Default Cover Image

2008 International Conference on Computational Intelligence and Security

Dec. 13 2008 to Dec. 17 2008

Suzhou

Volume:

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contents - ConferenceFreely available from IEEE.pp. v-xii
Papers
Program Committee - ConferenceFreely available from IEEE.pp. xv-xvi
Papers
Title Page i - ConferenceFreely available from IEEE.pp. i
Optimization for Multi-Resource Allocation and Leveling Based on a Self-Adaptive Ant Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 47-51
Papers
Title Page iii - ConferenceFreely available from IEEE.pp. iii
A Particle Swarm Optimization Algorithm with Logarithm Decreasing Inertia Weight and Chaos MutationFull-text access may be available. Sign in or learn about subscription options.pp. 61-65
Papers
Preface to CIS 2008 ConferenceFreely available from IEEE.pp. xiii
Papers
CIS 2008 Committees - ConferenceFreely available from IEEE.pp. xiv
Study on the Core Algorithm of Access Control System Based on Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
Papers
Self-Tuning Semi-Supervised Spectral ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
A Novel Example-Based Super-Resolution Approach Based on Patch Classification and the KPCA Prior ModelFull-text access may be available. Sign in or learn about subscription options.pp. 6-11
Papers
Modified Generalized Discriminant Analysis Using Orthogonalization in Feature Space and Difference SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 12-15
Papers
A Novel Algorithm for Solving Nonlinear EquationsFull-text access may be available. Sign in or learn about subscription options.pp. 16-19
Papers
A Neural-Network Algorithm for Solving Nonlinear Equation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 20-23
Papers
Cooperation Controlled Competitive Learning Approach for Data ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Papers
A Neural-Network Algorithm for the Simultaneous Inclusion of Polynomial ZerosFull-text access may be available. Sign in or learn about subscription options.pp. 30-34
Papers
Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Papers
Performance Comparison of Nonlinear Dimensionality Reduction Methods for Image Data Using Different Distance MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
Papers
An Efficient Deterministic Secure Quantum Communication Scheme with W StateFull-text access may be available. Sign in or learn about subscription options.pp. 52-55
Papers
Tabu Artificial Fish Swarm Algorithm Based Intelligent QoS Multicast Routing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 56-60
Papers
Information Management System of Automobile Chassis Dynamometer Based on Multi Agent Web ServeFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
Papers
Multi-Agent Model for Fatigue Control in Large Offshore Wind FarmFull-text access may be available. Sign in or learn about subscription options.pp. 71-75
Papers
Object Tracking Based on Genetic Algorithm and Kalman FilterFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Papers
Multi-Strategy to Improve Reading ComprehensionFull-text access may be available. Sign in or learn about subscription options.pp. 86-89
Papers
A New Feature Extraction Approach Based on Sentence Element AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 90-95
Papers
Membership Functions Generation Based on Density FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 96-101
Papers
An Algorithm for Spatial Outlier Detection Based on Delaunay TriangulationFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
Papers
Evolutionary Personal Information PartnersFull-text access may be available. Sign in or learn about subscription options.pp. 108-113
A New Method for Discriminative Model Combination in Speech RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 200-203
Papers
A Measurement and Modeling Study of P2P IPTV ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Papers
Discrete Fourier Transform Computation Using Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 120-123
Papers
Robust Designs for Fingerprint Feature Extraction CNN with Von Neumann NeighborhoodFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
Papers
Local Stability Analysis of CNNs with Delay and ImpulsesFull-text access may be available. Sign in or learn about subscription options.pp. 129-133
Papers
Control of Time Varying Nonlinear System Based on RBFNN-DMC AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 134-138
Papers
The Operations and Properties of Reproducibility of the Empty MarkingFull-text access may be available. Sign in or learn about subscription options.pp. 139-144
Papers
A GA-Based Approach on a Repair Logistics Network Design with M/M/s ModelFull-text access may be available. Sign in or learn about subscription options.pp. 145-149
Papers
Multi-Objective Evolutionary Algorithm Based on Dynamical Crossover and MutationFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Papers
Joint Optimization of Age Replacement and Spare Ordering Policy Based on Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Papers
A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
Papers
One MOEA Uniformity Measurement Based on Generalized Spherical TransformationFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
Papers
A Touching Pattern-Oriented Strategy for Handwritten Digits SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 174-179
Papers
New H infinity Approach for Face TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 180-184
Papers
Automatic Detection and Tracking of Maneuverable Birds in VideosFull-text access may be available. Sign in or learn about subscription options.pp. 185-189
Papers
An Effective Method for Mammograph Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 190-193
Papers
Kernel Subspace LDA with Self-Constructed Mercer Kernel for Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 194-199
Image Encryption Algorithm Based on Rijndael S-boxesFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Papers
Experimental Study of Discriminant Method with Application to Fault-Prone Module DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Papers
Semi-Supervised Dimensionality Reduction with Pairwise Constraints Using Graph Embedding for Face AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 210-214
Papers
Face Feature Extraction Based on Uncorrelated Locality Information ProjectionFull-text access may be available. Sign in or learn about subscription options.pp. 215-219
Papers
3-D Reconstruction from Medical Images with Improved GVF Snake ModelFull-text access may be available. Sign in or learn about subscription options.pp. 220-224
Papers
Illumination Invariant Using DT-CWT and EMD for Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 225-230
Papers
Chattering-Free Support Vector Regression Sliding Mode ControlFull-text access may be available. Sign in or learn about subscription options.pp. 231-234
Application of CLIPS Expert System to Malware Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
Papers
Weighted Margin Multi-Class Core Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 235-239
Papers
Posterior Probability Reconstruction for Multi-Class Support Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 240-243
Papers
Modeling of Oil and Water Migration Based on Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 244-248
Papers
Fast SVM Incremental Learning Based on the Convex Hulls AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 249-252
Papers
Gray S-Box for Advanced Encryption StandardFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
Papers
Research of WaveCluster Algorithm in Intrusion Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
Papers
A Novel Generation Key Scheme Based on DNAFull-text access may be available. Sign in or learn about subscription options.pp. 264-266
Papers
On the k-error Linear Complexity of SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 267-271
Papers
Analysis of Offline Fair Exchange Protocols in Strand SpacesFull-text access may be available. Sign in or learn about subscription options.pp. 272-276
Papers
Dynamic Integrity Measurement Model Based on Trusted ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Papers
Semi-Fragile Watermarking Based on Image GradientFull-text access may be available. Sign in or learn about subscription options.pp. 285-289
Papers
Counting Evolving Data Stream Based on Hierarchical Counting Bloom FilterFull-text access may be available. Sign in or learn about subscription options.pp. 290-294
Improved BP Decoding Algorithm for Nonbinary LDPC Codes Based on Bit-flipping MethodFull-text access may be available. Sign in or learn about subscription options.pp. 376-380
Papers
Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet TransformsFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
Papers
Research of Multiple Watermarks Algorithm in E-commerce Copyright Protection and TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 300-304
Papers
Robust Hashing Based on Persistent Points for Video Copy DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 305-308
Efficienct ID-Based Proxy Blind Signature Schemes from PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
Papers
An Evaluation of API Calls Hooking PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 315-319
Papers
Exploring Malware Behaviors Based on Environment ConstitutionFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROMFull-text access may be available. Sign in or learn about subscription options.pp. 326-330
Papers
Generating High Quality Pseudo Random Number Using Evolutionary methodsFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
Papers
An Enhanced Deniable Authentication ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 336-339
Papers
Sharing Multi-Secret Based on Circle PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 340-344
A Simulation Platform of DDoS Attack Based on Network ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
Papers
Research on Evaluation of Trust ModelFull-text access may be available. Sign in or learn about subscription options.pp. 345-349
Papers
A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 350-354
Papers
Research on Disaster Tolerance System Based on Network DataflowFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
Papers
A Novel Motion Based Lip Feature Extraction for Lip-ReadingFull-text access may be available. Sign in or learn about subscription options.pp. 361-365
Papers
Visual Cryptographic Scheme with High Image QualityFull-text access may be available. Sign in or learn about subscription options.pp. 366-370
Papers
Modified BP Decoding Algorithms Combined with GA for Low-Density Parity Check CodesFull-text access may be available. Sign in or learn about subscription options.pp. 371-375
Papers
A Practical Electronic Voting Protocol Based upon Oblivious Signature SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 381-384
Papers
An Efficient Audio Watermark Algorithm with Strong RobustnessFull-text access may be available. Sign in or learn about subscription options.pp. 385-389
Blind Deconvolution Algorithm for MIMO ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 470-474
Using Genetic Algorithm to Improve Fuzzy k-NNFull-text access may be available. Sign in or learn about subscription options.pp. 475-479
Papers
Construction of a Dynamic Trust Ontology ModelFull-text access may be available. Sign in or learn about subscription options.pp. 394-398
Contours Location Based on Fisher Discrimination AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 480-483
Papers
Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and DelegationFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
Application of Data Warehouse Technology in Data Center DesignFull-text access may be available. Sign in or learn about subscription options.pp. 484-488
Papers
A Fast Suffix Matching Method in Network ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 405-410
Papers
Towards Provably Secure On-Demand Distance Vector Routing in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 417-420
Analysis of Signal Transmission with Temperature-Dependent Electrical Parameters Using FDTDFull-text access may be available. Sign in or learn about subscription options.pp. 506-510
Papers
An Efficient Gradient Mechanism of Directed Diffusion in Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 427-431
Papers
Study on the Internet Behavior's Activity Oriented to Network SurvivabilityFull-text access may be available. Sign in or learn about subscription options.pp. 432-435
Papers
A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 436-441
Papers
Detecting the Sybil Attack Cooperatively in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 442-446
Showing 100 out of 119