


default search action
ICoC 2013: Zhangjiajie, China
- Jinshu Su

, Baokang Zhao, Zhigang Sun, Xiaofeng Wang, Fei Wang, Ke Xu:
Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers. Communications in Computer and Information Science 401, Springer 2013, ISBN 978-3-642-53958-9 - Yingyou Wen, Zhi Li, Jian Chen, Hong Zhao:

A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet. 1-8 - Xiushuang Yi, Yeting Han, Xingwei Wang:

The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior. 9-20 - Xubo Wang, Defu Zhang, Xiangxiang Zeng

, Xiaoying Wu:
A Bayesian Investment Model for Online P2P Lending. 21-30 - Weihai Li, Yunxiao Zu, Yue Jia:

Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms. 31-39 - Cheng Zhang, Chunhe Xia, Haiquan Wang, Xiaojian Li:

On the Spatial-temporal Reachability of DTNs. 40-49 - Libing Wu

, Ping Dang, Tianshui Yu, Lei Nie:
Research on Efficient Non-slotted Tree Structures for Advance Reservation. 50-61 - Jia Ye Chen, Wenzhong Guo:

A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network. 62-73 - Kai Shuang, Peng Zhang, Sen Su:

An Efficient Lookup Service in DHT Based Communication System. 74-84 - Ying Liu, Shenglin Zhang

, Hongying Liu:
An Improved Cooperative Model of P2P and ISP. 85-96 - Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:

Assessing Survivability of Inter-domain Routing System under Cascading Failures. 97-108 - Liehuang Zhu, Hao Yang, Zhenghe Yang:

The Adaptive Multicast Data Origin Authentication Protocol. 109-121 - Zhao Wei, Yanli Lv, Chunhe Xia, Yang Luo, Qing Wei:

A Computer Network Defense Policy Refinement Method. 122-133 - Yanbiao Li, Dafang Zhang, Gaogang Xie, Jintao Zheng, Wei Zhao:

An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree. 134-144 - Peng Xu, Rui Hu, Sen Su:

Research on Resource Management in PaaS Based on IaaS Environment. 145-157 - Xiaoyan Liang, Liangshuang Lv, Chunhe Xia, Yang Luo, Yazhuo Li:

A Conflict-Related Rules Detection Tool for Access Control Policy. 158-169 - Pingping Lin, Jun Bi

, Yangyang Wang:
East-West Bridge for SDN Network Peering. 170-181 - Tong Zhao, Shanbo Lu, Wei Yan, Xiaoming Li:

A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET. 182-193 - Yang Luo, Yazhuo Li, Qing Tang, Zhao Wei, Chunhe Xia:

VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach. 194-205 - Wenshan Fu, Tong Zhao, Kaigui Bian, Wei Yan:

TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications. 206-217 - Xiao-han Yue, Fucai Zhou:

A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation. 218-235 - Gaofeng Lv, Zhigang Sun, Yijiao Chen, Tao Li:

Towards Internet Innovation: Software Defined Data Plane. 236-247 - Peidai Xie, Yongjun Wang, Huabiao Lu, Meijian Li, Jinshu Su:

Mining Network Behavior Specifications of Malware Based on Binary Analysis. 248-255 - Ning Hu, BaoSheng Wang:

CoISM: Improving Security and Accuracy of BGP through Information Sharing. 256-265 - Yuzhong Chen, Xiaohui Qiu:

Detecting Community Structures in Social Networks with Particle Swarm Optimization. 266-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














