Default Cover Image

2015 Eighth International Conference on Internet Computing for Science and Engineering (ICICSE)

Nov. 6 2015 to Nov. 8 2015

Harbin, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-ix
PrefaceFreely available from IEEE.pp. x-x
Conference OrganizationFreely available from IEEE.pp. xi-xi
Program Committee Members and ReviewersFreely available from IEEE.pp. xii-xiii
Keynote TalksFreely available from IEEE.pp. xiv-xv
HPC-Enhanced Software Correlator in Chinese VLBI NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A Query Mechanism of Massive Relational Data Cross Regional and Multiple Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 5-10
Design and Research of the Authority Control Based on Creation RoleFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Integrated Information Supporting Systems in Big Data ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 15-18
Research on Program Execution Time Assessment of LLVM IR ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
A Method for Microblog Search by Adjusting the Language Model with TimeFull-text access may be available. Sign in or learn about subscription options.pp. 25-28
Association Rules for Auditing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
A Dispatch Method of Complex Information System Based on Service-Oriented ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 35-38
The Object Tracking Based on Integral Covariance MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 39-42
Weighted Sub-block Mean-Shift Tracking with Improved Level Set Target ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 43-49
The Modified HR Calculus to Reproducing Kernel Hilbert Space and the Quaternion Kernel Least Mean Square AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 50-55
Improved Collaborative Filtering Recommendation via Non-Commonly-Rated ItemsFull-text access may be available. Sign in or learn about subscription options.pp. 56-60
The Transformation and Optimization in IR2VHDLFull-text access may be available. Sign in or learn about subscription options.pp. 61-67
Cluster Ensemble Based Image Segmentation AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
The Improved Variable Length Counting Bloom Filter Based on BufferFull-text access may be available. Sign in or learn about subscription options.pp. 74-78
A New Rapid Acquisition and Tracking Technique for High-Dynamic Spread Spectrum SignalsFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Occluded Face Detection Based on Adaboost TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
Research on Domain-Oriented Latent Policy Lineage Mining MethodFull-text access may be available. Sign in or learn about subscription options.pp. 91-97
SIFT Vector Field Building AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
System Dependency Graph Construction Algorithm Based on Equivalent SubstitutionFull-text access may be available. Sign in or learn about subscription options.pp. 106-110
A Review of Uncertain Data Stream Clustering AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
Hull Section Cluster Analysis Based on Principle of SimilitudeFull-text access may be available. Sign in or learn about subscription options.pp. 117-122
Lean Production-Based Ship-Hull Section Assignments DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 123-129
ISAR Imaging Based on SVA and Time Frequency AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 130-134
Analysis of a Liquid Rocket Combustion Chamber CoolingFull-text access may be available. Sign in or learn about subscription options.pp. 135-138
Teaching-Learning-Based Differential Evolution Algorithm for Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
A Volume-Averaged Mathematical Model for Biotransport Part I Macro-Micro Conservations in Tissue TransportsFull-text access may be available. Sign in or learn about subscription options.pp. 143-152
A Volume-Averaged Mathematical Model for Biotransport Part II Macroscopic Fluxes and Interfacial TransfersFull-text access may be available. Sign in or learn about subscription options.pp. 153-158
SoSE Architecture of Data Intensive Computing for Healthcare Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 159-167
The Research of Software Behavior Recognition and Trend Prediction Method Based on GA-HMMFull-text access may be available. Sign in or learn about subscription options.pp. 168-171
Anatomy of Functional Components of Healthcare Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 172-180
Migration from HPC-Based Data Processing Systems to Cloud-Computing Based Data Mining SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 181-187
Hadoop-Based Distributed Computing Algorithms for Healthcare and Clinic Data ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 188-193
Assessment of Node Reputation in MP2P Based on Fuzzy Comprehensive EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 194-198
Research and Design for USB and Network Cards Encryption Interface CardFull-text access may be available. Sign in or learn about subscription options.pp. 199-201
A QoS Aware Routing for Intermittently Connected Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
A Fuzzy Ranking Based Buffer Replacement Strategy for Opportunistic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 208-212
Research on Communities Detection in Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
A Web Security Data Detection Based on Group ScanningFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
A Method of Social Network Node Preference Evaluation Based on the Topology PotentialFull-text access may be available. Sign in or learn about subscription options.pp. 223-230
A Business-Data-Oriented Workflow Mining Algorithm and Its ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 231-236
An Improved Strategy to Eliminate Redundant Compilation Based on Dalvik JITFull-text access may be available. Sign in or learn about subscription options.pp. 237-240
Design of Mobile Micro-English Vocabulary System Based on the Ebbinghaus Forgetting TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
Development of E-Commerce Curriculum with Educational Cooperation between Schools and SMEsFull-text access may be available. Sign in or learn about subscription options.pp. 247-252
Evolution of Big-Data-Enhanced Higher Education SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
Mismatches in the Integration of Multimedia Technology into College English TeachingFull-text access may be available. Sign in or learn about subscription options.pp. 259-261
An Integration of Etymology with Vocabulary TeachingFull-text access may be available. Sign in or learn about subscription options.pp. 262-268
A Teaching Model of Flipped Classroom Based on MOOCFull-text access may be available. Sign in or learn about subscription options.pp. 269-272
A Measurement of Text Emotion Complexity in Micro-blogFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Design and Research of Teaching Resources Management Based on SSH and AJAXFull-text access may be available. Sign in or learn about subscription options.pp. 279-285
Author IndexFreely available from IEEE.pp. 286-287
Publisher's InformationFreely available from IEEE.pp. 288-288
Showing 61 out of 61