Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IPTC
IPTC 2011
Generate Citations
Intelligence Information Processing and Trusted Computing, International Symposium on
Oct. 22 2011 to Oct. 23 2011
Wuhan, China
ISBN: 978-0-7695-4498-4
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Copyright Page
Freely available from IEEE.
pp. iv
Papers
Table of Contents
Freely available from IEEE.
pp. v-ix
Papers
Greetings from the General Chairs
Freely available from IEEE.
pp. x
Papers
Organizing Committee
Freely available from IEEE.
pp. xi
Papers
Reviewers
Freely available from IEEE.
pp. xii
Papers
A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Xiong Liu
,
Haiwei Xue
,
Yiqi Dai
Papers
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-8
by
Yi Sun
,
Hongxiang Sun
,
Qiaoyan Wen
,
Hua Zhang
Papers
Model Update Particle Filter for Multiple Objects Detection and Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-12
by
Yun Ji Zhao
,
Hai Long Pei
Papers
Design and Analysis on Direct Anonymous Attestation for Security Chip
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Yu Qin
,
QiuXin Wu
,
XiaoBo Chu
Papers
Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-23
by
Songzhu Mei
,
Jiangjiang Wu
,
Yong Cheng
,
Jun Ma
,
Jiangchun Ren
,
Xiaoxing Li
Papers
Efficient Power Saving Adaptive Routing Protocol (EPSAR) for MANETs Using AODV and DSDV: Simulation and Feasibility Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-26
by
Ajay Jangra
,
Nitin Goel
,
Priyanka
Papers
A Comprehensive Prediction Method of Visit Priority for Focused Crawler
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-30
by
Xueming Li
,
Minling Xing
,
Jiapei Zhang
Papers
A Cooperative Relay Method and Performance for Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-34
by
Yun Li
,
Shufang Song
,
Mahmoud Daneshmand
,
Weina Duan
Papers
Formal Specification for Byzantine Fault Tolerant Algorithm Suiting Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-38
by
Wei Zhou
,
Liu Chen
Papers
An Active Data Leakage Prevention Model for Insider Threat
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-42
by
Jiangjiang Wu
,
Jie Zhou
,
Jun Ma
,
Songzhu Mei
,
Jiangchun Ren
Papers
Multi-feature Method: An Integrated Content Based Image Retrieval System
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-46
by
Chen Liu
,
Zhou Wei
Papers
Integrated Visual Saliency Based Local Feature Selection for Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-50
by
Han-ping Gao
,
Zu-qiao Yang
Papers
A Parallel Gaussian Filtering Algorithm Based on Color Difference
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-54
by
YuHong Ma
,
Kai Xie
,
MinFang Peng
Papers
Trust Based Secure Localization in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-58
by
Ting Zhang
,
Jingsha He
,
Yang Zhang
Papers
The Shapes of Halftone-AM-Dots Based on Information Hiding
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Xumei Yi
,
Cao Peng
Papers
A High Speed Parallel Timing Recovery Algorithm and Its FPGA Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-66
by
Changxing Lin
,
Jian Zhang
,
Beibei Shao
Papers
A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and Quantization
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-70
by
Jia Xu
,
Liupeng Feng
Papers
A Deconvolution Approach of 2D Data Statistical
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-74
by
Xiang-e Sun
,
Yun Ling
,
Jun Gao
Papers
Research of Electronic Equipment Fault Diagnosis Algorithm Based on RBF Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Lei Yuan
,
Heming Zhao
Papers
An Optimization for CAVLC Code Table Lookup Algorithm in H. 264 Decoder
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-82
by
Da Lu
,
Guofan Liu
,
Lingli Zhu
Papers
Research on Genetic Algorithm Based on Pyramid Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Peng Yong
,
Dong Chongjie
,
Zheng Huijun
Papers
An Improved Bayesian Algorithm for Filtering Spam E-Mail
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Hu Yin
,
Zhang Chaoyang
Papers
A Comprehensive Trust Model with Multi-participant Viewpoints in Online Auctions
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-95
by
Wenjia Wang
,
Dingwei Wang
Papers
Multitemporal Images Change Detection Using Nonsubsampled Contourlet Transform and Kernel Fuzzy C-Means Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-99
by
Chao Wu
,
Yiquan Wu
Papers
Some Remarks on Convergence in Credibility Measure and Convergence in Credibility Distribution of Fuzzy Variable
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-103
by
Sheng Ma
Papers
The Design and Implementation of C-like Language Interpreter
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-107
by
Xiaohong Xiao
,
You Xu
Papers
Machine Learning Methods and Their Application Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-110
by
Haoyong Lv
,
Hengyao Tang
Papers
A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-114
by
Peng Zheng
,
Weihua Wang
,
Juan Wang
Papers
Some Remarks on Charactertics Function and Density Function of Uncertain Variable
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-118
by
Qin Jiang
Papers
Intelligent High-Voltage Discharge Fault Detection and Its Diagnosis Methods Based on ANN
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-122
by
Ru-jun Xu
,
Li-xin Ma
,
Bo Hu
,
He-ran Ma
,
Bo-hao Tao
Papers
The Color Components' Exchanging on Different Color Spaces and the Using for Image Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-126
by
Xi Li
,
Hang Dai
Papers
Study on Approach to Improve the Quality of Veterinary Medicine Graduates by Strengthen Practical Skills
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-130
by
Zhang Haitang
,
Jiang Jinqing
,
Wang Ziliang
,
Chen Jinshan
,
Cui Yanhong
Papers
Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-134
by
Xueming Li
,
Jiapei Zhang
,
Minling Xing
Papers
The Research on Anisotropic Parameter Estimation for Vertical Transerse Isotropy: Based on 3D VSP, Walkaway VSP and Full Azimuth Seismic Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-138
by
Xiang-e Sun
,
Yun Ling
,
Jun Gao
Papers
A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
HongYun Cai
,
Zhen Li
,
JunFeng Tian
Papers
An Improved Multi-objective Population Migration Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-146
by
Qian Zhao
,
Xueying Liu
Papers
A New Population Migration Algorithm Based on the Chaos Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-150
by
Yuwu Lu
,
Xueying Liu
Papers
Study on QoS Protection Mechanism of VoIP Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-153
by
Chunxia Tu
Papers
The Application of MapReduce in the Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-156
by
Gaizhen Yang
Papers
Research and Implementation of Packet Classification Based on NDIS Intermediate Layer under Windows Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-160
by
Yin Hu
,
Pei Lin
Papers
Optimization of Masking Expansion Algorithm in Psychoacoustic Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-164
by
Liu Hong-fu
,
Zhang Cong
,
Liang Rui-fan
Papers
Secure Digital Library Technology Research Based on VPN
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-168
by
Kuobin Dai
Papers
VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTM
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-172
by
Wang Xin-zhi
,
Sun Le-chang
,
Liu Jing-ju
,
Li Qiang
Papers
An Analytic Network Process Model of Trust in B2C E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-176
by
Juan He
Papers
Study on Histogram Equalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-179
by
Wu Zhihong
,
Xiao Xiaohong
Papers
Numerical Simulation and Analysis of Cavitation Characteristics of Ship Propeller
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-183
by
Xun Pan
,
Jing-yuan Zhang
,
Cheng-jiang Liu
Papers
The Chaotic Cipher Based on CNNs and Its Application in Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-187
by
Ju Lei
,
Zhang Lei
Papers
A Network Construction Solution in Colleges or Universities
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-191
by
Kailiang Liang
Papers
Research on Thin AP Architecture to Deploy Campus WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-195
by
Kailiang Liang
Papers
A Survey of Computer Graphics and Graphics Image Processing Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-198
by
Haoyong Lv
,
Zhihong Wu
Papers
IPv4 to IPv6 Transition Research Based on the Campus Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-202
by
Kuobin Dai
Papers
Research of SCM System Based on the Internet of Things on EPC
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-205
by
Ying Xue
Papers
Robust Control of One Arm Space Manipulator with Parameters Uncertainties Compensated
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Guangyan Xu
,
Meng Zhang
Papers
Research of Circular-Like Satellite Formation Flying at Critical Inclination
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-213
by
Guangyan Xu
,
Huanqiang Wang
Papers
A New Method for Impossible Differential Cryptanalysis of 8-Round AES-128
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-217
by
He Zhonglin
,
Hu Zhihua
Papers
Exploration and Example for Mathematical Application Issues in U.S. Mathematics Textbooks
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Shao Gui-ming
,
Xiong Chaofan
Papers
The EEG Signal Process Based on EEMD
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Zhu Xiao-jun
,
Lv Shi-qin
,
Liu-juan Fan
,
Xue-li Yu
Papers
Teaching and Research of Cryptography in Information and Computer Science
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-230
by
Kuobin Dai
Papers
Network Security Mechanisms Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-234
by
Kuobin Dai
Papers
Applied Study on Information Technology and College English Teaching Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-237
by
Jinfeng Wang
Papers
An Improved Binary Image Watermarking Algorithm Based on Singular Value Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
Zhang Chao-yang
Papers
An Improved Computer Notary System Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-244
by
Zhang Chao-yang
Papers
Research and Application of the Stronger Security Dual Signature
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-247
by
Zhang Chao-yang
,
Wei Chao
Papers
A New Method for Impossible Differential Cryptanalysis of 7-Round AES-192
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-251
by
Zhihua Hu
,
Zhonglin He
Papers
Author Index
Freely available from IEEE.
pp. 252-253
Papers
Publisher's Information
Freely available from IEEE.
pp. 254
Showing 73 out of 73