Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NCIS
NCIS 2011
Generate Citations
Network Computing and Information Security, International Conference on
May 14 2011 to May 15 2011
Guilin, Guangxi China
ISBN: 978-0-7695-4355-0
Volume:
1
2
Table of Contents
Papers
Title Page i - Volume 2
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 2
Freely available from IEEE.
pp. iii
Papers
Copyright Page - Volume 2
Freely available from IEEE.
pp. iv
Papers
Table of Contents - Volume 2
Freely available from IEEE.
pp. v-xi
Papers
Preface - Volume 2
Freely available from IEEE.
pp. xii
Papers
Organizing Committee - Volume 2
Freely available from IEEE.
pp. xiii
Papers
Program Committee - Volume 2
Freely available from IEEE.
pp. xiv-xv
Papers
Reviewers - Volume 2
Freely available from IEEE.
pp. xvi
Papers
Research of the Automatic Shrinking-Film Labeling Machine Based on the Data Bus
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Cheng He
Papers
"Light Saber" - A Wireless Interactive System Based on Infrared Motion Capture
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Ren Chen
,
Chen Ma
,
Xing-jie Wang
,
Zheng Yu
Papers
A Divide-and-Conquer System Based Neural Networks for Forecasting Time Series
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-14
by
Suixun Guo
,
Rongbo Huang
Papers
A New Approach to Estimate RED Parameters Using Global Congestion Notification
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Özen Yelbasi
,
Emin Germen
Papers
A Novel Hybrid Method Based on Genetic Algorithms and Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-23
by
Zhibin Zhu
,
Anwa Zhou
,
De He
,
Shuo Wang
Papers
A Survey of Agent Based Automated Negotiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-27
by
Liu Kexing
Papers
Advances in Research of Fuzzy C-Means Clustering Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-31
by
Chen Yanyun
,
Qiu Jianlin
,
Gu Xiang
,
Chen Jianping
,
Ji Dan
,
Chen Li
Papers
An Effective Multicast Mechanism in On-chip Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-35
by
Jing Lin
,
Xiaola Lin
Papers
Coherence Resonance of Excitable Chaotic Spiking Hindmarsh-Rose Neuron Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-40
by
Guang-Jun Zhang
,
Jue Wang
,
Hong Yao
,
Xiang-bo Wang
,
Jian-Xue Xu
Papers
Configuration Design and Sizing Optimization of a Winged Airship
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-45
by
Wang Haifeng
,
Song Bifeng
,
Zhong Xiaoping
Papers
Consider Risk' Assignment of Collaborative Logistics' Interest Based on Shapely Value
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-48
by
Zhi Guo-Jian
,
Zhang Rui-Xia
,
Li Zhuang-Kuo
Papers
Control of Spiral Waves and Spatiotemporal Chaos by Stochastic and Asymmetrical Mutual Coupling
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-53
by
Jun Mei Wang
,
Yu Xue
Papers
Data Mining in Library Reader Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-57
by
Ping Yu
Papers
Design and Realization of Music Recognition Based on Speech Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-62
by
Yubin Zhong
,
Yi Xiang
Papers
Influence of Encoder Eccentricity on Speed Measurement and Elimination Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-66
by
Rentao Zhao
,
Zhifang Zhang
,
Jun Tie
Papers
Innovation Pattern Evaluation of Equipment Manufacturing Industry Based on Each Type Advantage Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-71
by
Hou Xi-lin
,
Zhang Li-li
,
Zhao Xi-nan
Papers
Modeling and Stability Analysis of Multi-rate MIMO Networked Control Systems with Output Feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-76
by
Liu Dianting
,
Li Haixia
Papers
On Parallel Multisplitting Relaxation Iterative Methods for Singular Linear Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-80
by
Qingbing Liu
Papers
Prediction of Fabric Subjective Thermal-Wet Comfort Properties by Inputting the Objective Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-84
by
Ke Baozhu
Papers
Regularized Back-Propagation Neural Network for Rainfall-Runoff Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-88
by
Xian Luo
,
You-peng Xu
,
Jin-tao Xu
Papers
Scalable Transactional Memory Architecture Supporting Speculative Parallelization
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-93
by
Yaobin Wang
,
Hong An
,
Rui Guo
,
Xiaoming Gao
,
Fei Chen
Papers
Study on the Information Database and Retrieval System of Aircraft Development Based on CALS
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-98
by
Dongmei Ni
,
Li Wang
,
Guoping Xia
Papers
TextureGrow: Object Recognition and Segmentation with Limit Prior Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-102
by
Zhijun Yao
,
Qiulie Han
Papers
The Edge-Fault-Tolerant Hamiltonian Connectivity of Enhanced Hypercube
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-107
by
Min Liu
,
Hongmei Liu
Papers
The Expected Value Model of Multiobjective Programming Problems under Bifuzzy Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-112
by
Mingfa Zheng
,
Bingjie Li
,
Guangxing Kou
Papers
An Adaptive Invasion Detection Based on the Variable Fuzzy Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-118
by
Shuo Liangxun
,
Zhao Jinhui
,
Wang Xuehui
Papers
An Intrusion Detection Method Based on Multiple Kernel Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-123
by
Guanghui Song
,
Jiankang Guo
,
Yan Nie
Papers
Ant Algorithm Inspired Immune Intrusion Detector Generation Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-127
by
Xiaowei Wang
,
Lina Sun
Papers
Detector Generation Algorithm Based on Online GA for Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-132
by
Chen Jinyin
,
Yang Dongyong
Papers
Using Control-Flow Techniques in a Security Context: A Survey on Common Prototypes and Their Common Weakness
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-137
by
Mark M. Seeger
Papers
An Analytical Model for Random Changing Pseudonyms Scheme in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-145
by
Yuanyuan Pan
,
Jianqing Li
,
Li Feng
,
Ben Xu
Papers
An ECDLP-Based Randomized Key RFID Authentication Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-149
by
Xinglei Zhang
,
Linsen Li
,
Yue Wu
,
Quanhai Zhang
Papers
Mobile Trusted Scheme Based on Holistic Security Service System
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Li Tao
,
Hu Aiqun
Papers
Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-160
by
Wen Tao Zhu
Papers
A New Design of Embedded IPv4/IPv6 Dual-Stack Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-167
by
Jian Chen
,
Zhiping Jia
,
Xin Li
Papers
A Preliminary Study on Application-Level Protocol for G/S Mode Network Data Transfer
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-172
by
Wen-hui Yang
,
Fu-chao Cheng
,
Fang Miao
,
Li Tan
Papers
Improved Burst Target Demand Assignment Multiple Access (BTDAMA) for GEO Satellite Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-176
by
Xin Yuanbo
,
Zhou Xi
,
She Yang
,
Jiang Yuan
Papers
A Heterogeneity-Based Strategy for Resource Distribution in P2P Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-182
by
Wang Qiong
,
Yang Jie
,
Zhou Hui
,
Chen De
Papers
A Location-Aware Efficient Content-Based Searching over Unstructured P2P Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-187
by
Qiuyan Huo
,
Jingyu Chen
,
Xuezhou Xu
,
Yachuan Zhou
,
Xin Liu
Papers
A New Land Mark Node Technology Based Load Balancing Method for Constructing Future Carrier-Class P2P Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-194
by
Heng Zhang
,
Sicong Kuang
Papers
An Age-Based Membership Protocol against Strong Churn in Unstructured P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-200
by
Haowen Liu
,
Xiwen Liu
,
Wei Song
,
Weidong Wen
Papers
DLPSPN: New Efficient Super-Peer Network Based on Double-Loop Petersen Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-205
by
Yi-Hong Tan
,
Xi-Dao Luan
,
Ya-Ping Lin
,
Zhao Bi-hai
Papers
Improved Master-Slave Parallel Task-Allocating Algorithm and Its Implement
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Chen Li
,
Qiu Jianlin
,
Chen Jianping
,
Gu Xiang
,
Ji Dan
,
Chen Yanyun
Papers
Library Functions by Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Kun Wu
Papers
Research and Implementation of Distributed Drill Simulation System Based on HLA
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Xiaofeng Guo
,
Jianjing Shen
,
Peng Hu
Papers
Simulate Match and Mismatch by Computing in Pi-Calculus
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-226
by
Jin Lu
Papers
Small Files Problem in Parallel File System
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-232
by
Xiuqiao Li
,
Bin Dong
,
Limin Xiao
,
Li Ruan
,
Yi Ding
Papers
A Network Boundary Gap Technique Scheme Based on Dual Unilateral Path
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-238
by
Biao Wang
,
Sanping Tang
,
Shitao Zhang
,
Wen Zhao
Papers
Cloud Evaluation Method of Network Attack Resistance Ability
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-243
by
Huimei Wang
,
Ming Xian
,
Guoyu Wang
Papers
Improvements on Trust Transitivity Model for Open Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-248
by
Zhang Lin
,
Wang Ruchuan
,
Wang Haiyan
Papers
Key Replicating Attack on an Identity-Based Three-Party Authenticated Key Agreement Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-253
by
Wei Yuan
,
Liang Hu
,
Hong-tu Li
,
Kuo Zhao
,
Jiang-feng Chu
,
Yuyu Sun
Papers
The Analysis and Countermeasures Research of Virtual Enterprise Asymmetric Knowledge Sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Yu Cheng-xian
,
Chen Huo-quan
,
Guo Dong-qiang
Papers
The Design of Information Security System for Digital Power Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-263
by
Jin Xu
,
Hongcheng Wang
,
Xia Shen
,
Wei Fang
,
Erli Niu
Papers
Two-Level Trust Federation Model for Cross-Domain Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-269
by
Yanru Lu
,
Jianhua Gu
,
Qiurang Liu
,
Yunlan Wang
,
Tianhai Zhao
Papers
A Connectivity Based Localization Algorithm for Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-277
by
Mantian Xiang
,
Yong Hu
,
Lihong Li
Papers
An Improved Algorithm for Sensor Monitoring in WSANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-281
by
Xin Zhang
,
Li Jiang
Papers
General Criteria-Based Clustering Method for Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-286
by
Yu Niu
,
Brian J. d'Auriol
,
Sungyoung Lee
Papers
Research on Centroid Localization Algorithm That Uses Modified Weight in WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-291
by
Hai-qing Cheng
,
Hua-kai Wang
,
Hua Wang
Papers
A Semantic Web Services Query Optimization Method Based on Social Tagging
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Da Ning
,
Jian-Xiao Liu
,
Cheng Sheng
Papers
Financial Information and Its Acquiring Methods in the Network Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-305
by
Haiwei Zhou
,
Linkai Qi
Papers
Locating Ontologies for Web Services Annotation
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-310
by
Yanping Yang
,
Xiqing Ye
,
Yudong Li
,
Min Jing
Papers
Research in Customer Satisfaction Based on Web Services Resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-315
by
Chen Guo-bin
Papers
Research on Role Correlation in WSCDL
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-320
by
Xu Donghong
,
Qi Yong
,
Jiang Shujuan
Papers
A Current-Mode Nth-Order Multifunction Filter Using Minimum Number of DVCCs
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-326
by
Ping-hua Zhang
,
Xi-feng Zhou
,
Shan Xiao
Papers
A Fixed Point Algorithm for Noisy Time-Dependent Processes Using AR Source Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-331
by
Yumin Yang
Papers
A New Additive Fuzzy System for Image Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-334
by
Lu Guiming
,
Zhang Yunzhe
Papers
A Novel Surface Interpolation Approach for Bidimensional Empirical Mode Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-338
by
Cuiyun Li
,
Pan Han
,
Hongbing Ji
Papers
A Real-Data-Stimulated Simulation Assessment Method for P2P-Assisted Telecom IPTV Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-342
by
Xiuyan Jiang
,
Yinshu Pu
,
Yuan Liu
,
Dejian Ye
,
Guanzhong Lv
,
Qing Xiao
Papers
A Study and Practice on the Wireless Networking Curriculum
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-346
by
Xianliang Jiang
,
Guang Jin
,
Xiaodong Wang
,
Cuixia Ni
,
Zhijun Xie
Papers
A Wavelet Chaotic Simulated Annealing Neural Network and Its Application to Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-351
by
Yunxiao Jiang
,
Yingke Lei
,
Zifa Zhong
,
Xiang Zou
Papers
Application of Cell Mapping Method in Global Analysis of Fault Gear System
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-354
by
Wang Yangang
,
Zheng Haiqi
,
Guan Zhenzhen
,
Gao Feng
Papers
Contribution of System Noise to Vibration Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-358
by
Chuanhui Wu
,
Xiangling Gao
Papers
Design and Implementation of Current Distribution Monitoring Program in Aluminum Reduction Cell
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-362
by
Zhifang Zhang
,
Rentao Zhao
,
Jun Tie
Papers
Implementation of a VI-Based Synchronic Testing System for Underwater Transducer Array
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-366
by
Yang Han
,
Yun Zhu
Papers
Improved Terms Weighting Algorithm of Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-370
by
Ma Zhanguo
,
Feng Jing
,
Hu Xiangyi
,
Shi Yanqin
,
Chen Liang
,
Ma Zhanguo
Papers
Improving Spectral Clustering Algorithm Based SAR Spill Oil Image Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-375
by
Hua Bo
,
Jun Zhang
,
Xiaofeng Wang
Papers
Internet Addiction Diagnostic Decision-Making Based on Attribute Reduction of Rough Set Theories
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-380
by
Shuxiang Dong
,
Guojun Jia
Papers
Large Vocabulary Continuous Speech Recognition of Uyghur: Basic Research of Front-End Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-385
by
Muhetaer Shadike
,
Xiao Li
,
Muhetaer Shadike
,
Buheliqiguli Wasili
Papers
Optimization Deployment Model of Tactics Fixed Force and Accompanying Force
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-389
by
Qu Changzheng
,
Ming Li
,
Zhang Bo
,
Zhang Liu
Papers
Performance Analysis with Partial Relay Selection in Amplify-and-Forward Cooperative Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-392
by
Xianming Chen
,
Yueming Cai
,
Chunxiao Cai
Papers
Public Watermark Detection Using Secure Multiparty Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-395
by
Hong Wang
,
Shimin Wei
Papers
Research and Realization of a SVS Algorithm Based on STFT and NDFT
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-400
by
Rongxi Chen
,
Zhixing Luo
,
Yubin Zhong
,
Xueliang Luo
,
Yiming Gao
,
Guoli Zheng
Papers
Research on Fast 2-D DCT Algorithm Based on Parallel Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-404
by
Sun Wenbang
,
Chen Hexin
,
Sun Wenbing
Papers
Shedding New Light on Reason for Conflict between Evidences
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-409
by
Li-fang Hu
,
Jia-qi Liu
,
Xin Guan
,
Wei-jia Liu
,
Ting-ting Zhou
Papers
Simulation Study for Observation of Space Reentry Vehicles Based on UKF
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-414
by
Jian Lu
,
Demin Xu
,
Lichuan Zhang
,
Junbing Li
,
Jian Lu
Papers
Speech Denoising Based on Improved Discrete Wavelet Packet Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-419
by
Suping Li
Papers
Sub-array Digital Multiple Beamfroming Technology on PowerPc+FPGA Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Qiu-Fei Yan
,
Zhao-Yang Xu
,
Zhao Yu
Papers
WSN Multilateral Localization Algorithm Based on MLE
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-429
by
Renxi Gong
,
Jiwei Zhao
,
Yang Huang
,
Xiaobi Meng
Papers
A Cluster Header Election Scheme Based on Auction Mechanism for Intrusion Detection in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-437
by
Yanqing Zeng
,
Zhide Chen
,
Chen Qiao
,
Li Xu
Papers
A New Kind of Ndv-hop Algorithm in Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-441
by
Qingling Lu
,
Mengliang Bai
,
Wei Zhang
,
Peng Yanli
Papers
A Novel Adaptive Resource Allocation Algorithm for Multiuser OFDM-Based Cognitive Radio Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-445
by
Zhang Jian
,
Zhu Qi
Papers
Optimal Strategy-Proof Wireless Resources Auction
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-450
by
Cheng Qiao
,
Zhide Chen
,
Yanqing Zeng
,
Li Xu
Showing 100 out of 104
Load More
Load All