default search action
12th DASC 2014: Dalian, China
- IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, DASC 2014, Dalian, China, August 24-27, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5079-9
DASC 2014: 12th IEEE International Conference on Dependable, Autonomic and Secure Computing
- Yang Gu, Zhenchun Huang:
Robinia-BLAST: An Extensible Parallel BLAST Based on Data-Intensive Distributed Computing. 1-6 - Anand V. Akella, Kaiqi Xiong:
Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN). 7-13 - Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab:
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems. 14-19 - Jinho Ahn, Yoohwan Kim:
Effective SBML Protocol for Tolerating Concurrent Failures Based on Broadcast Networks. 20-25 - Yan Wen, Jinjing Zhao, Hua Chen:
Towards Thwarting Data Leakage with Memory Page Access Interception. 26-31 - Hiroyuki Kido, Yukio Ohsawa, Makoto Hirai, Yoshifumi Yuasa, Toshinori Takai:
Towards Argumentation Schemes for Open Systems Dependability. 32-38 - Yi Cai, Xudong Liu:
A Multi-use CCA-Secure Proxy Re-encryption Scheme. 39-44 - Wenbing Zhao:
Application-Aware Byzantine Fault Tolerance. 45-50 - Xinfeng Ye:
A Study of Security Requirements Negotiation. 51-56 - Xuewei Feng, Dongxia Wang, Minhuan Huang, Xiao Xia Sun:
An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining. 57-62 - Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Android App Protection via Interpretation Obfuscation. 63-68 - Gen Li, Shuangxi Wang, Ying Zhang, Xiaohui Peng:
Hunter: Online Accurate Taint Propagation Analysis Based System for Detecting Bugs in Binaries. 69-74 - Shuai Shao, Guowei Dong, Tao Guo, Tianchang Yang, Chenjie Shi:
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications. 75-80 - Yong Zhao, Aixin Zhang, Songnian Lu:
The DWT Group Fingerprinting Scheme. 81-84 - Huaqun Wang:
Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter Ciphertext. 85-90 - Wang Jie, Yu Xiao, Zhao Ming, Wang Yong:
A Novel Dynamic Ranked Fuzzy Keyword Search over Cloud Encrypted Data. 91-96 - Wei Zhang, Yue Ji Wang, Xiao Lei Wang:
A Survey of Defense against P2P Botnets. 97-102 - Yang Shang, Zhiyang Li, Wenyu Qu, Yujie Xu, Zining Song, Xuefei Zhou:
Scalable Collaborative Filtering Recommendation Algorithm with MapReduce. 103-108 - Hua Chai, Wenbing Zhao:
Byzantine Fault Tolerant Event Stream Processing for Autonomic Computing. 109-114 - Xiaofeng Tang, Aiqiang Xu, Wenhai Li, Zhiyong Yang:
Fault Models of CMOS Gates: An Empirical Study Based on Mutation Analysis. 115-120 - Hui Li, Weishi Zhang, Weifu Zhou, Bo Su:
A Novel Vulnerability Detection Method for ZigBee MAC Layer. 121-124 - Muhammad Khurram Khan, Saru Kumari, Xiaomin Wang, Rahul Kumar:
Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme. 125-128 - Zhengjun Bi, Changzheng Gao:
Power System Dynamic Voltage Stability Analysis Considering Wind Power. 129-132 - Xu Zhou, Gen Li, Kai Lu, Shuangxi Wang:
Enhancing the Security of Parallel Programs via Reducing Scheduling Space. 133-138 - Kaiyu Wan, Vangalur S. Alagar:
Achieving Dependability of Cyber Physical Systems with Autonomic Covering. 139-145 - Tingting Wang, Zhaobin Liu, Yi Chen, Yujie Xu, Xiaoming Dai:
Load Balancing Task Scheduling Based on Genetic Algorithm in Cloud Computing. 146-152 - Yuanyuan Li, Wenyu Qu, Zhiyang Li, Yujie Xu, Changqing Ji, Junfeng Wu:
Skyline Query Based on User Preference with MapReduce. 153-158
EmbeddedCom 2014: 12th IEEE International Conference on Embedded Computing
- Rehana Begam, Dakai Zhu, Hakan Aydin:
Preference-Oriented Fixed-Priority Scheduling for Real-Time Systems. 159-165 - Mabel Mary Joy, Wolfgang Müller, Franz-Josef Rammig:
Source Code Annotated Memory Leak Detection for Soft Real Time Embedded Systems with Resource Constraints. 166-172 - Babar Shah, Chung-Jae Lee, Ki-Il Kim:
Fuzzy Search Controller in Unstructured Mobile Peer-to-Peer Networks. 173-178 - Jun Xia, Li Luo, Zhengbin Pang, Jun Zhang, Junsheng Chang:
A Low Overhead Last-Write-Touch Prediction Scheme. 179-183 - Tyng-Yeu Liang, Hung-Fu Li, Yu-Chih Chen:
A Ubiquitous Integrated Development Environment for C Programming on Mobile Devices. 184-189 - Chin-Fu Kuo:
Energy-Efficient Scheduling for Real-Time Tasks on Uniform Multiprocessors. 190-195 - Mohammadreza Rezaee, Yasser Sedaghat, Masoud Khosravi Farmad:
A Confidence-Based Software Voter for Safety-Critical Systems. 196-201 - Kyung Tae Kim, Jong Chang Park, Manyun Kim, Ung-Mo Kim, Hee Yong Youn:
A Spanning Tree Based Data Collection for Real-Time Streaming Sensor Data. 202-207 - Shengyan Zhou, Yongxin Zhu, Chaojun Wang, Xiaoqi Gu, Jun Yin, Jiang Jiang, Guoguang Rong:
An FPGA-Assisted Cloud Framework for Massive ECG Signal Processing. 208-213 - Yaying Zhang, Xiuqing Lu, Chen Ye:
Distributed Collaborative Vehicle Tracking in Embedded Smart Camera Networks. 214-218 - Byung Jun Lee, Ho Kuen Song, Youngho Suh, Kyung Hwan Oh, Hee Yong Youn:
Energy-Efficient Gossiping Protocol of WSN with Realtime Streaming Data. 219-224 - Jun Wu:
Energy-Efficient Scheduling of Real-Time Tasks with Lock-Free Objects. 225-230 - Yantao Gao, Hao Gao, Xudong Zhang:
MIMO Radar Algorithm Parallel Implementation Based on TMS320C6678. 231-236 - Zhishan Guo, Sanjoy K. Baruah:
Mixed-Criticality Scheduling upon Varying-Speed Multiprocessors. 237-244 - Xiaokai Chang, Xue Wei:
Parallel Implementation of Feasible Direction Algorithm for Large-Scale Sensor Network Location Problems. 245-251 - Xianfeng Li, Zhiqiang Bao:
Performance Characterization of Web Applications with HTML5 Enhancements. 252-258
PICom 2014: 12th IEEE International Conference on Pervasive Intelligence and Computing
- Qi Zhang, Zhiyang Li, Yegang Du, Wenyu Qu, Xiaoxuan Zhang:
A Novel Progressive Transmission in Mobile Visual Search. 259-264 - Dejun Yue, Ge Yu, Derong Shen, Xiaocong Yu:
A Weighted Aggregation Rule in Crowdsourcing Systems for High Result Accuracy. 265-270 - Jean Loup Lamothe, James She, Xiaoqi Tan:
Cyber-Physical Directory with Optimized Visualization. 271-276 - Tiantian Li, Ge Yu, Xuebing Liu, Jie Song:
Analyzing the Waiting Energy Consumption of NoSQL Databases. 277-282 - Yufeng Wang, Athanasios V. Vasilakos, Qun Jin, Jianhua Ma:
A Wi-Fi Direct Based P2P Application Prototype for Mobile Social Networking in Proximity (MSNP). 283-288 - Soo Dong Kim, Jae Yoo Lee, Dae Young Kim, Chun Woo Park, Hyun Jung La:
Modeling BPEL-Based Collaborations with Heterogeneous IoT Devices. 289-294 - Wenxiang Li, Yunhe Wu, Chunsheng Zhu, Yajie Ma:
Performance Comparison of Source Routing Tactics for WSN of Grid Topology. 295-300 - Heng Qi, Haibo Xu, Keqiu Li, Jingyi Li:
A Shape Clustering Based Framework for Fast Context-Sensitive Shape Retrieval. 301-304 - Chien-Fu Cheng, Chih We Huang, Meng-Shiuan Pan:
A Matching Algorithm with Low Message Overhead for Sensor Relocation Problem. 305-309 - Tao Zhang, Qi Zhang, Dequn Liang:
A Novel Probabilistic Latent Semantic Analysis Based Image Blur Metric. 310-315 - Hyun Jung La, Jae Yoo Lee, Zhen Zhe Piao, Soo Dong Kim:
An Efficient Context Acquisition for 'n' Mobile Apps. 316-321 - Kai Shuang, Xuan Shan, Zhengguo Sheng, Chunsheng Zhu:
An Efficient ZigBee-WebSocket Based M2M Environmental Monitoring System. 322-326 - Jicheng Hu, Xiaofeng Wei, Honglin He:
Brain Image Segmentation Based on Hypergraph Modeling. 327-332 - Zhimin Li, Weijiang Liu, Zhiyang Li, Jingxia Sun:
A Bitmap-Based Algorithm for Detecting Stealthy Superpoints. 333-337 - Junfeng Wu, Zhiyang Li, Yujie Xu, Changqing Ji, Yuanyuan Li, Xufeng Xing:
Color Image Retrieval Using Visual Weighted Blocks. 338-343 - Shuai Wang, Zhijun Li, Shouxu Jiang:
Distributed Energy-Efficient Power Control Algorithm of Delay Constrained Traffic over Multi Fading Channels. 344-349 - Yong Liu, Qiangfu Zhao, Yan Pei:
Ensemble Learning with Correlation-Based Penalty. 350-353 - Hui Qi, Yanheng Liu, Da Wei:
GPS-Based Vehicle Moving State Recognition Method and Its Applications on Dynamic In-Car Navigation Systems. 354-360 - Xiujuan Xu, Wei Wang, Yu Liu, Hong Yu, Xiaowei Zhao:
iDBMM: A Novel Algorithm to Model Dynamic Behavior in Large Evolving Graphs. 361-366 - Chuanwei Xu, Shuo Yang, Jiting Huang, Changqing Ji:
Ontology Based Heterogeneous Data Integration Framework Facing Mobile Environment. 367-371 - Peng Ke, Wenxiang Li, Yunhe Wu:
Research on Multiple Services Scheduling Based on Priority-Queuing Model. 372-376 - Xiaowei Zhao, Hong Yu, Zhenzhen Xu, Tinlin Tian, Xiujuan Xu:
The Role of Probability of Learning and Reconnecting in the Evolution of Cooperation. 377-381 - Jaya Bhattacharjee, Anita Pal, Sajal Mukhopadhyay, Anirban Bharasa:
Incentive and Quality Aware Participatory Sensing System. 382-387
TrustData 2014: Fifth IEEE International Workshop on Trust, Security and Privacy for Big Data
- Weilong Ruan, Zhengjun Zhai:
Kernel-Level Design to Support Partitioning and Hierarchical Real-Time Scheduling of ARINC 653 for VxWorks. 388-393 - Xingzhe Hou, Chong Liu, Hongliang Sun, Yuangang Tan, Rong He, Yingchun Zheng:
A Method for Large-Scale Access in Smart Power Consumption Field Based on Stateless Load Balancing. 394-399 - Yunzhi Jin, Hua Zhou, Hongwei Kang, Jinzhuo Liu, Na Zhao:
An Approach to Resources Management of Software Evolution Processes Based on 3S. 400-405 - Mikhail Zolotukhin, Timo Hämäläinen, Tero Kokkonen, Jarmo Siltanen:
Analysis of HTTP Requests for Anomaly Detection of Web Attacks. 406-411 - Liang Liu, Yanjun Hu, Hua Qian, Xuming Pei:
The Low-Power and Long-Distance System Based on Wireless Sensor Networks. 412-417 - Lichen Zhang:
Convergence Approach to Model Physical World and Cyber World of Aviation Cyber Physical System. 418-423 - Xingzhe Hou, Yuangang Tan, Hongliang Sun, Gang Wang, Ying Wang, Yali Wang:
A Visualization Representation Method Based on GIS & RIA and Its Application in Interactive Power Utilization Field. 424-428
SDSN 2014: Second International Workshop on Software Defined Sensor Networks
- Xigui Wang, Xianfeng Li, Wen Wen:
WLCleaner: Reducing Energy Waste Caused by WakeLock Bugs at Runtime. 429-434 - Di Zheng, Jun Wang, Ben Kerong:
Research of QoC Based Management for Complex Sensor Networks Applications. 435-440 - Tran Van Dung, Ittetsu Taniguchi, Hiroyuki Tomiyama:
Cache Simulation for Instruction Set Simulator QEMU. 441-446 - Guoqiang Hang, Xuanchang Zhou, Xiaohui Hu:
Design of Dynamic Digital Circuits with n-Channel Multiple-Input Floating-Gate Transistors. 447-452 - Saif-Ur Rehman, Gang Cui, Jianmin Bao:
Post Deployment Encryption Key Generation for a Fully Connected and Secure Wireless Sensor Network. 453-458 - Jun-Ho Seo, Guy Martin Tchamgoue, Kyong Hoon Kim:
Power-Aware Real-Time Virtual Machine Schedulers in Discrete DVFS Systems. 459-463 - Amjad Ali, Kyong Hoon Kim:
Compositional Real-Time Scheduling of Mixed-Criticality Real-Time Systems. 464-469 - Yuanyuan Fan, Dajun Xiao, Xu Mei, Chao Liu, Xuesong Yan, Chengyu Hu:
A Software-Defined Intelligent Method for Antenna Design. 470-474 - Qingzhong Liang, Hui Li, Yuanyuan Fan, Xuesong Yan, Chengyu Hu, Hong Yao:
SAPSN: A Sensor Network for Signal Acquisition and Processing. 475-478 - Bin Cheng, Linlin Ci, Chengping Tian, Xuanya Li, Minghua Yang:
Contention Window-Based MAC Protocol for Wireless Sensor Networks. 479-484 - Chengping Tian, Linlin Ci, Bin Cheng, Xuanya Li:
A 3D Location-Based Energy Aware Routing Protocol in Delay Tolerant Networks. 485-490 - Xupeng Fang, Lidong Zhai, Zhaopeng Jia, Wenyan Bai:
A Game Model for Predicting the Attack Path of APT. 491-495
AEIT 2014: International Workshop on Assistive Engineering and Information Technologies
- Di Zheng, Jun Wang, Ben Kerong:
Research of Context-Aware Component Adaptation Model in Pervasive Environment. 496-501 - Fucheng Cao, Xianwei Wang, Xin Li:
Fuzzy Adaptive PID Control of a Mobile Assistive Robot Platform. 502-506 - Xin Li, Fucheng Cao:
Location Based TOA Algorithm for UWB Wireless Body Area Networks. 507-511 - Xiaoli Wang, Ping Feng, Lirong Wang, Yajuan Song:
The Study and Development of the Automatic Scoring System for Answer Sheet of Blind Students. 512-515 - Liye Ren, Lifeng Ren, Yajuan Song, Ping Feng:
Research on Identification Modeling for Rehabilitation Training Control System for Stroke Patients' Lower Limbs Based on Support Vector Machine. 516-519 - Wanli Zhang, Guoxin Li, Lirong Wang:
Research on the Control Method of Inverted Pendulum Based on Kalman Filter. 520-523 - Lifeng Ren, Liye Ren, Jing Wang, Xiaoli Wang:
Application and Optimization of RSM Algorithm in Aqueous Two-Phase Extraction. 524-527 - Yajuan Song, Ping Feng, Xiaoli Wang, Kai Xing:
The Evaluation of Massage Skill of Palm Press Based on Dynamics and Kinematical Data. 528-531 - Ping Feng, Xiaoli Wang, Ya-Juan Song, Li-Ye Ren:
The Research of Wavelet Analysis for sEMG in Massage Assessment. 532-535 - Lei Shi, Zhen Liu:
Design of Soft Human-Robot Interface Based on Neuro-Muscular-Skeletal Model. 536-541 - Xiaomei Zhang, Gang Zhao, Yongyang Xu:
Practice and Research on Construction of Corpus for Natural Sign Language. 542-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.