default search action
ICNCC 2017: Kunming, China
- Proceedings of the VI International Conference on Network, Communication and Computing, ICNCC 2017, Kunming, China, December 8-10, 2017. ACM 2017, ISBN 978-1-4503-5366-3
Data Analysis and Calculation
- Majun He, GuoZhong Li, Chaojie Huang, Yufei Ye, Wenhong Tian:
A Comparative Study of Data Skew in Hadoop. 1-6 - Pu Zhao, Jingtao Shang, Jianjun Lin, Bo Li, Xin Sun:
A Dynamic Convergent Replication Strategy Based on Distributed Hierarchical Systems. 7-13 - Aruna Govada, Abhinav Patluri, Atmika Honnalgere:
Association Rule Mining using Apriori for Large and Growing Datasets under Hadoop. 14-17 - Yuanzun Zhang, Xiaobin Tan, Weiping Li:
In-network Cache Size Allocation for Video Streaming on Named Data Networking. 18-23 - Ling Guo, Yue Yuan:
Forecast Method of Short - term Passenger Flow on Urban Rail Transit. 24-28
Image and Signal Processing
- Yutong Wang, Yuge Liu:
Research on Facial Expression Recognition based on Kinect. 29-33 - Jun Zhao, Guangyong Gao, Jianhua Cheng:
Identity Authentication Protection for "Spatial Watermarking + QR Code" Paper-cutting Digital Image. 34-37 - Haobin Sun, Shengli Liu, Da Xiao, Ruiqing Xiao:
Applying Binary Patch Comparison to Cisco IOS. 38-42 - Jianle Zhu, Peng Cao, Peijun Huo, Xuan Wang, Fangfang Chen:
The Synthesis of Multi-Graphic Visual Encryption Technology. 43-47 - Mengyue Li, Yuchun Guo, Yishuai Chen:
CNN-based Commercial Detection in TV Broadcasting. 48-53 - Chunmei Liu, Lingjuan Miao, Tian Dai:
A Fuzzy Pattern Based ICCP Matching Algorithm in Gravity-Aided Navigation. 54-58 - Yuanhang Yang, Shuhui Chen:
Multiple Bloom filters. 59-63 - Jiming Zheng, Wenfei Xie:
Weighted Hash Method based on Improved ABQ Algorithm. 64-68 - Chengcheng Huang, Wei Peng, Housen Li, Lizhi Cheng, Hao Jiang:
Computing Diagonals of Toeplitz Pentadiagonal Matrix Inverses via Matrix Möbius Transformations. 69-74
Computer Network and Security
- Yifan Tian, Jiabao Wang, Zhenji Zhou, Shengli Zhou:
CNN-Webshell: Malicious Web Shell Detection with Convolutional Neural Network. 75-79 - Jingxi Liang, Wen Zhao, Wei Ye:
Anomaly-Based Web Attack Detection: A Deep Learning Approach. 80-85 - Shuo Xu, Shuqin Li, Kun Meng, Lijun Wu, Meng Ding:
An Adaptive Malicious Domain Detection Mechanism with DNS Traffic. 86-91 - Khin Swe Yin, May Aye Khine:
Network Behavioral Features for Detecting Remote Access Trojans in the Early Stage. 92-96 - Feng Qu, Jitao Zhang, Zetian Shao, Shuzhuang Qi:
An Intrusion Detection Model Based on Deep Belief Network. 97-101 - Guyang Wang, Shulin Yang, Xuelei Ren, Bin Wang:
Research on WebSocket-Based Authentication System. 102-105 - Chengcheng Wang, Yuqing Lan:
PFESG: Permission-based Android Malware Feature Extraction Algorithm. 106-109 - Yujing Liu, Zhilin Wang, Nan Li:
A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the Internet. 110-114 - Senhao Wen, Nengqiang He, Hanbing Yan:
Detecting and Predicting APT Based on the Study of Cyber Kill Chain with Hierarchical Knowledge Reasoning. 115-119
Computer Science and Applications
- Wenxia Guo, Xiaoqin Ren, Wenhong Tian, Srikumar Venugopal:
Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the Cloud. 120-124 - Meng Li, Yasushi Shinjo:
Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers. 125-134 - Jisong Fan, Hui Ren, Chengxiang Tian:
An Analysis of Wargame Rules Simulation Based on Stochastic Lanchester Models. 135-139 - Bin Wang, Shulin Yang, Xuelei Ren, Guyang Wang:
Research on Digital Publishing Application System Based on Micro-Service Architecture. 140-144 - Jieping Hu, Shulin Yang, Bin Wang, Guyang Wang:
Design and Implementation of Remote Service Diagnosis System for Printing Machine. 145-149 - Zheng Sun, Fuyou Miao, Yang Xu, Qiyu Shao, Weihua Wang, Xingfu Wang, Chenxi Shao:
Community detection in complex networks using flow simulation. 150-155 - Xiao-Ming Yu, Wen-Jie Li:
Personalized Community Discovery Algorithm Based on GN. 156-160
Future Communication Technology and Development
- Jian Wang, Chuang Xie, Gengshan Wang:
Implement of TSCH Based MAC Accelerator for WIA-PA Industrial Wireless Network. 161-165 - Shifei Qian, Feng Luo, Jinpeng Xu:
An Analysis of Frame Replication and Elimination for Time-Sensitive Networking. 166-170 - Hongcheng Yan, Rui Zhang, Lin Li, Lianlian Zeng, Xianghui Wang, Jian Guo:
Modeling and Simulation of Time-Division Multiplexing Navigation Satellite Network based on OPNET. 171-174 - Hajime Kawagoe, Masashi Sugano:
Implementation of Time Synchronization for Energy Harvesting Wireless Sensor Network. 175-178 - Christian Ango Mbom, James Kweku Nkrumah Nyarko, Rugui Yao, Ling Wang:
Interference Alignment for Cellular Networks with Jacobian Eigenvalue. 179-182 - Jun-Chao Yuan, Xiao-Kuan Zhang, Ming-Cai Sun, Mao Liu:
The Impact of Target Near-Field Scattering on Missile Communication Operations. 183-186 - Mingda Li, Qingxv Xiong, Long Yuan:
A Network Interconnection System and Framework Based on Semantic Communication. 187-190 - Dawei Yan, Cong Liu, Peng You, Shaowei Yong:
Robust Topology Design in Time-Evolving and Predictable Spacecraft Network with Node Efficiency. 191-196 - Kai Shu, Yanteng Wang, Guanghui Zhao:
Beamforming with Enhanced CNN Network. 197-201
Information Systems Management and Assessment
- Yang Xie, Hui Xie, Gongliang Li:
Establishment and Application of Salary Business Circular Correlation Structure Revision model for Chinese Characteristic Institution Units. 202-206 - Fatin Hamadah Rahman, Thien-Wan Au, S. H. Shah Newaz, Wida Susanty Suhaili:
Trustworthiness in Fog: A Fuzzy Approach. 207-211 - Lu Liu, Shuqing Li:
A New Method of Recognizing Enterprise Core Financial Indexes Based on Similarity Calculation. 212-216 - Qinghao Wang, Dengkai Yao:
A New Method for Evaluating Air Traffic Control Safety. 217-221
Power System and Control Engineering
- Yafei Ouyang, Qun Niu, Yang Zhang:
Combined Heat and Power Economic Dispatch Using Differential Evolution. 222-226 - Mohammad Abu Sarhan, Min Ding, Xin Chen, Min Wu:
Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid Connected PV System. 227-234 - Fathy S. Elkazzaz, Mohammed A. H. Abozied, Chunming Hu:
Hybrid RRT/DE Algorithm for High Performance UCAV Path Planning. 235-242 - Shaowei Li, Shengzheng Wang:
Design Method for Ship Handling Simulator Based On CPLD. 243-247 - Shaowei Li, Shengzheng Wang:
Design and Implementation of Sounder Simulator Based on Cross-platform. 248-252 - Qing Wu, Shaowei Qi, Kaiyue Sun:
Weighted Least Squares Twin Large Margin Distribution Machine. 253-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.