Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CMC
CMC 2010
Generate Citations
Communications and Mobile Computing, International Conference on
Apr. 12 2010 to Apr. 14 2010
Shenzhen, China
ISBN: 978-0-7695-3989-8
Volume:
1
2
3
Table of Contents
Papers
Title Page i - Volume 1
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 1
Freely available from IEEE.
pp. iii
Papers
[Copyright notice - Volume 1]
Freely available from IEEE.
pp. iv
Papers
Table of contents - Volume 1
Freely available from IEEE.
pp. v-xiii
Papers
Preface - Volume 1
Freely available from IEEE.
pp. xiv
Papers
Conference Committee - Volume 1
Freely available from IEEE.
pp. xv
Papers
Technical Program Committee - Volume 1
Freely available from IEEE.
pp. xvi-xx
Papers
list-reviewer
Freely available from IEEE.
pp. xxi-xxii
Papers
Rapid Human-Eye Detection Based on an Integrated Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-7
by
Liu Xia
,
Dong Yongqing
,
Li Su
,
Huang Chao
Papers
TFS: A Novel File System for Mobile Multimedia System
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-12
by
Jun Lu
,
Jian Huang
,
Xi Yue
,
Ly Ren
,
Ms Hou
Papers
A Self-Synchronized Image Hash Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-15
by
Di Wu
,
Xiamu Niu
Papers
An Image Encryption Algorithm Based on Alternating Subsection-Disordered Diploid Chaotic Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-20
by
Yifang Li
,
Yanfeng Chen
,
Fen Miao
Papers
An Ordered Multisignature without Random Oracles
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-25
by
Wei-hua Hou
Papers
Efficient Round-Optimal Secure Two-Party Computation from Sigma-protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-30
by
Yonglong Tang
,
Chunming Tang
Information-Disturbance Tradeoff of Individual Attack Against BBM92 Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-34
by
Chun Zhou
,
Wansu Bao
,
Xiangqun Fu
Papers
New Signcryption from q-Diffie-Hellman Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Chao Wang
,
Yunpeng Han
,
Fagen Li
Papers
Perfect Zero-Knowledge Argument of Knowledge with Negligible Error Probability in Two-Round for NP from Any One-Way Permutation
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-45
by
Chunming Tang
,
Zhifeng Hao
Papers
Research on Pairing-Based Batch Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-50
by
Xin Qin
,
Shaowu Zhang
,
Lixin Jia
Papers
Yet Another Efficient and Provably-Secure Certificateless Public Key Signature Scheme without Pairing
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-55
by
Liangliang Wang
,
Mingxing He
,
Yanyan Zhang
Papers
A Multiple Hierarchies RBAC Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-60
by
Yan Xuexiong
,
Wang Qinxian
,
Xu Changzheng
Papers
An S-box Construction Algorithm Based on Spatiotemporal Chaos
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-65
by
Hao Yuan
,
Longyan Luo
,
Yong Wang
Colour Image Watermarking Algorithm Based on the Arnold Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-69
by
Hui-qin Wang
,
Ji-chao Hao
,
Fu-ming Cui
Papers
HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-75
by
Jie Yang
,
Xin Chen
,
Xudong Xiang
,
Jianxiong Wan
Papers
Multi-agent Based Distributed Secure Information Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-79
by
Lixin Zhou
Papers
Privacy Preserving Density-Based Outlier Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Zaisheng Dai
,
Liusheng Huang
,
Youwen Zhu
,
Wei Yang
Papers
UTM-CM: A Practical Control Mechanism Solution for UTM System
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-90
by
Ying Zhang
,
Fachao Deng
,
Zhen Chen
,
Yibo Xue
,
Chuang Lin
Papers
A DoS Attack Effect Evaluation Method Based on Multi-source Data Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-96
by
Li-juan Zhang
,
Yan Cao
,
Qing-xian Wang
Papers
A Model Based on Hybrid Support Vector Machine and Self-Organizing Map for Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-101
by
Fei Wang
,
Yuwen Qian
,
Yuewei Dai
,
Zhiquan Wang
Papers
Application Sandbox Model Based on System Call Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-106
by
Zhen Li
,
Hongyun Cai
,
Junfeng Tian
,
Wu Chen
Papers
Attribute Reduction Method Applied to IDS
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-110
by
Xiang Cheng
,
Bing-Xiang Liu
,
Yi-Lai Zhang
Papers
Detecting Software Keyloggers with Dendritic Cell Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-115
by
Jun Fu
,
Yiwen Liang
,
Chengyu Tan
,
Xiaofei Xiong
Papers
Research on Packet Tagging Using the Attributes of Data Stream
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-120
by
Sun Dakang
,
Yan Danfeng
,
Yang Fangchun
Papers
A Man-in-the-Middle Attack on 3G-WLAN Interworking
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-125
by
Lizhuo Zhang
,
Weijia Jia
,
Sheng Wen
,
Di Yao
Papers
A New Design of Low Cost Security Coprocessor for Portable Electronic Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-131
by
Chao Li
,
Yuan Jiang
,
Dan Su
,
Yongjun Xu
,
Zuying Luo
Papers
A New Method to Discriminate Wireless Location under Noisy Circumstance
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-136
by
Jing Guo
,
Yue Wang
,
Jian Yuan
,
Xiuming Shan
,
Yong Ren
Papers
A Personalized Location Privacy Protection Solution in Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-141
by
Qiuyan Zou
,
Juanjuan Zhao
Papers
A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-146
by
Shanshan Chen
,
Geng Yang
,
Shengshou Chen
Papers
An Attack Based IMS Vulnerability Validate Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-151
by
Yu Shun
,
Shuang Kai
,
Yang Fang Chun
Papers
APUC: A Novel Authentication Protocol for Ubiquitous Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-156
by
Fan Yang
,
Long-zhang Liu
,
Dao-qing Sun
Papers
Initial Distribution of Group Keys for Confidential Group Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-161
by
Qian Wei
,
Jingsha He
,
Xing Zhang
Papers
Security in Underwater Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-168
by
Yanping Cong
,
Guang Yang
,
Zhiqiang Wei
,
Wei Zhou
Papers
A Dynamic Replica Placement Mechanism Based on Response Time Measure
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-173
by
Wenfeng Wang
,
Wenhong Wei
Papers
Analysis on the Potential of Creating Low-Carbon Society in China
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-178
by
Hailin Mu
,
Xudong Kang
,
Peng Wang
,
Wei Wu
Papers
Design of Communication System for Deep Sea Remote Robotically Controlled Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-182
by
Xueting Zhang
,
Haibin Yu
,
Wenyu Cai
,
Ying Chen
Papers
GSSK: A Generalization Step Safe Algorithm in Anonymizing Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-187
by
Pin Lv
,
Wen-bing Yu
,
Nian-sheng Chen
Papers
Node Importance Evaluation Based on Network Heterogeneity
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-194
by
Zhou Jian
,
Pan Jiaxin
,
Zhou Yanran
Papers
Optimal Power Flow Optimization Based on Bio-inspired Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-199
by
Jinyin Chen
,
Dongyong Yang
Papers
Study on Steering Actuator Transfer Function of Picking Mobile Robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-204
by
Zhiyong Zhang
,
Dongjian He
,
Tien-Fu Lu
,
Sani Hashim
Papers
A New SDVS Based on NTRUSign
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-207
by
Xiang Wang
Papers
A N-party Diffie-Hellman Key Exchange Protocol Based on Verifier
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-212
by
Liu Xiumei
,
Gao Kening
,
Zhou Fucai
,
Chang Guiran
Papers
Distributed Oblivious Transfer with Adaptive Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Shuxian Jiang
,
Hongda Li
,
Bao Li
Papers
MailTrust: A Mail Reputation Mechanism Based on Improved TrustGuard
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Zhang Jianzhong
,
Xu Wei
,
Peng Yudi
,
Xu Jingdong
Papers
Trusted Channels with Password-Based Authentication and TPM-Based Attestation
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Lingli Zhou
,
Zhenfeng Zhang
Papers
Unlinkable Multi-party Concurrent Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-232
by
Xiao Tan
,
Yi-ming Zhao
Papers
Research of Two-stage Consumers' Trust Model Based on B2C E-business
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-236
by
Chen Xiang
,
Jiao Pingping
Papers
Text Mining and the Future Exploration
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-241
by
Cao Lijun
,
Cui Yong
,
Yang Yanping
,
Liu Xiyin
Papers
Design and Implementation of Reconfigurable Discrete Hilbert Transform Based on Systolic-Arrays
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-249
by
Li Liu
,
Yan Zhang
Papers
Design of a Remote Distributed Control System Based on GRPS and Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-252
by
Leina Shi
,
Na Li
,
Mingji Zhou
,
Miaomiao Wang
,
Ning Zhang
Papers
Dynamic Dispatching Tasks Management for H.264 Encoder on Heterogeneous Dual-Core Embedded System
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-257
by
Chia-Ying Tseng
,
Yen-Lin Chen
Papers
Embedded System Memory Management Mechanism Based on uC / OS-II
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-262
by
Wang Xibo
,
Li Nan
Papers
Energy- and Latency-Aware NoC Mapping Based on Chaos Discrete Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-268
by
Wang Lei
,
Ling Xiang
Papers
Mobile Cartography Base on Cache of CGML
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-273
by
Aiguo Zhang
,
Qunyong Wu
,
Ling Zha
,
Panpan Zhang
Papers
Research on Automatic Testing Technology Oriented Intelligent Mobile Terminal Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-278
by
Yongfeng Yin
,
Bin Liu
,
Chen Wang
,
Hongying Ni
Papers
Research on Interconnection and Correspondence Between Relational Database and Embedded Database SQLite
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-283
by
Yang Xu
,
Hai-Yang Li
Papers
The Cascade Decision-Tree Improvement Algorithm Based on Unbalanced Data Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-288
by
Wang Yi
Papers
A Cloud-Based Recommendatory Trust Processing Method for Trust Management System of Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-293
by
Kai Wei
,
Shaohua Tang
Papers
A Parallel Reconstruction Algorithm for Spiral Cone-Beam Transmission CT
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-298
by
Guowei Xue
,
Yan Zhang
Papers
Analysis of Computing Resource Allocation for Replicated Processes in P2P-MPI
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-303
by
Qiuming Luo
,
Panpan Zhang
,
Wentao Dong
Papers
Building Locality-Aware P2P Topology Formation Protocol for Heterogeneous Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-308
by
Laizhong Cui
,
Zongying Zhang
,
Yong Jiang
,
Jianping Wu
Papers
Enhanced Context Searching Based on Structured P2P
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-313
by
Wasin Thiengkunakrit
,
Sinchai Kamolphiwong
,
Thossaporn Kamolphiwong
,
Suthon Sae-wong
Papers
Image Semantic Classification Based on Integration of Feature Subspaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-318
by
Ping Fu
,
Mianshu Chen
,
Yuan Sun
,
Chen Shen
Papers
OSDN: A Novel Platform for Service Distribution through Overlay Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-323
by
Xiao Chen
,
Nianzu Liu
,
Weinong Wang
Papers
Research on the Mesh-Based P2P Streaming Network Scale
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-329
by
Hui Peng
,
Kai Shuang
,
XiaoYong Han
,
XiuQin Lin
Papers
RouteGuard: A Trust-Based Scheme for Guarding Routing in Structured Peer-to-Peer Overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-334
by
Guowei Huang
,
Jiangang Chen
,
Lian Wei
Papers
A Method of Representing Videos Based on User Interest Model in Mobile Multimedia Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-339
by
Xiang Li
,
Yang Deng
,
Wendong Wang
,
Zou Yanming
,
Wang Kongqiao
Papers
Design Framework and Architecture of Unified Presence Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-344
by
Peeraphong Boonlert
,
Suthon Sae-Wong
,
Thossapon Kamolphiwong
,
Sinchai Kamolphiwong
Papers
Study of Multi-connection Mechanism in IMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-349
by
Deng Dunwang
,
Li Xia
,
Zou Hua
Papers
The Decision-Making Problem of SCTP Optimal Path Based on Cognitive Optimization with Multi-parameter
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
Yan-Fei Sun
,
Nan Sun
,
Zai-Long Zhang
,
Jin Qi
,
Yun-Feng Yang
Papers
An Improved Blind Bandwidth Extension Method for Audio Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-360
by
Hui Liu
,
Shenghui Zhao
,
Jing Wang
,
Jingming Kuang
Papers
Self-Adaptive Control of Video Transmission Based on Available Bandwidth Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-364
by
Hongcai Feng
,
Cao Yuan
,
Yaqin Li
Papers
A Reliable Backbone-Based Location Management Scheme for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-369
by
Demin Li
,
Chenwen Wang
,
Jianan Fang
,
Jie Zhou
,
Jiacun Wang
Papers
An Intelligent Call Center Platform for Mobile Communication Enterprises
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-375
by
Weimin Wang
,
Liangliang Liu
,
Dongsheng Wang
,
Yanan Cao
,
Yuming Wu
,
Baoyuan Qi
,
Dongchun Qiao
,
Jingyang Guo
,
Yufei Zheng
,
Cungen Cao
,
Li Jianghua
,
Shi Yuan
,
Li Ruilin
,
Sang Changqin
,
Shen Nan
Papers
An Online Kannada Text Transliteration System for Mobile Phones
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-381
by
R. Aravindhan
,
G.N. Rathna
,
Vipin Gupta
Papers
Modeling the Order Relations of Events in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-386
by
Dan Wu
,
Man Hon Wong
Papers
Post-Processing of Automatic Text Summarization for Domain-Specific Documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-391
by
Zengmin Geng
,
Jujian Zhang
,
Xuefei Li
,
Jianxia Du
,
Zhengdong Liu
Papers
SensorWorld: Unified Touch-Based Access to Sensors Worldwide
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-396
by
Hanjun Xian
,
Krishna Madhavan
Papers
A Simulation Study of Dynamic Route Guidance Based on Inter-Vehicle Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-403
by
Yizhi Wang
,
Jianming Hu
,
Qi Wang
Papers
Homotopy Analysis Method of Internet Congestion Control Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-407
by
Yuliang Liu
,
Jinshu Lu
,
Hua Zhang
,
Lin Li
Papers
Multi-algorithm Hybrid Location Model Based on Data Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-412
by
Xiaowei Hui
,
Qifei Yan
Papers
PAM: Precise Receive Buffer Assignment Method in Transport Protocol for Concurrent Multipath Transfer
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-417
by
Wang Yang
,
Hewu Li
,
Jianping Wu
Papers
Performance Analysis of Cluster-Based and Tree-Based Routing Protocols for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-422
by
Zusheng Zhang
,
Fengqi Yu
Papers
Radio Transmitter Fingerprint Identification Using a Novel Method of Weighted Multi-feature Joint Detection Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-427
by
Qijun Wu
,
Bingbing Li
Papers
Study on a Sea Radio-Wave Propagation Loss Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-431
by
Mingyi Zhu
,
Xiangyang Zhao
,
Yu Zhang
Papers
A Data Dissemination Policy by Using Human Mobility Patterns for Delay-Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-436
by
Hui Ye
,
ZhiGang Chen
,
ZuoQun Xia
,
Ming Zhao
Papers
An Open Architecture for Detecting Earthquakes Using Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-441
by
John P.T. Moore
,
Thomas Collins
,
Sujan Shrestha
Papers
Open Urban Testbed for Ubiquitous Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Timo Ojala
Papers
pH Levels Classification by Color Quantization on a Camera Phone
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-452
by
Nhu Khue Vuong
,
Syin Chan
,
Chiew Tong Lau
Papers
A Fuzzy Packet Loss Differentiation Algorithm Based on Ack-Timeout Times Ratio in Heterogeneous Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-457
by
Zhen Yanxiang
,
Su Fang
,
Kou Mingyan
Papers
An Improvement of the Route Discovery Process in AODV for Ad Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 458-461
by
Yongjun Hu
,
Tao Luo
,
Junliang Shen
Papers
Formal Modeling and Analysis of HMIPv6 Using Colored Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-466
by
Tao Sun
,
Xinming Ye
,
Jing Liu
,
Meng Yang
Showing 100 out of 123
Load More
Load All