Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICICSE
ICICSE 2015
Generate Citations
2015 Eighth International Conference on Internet Computing for Science and Engineering (ICICSE)
Nov. 6 2015 to Nov. 8 2015
Harbin, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-ix
Preface
Freely available from IEEE.
pp. x-x
Conference Organization
Freely available from IEEE.
pp. xi-xi
Program Committee Members and Reviewers
Freely available from IEEE.
pp. xii-xiii
Keynote Talks
Freely available from IEEE.
pp. xiv-xv
HPC-Enhanced Software Correlator in Chinese VLBI Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Juan Zhang
,
Weimin Zheng
,
Li Tong
,
Lei Liu
A Query Mechanism of Massive Relational Data Cross Regional and Multiple Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-10
by
Jing-Mei Li
,
Qiao Tian
,
Jia-Xiang Wang
,
Jian-Li Li
,
Yu Bai
,
Sen Lin
Design and Research of the Authority Control Based on Creation Role
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-14
by
Jing-Mei Li
,
Qiao Tian
,
Jia-Xiang Wang
,
Zhi-Yuan Chen
,
Chang-Ting Shi
,
Da-Peng Lang
,
Sen Lin
Integrated Information Supporting Systems in Big Data Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-18
by
Zheng-hao Sun
,
Hong-sheng Wang
,
Changming Zhu
,
Qian Wang
,
Yan Yan
Research on Program Execution Time Assessment of LLVM IR Program
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Shuyong Liu
,
Yanxia Wu
,
Tianxiang Sun
,
Guoyin Zhang
A Method for Microblog Search by Adjusting the Language Model with Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Song Li
,
Hui Ning
,
Zhongyuan Han
,
Haoliang Qi
Association Rules for Auditing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Linshan Shen
,
Shaobin Huang
,
Xiangke Mao
,
Junjun Fan
,
Jianghua Li
A Dispatch Method of Complex Information System Based on Service-Oriented Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-38
by
Yan Yan
,
Haierhan
,
Zhang Yao
,
Liu Sijia
The Object Tracking Based on Integral Covariance Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-42
by
Qian Wang
,
Xin Gu
,
Zheng-Hao Sun
,
Zhe Li
,
Jun Ni
Weighted Sub-block Mean-Shift Tracking with Improved Level Set Target Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-49
by
Xingmei Wang
,
Hongbin Dong
,
Yan Chu
,
Xiaowei Wang
,
Lin Li
The Modified HR Calculus to Reproducing Kernel Hilbert Space and the Quaternion Kernel Least Mean Square Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-55
by
Wencui Xu
,
Dongpo Xu
Improved Collaborative Filtering Recommendation via Non-Commonly-Rated Items
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-60
by
Weijie Cheng
,
Guisheng Yin
,
Yuxin Dong
,
Hongbin Dong
,
Wansong Zhang
The Transformation and Optimization in IR2VHDL
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-67
by
Shuyong Liu
,
Yanxia Wu
,
Guoyin Zhang
Cluster Ensemble Based Image Segmentation Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Lei Wang
,
Guoyin Zhang
The Improved Variable Length Counting Bloom Filter Based on Buffer
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-78
by
Shichang Xuan
,
Dapeng Man
,
Wei Wang
,
Wu Yang
Review of Analytical Modeling and Computational Solutions for Thermo-electrostatics Effects of Slender Bodies
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-82
by
Hongsheng Wang
,
Zhenghao Sun
,
Chongdao Wang
,
Qun Hao
,
Jun Ni
A New Rapid Acquisition and Tracking Technique for High-Dynamic Spread Spectrum Signals
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Zhe Li
,
Xiao Li
,
Hua Wang
,
Qian Wang
Occluded Face Detection Based on Adaboost Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Hua Wang
,
Xin Gu
,
Xiao Li
,
Zhe Li
,
Jun Ni
Research on Domain-Oriented Latent Policy Lineage Mining Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-97
by
Gang Liu
,
Wray Buntine
,
Xiaoxiao Yang
,
Weiping Fu
SIFT Vector Field Building Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-105
by
Jing Shen
,
Haibo Liu
,
Yanxia Wu
,
Xingmei Wang
System Dependency Graph Construction Algorithm Based on Equivalent Substitution
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-110
by
Yulong Meng
,
Dong Xu
,
Ziying Zhang
,
Wencai Li
A Review of Uncertain Data Stream Clustering Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-116
by
Yue Yang
,
Zhuo Liu
,
Zhidan Xing
Hull Section Cluster Analysis Based on Principle of Similitude
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-122
by
Qingtao Gong
,
Mei Meng
,
Hongtao Song
Lean Production-Based Ship-Hull Section Assignments Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-129
by
Qingtao Gong
,
Mei Meng
,
Zhigang Li
ISAR Imaging Based on SVA and Time Frequency Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-134
by
Zhiting Fei
Analysis of a Liquid Rocket Combustion Chamber Cooling
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-138
by
Yiteng Wang
Teaching-Learning-Based Differential Evolution Algorithm for Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
Changming Zhu
,
Yan Yan
,
Haierhan
,
Jun Ni
A Volume-Averaged Mathematical Model for Biotransport Part I Macro-Micro Conservations in Tissue Transports
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-152
by
Jun Ni
A Volume-Averaged Mathematical Model for Biotransport Part II Macroscopic Fluxes and Interfacial Transfers
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-158
by
Jun Ni
SoSE Architecture of Data Intensive Computing for Healthcare Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-167
by
Jun Ni
,
Ying Chen
,
Jie Sha
,
Minghuan Zhang
The Research of Software Behavior Recognition and Trend Prediction Method Based on GA-HMM
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-171
by
Ziying Zhang
,
Dong Xu
,
Yulong Meng
,
Xin Liu
Anatomy of Functional Components of Healthcare Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-180
by
Jun Ni
,
Ying Chen
,
Jie Sha
,
Minghuan Zhang
Migration from HPC-Based Data Processing Systems to Cloud-Computing Based Data Mining Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-187
by
Jun Ni
,
Ying Chen
,
Jie Sha
,
Minghuan Zhang
Hadoop-Based Distributed Computing Algorithms for Healthcare and Clinic Data Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Jun Ni
,
Ying Chen
,
Jie Sha
,
Minghuan Zhang
Assessment of Node Reputation in MP2P Based on Fuzzy Comprehensive Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-198
by
Meijuan Jia
,
Huiqiang Wang
,
Junyu Lin
,
Guangsheng Feng
Research and Design for USB and Network Cards Encryption Interface Card
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-201
by
Zhijiang Liu
,
Yanxia Wu
,
Fanyin Meng
A QoS Aware Routing for Intermittently Connected Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-207
by
Qingfeng Jiang
,
Chaoguang Men
,
Baishun Zhang
,
Shuang Fu
A Fuzzy Ranking Based Buffer Replacement Strategy for Opportunistic Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-212
by
Yushu Zhang
,
Huiqiang Wang
,
Guangsheng Feng
,
Hongwu Lv
Research on Communities Detection in Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Hongbin Wang
,
Guisheng Yin
,
Yue Fu
,
Lu Wang
,
Wenqian Xu
A Web Security Data Detection Based on Group Scanning
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Shichang Xuan
,
Dapeng Man
,
Wei Wang
,
Wu Yang
A Method of Social Network Node Preference Evaluation Based on the Topology Potential
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-230
by
Yong Wang
,
Jing Yang
,
Jianpei Zhang
,
Jianchuan Zhang
,
Hongtao Song
,
Zhigang Li
A Business-Data-Oriented Workflow Mining Algorithm and Its Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
by
Yong Wang
,
Jianchuan Zhang
,
Jiahe Cui
,
Hongtao Song
,
Zhigang Li
An Improved Strategy to Eliminate Redundant Compilation Based on Dalvik JIT
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-240
by
Wenxiang Lu
,
Yanzhang Wang
,
Yanxia Wu
,
Guoyin Zhang
Design of Mobile Micro-English Vocabulary System Based on the Ebbinghaus Forgetting Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Weiyong Zheng
Development of E-Commerce Curriculum with Educational Cooperation between Schools and SMEs
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Qun Chen
,
Jun Ni
Evolution of Big-Data-Enhanced Higher Education Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Shaoying Li
,
Jun Ni
Mismatches in the Integration of Multimedia Technology into College English Teaching
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-261
by
Guohua Li
An Integration of Etymology with Vocabulary Teaching
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-268
by
Guohua Li
A Teaching Model of Flipped Classroom Based on MOOC
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-272
by
Min Song
,
Ying Song
,
Zhengxian Wei
A Measurement of Text Emotion Complexity in Micro-blog
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Lixiao Zhang
,
Jun Ni
,
Xinzhi Wang
Design and Research of Teaching Resources Management Based on SSH and AJAX
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-285
by
Yu-Ping Jin
,
Yanzuo Liu
,
Guangtao Song
Author Index
Freely available from IEEE.
pp. 286-287
Publisher's Information
Freely available from IEEE.
pp. 288-288
Showing 61 out of 61