Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIS
CIS 2009
Generate Citations
2009 International Conference on Computational Intelligence and Security
Dec. 11 2009 to Dec. 14 2009
Beijing, China
ISBN: 978-0-7695-3931-7
Volume:
0
1
Table of Contents
CIS 2009 Organization - Volume 1
Freely available from IEEE.
pp. xvii-xvii
Papers
A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-520
Papers
[Publisher information - Volume 1]
Freely available from IEEE.
pp. 678
Papers
Title Page i - Volume 1
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 1
Freely available from IEEE.
pp. iii
Papers
[Copyright notice - Volume 1]
Freely available from IEEE.
pp. iv
Papers
Table of contents - Volume 1
Freely available from IEEE.
pp. v-xiv
Papers
Preface - Volume 1
Freely available from IEEE.
pp. xv
Papers
Message from the General Co-Chairs - Volume 1
Freely available from IEEE.
pp. xvi
Papers
Program Committee - Volume 1
Freely available from IEEE.
pp. xviii-xix
Additional Reviewers - Volume 1
Freely available from IEEE.
pp. xx-xxi
Papers
A Virus Detection System Based on Artificial Immune System
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-10
by
Rui Chao
,
Ying Tan
A Hierarchical Artificial Immune Model for Virus Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Wei Wang
,
Pengtao Zhang
,
Ying Tan
,
Xingui He
Papers
A Novel Classification Method Based on Artificial Immune System and Quantum Mechanics Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-14
by
Liling Ma
,
Zhao Zhang
,
Xiaohang Zhou
,
Junzheng Wang
Papers
A Parallel Artificial Immune Model for Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-24
by
Yutao Qi
,
Fang Liu
,
Licheng Jiao
An Improved Immune-Based Multi-modal Function Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Xu Zhang
,
Li Xu
Papers
A New Algorithm Estimating the Mixing Matrix for the Sparse Component Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Suxian Zhang
,
Hailin Liu
,
Jiechang Wen
,
Weili Chen
Papers
Factor Sensitivity Analysis for Multivariable Systems Using Bayesian Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-33
by
Runbo Bai
,
Xiumei Qiu
,
Maosen Cao
Papers
Prediction of C3 Concentration in FCCU Using Neural Estimator Based on Dynamic PCA
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-37
by
Rong Guo
,
Dongchen Shi
Papers
Wavelet Smoothing Based Multivariate Polynomial for Anchovy Catches Forecasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-41
by
Nibaldo Rodriguez
,
Eleuterio Yañez
Papers
Studying of Data Centre Architecture for Prefecture-level City
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Xuanzi Hu
,
Jiafu Wan
Papers
Classifying Computer Session Data Using Self-Organizing Maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-53
by
Veronica C. Estrada
,
Akihiro Nakao
,
Enrique C. Segura
Papers
Large-Scale Hierarchical Text Classification Based on Path Semantic Vector and Prior Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-58
by
Feng Gao
,
Weiming Fu
,
Yiping Zhong
,
Danfeng Zhao
Papers
Discovering Temporal Similarity Pattern Based on Metamorphosis Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-63
by
Yuan Tian
Papers
The Application of Improved 3D_Apriori Three-Dimensional Association Rules Algorithm in Reservoir Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
by
Xiao-dong Shao
Papers
A Batch Constructing Method of Weighted Concept Lattice Based on Deviance Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-73
by
Sulan Zhang
,
Ping Guo
,
Jifu Zhang
,
Xinxin Wang
Papers
Intelligent Security Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-78
by
Yun Shen
,
Trevor P. Martin
,
Pete Bramhall
Papers
Research on Answer Extraction Method for Domain Question Answering System(QA)
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
Cun-Li Mao
,
Li-Na Li
,
Zheng-Tao Yu
,
Lu Han
,
Jian-Yi Guo
,
Xiong-Li Lei
Papers
The Implementation of the Web Mining Based on XML Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-87
by
Cheng Zheng
,
Yong Fang
,
Yaping Shen
Papers
Predict Ranking of Object Summaries with Hidden Markov Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-91
by
Le Peng
,
Zhi Cai
,
Guowen Wu
Papers
Improved Differential Evolution Algorithm with Random Migration Operator
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-97
by
Yuelin Gao
,
Miaomiao Wang
Papers
A Genetic Algorithm for Multiobjective Bilevel Convex Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-102
by
Liping Jia
,
Yuping Wang
Papers
Hybrid Genetic Algorithm with Particle Swarm Optimization Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-106
by
Guoli Zhang
,
Mingxin Dou
,
Siyan Wang
Papers
Quantum Genetic Algorithm and its Application in Power System Reactive Power Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-111
by
Hongxia Miao
,
Honghua Wang
,
Zhixiang Deng
Papers
Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
Jiadong Yang
,
Hua Xu
,
Peifa Jia
Papers
A Clustering-Based Evolutionary Algorithm for Traveling Salesman Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-122
by
Dalian Liu
,
Xinfeng Wang
,
Jinling Du
Papers
Multiobjective Differential Evolution Based on Opposite Operation
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-127
by
Ning Dong
,
Yuping Wang
Papers
An Approach for a Class of Bilevel Multiobjective Programming Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-132
by
Yulan Liu
Papers
Optimization of Logistics Nodes in Dynamic Location with a Multi-objective Evolutionary Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-137
by
Yan Liu
,
Lei Fan
,
Yuping Wang
,
Qianli Dong
Study on Dynamic Game Models in a Two-Echelon Supply Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-141
by
Jian-hu Cai
,
Li-ping Wang
Papers
EKF-Ah Based State of Charge Online Estimation for Lithium-ion Power Battery
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-145
by
Zhiwei He
,
Mingyu Gao
,
Jie Xu
Papers
Neighborhood-Based Weighted Regularization of Video Sequence Super-Resolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-150
by
Yaozu An
,
Yao Lu
,
Hong Zhao
The Correction SART Algorithm Based on Circular Symmetrical Object
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-154
by
Dong-jiang Ji
,
Wen-zhang He
Papers
Feature Extraction and Matching for Plant Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-159
by
Peizhen Wang
,
Lei Shi
,
Hengzhi Dong
Papers
Extracting the Coronary Artery in Angiographic Image Based on à Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
Qingzhu Wang
,
Ke Wang
,
Donghong An
,
Bo Chen
,
Miao Liu
,
Yingying Ying
Papers
Object Detection and Tracking Using Spatiotemporal Wavelet Domain Markov Random Field in Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Xuchao Li
,
Dongsheng Liu
Papers
Extraction of Limit Streamlines in 2D Flow Field Using Virtual Boundary
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-175
by
Wenyao Zhang
,
Jing Su
The Close-Degree of Covering Rough Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-179
by
Dingjun Chen
Papers
An Ontology-Based NLP Approach to Semantic Annotation of Annual Report
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-183
by
Baohua Wang
,
Hejiang Huang
,
Xiaolong Wang
,
Wensheng Chen
Papers
Using SVM to Organize the Image Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-187
by
Bingxin Xu
,
Qian Yin
,
Guangjun Lv
Papers
A New Support Vector Machine Model Based on the Discrete Conditional Value-at-Risk
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-192
by
Min Jiang
,
Zhiqing Meng
,
Gengui Zhou
Papers
Web Document Classification Based on Fuzzy k-NN Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-196
by
Juan Zhang
,
Yi Niu
,
Huabei Nie
A New Method for Simultaneous Extraction of All Roots of Algebraic Polynomial
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
Ying Zhang
,
Zhe-zhao Zeng
Papers
PD-Type Sampled-Data Iterative Learning Control for Nonlinear Systems with Time Delays and Uncertain Disturbances
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-205
by
Yang Fan
,
Shuping He
,
Fei Liu
Papers
Trust Relationship Modelling in E-commerce-Based Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-210
by
Zaobin Gan
,
Juxia He
,
Qian Ding
,
Vijay Varadharajan
A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public Square
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Bo Yang
,
Yong-gang Wu
,
Cheng Wang
Papers
An Intelligent Decision Support System of Lake Water Pollution Control Based on Multi-agent Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-221
by
Jianjun Ni
,
Chuanbiao Zhang
,
Li Ren
Papers
Lag Synchronization of Uncertain Chaotic Neural Networks with Mixed Time-Varying Delays Based on Adaptive Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-226
by
Xiaozheng Mou
,
Wuneng Zhou
,
Lin Pan
,
Qingyu Zhu
,
Jian'an Fang
Papers
Support Vector Regression Based on Particle Swarm Optimization and Projection Pursuit Technology for Rainfall Forecasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-233
by
Jiansheng Wu
,
Jie Zhou
,
Yuelin Gao
Image Target Detection Using Morphological Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-236
by
Cheng-tian Song
,
Ke-yong Wang
A Novel Control Method Based on Fuzzy Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-239
by
Lixin Xing
,
Shanqing Gao
,
Yunfei Chen
Papers
Research on Reduction of Commutation Torque Ripple in Brushless DC Motor Drives Based on Fuzzy Logic Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-243
by
Soumah Yaya
,
Wang Honghua
Papers
A Topology Optimization for Truss Based on Improved Group Search Optimizer
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-248
by
Haobin Xie
,
Feng Liu
,
Lijuan Li
Papers
A Quick Group Search Optimizer with Passive Congregation and its Convergence Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-253
by
Guang Qin
,
Feng Liu
,
Lijuan Li
Papers
The Analysis and Improvement of Binary Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-258
by
Jianhua Liu
,
Xiaoping Fan
Papers
System Identification Based on Particle Swarm Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
Xiuqin Deng
Papers
Minimal Merrifield-Simmons Index of 5-leaf-trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-267
by
Chengfu Ye
Papers
Reliability Polynomials of Networks with Vertex Failure
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-271
by
Haixing Zhao
,
Liang Wei
Papers
On Orderings of Some Graphs by the Extreme Roots of their Graph Polynomials
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-276
by
Haizhen Ren
Papers
A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy of Acceleration Coefficients
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-281
by
Li Guo
,
Xu Chen
Papers
The Particle Swarm Optimization Algorithm Based on Dynamic Chaotic Perturbations and its Application to K-Means
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-286
by
Jie Zhang
,
Yajuan Yang
,
Quanju Zhang
Papers
Texture Image Retrieval Using Non-separable Wavelets and Local Binary Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-291
by
Xin Liu
,
Xinge You
,
Yiu-ming Cheung
Papers
Research on the Evolution of Supply Chain Based on SWARM
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-295
by
Wenxue Niu
,
Yajuan Yang
,
Xiao Luo
,
Quanju Zhang
Papers
Measuring the Spread of Fuzzy Variable by L-S Integral
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Xiao-Li Wu
,
Yan-Kui Liu
PNN Based Motion Detection with Adaptive Learning Rate
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-306
by
Zhiming Wang
,
Li Zhang
,
Hong Bao
Papers
Proof of Two Kinds of Fingerprint Feature Extraction CNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-310
by
LongMei Jie
,
Hui Wang
,
DeRong Li
,
GuoQiang Shao
Papers
A Sound Dynamic Resource-Constrained Scheduling Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-314
by
Juyang Zhang
,
Ningkang Jiang
Papers
On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-319
by
Gil Melfe Mateus Santos
,
Hugo Pedro Martins Carriço Proença
Papers
Face Recognition Using Modular Locality Preserving Projections
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-324
by
Pengzhang Liu
,
Tingzhi Shen
,
Yu Hu
,
Sanyuan Zhao
Multi-pose Face Detection Based on Adaptive Skin Color and Structure Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-329
by
Zhao-yi Peng
,
Yu Zhou
,
Ping Wang
Papers
Use of In-Situ Visible and Near-Infrared Spectroscopy for Non-invasive Discrimination of Spirulina Platensis
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-334
by
Di Wu
,
Tianyun Ma
,
Pengcheng Nie
,
Zhiping Wang
,
Zhengjun Qiu
,
Yong He
Papers
Efficient Mean Shift Particle Filter for Sperm Cells Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-339
by
Xiuzhuang Zhou
,
Yao Lu
Extraction and Recognition Alphabetic and Digital Characters on Industrial Containers
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-343
by
Bingxia Shi
,
Na Yu
,
Jia Xu
,
Quanming Zhao
Papers
Efficient Object Recognition Using Corner Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-348
by
Jian Cao
,
Kan Li
,
Chunxiao Gao
,
Qiongxin Liu
Papers
Contour-Shape Recognition and Retrieval Based on Chain Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-352
by
Sun Junding
,
Xu Heli
Papers
An Improved Kernel Fisher Discriminant Analysis for Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-357
by
Fulong Wang
,
Xiaoliang Liu
,
Cheng Huang
Papers
Locally Supervised Discriminant Analysis in Kernel Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-362
by
Caikou Chen
,
Jun Shi
,
Yiming Yu
Papers
Pseudo-inverse Locality Preserving Projections
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Rong-Hua Li
,
Zhiping Luo
,
Guoqiang Han
Papers
A Fusion of Face Symmetry of Two-Dimensional Principal Component Analysis and Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-371
by
Fulong Wang
,
Cheng Huang
,
Xiaoliang Liu
Papers
Fast Parameter Estimation in Image Restoration Based on Hierarchical Bayesian Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-375
by
Su Xiao
,
Guoqiang Han
,
Yan Wo
,
Zhan Li
,
Xiangji Chen
A Region-Based Active Contour Model for Image Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-380
by
Yun Tian
,
Ming-quan Zhou
,
Zhong-ke Wu
,
Xing-ce Wang
Papers
A Locally Gaussian Mixture Based RBF Network for Classification of Chinese Herbal Infrared Spectrum Fingerprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-385
by
Taijun Wang
,
Yiu-ming Cheung
Papers
Computing the m-Tight Error Linear Complexity of Periodic Binary Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-390
by
Jianqin Zhou
,
Cheng Shangguan
,
Zemao Zhao
Papers
Deterministic Secure Bidirectional Quantum Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-394
by
Dazu Huang
,
Zhigang Chen
,
Xin Li
,
Jianquan Xie
Papers
Different Authentication Properties and a Signcryption Scheme Revisited
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-399
by
Zhengjun Cao
,
Olivier Markowitch
Papers
An Efficient Threshold Signature Scheme Without Random Oracles
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-404
by
Wei Gao
,
Zhenyou Wang
,
Fei Li
,
Li'e Chen
Papers
Analysis of Two Signature Schemes from CIS'2006
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-408
by
Lihua Liu
,
Zhengjun Cao
Papers
The Walsh Spectrum Property of Resilient Boolean Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-413
by
Jiayao Wang
,
Bin Hu
,
Quanlai Wang
Papers
Cryptanalysis of Short Signature Scheme Without Random Oracles Assumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-417
by
Hua Shao
,
Xinglan Zhang
,
Feng Shao
Papers
Predators Combat Good Point Set Scanning-Based Self-Learning Worms
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-422
by
Fangwei Wang
,
Yunkai Zhang
,
Changguang Wang
,
Jianfeng Ma
Showing 100 out of 152
Load More
Load All