default search action
CIS 2016: Wuxi, China
- 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4840-3
Regular Papers
Intelligent Computation
- Zhendong Liu, Shimin Zhao, Hongchao Ye, Jiwei Wang, Dehui Kong, Hui Wang:
The PTAS of Prediction for RNA Pseudoknotted Structure. 1-4 - Wenjing Li, Jie Zhou, Zhongming Lin, Xiang-bo Zhang:
Hadoop-Based Dynamic Load Balance Scheduling Algorithm of Logistics Inventory. 5-8 - Xiaoli Wang, Yuping Wang, Junfan Lai:
Divisible-Load Scheduling for Network-Based Computing Systems with Processor Startup Overheads and Release Times. 9-13 - Jing Lv, Yingzi Fu:
Bayesian Quantile Regression and Variable Selection for Count Data with an Application to Youth Fitness Survey. 14-18 - Tianqi Luo, Xin Huang:
Exact Solutions of the Higher Order Nonlinear Schrödinger Equation. 19-22 - MingWei Yang, Yahui Li, Yadi Zhang, WanRen Wang:
H-DAT: An Improved Buffer Scheduling Algorithm for Multi-Channel SSD. 23-27
Intelligent Algorithms
- Mengnan Tian, Xingbao Gao, Xueqing Yan:
An Improved Differential Evolution with a Novel Restart Mechanism. 28-32 - Cai Dai, Xiujuan Lei:
A New Evolutionary Algorithm Based on Decomposition for Multi-Objective Optimization Problems. 33-38 - Ning Dong:
Properly Pareto Optimality Based Multiobjective Evolutionary Algorithm for Constrained Optimization. 39-43 - Hai Jing Zhu, Bo Qiu, Bo Chong Han, Yuanyuan Liu, Xiaodong Fan:
A Novel Spectrum Profile Fitting Method of Non-Gaussian Model. 44-47 - Xiangyou Li:
Mixed Duality of Multi-Objective Programming Involving a Kind of Generalized Convexity. 48-51 - Liping Jia, Zhonghua Li:
An Ameliorated Teaching-Learning Based Optimization Algorithm for Nonlinear Bilevel Programming. 52-56 - Qizhen Zhou, Jianchun Xing, Juelong Li, Qiliang Yang:
A Device-Free Number Gesture Recognition Approach Based on Deep Learning. 57-63
Intelligent Systems and Complex Systems
- Rong Huang, Xinhong Hei, Xiao Fan Wang, Jing Zhao:
The Assessment Study of Airport Staff Work Performance Based on Fuzzy Comprehensive Evaluation. 64-68 - Vahid Behravan, Gurjeet Singh, Patrick Yin Chiang:
A Framework for Compressive-Sensing of 3D Point Clouds. 69-72 - Wenjing Li, Zhongming Lin, Xiang-bo Zhang, Jie Zhou:
Research on Distributed Logistics Inventory Model Based on Cloud Computing. 73-77 - Aihong Ren, Xingsi Xue:
A Solution Approach to Bilevel Linear Programming with Fuzzy Coefficients. 78-81 - Guoqiang Hang, Yang Yang, Danyan Zhang, Xiaohui Hu:
Dynamic Ternary Logic Gate Using Neuron-MOS Literal Circuit and Double Pass-Transistor Logic. 82-86 - Shun Long, Qunhao Feng, Wenwei Chen:
A Novel Approach to Automatic Rating of Subjective Answers Based on Semantic Matching of Keywords. 87-90 - Weiheng Zhu, Yuanfeng Liu, Liang Hao:
A Novel OCR Approach Based on Document Layout Analysis and Text Block Classification. 91-94
Pattern Recognition and Knowledge Discovery
- Lei Zhang, Zhengjun Zhai, Yue Cheng, Wensheng Niu:
Analysis of Projection Accuracy of Synthetic Image in Combined Vision System. 95-99 - Xingsi Xue, Jinshui Wang, Aihong Ren:
A Novel System Architecture for Ontology Matching. 100-102 - Min Li, Xiaoli Sun:
Curvelet Shrinkage Based Iterative Regularization Method for Image Denoising. 103-106 - Wensheng Chen, Qian Wang, Binbin Pan, Yugao Li:
Local and Non-Local Feature-Based Kernel Nonnegative Matrix Factorization Method for Face Recognition. 107-110 - Juan Li, Xiaofang Guo:
A Prototype Selection Algorithm Based on Extended Near Neighbor and Affinity Change. 111-115 - Baohua Wang, Junlian Huang, Haihong Zheng, Hui Wu:
Semi-Supervised Recursive Autoencoders for Social Review Spam Detection. 116-119 - Yao Yao, Xin Xin, Ping Guo:
Pulsar Candidate Selection by Assembling Positive Sample Emphasized Classifiers. 120-124 - Bo Chong Han, Bo Qiu, Haijing Zhu, Yuanyuan Liu, Xiaodong Fan:
Comparison of Two Cosmic Rays Positioning Algorithms. 125-128
Data Mining and Clustering
- Haiyan Fu, Dong Xu:
Data Dynamic Mining and Its Attribute Logic Relation. 129-133 - Hui Du, Yuping Wang, Chuchu Ren, Junkun Zhong, Xiaozhi Gao:
Multi-Level Clustering Algorithm for Star/Galaxy Separation. 134-137 - Fei Qin, Jie Liu, Jing Li, Bin Zhou:
A Multi-Subgroup Hierarchical Hybrid of Central Force Optimization and Gravity Search Algorithm. 138-141 - Bin Wang, Zheng Lv, Jinwei Zhao, Xiaofan Wang, Tong Zhang:
An Adaptively Disperse Centroids K-Means Algorithm Based on MapReduce Model. 142-146 - Yifeng Cheng, Zengli Liu:
Image Denoising Algorithm Based on Structure and Texture Part. 147-151 - Jingsi Ou, Wensheng Chen, Binbin Pan, Yugao Li:
A New Image Inpainting Algorithm Based on DCT Similar Patches Features. 152-155 - Xue Zhou, Zhengqun Wang, Zhibo Guo, Dongling Zhai:
Face Recognition Based on Discriminative Low-Rank Matrix Recovery with Sparse Constraint. 156-160 - Huijian Han, Kai Fu, Xiusheng Sun, Zhenxian Li:
Semantic Word Rank Algorithm Based on the Relation Degree of the Words. 161-164 - Lei Zhang, Chengcai Chen:
Sentiment Classification with Convolutional Neural Networks: An Experimental Study on a Large-Scale Chinese Conversation Corpus. 165-169
Optimization Theory and Methods
- Haiyan Liu, Yuping Wang, Liwen Liu, Xiaodong Li, Xiaozhi Gao:
A Two Phase Approach Based on Dynamic Variable Grouping and Self-Adaptive Group Search for Large Scale Optimization. 170-174 - Jiawei Yuan, Hai-Lin Liu:
A New Dominance Relation Based on Simplex for Many Objective Optimization Problems. 175-178 - Jie Liu, Xiaofang Guo:
An Improved Differential Evolution Algorithm for Unconstrained Optimization Problems. 179-181 - Fei Wei, Shugang Li, Jing Li:
A New Cooperative Coevolution with a New Auxiliary Function for Large Scale Global Optimization. 182-185 - Jingyu Wang, Junfeng Chen, Shi Cheng, Yingjuan Xie:
Double Heuristic Optimization Based on Hierarchical Partitioning for Coverage Path Planning of Robot Mowers. 186-189 - Zhoudong Hua, Junfeng Chen, Yingjuan Xie:
Brain Storm Optimization with Discrete Particle Swarm Optimization for TSP. 190-193 - Qiang Wang, Hai-Lin Liu, Yiu-Ming Cheung:
A Renewable Energy Cooperation Scheme for OFDM Systems Using Evolutionary Many-Objective Optimization Algorithm. 194-197 - Hongwei Lin:
Hybridizing Differential Evolution and Nelder-Mead Simplex Algorithm for Global Optimization. 198-202
Access Control and Protection
- Sulong Tang, Liji Wu, Xiangmin Zhang, Xingjun Wu, Beibei Wang:
A Novel Method of Correlation Power Analysis on SM4 Hardware Implementation. 203-207 - Yan Chang, Yong Xian, Jie Li, Daqiao Zhang, Jing Gao:
Perturbation Correction Calculation Method for Remote Rendezvous between Non-Coplanar Elliptic Orbits. 208-212 - Qin Zhao, Zeyu Chen, Yiyun Zhu, Zhe Li, Xinhong Hei:
Toward Automatic Review of Building Energy Efficiency Based on Building Information Modeling. 213-217 - Lei Huang, Bin Luo:
Salient Object Detection via Video Spatio-Temporal Difference and Coherence. 218-222
Cryptography and Cryptanalysis
- Yaling Zhang, Lijun Liu, Shangping Wang:
Multi-User and Keyword-Based Searchable Encryption Scheme. 223-227 - Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Qin Wang:
An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem. 228-232 - Kun Jiang, Bing Zhao, Weijun Shan, Lihui Wang, Jing Liu:
Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography. 233-236 - Zhenyue Long, Linbin Zhan, Guiteng Chen:
A Dynamic Trust Management Mechanism in Distributed CRNs. 237-242 - Junfeng Zhao, Yongmei Wang, Yuanyi Xia:
Analysis of Information Security of Electric Power Big Data and Its Countermeasures. 243-248 - Huilin Chen, Da Bao, Hongbiao Gao, Jingde Cheng:
A Security Evaluation and Certification Management Database Based on ISO/IEC Standards. 249-253
Information Security and Integrity
- Rui Chang, Liehui Jiang, Qing Yin, Wei Liu, Shengqiao Zhang:
A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment. 254-258 - Yingjiu Guo, Xuemei Liu:
Research on the Reasoning Mechanism of Copyright Protection of Digital Content Based on the Petri Net. 259-262 - Jiujun Cheng:
Discussion on the Intension and Value of Design Techniques of Chinese Character in Word Stock. 263-266 - Fu Miao, Zhenxing Wang, Yi Guo, Liancheng Zhang:
A Security Threats Taxonomy for Routing System Intrusion Detection. 267-270 - Toan-Thinh Truong, Vi-Minh Luong, Minh-Triet Tran, Anh Duc Duong:
Secure Identity-Based Authentication Scheme Suitable for Limited-Resource Devices. 271-276 - Zhonglei Gu, Yang Liu:
Scalable Group Audio-Based Authentication Scheme for IoT Devices. 277-281 - Jinglin Wu, Yihong Long, Qiang Huang, Wei Wang:
Design and Application of IBE Email Encryption Based on Pseudo RSA Certificate. 282-286 - Ying Xue, Zhenqiang Yao, Wei Niu:
The Distributed Dissimilar Redundancy Architecture of Fly-by-Wire Flight Control System. 287-293
Network Security
- Hejun Xuan, Yuping Wang, Shanshan Hao, Zhanqi Xu, Xiaodong Li, Xiaozhi Gao:
Security-Aware Routing and Core Allocation in Elastic Optical Network with Multi-core. 294-298 - Shuangyan Yi, Hongpeng Wang, Zhenyu He, Yi Li, Wensheng Chen:
Multiple Object Tracking Based on Robust Network Flow Model. 299-303 - Jing Fang, Jingsha He, Muhammad Salman Pathan, Mengchen Gao:
A Novel Storage and Search Scheme in Cloud Computing. 304-308 - Ran Ji, Haifeng Li, Chaojing Tang:
Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning. 309-313 - Liancheng Zhang, Yi Guo, Huiqiang Yuwen, Yu Wang:
A Port Hopping Based DoS Mitigation Scheme in SDN Network. 314-317 - Shameng Wen, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, Chaojing Tang:
Testing Network Protocol Binary Software with Selective Symbolic Execution. 318-322 - Peilin Chen, Lei Zhao, Zongyu Xin, Yumeng Qiang, Ming Zhang, Tiemeng Li:
A Scheme of MIDI Music Emotion Classification Based on Fuzzy Theme Extraction and Neural Network. 323-326
Security Methodologies and Management
- Hai Zhu, Guoheng Ren, Dongxia Qin, Wei Wang, Fei Wei, Ying Cao:
Predicting User Retweet Behaviors Based on Energy Optimization. 327-330 - Zhan Huang, Shun Long, Yuying Jiang, Qian Chen:
An Outlier Detection Method Based on PageRank Algorithm. 331-335 - Pengfei Xu, Nana Ding, Feng Chen:
The Threat Assessments of the Cracks to the Soil Sites via Image Analysis. 336-339 - Hongwei Han, Shuwen Dang:
Research on Performance of Motion Platform of 3-RPS Flight Simulator. 340-344 - Jinhua Li, Shuancheng Gu, Huaqiang Fang, Xing Hong:
Research on Surface Movement Parameters of Shallow Buried Coal Seam with Central Force Optimization. 345-348 - Guo Xie, Zhuxin Wang, Xinhong Hei, Sei Takahashi, Hideo Nakamura:
Data-Based Axle Temperature Prediction of High Speed Train by Multiple Regression Analysis. 349-353
System Analysis and Modeling
- Yubin Wang, Wei Wu, Gaofeng Zhan:
An Optimized Algorithm in Risk Calculating. 354-357 - Jian Yang, Ruonan Rao, Pei Hong, Peng Ding:
Ensemble Model for Stock Price Movement Trend Prediction on Different Investing Periods. 358-361 - Xing Wang, Mingyun Chen:
A Comprehensive Research on Evaluation of Port Competitiveness Factors. 362-365 - Congmou Yuan, Wenxue Niu, Dansong Zhang:
Research on the Urbanization Strategy of Rural Population. 366-369 - Fangfang Guo, Yaoguang Zhong, Quanju Zhang:
Study on Logistics Outsourcing Strategy of E-Commerce Based on Revenue Sharing Contract. 370-373 - Huijian Han, Rongjun Song, Yanqiang Fu:
One Algorithm of Gesture Animation Synthesis. 374-377 - Qiang Chen:
Research on Cloud Computing Resource Management Model Based on Multi-Agent System. 378-381 - Feng Wang, Junhuai Li, Jing Zhang, Qiang Huang:
Research on the Multi-Tenant Placement Genetic Algorithm Based on Eucalyptus Platform. 382-385 - Weigang Ma, Siyu Tan, Xinhong Hei, Jinwei Zhao, Guo Xie:
A Prediction Method Based on Stepwise Regression Analysis for Train Axle Temperature. 386-390
Short Papers
Intelligent Computation
- Xuemei Liu, Xiang Zhang, Tianlai Huang, Zhe Yang, Wen Li, Yuzhong Ye, Shan Hu, Jing Li:
Study on the Relation between Virus and Host Cell by Alignment-Free Sequence Comparison. 391-394 - Chaoling Li, Lin Lu:
Evaluation of Regional Logistics Industry Development Level Based on Grey Entropy. 395-398 - Shuwen Dang, Kangle Wang, Hongwei Han, Pengzhan Cheng:
A Hybrid LWNN-Based Stochastic Noise Eliminating Method for Fiber Optic Gyro. 399-402 - Naiguo Wang, Xiangwei Zhu, Jian Zhang:
License Plate Segmentation and Recognition of Chinese Vehicle Based on BPNN. 403-406 - Taoran Cheng, Pengcheng Wen, Yang Li:
Research Status of Artificial Neural Network and Its Application Assumption in Aviation. 407-410 - Yan Kang, Hao Li, Chunhui Wang, Li Dai:
A Job Shop Scheduling Algorithm Using Big Bang-Big Crunch Strategy. 411-414 - Hao Li, Hai Zhu, Guoheng Ren, Hongfeng Wang, Hong Zhang, Liyong Chen:
Energy-Aware Scheduling of Workflow in Cloud Center with Deadline Constraint. 415-418
Intelligent Systems and Learning Algorithms
- Yang Sun, Yiwen Wang:
Prosodic Head Motion Generation from Text for a Chinese Talking Avatar. 419-422 - Si-Yuan Jing, Gaorong Yan, Xingyuan Chen, Peng Jin, Zhaoyi Guo:
Parallel Acceleration of IBM Alignment Model based on Lock-Free Hash Table. 423-427 - Junbing Li:
Comparisons of Central Force Optimization and Gravitational Search Algorithm. 428-430 - Shu Gong, Wei Gao:
Ontology Learning Algorithm via WMW Optimization Model. 431-434 - Peng Guo, Yunming Sun, Wei Niu, Chong Qin:
An Architecture Modeling and Simulation Methods of Integrated Electromechanical Management System. 435-439 - Rongrong Li, Kangshun Li:
The Research of Multi-Source Information Fusion Based on Cloud Computing. 440-443 - Pengcheng Wen, Yahui Li, Yadi Zhang:
Methods to Capability Improvement for Multiple UAVs' Control. 444-447 - Shiyu Zhang, Ruliang Wang:
Stability Analysis for a Class of Uncertain Time Varying Delay Systems. 448-451 - Dongbo Zhang, Lu Xiong:
The Research of Dynamic Shortest Path Based on Cloud Computing. 452-455 - Tianjun Zhang, Yun Bai, Gao-chang Zhao, Jie Liu:
Parameter Establishment of Differential Evolution Algorithm Based on Uniform Design and the Effect of Different Number of Levels. 456-460 - Yifeng Han, Hongbiao Gao, Jingde Cheng:
Autonomous Evolution in Evolutionary Personal Information Partners: Mechanism and a Case Study. 461-465
Pattern Recognition and Knowledge Discovery
- Xu Zhao, Xuefei Li, Hua Liang, Fei Deng, Long Zhou, Weizhen Chen:
The Detecting Method of Building Deformation Based on Terrestrial Laser Point Cloud. 466-469 - Baoming Qiao, Liu Jin, Yufan Yang:
An Adaptive Algorithm for Grey Image Edge Detection Based on Grey Correlation Analysis. 470-474 - Peng Sun, Ziyan Wu, Haifeng Yang, Xin Guo:
Sensors Validation Based on TAN Classifiers. 475-478 - Lixia Zhang, Kangshun Li:
Improved BOF Method for Person Re-Identification. 479-482 - Huijian Han, Luyu Wang, Kai Liu:
One Method of Cloth Simulation Based on Adaptive Meshes. 483-486 - Jianjun Xie, Junhong Li, Hong Wang, Wenyi Zeng, Ping Guo:
The Methods for Two-Dimensional Fiber Spectra Extraction. 487-490 - Yuanyuan Liu, Bo Qiu, Xiaodong Fan, Hai Jing Zhu, Bo Chong Han:
Spectra Stacking for LAMOST Low SNR Spectra. 491-493
Data Mining
- Huali Deng, Liangjun Zhang, Weikang Su:
Clustering the Families Successfully Applying for Minimum Living Standard Security System Based on K-Means Algorithm. 494-498 - Yiwen Wang, Haolan Zhang, Ke Huang, Changbin Yu, Honglei Cui:
Clustering by Creating a Graph. 499-502 - Jianping Chen, Xingsen Li:
Automated Data Mining Platform for Large Volume Data Processing. 503-506 - Jianwei Yang, Zhengda Lu:
A Shape Representation Based on Polar Vector Fourier Descriptors. 507-510
Optimization Theory and New Methods
- Rui Sun:
A Modified Adaptive Particle Swarm Optimization Algorithm. 511-513 - Wang Ding:
A New Improved Gravitational Search Algorithm Based on Chaos. 514-517 - Caitao Zhan, Changhe Li:
Shape Formation in Games: A Probability-Based Evolutionary Approach. 518-521 - Yuanjian Zhou, Xiaohui Yang:
A Novel Adaptive Beamforming Algorithm for Smart Antenna System. 522-525 - Fahui Gu, Kangshun Li, Yue Liu:
A Hybrid Evolutionary Algorithm for Solving Function Optimization Problems. 526-529 - Yu Sun:
Symbiosis Co-Evolutionary Population Topology Differential Evolution. 530-533 - Shuiping Zhang, Yang Chen, Yangdan Geng:
Fruit Fly Algorithm Based on Extremal Optimization. 534-537 - Meng Zhang, Dengxu He, Chonglong Zhu:
Cuckoo Search Algorithm Based on Hybrid-Mutation. 538-542 - Lei Fan, Yanfang Liang, Xiyang Liu, Xin Gu:
A Hybrid Evolutionary Algorithm Based on Dominated Clustering for Constrained Bi-Objective Optimization Problems. 543-546
Access Control and Protection
- Fengli Zhang, Junxin Chen, Hongchuan Zhou, Zhengwei Geng:
A Dynamic Access Control Model for Spatial Data. 547-550 - Jiazhe Chen:
A Note on the Impossible Differential Attacks on Block Cipher SM4. 551-554 - Jing Li, Fei Qin, Jie Liu, Bin Zhou:
A New Iterative Method for Solving Absolute Value Equations. 555-556 - Tianjun Wu, Yuexiang Yang:
Crafting Intents to Detect ICC Vulnerabilities of Android Apps. 557-560 - Sulin Pang, Yizhou He, Li Wang:
The Intelligent Control Model and Application for Commercial Bank Systems Emergence under Risk Status Based on Big Data. 561-565
Cryptography and Cryptanalysis
- Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng:
A Formal Analysis Method with Reasoning for Cryptographic Protocols. 566-570 - Zhouquan Du, Jie Zhang, Qiong Zhang, Zhibo Liu, Bo Zhu:
The Research of S-Box Based on Reconstruction Design Method. 571-577 - Bing Zhao, Lihui Wang, Kun Jiang, Xiaobing Liang, Weijun Shan, Jing Liu:
An Improved Power Attack on Small RSA Public Exponent. 578-581 - Jing Nie, Xueling Dai:
On the Information Security Issue in the Information Construction Process of Colleges and Universities. 582-585 - Hui Zou:
Protection of Personal Information Security in the Age of Big Data. 586-589 - Hsieh-Tsen Pan, Chiu-Shu Pan, Shyh-Chang Tsaur, Min-Shiang Hwang:
Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart Card. 590-593
Data Security and Integrity
- Qingshuang Han, Liji Wu, Xiangmin Zhang:
Research on Side Channel Attack for USB Key. 594-597 - Kun Wang, Tao Song, Alei Liang:
Mmda: Metadata Based Malware Detection on Android. 598-602 - Hongbiao Gao, Zhe Wang, Yuan Zhou, Jingde Cheng:
Development of a General-Purpose Offline E-Testing Environment. 603-607 - Zhengyang Ding, Binbin Zhang, Gaopan Huang:
Security Operation and Maintenance of Information Infrastructure Based on Minicomputer Typical Troubleshooting. 608-611 - Yuxiang Yang, Dan Wu:
Research on Environmental Impact Assessment of E-Waste Reverse Logistics. 612-615 - Mi Wang, Dong Kang:
Research on Decomposition and Correlation Design of Micro-Video Course Content. 616-619
Information System Safety
- Huali Deng, Liangjun Zhang, Zhenwei He:
Research on the Object Recognition of Minimum Living Standard Security System Based on Neural Network. 620-623 - Junfeng Zhao, Jing Wang, Lei Yin:
Detection and Control against Replay Attacks in Smart Grid. 624-627 - Huaijun Wang, Dingyi Fang, Junhuai Li, Yong Chang, Lei Yu:
The Research and Discussion on Effectiveness Evaluation of Software Protection. 628-632 - Yinghui Xia, Haotian Wu:
Reversible Data Hiding in Medical Image for Contrast Enhancement of ROI. 633-637 - Haiyan Jin, Shaopeng Zhao:
A New Parallel Instruction Model Based on Multi-Tasking Bluetooth Communication. 638-641 - Xiang He, Yihong Long, Liheng Zheng:
A Transparent File Encryption Scheme Based on FUSE. 642-645 - Dong Xu, Haiyan Fu, Wenjuan Jiang:
Research on Liver Disease Diagnosis Based on RS_LMBP Neural Network. 646-649 - Bin Gui, Fubin Chen:
Research on Identifying Emotion Sentence Based on Emotional Feature Density. 650-653
Network Security and Security Methodologies
- Shuai Jiang, Jian Wang:
Hierarchical MAC Protocol Greedy Behavior Detection in Wireless Sensor Networks. 654-659 - Yanjun Li, Ping Guo, Xin Xin:
A Divide and Conquer Method for Automatic Image Annotation. 660-664 - Yameng Li, Jingsha He, Na Huang, Chengyue Chang:
On the Recoverability of Data in Android YAFFS2. 665-668 - Yang Li, Xiaodong Zhao, Taoran Cheng:
Heterogeneous Computing Platform Based on CPU+FPGA and Working Modes. 669-672 - Xinhua Li, Juntao Chen, Jinmei Zhan, Lin Liu:
A Study on Sports Tourism Competitiveness Based on Factor Analysis Method. 673-676 - Leen Zhang, Weiwei Qian, Zhenhua Zhang, Youyuan Wang:
Research on Knowledge Demand Information Acquisition for Product Design. 677-680
System Analysis and Modeling
- Jiandong Meng:
Fast Password Authentication Protocol in Auto-Guard of Car Based on Cellphone. 681-684 - Le Wang, Taoran Cheng, Yang Li:
Preliminary Research of Secure Integrated Computing in Future Avionics. 685-688 - Huijian Han, Jingchao Wang, Kai Liu, Lingli Zhou:
Particle Sorting Algorithm Based on Stretching Tensor. 689-692 - Linrun Qiu, Kangshun Li:
The Research of Intelligent Agent System Architecture Based on Cloud Computing. 693-696 - Lu Bai, Jiansheng Wang, Baolei Huang:
The Effect of Shared L2 Cache on Determinism in Airborne Embedded System. 697-700
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.