Default Cover Image

Intelligence Information Processing and Trusted Computing, International Symposium on

Oct. 22 2011 to Oct. 23 2011

Wuhan, China

ISBN: 978-0-7695-4498-4

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Table of ContentsFreely available from IEEE.pp. v-ix
Papers
Greetings from the General ChairsFreely available from IEEE.pp. x
Papers
Organizing CommitteeFreely available from IEEE.pp. xi
Papers
ReviewersFreely available from IEEE.pp. xii
Papers
A Self Adaptive Jamming Strategy to Restrict Covert Timing ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
A Deterministic Protocol for Rational Secret Sharing in Asynchronous ModelFull-text access may be available. Sign in or learn about subscription options.pp. 5-8
Papers
Model Update Particle Filter for Multiple Objects Detection and TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 9-12
Papers
Design and Analysis on Direct Anonymous Attestation for Security ChipFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Papers
Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 19-23
Papers
Efficient Power Saving Adaptive Routing Protocol (EPSAR) for MANETs Using AODV and DSDV: Simulation and Feasibility AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 24-26
Papers
A Comprehensive Prediction Method of Visit Priority for Focused CrawlerFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
Papers
A Cooperative Relay Method and Performance for Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 31-34
Papers
Formal Specification for Byzantine Fault Tolerant Algorithm Suiting Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 35-38
Papers
An Active Data Leakage Prevention Model for Insider ThreatFull-text access may be available. Sign in or learn about subscription options.pp. 39-42
Papers
Multi-feature Method: An Integrated Content Based Image Retrieval SystemFull-text access may be available. Sign in or learn about subscription options.pp. 43-46
Papers
Integrated Visual Saliency Based Local Feature Selection for Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 47-50
Papers
A Parallel Gaussian Filtering Algorithm Based on Color DifferenceFull-text access may be available. Sign in or learn about subscription options.pp. 51-54
Papers
Trust Based Secure Localization in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 55-58
Papers
The Shapes of Halftone-AM-Dots Based on Information HidingFull-text access may be available. Sign in or learn about subscription options.pp. 59-62
Papers
A High Speed Parallel Timing Recovery Algorithm and Its FPGA ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 63-66
Papers
A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and QuantizationFull-text access may be available. Sign in or learn about subscription options.pp. 67-70
Papers
A Deconvolution Approach of 2D Data StatisticalFull-text access may be available. Sign in or learn about subscription options.pp. 71-74
Papers
Research of Electronic Equipment Fault Diagnosis Algorithm Based on RBF Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Papers
An Optimization for CAVLC Code Table Lookup Algorithm in H. 264 DecoderFull-text access may be available. Sign in or learn about subscription options.pp. 79-82
Papers
Research on Genetic Algorithm Based on Pyramid ModelFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Papers
An Improved Bayesian Algorithm for Filtering Spam E-MailFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
Papers
A Comprehensive Trust Model with Multi-participant Viewpoints in Online AuctionsFull-text access may be available. Sign in or learn about subscription options.pp. 91-95
Papers
Multitemporal Images Change Detection Using Nonsubsampled Contourlet Transform and Kernel Fuzzy C-Means ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 96-99
Papers
Some Remarks on Convergence in Credibility Measure and Convergence in Credibility Distribution of Fuzzy VariableFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
Papers
The Design and Implementation of C-like Language InterpreterFull-text access may be available. Sign in or learn about subscription options.pp. 104-107
Papers
Machine Learning Methods and Their Application ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 108-110
Papers
A Hybrid Watermarking Technique to Resist Tampering and Copy AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 111-114
Papers
Some Remarks on Charactertics Function and Density Function of Uncertain VariableFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
Papers
Intelligent High-Voltage Discharge Fault Detection and Its Diagnosis Methods Based on ANNFull-text access may be available. Sign in or learn about subscription options.pp. 119-122
Papers
The Color Components' Exchanging on Different Color Spaces and the Using for Image SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Papers
Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 131-134
Papers
A New Trust Evaluation Model Based on Cloud Theory in E-Commerce EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Papers
An Improved Multi-objective Population Migration Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 143-146
Papers
A New Population Migration Algorithm Based on the Chaos TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 147-150
Papers
Study on QoS Protection Mechanism of VoIP SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 151-153
Papers
The Application of MapReduce in the Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 154-156
Papers
Research and Implementation of Packet Classification Based on NDIS Intermediate Layer under Windows PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 157-160
Papers
Optimization of Masking Expansion Algorithm in Psychoacoustic ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 161-164
Papers
Secure Digital Library Technology Research Based on VPNFull-text access may be available. Sign in or learn about subscription options.pp. 165-168
Papers
VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTMFull-text access may be available. Sign in or learn about subscription options.pp. 169-172
Papers
An Analytic Network Process Model of Trust in B2C E-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 173-176
Papers
Study on Histogram EqualizationFull-text access may be available. Sign in or learn about subscription options.pp. 177-179
Papers
Numerical Simulation and Analysis of Cavitation Characteristics of Ship PropellerFull-text access may be available. Sign in or learn about subscription options.pp. 180-183
Papers
The Chaotic Cipher Based on CNNs and Its Application in NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 184-187
Papers
A Network Construction Solution in Colleges or UniversitiesFull-text access may be available. Sign in or learn about subscription options.pp. 188-191
Papers
Research on Thin AP Architecture to Deploy Campus WLANFull-text access may be available. Sign in or learn about subscription options.pp. 192-195
Papers
A Survey of Computer Graphics and Graphics Image Processing TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 196-198
Papers
IPv4 to IPv6 Transition Research Based on the Campus NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 199-202
Papers
Research of SCM System Based on the Internet of Things on EPCFull-text access may be available. Sign in or learn about subscription options.pp. 203-205
Papers
Robust Control of One Arm Space Manipulator with Parameters Uncertainties CompensatedFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Papers
Research of Circular-Like Satellite Formation Flying at Critical InclinationFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
Papers
A New Method for Impossible Differential Cryptanalysis of 8-Round AES-128Full-text access may be available. Sign in or learn about subscription options.pp. 214-217
Papers
Exploration and Example for Mathematical Application Issues in U.S. Mathematics TextbooksFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
The EEG Signal Process Based on EEMDFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Papers
Teaching and Research of Cryptography in Information and Computer ScienceFull-text access may be available. Sign in or learn about subscription options.pp. 226-230
Papers
Network Security Mechanisms ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 231-234
Papers
Applied Study on Information Technology and College English Teaching IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 235-237
Papers
An Improved Binary Image Watermarking Algorithm Based on Singular Value DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 238-241
Papers
An Improved Computer Notary System ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 242-244
Papers
Research and Application of the Stronger Security Dual SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 245-247
Papers
A New Method for Impossible Differential Cryptanalysis of 7-Round AES-192Full-text access may be available. Sign in or learn about subscription options.pp. 248-251
Papers
Author IndexFreely available from IEEE.pp. 252-253
Papers
Publisher's InformationFreely available from IEEE.pp. 254
Showing 73 out of 73