default search action
3. ICICA 2012: Chengde, China
- Baoxiang Liu, Maode Ma, Jincai Chang:
Information Computing and Applications - Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings. Lecture Notes in Computer Science 7473, Springer 2012, ISBN 978-3-642-34061-1
Internet Computing and Applications
- Jianfang Shan, Zongtian Liu:
A Novel Event Network Matching Algorithm. 1-14 - Kunpeng Jiang, Huifang Guo, Shengping Zhu, Julong Lan:
Static Patterns Matching for High Speed Networks. 15-22 - Niu Li, Xiaoting Han:
Information Propagation in Online Social Networks Based on User Behavior. 23-30 - Xin Li, Yue-fang Yang:
Research on Operation and Management of Railway Transport of Dangerous Goods in Third-Party Logistics Enterprises. 31-36 - Jing Shen, Yusong Du:
A Password Authentication Scheme against Smart Card Security Breach. 37-44 - Bo Han, Qing Wang, Fajiang Yu, Xianda Zhang:
A Vulnerability Attack Graph Generation Method Based on Scripts. 45-50 - Zailani Abdullah, Tutut Herawan, Ahmad Noraziah, Mustafa Mat Deris:
DFP-Growth: An Efficient Algorithm for Mining Frequent Patterns in Dynamic Database. 51-58 - Xizhe Zhang, Guolong Zhao, Tianyang Lv, Ying Yin, Bin Zhang:
Analysis on Key Nodes Behavior for Complex Software Network. 59-66 - Junling Ren, Li Zhang:
Webpage Information Hiding Algorithm Based on Integration of Tags and Data. 67-74 - Wei Zhu, Ping Sun, Ying-Nan Ma, Rui Song, Shiwei He, Ke Hui Liu:
Location Method of Underground Pipeline Monitoring Point Based on Cavity Detection. 75-81 - Qichun Zhong, Jinghong Hu:
Research on Purified Internet Environment for College Students. 82-87 - Qianmu Li, Qiugan Shi, Jun Hou, Yong Qi, Hong Zhang:
A Mobile-Certificate Security Method of Satellite-Earth Integration Networks. 88-97
Multimedia Networking and Computing
- Wen-Hsing Lai, Siou-Lin Wang:
Duration Modeling for Emotional Speech. 98-103 - Hongwei Zhao, Xiao Chen, Wei Huang, Pingping Liu, Lingjiao Ma:
Research on Image Retrieval Based on Color and Shape Features. 104-111 - Kaihua Wang, Wenxiang Zhang, Zhanji Gui:
Existence and Simulations of Periodic Solution for Impulsive Predator-Prey System with Stage Structure for the Predator. 112-119 - Yan Yan, Kaihua Wang, Zhanji Gui:
Dynamics and Simulations of Multi-species Competition-Predator System with Impulsive. 120-127 - Ying Chen, Shaobai Zhang:
Research on the Distal Supervised Learning Model of Speech Inversion. 128-135 - Ruei-Chang Chen, Shih-Fong Lee, Yeong-Chau Kuo:
Low Power Pulse Width Modulation Design for Class D Audio Amplifier Systems. 136-143 - Wei Guan, Yuanhai Lv:
A New Logic Method for Education Resource Software Guarantee. 144-151 - Zhenjie Hou, Junsheng Huang, Jianhua Zhang:
Research on 3D Object Rounding Photography Systems and Technology. 152-158 - Dong Li, Yantao Tian, Chuan Wan, ShuaiShi Liu:
Facial Expression Feature Selection Based on Rough Set. 159-166
Intelligent Computing and Applications
- Weisheng Li, Jiao Du, Lifang Zhou:
Concise Representations for State Spaces in Conformant Planning Tasks. 167-174 - Zhengjun Cao, Hanyue Cao:
On Fast Division Algorithm for Polynomials Using Newton Iteration. 175-180 - Ding Wang, Chunguang Ma, Lan Shi, Yu-Heng Wang:
On the Security of an Improved Password Authentication Scheme Based on ECC. 181-188 - Lin Hu:
Strategies to Develop Personal Knowledge Management Ability Based on M-Learning. 189-195 - Li Liu, Jinkuan Wang, Dongmei Yan, Fulai Liu:
Improved Detection Algorithm for MIMO Wireless Communication System Based on Chase Detector. 196-202 - Mingxin Gan, Xue Dou, Rui Jiang:
Improving Recommendation Performance through Ontology-Based Semantic Similarity. 203-210 - Ricai Luo, Hua Tan:
Formal Modeling and Model Checking Analysis of the Wishbone System-on-Chip Bus Protocol. 211-220 - Chao Zou, Yueming Lu:
A Time Synchronization Method for Wireless Sensor Networks. 221-228 - Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:
Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius. 229-235 - Zhenfu Wu, Yanfeng Zhao, Li Qi, Jie Chen:
Scale Effect on Soil Attribute Prediction in a Complex Landscape Region. 236-245 - Yanli Liu, Yourong Wang, Jian Zhang:
New Machine Learning Algorithm: Random Forest. 246-252 - Ying Liu, Zongtian Liu:
Efficient Method of Formal Event Analysis. 253-260
Computational Statistics and Applications
- Qiao-qiao Du, Ge Gao, Zong-da Jin, Wei Li, Xiang-yu Chen:
Application of Monte Carlo Simulation in Reliability and Validity Evaluation of Two-Stage Cluster Sampling on Multinomial Sensitive Question. 261-268 - Hai-xin Jiang, Wei Tong:
New Lax-Friedrichs Scheme for Convective-Diffusion Equation. 269-276 - Juan Du:
Span of T-Colorings Multigraphs. 277-283 - Lei Hou, Hanling Li, Ming Zhang, Weijia Wang, Dezhi Lin, Lin Qiu:
Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEM. 284-290 - Zhimeng Sun:
Factor Model Averaging Quantile Regression and Simulation Study. 291-298 - Hassan Barjini, Mohamed Othman, Hamidah Ibrahim, Nur Izura Udzir:
Analytical Studies and Experimental Examines for Flooding-Based Search Algorithms. 299-306 - Shibing You, Yuan Hui, Xue Yu, Lili Bao:
Innovative Study on the Multivariate Statistical Analysis Method of Chromatography Economy Analysis. 307-314 - Xin Wang, Xu Lei, Xuyang Cao, Yang Zhou, Shunde Gao:
Optimization of Lifting Points of Large-Span Steel Structure Based on Evolutionary Programming. 315-322 - Zhijun Luo, Zhibin Zhu, Guohua Chen:
Modifying Feasible SQP Method for Inequality Constrained Optimization. 323-330 - Jianbo Liu, Yanyan Zhang, Yafeng Men, Wenying Chen:
On the Solvable n-Lie Algebras. 331-336 - Yanyan Zhang, Jianbo Liu, Wen Tao, Qin Zhu:
Modules of Lie Algebra G(A). 337-342 - Xiandong Meng, Zhiming He, Xiaowei Niu, Ganzhong Feng:
Detection Performance Analysis of Tests for Spread Targets in Compound-Gaussian Clutter. 343-349 - Yun Wang, Xiaojing Xu, Zhiqin Huang:
Rough Differential Equations in Rough Function Model. 350-357
Cloud and Evolutionary Computing
- Ming Ye, ZeHui Qu:
Cloud Computing Infrastructure and Application Study. 358-364 - Ping Guo, Lin Zhu, Zhujin Liu, Ying He:
An Ant Colony Algorithm for Solving the Sky Luminance Model Parameters. 365-372 - Su Wang, Min Zhu, Jun Zheng, Kai Zheng:
Tugboat Scheduling Problem Based on Trust-Based Ant Colony Optimization. 373-380 - Nawsher Khan, Ahmad Noraziah, Tutut Herawan:
A Cloud Architecture with an Efficient Scheduling Technique. 381-388 - Dingcai Shen, Xuewen Xia:
A Local Search Particle Swarm Optimization with Dual Species Conservation for Multimodal Optimization. 389-396 - Nawsher Khan, Ahmad Noraziah, Tutut Herawan, Mustafa Mat Deris:
Cloud Computing: Analysis of Various Services. 397-404 - Xiaofeng Chen, Xingyou Xia, Ruiyun Yu:
Quantum Ant Colony Algorithm Based on Bloch Coordinates. 405-412 - Dailin Jiang, Peijie Huang, Piyuan Lin, Jiacheng Jiang:
Energy Efficient VM Placement Heuristic Algorithms Comparison for Cloud with Multidimensional Resources. 413-420 - Lin Jing, Xipei Huang, Yiwen Zhong, Yin Wu, Hui Zhang:
A Python Based 4D Visualization Environment. 421-428 - Ce Zhang, Gang Cui, Bin Jin, Liang Wang:
Study of Trustworthiness Measurement and Kernel Modules Accessing Address Space of Any Process. 429-436 - Xing Xu, Hao Hu, Na Hu, Lin Xiao, Weiqin Ying:
Human Resource Management System Based on Factory Method Design Pattern. 437-444 - Junzhong Ji, Zhijun Liu, Aidong Zhang, Lang Jiao, Chunnian Liu:
Ant Colony Optimization with Multi-Agent Evolution for Detecting Functional Modules in Protein-Protein Interaction Networks. 445-453 - Zhenjie Hou, Jianhua Zhang:
Research on Genetic Segmentation and Recognition Algorithms. 454-460
Computer Engineering and Applications
- Takayuki Sasajima, Shin-ya Nishizaki:
Blog-Based Distributed Computation - Implementation of Software Verification System. 461-467 - Jian Deng, Bo Chen, Jiazhi Zeng:
Model Transformation Method for Compensation Events and Tasks from Business Process Model to Flowchart. 468-476 - Rafal Kapelko:
Towards Efficient Replication of Documents in Chord: Case (r, s) Erasure Codes. 477-483 - Yuanshan Lin, Di Wu, Xin Wang, Xiukun Wang, Shunde Gao:
Path Planning for Crawler Crane Using RRT. 484-491 - Ping Guo, Shuai-Shuai Chen, Ying He:
Study on Data Preprocessing for Daylight Climate Data. 492-499 - Ahmad Noraziah, Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris:
Scalable Technique to Discover Items Support from Trie Data Structure. 500-507 - Rabiei Mamat, Tutut Herawan, Ahmad Noraziah, Mustafa Mat Deris:
On Soft Partition Attribute Selection. 508-515 - Lijun Li, Kaida He, Qiudong He:
Effect of Vocabulary Preparation on Students Vocabulary and Listening Comprehension. 516-523 - Pengfei Zhang, Luojia Wan:
3D Parametric Design on Trough Type Liquid Distributor Based on AutoCAD VBA. 524-530 - Yu Sun, Yuanxiang Li, Gang Liu, Jun Liu:
A Novel Differential Evolution Algorithm with Adaptive of Population Topology. 531-538 - Yijun Li:
Empirical Study on the Relationship between Money Supply and Stock Market in Europe. 539-544 - Yanxia Wang, Xingjie Hui:
Evaluation of Agricultural Information Service System. 545-552 - Li Zhen:
Six-Mode Truncation and Chaotic Characteristics of Atmospheric Convection System. 553-559 - Ying Cai, Ning Li, Chengxia Liu:
Security Uniform Office Format Specification and API Design Based on the Java Platform. 560-568 - Li-Sha Yang, An-Chun Cheng, Ming-Shu Wang, De-Kang Zhu, Shun Chen, Ren-Yong Jia, Xiao-Yue Chen:
Bioinformatics Analysis of the Complete Nucleotide Sequence of Duck Plague Virus UL22 Gene. 569-575
Knowledge Management and Applications
- Choo-Yee Ting, Kok-Chin Khor, Yok-Cheng Sam:
Evidence Conflict Analysis Approach to Obtain an Optimal Feature Set for Bayesian Tutoring Systems. 576-583 - Ahmad Noraziah, Ainul Azila Che Fauzi, Noriyani Mohd Zin, Tutut Herawan:
Binary Vote Assignment Grid Quorum for Managing Fragmented Database. 584-591 - Ahmad Noraziah, Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris:
WLAR-Viz: Weighted Least Association Rules Visualization. 592-599 - Yue Huang, Mingxin Gan, Rui Jiang:
Ontology-Based Genes Similarity Calculation with TF-IDF. 600-607 - Rui Deng, Liang Zhang, Haimin Guo:
Quantitative Study of Oilfield Casing Damage. 608-615 - Wensheng Guo, Guowu Yang, Qianqi Le, William N. N. Hung:
Complete SAT Solver Based on Set Theory. 616-623 - Jing Feng, Tingjie ShangGuan:
Application of XML Data Mining in GUI Run-Time State Clustering. 624-631 - Shin-ya Nishizaki, Mizuki Fujii:
Strong Reduction for Typed Lambda Calculus with First-Class Environments. 632-639 - Qianqi Le, Guowu Yang, William N. N. Hung, Wensheng Guo:
Reliable NoC Mapping Based on Scatter Search. 640-647 - Andrea Carvalho Menezes, Plácido Rogério Pinheiro, Mirian Calíope Dantas Pinheiro, Tarcísio Pequeno Cavalcante:
Towards the Applied Hybrid Model in Decision Making: Support the Early Diagnosis of Type 2 Diabetes. 648-655 - Ping Shen, Shibing You:
Replacement Study of the Retention Time in Chromatography Ecomomic Analysis. 656-662 - Naisheng Wang:
Study on Frustration Tolerance and Training Method of College Students. 663-668 - Youcai Xue, Jianhui Pan:
On Statistical Analysis and Management Countermeasures of Occupation Burnout for College Teachers. 669-676 - Wenyu Zhao, Jun Gao, Xiaotian Liu, Yaping Wu:
Development of a RFID Multi-point Positioning and Attendance System Based on Data Comparison Algorithm. 677-683
Communication Technology and Applications
- Kunpeng Jiang, Julong Lan, Youjun Bu:
High Throughput Constraint Repetition for Regular Expression Matching Algorithm. 684-691 - Weixia Zou, Fang Zhang, Guanglong Du, Bin Li:
Interference Mitigation Based on Multiple SINR Thresholds in 60GHz Wireless Networks. 692-699 - Xiaohao Li, Zhenwei Zhang:
Analysis of the Coupling Action in Nonlinear Harmonic Vibration Synchronization System. 700-706 - Linlin Dong, Lixin Sun, Xiaoming Jiang, Na Zhu:
Performance Analysis of Hierarchical Modulation with Higher Spectrum Efficiency for a Higher Date Rate T-DMB System. 707-714 - Shutao Wang, Pengwei Zhang, Xiaoqing Shao:
Research on the Controlling Technique of DFBLD in the Spectrum Absorption Optical Fiber Gas Detecting System. 715-721 - Cong Liu, Chuan-gui Ma:
An Efficient and Provable Secure PAKE Scheme with Robust Anonymity. 722-729 - Shouzhi Xu, Pengfei Guo, Bo Xu, Huan Zhou:
Study on QoS of Video Communication over VANET. 730-738 - Yuan Jing, Haoyu Li, Xiaofeng Yang, Li Ma, Ji Ma, Bin Niu:
Phase Noise Estimation and Mitigation for Cognitive OFDM Systems. 739-745 - Laomo Zhang, Ying Ma, Guodong Wang:
An Effective Multipath Approach to Reducing Congestion in WSNs. 746-753 - Yu Zhang, Yana Li, Feng Xia, Ziqiang Luo:
Immunity-Based Gravitational Search Algorithm. 754-761 - Ye Wang, Jian Wang, Jian Yuan:
A Clustering Method Based on Time Heat Map in Mobile Social Network. 762-769 - Jun Ma, Yuanbo Guo, Jinbo Xiong:
TNC-eSA: An Echanced Security Access Solution to Office Networks. 770-777
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.