default search action
13th ACIS-ICIS 2014: Taiyuan, China
- 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014, Taiyuan, China, June 4-6, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4860-4
- Yan Han, Roger Y. Lee:
Message from conference chair. v - Wenai Song, Simon Xu, Lichao Chen:
Message from program chair. vi - Sihan Qing:
Some issues regarding operating system security. 1 - Tokuro Matsuo:
The future of e-service value. 3-4
Communication Systems & Networks
- JaeHyu Kim, JooSeok Song:
A public key based PMIPv6 authentication scheme. 5-10 - Shuo Feng, Xueqiang Zheng, Ran Liu, Juan Chen, Suqin Xu, Linyuan Zhang:
Admissible evidence: Trustworthy cooperative spectrum sensing based on Dempster-Shafer theory in cognitive radio networks. 11-15 - Huan Li:
Energy Efficient Topology Control for QoS of ad hoc wireless network. 17-22 - Sujie He, Chunlin Li:
Research on energy management in data center. 23-26 - Jie Hua, Lingyun Zhou, Chang Chen, Lin Jiang:
Synchronization for QDPSK - Costas loop and Gardner algorithm using FPGAs. 27-31 - Jianqin Zhao, Yeong-Tae Song:
Improving industrial production process using computer technology: An interdisciplinary curriculum. 33-37 - Haiquan Wang, Ying Yang, Yifeng Hu, Zexi Li:
A contact prediction method for DTNs based on BP artificial neural network. 39-44 - Ye-yang Pan, Jin-jie Yao:
A research based on adaptive genetic algorithm optimal embattling method. 45-48 - Ruiling Gao, Chorng Hwa Chang:
A scalable and flexible communication protocol in a heterogeneous network. 49-52 - Yuping Dong, Chorng Hwa Chang:
An improved autonomous Cross-Layer Optimization framework for wireless multimedia communication. 53-58 - Vidhya Saraswathi P., Venkatesulu M.:
A block cipher based on Boolean matrices using bit level operations. 59-63 - Che-Lun Hung, Hsiao-Hsi Wang:
Parallel botnet detection system by using GPU. 65-70 - Lingli Li, Falin Liu, Guang Yang, Haoyu Wang:
A pruning method of joint 2D digital predistortion model for nonlinearity and I/Q imperfections in concurrent dual-band transmitters. 71-74 - Li Tong, Xiang Zhang, Peiyang Yu, Lingyun Zhou:
Parameter optimization in reconstruction of multiband signal from periodically non-uniform sampling. 75-78 - Tolga Zeybek, Chorng Hwa Chang:
Delay tolerant network for autonomous robotic vehicle charging and hazard detection. 79-85
Computer Architecture and VLSI
- Jianqing Xiao, Wei Li, Xubang Shen:
A low-power register file based on access queues for multi-issue processors. 87-92 - Ruiyi Sun, Yan Zhang:
An effective precision analysis method for word length optimization. 93-98 - Su-Kyung Yoon, Do-Heon Lee, Ashok Sharma, Shin-Dug Kim:
Designing virtual accessing adapter and non-volatile memory management for memory-disk integrated system. 99-104
Control Systems, Intelligent Systems
- Arkhom Songkroh, Rerkchai Fooprateepsiri, Woraphon Lilakiatsakun:
An intelligent risk detection from driving behavior based on BPNN and Fuzzy Logic combination. 105-110 - Yanjun Zuo:
Data labeling for integrity in SCADA systems. 111-118
Data Mining, Data Warehousing & Database
- Ying Zheng, Harry Zhou, Zhijiang Chen, Nnanna Ekedebe:
Automated analysis and evaluation of SEC documents. 119-124 - Jun Hong, Tao Wen, Quan Gu, Gang Sheng:
Query integrity verification based-on MAC chain in cloud storage. 125-129 - Jaime Raigoza, Junping Sun:
Temporal join processing with the adaptive Replacement Cache - Temporal Data policy. 131-136 - Edson B. Santos Junior, Marcelo G. Manzato, Rudinei Goularte:
A conceptual architecture with trust consensus to enhance group recommendations. 137-142 - Lin Guo, Qinke Peng:
A neighbor selection method based on network community detection for collaborative filtering. 143-148 - Ya Zhou, Taosong Fan, Guimin Huang:
An Automatic English Composition scoring model based on neural network algorithm. 149-152 - Sun Zhi, Peng Qinke:
An opinion detection algorithm based on online posts' relation. 153-156 - Hadj Ahmed Bouarara, Amine Rahmani, Reda Mohamed Hamou, Abdelmalek Amine:
Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail service. 157-162 - Xiao Lin, Eisuke Ito, Sachio Hirokawa:
Chinese tag analysis for foreign movie contents. 163-166 - Caroline Raju:
Web navigation pattern with automatic reconfiguration of servers. 167-170 - Dongchen Li, Xiantao Zhang, Xihong Wu:
Exploiting limited data for parsing. 171-175
Image Processing & Pattern Recognition
- Yuning Xie, Zhu Zhu, Xiaoguo Zhang, Qing Wang:
An adaptive median filter using local texture information in images. 177-180 - Zhiqiang Wang, Jinxiao Pan, Bin Liu, Ping Chen:
Distributed detection on holes of component based on multi-view projection. 181-184 - Zhengzi Wang, Zhihua Xie:
Infrared face recognition based on local binary patterns and Kruskal-Wallis test. 185-188 - Haotian Zhai, Hongbin Huang, Shaoyan He, Weiping Liu:
Rice paper classification study based on signal processing and statistical methods in image texture analysis. 189-194 - Jiang Wu, Yan Yang, Fan Wang, Xiaopeng Hu:
The progressive target search mechanism of visual scene. 195-199 - Wenyuan Tao, Yaxuan Liu, Kang Zhang:
Automatically generating abstract paintings in Malevich Style. 201-205 - Kang Zhao, Ping Chen:
Design of the linear gradient of DC high voltage power supply based on X-ray machine. 207-210 - Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri:
Multimodal hybrid face recognition based on score level fusion using Relevance Vector Machine. 211-215
Information Security
- Yezhen Liang, Guoqiang Bai:
A randomized window-scanning RSA scheme resistant to power analysis. 217-221
Internet Technology and Applications, E-Commerce
- Shuaipeng Li, Geng Peng, Jiyuan Wang:
Search queries based sales forecasting on Taobao. 223-228 - Sachin Kumar, Saibal K. Pal:
ICT Integrated Social Media Framework for consumer awareness in society using ICT tools. 229-233 - Lijun Xu, Chunlin Li, Layuan Li, Yanpei Liu, Zhiyong Yang, Yunchang Liu:
A virtual data center deployment model based on the green cloud computing. 235-240
Knowledge Discovery, Neural Networks and Genetic Algorithms
- Jianqin Liu, Ning Li, Yang Zhao:
An evolutionary algorithm with double strategy for global optimization problems. 241-244 - Guoliang Li, Xiaoguang Gao, Ruohai Di:
DBN structure learning based on MI-BPSO algorithm. 245-250 - Miaomiao Bai, Yali Guo, Liming Wang:
EM algorithm for reconstructing overpressure field of underwater explosion induced shock wave. 251-256 - Quan Qian, Jing Cai, Rui Zhang:
Intrusion detection based on neural networks and Artificial Bee Colony algorithm. 257-262
Management Information Systems
- Shiyang Ye, Tao Wang, Wenbo Zhang, Hua Zhong:
Profit-driven resource scheduling for virtualized cloud systems. 263-268 - Dongsong Zhang, Anil Jangam, Lina Zhou, Isil Yakut:
User-centered, device-aware multimedia content adaptation for mobile web. 275-280 - Dongxu Jin, JooSeok Song:
A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks. 281-286 - Logeshwaran Murugesan, Prakash Balasubramanian:
Cloud based mobile application testing. 287-289 - Lina Zhou, Vikas Bensal, Dongsong Zhang:
Color adaptation for improving mobile web accessibility. 291-296
Parallel and Distributed Computing & Systems
- Ruiqi Sun, Jie Yang, Zhan Gao, Zhiqiang He:
A virtual machine based task scheduling approach to improving data locality for virtualized Hadoop. 297-302 - Chao Lu, Xinkai Li:
An introduction of Multiple P-adic Data Type and its parallel implementation. 303-308 - Chenwei Song, Wenfeng Shen, Lianqiang Sun, Zhou Lei, Weimin Xu:
Distributed video transcoding based on MapReduce. 309-314 - Ashwin Kumar T. K, Jongyeop Kim, K. M. George, Nohpill Park:
Dynamic data rebalancing in Hadoop. 315-320 - Jie Zhu, Juanjuan Li, Erikson Hardesty, Hai Jiang, Kuan-Ching Li:
GPU-in-Hadoop: Enabling MapReduce across distributed heterogeneous platforms. 321-326 - Huitao Zheng, Kai Duan, Yadong Mei, Yuru Lin:
Parallel dynamic programming based on stage ReConstruction and its application in reservoir operation. 327-336 - Sudhakar Sah, Vinay G. Vaidya:
Dependency aware ahead of time static scheduler for multicore. 337-342
Programming Languages, Compilers, & Operating Systems Software Special Techniques
- Li Jiang, Xiaobing Sun, Yun Li, Xiangyue Liu:
Automatic generation of package diagram to understand Java packages. 343-348 - Xiangyue Liu, Xiaobing Sun, Bin Li, Junwu Zhu:
PFN: A novel program feature network for program comprehension. 349-354
Software Specification Techniques
- Yu Liu, Xiaobing Sun, Xiangyue Liu, Yun Li:
Supporting program comprehension with program summarization. 363-368 - Yang Liu:
Game theory semantics for PCTL model checking label-extended probabilistic Petri net. 369-374 - Huiqun Zhao, Lei Li:
Research on generation of testing data in hybrid method of model checking and testing. 375-378 - Shunkun Yang, Dongxiao Tang, Xiaohua Shi:
Testing system for CAN bus-oriented embedded software. 379-384 - Huiqun Zhao, Xiaohui Du:
The research of subscription method of the TransactionEvent data for EPCIS based on Web Service. 385-388 - Peizhen Liu, Hupei Xia, Jinjie Yao:
The research of underground vibration signal detection and processing system based on LabWindows/CVI. 389-394 - Lei Shi, Jing Zhou, Qi Huang, Wei Yan:
A modification on the Chord finger table for improving search efficiency. 395-398 - Ying-Jian Qi, Zhengpeng Wu, Ying Li, Jing Yu:
Grey discrete parameters model and its application. 399-404 - Xiuxia Chen, Wenqian Shang, Minyong Shi, Ying Li:
Online music integration system based on cloud computing. 405-408 - Qi Huang, Jing Zhou, Lei Shi, Wei Yan:
Simulation of a Semantic Web data sharing system based on NS-3. 409-414 - Wenfu Lin, Ying Li, Shuang Feng, Yongbin Wang:
The optimization of weights in weighted hybrid recommendation algorithm. 415-418 - Xiang Zhao, Guangyu Hu, Zhigong Wu:
The Smart grid scheduling based on contract net protocol with trust model. 419-424
Speech and Signal Processing
- Jialing Mo, Weiping Hu, Shasha Le:
Improving Empirical Mode Decomposition based on up-sampling. 425-428 - Li Gao, Ruimin Hu, Yuhong Yang:
Joint speech/audio coding based scalable perceptual audio coding. 429-434 - S. Rojathai, M. Venkatesulu:
Noise robust tamil speech word recognition system by means of PAC features with ANFIS. 435-440
UML, 00 Modeling & Simulation
- Liuqing Yang, Gang Zong, Yinghua Liu:
Using O-D estimation in dynamic road network traffic flow simulation. 441-447 - Emanuel S. Grant, Kaden K. Daley:
Comparative analysis to validate benefits of formal and informal software model transformations. 449-454
Visual and Multimedia Computing
- Hupei Xia, Xinyan Su, Peizhen Liu, Bin Liu:
A design of mosaic line-scan camera based on FPGA. 455-458 - Jing Sun, Wei Zhang, Huiqun Zhao:
Design and implementation of sports video player based on Android. 459-463 - Peng Wang, Kang Zhang, Xiaonan Song, Tianyi Zhou, Dongwei Gong:
Geometry based visualization of hierarchical structures. 465-470 - Chang-Woo Cho, Chung-Pyo Hong, Jin-Chun Piao, Yeong-Kyu Lim, Shin-Dug Kim:
Performance optimization of 3D applications by OpenGL ES library hooking in mobile devices. 471-476 - Dapeng Liu, Zengdi Cui, Shaochun Xu, Huafu Liu:
An empirical study on the performance of hash table. 477-484 - Yin Kang, Lina Zhou, Dongsong Zhang:
An integrated method for hierarchy construction of domain-specific terms. 485-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.