Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIS
CIS 2008
Generate Citations
2008 International Conference on Computational Intelligence and Security
Dec. 13 2008 to Dec. 17 2008
Suzhou
Volume:
1
2
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents - Conference
Freely available from IEEE.
pp. v-xii
Papers
Program Committee - Conference
Freely available from IEEE.
pp. xv-xvi
Papers
Title Page i - Conference
Freely available from IEEE.
pp. i
Optimization for Multi-Resource Allocation and Leveling Based on a Self-Adaptive Ant Colony Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-51
by
Zhengjia Wu
,
Liping Zhang
,
Ying Wang
,
Kui Wang
Papers
Title Page iii - Conference
Freely available from IEEE.
pp. iii
A Particle Swarm Optimization Algorithm with Logarithm Decreasing Inertia Weight and Chaos Mutation
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-65
by
Yue-lin Gao
,
Xiao-hui An
,
Jun-min Liu
Papers
Preface to CIS 2008 Conference
Freely available from IEEE.
pp. xiii
Papers
CIS 2008 Committees - Conference
Freely available from IEEE.
pp. xiv
Study on the Core Algorithm of Access Control System Based on Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-79
by
Liying Lang
,
Yue Hong
Papers
Self-Tuning Semi-Supervised Spectral Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chun Yang
,
Xiangrong Zhang
,
Licheng Jiao
,
Gaimei Wang
Papers
A Novel Example-Based Super-Resolution Approach Based on Patch Classification and the KPCA Prior Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-11
by
Yu Hu
,
Tingzhi Shen
,
Kin Man Lam
,
Sanyuan Zhao
Papers
Modified Generalized Discriminant Analysis Using Orthogonalization in Feature Space and Difference Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-15
by
Yunhui He
Papers
A Novel Algorithm for Solving Nonlinear Equations
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-19
by
Wenli Xie
,
Zhezhao Zeng
Papers
A Neural-Network Algorithm for Solving Nonlinear Equation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-23
by
Guimei Li
,
Zhezhao Zeng
Papers
Cooperation Controlled Competitive Learning Approach for Data Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Tao Li
,
Wen-jiang Pei
,
Shao-ping Wang
,
Yiu-ming Cheung
Papers
A Neural-Network Algorithm for the Simultaneous Inclusion of Polynomial Zeros
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-34
by
Chuangxin Wang
,
Zhezhao Zeng
Papers
Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Khin Haymar Saw Hla
,
YoungSik Choi
,
Jong Sou Park
Papers
Performance Comparison of Nonlinear Dimensionality Reduction Methods for Image Data Using Different Distance Measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Mudasser Naseer
,
Shi-Yin Qin
Papers
An Efficient Deterministic Secure Quantum Communication Scheme with W State
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-55
by
Wenjie Liu
,
Hanwu Chen
,
Tinghuai Ma
,
Wei Tian
Papers
Tabu Artificial Fish Swarm Algorithm Based Intelligent QoS Multicast Routing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-60
by
Junwei Wang
,
Xingwei Wang
,
Min Huang
Papers
Information Management System of Automobile Chassis Dynamometer Based on Multi Agent Web Serve
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Long Guo
,
Hongli Wang
Papers
Multi-Agent Model for Fatigue Control in Large Offshore Wind Farm
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-75
by
Rongyong Zhao
,
Yongqing Su
,
Torben Knudsen
,
Thomas Bak
,
WenZhong Shen
Papers
Object Tracking Based on Genetic Algorithm and Kalman Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Huan Wang
,
Mingwu Ren
,
Jingyu Yang
Papers
Multi-Strategy to Improve Reading Comprehension
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-89
by
Yongping Du
,
Ming He
Papers
A New Feature Extraction Approach Based on Sentence Element Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-95
by
Chuangxin Yang
,
Hong Peng
,
Jiabing Wang
Papers
Membership Functions Generation Based on Density Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-101
by
Imen Derbel
,
Narjes Hachani
,
Habib Ounelli
Papers
An Algorithm for Spatial Outlier Detection Based on Delaunay Triangulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Min-qi Zheng
,
Chongcheng Chen
,
Jia-xiang Lin
,
Ming-hui Fan
,
Tamás Janscó
Papers
Evolutionary Personal Information Partners
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-113
by
Jingde Cheng
A New Method for Discriminative Model Combination in Speech Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-203
by
Yahui Wu
,
Gang Liu
,
Jun Guo
Papers
A Measurement and Modeling Study of P2P IPTV Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Feng Liu
,
Zhitang Li
Papers
Discrete Fourier Transform Computation Using Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-123
by
Rosemarie Velik
Papers
Robust Designs for Fingerprint Feature Extraction CNN with Von Neumann Neighborhood
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-128
by
Hui Wang
,
LeQuan Min
,
JinZhu Liu
Papers
Local Stability Analysis of CNNs with Delay and Impulses
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-133
by
Jianjun Wang
,
Zhonghua Li
Papers
Control of Time Varying Nonlinear System Based on RBFNN-DMC Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-138
by
Lou Haichuan
,
Dai Wenzhan
,
Su Jie
Papers
The Operations and Properties of Reproducibility of the Empty Marking
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-144
by
JianHong Ye
,
ShiXin Sun
,
Wen Song
,
Lijie Wen
Papers
A GA-Based Approach on a Repair Logistics Network Design with M/M/s Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-149
by
Gengui Zhou
,
Zhenyu Cao
,
Zhiqing Meng
,
Qi Xu
Papers
Multi-Objective Evolutionary Algorithm Based on Dynamical Crossover and Mutation
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Hai-lin Liu
,
Xueqiang Li
,
Yuqing Chen
Papers
Joint Optimization of Age Replacement and Spare Ordering Policy Based on Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Rongbing Hu
,
Chaoyuan Yue
,
Jun Xie
Papers
A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Lei Fan
,
Yuping Wang
Papers
One MOEA Uniformity Measurement Based on Generalized Spherical Transformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
Xueqiang Li
,
Hai-lin Liu
Papers
A Touching Pattern-Oriented Strategy for Handwritten Digits Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Rui Ma
,
Yingnan Zhao
,
Yongquan Xia
,
Yunyang Yan
Papers
New H infinity Approach for Face Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-184
by
Siew Wen Chin
,
Kah Phooi Seng
,
Li-Minn Ang
Papers
Automatic Detection and Tracking of Maneuverable Birds in Videos
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-189
by
Xiao-yan Zhang
,
Xiao-juan Wu
,
Xin Zhou
,
Xiao-gang Wang
,
Yuan-yuan Zhang
Papers
An Effective Method for Mammograph Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-193
by
Junding Sun
,
Zhaosheng Zhang
Papers
Kernel Subspace LDA with Self-Constructed Mercer Kernel for Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Xuehui Xie
,
Wen-Sheng Chen
,
Bo Chen
,
Hui Liu
Image Encryption Algorithm Based on Rijndael S-boxes
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-280
by
Jiping Niu
Papers
Experimental Study of Discriminant Method with Application to Fault-Prone Module Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Gege Guo
,
Ping Guo
Papers
Semi-Supervised Dimensionality Reduction with Pairwise Constraints Using Graph Embedding for Face Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-214
by
Na Wang
,
Xia Li
,
Yingjie Cui
Papers
Face Feature Extraction Based on Uncorrelated Locality Information Projection
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-219
by
Lin Kezheng
,
Wang Huixin
,
Lin Sheng
Papers
3-D Reconstruction from Medical Images with Improved GVF Snake Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-224
by
Jinyong Cheng
,
Yihui Liu
,
Li Bai
Papers
Illumination Invariant Using DT-CWT and EMD for Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-230
by
Yuehui Sun
Papers
Chattering-Free Support Vector Regression Sliding Mode Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-234
by
Linsheng Li
,
Jianning Li
Application of CLIPS Expert System to Malware Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Ruili Zhou
,
Jianfeng Pan
,
Xiaobin Tan
,
Hongsheng Xi
Papers
Weighted Margin Multi-Class Core Vector Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-239
by
Yuan Yuan
,
Bing Chen
,
Jiandong Wang
,
Liming Fang
,
Tao Xu
Papers
Posterior Probability Reconstruction for Multi-Class Support Vector Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-243
by
Xiaoh Wang
Papers
Modeling of Oil and Water Migration Based on Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-248
by
Jingwen Tian
,
Qian Feng
Papers
Fast SVM Incremental Learning Based on the Convex Hulls Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-252
by
Chongming Wu
,
Xiaodan Wang
,
Dongying Bai
,
Hongda Zhang
Papers
Gray S-Box for Advanced Encryption Standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Minh Triet Tran
,
Doan Khanh Bui
,
Anh Duc Duong
Papers
Research of WaveCluster Algorithm in Intrusion Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
Mingwei Zhao
,
Yang Liu
,
Rongan Jiang
Papers
A Novel Generation Key Scheme Based on DNA
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-266
by
Xin-she Li
,
Lei Zhang
,
Yu-pu Hu
Papers
On the k-error Linear Complexity of Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-271
by
Jianqin Zhou
,
Cheng Shangguan
Papers
Analysis of Offline Fair Exchange Protocols in Strand Spaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-276
by
Xiangdong Li
,
Qingpu Guo
,
Qingxian Wang
Papers
Dynamic Integrity Measurement Model Based on Trusted Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-284
by
Changping Liu
,
Mingyu Fan
,
Yong Feng
,
Guangwei Wang
Papers
Semi-Fragile Watermarking Based on Image Gradient
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-289
by
Jun Xiao
,
Ying Wang
Papers
Counting Evolving Data Stream Based on Hierarchical Counting Bloom Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-294
by
Zhijian Yuan
,
Yingwen Chen
,
Yan Jia
,
Shuqiang Yang
Improved BP Decoding Algorithm for Nonbinary LDPC Codes Based on Bit-flipping Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-380
by
Man Teng
,
Xingcheng Liu
,
Zerong Deng
Papers
Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet Transforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Kai-mei Zheng
,
Xu Qian
Papers
Research of Multiple Watermarks Algorithm in E-commerce Copyright Protection and Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-304
by
Xiang-wei Zhu
,
Liang Xiao
Papers
Robust Hashing Based on Persistent Points for Video Copy Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-308
by
Yu-xin Zhao
,
Guang-jie Liu
,
Yue-wei Dai
,
Zhi-quan Wang
Efficienct ID-Based Proxy Blind Signature Schemes from Pairings
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-393
by
Pan Heng
,
Ke Ke
,
Chunxiang Gu
Papers
An Evaluation of API Calls Hooking Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-319
by
Mohd Fadzli Marhusin
,
Henry Larkin
,
Chris Lokan
,
David Cornforth
Papers
Exploring Malware Behaviors Based on Environment Constitution
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-325
by
Purui Su
,
Lingyun Ying
,
Dengguo Feng
Papers
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-330
by
Liming Fang
,
Jiandong Wang
,
Yongjun Ren
,
Jinyue Xia
,
Shizhu Bian
Papers
Generating High Quality Pseudo Random Number Using Evolutionary methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
Alireza Poorghanad
,
Ali Sadr
,
Alireza Kashanipour
Papers
An Enhanced Deniable Authentication Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-339
by
Li Gang
,
Xin Xiangjun
,
Li Wei
Papers
Sharing Multi-Secret Based on Circle Properties
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-344
by
Lina Ge
,
Shaohua Tang
A Simulation Platform of DDoS Attack Based on Network Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Xin-lei Li
,
Kang-feng Zheng
,
Yi-xian Yang
Papers
Research on Evaluation of Trust Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-349
by
Mo Yang
,
Lina Wang
,
Yuandong Lei
Papers
A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information Entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Xiongjun Li
Papers
Research on Disaster Tolerance System Based on Network Dataflow
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-360
by
Lin Guo
,
Hua Huang
,
Lejun Zhang
,
Yongtian Yang
,
Jianpei Zhang
Papers
A Novel Motion Based Lip Feature Extraction for Lip-Reading
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-365
by
Meng Li
,
Yiu-ming Cheung
Papers
Visual Cryptographic Scheme with High Image Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-370
by
Lin Kezheng
,
Fan Bo
,
Zhao Hong
Papers
Modified BP Decoding Algorithms Combined with GA for Low-Density Parity Check Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-375
by
Zerong Deng
,
Xingcheng Liu
,
Man Teng
Papers
A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-384
by
Chunlai Song
,
Xinchun Yin
,
Yali Liu
Papers
An Efficient Audio Watermark Algorithm with Strong Robustness
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-389
by
Tong Ming
,
Yan Tao
,
Hongbing Ji
Blind Deconvolution Algorithm for MIMO Channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-474
by
Min Zhao
,
Zhaoshui He
,
Shengli Xie
Using Genetic Algorithm to Improve Fuzzy k-NN
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-479
by
Juan Zhang
,
Yi Niu
,
Wenbin He
Papers
Construction of a Dynamic Trust Ontology Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-398
by
Qiuyu Zhang
,
Fengman Miao
,
Zhanting Yuan
,
Qikun Zhang
,
Zhi Fan
Contours Location Based on Fisher Discrimination Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-483
by
Weibin Zhao
,
Zhiheng Zhou
Papers
Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-404
by
Sunan Shen
,
Shaohua Tang
Application of Data Warehouse Technology in Data Center Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-488
by
Xuanzi Hu
,
Kuanfu Wang
Papers
A Fast Suffix Matching Method in Network Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-410
by
ZhenYu Liu
,
ShengLi Xie
,
Yue Lai
Papers
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Frank Yeong-Sung Lin
,
Po-Hao Tsang
,
Kun-Dao Jiang
Papers
Towards Provably Secure On-Demand Distance Vector Routing in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-420
by
Liqiang Mao
,
Jianfeng Ma
Analysis of Signal Transmission with Temperature-Dependent Electrical Parameters Using FDTD
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-510
by
Xiuhua Men
,
Shunming Li
,
Zemin Zuo
Papers
An Efficient Gradient Mechanism of Directed Diffusion in Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-431
by
Jian Wan
,
Jianrong Wu
,
Xianghua Xu
,
Yanna Yan
Papers
Study on the Internet Behavior's Activity Oriented to Network Survivability
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-435
by
Chi Guo
,
Lina Wang
,
Lai-nv Huang
,
Lei Zhao
Papers
A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-441
by
Xuanxia Yao
,
Xuefeng Zheng
Papers
Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-446
by
Shaohe Lv
,
Xiaodong Wang
,
Xin Zhao
,
Xingming Zhou
Showing 100 out of 119
Load More
Load All