


default search action
3. IITSI 2010: Jinggangshan, China
- Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4020-7

- Haokui Tang, Zhiquan Feng:

Skin Segmentation Based on Double-Models. 3-7 - Weichun Huang, Min Chen, Jian Liu:

A Small World Network Based Grid Resource Discovery Mechanism. 8-11 - Chengrong Xie, Yuhua Xu:

Adaptive Hybrid Function Projective Synchronization for Two Different Chaotic System with Uncertain Parameters. 12-16 - Zhi-Hua Hu:

A Quay Crane Assignment Approach for Berth Allocation Problem in Container Terminal. 17-21 - Wu Wang, Zheng-min Bai:

Performance Analysis of an Improved Single Neuron Adaptive PID Control. 22-25 - Hailin Liu:

A Mixture Conjugate Gradient Method for Unconstrained Optimization. 26-29 - Jiayin Tian, Cheng Yang, Yichun Zhang, Jianbo Liu:

Distributed Key Management Scheme for Large Scale Pay-TV Application. 30-33 - Jianli Hu, Xiaohua Li, Bin Zhou, Yonghua Li:

SECTrust: A Secure and Effective Distributed P2P Trust Model. 34-38 - Xiangyang Huang, Xiao Xin, Wenjun Wu:

Representing Non-deterministic Actions within the Situation Calculus for Autonomous Characters. 39-42 - Wang Gang, Yin Fengxia:

Study on Service Selections Based on Ontology and Qos. 43-47 - Xuyan Zhou, Bing Tan, Bing Zhu, Xuange Peng, Xuemou Liu:

On the Way to Design an Optical Camera Lens for River Sediment in Underwater Imaging. 48-53 - Minghui Li, Jingbo Xia, Yaoguo Wang:

Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism. 54-57 - Wan Zhou, Zhang Xuehua, Xiong Xin, Jiande Wu:

The Application Research of Wireless Sensor Network in the Prison Monitoring System. 58-62 - Na Shi, Xumin Liu, Yong Guan:

Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm. 63-67 - Lizong Li, Tiegang Gao, Qiaolun Gu, Bi Lei:

A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet Transformation. 68-72 - YuXiang Jiang, Cheng Xu, Lulu Zhang, ShanQin Wang:

Design and Implementation for Real-Time Property of Serial Communication Based on WINDOWS CE. 73-76 - Yu Liu, Junchan Du, Feng Ji:

Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance. 77-80 - Qunli Wu:

Analysis on the Integration of ERP with E-business. 81-83 - Xiaoming Yao, Wencai Du, Baodan Chen, Zhongzhi Yuan:

An Integrated P2P Mobile Learning Model for Timely Farming Guidance. 84-87 - Hongjie Sun:

An Integrated Network Performance Monitor System. 88-91 - Xiaoming Yao, Wencai Du, Mei Huang, Weihua Wu, Jundong Fu:

Pattern-Based Blind Spatial Image Watermarking. 92-96 - Hongfa Wang, Feng Yu, Chen Xing, Zhimin Zhou:

Genetic Algorithm-Based Evaluation Model of Teaching Quality. 97-100 - ShanGuo Lv, Hongli Chen:

Study on Incremental Data Mining Based on Rough Set Theory. 101-104 - Hongli Chen, ShanGuo Lv:

Study on Ontology Model Based on Rough Set. 105-108 - Lihui Ni, Zhijin Guan, Wenying Zhu:

A General Method of Constructing the Reversible Full-Adder. 109-113 - Bin Tan, Xuyan Zhou:

Automatic Construction of Web-Based English/Chinese Parallel Corpora. 114-117 - Ruzhi Xu, Quansheng Wu, Hongquan Gong, Leqiu Qian:

Research on Component Composition with Formal Semantics. 118-124 - Xiaosheng Huang, Fang Zhang:

Multi-modal Medical Image Registration Based on Gradient of Mutual Information and Hybrid Genetic Algorithm. 125-128 - Geng-Sheng Wang, Yun-Xin Yu:

An Improved Ant Colony Algorithm for VRP Problem. 129-133 - Xiaoming Yao, Wencai Du, Weihua Wu, Mei Huang, Jundong Fu:

A Robust EMD-Like Stegnographic Scheme. 134-137 - Jie Xia, Jian Wu, Yanyan Cao, Zhiming Cui:

SOM-Based Classification Method for Moving Object in Traffic Video. 138-142 - Guangying Yang, Yue Chen:

The Study of Electrocardiograph Based on Radial Basis Function Neural Network. 143-145 - Miao Ma

, Jian-hui Liang, Li Sun, Min Wang:
SAR Image Segmentation Based on SWT and Improved AFSA. 146-149 - Xiangang Jiang, Dean Ma, Longfeng Tao:

The Research of High Noise Image's Restoration and Recognition of Train's Plates. 150-153 - Chuanliang Xia, Zhendong Liu:

Property Preservation of Time Petri Net Reduction. 154-159 - Ming-bao Pang, Fang Dong, Xin-ping Zhao:

Regional Logistics System Bi-level Programming with Elastic Demand by Using Fuzzy C-means Clustering. 160-164 - Shaohua Jin, Chongguang Ding, Yongxue Wang, Yanmin Zhang, Jie Lv:

A Strong Deviation Theorem Based on Laplace Transform on a Non-homogeneous Tree. 165-168 - Shaohua Jin, Yongxue Wang, Huitao Liu, Ying Tian, Hui Li:

Some Strong Limit Theorems for Hidden Markov Models Indexed by a Non-homogeneous Tree. 169-172 - Rong-jie Lv, Yu-hong An:

Dynamic Evolution Simulation of Corporate Governance Based on Swarm. 173-177 - Wenjun Zhang:

Integrated Security Framework for Secure Web Services. 178-183 - Nianqiang Li, Yongbing Wang, Guoyi Zhao:

A Preferable Method on Digital Filter in ECG Signal's Processing Based on FPGA. 184-187 - Nianqiang Li, Yongbing Wang, Guoyi Zhao:

A New Scheme on Multifunction Wireless Medical Surveillance System Based on FPGA. 188-191 - Dengfeng Zhou, Shuisheng Ye, Shaohua Hu:

Research on Application of Region-of-Interest in Face Detection. 192-194 - Bing Zhu, Xuyan Zhou, Bin Tan, Xuange Peng, Xuemou Liu:

A Study of Image-Based Algorithms of River Sediment Measurement. 195-201 - Qing Ye, Xiaoping Wu, Yongqing Liu, Gaofeng Huang

:
A Hybrid Model of RST and DST with its Application in Intrusion Detection. 202-205 - Sibin Ying, Jianliang Ai:

Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using Artificial Neural Network. 206-211 - Zhihua Liu, Hui Sun, Haizhi Hu:

Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm Based on Exchange Strategy. 212-215 - Feng Gao, Jingsha He

, Shufen Peng, Xu Wu:
A Quantifying Metric for Privacy Protection Based on Information Theory. 216-220 - Jianjun Huang

, Jiali Zhong, Pengfei Li:
A Cloud Model Inference System Based Alpha-Beta Filter for Tracking of Maneuvering Target. 221-225 - Jianjun Huang

:
A PSO Based Array Shape Calibration Utilizing Cyclostationarity. 226-231 - Rong Zhou, Chunyue Zhao, Lili Fu, Ao Chen, Meiqian Ye:

ZigBee-based Vehicle Access Control System. 232-235 - Meiyu Zhang, Jinghua Mei:

The Design and Implementation of Electronic Farm System Based on Google Maps. 236-240 - Yan Yang

, Pengcheng Nie, Yong He:
A Method of Honey Plant Classification Based on IR Spectrum: Extract Feature Wavelength Using Genetic Algorithm and Classify Using Linear Discriminate Analysis. 241-245 - Lin Yang, Hui Ting Wang:

Classification Based on Particle Swarm Optimization for Least Square Support Vector Machines Training. 246-249 - Xinming Hu, Huosong Xia:

Automated Assessment System for Subjective Questions Based on LSI. 250-254 - Yanbin Liu, Ping Yuan:

A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data. 255-257 - Yanyan Cao, Hengjun Yue, Jian Wu, Jianming Chen, Zhiming Cui:

Vehicle Edge Detection Based on Multi-structure Mathematical Morphology. 258-262 - Wen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu, Chang-Hung Chiu:

Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using a Back-Propagated Network. 263-267 - Da-guo Jiang, Zhao-hui Liu:

Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR Composite Film. 268-270 - Shi Lan, Shao Xia, Zhao Ying:

Design and Implementation of ICAP-Client Based on Improved LRU Algorithm. 271-275 - Zhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wu, Guizhu Li, Longbiao Xin:

Air Conditioning Load Prediction Based on DE-SVM Algorithm. 276-279 - Chen Long, Huang Chen:

Comparative Study between the Magic Formula and the Neural Network Tire Model Based on Genetic Algorithm. 280-284 - Feng Wang, Hui Deng, Wei Dai, Sheng Zheng, Bo Liang:

The Security Issues of Scientific-Workflow Technique in Network Grid Computing. 285-288 - Ding Hong, Zhao Yizhu:

A Historical Role-Based Fast Negotiation Model in Open Network. 289-293 - Huan Wang, Yikai Shi, Jian-kang Lu, Xiaoqing Yuan

:
Design and Application of New Topology of Transverse Flux Permanent-Magnet Motor with Driving System. 294-297 - Guangying Yang, Shanxiao Yang:

Emotion Recognition of Electromyography Based on Support Vector Machine. 298-301 - Dong Li, Chunhui Yang:

A Test Platform for Evaluation of Web Service Composition Algorithm. 302-305 - Dong Li, Chunhui Yang:

A Trust Evaluation Model for Web Service Selection. 306-310 - Ding Pan:

DW 2.0-Oriented Metadata Evolution Management. 311-314 - Zhiyuan Yang, Qinming Tan:

The Application of Random Forest and Morphology Analysis to Fault Diagnosis on the Chain Box of Ships. 315-319 - Cai Biao, Zhishu Li, Zhen Luo:

Threshold Secret Sharing Based Trust Security in Structured P2P Network. 320-323 - Yanguang Shen, Junrui Han, Huifang Shan:

The Research of Privacy-Preserving Clustering Algorithm. 324-327 - Kaiqiang Guo, Jiewu Xia:

An Improved Algorithm of Collision Detection in 2D Grapple Games. 328-331 - Mahboobeh Houshmand

, Monireh Houshmand, Habib Rajabi Mashhadi
:
Game Theory Based View to the Quantum Key Distribution BB84 Protocol. 332-336 - Yang Zhang, Liqun Gao, Shufan Ye:

A New Method for Tracing by Using Corner Detecting and k-Nearest Neighbor. 337-340 - Wei Li, Zhen Peng Pang, Zhi Jie Liu:

SPIHT Algorithm Combined with Huffman Encoding. 341-343 - Liang Xu, Yuanyuan Sun:

Research on the Knowledge Flow in Supply Chain Based on the Core Enterprise. 344-349 - Mahboobeh Houshmand

, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian, Hossein Deldari:
Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling. 350-354 - Xue-Dan Tan, He-Ming Zhao, Ji-Hua Gu, Zhi Tao:

A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based on Empirical Mode Decomposition and Entropy. 355-359 - Yan Jia, Runheng Li, Liang Gan, Guangqiang Chen:

IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves. 360-365 - Kai Li, Hongtao Gao:

A Novel Measure of Diversity for Support Vector Machine Ensemble. 366-370 - Gu Min, Yang Feng:

An Improved Genetic Algorithm Based on Polygymy. 371-373 - Zhi Tao, Xue-Dan Tan, Tao Han, Ji-Hua Gu, Yi-Shen Xu, He-Ming Zhao:

Reconstruction of Normal Speech from Whispered Speech Based on RBF Neural Network. 374-377 - Ji-Hua Gu, Yun Shang, Bei-jing Huang:

An NPT Watermarking Algorithm Using Wavelet Image Combination. 378-381 - Lei Huang, Yanxiang He, Furu Wei, Wenjie Li

:
Modeling Document Summarization as Multi-objective Optimization. 382-386 - Yali Jiang, Xiuling Ju, Feng Shi:

New Lattice-Based Public-Key Cryptosystem. 387-389 - Ruhan He, Weibin Xu, Ying Wang, Wei Zhan

:
A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing Problem. 390-393 - Li-li Ju, Xiu-fang Wang, Sai Ma, Chun-ming Wei:

The Algorithm Study of Sensor Compensation in MWD Instrument Based on Genetic Elman Neural Network. 394-397 - Mingyin Yao, Muhua Liu, Jinhui Zhao, Lin Huang:

Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy. 398-401 - Weixing Zhu, Yong Ma, Rixia Wang:

An Adaptive Fast Algorithm for Coding Block Mode Selection. 402-406 - Bowei Yang, Guanghua Song, Yao Zheng:

The Analysis and Enhancement of Voting Behaviors in P2P Networks. 407-410 - Guorui Li, Ying Wang, Jingsha He

:
Efficient Group Key Management Scheme in Wireless Sensor Networks. 411-415 - Bing Zhang, Li Chen:

An Improved Key Management of ZigBee Protocol. 416-418 - Fang Yang, Xuedong Tian, Xin Zhang, Xin-Biao Jia:

An Improved Method for Similar Handwritten Chinese Character Recognition. 419-422 - Shaobo Li

, Shulin Lv, Xiaohui Jia, Zhisheng Shao:
Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System. 423-426 - Weixing Zhu, Dajun Hou, Jin Zhang, Jian Zhang:

Optimization of a Subset of Apple Features Based on Modified Particle Swarm Algorithm. 427-430 - Weixing Zhu, Fangkui Zhong, Xiangping Li:

Automated Monitoring System of Pig Behavior Based on RFID and ARM-LINUX. 431-434 - Wei Yang, Chen Guo, Xuan Ge Peng:

The Solution of Printing on University Human Management System. 435-437 - Shaobo Li

, Xiaohui Jia, Shulin Lv, Zhisheng Shao:
Research and Application of USB Filter Driver Based on Windows Kernel. 438-441 - Xiaodan Chen, Shaobai Chen:

The Feasible Control Lyapunov Function of Nonlinear Affine-Control Systems. 442-445 - Xiaodan Chen, Shaobai Chen:

On the Upper Completeness of Quasi-metric Spaces. 446-449 - Zhongjun Deng, Wei Song

, Xuefeng Zheng:
P2PKMM: A Hybrid Clustering Algorithm over P2P Network. 450-454 - Changyuan Gao, Shuchen Zhang, Xiaoxing Zhang:

The Modeling and Simulation of Negotiation Process for High-Tech Virtual Enterprise Based on UML and Petri Net. 455-459 - Youqin Chen, Zhide Chen, Li Xu:

RFID System Security Using Identity-Based Cryptography. 460-464 - Jingbo Yuan, Haixiao Li, Shunli Ding, Limin Cao:

Intrusion Detection Model Based on Improved Support Vector Machine. 465-469 - Yin Pang, Kan Li, Xin Sun

, Kaili Bu:
Dynamic Replica Selection Using Improved Kernel Density Estimation. 470-474 - Zhipeng Xu, Qianting Zhou, Jun Wei:

Design of Temperature Control System for a Special Shortwave Infrared Spatial Remote Sensor Based on FPGA. 475-477 - Wang Taihua, Guo Fan:

Associating IDS Alerts by an Improved Apriori Algorithm. 478-482 - Junyu Dong

, Yuliang Wang, Yan Song, Guanglin Cheng:
Three-Dimensional Multiscale Texture Synthesis. 483-487 - Yang Li, Chong-chong Zhao:

Aesthetic Evolution of Staged L-systems for Tiling Pattern Design. 488-492 - Xiaoyu Song, Lihua Sun:

Study on the Convergence of Hybrid Ant Colony Algorithm for Job Shop Scheduling Problems. 493-497 - Lili Zhai, Fuguo Chang:

Negotiation Problem Processing System of High-Tech Virtual Enterprise. 498-501 - Juan Chen:

A Flexible Fuzzy Comprehensive Evaluation Method. 502-506 - Lanying Li, Xin Wang:

A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks. 507-510 - Eric Ke Wang, Yunming Ye:

An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network. 511-516 - Wenxian Wang

, Xingshu Chen, Yongbin Zou, Haizhou Wang, Zongkun Dai:
A Focused Crawler Based on Naive Bayes Classifier. 517-521 - Juan Chen:

Economic Grid Resource Scheduling Based on Utility Optimization. 522-525 - Zhao Qiu, Mingrui Chen, Jun Huang

:
A Study on CRL Issue by P2P Network. 526-529 - Zhao Qiu, Mingrui Chen, Jun Huang

:
Design of Multi-mode E-commerce Recommendation System. 530-533 - Fang-jun Luan, Lan Lin, Yong-hui Wang:

4-Step Face Authentication Algorithm Based on SVM. 534-538 - Fuxiang Gao, Sha Li, Xiaolu Wang, Lan Yao:

A Security Architecture for Intranet Based on Security Area Division. 539-543 - Zenghui Liu, Liguo Guan:

Attack Simulation and Signature Extraction of Low-Rate DoS. 544-548 - Bin Zhang:

Research on the Directional Interferences Canceling. 549-552 - Ratsameetip Wita

, Nattanatch Jiamnapanon, Yunyong Teng-Amnuay:
An Ontology for Vulnerability Lifecycle. 553-557 - Jintao Zeng, Jinzhong Li, Xiaohui Zeng, Wenlang Luo:

A Prototype System of Software Reliability Prediction and Estimation. 558-561 - Yilian Zhang, Zhide Chen, Li Xu:

How to Construct a Divisible Online/Offline Signature. 562-566 - Huajin Wang, Chun-an Hu:

Mining Maximal Patterns Based on Improved FP-tree and Array Technique. 567-571 - Kehe Wu, Tong Zhang, Fei Chen:

Research on Active Controllable Defense Model Based on Zero-PDR Model. 572-575 - Suying Yang, Meng Wang, Jianying Lin, Kuijun Meng:

Optimization Design of Supervising and Controlling on the SOFC Integration System. 576-579 - Suying Yang, Xin Wang:

A Visual Domain Recognition Method Based on Function Mode for Source Code Plagiarism. 580-584 - Yin Zhou, Wei Zhu:

A Multi-mode P2P Live Media Broadcasting Middleware. 585-590 - Chang-jin Jiang, Hong Peng, Qian-Li Ma, Jian-chao Chen:

Automatic Summarization for Chinese Text Based on Combined Words Recognition and Paragraph Clustering. 591-594 - Ying Lin, Yan Zhang, Yang-jia Ou:

The Design and Implementation of Host-Based Intrusion Detection System. 595-598 - Jingbo Yuan, Jisen Zheng, Shunli Ding:

An Improved Pattern Matching Algorithm. 599-603 - Chunyan Yu, Dongyi Ye, Xiaosheng He, Minghui Wu:

Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks. 604-608 - Chunyan Yu, Dongyi Ye, Minghui Wu:

A New Agent Oriented Model for AutoMotive Computing Platform. 609-613 - Pingjian Wang, Jingqiang Lin, Jiwu Jing, Yongquan Xie:

Mediated Hierarchical Identity-Based Combined Public Key Schemes. 614-618 - Ping Zhang, Yan Zhang, Zhengjiang Wu, Weifeng Du:

IIS Security Mechanisms. 619-622 - Jinbiao Wang, Shu Qin:

The Research on Two Important Counter-Examples of Four-Color Problem. 623-626 - Teng Ping, He Ping:

Characteristics of Network Non-optimum and Extensionality Security Mode. 627-630 - Xinqiang Ma, Youyuan Liu:

Electronic Commerce Technology and its Security Problems. 631-634 - Junjian Chen, Dan Feng, Jingning Liu:

An Implementation of Object-Based Storage System Access Control Based on IBE. 635-639 - Ruihu Wang, Bin Fang, Zhangping Hu, Liang Chen, Weihua Wang:

Cascaded SVMs in Pattern Classification for Time-Sensitive Separating. 640-644 - Min Wei, HaiNing Chen, TianYun Yan, QinZhang Wu, Bin Xu:

The Detecting Methods of Geostationary Orbit Objects. 645-648 - Yan Zhang, Ying Lin:

Research on the Key Technology of Secure Computer Forensics. 649-652 - Yingjun Guo, Lihua Sun, Haichao Ran:

The Method of Early Real-Time Fault Diagnosis for Technical Process Based on Neural Network. 653-657 - Zhonghua Deng, Ying Wu:

Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA. 658-662 - Qiao Liu, Zhiguang Qin, Hongrong Cheng, Mingcheng Wan:

Efficient Modeling of Spam Images. 663-666 - Ye Liang:

Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer Environment. 667-670 - Qiufen Yang, Weihua Gui, Huosheng Hu

:
A Novel Real-Time Face Tracking Algorithm for Detection of Driver Fatigue. 671-676 - Huifang Deng, Haiyan Kang:

Research on High Performance RFID Code Resolving Technology. 677-681 - Yumei Xiong, Yimin Chen:

An Improved Task Scheduling Algorithm in Embedded Systems. 682-685 - Zhixing Li:

Product Feature Extraction with a Combined Approach. 686-690 - Guang Sun:

An Algorithm of Webpage Information Hiding Based on Class Selectors. 691-694 - Fei Li:

An Improved Particle Swarm Optimization Algorithm with Synthetic Update Mechanism. 695-699 - Haisheng Li:

Study of Privacy Preserving Data Mining. 700-703 - Jian Li, Wengeng Shi:

Model of CSR in Chinese Medicine E-commerce Firm: Strategic Management Perspective. 704-707 - Xiaojun Ma, Sa Li, Weihui Dai

:
Modeling and Simulating of Ecological Community in Digital Creative Industry. 708-712 - Changcheng Zhou, Jie Meng:

Modeling and Simulation of Double-tube Hydraulic Damper External Characteristic. 713-719 - Xiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-ping Chen, Shi-yao Jin:

Research on a High Efficient Intrusion Prevention Model. 720-723 - Jianfang Sun:

Application of Data Mining for Decision Tree Model of Multi-variety Discrete Production and Manufacture. 724-728 - Yukang Tian, Huy Quan Vu:

A Multiple Population Genetic Algorithm and its Application in Fuzzy Controller. 729-733 - Huamin Li, Xingsen Li

, Zhengxiang Zhu:
Knowledge Mining for Intelligent Decision Making in Small and Middle Business. 734-739 - Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, Jie Wang:

A New Method of Sea-Sky-Line Detection. 740-743 - Lin-an Wang, Qiang Li, Xiao-juan Liang:

Modeling and Dynamic Simulation of Electric Power Steering System of Automobile Using Bond Graph Technique. 744-747 - Xiangqun Fu, Wansu Bao, Chun Zhou:

Design and Implementation of Quantum Factorization Algorithm. 748-752 - Li Tian, Wansu Bao:

A Medium Field Multivariate Public Key Signature Scheme with External Perturbation. 753-757 - Huafei Zhu:

Towards a Theory of Cloud Computing in the Protocol-Composition Framework. 758-762 - Xin Yu, Zhiguang Wei:

Research on Logistics System Architecture Based on SOA. 763-766 - Wen-lang Luo, An-dong Xie, Wen Ruan:

The Construction and Test for a Small Beowulf Parallel Computing System. 767-770 - Xuange Peng, Ying Xiao, Bing Zhu:

Research of Image Acquisition Device for River Sediment. 771-776 - Yuchuan Zhang, Yuzhao Liu:

A Collaborative Filtering Algorithm Based on Time Period Partition. 777-780 - Hongqin Shi, Fangliang Lv:

A Blind Watermark Algorithm for Color Image Based on Dual Scrambling Technique. 781-785 - Shan Wang, Yang Jiang, Minghua Gao, Chuanyun Wang, Haiwen Liu:

Artificial Neural Network Method for the Analysis of 1-D Defected Ground Structure. 786-788 - Xiangang Jiang, Lunlun Xu, Dean Ma:

Volume Rendering Effect Analysis with Image Preprocessing Technology Based on Three Dimension Anisotropic Diffusion. 789-792 - Kun Wang, Jin-dong Wang, Liu-qing Shen, Zhen-hua Han:

An Intelligent Security Defensive Software Scheme and Realization. 793-796

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














