

A Packet Error Rate of AIS Messages Measurement System. 667-671 - Yuanying Qiu, Ying Chen, Lei Li, Xianwen He:

Multivariate Spectral Conjugate Gradient Projection Method for Nonlinear Monotone Equations. 672-675 - Jialinh Han, Xiaohui Zhao:

A Novel Watermarking Method Based on Watermark Compression Preprocessing. 676-679
Session 2: Authentication and Key Management
- Kai Wang, Yanan Ding, Hong Zhao, Lujian Hou, Fengjuan Sun:

Optimization of Air Pollutant Monitoring Stations Based on Genetic Algorithm. 680-684 - Yongmei Xu, Zeqi Gao, Yuihui Deng:

Analyzing the Cooling Behavior of Hot and Cold Aisle Containment in Data Centers. 685-689 - Xianglin Wei, Jianhua Fan, Ziyi Lu, Ke Ding, Ran Li, Guomin Zhang:

Bio-inspired Application Scheduling Algorithm for Mobile Cloud Computing. 690-695 - Kangshun Li, Zhen Yang:

Exemplar Image Completion Based on Evolutionary Algorithms. 696-701
Session 3: Security and Detection
- Kai Wang, Xingli Zhao, Hong Zhao, Jian Zhang:

A Comparative Study on CRFs for Fore- and Background Classification. 702-707 - Jian Zhang, Renhong Cheng, Kai Wang, Hong Zhao:

Research on the Text Detection and Extraction from Complex Images. 708-713 - Tao Guo, Guowei Dong, Hu Qin, Baojiang Cui:

Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree. 714-719 - Zheli Liu, Xiaochun Cheng

, Chunfu Jia, Jun Yang:
Format Compliant Degradation for PNG Image. 720-723
SCOPE 2013-Third International Workshop on Situated Computing for Pervasive Environments
Session 1: Algorithms and Models
- Min Li, Zheli Liu, Chunfu Jia, Zongqing Dong:

Data Masking Generic Model. 724-727 - Youtian Wang, Bin Hu:

A Research on Multiuser Collaborative Modelling and Simulating Network System. 728-733 - Jinhong Huang, Genjiao Zhou:

A Conjugate Gradient Method without Line Search and the Convergence Analysis. 734-736 - Min Tang, Xia Zeng, Kai Song, Jian Liu:

Error Analysis on Floating-Point Arithmetic in C Programming Language Library Functions. 737-742
Session 2: Multimedia Systems and Applications
- Wenjing Zhao, Zhong Cao, Pan Liu:

A Combining Spatial Enhancement Method for Low Illumination Images. 743-746 - Yanlong Wen, Xinkun Li, Xiangrui Cai, Ying Zhang, Xiaojie Yuan:

XML Retrieval with Structural Context Relaxation. 747-752 - Caiyun Chen, Junshan Yu:

A New Idea of Identifying Flat-Fading MIMO Channel by Using Space-Time Coding. 753-756
SeDiS 2013-Third International Workshop on the Service for Large Scale Distributed Systems
Session 1: Large-Scale Distributed Systems
- Alexandru Petculescu:

MASF - A Mobile Services Framework. 757-762 - Catalin Negru

, Florin Pop, Valentin Cristea, Nik Bessis
, Jing Li:
Energy Efficient Cloud Storage Service: Key Issues and Challenges. 763-766 - Alessandro Kraemer, Junior Cesar de Oliveira, Fabio Andre Garaluz dos Santos, Ana Claudia Maciel, Alfredo Goldman

, Daniel Cordeiro
:
Dynamic Creation of BSP/CGM Clusters on Cloud Computing Platforms. 767-772 - Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:

Accountable Authority Attribute-Based Signature. 773-777

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














