Default Cover Image

Network Computing and Information Security, International Conference on

May 14 2011 to May 15 2011

Guilin, Guangxi China

ISBN: 978-0-7695-4355-0

Volume:

Table of Contents

Papers
Title Page i - Volume 2Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 2Freely available from IEEE.pp. iii
Papers
Copyright Page - Volume 2Freely available from IEEE.pp. iv
Papers
Table of Contents - Volume 2Freely available from IEEE.pp. v-xi
Papers
Preface - Volume 2Freely available from IEEE.pp. xii
Papers
Organizing Committee - Volume 2Freely available from IEEE.pp. xiii
Papers
Program Committee - Volume 2Freely available from IEEE.pp. xiv-xv
Papers
Reviewers - Volume 2Freely available from IEEE.pp. xvi
Papers
Research of the Automatic Shrinking-Film Labeling Machine Based on the Data BusFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
"Light Saber" - A Wireless Interactive System Based on Infrared Motion CaptureFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Papers
A Divide-and-Conquer System Based Neural Networks for Forecasting Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 12-14
Papers
A New Approach to Estimate RED Parameters Using Global Congestion NotificationFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Papers
A Novel Hybrid Method Based on Genetic Algorithms and Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 20-23
Papers
A Survey of Agent Based Automated NegotiationFull-text access may be available. Sign in or learn about subscription options.pp. 24-27
Papers
Advances in Research of Fuzzy C-Means Clustering AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 28-31
Papers
An Effective Multicast Mechanism in On-chip NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 32-35
Papers
Coherence Resonance of Excitable Chaotic Spiking Hindmarsh-Rose Neuron ModelFull-text access may be available. Sign in or learn about subscription options.pp. 36-40
Papers
Configuration Design and Sizing Optimization of a Winged AirshipFull-text access may be available. Sign in or learn about subscription options.pp. 41-45
Papers
Consider Risk' Assignment of Collaborative Logistics' Interest Based on Shapely ValueFull-text access may be available. Sign in or learn about subscription options.pp. 46-48
Papers
Control of Spiral Waves and Spatiotemporal Chaos by Stochastic and Asymmetrical Mutual CouplingFull-text access may be available. Sign in or learn about subscription options.pp. 49-53
Papers
Data Mining in Library Reader ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 54-57
Papers
Design and Realization of Music Recognition Based on Speech RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 58-62
Papers
Influence of Encoder Eccentricity on Speed Measurement and Elimination ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 63-66
Papers
Innovation Pattern Evaluation of Equipment Manufacturing Industry Based on Each Type Advantage ParametersFull-text access may be available. Sign in or learn about subscription options.pp. 67-71
Papers
Modeling and Stability Analysis of Multi-rate MIMO Networked Control Systems with Output FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 72-76
Papers
On Parallel Multisplitting Relaxation Iterative Methods for Singular Linear SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Papers
Prediction of Fabric Subjective Thermal-Wet Comfort Properties by Inputting the Objective ParametersFull-text access may be available. Sign in or learn about subscription options.pp. 81-84
Papers
Regularized Back-Propagation Neural Network for Rainfall-Runoff ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 85-88
Papers
Scalable Transactional Memory Architecture Supporting Speculative ParallelizationFull-text access may be available. Sign in or learn about subscription options.pp. 89-93
Papers
Study on the Information Database and Retrieval System of Aircraft Development Based on CALSFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Papers
TextureGrow: Object Recognition and Segmentation with Limit Prior KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 99-102
Papers
The Edge-Fault-Tolerant Hamiltonian Connectivity of Enhanced HypercubeFull-text access may be available. Sign in or learn about subscription options.pp. 103-107
Papers
The Expected Value Model of Multiobjective Programming Problems under Bifuzzy EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 108-112
Papers
An Adaptive Invasion Detection Based on the Variable Fuzzy SetFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
Papers
An Intrusion Detection Method Based on Multiple Kernel Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 119-123
Papers
Ant Algorithm Inspired Immune Intrusion Detector Generation AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 124-127
Papers
Detector Generation Algorithm Based on Online GA for Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 128-132
Papers
Using Control-Flow Techniques in a Security Context: A Survey on Common Prototypes and Their Common WeaknessFull-text access may be available. Sign in or learn about subscription options.pp. 133-137
Papers
An Analytical Model for Random Changing Pseudonyms Scheme in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 141-145
Papers
An ECDLP-Based Randomized Key RFID Authentication ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
Papers
Mobile Trusted Scheme Based on Holistic Security Service SystemFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Papers
Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 156-160
Papers
A New Design of Embedded IPv4/IPv6 Dual-Stack ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 163-167
Papers
A Preliminary Study on Application-Level Protocol for G/S Mode Network Data TransferFull-text access may be available. Sign in or learn about subscription options.pp. 168-172
Papers
Improved Burst Target Demand Assignment Multiple Access (BTDAMA) for GEO Satellite NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 173-176
Papers
A Heterogeneity-Based Strategy for Resource Distribution in P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 179-182
Papers
A Location-Aware Efficient Content-Based Searching over Unstructured P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 183-187
Papers
A New Land Mark Node Technology Based Load Balancing Method for Constructing Future Carrier-Class P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 188-194
Papers
An Age-Based Membership Protocol against Strong Churn in Unstructured P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 195-200
Papers
DLPSPN: New Efficient Super-Peer Network Based on Double-Loop Petersen GraphFull-text access may be available. Sign in or learn about subscription options.pp. 201-205
Papers
Improved Master-Slave Parallel Task-Allocating Algorithm and Its ImplementFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
Library Functions by ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Papers
Research and Implementation of Distributed Drill Simulation System Based on HLAFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
Simulate Match and Mismatch by Computing in Pi-CalculusFull-text access may be available. Sign in or learn about subscription options.pp. 222-226
Papers
Small Files Problem in Parallel File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 227-232
Papers
A Network Boundary Gap Technique Scheme Based on Dual Unilateral PathFull-text access may be available. Sign in or learn about subscription options.pp. 235-238
Papers
Cloud Evaluation Method of Network Attack Resistance AbilityFull-text access may be available. Sign in or learn about subscription options.pp. 239-243
Papers
Improvements on Trust Transitivity Model for Open NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 244-248
Papers
Key Replicating Attack on an Identity-Based Three-Party Authenticated Key Agreement ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 249-253
Papers
The Analysis and Countermeasures Research of Virtual Enterprise Asymmetric Knowledge SharingFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
Papers
The Design of Information Security System for Digital Power GridFull-text access may be available. Sign in or learn about subscription options.pp. 260-263
Papers
Two-Level Trust Federation Model for Cross-Domain EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
Papers
A Connectivity Based Localization Algorithm for Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 273-277
Papers
An Improved Algorithm for Sensor Monitoring in WSANsFull-text access may be available. Sign in or learn about subscription options.pp. 278-281
Papers
General Criteria-Based Clustering Method for Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 282-286
Papers
Research on Centroid Localization Algorithm That Uses Modified Weight in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 287-291
Papers
A Semantic Web Services Query Optimization Method Based on Social TaggingFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
Papers
Financial Information and Its Acquiring Methods in the Network EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 300-305
Papers
Locating Ontologies for Web Services AnnotationFull-text access may be available. Sign in or learn about subscription options.pp. 306-310
Papers
Research in Customer Satisfaction Based on Web Services ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 311-315
Papers
Research on Role Correlation in WSCDLFull-text access may be available. Sign in or learn about subscription options.pp. 316-320
Papers
A Current-Mode Nth-Order Multifunction Filter Using Minimum Number of DVCCsFull-text access may be available. Sign in or learn about subscription options.pp. 323-326
Papers
A Fixed Point Algorithm for Noisy Time-Dependent Processes Using AR Source ModelFull-text access may be available. Sign in or learn about subscription options.pp. 327-331
Papers
A New Additive Fuzzy System for Image ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 332-334
Papers
A Novel Surface Interpolation Approach for Bidimensional Empirical Mode DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 335-338
Papers
A Real-Data-Stimulated Simulation Assessment Method for P2P-Assisted Telecom IPTV SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 339-342
Papers
A Study and Practice on the Wireless Networking CurriculumFull-text access may be available. Sign in or learn about subscription options.pp. 343-346
Papers
A Wavelet Chaotic Simulated Annealing Neural Network and Its Application to Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 347-351
Papers
Application of Cell Mapping Method in Global Analysis of Fault Gear SystemFull-text access may be available. Sign in or learn about subscription options.pp. 352-354
Papers
Contribution of System Noise to Vibration InformationFull-text access may be available. Sign in or learn about subscription options.pp. 355-358
Papers
Design and Implementation of Current Distribution Monitoring Program in Aluminum Reduction CellFull-text access may be available. Sign in or learn about subscription options.pp. 359-362
Papers
Implementation of a VI-Based Synchronic Testing System for Underwater Transducer ArrayFull-text access may be available. Sign in or learn about subscription options.pp. 363-366
Papers
Improved Terms Weighting Algorithm of TextFull-text access may be available. Sign in or learn about subscription options.pp. 367-370
Papers
Improving Spectral Clustering Algorithm Based SAR Spill Oil Image SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 371-375
Papers
Internet Addiction Diagnostic Decision-Making Based on Attribute Reduction of Rough Set TheoriesFull-text access may be available. Sign in or learn about subscription options.pp. 376-380
Papers
Large Vocabulary Continuous Speech Recognition of Uyghur: Basic Research of Front-End ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 381-385
Papers
Optimization Deployment Model of Tactics Fixed Force and Accompanying ForceFull-text access may be available. Sign in or learn about subscription options.pp. 386-389
Papers
Performance Analysis with Partial Relay Selection in Amplify-and-Forward Cooperative NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 390-392
Papers
Public Watermark Detection Using Secure Multiparty ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 393-395
Papers
Research and Realization of a SVS Algorithm Based on STFT and NDFTFull-text access may be available. Sign in or learn about subscription options.pp. 396-400
Papers
Research on Fast 2-D DCT Algorithm Based on Parallel ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 401-404
Papers
Shedding New Light on Reason for Conflict between EvidencesFull-text access may be available. Sign in or learn about subscription options.pp. 405-409
Papers
Simulation Study for Observation of Space Reentry Vehicles Based on UKFFull-text access may be available. Sign in or learn about subscription options.pp. 410-414
Papers
Speech Denoising Based on Improved Discrete Wavelet Packet DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 415-419
Papers
Sub-array Digital Multiple Beamfroming Technology on PowerPc+FPGA ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Papers
WSN Multilateral Localization Algorithm Based on MLEFull-text access may be available. Sign in or learn about subscription options.pp. 426-429
Papers
A Cluster Header Election Scheme Based on Auction Mechanism for Intrusion Detection in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 433-437
Papers
A New Kind of Ndv-hop Algorithm in Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 438-441
Papers
A Novel Adaptive Resource Allocation Algorithm for Multiuser OFDM-Based Cognitive Radio SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 442-445
Papers
Optimal Strategy-Proof Wireless Resources AuctionFull-text access may be available. Sign in or learn about subscription options.pp. 446-450
Showing 100 out of 104