default search action
8th SNPD 2007: Qingdao, China
- Wenying Feng, Feng Gao:
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China. IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 2
- Xun Zhou, Shengfei Shi, Jizhou Luo, Wei Zhang:
Lifetime Optimized Methods of Correlated Data Gathering on Sensor Networks. 3-8 - Runhua Shi, Hong Zhong, Liusheng Huang:
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. 9-13 - Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang:
Coverage-preserving Data Gathering in Wireless Sensor Networks. 14-19 - Jinghua Zhu, Jianzhong Li, Hong Gao:
Tasks Allocation for Real-Time Applications in Heterogeneous Sensor Networks for Energy Minimization. 20-25 - Yongxuan Lai, Xiaobo Fan, Hong Chen, Ting-Ting Xie:
Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks. 26-31 - Shaofei Wu, Siying Wei, Jinlong Zhang:
A service-based Workflow Model for Virtual Enterprise. 32-36 - Ming Chen, Zhenwu Wang:
An Approach for Web Services Composition based on QoS and Discrete Particle Swarm Optimization. 37-41 - Fuzhi Zhang, Yan Wang, Lin Wang:
A Web service discovery algorithm based on dynamic composition. 42-46 - Jianhua Yang:
Fuzzy Integrative Performance Evaluation for Supply Chain System. 47-52 - Gong Chen, Heqin Zhou, Jiefeng Yan:
A Novel Method for Moving Object Detection in Foggy Day. 53-58 - Lei Tang, Zonggui Zhao:
The Wavelet-based Contourlet Transform for Image Fusion. 59-64 - Yong Zhao, Zongde Fang, Kanwei Wang, Hui Pang:
Multilevel Minimum Cross Entropy Threshold Selection Based on Quantum Particle Swarm Optimization. 65-69 - Xinwu Li:
A New Model of Printer Color Management Based on Legendre Neural Network. 70-74 - Xiangbin Shi, Fang Liu, Ling Du, Xiaohong Chen, Yuansheng Xing:
A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGs. 75-80 - Ming Yin, Yun Xie, Fen Guo, Shuting Cai:
Research on Adaptive Error Concealment for Video Transmission over packet-lossy channel. 81-85 - Shijin Li, Hao Li, Zhijian Wang:
A Novel Approach to Commercial Detection in News Video. 86-90 - Shu-Chang Liu, Jing Bi, Zhiqiang Jia, Rui Chen, Jie Chen, Minmin Zhou:
Automatic Audio Classification and Speaker Identification for Video Content Analysis. 91-96 - Yichun Xu, Renbin Xiao:
Identifying Code for Directed Graph. 97-101 - Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:
Examination of Processing Load in Applying DACS Scheme to Practical Network. 102-107 - Dali Zhao, Yunhui Men, Linliang Zhao:
Hop-Distance Algorithm for Self-Localization of Wireless Sensor Networks. 108-112 - Zhenqi Wang, Jin Liu:
Internet Applications Usage Accounting Based on Flow. 113-116 - Qian Feng, Meng Chen:
The Research on the Construct Technology of the Test System Based on the Network. 117-122 - Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou:
A Hybrid and Efficient Scheme of Multicast Source Authentication. 123-125 - Renwang Su:
New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents. 126-131 - Hongwei Li, Shixin Sun:
Identity-Based cryptography for Grid. 132-137 - Xiaolin Wang, Jianqin Zhou, Yubing Zang:
A note on homogeneous bent functions. 138-142 - Ming Li, Baodong Qin, Fanyu Kong, Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. 143-148 - Jingjun Zhang, Furong Li, Yang Zhang, Liguo Wang:
Non-functional Attributes Modeling in Software Architecture. 149-153 - Jianmin Jiang, Hongping Shu, Li Xu:
An Architecture for Software Systems with time constraints. 154-159 - Xiaoyang Tong, Xiaoru Wang:
Agent-oriented Petri Net based Modeling of Dynamic Behavior for Wide-area Backup Protection. 160-165 - Yixing Xia, Yaowu Chen:
A Component-based Framework for Embedded Digital Instrumentation Software with Design Patterns. 166-170 - Sheng Fang, Yongquan Liang, Shenyuan Li:
What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code. 171-176 - Jun Gao:
Machine-Vision-Based Measurement of BGA Connector Solder Balls. 177-180 - Haiying Zhang, Chaowei Yuan:
A Method for Blind Detection of OFDM Signal Based on Power Spectrum Reprocessing. 181-186 - Guang Yang, Kexiong Chen, Maiyu Zhou, Zhonglin Xu, Yongtian Chen:
Study on Statistics Iterative Thresholding Segmentation Based on Aviation Image. 187-188 - Fuheng Liu, Xuhong Liu, Guijuan Kuang, Yi Xiu:
Improved Image Coding Algorithm Based on Embedded Zerotree. 189-192 - Wenjun Xiao, Weidong Chen, Mingxin He, Wenhong Wei, Behrooz Parhami:
Biswapped Networks and Their Topological Properties. 193-198 - Fuyong Yuan, Jian Liu, Chunxia Yin:
A Scalable Search Algorithm on Unstructured P2P Networks. 199-204 - Zhengyuan Ning, Xianwei Lai, Shanli Hu, Qingqing Zhan:
Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal Logic. 205-210 - Wenhong Wei, Wenjun Xiao:
Matrix Multiplication on the Biswapped-Mesh Network. 211-215 - Zenggang Xiong, Yang Yang, Xuemin Zhang, Dairong Yu, Li Liu:
Integrated Multi-Agent and Semantic P2P Grid Resource Discovery Model. 216-220 - Yongmei Hu, Yanan Fu, Lei Jia, Qiqiang Li:
An algorithm of job shop rolling scheduling based on singular rough sets. 221-225 - Wei Li:
Research on the Knowledge-based Decision Support System for the Safety of Rockets. 226-231 - Yang Xu, Houfeng Wang:
A Hibrid Model for Computational Morphology Application. 232-237 - Shuxia Yang:
Power Consumption Forecast by Combining Neural Networks with Immune Algorithm. 238-241 - Xiao Yang, Jiancheng Wan, Ling Zhang:
Arithmetic Computing Based Chinese Automatic Parsing Method. 242-247 - Aimin Wang, Qiang Song:
Prediction of R in Sinter Process based on Grey Neural Network Algebra. 248-252 - Chengzhi Cao, Xiaofeng Guo, Yang Liu:
Research on Ant Colony Neural Network PID Controller and Application. 253-258 - (Withdrawn) Design and Implementation of Wireless Computational Grid based on JavaSpace. 259-261
- Linchun Li, Jianhua Li, Ling Tie, Jun Pan:
ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. 262-267 - Hongwei Zhao, Shihui Pei, Pingping Liu:
Distributed Key Establishment Scheme in Wireless Sensor Network. 268-273 - Lichao Wang, Qiyong Lu, Xi Chen:
Application and Analysis of Time Domain Cross Correlation for Traffic Flow Speed Measurement. 274-279 - Ming Yin, Yun Xie, Fen Guo, Shuting Cai:
Improvements on MB-layer Rate Control Scheme for H.264 video Using complexity estimation. 280-284 - Lijun Sun, Ying He:
Improving Blind Equalization Algorithm for Wireless Communication Systems. 285-288 - Ke Zhang, Zhong Li, Xiaoou Zhao:
Edge Detection of Images based on Fuzzy Cellular Automata. 289-294 - Mengmeng Zhang, Yuehai Wang, Changnian Zhang, Shumin Zhou:
Motion Vector Data Decoding Using Spatial-Temporal Source Redundancy. 295-298 - Jiguo Yu, Jingjing Song, Wenjun Liu, Li Zhao, Baoxiang Cao:
KZCAN: A Kautz based content-addressable network. 299-304 - Wuming Luo, Pingyang Han:
Study On Non-FIFO Arc in Time-Dependent Networks. 305-310 - Lianxing Jia Wei Zhu, Chenggong Zhai, Yi Du:
Research on an Integrated Network Management System. 311-316 - Yong Zhang, Xianghong Yan, Yang Song, Hongmei Zhu:
The Computer Bracket Pressure Monitor System of Fully Mechanized Coalface in Coal Mine Based On CAN Bus. 317-322 - Tao Yu, Shanzhi Chen, Ming Ai, Xin Li, Yuhong Li, Zhen Qin:
A Framework for Reliability Computation of the IP Network. 323-327 - Lili Wang, Wei Gu:
Numerical Solution of A Type of Nonlinear Parabolic Equations. 328-333 - Shuli Wang, Jianming Zhang:
Positive solutions of m-points conjugate boundary value problems. 334-338 - Jinzhu Zhang, Zhen Jin, Huimin Zhang:
Existence of Nonoscillatory Solution for Second Order Nonlinear Neutral Delay Differential Equation. 339-342 - Hongxia Shen, Zhen Jin:
Two dimensional pattern formation of prey-predator system. 343-346 - Hongyang Ma, Bingquan Chen:
Quantum network based on multiparty quantum secret sharing. 347-351 - Xin Lü, Zhi Ma:
Quantum Information Security Protocols and Quantum Coding Theory. 352-356 - Sinjae Lee, Shaojian Zhu, Yanggon Kim:
P2P Trust Model: The Resource Chain Model. 357-362 - (Withdrawn) Network Protocols Analyzing by an Environmental Bisimulation Method. 363-367
- Kongfa Hu, Zhenzhi Gong, Qingli Da:
A Rapid Grouping Aggregation Algorithm Based on the Multi-Dimension Hierarchical Encoding. 368-373 - Jun Gao:
Getting Fuzzy Control Query Table by Data Mining. 374-378 - ZhengWei Li, Shixiong Xia, Niuqiang, Zhanguo Xia:
Coal Thickness Prediction Based on Support Vector Machine Regression. 379-383 - Zhijun Ma, Li Chen, Yizhen Zhang:
BDA information management and decision support based on DW. 384-387 - Zhijun Ma, Quan Shi, Bin Li:
Battle Damage Assessment based on Bayesian Network. 388-391 - Hongwei Zhao, Xiaolin Zhao, Yiming Qi:
Infrared Point Target Detection and Tracking Based on DSP. 392-394 - Jingwen Tian, Meijuan Gao, Jin Li:
Intelligent Window Based on Embedded System. 395-399 - Qiang Huang, Xiaofeng Liang, Yingying Zhu:
Dependable distributed embedded system assessment platform design. 400-405 - Mingshan Liu, Yuan Zhou:
Application of Embedded System in Construction Machinery. 406-411 - Peng Liu, Guojun Dai, Tingting Fu:
A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. 412-416 - Yongquan Liang, Zhongying Zhao, Qingtian Zeng:
Mining User's Interest from Reading Behavior in E-learning System. 417-422 - Jie Yin, Yuexuan Wang, Cheng Wu:
An Approach to Build Accessible Grid Service. 423-428 - Youngkon Lee, Gwyduk Yeom:
A Research for Quality Preservation Methodology for SOA Environment. 429-434 - Yuping Qin, Qing Ai, Xiukun Wang, Xiangna Li:
Study on Classification Algorithm of Multi-subject Text. 435-438 - Rongsheng Xie, Keshuo Wu, Jiangbo Du, Chunguang Li:
Survey of Public Key Digital Watermarking Systems. 439-443 - Zhuo Chen, Xiang-Shuang Liu, Xiaodong Zhunag:
An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence. 444-449 - Yan Li:
Application of Multi-Agent for Collaborative Product Design Engineering. 450-454 - Shaozhong Song, Libiao Zhang, Shu Hua:
The application of particle swarm optimizaton algorithm in training forward neural network. 455-457 - Jun Wang, Huixue Sun:
Studies on CAD System with Artificial Intelligence. 458-463 - Meijuan Gao, Jingwen Tian, Kai Li:
Research on Detecting Method of Submarine Oil Pipelines Corrosion Degree Based on Chaos Genetic Algorithm Neural Network. 464-469 - Changtong Luo, Bo Yu:
Low Dimensional Simplex Evolution - A Hybrid Heuristic for Global Optimization. 470-474 - Zhaowen Wei, Junyan Yan, Yunpeng Ou:
An Enhancement Dynamic Contract Net Protocol. 475-480 - Jingsong He, Jian Tang, Qiansheng Fang:
Study on The Property of Training Samples and Learning Space with Genetic Algorithms. 481-486 - Hong Zhang, Zhengxing Cai, Fan Yang, Wei Wei:
Research on Lossless Image Compression Algorithms Using Fermat Number Transform. 487-490 - Chunmei Wang, Suzhen Wang, Chongming Zhang, Junzhong Zou:
Maximum Variance Image Segmentation Based on Improved Genetic Algorithm. 491-494 - Muhammad Kamran, Haroon-Ur-Rashid Khan, Shi Feng:
Distortion Analysis in Scalable Image Compression Scheme based on efficient Codebook selection. 495-500 - Jiajin Lei, Chao Lu:
Fusion of ICA Spatial and Temporal and Localized Features for Face Recognition. 501-506 - Xiaojuan Li, Cunshe Chen, Anbo Liang, Yan Shi:
Local And Global Features Extracting and Fusion For microbial Recognition. 507-511 - Congying Han, Guoping He, Huanqing Cui, Xuping Zhang:
Distributed Parallel Algorithm For Nonlinear Optimization Without Derivatives. 512-515 - Jiuyuan Huo, Liqun Liu, Li Liu, Yi Yang, Lian Li:
Selection of the Order of Autoregressive Models for Host Load Prediction in Grid. 516-521 - Beihong Jin, Sihua Tian, Chen Lin, Xin Ren, Yu Huang:
An Integrated Prefetching and Caching Strategy for Mobile Web Caching System. 522-527 - Mohammad Moallemi, Mohammad Hossien Yaghmaee, Mahmoud Naghibzadeh:
A Fault-Tolerant Mutual Exclusion Resource Reservation Protocol for Clustered Mobile Ad hoc Networks. 528-533 - Liming He:
Time Synchronization with Extended Clock Model for Wireless Sensor Networks. 534-539 - Weifeng Lu, Meng Wu:
Analysis of communication traffic characteristics of two-hop-relay cellular system in the dead spots. 540-545 - Wei Rong, Muqing Wu, Tianhang Yu:
LSMR: a Label Switching Multipath Routing protocol for Ad Hoc Networks. 546-551 - Long Jin, Xvming Shi:
A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog Deviation. 552-557 - Jingwen Tian, Meijuan Gao, Yujuan Xiang:
The Study of Compost Quality Evaluation Modeling Method Based on Fuzzy Neural Network for Sewage Treatment. 558-563 - Wei Zhou, Meiying Yang, Liyan Han:
A Nonparametric Approach to Pricing Convertible Bond via Neural Network. 564-569 - Xuemei Liu, Shusheng Zhong, Xiaoliang Bai:
A Modified SOFM Segmentation Method in Reverse Engineering. 570-573 - Lei Yu, Jia Ma, Fuji Ren, Shingo Kuroiwa:
Automatic Text Summarization Based on Lexical Chains and Structural Features. 574-578 - Yumin Dong, Shufen Xiao:
Hybrid Application On Job-Shop Scheduling by Genetic Algorithm and MAS Spring-Net. 579-584 - Ruo Ando:
Parallel analysis of polymorphic viral code using automated deduction system. 585-592 - Xiaoguang Liu, Gang Wang, Jing Liu:
A Double Level Granularity for Multimedia on Demand System. 593-596 - Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao:
Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids. 597-602 - Lijie Zhang, Hui Liu, Yan Wang:
Numerical Simulation of A Difference Scheme Applied in Image Processing Based on Four-Order PDEs. 603-605 - Qinyong Ma, Shenkang Wang, Dongdong Nie, Jianfeng Qiu:
Recognizing Humans Based on Gait Moment Image. 606-610 - Hong Zhang, Hongjun Su, Xianyu Su:
A Phase Unwrapping Algorithm for 3D Reconstruction. 611-615 - Yanhua Ma, Chuanjun Liu, Haiying Sun:
A Tristate Filter for Image Denoising Processing. 616-621 - Tingting Zheng, Jiaxing Cheng, Junjun Mao, Jie Song:
Multifractal and R/S Analysis of Protein Structure. 622-626 - Cunshe Chen, Xiaojuan Li, Huimei Yuan:
Quality assessment of beef based of computer vision and electronic nose. 627-631 - Jinquan Wang, Xiaoguang Gao, Jianguo Shi, Zhengsheng Li:
Double Unmanned Air Vehicle's Path Planning for Scout via Cross-Entropy Method. 632-635 - Ziqiang Wang, Xia Sun, Dexian Zhang:
A PACA-Based Multicast Routing Algorithm. 636-639 - Chunhua Yang, Jiancheng Wan:
A Formal Approach to Specifying Architecture Aspects and Their Weaving logic. 640-645 - Chang-Ki Kim, Danhyung Lee, In-Young Ko, Jongmoon Baik:
A Lightweight value-based Software Architecture Evaluation. 646-649 - Xiangchen Tan, Tie Feng, Jiachen Zhang:
Mapping Software Design Changes to Source Code Changes. 650-655 - Biying Lin, Yanhui Zhang:
The Management and Validation of Business Rules in Telecom Operator' Settlement and Apportion System. 656-661 - Bo Liu, Yansheng Lu:
A Scable Peer-to-Peer Overlay for Applications with Time Constraints. 662-667 - Peihe Tang, Hao Liu:
The research of local area storage grid system. 668-672 - Wei Chen, Jingtao Song, Jinan Leng, Hanyang Lu:
A New Double scheduling DBA Algorithm for next generation access network. 673-678 - Ye Liang, Linlin Ci:
Organization technology of Mobile Peer-to-peer Network Based on Mobile Unit. 679-682 - Xiuhua Fu, Wenan Zhou, Junli Xu, Junde Song:
Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop Network. 683-688 - Min Xiao, Gaolin Chen, Debao Xiao:
A Policy-Based Energy Efficient Clustering Scheme for Wireless Sensor Networks. 689-694 - Yi-hong Dong, Chao Sun, Xiaoying Tai:
An Adaptive Counter Propagation Network. 695-700 - Haitao Li, Aisong Shi, Bingsen Zhang:
A Dyeing Color Matching Method Combining RBF Neural Networks with Genetic Algorithms. 701-706 - Xusheng Gan, Hongcai Zhang, Yongmei Cheng, Chao Shi:
Aerodynamic Parameter Fitting Based on Robust Least Squares Support Vector Machines. 707-711 - Zhisheng Zhang, Yaming Sun:
Assessment on Fault-tolerance Performance Using Neural Network Model Based on Ant Colony Optimization Algorithm for Fault Diagnosis in Distribution Systems of Electric Power Systems. 712-716 - Zheng Gong, Yu Long, Kefei Chen:
Efficient Partially Blind Signature from LFSR. 717-722 - Guowen Li, Jia Yu, Rupeng Li, Daxing Li:
An Approach to Convert Any Threshold Signature into a Threshold Group Signature. 723-726 - Wen Liu, Shoushan Luo, Ping Chen:
A Study of Secure Multi-party Ranking Problem. 727-732 - Zhenghua Xue, Xiaoshe Dong, Siyuan Ma, Weiqing Dong:
A Survey on Failure Prediction of Large-Scale Server Clusters. 733-738 - Min Xiao, Debao Xiao:
Alert Verification Based on Attack Classification in Collaborative Intrusion Detection. 739-744 - Yan Luo, Changrui Yu:
A Hybrid Parallel Algorithm for Complex Decision Problem Optimization. 745-750 - Yanan Shen, Rongcai Zhao, Lei Wang:
Eliminating Redundant Communication of Code Generation for Distributed Memory Machines. 751-756 - X. Y. Zeng:
Equivalence of the Oscillation of Two Coupled Difference Systems. 757-761 - Liying Wang, Decun Zhang, X. Y. Zeng:
On the Higher Order Difference Equation xn+1 = (xn-k+1)/(-1+xnxn-1...xn-k+1). 762-765 - Ying Gao:
Peirodic Growing of Two Populations Intergrowth System. 766-769 - Yanping Guo, Yunhai Wang, Changlong Yu:
Positive solutions of m-point boundary value problems for second order differential equations with an advanced argument. 770-773 - Chieko Matsuyama, Toyoshiro Nakashima, Naohiro Ishii:
Analysis of Source Codes by Beginners in Programming Education. 774-781 - Fei Dai, Tong Li:
Tailoring Software Evolution Process. 782-787 - Jianli Duan, Ning Zhang:
Research on Visualization Techniques for Web Usability Analysis. 788-791 - Chengwu Lu:
Image Denoising Based on MORF and Minimization Total Variation. 792-796 - Fuyong Yuan, Chunxia Yin, Jian Liu:
Improvement of PageRank for Focused Crawler. 797-802 - Hong Zhang, Bo Zhang, Lingdong Kong, Zhengxing Cai:
Generalized Association Rule Mining Algorithms based on Data Cube. 803-808 - Zhizhou Kong, Zixing Cai:
Advances of Research in Fuzzy Integral for Classifiers' fusion. 809-814 - Mingwei Leng, Haitao Tang, Xiaoyun Chen:
An Efficient K-means Clustering Algorithm Based on Influence Factors. 815-820 - Yang Xia, Qiang Zhang, Zhao Xu, Zhang Ling:
Research on Distributed E-Commerce System Architecture. 821-825 - Cheng Yu, Huamao Gu:
A Policy-Based Framework for Designing Strategies for Service Negotiation. 826-831 - Fusheng Qiu, Wenjian Liu:
An XML-based Representation for Generic Bill of Materials (GBOM). 832-837 - Xinguo Deng, Ziyu Lin, Weiqing Chen, Ruliang Xiao, Lina Fang, Ling Li:
Modeling Web Service Choreography and Orchestration with Colored Petri Nets. 838-843 - Shijin Li, Yuelong Zhu, Jing Liu, Xiaohua Zhang:
A New Supervised Clustering Algorithm for Data Set with Mixed Attributes. 844-849 - Tinghuai Ma, Meili Tang:
Evaluation of High-tech Program Based on Rough Set Theory. 850-854
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.