Default Cover Image

2010 International Conference on Computational Intelligence and Security

Dec. 11 2010 to Dec. 14 2010

Nanning, Guangxi Zhuang Autonomous Region China

ISBN: 978-0-7695-4297-3

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xv
Papers
PrefaceFreely available from IEEE.pp. xvi
Conference OrganizationFreely available from IEEE.pp. xvii-xvii
Papers
Program Committee and Additional ReviewersFreely available from IEEE.pp. xviii-xix
Papers
Chinese Sentiment Orientation AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
A Scenario-Based Architecture for Reliability Design of Artificial Intelligent SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 6-9
Papers
The Analysis of Yeast Cell Morphology Using a Robot ScientistFull-text access may be available. Sign in or learn about subscription options.pp. 10-14
Papers
IMP-Filters of R0-AlgebrasFull-text access may be available. Sign in or learn about subscription options.pp. 15-17
Papers
Intelligent Digital Photo Management System Using Ontology and SWRLFull-text access may be available. Sign in or learn about subscription options.pp. 18-22
Papers
New Results on H∞ Filter Design for Continue-Time Systems with Time-Varying DelayFull-text access may be available. Sign in or learn about subscription options.pp. 23-27
Papers
Synchronization Algorithm for Multi-hop in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 28-32
Papers
Tool Wear Detection Based on Wavelet Packet and BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 33-36
Papers
Neural Network Method for Solving Linear Fractional ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 37-41
Papers
Semantic Modeling: Computational Models of the ConceptsFull-text access may be available. Sign in or learn about subscription options.pp. 42-46
Papers
A Fast HITON_PC AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 47-50
Papers
An Algorithm of Dynamic Associate Rule Based on Sliding WindowsFull-text access may be available. Sign in or learn about subscription options.pp. 51-54
Papers
Online Segmentation Algorithm for Time Series Based on BIRCH Clustering FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 55-59
Papers
A New Clustering Algorithm Based on Normalized Signal for Sparse Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 60-63
Papers
Dynamic Fluzzy Clustering Algorithm for Web Documents MiningFull-text access may be available. Sign in or learn about subscription options.pp. 64-67
Papers
A Novel GEP-Based Multiple-Layers Association Rule Mining AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 68-72
Papers
Credit Card Customer Segmentation and Target Marketing Based on Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
Papers
A Improved Fuzzy K-Subspace Clustering and Its Application in Multiple Dominant Sparse Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Papers
The Study of Credit Risk Evaluation Based on DEA MethodFull-text access may be available. Sign in or learn about subscription options.pp. 81-85
Papers
An Efficient Semantic Similarity Search on XML DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 86-90
Papers
Research on Feature Extraction Based on Genetic Algorithm in Text CategorizationFull-text access may be available. Sign in or learn about subscription options.pp. 91-94
Papers
The Comparison of Two Kinds of Reproduction in Multiobjective OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
Papers
A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
Papers
A New Kind of Handling Constraint Method for OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 104-108
Papers
An Algorithm of Collision Detection Based on Hybrid ModelFull-text access may be available. Sign in or learn about subscription options.pp. 109-112
Papers
An Improved Genetic Algorithm for Job Shop Scheduling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 113-116
Papers
Industrial Clusters Evolution Research Based on the SGAFull-text access may be available. Sign in or learn about subscription options.pp. 117-121
Papers
Hybrid Genetic Algorithm for the Multi-objective Flexible Scheduling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 122-126
Papers
An EOG Artifacts Correction Method Based on Subspace Independent Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 127-131
Papers
Evolutionary Algorithm for Zero-One Constrained Optimization Problems Based on Objective Penalty FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 132-136
Papers
A Novel Weight Design in Multi-objective Evolutionary AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 137-141
Papers
A New Evolutionary Algorithm Based on Simplex Crossover and PSO Mutation for Constrained Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 142-146
Papers
A New Genetic Algorithm and Its Convergence for Constrained Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 147-150
Papers
A Genetic Algorithm Based on Modularity Density for Detecting Community Structure in Complex NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 151-154
Papers
The Application of Dominant-Recessive Diploid Codes in MOGAFull-text access may be available. Sign in or learn about subscription options.pp. 155-159
Papers
A Multi-objective Genetic Algorithm Approach Based on the Uniform Design MetmodFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
Papers
Improved Electromagnetism-Like Mechanism Algorithm for Constrained Optimization ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 165-169
Papers
A New Multi-objective Differential Evolution AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
Papers
A New Genetic Algorithm with Elliptical Crossover for Constrained Multi-objective Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 174-178
Papers
The Particle Swarm Optimization with Decaying ICMIC for Shortest Path Computation in Computer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 179-183
Papers
A Revised Discrete Particle Swarm Optimization for Cloud Workflow SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 184-188
Papers
A Novel Hybrid Particle Swarm Optimization for Feature Selection and Kernel Optimization in Support Vector RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 189-194
Papers
A Swarm Intelligence Algorithm Based on Boundary MutationFull-text access may be available. Sign in or learn about subscription options.pp. 195-199
Papers
Research on Double Objective Optimization of Master Production Schedule Based on Ant Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 200-204
Papers
Airport Taxi Scheduling Optimization Based on Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 205-208
Papers
A Multi-agent Social Evolutionary Algorithm for Resource-Constrained Project SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 209-213
Papers
Existence of the Solution for General Complementarity ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 214-217
Papers
Prediction Discrete Data Used BP Network Based on AGOFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Papers
Motion Segmentation Using Central Distance Features and Low-Pass FilterFull-text access may be available. Sign in or learn about subscription options.pp. 223-226
Papers
Performance Analysis Based on Transform Matrix of MLE in CICAFull-text access may be available. Sign in or learn about subscription options.pp. 227-229
Papers
Privacy-Preserving Classification on Horizontally Partitioned DataFull-text access may be available. Sign in or learn about subscription options.pp. 230-233
Papers
An Improved Side Information Generation Scheme for Wyner-Ziv Video CodingFull-text access may be available. Sign in or learn about subscription options.pp. 234-237
Papers
A Streamline Placement Method Highlighting Flow Field TopologyFull-text access may be available. Sign in or learn about subscription options.pp. 238-242
Papers
A Real-Time Pineapple Matching System Based on Speeded-Up Robust FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 243-247
Papers
Unsupervised Image Change Detection Based on 2-D Fuzzy EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
Papers
Motion Analysis Based on Spatial-Temporal Visual AttentionFull-text access may be available. Sign in or learn about subscription options.pp. 253-257
Papers
A New Volume Rendering Algorithm of Data FieldFull-text access may be available. Sign in or learn about subscription options.pp. 258-260
Papers
The Research on Multi-viewpoint Navigation Based on Spherical Panoramic ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 261-264
Papers
A Novel Image Classification Method Based on Double Manifold LearningFull-text access may be available. Sign in or learn about subscription options.pp. 265-269
Papers
An Improved DLDA Based Method- Nonparametric DLDAFull-text access may be available. Sign in or learn about subscription options.pp. 270-274
Papers
An Adaptive Feature Extraction Method for Motor-Imagery BCI SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 275-279
Papers
Essence of Two-Dimensional Principal Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 280-282
Papers
Infrared Face Recognition Based on Blood Perfusion and Weighted Block-DCT in Wavelet DomainFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
Papers
DST Feature Based Locality Preserving Projections for Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 288-292
Papers
Efficient Client Puzzle Schemes to Mitigate DoS AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 293-297
Papers
On Trust Degree-Based Usage Control in DRM SystemFull-text access may be available. Sign in or learn about subscription options.pp. 298-301
Papers
A Protocol of Secure Multi-party Multiplication Based on Bilinear PairingFull-text access may be available. Sign in or learn about subscription options.pp. 302-305
Papers
Research on Validity Evaluation of Mandatory Access Control Policy under LSM FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 306-309
Papers
A Scheme for Confidentiality Protection of OpenID Authentication MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 310-314
Papers
Constructions of Maiorana-McFarland's Bent Functions of Prescribed DegreeFull-text access may be available. Sign in or learn about subscription options.pp. 315-319
Papers
Correlation Power Analysis Against Stream Cipher MICKEY v2Full-text access may be available. Sign in or learn about subscription options.pp. 320-324
Papers
Game-Based Analysis and Improvement of a Fair Contract Signing ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 325-328
Papers
Automated Static Code Analysis for Classifying Android Applications Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 329-333
Papers
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 334-338
Papers
Proxy Re-encryption from CLE to CBEFull-text access may be available. Sign in or learn about subscription options.pp. 339-342
Papers
A New Threshold Signature Scheme to Withstand the Conspiracy AttackFull-text access may be available. Sign in or learn about subscription options.pp. 343-346
Papers
Asymmetric Group Key Agreement with Traitor TraceabilityFull-text access may be available. Sign in or learn about subscription options.pp. 347-351
Papers
Convertible Perfect Concurrent Signature ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 352-356
Papers
Tripartite Key Agreement Protocols Based on Digital CertificationFull-text access may be available. Sign in or learn about subscription options.pp. 357-361
Papers
Differential Fault Analysis on PRESENT Key ScheduleFull-text access may be available. Sign in or learn about subscription options.pp. 362-366
Papers
Improved Differential Cryptanalysis of SerpentFull-text access may be available. Sign in or learn about subscription options.pp. 367-371
Papers
A Fully Anonymous Identity-Based Signcryption Scheme in the Standard ModelFull-text access may be available. Sign in or learn about subscription options.pp. 372-376
Papers
New CCA-Secure Proxy Re-encryption Scheme without Random OraclesFull-text access may be available. Sign in or learn about subscription options.pp. 377-381
Papers
Lattice-Based Proxy SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 382-385
Papers
A New Technique of Anti-tampering Technology Based on AVS VideoFull-text access may be available. Sign in or learn about subscription options.pp. 386-389
Papers
Some New Optimal PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
Papers
Non-Adjacent Form Recursive Algorithm on Elliptic Curves CryptographFull-text access may be available. Sign in or learn about subscription options.pp. 394-397
Papers
Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor Image FusionFull-text access may be available. Sign in or learn about subscription options.pp. 398-400
Papers
A Neural Network Clustering Based Algorithm for Privacy Preserving Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 401-405
Papers
Data Hiding in Block Truncation CodingFull-text access may be available. Sign in or learn about subscription options.pp. 406-410
Papers
Continuous Verification Using Keystroke DynamicsFull-text access may be available. Sign in or learn about subscription options.pp. 411-415
Papers
A Naive Feature Selection Method and Its Application in Network Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 416-420
Papers
(2, n) Secret Image Sharing Scheme with Ideal ContrastFull-text access may be available. Sign in or learn about subscription options.pp. 421-424
Showing 100 out of 160