


default search action
8th SNPD 2007: Qingdao, China
- Wenying Feng, Feng Gao:

Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China. IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 2
- Xun Zhou, Shengfei Shi, Jizhou Luo, Wei Zhang:

Lifetime Optimized Methods of Correlated Data Gathering on Sensor Networks. 3-8 - Runhua Shi, Hong Zhong, Liusheng Huang:

A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. 9-13 - Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang:

Coverage-preserving Data Gathering in Wireless Sensor Networks. 14-19 - Jinghua Zhu, Jianzhong Li, Hong Gao:

Tasks Allocation for Real-Time Applications in Heterogeneous Sensor Networks for Energy Minimization. 20-25 - Yongxuan Lai, Xiaobo Fan, Hong Chen, Ting-Ting Xie:

Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks. 26-31 - Shaofei Wu, Siying Wei, Jinlong Zhang:

A service-based Workflow Model for Virtual Enterprise. 32-36 - Ming Chen, Zhenwu Wang:

An Approach for Web Services Composition based on QoS and Discrete Particle Swarm Optimization. 37-41 - Fuzhi Zhang, Yan Wang, Lin Wang:

A Web service discovery algorithm based on dynamic composition. 42-46 - Jianhua Yang:

Fuzzy Integrative Performance Evaluation for Supply Chain System. 47-52 - Gong Chen, Heqin Zhou, Jiefeng Yan:

A Novel Method for Moving Object Detection in Foggy Day. 53-58 - Lei Tang, Zonggui Zhao:

The Wavelet-based Contourlet Transform for Image Fusion. 59-64 - Yong Zhao, Zongde Fang, Kanwei Wang, Hui Pang:

Multilevel Minimum Cross Entropy Threshold Selection Based on Quantum Particle Swarm Optimization. 65-69 - Xinwu Li:

A New Model of Printer Color Management Based on Legendre Neural Network. 70-74 - Xiangbin Shi, Fang Liu, Ling Du, Xiaohong Chen, Yuansheng Xing:

A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGs. 75-80 - Ming Yin, Yun Xie, Fen Guo, Shuting Cai:

Research on Adaptive Error Concealment for Video Transmission over packet-lossy channel. 81-85 - Shijin Li, Hao Li, Zhijian Wang:

A Novel Approach to Commercial Detection in News Video. 86-90 - Shu-Chang Liu, Jing Bi, Zhiqiang Jia, Rui Chen, Jie Chen, Minmin Zhou:

Automatic Audio Classification and Speaker Identification for Video Content Analysis. 91-96 - Yichun Xu, Renbin Xiao:

Identifying Code for Directed Graph. 97-101 - Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:

Examination of Processing Load in Applying DACS Scheme to Practical Network. 102-107 - Dali Zhao, Yunhui Men, Linliang Zhao:

Hop-Distance Algorithm for Self-Localization of Wireless Sensor Networks. 108-112 - Zhenqi Wang, Jin Liu:

Internet Applications Usage Accounting Based on Flow. 113-116 - Qian Feng, Meng Chen:

The Research on the Construct Technology of the Test System Based on the Network. 117-122 - Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou:

A Hybrid and Efficient Scheme of Multicast Source Authentication. 123-125 - Renwang Su:

New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents. 126-131 - Hongwei Li, Shixin Sun:

Identity-Based cryptography for Grid. 132-137 - Xiaolin Wang, Jianqin Zhou, Yubing Zang:

A note on homogeneous bent functions. 138-142 - Ming Li, Baodong Qin, Fanyu Kong, Daxing Li:

Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. 143-148 - Jingjun Zhang, Furong Li, Yang Zhang, Liguo Wang:

Non-functional Attributes Modeling in Software Architecture. 149-153 - Jianmin Jiang, Hongping Shu, Li Xu:

An Architecture for Software Systems with time constraints. 154-159 - Xiaoyang Tong, Xiaoru Wang:

Agent-oriented Petri Net based Modeling of Dynamic Behavior for Wide-area Backup Protection. 160-165 - Yixing Xia, Yaowu Chen:

A Component-based Framework for Embedded Digital Instrumentation Software with Design Patterns. 166-170 - Sheng Fang, Yongquan Liang, Shenyuan Li:

What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code. 171-176 - Jun Gao:

Machine-Vision-Based Measurement of BGA Connector Solder Balls. 177-180 - Haiying Zhang, Chaowei Yuan:

A Method for Blind Detection of OFDM Signal Based on Power Spectrum Reprocessing. 181-186 - Guang Yang, Kexiong Chen, Maiyu Zhou, Zhonglin Xu, Yongtian Chen:

Study on Statistics Iterative Thresholding Segmentation Based on Aviation Image. 187-188 - Fuheng Liu, Xuhong Liu, Guijuan Kuang, Yi Xiu:

Improved Image Coding Algorithm Based on Embedded Zerotree. 189-192 - Wenjun Xiao, Weidong Chen, Mingxin He, Wenhong Wei, Behrooz Parhami:

Biswapped Networks and Their Topological Properties. 193-198 - Fuyong Yuan, Jian Liu, Chunxia Yin:

A Scalable Search Algorithm on Unstructured P2P Networks. 199-204 - Zhengyuan Ning, Xianwei Lai, Shanli Hu, Qingqing Zhan:

Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal Logic. 205-210 - Wenhong Wei, Wenjun Xiao:

Matrix Multiplication on the Biswapped-Mesh Network. 211-215 - Zenggang Xiong, Yang Yang, Xuemin Zhang, Dairong Yu, Li Liu:

Integrated Multi-Agent and Semantic P2P Grid Resource Discovery Model. 216-220 - Yongmei Hu, Yanan Fu, Lei Jia, Qiqiang Li:

An algorithm of job shop rolling scheduling based on singular rough sets. 221-225 - Wei Li:

Research on the Knowledge-based Decision Support System for the Safety of Rockets. 226-231 - Yang Xu, Houfeng Wang:

A Hibrid Model for Computational Morphology Application. 232-237 - Shuxia Yang:

Power Consumption Forecast by Combining Neural Networks with Immune Algorithm. 238-241 - Xiao Yang, Jiancheng Wan, Ling Zhang:

Arithmetic Computing Based Chinese Automatic Parsing Method. 242-247 - Aimin Wang, Qiang Song:

Prediction of R in Sinter Process based on Grey Neural Network Algebra. 248-252 - Chengzhi Cao, Xiaofeng Guo, Yang Liu:

Research on Ant Colony Neural Network PID Controller and Application. 253-258 - (Withdrawn) Design and Implementation of Wireless Computational Grid based on JavaSpace. 259-261

- Linchun Li, Jianhua Li, Ling Tie, Jun Pan:

ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. 262-267 - Hongwei Zhao, Shihui Pei, Pingping Liu:

Distributed Key Establishment Scheme in Wireless Sensor Network. 268-273 - Lichao Wang, Qiyong Lu, Xi Chen:

Application and Analysis of Time Domain Cross Correlation for Traffic Flow Speed Measurement. 274-279 - Ming Yin, Yun Xie, Fen Guo, Shuting Cai:

Improvements on MB-layer Rate Control Scheme for H.264 video Using complexity estimation. 280-284 - Lijun Sun, Ying He:

Improving Blind Equalization Algorithm for Wireless Communication Systems. 285-288 - Ke Zhang, Zhong Li, Xiaoou Zhao:

Edge Detection of Images based on Fuzzy Cellular Automata. 289-294 - Mengmeng Zhang, Yuehai Wang, Changnian Zhang, Shumin Zhou:

Motion Vector Data Decoding Using Spatial-Temporal Source Redundancy. 295-298 - Jiguo Yu, Jingjing Song, Wenjun Liu, Li Zhao, Baoxiang Cao:

KZCAN: A Kautz based content-addressable network. 299-304 - Wuming Luo, Pingyang Han:

Study On Non-FIFO Arc in Time-Dependent Networks. 305-310 - Lianxing Jia Wei Zhu, Chenggong Zhai, Yi Du:

Research on an Integrated Network Management System. 311-316 - Yong Zhang, Xianghong Yan, Yang Song, Hongmei Zhu:

The Computer Bracket Pressure Monitor System of Fully Mechanized Coalface in Coal Mine Based On CAN Bus. 317-322 - Tao Yu, Shanzhi Chen, Ming Ai, Xin Li, Yuhong Li, Zhen Qin:

A Framework for Reliability Computation of the IP Network. 323-327 - Lili Wang, Wei Gu:

Numerical Solution of A Type of Nonlinear Parabolic Equations. 328-333 - Shuli Wang, Jianming Zhang:

Positive solutions of m-points conjugate boundary value problems. 334-338 - Jinzhu Zhang, Zhen Jin

, Huimin Zhang:
Existence of Nonoscillatory Solution for Second Order Nonlinear Neutral Delay Differential Equation. 339-342 - Hongxia Shen, Zhen Jin

:
Two dimensional pattern formation of prey-predator system. 343-346 - Hongyang Ma

, Bingquan Chen:
Quantum network based on multiparty quantum secret sharing. 347-351 - Xin Lü, Zhi Ma:

Quantum Information Security Protocols and Quantum Coding Theory. 352-356 - Sinjae Lee, Shaojian Zhu, Yanggon Kim:

P2P Trust Model: The Resource Chain Model. 357-362 - (Withdrawn) Network Protocols Analyzing by an Environmental Bisimulation Method. 363-367

- Kongfa Hu, Zhenzhi Gong, Qingli Da:

A Rapid Grouping Aggregation Algorithm Based on the Multi-Dimension Hierarchical Encoding. 368-373 - Jun Gao:

Getting Fuzzy Control Query Table by Data Mining. 374-378 - ZhengWei Li, Shixiong Xia, Niuqiang, Zhanguo Xia:

Coal Thickness Prediction Based on Support Vector Machine Regression. 379-383 - Zhijun Ma, Li Chen, Yizhen Zhang:

BDA information management and decision support based on DW. 384-387 - Zhijun Ma, Quan Shi, Bin Li:

Battle Damage Assessment based on Bayesian Network. 388-391 - Hongwei Zhao, Xiaolin Zhao, Yiming Qi:

Infrared Point Target Detection and Tracking Based on DSP. 392-394 - Jingwen Tian, Meijuan Gao, Jin Li:

Intelligent Window Based on Embedded System. 395-399 - Qiang Huang, Xiaofeng Liang, Yingying Zhu:

Dependable distributed embedded system assessment platform design. 400-405 - Mingshan Liu, Yuan Zhou:

Application of Embedded System in Construction Machinery. 406-411 - Peng Liu, Guojun Dai, Tingting Fu:

A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. 412-416 - Yongquan Liang, Zhongying Zhao, Qingtian Zeng:

Mining User's Interest from Reading Behavior in E-learning System. 417-422 - Jie Yin, Yuexuan Wang, Cheng Wu:

An Approach to Build Accessible Grid Service. 423-428 - Youngkon Lee, Gwyduk Yeom:

A Research for Quality Preservation Methodology for SOA Environment. 429-434 - Yuping Qin, Qing Ai, Xiukun Wang, Xiangna Li:

Study on Classification Algorithm of Multi-subject Text. 435-438 - Rongsheng Xie, Keshuo Wu, Jiangbo Du, Chunguang Li:

Survey of Public Key Digital Watermarking Systems. 439-443 - Zhuo Chen, Xiang-Shuang Liu, Xiaodong Zhunag:

An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence. 444-449 - Yan Li:

Application of Multi-Agent for Collaborative Product Design Engineering. 450-454 - Shaozhong Song, Libiao Zhang, Shu Hua:

The application of particle swarm optimizaton algorithm in training forward neural network. 455-457 - Jun Wang, Huixue Sun:

Studies on CAD System with Artificial Intelligence. 458-463 - Meijuan Gao, Jingwen Tian, Kai Li:

Research on Detecting Method of Submarine Oil Pipelines Corrosion Degree Based on Chaos Genetic Algorithm Neural Network. 464-469 - Changtong Luo

, Bo Yu
:
Low Dimensional Simplex Evolution - A Hybrid Heuristic for Global Optimization. 470-474 - Zhaowen Wei, Junyan Yan, Yunpeng Ou:

An Enhancement Dynamic Contract Net Protocol. 475-480 - Jingsong He, Jian Tang, Qiansheng Fang:

Study on The Property of Training Samples and Learning Space with Genetic Algorithms. 481-486 - Hong Zhang, Zhengxing Cai, Fan Yang, Wei Wei:

Research on Lossless Image Compression Algorithms Using Fermat Number Transform. 487-490 - Chunmei Wang, Suzhen Wang, Chongming Zhang, Junzhong Zou:

Maximum Variance Image Segmentation Based on Improved Genetic Algorithm. 491-494 - Muhammad Kamran, Haroon-Ur-Rashid Khan, Shi Feng:

Distortion Analysis in Scalable Image Compression Scheme based on efficient Codebook selection. 495-500 - Jiajin Lei, Chao Lu:

Fusion of ICA Spatial and Temporal and Localized Features for Face Recognition. 501-506 - Xiaojuan Li, Cunshe Chen, Anbo Liang, Yan Shi:

Local And Global Features Extracting and Fusion For microbial Recognition. 507-511 - Congying Han, Guoping He, Huanqing Cui, Xuping Zhang:

Distributed Parallel Algorithm For Nonlinear Optimization Without Derivatives. 512-515 - Jiuyuan Huo, Liqun Liu, Li Liu, Yi Yang, Lian Li:

Selection of the Order of Autoregressive Models for Host Load Prediction in Grid. 516-521 - Beihong Jin, Sihua Tian, Chen Lin, Xin Ren, Yu Huang:

An Integrated Prefetching and Caching Strategy for Mobile Web Caching System. 522-527 - Mohammad Moallemi, Mohammad Hossien Yaghmaee

, Mahmoud Naghibzadeh:
A Fault-Tolerant Mutual Exclusion Resource Reservation Protocol for Clustered Mobile Ad hoc Networks. 528-533 - Liming He:

Time Synchronization with Extended Clock Model for Wireless Sensor Networks. 534-539 - Weifeng Lu, Meng Wu:

Analysis of communication traffic characteristics of two-hop-relay cellular system in the dead spots. 540-545 - Wei Rong, Muqing Wu, Tianhang Yu:

LSMR: a Label Switching Multipath Routing protocol for Ad Hoc Networks. 546-551 - Long Jin, Xvming Shi:

A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog Deviation. 552-557 - Jingwen Tian, Meijuan Gao, Yujuan Xiang:

The Study of Compost Quality Evaluation Modeling Method Based on Fuzzy Neural Network for Sewage Treatment. 558-563 - Wei Zhou, Meiying Yang, Liyan Han:

A Nonparametric Approach to Pricing Convertible Bond via Neural Network. 564-569 - Xuemei Liu, Shusheng Zhong, Xiaoliang Bai:

A Modified SOFM Segmentation Method in Reverse Engineering. 570-573 - Lei Yu, Jia Ma, Fuji Ren, Shingo Kuroiwa:

Automatic Text Summarization Based on Lexical Chains and Structural Features. 574-578 - Yumin Dong, Shufen Xiao:

Hybrid Application On Job-Shop Scheduling by Genetic Algorithm and MAS Spring-Net. 579-584 - Ruo Ando:

Parallel analysis of polymorphic viral code using automated deduction system. 585-592 - Xiaoguang Liu, Gang Wang, Jing Liu:

A Double Level Granularity for Multimedia on Demand System. 593-596 - Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao:

Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids. 597-602 - Lijie Zhang, Hui Liu, Yan Wang:

Numerical Simulation of A Difference Scheme Applied in Image Processing Based on Four-Order PDEs. 603-605 - Qinyong Ma, Shenkang Wang, Dongdong Nie, Jianfeng Qiu:

Recognizing Humans Based on Gait Moment Image. 606-610 - Hong Zhang, Hongjun Su, Xianyu Su:

A Phase Unwrapping Algorithm for 3D Reconstruction. 611-615 - Yanhua Ma, Chuanjun Liu, Haiying Sun:

A Tristate Filter for Image Denoising Processing. 616-621 - Tingting Zheng, Jiaxing Cheng, Junjun Mao, Jie Song:

Multifractal and R/S Analysis of Protein Structure. 622-626 - Cunshe Chen, Xiaojuan Li, Huimei Yuan:

Quality assessment of beef based of computer vision and electronic nose. 627-631 - Jinquan Wang, Xiaoguang Gao, Jianguo Shi, Zhengsheng Li:

Double Unmanned Air Vehicle's Path Planning for Scout via Cross-Entropy Method. 632-635 - Ziqiang Wang, Xia Sun, Dexian Zhang:

A PACA-Based Multicast Routing Algorithm. 636-639 - Chunhua Yang, Jiancheng Wan:

A Formal Approach to Specifying Architecture Aspects and Their Weaving logic. 640-645 - Chang-Ki Kim, Danhyung Lee, In-Young Ko, Jongmoon Baik:

A Lightweight value-based Software Architecture Evaluation. 646-649 - Xiangchen Tan, Tie Feng, Jiachen Zhang:

Mapping Software Design Changes to Source Code Changes. 650-655 - Biying Lin, Yanhui Zhang:

The Management and Validation of Business Rules in Telecom Operator' Settlement and Apportion System. 656-661 - Bo Liu, Yansheng Lu:

A Scable Peer-to-Peer Overlay for Applications with Time Constraints. 662-667 - Peihe Tang, Hao Liu:

The research of local area storage grid system. 668-672 - Wei Chen, Jingtao Song, Jinan Leng, Hanyang Lu:

A New Double scheduling DBA Algorithm for next generation access network. 673-678 - Ye Liang, Linlin Ci:

Organization technology of Mobile Peer-to-peer Network Based on Mobile Unit. 679-682 - Xiuhua Fu, Wenan Zhou, Junli Xu, Junde Song:

Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop Network. 683-688 - Min Xiao, Gaolin Chen, Debao Xiao:

A Policy-Based Energy Efficient Clustering Scheme for Wireless Sensor Networks. 689-694 - Yi-hong Dong, Chao Sun, Xiaoying Tai:

An Adaptive Counter Propagation Network. 695-700 - Haitao Li, Aisong Shi, Bingsen Zhang:

A Dyeing Color Matching Method Combining RBF Neural Networks with Genetic Algorithms. 701-706 - Xusheng Gan, Hongcai Zhang, Yongmei Cheng, Chao Shi:

Aerodynamic Parameter Fitting Based on Robust Least Squares Support Vector Machines. 707-711 - Zhisheng Zhang, Yaming Sun:

Assessment on Fault-tolerance Performance Using Neural Network Model Based on Ant Colony Optimization Algorithm for Fault Diagnosis in Distribution Systems of Electric Power Systems. 712-716 - Zheng Gong, Yu Long, Kefei Chen:

Efficient Partially Blind Signature from LFSR. 717-722 - Guowen Li, Jia Yu, Rupeng Li, Daxing Li:

An Approach to Convert Any Threshold Signature into a Threshold Group Signature. 723-726 - Wen Liu, Shoushan Luo, Ping Chen:

A Study of Secure Multi-party Ranking Problem. 727-732 - Zhenghua Xue, Xiaoshe Dong, Siyuan Ma, Weiqing Dong:

A Survey on Failure Prediction of Large-Scale Server Clusters. 733-738 - Min Xiao, Debao Xiao:

Alert Verification Based on Attack Classification in Collaborative Intrusion Detection. 739-744 - Yan Luo, Changrui Yu:

A Hybrid Parallel Algorithm for Complex Decision Problem Optimization. 745-750 - Yanan Shen, Rongcai Zhao, Lei Wang:

Eliminating Redundant Communication of Code Generation for Distributed Memory Machines. 751-756 - X. Y. Zeng:

Equivalence of the Oscillation of Two Coupled Difference Systems. 757-761 - Liying Wang, Decun Zhang, X. Y. Zeng:

On the Higher Order Difference Equation xn+1 = (xn-k+1)/(-1+xnxn-1...xn-k+1). 762-765 - Ying Gao:

Peirodic Growing of Two Populations Intergrowth System. 766-769 - Yanping Guo, Yunhai Wang, Changlong Yu:

Positive solutions of m-point boundary value problems for second order differential equations with an advanced argument. 770-773 - Chieko Matsuyama, Toyoshiro Nakashima, Naohiro Ishii:

Analysis of Source Codes by Beginners in Programming Education. 774-781 - Fei Dai, Tong Li:

Tailoring Software Evolution Process. 782-787 - Jianli Duan, Ning Zhang:

Research on Visualization Techniques for Web Usability Analysis. 788-791 - Chengwu Lu:

Image Denoising Based on MORF and Minimization Total Variation. 792-796 - Fuyong Yuan, Chunxia Yin, Jian Liu:

Improvement of PageRank for Focused Crawler. 797-802 - Hong Zhang, Bo Zhang, Lingdong Kong, Zhengxing Cai:

Generalized Association Rule Mining Algorithms based on Data Cube. 803-808 - Zhizhou Kong, Zixing Cai:

Advances of Research in Fuzzy Integral for Classifiers' fusion. 809-814 - Mingwei Leng, Haitao Tang, Xiaoyun Chen:

An Efficient K-means Clustering Algorithm Based on Influence Factors. 815-820 - Yang Xia, Qiang Zhang, Zhao Xu, Zhang Ling:

Research on Distributed E-Commerce System Architecture. 821-825 - Cheng Yu, Huamao Gu:

A Policy-Based Framework for Designing Strategies for Service Negotiation. 826-831 - Fusheng Qiu, Wenjian Liu:

An XML-based Representation for Generic Bill of Materials (GBOM). 832-837 - Xinguo Deng, Ziyu Lin, Weiqing Chen, Ruliang Xiao, Lina Fang, Ling Li:

Modeling Web Service Choreography and Orchestration with Colored Petri Nets. 838-843 - Shijin Li, Yuelong Zhu, Jing Liu, Xiaohua Zhang:

A New Supervised Clustering Algorithm for Data Set with Mixed Attributes. 844-849 - Tinghuai Ma

, Meili Tang:
Evaluation of High-tech Program Based on Rough Set Theory. 850-854

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














