


default search action
ICNCC 2017: Kunming, China
- Proceedings of the VI International Conference on Network, Communication and Computing, ICNCC 2017, Kunming, China, December 8-10, 2017. ACM 2017, ISBN 978-1-4503-5366-3

Data Analysis and Calculation
- Majun He, GuoZhong Li, Chaojie Huang, Yufei Ye, Wenhong Tian:

A Comparative Study of Data Skew in Hadoop. 1-6 - Pu Zhao, Jingtao Shang, Jianjun Lin, Bo Li, Xin Sun:

A Dynamic Convergent Replication Strategy Based on Distributed Hierarchical Systems. 7-13 - Aruna Govada

, Abhinav Patluri, Atmika Honnalgere:
Association Rule Mining using Apriori for Large and Growing Datasets under Hadoop. 14-17 - Yuanzun Zhang, Xiaobin Tan, Weiping Li:

In-network Cache Size Allocation for Video Streaming on Named Data Networking. 18-23 - Ling Guo, Yue Yuan:

Forecast Method of Short - term Passenger Flow on Urban Rail Transit. 24-28
Image and Signal Processing
- Yutong Wang, Yuge Liu:

Research on Facial Expression Recognition based on Kinect. 29-33 - Jun Zhao, Guangyong Gao, Jianhua Cheng:

Identity Authentication Protection for "Spatial Watermarking + QR Code" Paper-cutting Digital Image. 34-37 - Haobin Sun, Shengli Liu, Da Xiao, Ruiqing Xiao:

Applying Binary Patch Comparison to Cisco IOS. 38-42 - Jianle Zhu, Peng Cao, Peijun Huo, Xuan Wang, Fangfang Chen:

The Synthesis of Multi-Graphic Visual Encryption Technology. 43-47 - Mengyue Li, Yuchun Guo, Yishuai Chen:

CNN-based Commercial Detection in TV Broadcasting. 48-53 - Chunmei Liu, Lingjuan Miao, Tian Dai:

A Fuzzy Pattern Based ICCP Matching Algorithm in Gravity-Aided Navigation. 54-58 - Yuanhang Yang, Shuhui Chen:

Multiple Bloom filters. 59-63 - Jiming Zheng, Wenfei Xie:

Weighted Hash Method based on Improved ABQ Algorithm. 64-68 - Chengcheng Huang, Wei Peng, Housen Li, Lizhi Cheng, Hao Jiang:

Computing Diagonals of Toeplitz Pentadiagonal Matrix Inverses via Matrix Möbius Transformations. 69-74
Computer Network and Security
- Yifan Tian, Jiabao Wang, Zhenji Zhou, Shengli Zhou:

CNN-Webshell: Malicious Web Shell Detection with Convolutional Neural Network. 75-79 - Jingxi Liang, Wen Zhao, Wei Ye:

Anomaly-Based Web Attack Detection: A Deep Learning Approach. 80-85 - Shuo Xu, Shuqin Li, Kun Meng, Lijun Wu, Meng Ding:

An Adaptive Malicious Domain Detection Mechanism with DNS Traffic. 86-91 - Khin Swe Yin, May Aye Khine:

Network Behavioral Features for Detecting Remote Access Trojans in the Early Stage. 92-96 - Feng Qu, Jitao Zhang, Zetian Shao, Shuzhuang Qi:

An Intrusion Detection Model Based on Deep Belief Network. 97-101 - Guyang Wang, Shulin Yang, Xuelei Ren, Bin Wang:

Research on WebSocket-Based Authentication System. 102-105 - Chengcheng Wang, Yuqing Lan:

PFESG: Permission-based Android Malware Feature Extraction Algorithm. 106-109 - Yujing Liu, Zhilin Wang, Nan Li:

A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the Internet. 110-114 - Senhao Wen, Nengqiang He, Hanbing Yan:

Detecting and Predicting APT Based on the Study of Cyber Kill Chain with Hierarchical Knowledge Reasoning. 115-119
Computer Science and Applications
- Wenxia Guo, Xiaoqin Ren, Wenhong Tian, Srikumar Venugopal:

Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the Cloud. 120-124 - Meng Li, Yasushi Shinjo:

Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers. 125-134 - Jisong Fan, Hui Ren, Chengxiang Tian:

An Analysis of Wargame Rules Simulation Based on Stochastic Lanchester Models. 135-139 - Bin Wang, Shulin Yang, Xuelei Ren, Guyang Wang:

Research on Digital Publishing Application System Based on Micro-Service Architecture. 140-144 - Jieping Hu, Shulin Yang, Bin Wang, Guyang Wang:

Design and Implementation of Remote Service Diagnosis System for Printing Machine. 145-149 - Zheng Sun, Fuyou Miao, Yang Xu, Qiyu Shao, Weihua Wang, Xingfu Wang, Chenxi Shao:

Community detection in complex networks using flow simulation. 150-155 - Xiao-Ming Yu, Wen-Jie Li:

Personalized Community Discovery Algorithm Based on GN. 156-160
Future Communication Technology and Development
- Jian Wang, Chuang Xie, Gengshan Wang:

Implement of TSCH Based MAC Accelerator for WIA-PA Industrial Wireless Network. 161-165 - Shifei Qian, Feng Luo, Jinpeng Xu:

An Analysis of Frame Replication and Elimination for Time-Sensitive Networking. 166-170 - Hongcheng Yan

, Rui Zhang, Lin Li, Lianlian Zeng, Xianghui Wang, Jian Guo:
Modeling and Simulation of Time-Division Multiplexing Navigation Satellite Network based on OPNET. 171-174 - Hajime Kawagoe, Masashi Sugano

:
Implementation of Time Synchronization for Energy Harvesting Wireless Sensor Network. 175-178 - Christian Ango Mbom, James Kweku Nkrumah Nyarko, Rugui Yao, Ling Wang:

Interference Alignment for Cellular Networks with Jacobian Eigenvalue. 179-182 - Jun-Chao Yuan, Xiao-Kuan Zhang, Ming-Cai Sun, Mao Liu:

The Impact of Target Near-Field Scattering on Missile Communication Operations. 183-186 - Mingda Li, Qingxv Xiong, Long Yuan:

A Network Interconnection System and Framework Based on Semantic Communication. 187-190 - Dawei Yan, Cong Liu, Peng You, Shaowei Yong:

Robust Topology Design in Time-Evolving and Predictable Spacecraft Network with Node Efficiency. 191-196 - Kai Shu, Yanteng Wang, Guanghui Zhao:

Beamforming with Enhanced CNN Network. 197-201
Information Systems Management and Assessment
- Yang Xie, Hui Xie, Gongliang Li:

Establishment and Application of Salary Business Circular Correlation Structure Revision model for Chinese Characteristic Institution Units. 202-206 - Fatin Hamadah Rahman, Thien-Wan Au, S. H. Shah Newaz, Wida Susanty Suhaili

:
Trustworthiness in Fog: A Fuzzy Approach. 207-211 - Lu Liu, Shuqing Li:

A New Method of Recognizing Enterprise Core Financial Indexes Based on Similarity Calculation. 212-216 - Qinghao Wang, Dengkai Yao:

A New Method for Evaluating Air Traffic Control Safety. 217-221
Power System and Control Engineering
- Yafei Ouyang, Qun Niu, Yang Zhang:

Combined Heat and Power Economic Dispatch Using Differential Evolution. 222-226 - Mohammad Abu Sarhan

, Min Ding, Xin Chen, Min Wu:
Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid Connected PV System. 227-234 - Fathy S. Elkazzaz, Mohammed A. H. Abozied

, Chunming Hu:
Hybrid RRT/DE Algorithm for High Performance UCAV Path Planning. 235-242 - Shaowei Li, Shengzheng Wang:

Design Method for Ship Handling Simulator Based On CPLD. 243-247 - Shaowei Li, Shengzheng Wang:

Design and Implementation of Sounder Simulator Based on Cross-platform. 248-252 - Qing Wu, Shaowei Qi, Kaiyue Sun:

Weighted Least Squares Twin Large Margin Distribution Machine. 253-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














