default search action
ICCC 2013: Wuhan, China
- 2013 The Second International Conference on Innovative Computing and Cloud Computing, ICCC '13, Wuhan, China - December 01 - 02, 2013. ACM 2013, ISBN 978-1-4503-2119-8
Chapter 1: Innovative Computing
- Gerald Schaefer:
Interactive Exploration of Large Photo Libraries. 3 - Zhongmin Wang, Qing Wang:
Elderly People Daily Life Monitoring Based on GPS Trajectory with Non-uniform Sampling. 6 - Le Yang, Wei Su, Keju Wang, Lei Guan:
iMathema: A Novel Online Intelligent Computing System Oriented to Common Scientific Computations. 10 - Yahui Hu, Fangxin Chen, Liping Wei:
The Scheme Design of Image Processing Board. 17 - Yahui Hu, Yamin Hu, Lejiang Guo:
Construction of C Programming Language Based on Ontology Knowledge Base. 23 - Xiaofeng Liu:
A Fast Static Index Pruning Algorithm. 26 - Liang Xu, Xian Wang:
Research on Capacity Decision in a Dual-channel Supply Chain under Random Demand. 30 - Zipeng Yu, Zhendong Wu, Jianwu Zhang:
An Illumination Robust Algorithm for Face Recognition Via SRC and Gradientfaces. 36 - Yanling Han, Shouqi Cao, Yun Zhang:
Research on Aided Decision-making System based on Data Mining for Disaster of Storm Tide. 41 - Jiankai Xiao, Xiaoting Wang, Qianghua Guo, Hang Long, Song Jin:
Analysis and Evaluation of Jammer Interference in LTE. 46 - Gongrong Zhang, Qingxiang Wu, Zhiqiang Zhuo, Xiaowei Wang, Xiaojin Lin:
A Large-scale Images Processing Model Based on Hadoop Platform. 51 - Li Tan, Bin Hao, Gang Su:
A Novel Stopping Criterion for LTE-A High Speed Turbo Decoder. 55 - Randy E. S. Harnarinesingh, Chanan S. Syan:
Investigating the Feasibility of a Robot-Based Writing Agent. 60 - Kai Zhao, Mengyun Cheng, Pengcheng Long, Shengpeng Yu, Liqin Hu, Yican Wu:
Human Organ Geometry Construction from Segmented Images. 65 - Zimian Hao, Yingxia Li:
Load Balancing Forest Topology Generation Algorithm in Wireless Mesh Networks. 70 - Guoxiong Xu:
Turbo IC/Decoding for Coded Multi-Carrier DS-CDMA. 74 - Xinjuan Zhu, Xue Li, Lianjie Song:
A 2D Personalized Facial Expression Generation Approach. 78 - Yong Liu:
Transition Learning by Negative Correlation Learning. 83 - Li Zhang, Xianmei Wang, Yuyu Liang, Lun Xie:
A New Method for Age Estimation from Facial Images by Hierarchical Model. 88 - Nan Zhang, Jun Huang, Taifeng Quan:
Research of Environment Data in Coal Mining Analysis Based on the Association Rule Mining. 92 - Pai Wang, Jzau-Sheng Lin, Mei Wang, Yu-Lei Zhao:
An Image Reconstruction Algorithm for Electrical Capacitance Tomography. 96 - Yanchun Zhao, Xiaofei Hu, Zefu Zhao:
Mathematical Modeling on Computer Simulation. 102 - Lili Huang, Junfang Hou:
Application of Mathematical Algorithm Concept in Computer Logic Language. 105 - Hongli Xiao:
Calculus Concept in Computer Programming. 108 - Jieyu Gao:
Programming and Designing Essentials of C Language and Object-oriented Language. 111 - Ning Wan:
C Language Compiling Characteristics and Software Application Development. 114
Chapter 2: Cloud Computing
- Akinlolu Olumide Akande, Nozuko Aurelia April, Jean-Paul Van Belle:
Management Issues with Cloud Computing. 119 - Hiroshi Fujinoki:
Dynamic Binary User-Splits to Protect Cloud Servers from DDoS Attacks. 125 - Hua Huang:
Study of Runoff Prediction Based on Cloud Model. 131 - Haiming Lin, Xiaohu Liu, Wei Fu, Kangyu Jia:
A Study on Linear Elastic FEM by Cloud Computing. 136 - Qian Zhang, Tianyi Zhang, Xianglin Zuo, Yuan Yao, Baoping Feng, Junhua Wang, Wanli Zuo:
Web User Trust Relationship Prediction Based on Cloud Model. 143 - Xin Huang, Yuxing Peng, Bin Huang:
A Novel Cost-Effective Interconnection Networks of Modular Datacenters for the Cloud Computing. 148 - Ke Han, Xiaobo Cai:
Speed-Scaling-based Job/Tasks Deployment for Energy-efficient Datacenters in Cloud Computing. 154 - Huayang Cao, Peidong Zhu, Jinjing Zhao:
CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms. 158 - Yingchi Mao, Daoning Ren, Xi Chen:
Adaptive Load Balancing Algorithm Based on Prediction Model in Cloud Computing. 165 - Shuying Liu:
Technical Bottlenecks and Future Application Trend of Cloud Computing. 171 - Mukhiddinov Behzod, Mohamed Osman Adan:
Comparison and Analysis of various types of PON's Access Architectures for Cloud computing Applications. 174
Chapter 3: Computer Applications in Technology
- Jianhua Du, Jiwu Xin, Shenghong Wu:
Research on Meteorological Data Sharing Technology Based on Service Oriented Architecture. 181 - Boqun Feng, Jian Li:
Sirtio: Towards Scalable Virtual SSDs. 185 - Qiao Chen, Jian Li:
The Balance Mechanism of Power and Performance in the Virtualization. 189 - Donald C. D. Chang, Joe Lee, Steve K. Chen, Hen-Geul Yeh, Kung Yao:
Secured Utility Bill Data Storage via Wavefront-Multiplexing. 193 - Gang Liu, Xinping Yan, Yufen Sun:
Driver Pose Estimation Using a Mixture-model Method. 200 - Zhanqiang Teng:
On Sport Informatization under the Perspective of Education Informatization. 205 - Huiting Wu, Huihui Dong:
A Trust Model Based on Reputation in P2P Network. 208 - Jianglu Chen, Jian Li, Fei Hu:
SR-IOV based Virtual Network Sharing. 213 - Lei Sun:
Influence of 3D Computer Simulation Technology on Interior Design. 219 - Yaojun Shan, Jin Bai, Xiaoqian Ye, Wei Li:
Application of QR Two-dimension Code Technology in Credits Certification System. 222 - Lifang Lu:
Analysis of Computer Multi-angle Application and Its Technology Development. 225 - Jianpeng Zhang:
Applied Research on Security of Computer Network Technology. 228 - Hao Xu:
Design and Implementation of Synchronization System Based on Web Service Database. 231 - Limin Huang:
Security Protection Design and Multi-port Transport Technology in Computer Network. 234 - Yanli Li:
Application and Development of Computer Technology in Quality Education. 237 - Yingming Xu, Shujuan Jin, Tianxing Jin:
Computer in Sports Scientific Research and Economy. 240 - Shujuan Jin, Yingming Xu, Tianxing Jin:
Computer Network Technology in Modern Sports Education. 243 - Yanhua Xu, Kefei Wei:
Technology Development of Application Software in Sports. 246 - Jian Lin:
Application of Computer Technology in Sport Data Statistics. 248 - Yu Bai:
Improvement of Computer Technology on Education Reform. 251 - Ping Guo:
Some Issues on Evaluation of the Theme Hotel with the Travelers' Experience Factors. 254 - Jianning Yang, Kun Lin:
Analysis on Malicious Attack and Safety Protection on the Local Area Network of Computers. 258 - Chintakindi Srinivas, Vangipuram Radhakrishna, C. V. Guru Rao:
Clustering Software Components for Component Reuse and Program Restructuring. 261 - Songxin Wang:
A Community-Based Trust Management Framework in P2P Systems. 267 - M. S. B. PhridviRaj, C. V. Guru Rao:
Mining Top-K Rank Frequent Patterns in Data Streams A Tree Based Approach with Ternary Function and Ternary Feature Vector. 271
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.