default search action
CyberC 2012: Sanya, China
- 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2624-7
- Yingjie Xia, Yiwen Fang, Zhoumin Ye:
MPI-Based Twi-extraction of Traffic State Evaluation Rules. 1-4 - Somya D. Mohanty, Arun Velagapalli, Mahalingam Ramkumar:
An Efficient TCB for a Generic Content Distribution System. 5-12 - Xiang Li, Yanxu Zhu, Gang Yin, Tao Wang, Huaimin Wang:
Exploiting Attribute Redundancy in Extracting Open Source Forge Websites. 13-20 - Xuan Ding, Wei Wang:
Enabling Dynamic Analysis of Anonymized Social Network Data. 21-26 - Xufeng Shang, Yubo Yuan:
Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery. 27-30 - Shengdun Liang, Yuchun Guo:
Local Oriented Efficient Detection of Overlapping Communities in Large Networks. 31-38 - Zheng Shan, Haoran Guo, Jianmin Pang:
BTMD: A Framework of Binary Translation Based Malcode Detector. 39-43 - Jing Wang, Yuchun Guo:
Scrapy-Based Crawling and User-Behavior Characteristics Analysis on Taobao. 44-52 - Wanqing Wang, Yongjun Zhao, Jie Huang:
A New Evidence Combination Scheme for Decision Assistant. 53-57 - Jeff Warren, Michael Clear, Ciaran McGoldrick:
Metadata Independent Hashing for Media Identification & P2P Transfer Optimisation. 58-65 - Liang Ming, Dan Feng, Fang Wang, Haifeng Sun, Sen Wu:
A High Performance and High Reliability Storage Server for Parallel File System. 66-72 - Guoyi Zhang, Minghui Fang, Mingkai Qian, Shijin Xu:
Parallel Cloning Simulation of Flood Mitigation Operations in the Upper-Middle Reach of Huaihe River. 73-80 - Naixiang Ao, Yingying Xu, Changjia Chen, Yuchun Guo:
Offline Downloading: A Non-Traditional Cloud-Accelerated and Peer-Assisted Content Distribution Service. 81-88 - Edna Dias Canedo, Rafael Timóteo de Sousa Júnior, Robson de Oliveira Albuquerque, Fábio Lúcio Lopes de Mendonça:
File Exchange in a Private Cloud Supported by a Trust Model. 89-96 - Chigozirim Oriaku, Ihsam Alshahib Lami:
Holistic View Angles of Cloud Computing Services Provisions. 97-105 - Ahmad Abba Haruna, Syed Nasir Mehmood Shah, M. Nordin B. Zakaria, Anindya Jyoti Pal:
Deadline Based Performance Evaluation of Job Scheduling Algorithms. 106-110 - Fabio Marturana, Gianluigi Me, Simone Tacconi:
A Case Study on Digital Forensics in the Cloud. 111-116 - Lilliam N. Robinson-Oses, Miguel Vargas-Lombardo:
Service Layer and Axioms for User Access to the Cloud by Means of Ontologies. 117-120 - Ling-Zi Xiao, Yi-Chun Zhang:
A Case Study of Text-Based CAPTCHA Attacks. 121-124 - Talip Munire, Jamal Anwar, Wenqiang Guo:
A Proposed Steganography Method to Uyghur Script. 125-128 - Michael Naseimo Daikpor, Oluwole Adegbenro:
Arithmetic Operations on Elliptic Curves Defined over Un-conventional Element Finite Fields. 129-136 - Jayaprakash Kar:
Provably Secure Identity-Based Aggregate Signature Scheme. 137-142 - Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver. 143-150 - Lidong Zhai, Wei Guo, Zhaopeng Jia, Li Guo, Jinqiao Shi:
Worm Propagation Model for Heterogeneous Network. 151-154 - Cheng-Qiang Huang, Long-Hai Li, Shao-Feng Fu:
An Improved Construction for Reusable Anonymous Return Channels Based on Universal Re-encryption. 155-159 - Rima Djellab, Mohamed Benmohammed:
Securing Encryption Key Distribution in WLAN via QKD. 160-165 - Tong Zhang, Qi Wu, Wen Liu, Liang Chen:
Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain. 166-169 - Lynne Y. Williams, Diane M. Neal:
The Digital Aggregated Self: A Literature Review. 170-177 - Chunlei Wang, Lan Fang, Yiqi Dai, Liang Ming, Qing Miao, Dongxia Wang:
Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making. 178-184 - Amira Bradai, Hossam Afifi:
Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods. 185-190 - Di Liu, Zhi-Jiang Zhang, Ni Zhang:
A Biometrics-Based SSO Authentication Scheme in Telematics. 191-194 - Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose:
A Framework for P2P Botnet Detection Using SVM. 195-200 - Riyanat O. Shittu, Alex Healing, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Visual Analytic Agent-Based Framework for Intrusion Alert Analysis. 201-207 - Xiaolei Li, Dongmei Sun:
A Dual-Mode Fingerprint Fusion Encryption Method Based on Fuzzy Vault. 208-215 - João Ferreira, Henrique Santos:
Keystroke Dynamics for Continuous Access Control Enforcement. 216-223 - Liang Chen, Tong Zhang, Wen Liu, Chengmin Gao:
Non-interactive Exponential Homomorphic Encryption Algorithm. 224-227 - Peng Cao, Huiyan Jiang, Bo Liu, Weiwei Shan:
Memory Bandwidth Optimization Strategy of Coarse-Grained Reconfigurable Architecture. 228-231 - Yang Shi, Desen Zhang, Mingyan Xiao, Minghua Lu:
SOA-Based Simulation Framework: A Way to Simulation Composability. 232-236 - Sining Ma, Xi Chen, Guicai Song, Juan Wang, Limin Sun, Jia Yan:
The Converged Service Oriented Architecture in Smart Home Service. 237-240 - Alexander Cameron, Markus Stumptner, Nanda Nandagopal, Wolfgang Mayer, Todd Mansell:
Rule-Based Control of Decentralised Asynchronous SOA for Real-Time Applications. 241-248 - Pen-Choug Sun, Michael O. Odetayo, Rahat Iqbal, Anne E. James:
A Core Broking Model for E-Markets. 249-256 - Zexin Jiang:
A Novel Simulation Time and Wall Clock Time Synchronization Algorithm for HLA. 257-260 - Xuexiang Wang, Weiwei Shan, Hao Liu:
Uniform SystemC Co-Simulation Methodology for System-on-Chip Designs. 261-267 - Ming Chen, Bai Na:
An Efficient and Flexible Embedded Memory IP Compiler. 268-273 - Weiyuan Sun, Xing Chen, Fangyi Liu, Liang Zhao:
Collection System for Pressure Information of Buildings Based on the IoT and CAN Bus. 274-277 - Bo Li, Enwei Zhou, Hao Wu, Yijian Pei, Bin Shen:
Fragment Aware Scheduling for Advance Reservations in Multiprocessor Systems. 278-285 - Peng Cao, Yong Cai, Bo Liu, Weiwei Shan:
Configuration Cache Management for Coarse-Grained Reconfigurable Architecture with Multi-Array. 286-291 - Jie Li, Xinxiang Ke, Peng Cao, Weiwei Shan:
A New Approach to Implement Discrete Wavelet Transform on Coarse-Grained Reconfigurable Architecture. 292-297 - Jinjiang Xing, Yan Zhang, Jian Li, Yuncheng Feng:
Sequential Scheduling in Space Missions. 298-303 - Saleh Usman, Asad Mahmood, Muhammad Rehan Ashraf:
Porting of OSSIE on Texas Instrument's DAVINCI SoC Based SDR Platform. 304-308 - D. Dheeraj, B. Nitish, Shruti Ramesh:
Optimization of Automatic Conversion of Serial C to Parallel OpenMP. 309-314 - Santosh Kumar Jena, M. B. Srinivas:
On the Suitability of Multi-Core Processing for Embedded Automotive Systems. 315-322 - Babar Iqbal, Asif Iqbal, Mário Guimarães, Kashif Khan, Hanan Al Obaidli:
Amazon Kindle Fire from a Digital Forensics Perspective. 323-329 - Zhanchun Gao, Yuying Liang:
Improving the Collaborative Filtering Recommender System by Using GPU. 330-333 - Mahmood Aghajani, Dayang N. A. Jawawi:
An Implementation of Embedded Real Time System Framework in Service Oriented Architecture. 334-340 - Chi-Tsun Cheng, Henry Leung:
A Multi-Objective Optimization Framework for Cluster-Based Wireless Sensor Networks. 341-347 - Chi-Tsun Cheng, Chi Kong Tse:
An Analysis on the Delay-Aware Data Collection Network Structure Using Pareto Optimality. 348-352 - Bo Zeng, Yabo Dong, Zhidan Liu, Dongming Lu:
A Workload-Aware Link Scheduling for Heterogeneous Wireless Sensor Networks. 353-359 - Jiyu Zhang, Liusheng Huang, Hongli Xu, Mingjun Xiao, Weijie Guo:
An Incremental BP Neural Network Based Spurious Message Filter for VANET. 360-367 - Hao Liu, Fulong Jiang, Guoliang Yao:
An Appointment Based MAC Protocol for Wireless Sensor Networks. 368-372 - Ning Cao, Russell Higgs, Gregory M. P. O'Hare:
An Intelligent Evaluation Model Based on the LEACH Protocol in Wireless Sensor Networks. 381-388 - Dong Ting:
A Clustering Routing Algorithm Based on Reliability in Wireless Sensor Network. 389-392 - Dima Hamdan, Oum-El-Kheir Aktouf, Ioannis Parissis, Bachar El-Hassan, Abbas Hijazi, Bassam Moslem:
A Self-Monitoring, Adaptive and Resource Efficient Approach for Improving QoS in Wireless Sensor Networks. 393-400 - Huu Nghia Le, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor Networks. 401-407 - Bo Liu, Peng Cao, Jinjiang Yang:
Hybrid-Priority Configuration Cache Supervision Method for Coarse Grained Reconfigurable Architecture. 408-414 - Mahmoud A. M. Albreem, Mohd Fadzli Mohd Salleh:
Lattice Sphere Decoding Technique Assisted Optimum Detection for Block Data Transmission Systems. 415-418 - Lixia Liu, Gang Hu, Ming Xu, Yuxing Peng:
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness View. 419-422 - Xi Chen, Limin Sun, Hongsong Zhu, Yan Zhen, Hongbin Chen:
Application of Internet of Things in Power-Line Monitoring. 423-426 - Kai Chen, Hongyun Zheng, Yongxiang Zhao, Yuchun Guo:
Improved Solution to TCP Incast Problem in Data Center Networks. 427-434 - A. A. Pandit, Anup Kumar:
Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems. 435-442 - Zheng Xiang, Qiuli Kong:
A Mobility Management Architecture for IPv4/IPv6 Networks. 443-446 - Boniface O. Anyaka, Udochukwu B. Akuru:
Electromagnetic Wave Effect on Human Health: Challenges for Developing Countries. 447-452 - Xingyun Geng, Li Wang, Dong Zhou, Huiqun Wu, Wen Cao, Yuanpeng Zhang, Yalan Chen, Weijia Lu, Kui Jiang, Jiancheng Dong:
Online and Intelligent Route Decision-Making from the Public Health DataSet. 453-456 - Ali Raza, Stephen Clyde:
Testing Health-Care Integrated Systems with Anonymized Test-Data Extracted from Production Systems. 457-464 - Yingtao Niu, Fuqiang Yao, Jianzhong Chen:
Low-Complexity Anti-Jamming Capability Evaluation Method of Wireless Communication System. 465-468 - Gao Qiang, Yu Zhong Yuan:
Analysis and Simulation of New Method in LTE-Advanced System to Improve System Performance. 469-472 - Tongfei Zhang, Wenjing Liu:
FFT-Based OFDM in Broadband-PLC and Narrowband-PLC. 473-478 - Xiaorong Zhu, Yong Wang:
Capacity of Hybrid Spectrum Sharing System and Analysis Model in Cognitive Radio. 479-484 - M. Kaleem Iqbal, M. Bilal Iqbal, Iftikhar Rasheed, M. Abdullah Sandhu:
4G Evolution and Multiplexing Techniques with Solution to Implementation Challenges. 485-488 - Suyog Pawar, Prabha Kasliwal:
Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor Network. 489-492 - Mohammad Abu Hanif, Moon Ho Lee:
SER Analysis of 8x8 QOSTC with Less Decoding Complexity. 493-496 - Yeonju Lee, Kwangsoo Kim, Byeong-Hee Roh:
DDoS Attack by File Request Redirection in Kad P2P Network. 497-500 - Yansi Yang, Yingyun Yang, Xuan Zeng:
Improvement of Texture Image Retrieval Algorithm Based on Sparse Coding. 501-506 - Jaechun No, Sung-Soon Park:
Exploiting the Effect of NAND Flash-Memory SSD on Filesystem Design. 507-511 - Majing Su, Hongli Zhang, Binxing Fang, Ning Yan:
A measurement. 512-518 - Bolun Cai, Zhifeng Luo, Kerui Li:
A Coarse-to-Fine Approach for Motion Pattern Discovery. 519-522 - Xinzhi Xu, Jingbo Guo:
A Fast System Identification Method Based on Minimum Phase Space Volume. 523-526 - Xiaoguang Wang:
A Genetic Algorithm for Task Scheduling Based on User Overall Satisfaction. 527-530 - Jianhui Shi, Wenbo Zhou, Ying Liu:
The Domain Decomposition Method in Land Surface Model. 531-534 - Mohamed Waleed Fakhr:
Sparse Watermark Embedding and Recovery Using Compressed Sensing Framework for Audio Signals. 535-539 - Md. Hashem Ali Khan, Moon Ho Lee:
Performance Evaluation of Beamforming Algorithm with Jacket Matrix Based Eigenvalue Decomposition. 540-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.