Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IWCSE
IWCSE 2009
Generate Citations
Computer Science and Engineering, International Workshop on
Oct. 28 2009 to Oct. 30 2009
Qingdao, China
ISBN: 978-0-7695-3881-5
Volume:
1
2
Table of Contents
Papers
Title Page i - Volume 1
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 1
Freely available from IEEE.
pp. iii
Papers
Copyright Page - Volume 1
Freely available from IEEE.
pp. iv
Papers
Table of Contents - Volume 1
Freely available from IEEE.
pp. v-xiii
Papers
Message from the Symposium Chairs - Volume 1
Freely available from IEEE.
pp. xiv
Papers
WCSE 2009 and IISA 2009 Organizing Committee - Volume 1
Freely available from IEEE.
pp. xv-xvi
Papers
WCSE 2009 and IISA 2009 Committee Members - Volume 1
Freely available from IEEE.
pp. xvii-xviii
Papers
Reviewers - Volume 1
Freely available from IEEE.
pp. xix-xxi
Papers
A New Intrusion Prediction Method Based on Feature Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-10
by
Liao Cheng-Bin
Papers
Design of Two-Way One-Time-Password Authentication Scheme Based on True Random Numbers
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-14
by
Fan Yu Tao
,
Su Gui Ping
Papers
Study of the De-noising Method Based on Wavelet and Fractal
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Zhenzhu Yu
,
Yong Yang
,
Zhenxi Chen
,
Kongyang Zhu
Papers
A Method of Building the Fault Propogation Model of Distributed Application Systems Based on Bayesian Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-24
by
Yunchun Li
,
Chengjun Zhao
,
Yin Yin
Papers
An Improved DEA Approach and Its Application on Fresh Farm Produce Logistics Performance Measurement
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Lan Bai
,
Cunyan Zhang
,
Jian Hu
,
Zhibin Liu
Papers
An Enhanced Approach for Investment Risk Forecasting of Electric Power Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-32
by
Cunyan Zhang
,
Yiming Li
,
Mengyan Liu
,
Zhibin Liu
Papers
Complex Dynamics of a Harvesting Holling-Type II Predation-Diffusion Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-37
by
Feng Rao
,
Zhibin Li
,
Weiming Wang
Papers
On the Quick Construction of All Edge-Balance Index Sets of H(n)
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-41
by
Yuge Zheng
,
Juan Lu
,
Sin-Min Lee
,
Ying Wang
Papers
Research of Information Filtering Based on Vector Space Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-46
by
Wang Shuda
,
Liu Jiangping
,
Wang Riu
Papers
Research of 3-Phase Reversible Rectifier Based on Current Hysteresis Regulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-50
by
Kexin Wei
,
Zishan Yang
,
Chao Dong
Papers
Error Mensuration of Temperature Coefficient between Formation Flying Small Satellites TT&C Equipment
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-54
by
Li Hai-bin Guo Jun-yan
,
Liu Hai-ming
Papers
Security Analysis of Two RSA-Based Fair Document Exchange Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-59
by
Zuhua Shao
Papers
ALAGA-RBF for Fault Diagnosis in a Continuous Tubular Reactor
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-64
by
Haoran Liu
,
Lionel Estel
Papers
Comparison of Two Methods for Texture Image Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-68
by
Yang Zhang
,
Rongyi He
,
Muwei Jian
Papers
An Incremental View Maintenance Approach Using Version Store in Warehousing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-73
by
Abdulaziz S. Almazyad
,
Mohammad Khubeb Siddiqui
,
Yasir Ahmad
,
Zafar Iqbal Khan
Papers
The Scheduling Model for Disabilitise Transfer in Airports
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-78
by
Xuejun Wu
Papers
A Symbiotic Evolutionary Algorithm for Flexible Job Scheduling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
Zhang Yan
,
Qiu Hongze
Papers
A Real-Time Driving Fatigue Monitoring DSP Device Based on Computing Complexity of Binarized Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-88
by
Xiang Cheng
,
Zhifei Zhang
,
Yang Song
,
Renyi Chen
Papers
A Novel Method for Detecting Small Target in Infrared Clutter
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-92
by
Yin Xu
,
JianQi Zhang
,
XinHuai Wang
,
WeiKe Dong
Papers
Optimization of Web Service Composition Using Factored Markov Decision Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-96
by
Chunhua Tao
,
Zhiyong Feng
,
Chao Xu
Papers
Logistic Distribution Vehicle Scheduling Research in E-Commerce Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-100
by
Chen Ailing
Papers
PPSpider: Towards an Efficient and Robust Topic-Specific Crawler Based on Peer-to-Peer Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-105
by
Dongfei Liu
,
Jia Liu
Papers
The Research of Power Grid Data Integration and Sharing Platform Based on SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-109
by
Wu Kehe
,
Shi Qianhui
,
Duan Cheng
,
Yin Haiyani
Papers
An Improved Evidence Theory Based on Random Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-113
by
Yufa Xu
,
Ziyang Zuo
,
Guochu Chen
Papers
Research on a New Development Framework for Mobile Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-118
by
Zhitong Su
,
Wei Song
,
Jinhong Li
Papers
The Research on Forensic Model Based Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-122
by
Wang WenQi
,
Liu Weiguang
Papers
Study on the Photogrammetric Application to the Fuel Cell Engine Vibration Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-127
by
Chuqi Su
,
Xiang Lin
Papers
Just-in-Time Learning Theory-Based Study on the Dynamic Model of Fuel Cell Engine System
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-132
by
Su Chuqi
,
Lin Xiang
Papers
Research on the Embedded Security Architecture Based on the Control Flow Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-137
by
Ou Qingyu
,
Huang Kai
,
Wu Xiaoping
Papers
High-Rate Complex Orthogonal Space-Time Block Codes for Multiple Transmit Antennas
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-141
by
Tao Bao
,
Jia-Dong Xu
,
Hui-Sheng Zhang
Papers
An Algorithm for Mining Association Rules Based on Sets Operation
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-145
by
Bai Chunjie
,
Wu Xiaoping
Papers
Research on Building Ocean Domain Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-150
by
Hongyan Yun
Papers
IP Traceback Based Probabilistic Packet Marking and Randomized Network Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-154
by
Xiao-jing Wang
,
Sheng-jun Wei
Papers
Damage Detection for Truss Structures Using Incomplete Modes
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-158
by
Q. W. Yang
,
W. M. Jin
Papers
The Architecture of Strict Nash Networks of Network Formation Games with One-Way Flow Inside and Two-Way Flow Outside
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-163
by
Li Wenwen
,
Lv Tingting
,
Gao Hongwei
,
Song Lin
Papers
Computer Simulation and Recognition of Foundation Loading Based on Differential Evolution Algorithm and Finite Element Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-168
by
Jiang Annan
,
Bao Chunyan
Papers
The Services Composition Algorithm in Incomplete Visible and Dynamic Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-171
by
Zhu Yi-an
,
Lei Wan-bao
Papers
A Trust-Based Message Encryption Scheme for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-176
by
Qiuna Niu
Papers
Increasing Endowment Assurance Policy Actuarial Model under Random Rates of Interest
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-181
by
Wang Liyan
,
Zhang Xiaodong
Papers
A Method of Part Recognition Based on Robot Vision and HSV Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-185
by
Sun Qi
,
Luo Zhizeng
Papers
The Research on Grid Spatial Database Simulation Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-189
by
Xiaosheng Liu
,
Lixia Zhao
,
Yuxuan Liu
,
Zhiyong Zhao
Papers
Fuzzy Evaluation on Campus Network Security Based on Membership Degree Transformation New Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-194
by
Jing Zhao
,
Pengfei Guo
Papers
Fuzzy Evaluation on the Operational Performance of E-commerce Websites Based on Membership Degree Transformation New Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-199
by
Yuexiao Han
,
Fangping Li
Papers
System Integration and Application of PDM CAPP and MES Based on Multi-views Management of BOM
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-203
by
Fei Xu
Papers
A New GEP Algorithm Based on Multi-phenotype Chromosomes
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Zenghong Wu
,
Min Yao
Papers
Binary Tree and Energy Weighted Application to Three-Channel SEMG Artificial Hand
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-214
by
Tang Jianyou
,
Luo Zhizeng
Papers
Analysis of Analog Circuit Subnet Tearing and Mensurability
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-218
by
Wang Kai
,
Jia Xiaojing
,
Cheng Li
,
Tian Qi
Papers
Coordination Traffic Control under the Framework of Multi-agent Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-222
by
Jian-yu Zhao
,
Dian-kui Tang
Papers
Analysis of Improved Routing Algorithm in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-226
by
Jinghua Wang
,
Yuanyuan Chen
,
Huan He
,
Tingting Guan
,
Yuegu Zhou
Papers
An Heuristic Genetic Algorithm Solve Test Point Selecting with Unreliable Test
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-232
by
Jia-Liang Pan
,
Xiao-Hui Ye
,
Qiang Xue
Papers
Design and Application of Remote Fault Maintenance Solution Based on IRL and Checkpointing
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-237
by
Fengjing Shao
,
Changheng Shao
,
Rencheng Sun
Papers
Organ Texture Synthesis for Virtual Reality-Based Surgical Simulators
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
Liu Xue-mei
,
Hao Ai-min
,
Zhao Qin-ping
Papers
Low Complexity Transcoder for MPEG2 to H.264
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-245
by
Zhang Jian
,
Deng Zhi-yong
Papers
Short-Term Power Load Forecasting Using Least Squares Support Vector Machines(LS-SVM)
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-250
by
Junfang Wu
,
Dongxiao Niu
Papers
Authentication Based on Signaling Token Piggybacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-254
by
Qiwei Jin
,
Tianjing Xu
Papers
A Method of TTCN Test Case Generation Based on TP Description
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-258
by
Ma Yan
,
Yan Xuexiong
,
Zhu Yuefei
,
Shao Guoliang
Papers
A Query-Dependent Ranking Approach for Search Engines
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
Lian-Wang Lee
,
Jung-Yi Jiang
,
ChunDer Wu
,
Shie-Jue Lee
Papers
HS-LS-CD Hybrid Conjugate Gradient Algorithm for Unconstrained Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-268
by
Hui Yan
,
Lanping Chen
,
Baocong Jiao
Papers
An Artificial Immune System Model Based on Semantics
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-273
by
Chu-Jiao Wang
,
Shi-Xiong Xia
,
Hai-zhi Wang
Papers
Research and Implementation of the Platform for Analyzing Data Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-278
by
Hongyong Ruan
,
Dongjin Yu
,
Yong Cao
Papers
Study on Fast Fixed-Codebook Search Algorithm in G.729 Speech Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-282
by
Li Li
,
Gang Chen
Papers
Research on Information Hiding Technology Based on Chaotic Map and Image Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-287
by
Li-nan Fan
,
Bo-tao Song
Papers
Image-Based Rendering Using Unstructured Image Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-292
by
Siren Bato
,
Yoshinori Dobashi
,
Tsuyoshi Yamamoto
Papers
Elasticity Mechanics Computation of Throttle-Slice for Twin-Tubes Shock Absorber
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-296
by
Changcheng Zhou
,
Jie Meng
,
Yanhui Cai
Papers
Research on Vector-Control System of PMSM Based on Internal Model Control of Current Loop
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-301
by
Jun Liu
,
Meng-zhi Huang
,
Yang Wang
Papers
Real-Time Realistic Rendering of Tissue Surface with Mucous Layer
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-306
by
Aimin Hao
,
Feng Song
,
Shuai Li
,
Xuemei Liu
,
Xuping Xu
Papers
UMFP: Update Mining Frequency Paths in RFID System
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-311
by
Zhuxi Chen
,
Kongfa Hu
,
Yan Sun
,
Ling Chen
Papers
Optimum Design of Throttle-Valves Parameters for Shock Absorber Based on Velocity Characteristic
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-316
by
Changcheng Zhou
,
Jie Meng
,
Yanhui Cai
Papers
Research of Game of Supply Chain Coordination in the Condition of the Uncertain Delivery
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-321
by
XianWu Zeng
Papers
The Strategy of Java Class File's Modification
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-326
by
Qing Su
,
Yongfeng Cao
,
Guoda Liang
Papers
Ultraviolet Image Processing Method in Corona Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-331
by
Yin Limin
,
Zhangyu
Papers
Design of the Classified File Management and Control System
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-336
by
Yanmei Lv
,
Jiangsheng Sun
,
Gefang Wang
Papers
Digital Oil Field Data Management Based on Data Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-342
by
Man Yuan
,
Xiaoli Guo
,
Rui He
,
Jianping Hu
Papers
Research on Three-Dimensional Measurement Using Color-Coding Structured Light
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-346
by
Xiaopeng Ji
,
Kuanquan Wang
,
Zhiqiang Wei
Papers
Moving Object Detection Algorithm Based on Variance Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-350
by
Yongquan Xia
,
Weili Li
,
Shaohui Ning
Papers
Research on Fuzzy Evaluation in Coal Enterprises Logistic System
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-354
by
Xu Jun
Papers
A PLL Control with RBF Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-358
by
Qianhua Xiao
,
Youhui Xie
Papers
Probabilistic Dense Coding for Multi-communications with Non-maximally Entangled State
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-361
by
Ren Shijie
,
Su Xin
Papers
Extending UML for Aspect-Oriented Architecture Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-366
by
Wang Rui
,
Mao Xiao-Guang
,
Dai Zi-Ying
,
Wang Yan-Ni
Papers
A Memory Access Scheduling Method for Multi-core Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-371
by
Mengxiao Liu
,
Weixing Ji
,
Zuo Wang
,
Xing Pu
Papers
A Stereo Matching Method Based on Chain Code Vector
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-375
by
Ying Lin
,
Xinglin Fang
Papers
The Design of Information Flow Control in the Trust Domain Based on the Trusted Terminal
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-380
by
Yan-Li Cui
,
Xing Zhang
Papers
Research on Credit Evaluation System of E-Commerce Transactions in Automobile Spare Parts Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-384
by
Tao Hu
,
Zhenyu Cheng
Papers
The Parabolic KS Function for the Structural Topology Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-387
by
Tie Jun
,
Sui Yun-kang
Papers
Intelligent Restoration Algorithm to Line Similar Pixels in Noisy Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-393
by
Hao Bing
,
Shen Ting-zhi
,
Tian Hui
Papers
Short-Term Load Prediction Based on Ant Colony Clustering-Elman Neural Network Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-397
by
Dong-xing Duan
Papers
A Comparison Study of Developed Buffer Mechanism in P2P Living Streaming System
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-402
by
Ting Wei
,
Changjia Chen
,
Chunxi Li
Papers
The Cascade of the Reversible Gate Network-Based the Dynamic Binary Spanning Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-407
by
Zhijin Guan
,
Zhihua Bao
,
Weiping Jing
Papers
Address Filtering Based Wu-Manber Multiple Patterns Matching Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-412
by
Baojun Zhang
,
Xiaoping Chen
,
Lingdi Ping
,
Zhaohui Wu
Papers
Resident Set Management and Realize
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-416
by
Wang Chengjun
Papers
A Plan for the Temporary Mini Supermarket Network of Beijing Olympic Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-420
by
Fu ling Ma
,
Man fa Liang
Papers
A Survey on Peer-to-Peer Streaming System's Neighbor Number
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-424
by
Zhenfeng Ren
,
Ju Liu
,
Fenglin Qin
,
Yanwei Wang
Showing 100 out of 144
Load More
Load All