default search action
1st ECC 2014: Shenzhen, China
- Jeng-Shyang Pan, Václav Snásel, Emilio Corchado, Ajith Abraham, Shyue-Liang Wang:
Intelligent Data analysis and its Applications, Volume I - Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2014, June 13-15, 2014, Shenzhen, China. Advances in Intelligent Systems and Computing 297, Springer 2014, ISBN 978-3-319-07775-8
Data Security and Its Applications
- Xueying Zhang, Wei Zhang, Fenglian Li, Guangyu Liu:
A Robust Audio Zero-Watermarking Algorithm Based on Wavelet Packet Analysis. 3-10 - Simon K. S. Cheung:
Information Security Management for Higher Education Institutions. 11-19 - Lu Muchao:
Laser Induced Breakdown Spectroscopy Data Processing Method Based on Wavelet Analysis. 21-30 - Tsu-Yang Wu, Chengxiang Zhou, Eric Ke Wang, Jeng-Shyang Pan, Chien-Ming Chen:
Towards Time-Bound Hierarchical Key Management in Cloud Computing. 31-38 - Jingyong Su, Lin-Lin Tang:
Shape Estimation from 3D Point Clouds. 39-46 - Sarka Zehnalova, Milos Kudelka, Jan Platos:
Deterministic Data Sampling Based on Neighborhood Analysis. 47-56 - Xiaoyan Fu, Yuanyuan Shang, Hui Ding, Xiuzhuang Zhou:
Diagonal Interacting Multiple Model H ∞ Filtering for Simultaneuos Sensor Localization and Target Tracking with NLOS Mitigation. 57-66
Intelligent Data Analysis and Its Applications
- Chun-Hao Chen, Guo-Cheng Lan, Tzung-Pei Hong, Shyue-Liang Wang, Yui-Kai Lin:
A Projection-Based Approach for Mining Highly Coherent Association Rules. 69-78 - Shang-Liang Chen, Yun-Yao Chen, Hsuan-Pei Wang, Chiang Hsu:
ICISLM: Design of an Integrated Cloud Information System for Logistic Management Based on Web Server Virtualization. 79-86 - Chun-Wei Lin, Tzung-Pei Hong, Hung-Chuan Hsu:
Hiding Sensitive Itemsets with Minimal Side Effects in Privacy Preserving Data Mining. 87-95 - Jui-Le Chen, Jen-Wei Hu, Chu-Sing Yang:
The Bridge Edge Label Propagation for Overlapping Community Detection in Social Networks. 97-102 - S. H. Chen, Y. H. Chen:
A New Estimation of Distribution Algorithm to Solve the Multiple Traveling Salesmen Problem with the Minimization of Total Distance. 103-111 - Konstantinos Papachristou, Anastasios Tefas, Ioannis Pitas:
Subspace Learning with Enriched Databases Using Symmetry. 113-122 - Chang-Ming Kuo, Chi-Kao Chang, Nai-Chung Yang, Chung-Ming Kuo, Yu-Ming Chen:
Image Categorization Using Macro and Micro Sense Visual Vocabulary. 123-131
Technologies for Next-Generation Network Environments
- Chun-Wei Lin, Wensheng Gan, Tzung-Pei Hong, Raylin Tso:
An Incremental Algorithm for Maintaining the Built FUSP Trees Based on the Pre-large Concepts. 135-144 - Xinying Zheng, Chien-Ming Chen, Tsu-Yang Wu, Eric Ke Wang, Tsui-Ping Chung:
Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID. 145-153 - Ci-Rong Li, Chie-Yang Kuan, Bing-Zhe He, Wu-En Wu, Chi-Yao Weng, Hung-Min Sun:
A Security System Based on Door Movement Detecting. 155-163 - Jaroslav Frnda, Miroslav Voznák, Lukas Sevcik:
Network Performance QoS Prediction. 165-174 - Yi Hou, Jialin Ma:
Study on Security Analysis of RFID. 175-180 - Jin Li, Yongyi Zhao, Bo Song:
Web Services Discovery with Semantic Based on P2P. 181-188 - Miaoyan Li, Chuansheng Zhou:
Analysis and Enhancement of TCP Performance in Ad Hoc Wireless Networks. 189-198
Intelligent System Analysis and Social Networks
- Ching-Hsun Hsieh, Chia-Hui Wang:
SGR-StarCraft: Somatosensory Game Rehabilitation via StarCraft. 201-211 - Hsin-Chang Yang, Chung-Hong Lee, Chun-Yen Wu, Yu-Chian Huang:
Discovering Sentiment of Social Messages by Mining Message Correlations. 213-221 - Xiaoyue Tang, Hui Wang, Zhengzheng Ouyang, Wei Yu:
Seek the Consent, Respect the Dissent: An Analysis of User Behaviors in Online Collaborative Community. 223-234 - Song-Nian Wang, Fong-Ming Shyu:
Study on Parallax Scrolling Web Page Conversion Module. 235-243 - Jie Wu, Václav Snásel, Guangzhao Cui:
A Graph Theory-Based Evaluation of Strategy Set in Robot Soccer. 245-255 - Rurui Zhou:
Spatial and Frequency Domain-Based Feature Fusion Method for Texture Retrieval. 257-265 - Bingbing Song, Qun Ding:
Comparisons of Typical Discrete Logistic Map and Henon Map. 267-275
Intelligent Analysis for Biological, Mobile and Cloud Computing
- Huang-Nan Huang, Der-Fa Chen, Chiu-Chun Lin, Shuo-Tsung Chen:
Wavelet-Domain Image Watermarking Using Optimization-Based Mean Quantization. 279-286 - Shih-Hao Chang, Kuo-Kun Tseng, Shin-Ming Cheng:
The Sybil Attack in Participatory Sensing: Detection and Analysis. 287-298 - Yingce Zhao, Guangming Lu, Xiaotang Guo, Yazhuo Wang:
Vessel Freeboard Calculation Method Based on Laser Scanning. 299-307 - Nikolaos Mpountouropoulos, Anastasios Tefas, Nikos Nikolaidis, Ioannis Pitas:
Visual Information Analysis for Big-Data Using Multi-core Technologies. 309-316 - Lei Meng, Chuansheng Zhou:
Application of Job Shop Based on Immune Genetic Algorithm. 317-322 - Tenghong Liu, Songlin Liu:
Study of Evaluation of GPS/BeiDou Combination Regional Navigation Satellite System. 323-327 - Youfu Du:
Texture Image Classification Using Gabor and LBP Feature. 329-339
Multimedia Innovative Computing
- Wu-Chih Hu, Chao-Ho Chen, Chih-Min Chen, Tsong-Yi Chen:
Effective Moving Object Detection from Videos Captured by a Moving Camera. 343-353 - Ji-Han Jiang, Shih-Chieh Shie, Jr-Yung Tsai:
Roadside Unit Deployment Based on Traffic Information in VANETs. 355-365 - Yi-Jen Su, Wei-Lin Hsu, Jian-Cheng Wun:
Overlapping Community Detection with a Maximal Clique Enumeration Method in MapReduce. 367-376 - Yih-Fuh Wang, Chang-Ling Tsai:
Grey Analysis on Underwater Sensor Network of Penghu Set Net. 377-382 - Chuen-Ching Wang, Chi-Hung Wei:
A Research of Wireless Energy Collector for Increasing the Power of Rechargeable Device. 383-390 - Chih-Chao Chung, Hsiu-Chu Huang, Huei-Yin Tsai, Shi-Jer Lou:
How to Determine the Best Indexes of Industry Website by FANP Approach. 391-401 - Yuh-Ming Cheng, Sheng-Huang Kuo, E.-Liang Cheng:
Mobile Learning Achievement from the Perspective of Self-efficacy: A Case Study of Basic Computer Concepts Course. 403-410
Intelligent Technologies and Telematics Applications
- Jheng-Syu Jhou, Shi-Huang Chen:
The Implementation of OBD-II Vehicle Diagnosis System Integrated with Cloud Computation Technology. 413-420 - Ladislav Zjavka:
Daily Power Demand Forecast Models of the Differential Polynomial Neural Network. 421-430 - Chunlei Fan, Zhiqiang Li, Qun Ding, Songyan Liu:
Design of Embedded Ethernet Interface Based on ARM11 and Implementation of Data Encryption. 431-439 - Dingtao Zhao, Su-Hui Kuo, Tien-Chin Wang:
The Evaluation of the Business Operation Performance by Applying Grey Relational Analysis. 441-450 - Yi-Ting Chen, Ming-Te Tsai, Bin-Yih Liao, Jeng-Shyang Pan, Mong-Fong Horng:
An Echo-Aided Bat Algorithm to Construct Topology of Spanning Tree in Wireless Sensor Networks. 451-462
Cross-Discipline Techniques in Signal Processing and Networking
- Yuh-Yih Lu, Jun-Yi Guo, Kai-Lun Chung, Hsiang-Cheh Huang:
Design of Triple-Band Planar Dipole Antenna. 465-473 - Sebastián Basterrech, Tomás Buriánek:
Solar Irradiance Estimation Using the Echo State Network and the Flexible Neural Tree. 475-484 - Jiaqi Zhen, Qun Ding, Bing Zhao:
A DOA Estimation Method for Wideband Signals with an Arbitrary Plane Array. 485-494 - Xiaomei Li, Zhaozhe Ma, Bo Song:
An e-Learning System Based on EGL and Web 2.0. 495-504 - Bing Zhao, Erfu Wang, Jiaqi Zhen, Qun Ding:
Adaptive Pulse Design and Spectrum Handoff Technology Based on Cognition. 505-514 - Jialin Ma, Yi Hou:
Technology Research of the Configured Component ERP System Based on XML. 515-519 - Ruoxin Sang, Peiquan Jin, Shouhong Wan:
Discriminative Feature Learning for Action Recognition Using a Stacked Denoising Autoencoder. 521-531
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.