Default Cover Image

2009 International Conference on Computational Intelligence and Security

Dec. 11 2009 to Dec. 14 2009

Beijing, China

ISBN: 978-0-7695-3931-7

Volume:

Table of Contents

CIS 2009 Organization - Volume 1Freely available from IEEE.pp. xvii-xvii
Papers
A DDoS-Aware IDS Model Based on Danger Theory and Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 516-520
Papers
[Publisher information - Volume 1]Freely available from IEEE.pp. 678
Papers
Title Page i - Volume 1Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 1Freely available from IEEE.pp. iii
Papers
[Copyright notice - Volume 1]Freely available from IEEE.pp. iv
Papers
Table of contents - Volume 1Freely available from IEEE.pp. v-xiv
Papers
Preface - Volume 1Freely available from IEEE.pp. xv
Papers
Message from the General Co-Chairs - Volume 1Freely available from IEEE.pp. xvi
Papers
Program Committee - Volume 1Freely available from IEEE.pp. xviii-xix
Additional Reviewers - Volume 1Freely available from IEEE.pp. xx-xxi
Papers
A Virus Detection System Based on Artificial Immune SystemFull-text access may be available. Sign in or learn about subscription options.pp. 6-10
A Hierarchical Artificial Immune Model for Virus DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
A Novel Classification Method Based on Artificial Immune System and Quantum Mechanics TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Papers
A Parallel Artificial Immune Model for OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 20-24
An Improved Immune-Based Multi-modal Function Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Papers
A New Algorithm Estimating the Mixing Matrix for the Sparse Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
Papers
Factor Sensitivity Analysis for Multivariable Systems Using Bayesian Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Papers
Prediction of C3 Concentration in FCCU Using Neural Estimator Based on Dynamic PCAFull-text access may be available. Sign in or learn about subscription options.pp. 34-37
Papers
Wavelet Smoothing Based Multivariate Polynomial for Anchovy Catches ForecastingFull-text access may be available. Sign in or learn about subscription options.pp. 38-41
Papers
Studying of Data Centre Architecture for Prefecture-level CityFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Papers
Classifying Computer Session Data Using Self-Organizing MapsFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Papers
Large-Scale Hierarchical Text Classification Based on Path Semantic Vector and Prior InformationFull-text access may be available. Sign in or learn about subscription options.pp. 54-58
Papers
Discovering Temporal Similarity Pattern Based on Metamorphosis DataFull-text access may be available. Sign in or learn about subscription options.pp. 59-63
Papers
The Application of Improved 3D_Apriori Three-Dimensional Association Rules Algorithm in Reservoir Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
Papers
A Batch Constructing Method of Weighted Concept Lattice Based on Deviance AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 69-73
Papers
Intelligent Security Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 74-78
Papers
Research on Answer Extraction Method for Domain Question Answering System(QA)Full-text access may be available. Sign in or learn about subscription options.pp. 79-83
Papers
The Implementation of the Web Mining Based on XML TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 84-87
Papers
Predict Ranking of Object Summaries with Hidden Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 88-91
Papers
Improved Differential Evolution Algorithm with Random Migration OperatorFull-text access may be available. Sign in or learn about subscription options.pp. 92-97
Papers
A Genetic Algorithm for Multiobjective Bilevel Convex Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 98-102
Papers
Hybrid Genetic Algorithm with Particle Swarm Optimization TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 103-106
Papers
Quantum Genetic Algorithm and its Application in Power System Reactive Power OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 107-111
Papers
Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Papers
A Clustering-Based Evolutionary Algorithm for Traveling Salesman ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 118-122
Papers
Multiobjective Differential Evolution Based on Opposite OperationFull-text access may be available. Sign in or learn about subscription options.pp. 123-127
Papers
An Approach for a Class of Bilevel Multiobjective Programming ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 128-132
Papers
Optimization of Logistics Nodes in Dynamic Location with a Multi-objective Evolutionary AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 133-137
Study on Dynamic Game Models in a Two-Echelon Supply ChainFull-text access may be available. Sign in or learn about subscription options.pp. 138-141
Papers
EKF-Ah Based State of Charge Online Estimation for Lithium-ion Power BatteryFull-text access may be available. Sign in or learn about subscription options.pp. 142-145
Papers
Neighborhood-Based Weighted Regularization of Video Sequence Super-ResolutionFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
The Correction SART Algorithm Based on Circular Symmetrical ObjectFull-text access may be available. Sign in or learn about subscription options.pp. 151-154
Papers
Feature Extraction and Matching for Plant ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 155-159
Papers
Object Detection and Tracking Using Spatiotemporal Wavelet Domain Markov Random Field in VideoFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
Papers
Extraction of Limit Streamlines in 2D Flow Field Using Virtual BoundaryFull-text access may be available. Sign in or learn about subscription options.pp. 171-175
The Close-Degree of Covering Rough SetsFull-text access may be available. Sign in or learn about subscription options.pp. 176-179
Papers
An Ontology-Based NLP Approach to Semantic Annotation of Annual ReportFull-text access may be available. Sign in or learn about subscription options.pp. 180-183
Papers
Using SVM to Organize the Image DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 184-187
Papers
A New Support Vector Machine Model Based on the Discrete Conditional Value-at-RiskFull-text access may be available. Sign in or learn about subscription options.pp. 188-192
Papers
Web Document Classification Based on Fuzzy k-NN AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 193-196
A New Method for Simultaneous Extraction of All Roots of Algebraic PolynomialFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
Papers
PD-Type Sampled-Data Iterative Learning Control for Nonlinear Systems with Time Delays and Uncertain DisturbancesFull-text access may be available. Sign in or learn about subscription options.pp. 201-205
Papers
Trust Relationship Modelling in E-commerce-Based Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 206-210
A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public SquareFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
Papers
An Intelligent Decision Support System of Lake Water Pollution Control Based on Multi-agent ModelFull-text access may be available. Sign in or learn about subscription options.pp. 217-221
Papers
Support Vector Regression Based on Particle Swarm Optimization and Projection Pursuit Technology for Rainfall ForecastingFull-text access may be available. Sign in or learn about subscription options.pp. 227-233
Image Target Detection Using Morphological Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 234-236
A Novel Control Method Based on Fuzzy Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 237-239
Papers
Research on Reduction of Commutation Torque Ripple in Brushless DC Motor Drives Based on Fuzzy Logic ControlFull-text access may be available. Sign in or learn about subscription options.pp. 240-243
Papers
A Topology Optimization for Truss Based on Improved Group Search OptimizerFull-text access may be available. Sign in or learn about subscription options.pp. 244-248
Papers
A Quick Group Search Optimizer with Passive Congregation and its Convergence AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 249-253
Papers
The Analysis and Improvement of Binary Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 254-258
Papers
System Identification Based on Particle Swarm Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
Papers
Minimal Merrifield-Simmons Index of 5-leaf-treesFull-text access may be available. Sign in or learn about subscription options.pp. 264-267
Papers
Reliability Polynomials of Networks with Vertex FailureFull-text access may be available. Sign in or learn about subscription options.pp. 268-271
Papers
On Orderings of Some Graphs by the Extreme Roots of their Graph PolynomialsFull-text access may be available. Sign in or learn about subscription options.pp. 272-276
Papers
A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy of Acceleration CoefficientsFull-text access may be available. Sign in or learn about subscription options.pp. 277-281
Papers
The Particle Swarm Optimization Algorithm Based on Dynamic Chaotic Perturbations and its Application to K-MeansFull-text access may be available. Sign in or learn about subscription options.pp. 282-286
Papers
Texture Image Retrieval Using Non-separable Wavelets and Local Binary PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 287-291
Papers
Research on the Evolution of Supply Chain Based on SWARMFull-text access may be available. Sign in or learn about subscription options.pp. 292-295
Papers
Measuring the Spread of Fuzzy Variable by L-S IntegralFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
PNN Based Motion Detection with Adaptive Learning RateFull-text access may be available. Sign in or learn about subscription options.pp. 301-306
Papers
Proof of Two Kinds of Fingerprint Feature Extraction CNNFull-text access may be available. Sign in or learn about subscription options.pp. 307-310
Papers
A Sound Dynamic Resource-Constrained Scheduling SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 311-314
Papers
On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 315-319
Papers
Face Recognition Using Modular Locality Preserving ProjectionsFull-text access may be available. Sign in or learn about subscription options.pp. 320-324
Multi-pose Face Detection Based on Adaptive Skin Color and Structure ModelFull-text access may be available. Sign in or learn about subscription options.pp. 325-329
Papers
Efficient Mean Shift Particle Filter for Sperm Cells TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 335-339
Extraction and Recognition Alphabetic and Digital Characters on Industrial ContainersFull-text access may be available. Sign in or learn about subscription options.pp. 340-343
Papers
Efficient Object Recognition Using Corner FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 344-348
Papers
Contour-Shape Recognition and Retrieval Based on Chain CodeFull-text access may be available. Sign in or learn about subscription options.pp. 349-352
Papers
An Improved Kernel Fisher Discriminant Analysis for Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 353-357
Papers
Locally Supervised Discriminant Analysis in Kernel SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 358-362
Papers
Pseudo-inverse Locality Preserving ProjectionsFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Papers
A Fusion of Face Symmetry of Two-Dimensional Principal Component Analysis and Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 368-371
Papers
Fast Parameter Estimation in Image Restoration Based on Hierarchical Bayesian FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 372-375
A Region-Based Active Contour Model for Image SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 376-380
Papers
A Locally Gaussian Mixture Based RBF Network for Classification of Chinese Herbal Infrared Spectrum FingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 381-385
Papers
Computing the m-Tight Error Linear Complexity of Periodic Binary SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 386-390
Papers
Deterministic Secure Bidirectional Quantum CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 391-394
Papers
Different Authentication Properties and a Signcryption Scheme RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 395-399
Papers
An Efficient Threshold Signature Scheme Without Random OraclesFull-text access may be available. Sign in or learn about subscription options.pp. 400-404
Papers
Analysis of Two Signature Schemes from CIS'2006Full-text access may be available. Sign in or learn about subscription options.pp. 405-408
Papers
The Walsh Spectrum Property of Resilient Boolean FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 409-413
Papers
Cryptanalysis of Short Signature Scheme Without Random Oracles AssumptionFull-text access may be available. Sign in or learn about subscription options.pp. 414-417
Papers
Predators Combat Good Point Set Scanning-Based Self-Learning WormsFull-text access may be available. Sign in or learn about subscription options.pp. 418-422
Showing 100 out of 152