default search action
EIDWT 2013: Xi'an, Shaanxi, China
- 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5044-2 [contents]
EIDWT 2013-Fourth International Conference on Emerging Intelligent Data and Web Technologies
Session 1: Database and Web Services
- Wei Lin, Changjun Hu, Yang Li, Xin Cheng:
Virtual Dataspace - A Service Oriented Model for Scientific Big Data. 1-5 - Gui-Cheng Wu, Jie Yang, De-You Tang:
Web Service Automatically Layout Generation Method. 6-10 - Lingyan Bi, Jie Yang:
Web Service Combination Algorithm by Using QoS Constraint. 11-16
Session 2: Wireless Networks
- Jan Sang, Daxiang Hong:
Protection Profile for the Smart Phone Operating System. 17-20 - Dongyan Zhang, Tao Zhang:
A Multi-channel and Real-Time Disaster Recovery Backup Method Based on P2P Streaming. 21-26 - Lei Gao, Yuan-Dong Lan:
Transmission Distance Estimation and Testing for 2.4GHz ZigBee Applications. 27-32 - Evjola Spaho, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vladi Kolici:
Multiflow TCP Traffic in VANETs: Performance Comparison of OLSR and AODV Routing Protocols. 33-38 - Elis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli:
Analyzing AODV Control Packets and Throughput for Different Mobility Degrees and Multiflow Traffic. 39-45
Session 3: Data Centers and Cloud Computing I
- Wenhong Wei, Qingxia Li, Ming Tao:
Parallel Prefix Algorithm on BSN-Mesh. 46-50 - Dong Liu, Yue-Long Zhao:
A New Approach to Scalable ROIA in Cloud. 51-55 - Fen Guo, Hua-Qing Min, Jie Yang:
Performance Weighted Deploying and Scheduling Strategy Research for Virtual Machine on Clouds. 56-60 - Dong Liu, Yue-Long Zhao:
An Overlapping Architecture for ROIA in Cloud. 61-65
Session 4: Data Centers and Cloud Computing II
- Peili Li, Haixia Xu:
Homomorphic Signatures for Correct Computation of Group Elements. 66-71 - Haiwen Han, Deyu Qi, Weiping Zheng, Feng Bin:
A Qos Guided Task Scheduling Model in Cloud Computing Environment. 72-76 - Weiwei Lin, Baoyun Peng, Chen Liang, Bo Liu:
Novel Resource Allocation Model and Algorithms for Cloud Computing. 77-82 - Pang Xiong Wen, Li Dong:
Quality Model for Evaluating SaaS Service. 83-87
Session 5: Data Management and Information Retrieval
- Wenliang Xie, Yanmin Li, Yijun Zhang:
Applying Information Retrieval Technology in Analyzing the Journals. 88-94 - Liying Wu, Bo Liu, Weiwei Lin:
A Dynamic Data Fault-Tolerance Mechanism for Cloud Storage. 95-99 - Zhiguang Xiong, Kang Deng, Yanping Liu, Xiaocui Yan:
The Finite Volume Element Method for a Class of Parameter Identification Problem with Overspecified-Data. 100-103 - Qun Zeng, Weihua Xu:
The Construction of Knowledge Sharing Platform in Universities under the Ubiquitous Network Environment. 104-108
Session 6: Data Modeling, Visualization, and Representation Tools
- Decheng Miao, Jianqing Xi, Jindian Su:
A Category Theoretic Method of Temporal Data Model. 109-114 - Gansen Zhao, Weichai Huang, Shunlin Liang, Yong Tang:
Modeling MongoDB with Relational Model. 115-121 - Gansen Zhao, Ziliu Li, Fujiao Liu, Yong Tang:
A Concept Drifting Based Clustering Framework for Data Streams. 122-129
Session 7: Parallel Processing and Superconvergence
- Ji Wu, Dongqing Xie, Lin Tang, Hao Wang:
Cost Evaluation of Three-Dimensional Many-Core Processors. 130-132 - Ji Wu, Dongqing Xie, Lin Tang, Hao Wang:
Cost Evaluation of Three-Dimensional Network-on-Chip. 133-136 - Bin Hu, Xiaotong Zhang, Xiaolu Zhang:
Automatic Balancing Chord: A Dynamic Load Balancing Mechanism for High Efficient. 137-144 - Kang Deng, Zhiguang Xiong, Xiaocui Yan, Yanping Liu:
Superconvergence of Discontinuous Finite Element Method for Delay-Differential Equations. 145-148 - Bin Feng, Deyu Qi, Haiwen Han:
Parallel and Multiplex Architecture of AES-CCM Coprocessor Implementation for IEEE 802.15.4. 149-153
Session 8: Knowledge Discovery and Data Mining
- Yuan-Dong Lan, Lei Gao:
A New Model of Combining Multiple Classifiers Based on Neural Network. 154-159 - Yong Hu, Bin Feng, Xiangzhou Zhang, Kang Liu, Kang Xie, Mei Liu:
iTrade: An Adaptive Risk-Adjusted Intelligent Stock Trading System from the Perspective of Concept Drift. 160-167 - Soufiane Boulehouache, Ramdane Maamri, Kroun Imen, Zaïdi Sahnoun:
A Fractal Component Based Knowledge Domain Model. 168-173
Session 9: Natural Inspired Computing for Collective Intelligence I
- De-Jiang Luo:
A KFDA Based on Regularization Method for Multi-classification. 174-177 - Jiahai Wang, Chenglin Zhong, Ying Zhou:
Single Objective Guided Multiobjective Optimization Algorithm. 178-183 - (Withdrawn) Enhancing Query Performance by Avoiding Negative Interactions. 184-190
Session 10: Natural Inspired Computing for Collective Intelligence II
- Xueqiang Li, Jiang Wang, Jing Xiao, Xiaoling Zhang:
Multi-objective Optimization Evolutionary Algorithm Based on Point-to-Weight Method. 191-196 - Chunlei Wu, Hao Zhang, Xue-rong Cui, Guoping Zhang:
Codebook Beam Switching Based Relay Scheme for 60 GHz Anti-blockage Communication. 197-203 - Yiqiao Cai, Weibin Chen:
Adaptive Differential Evolution with Competent Leaders. 204-210 - Hongwei Ye, Linfang Yang, Xiaozhang Liu:
Optimizing Weight and Threshold of BP Neural Network Using SFLA: Applications to Nonlinear Function Fitting. 211-214
Session 11: Cryptographic Techniques for Data Security I
- Xiaoqing Tan, Qiong Zhang:
A Kind of Verifiable Visual Cryptography Scheme. 215-219 - Zheli Liu, Chunfu Jia, Jun Yang, Ke Yuan:
Format-Preserving Fuzzy Query Mechanism. 220-226 - Xiaoqing Tan, Zhihong Feng, Lianxia Jiang, Afen Fang:
Verifiable Quantum Secret Sharing Protocol. 227-230 - Chang-Ji Wang, Yuan Li, Xi-Lei Xu:
Forgery Attack on Two ID-Based Proxy Signature Schemes from Bilinear Pairings. 231-235
Session 12: Cryptographic Techniques for Data Security II
- Xiaoqing Tan:
A Family of Quadratic Residue Codes over Z2m. 236-240 - Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lü:
Public Key Timed-Release Searchable Encryption. 241-248 - Zheli Liu, Zhi Wang, Xiaochun Cheng, Chunfu Jia, Ke Yuan:
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud. 249-255 - Chundong Wang, Chaoran Feng:
Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm. 256-260 - Xuan Li:
Image Encryption Scheme Based on Multiple Chaotic Maps. 261-266
Session 13: Cryptographic Techniques for Data Security III
- Baojiang Cui, Ziyue Wang, Tao Guo, Guowei Dong, Bing Zhao:
UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks. 267-272 - Jing Zhang, Ting Yang:
Clustering Model Based on Node Local Density Load Balancing of Wireless Sensor Network. 273-276 - Chang-Ji Wang, Wen-Long Lin, Hai-Tao Lin:
Design of an Instant Messaging System Using Identity Based Cryptosystems. 277-281 - Ding Yong, Wang Zheng, Xinguo Li:
A Novel Somewhat Homomorphic Encryption over Integers. 282-284
Session 14: New Cryptographic Techniques for Data Security IV
- Ping Wang, Fangguo Zhang:
Improving the Parallelized Pollard Rho Method for Computing Elliptic Curve Discrete Logarithms. 285-291 - Zhusong Liu:
A Secure Anonymous Identity-Based Access Control over Cloud Data. 292-295 - Xiaodan Liang, Jigang Wu, Liangyu Li:
Bio-inspired Algorithms for FPGA Implementation of RFID Base-Band Transmission Model & IP Core. 296-301 - Yanbin Zheng:
A Note on a Class of Permutation Polynomials. 302-306 - Yulin Zheng, Shaohua Tang, Chaowen Guan, Min-Rong Chen:
Cryptanalysis of a Certificateless Proxy Re-encryption Scheme. 307-312
Session 15: Web Science, Business Intelligence, and WSNs
- Fraihat Salam:
New Semantic Indexing and Search System Based on Ontology. 313-318 - Fu-Bao Liao, Wen-Mei Zhang, Xiang-Yang Li:
An Access Control Model Based on Web Application. 319-322 - Jing Zhang, Ting Yang:
Event Driven Self-Adaptive Routing Algorithm in Wireless Sensor Network. 323-328 - Quan Zhou, Daixian Wu, Deqin Xiao, Yang Zhang, Chunming Tang:
An Energy Efficiency Trusted Dynamic Routing Protocol for Wireless Sensor Networks. 329-334
Session 16: Security and Authentication
- Zhiqiang Lin:
The Transformation from the Galois NLFSR to the Fibonacci Configuration. 335-339 - Qun Lin:
A Provably Secure Server-Aided Verification Signature. 340-343 - Quan Zhou, Deqin Xiao, Daixian Wu, Chunming Tang, Chunming Rong:
TSHC: Trusted Scheme for Hadoop Cluster. 344-349 - Xiaoqing Tan, Lianxia Jiang, Qiong Zhang:
Controlled Quantum Teleportation with Identity Authentication. 350-355
Session 17: Security, Trust, and Reputation I
- Liyuan Xin, Zhiyong Feng, Shizhan Chen:
Experimental Study of Web Service Availability Based on WSDL Documents. 356-362 - Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lv:
Multi-user Public Key Timed-Release Searchable Encryption. 363-370 - Ruoyu Wang, Ling Zhang, Zhen Liu:
A Novel Method of Filtering Internet Background Radiation Traffic. 371-376 - Min Liu, Chunfu Jia, Lu Liu, Zhi Wang:
Extracting Sent Message Formats from Executables Using Backward Slicing. 377-384
Session 18: Security, Trust, and Reputation II
- Jie Shi, Ge Fu, Jian Weng, Hong Zhu:
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases. 385-392 - Jianglang Feng, Baojiang Cui, Kunfeng Xia:
A Code Comparison Algorithm Based on AST for Plagiarism Detection. 393-397 - Hai-Fei Li, Li-Hua Dong, Jian-Fei Han:
A Mobile Ordering Scheme Based on LBS. 398-401 - Jian-Fei Han, Li-Hua Dong, Hai-Fei Li:
A Scalable Clock Controlled Generator Based on Cellular Automata. 402-406 - Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang:
Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security. 407-413
Session 19: Security, Trust, and Reputation III
- Lingling Xu, Shaohua Tang:
Server-Aided Verification Signatures with Privacy. 414-421 - Haiyu Wang, Gansen Zhao, Qi Chen, Yong Tang:
Trust Management for IaaS with Group Signature. 422-430 - Rufen Huang, Qiang Nong:
An Efficient Provably Secure Certificate-Based Blind Signature Scheme. 431-436
Session 20: Security, Trust, and Reputation IV
- Chao Yang, Weiwei Lin, Mingqi Liu:
A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security. 437-442 - Jiang Zhang, Zhenfeng Zhang:
Secure and Efficient Data-Sharing in Clouds. 443-450 - Xu Ma, Fangguo Zhang, Jin Li:
Verifiable Evaluation of Private Polynomials. 451-458 - Zhongwen Li, Jun Fu, Wenjie Fan, Rongyu Long:
A Security Information Transmission Scheme for Internet of Things. 459-465
Session 21: Social Networking I
- Xiangyang Li:
Implementation and Transmission Error Handling of Multi-channel LVDS. 466-470 - Xin Liu, Zhaojun Xin, Leyi Shi:
Automatic Patching Based on Social Computing in P2P Network. 471-478 - Chao Wang, Ke Xu, Gaoyu Zhang:
A SEIR-based Model for Virus Propagation on SNS. 479-482
Session 22: Social Networking II
- Guangyi Zhang, Yu Liu, Junting Chen, Yi Cai, Huaqing Min:
Latent Factor Model Based on Simple Singular Value Decomposition for Personalized Comment Recommendation. 483-489 - Qing Du, Qixuan Wang, Jiaying Cheng, Yi Cai, Tao Wang, Huaqing Min:
Explore Social Question and Answer System Based on Relationships in Social Network. 490-495 - Jian Chen, Yu Liu, Guangyi Zhang, Yi Cai, Tao Wang, Huaqing Min:
Sentiment Analysis for Cantonese Opinion Mining. 496-500
Session 23: DTNs and Secure Systems
- Xia Deng, Le Chang:
A Multicast Routing Scheme Based on Social Differences in Delay-Tolerant Networks. 501-507 - Xia Deng, Le Chang:
Sociality-Based Buffer Management for Multicast in DTNs. 508-514 - Xunjun Chen, Yuelong Zhu, Zheng Gong, Yiyuan Luo:
Cryptanalysis of the Lightweight Block Cipher Hummingbird-1. 515-518
Session 24: Algorithms, Models, and Protocols
- Xiaohua Meng, Dasheng Qin, Yuhui Deng:
Designing a GPU Based Heat Conduction Algorithm by Leveraging CUDA. 519-526 - Yang Li, Changjun Hu:
A New Evaluation Model to Building Materials Science Domain-Specific Search Engine. 527-534 - Ming Tao, Huaqiang Yuan, Wenhong Wei, Zhixiong Li, Yong Qin:
Performance Compensation for the False Alarm of L2 Trigger in FMIPv6. 535-540 - Liying Yang, Huaquan Wei, Chengqun Li:
The S-Quasinormal Embedding Property of Subgroups in a Finite Group. 541-546
CEWE 2013-Second International Workshop on Cybercrimes and Emerging Web Environments
Session 1: Secure Schemes
- Jianglang Feng, Jindong Li:
A New Certificate-Based Digital Signature Scheme. 547-549 - Hongbin Wang, Yan Ren:
Code-Based Designated Verifier Signature Scheme. 550-554 - Jianglang Feng, Jindong Li:
A Secure Proxy Signature Scheme in Bilinear Group. 555-557 - Konstantinia Charitoudi, Andrew J. C. Blyth:
An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense. 558-563
Session 2: Intelligent Algorithms and Systems
- Chundong Wang, Guangming Bo, Yaohui Zhang:
Design and Implementation of Authentication and Authorization Flow in ESCP System. 564-568 - Hongbin Wang, Yan Ren:
An Attribute-Based Anonymous Authentication Scheme. 569-573 - Chunying Wu, Shundong Li, Yiying Zhang:
Key Management Scheme Based on Secret Sharing for Wireless Sensor Network. 574-578 - Caiyun Chen, Junshan Yu:
An Adaptive Algorithm for Blind MMSE Equalization of SIMO Channels. 579-582
Session 3: Security Frameworks and Models
- Baojiang Cui, Fuwei Wang, Tao Guo, Guowei Dong, Bing Zhao:
FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework. 583-588 - Shahrzad Zargari, Anthony Smith:
Policing as a Service in the Cloud. 589-596 - Oghendefejiro Winnie Makinde:
Social Network Message Credibility: An Agent-Based Modelling Approach. 597-602 - Nathaniel James Healey, Olga Angelopoulou, David Evans:
A Discussion on the Recovery of Data from a Virtual Machine. 603-606
DINST 2013-Second International Workshop on Development and Implementation of New Systems and Tools
- Shinji Sakamoto, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
Performance Comparison of a WMN-SA System for Different Distributions of Mesh Clients. 607-611 - Xinyue Chang, Tetsuya Oda, Evjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
Performance Analysis of WMNs Using Hill Climbing Algorithm Considering Different Iterations per Phase. 612-616 - Qi Wang, Shinji Sakamoto, Leonard Barolli, Elis Kulla, Gjergji Mino, Makoto Ikeda:
A Fuzzy-Based Simulation System for Controlling Sensor Sleep Time through Lifetime of Sensors in WSNs. 617-623 - Liqiong Ma:
A Generic Construction of Identity-Based Group Signature. 624-626
FEIDWT 2013-First International Workshop on Frontiers in Emerging Intelligent Data and Web Technologies
Session 1: Optimization and Clustering
- Jianxin Wang, Fan Yang, Xiaoli Dong, Ben Xu, Baojiang Cui:
Improving Association Rules by Optimizing Discretization Based on a Hybrid GA: A Case Study of Data from Forest Ecology Stations in China. 627-632 - Yanling Zhang, Minghao Zhang, Li Li:
Image Feature Analysis of Lymph Node Based on Cloud-Model and FCM Clustering. 633-638 - Yanan Jin, Fei Xiao:
Eliminating Error Accumulation in Hierarchical Clustering Algorithms. 639-642
Session 2: Secure Systems
- Jin Li, Dongqing Xie, Xiaofeng Chen:
Server-Aided Hierarchical Identity-Based Encryption. 643-647 - Xiuni Wang, Dongqing Xie:
The Systematic Form of a Class of Regular Structured LDPC Codes. 648-651 - Yijun Mao, Xi Zhang, Min-Rong Chen, Yiju Zhan:
Constant Size Hierarchical Identity-Based Encryption Tightly Secure in the Full Model without Random Oracles. 652-657 - Liqiong Ma:
Two Efficient Identity Based Signature Schemes. 658-660
IIPTC 2013-First International Workshop on Intelligence Information Processing and Trusted Computing
Session 1: Intelligent Information Processing
- Chunlei Zhao, Chunfu Jia:
Research on Spatial Adaptive Strategy of End-Hopping System. 661-666 - Mingju Gong, Shexiang Ma, Xin Meng, Shuanggen Zhang, Huibo Wu, Xue Rui:
A Packet Error Rate of AIS Messages Measurement System. 667-671 - Yuanying Qiu, Ying Chen, Lei Li, Xianwen He:
Multivariate Spectral Conjugate Gradient Projection Method for Nonlinear Monotone Equations. 672-675 - Jialinh Han, Xiaohui Zhao:
A Novel Watermarking Method Based on Watermark Compression Preprocessing. 676-679
Session 2: Authentication and Key Management
- Kai Wang, Yanan Ding, Hong Zhao, Lujian Hou, Fengjuan Sun:
Optimization of Air Pollutant Monitoring Stations Based on Genetic Algorithm. 680-684 - Yongmei Xu, Zeqi Gao, Yuihui Deng:
Analyzing the Cooling Behavior of Hot and Cold Aisle Containment in Data Centers. 685-689 - Xianglin Wei, Jianhua Fan, Ziyi Lu, Ke Ding, Ran Li, Guomin Zhang:
Bio-inspired Application Scheduling Algorithm for Mobile Cloud Computing. 690-695 - Kangshun Li, Zhen Yang:
Exemplar Image Completion Based on Evolutionary Algorithms. 696-701
Session 3: Security and Detection
- Kai Wang, Xingli Zhao, Hong Zhao, Jian Zhang:
A Comparative Study on CRFs for Fore- and Background Classification. 702-707 - Jian Zhang, Renhong Cheng, Kai Wang, Hong Zhao:
Research on the Text Detection and Extraction from Complex Images. 708-713 - Tao Guo, Guowei Dong, Hu Qin, Baojiang Cui:
Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree. 714-719 - Zheli Liu, Xiaochun Cheng, Chunfu Jia, Jun Yang:
Format Compliant Degradation for PNG Image. 720-723
SCOPE 2013-Third International Workshop on Situated Computing for Pervasive Environments
Session 1: Algorithms and Models
- Min Li, Zheli Liu, Chunfu Jia, Zongqing Dong:
Data Masking Generic Model. 724-727 - Youtian Wang, Bin Hu:
A Research on Multiuser Collaborative Modelling and Simulating Network System. 728-733 - Jinhong Huang, Genjiao Zhou:
A Conjugate Gradient Method without Line Search and the Convergence Analysis. 734-736 - Min Tang, Xia Zeng, Kai Song, Jian Liu:
Error Analysis on Floating-Point Arithmetic in C Programming Language Library Functions. 737-742
Session 2: Multimedia Systems and Applications
- Wenjing Zhao, Zhong Cao, Pan Liu:
A Combining Spatial Enhancement Method for Low Illumination Images. 743-746 - Yanlong Wen, Xinkun Li, Xiangrui Cai, Ying Zhang, Xiaojie Yuan:
XML Retrieval with Structural Context Relaxation. 747-752 - Caiyun Chen, Junshan Yu:
A New Idea of Identifying Flat-Fading MIMO Channel by Using Space-Time Coding. 753-756
SeDiS 2013-Third International Workshop on the Service for Large Scale Distributed Systems
Session 1: Large-Scale Distributed Systems
- Alexandru Petculescu:
MASF - A Mobile Services Framework. 757-762 - Catalin Negru, Florin Pop, Valentin Cristea, Nik Bessis, Jing Li:
Energy Efficient Cloud Storage Service: Key Issues and Challenges. 763-766 - Alessandro Kraemer, Junior Cesar de Oliveira, Fabio Andre Garaluz dos Santos, Ana Claudia Maciel, Alfredo Goldman, Daniel Cordeiro:
Dynamic Creation of BSP/CGM Clusters on Cloud Computing Platforms. 767-772 - Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Accountable Authority Attribute-Based Signature. 773-777
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.