| 2011 | 2-out-of-2 Rational Secret Sharing in Extensive Form. Yilei Wang, Qiuliang Xu |
| 2011 | 3G-based Remote Video Surveillance and Control System for Facility Agriculture. Fengdan Lao, Guanghui Teng |
| 2011 | A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks. Rongrong Jiang, Tieming Chen |
| 2011 | A Blakley Secret Sharing Scheme without Trusted Share Distributed Center. Yisheng Xue, Shulei Wu, Huandong Chen |
| 2011 | A Boundary Detection algorithm of clusters based on Dual Threshold Segmentation. Baozhi Qiu, Shuang Wang |
| 2011 | A Cloud Model Approach to the Modification of the Exponential Function Model for Software Reliability. Ziqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu |
| 2011 | A Cloud Model Based Computational Intelligence Algorithm for Parameter Identification of Chaotic Systems. Junfeng Chen, Tiejun Wu |
| 2011 | A Combined Music Label Propagation Model. Jing Cai, Heng Li, Bo Lang |
| 2011 | A Comparative Study on Appending Priority Relations of Rules in BDI-Based Agent Model. You Li, Yuming Lin, Lingzhong Zhao |
| 2011 | A Configurable IPSec Processor for High Performance In-Line Security Network Processor. Yun Niu, Liji Wu, Li Wang, Xiangmin Zhang, Jun Xu |
| 2011 | A Construction of Balanced Odd-variable Boolean Function with Optimum Algebraic Immunity. Yindong Chen |
| 2011 | A Data Distribution Platform Based on Event-Driven Mechanism. Wang Wei, Tan Enmin, Feng Bing |
| 2011 | A Design and Implement of IPS Based on Snort. Jianrong Xi |
| 2011 | A Digital Watermarking Algorithm Based on Wavelet Packet Transform and BP Neural Network. Baoming Qiao, Zhang Pulin, Kang Qiao |
| 2011 | A Fast Handoff Method Based on RSSI and LQI in Wireless Sensor Network. Miao Zhang, Jingying Li |
| 2011 | A General Edge Detection Method Based on the Shear Transform. Qiguang Miao, Pengfei Xu, Weisheng Li, Hai Zhu |
| 2011 | A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. Yuxin Meng, Lam-for Kwok |
| 2011 | A Genetic Algorithm Based on Duality for Linear Bilevel Programming Problems. Hecheng Li |
| 2011 | A Genetic Algorithm Based on a New Fitness Function for Constrained Optimization Problem. Dalian Liu, Jinling Du, Xiaohua Chen |
| 2011 | A Heuristic Genetic Process Mining Algorithm. Jiafei Li, Jihong Ouyang, Mingyong Feng |
| 2011 | A Human-Computer Interaction Method with Multi-Dimensional Information in the Teleoperation Augmented Reality System. Xin Gao, Qingxuan Jia, Huan Hu, Hanxu Sun, Jingzhou Song |
| 2011 | A Hybrid Method for Solving Global Optimization Problems. Jinhua Li, Jie Liu |
| 2011 | A Hybrid Multiobjective Differential Evolution Algorithm Based on Improved έ-Dominance. Ning Dong, Yuping Wang |
| 2011 | A Hybrid Simplex Multi-objective Evolutionary Algorithm Based on Preference Order Ranking. Xiaofang Guo |
| 2011 | A Line-up Competition Differential Evolution Algorithm for the Generalized Assignment Problem. Lixiao Ma, Zhanfang Zhao, Shu-qing Chen |
| 2011 | A Lower Bound for the Smarandache Function Value. Yanchun Guo, Ganglian Ren, Yifang Yang |
| 2011 | A Markov Chain-based Availability Model of Virtual Cluster Nodes. Jianhua Che, Tao Zhang, Weimin Lin, Houwei Xi |
| 2011 | A Maximal Clique Partition Method for Network Based on Granularity. Yanping Zhang, Xiaoyan Chen, Bo Hua, Yuan Zhang |
| 2011 | A Method for New Word Extraction on Chinese Large-scale Query Logs. Rui Sun, Peng Jin, Juan Lai |
| 2011 | A Model Driven Approach for Self-Healing Computing System. Wei Lu, Yian Zhu, Chunyan Ma, Longmei Zhang |
| 2011 | A Model of Emotional Agent Based on Granular Computing. Jun Hu, Chun Guan |
| 2011 | A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory. Ziqiang Luo, Peng Cao, Guochun Tang, Lihua Wu |
| 2011 | A Neural Network for a Class of Horizontal Linear Complementary Problems. Xingbao Gao, Jing Wang |
| 2011 | A New Algorithm for Auto-Exposure Based on the Analogy Histogram. Haifeng Zhang, Jianzhong Cao, Linao Tang, Huawei Wang |
| 2011 | A New Approach for Adaptive Intrusion Detection. Hassina Bensefia, Nacira Ghoualmi-Zine |
| 2011 | A New Community Structure Detection Method Based on Structural Similarity. Qi Luo |
| 2011 | A New Cross-realm Group Password-based Authenticated Key Exchange Protocol. Qing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang |
| 2011 | A New Improved Particle Swarm Optimization Algorithm. Yuhong Duan, Yuelin Gao |
| 2011 | A New Method for Interval Multiple Attribute Decision Making Based on Minimum Variance and Approach Degree. Zhenghai Ai |
| 2011 | A New Scheme for Information Hiding Based on Digital Images. Yanping Zhang, Juan Jiang, Chao Xu, Bo Hua, Xiaoyan Chen |
| 2011 | A Novel Group Signature Scheme Based on NTRU. Junping Yao, Zefeng Dong, Xinshe Li |
| 2011 | A Novel Hash-based RFID Mutual Authentication Protocol. Huixian Li, Ping Yin, Xuan Wang, Liaojun Pang |
| 2011 | A Novel Subspace Discriminant Locality Preserving Projections for Face Recognition. Wei He, Wen-Sheng Chen, Bin Fang |
| 2011 | A Novel Two-stage Analysis Method for Customer's Requirement. Hai Zhu, Zengfa Dou, Wengang Zhou |
| 2011 | A Practical Framework for Agent-Based Hybrid Intelligent Systems. Chunsheng Li, Kan Li |
| 2011 | A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space. Yonglong Luo, Chao Cheng, Cai-xia Chen, Hong Zhong |
| 2011 | A QoS-based Self-adaptive Framework for OpenAPI. Lingyan Sun, Shizhan Chen, Qixuan Liang, Zhiyong Feng |
| 2011 | A Rational Secret Sharing Scheme Based on Repeated Game. Jie Wang, Yongquan Cai |
| 2011 | A Real Time Multi-Scale Correlation Analysis Method and its Application on the Data Mining in Thermodynamic Process. Qi Wang, Xin-Ping Liu |
| 2011 | A Safety Framework and Alarming Model for Train Operation Environment Based on CPS. Xinhong Hei, Lining Chang, Weigang Ma, Guo Xie |
| 2011 | A Saliency Detection Model Based on Multi-feature Fusion. Yang Zheng, Chunping Liu, Zhaohui Wang, Yi Ji, Shengrong Gong |
| 2011 | A Security API for Multimodal Multi-biometric Continuous Authentication. Adriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta |
| 2011 | A Security Model for Information Systems with Multi-level Security. Chao-Qin Gao, Chuang-Bai Xiao |
| 2011 | A Simple But Effective Stream Maximal Frequent Itemset Mining Algorithm. Haifeng Li, Ning Zhang |
| 2011 | A Spam Filtering Method Based on Multi-modal Features Fusion. Huamin Feng, Xinghua Yang, Biao Liu, Chao Jiang |
| 2011 | A Study on IT-security Vocabulary for Domain Document Classification. Liping Qian, Lidong Wang |
| 2011 | A Survey on Methods of Automatic Protocol Reverse Engineering. Xiangdong Li, Li Chen |
| 2011 | A Sybil-resilient Contribution Transaction Protocol. Xu Xiang |
| 2011 | A Topic Partition Algorithm Based on Average Sentence Similarity for Interactive Text. Haiping Zhu, Yan Chen, Yang Yang, Chao Gao |
| 2011 | A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks. Jianting Ning, Xinchun Yin, Ting Yang |
| 2011 | A Trust-based Dynamic Secure Service Discovery Model for Pervasive Computing. Fang Shen, Qingqi Pei, Shu-Po Bu |
| 2011 | A Watermarking-based Visual Cryptography Scheme with Meaningful Shares. Yan-Yan Han, Xiao-ni Cheng, Wen-cai He |
| 2011 | A Wavelet-Based Detection Approach to Traffic Anomalies. Dingde Jiang, Peng Zhang, Zhengzheng Xu, Cheng Yao, Wenda Qin |
| 2011 | A Weighted K-hyperline Clustering Algorithm for Mixing Matrix Estimation on Bernoulli-Gaussian Sources. Junjie Yang, Hai-Lin |
| 2011 | A fuzzy portfolio model considering transaction costs. Jianhui Yang, Yuan Wang |
| 2011 | A new filled function algorithm for constrained global optimization problems. Liu Jie |
| 2011 | A secondary image denoising model based on the local energy operator. Chen Xu, Xiaoli Sun, Min Li |
| 2011 | A security testing approach for WSN protocols based on object-oriented attack model. Yue Qi, Qingqi Pei, Yong Zeng, Chao Yang, Shu-Po Bu |
| 2011 | AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li |
| 2011 | Accelerating Block Cryptography Algorithms in Procedure Level Speculation. Yaobin Wang, Hong An, Zhiqin Liu, Kang Xu, Wanli Dong |
| 2011 | Achievement of Proxy Cache System for Streaming Media Based on Patch Algorithm. Weitao Ha |
| 2011 | Achieving Distributed System Information Security. Salvatore Distefano, Antonio Puliafito |
| 2011 | Action-Seeking Team Coordination for Unmanned Vehicles Team Planning. Jiang-feng Luo, Luohao Tang, Cheng Zhu, Wei Ming Zhang |
| 2011 | Active Contours with Adaptively Normal Biased Gradient Vector Flow External Force. Hengbo Zhao, Lixiong Liu |
| 2011 | Adaptive Evaluation Model of Information System by Triangular Fuzzy Number. Liping Chen |
| 2011 | Adaptive Filter for Color Impulsive Removal Based on the HSI Color Space. Yan-xin Shi, Yongmei Cheng |
| 2011 | Adaptive Neural Control for a Class of Perturbed Time-delay Nonlinear Systems. Ruliang Wang, Jie Li |
| 2011 | Algorithm of Distribution Estimation for Node Localization in Wireless Sensor Network. Cequn Fu, Shulei Wu, Sheng Zhong |
| 2011 | An Access Control Mode Based on Information Flow Graph. Chao Wang, Xing-yuan Chen, Na Li |
| 2011 | An Adaptive Connectivity Data Dissemination Scheme in Vehicular Ad-hoc Networks. Ke Wang, Weidong Yang, Ji-Zhao Liu, Dan-tuo Zhang |
| 2011 | An Application of Justification Logic to Protocol Verification. Thomas Studer |
| 2011 | An Automated Black-box Testing Approach for WSN Security Protocols. Shirui Ji, Qingqi Pei, Yong Zeng, Chao Yang, Shu-Po Bu |
| 2011 | An Efficient Closed-form Solution of Synchronization and Channel Estimation in UWB. Jiongcheng Li, Henghui Xiao, Xibin Lin, Yanbo Zhao |
| 2011 | An Efficient Linear Text Segmentation Algorithm Using Hierarchical Agglomerative Clustering. Ji-Wei Wu, Judy C. R. Tseng, Wen-Nung Tsai |
| 2011 | An Embedded Software Fusion Power Model Based on Algorithm and Micro-architectural Level. Bing Guo, Yan Shen, Xiaobin Liu, Qi Li, Jihe Wang, Yuan Sheng Wu |
| 2011 | An Empirical Study on Credit Scoring Model for Credit Card by Using Data Mining Technology. Wei Li, Jibiao Liao |
| 2011 | An Enhanced Role-Based Access Control Mechanism for Hospital Information Systems. Chen-Guang He, Cun-Zhang Cao, Shu-Di Bao |
| 2011 | An Error Bound for Eigenvalues of Graph Laplacian with Bounded Kernel Function. Yong Liu, Shizhong Liao |
| 2011 | An ID-based (k, t, n) Threshold Group Signature Scheme. Wei Fu, Guang-liang Liu |
| 2011 | An Identity-based Secure Routing Protocol in WSNs. Weichang Li, Hongning Li, Min Xie, Shupo Bu |
| 2011 | An Image Encryption Algorithm Based on Scrambling and Substitution Using Hybrid Chaotic Systems. Fei Xiang, Xiao-cong Guo |
| 2011 | An Image Encryption and Authentication Scheme. Jing Qiu, Ping Wang |
| 2011 | An Implementation Method for Converting the Erhu Music from Wav to Mid. Ziqing Nie, Shiying Yang |
| 2011 | An Important Property about Vertex Distance of Crossed Cubes CQn. Xirong Xu, Aihua Deng, Wenhua Zhai |
| 2011 | An Improved ID3 Based on Weighted Modified Information Gain. Chun Guan, Xiaoqin Zeng |
| 2011 | An Improved Signcryption with Proxy Re-encryption and its Application. Caifen Wang, Xiaojun Cao |
| 2011 | An Improved Software Reliability Model Considering Fault Correction Rate. Zhao Liu, Rui Zhang, Denghua Mei, Xi Zheng |
| 2011 | An Improvement and a New Design of Algorithms for Seeking the Inverse of an NTRU Polynomial. Na Zhao, Shenghui Su |
| 2011 | An Improvement of Comprehensive Evaluation Model. Wenyi Zeng, Shuang Feng |
| 2011 | An Intelligent Vehicle Monitoring System Based on Internet of Things. Lingling Hu, Haifeng Li, Xu Xu, Jian Li |
| 2011 | An Interactive Charge Scheme with Reward and Non-repudiation. Chunling Wang, Fei Yang |
| 2011 | An Optimal Architecture of Middle Agents in Multi-Agent Systems. Xiaoya Li, Songsen Yu |
| 2011 | Analysis and Measurement on the Electromagnetic Compromising Emanations of Computer Keyboards. Litao Wang, Bin Yu |
| 2011 | Analysis of Abnormal Events in IMS and Research on the Strategy of Detection. Xiaolong Xie, Xinsheng Ji, Caixia Liu |
| 2011 | Analysis of Wireless Mesh Network Security Based on Node Function. Shuxin Liu, Jianhua Peng, Caixia Liu |
| 2011 | Analysis of the Authentication Protocols Based on Game Theory. Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma |
| 2011 | Analysis of the Impact of Polarization Mode Dispersion on Optical Fiber Communication. Wei Zhao |
| 2011 | Analysis of the Success Rate of the LLL Lattice Basis Reduction. Haibo Wu, Shenghui Su |
| 2011 | Analysis on Cloud Computing-based Logistics Information Network Mode. Xing Wang |
| 2011 | Analytical Models for Data Dependence Violation Checking in TLS. Xin Lai, Cong Liu, Zhiying Wang, Quanyou Feng |
| 2011 | Another View of the Features in Supervised Chinese Word Sense Disambiguation. Pengyuan Liu |
| 2011 | Application of Cloud Storage in Traffic Video Detection. Ru Xue, Zong-Sheng Wu, A.-Ning Bai |
| 2011 | Application of Evolutionary Neural Networks for Well-logging Recognition in Petroleum Reservoir. Kai Zhu, Huaguang Song, Jinzhu Gao, Guojian Cheng |
| 2011 | Application of the PSO-SVM Model for Credit Scoring. Yun Ling, Qiu-yan Cao, Hua Zhang |
| 2011 | Approximate Solution of Fuzzy Sylvester Matrix Equations. Xiao-Bin Guo |
| 2011 | Approximation Kernel 2DPCA by Mixture of Vector and Matrix Representation. Lin Wang, Xiuling Zhou |
| 2011 | Architecture for Component Library Retrieval on the Cloud. Junwei Ge, Cong Tao, Yiqiu Fang |
| 2011 | Artificial Neural System Method for Solving Nonlinear Programming with Linear Equality Constraints. Quan-ju Zhang |
| 2011 | Attack on the Cryptosystem Based on DLP. Xiaobo Feng, Mingqiang Wang |
| 2011 | Attribute-Based Authenticated Key Exchange Protocol with General Relations. Hao Wang, Qiuliang Xu, Han Jiang, Rui Li |
| 2011 | Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism. Changji Wang, Jiasen Huang |
| 2011 | Automatic Detection of Lumina in Mouse Liver Immunohistochemical Color Image Using Support Vector Machine and Cellular Neural Network. Wang Hui, Zhou Zhi Guo, Jie Long Mei |
| 2011 | Automatic Parameter Determination Based on a Modified Discriminant Criterion for Face Recognition. Taiquan Huang, Wen-Sheng Chen |
| 2011 | Belief Base Change on Implicant Sets: How to Give Up Elements of a Belief Based on Literal Level. Camilla Schwind |
| 2011 | CFD Numerical Simulation of Exhaust Muffler. Jun Chen, Xiong Shi |
| 2011 | Cell Nuclei Detection in Histopathological Images by Using Multi-curvature Edge Cue. Baochuan Pang, Long Zhou, Wu Zeng, Xinge You |
| 2011 | Certificateless Broadcast Signcryption with Forward Secrecy. Ming Luo, Chun-hua Zou, Jianfeng Xu |
| 2011 | Class-Incremental Kernel Discriminative Common Vectors. Yunhui He |
| 2011 | Closed-loop Supply Chain Network Horizontal Integration Problem. Yuxiang Yang, Gengui Zhou |
| 2011 | Clustering Based Image Denoising Using SURE-LET. Wu Zeng, Long Zhou, Xiubao Jiang, Xinge You, Mingming Gong |
| 2011 | Co-Z Addition Operation of Hessian Curve. Leibo Li, Tao Zhan |
| 2011 | Co-op Advertising Analysis within a Supply Chain Based on the Product Life Cycle. Hong Zhang, Sheng Zhong |
| 2011 | Communities Detection with Applications to Real-World Networks Analysis. Bo Yang |
| 2011 | Computer Realization of Quadratic Spline Interpolation. Tianxiang Feng, Hongxia Liu |
| 2011 | Concurrent Non-malleable Statistically Hiding Commitment. Rui Li, Qiuliang Xu, Hao Wang |
| 2011 | Constructing the Expandability Web Service Based Linux. Rong Shan |
| 2011 | Construction of Overflow Attacks Based on Attack Element and Attack Template. Ning Zhu, Xingyuan Chen, Yongfu Zhang |
| 2011 | Construction of a Bilingual Cognitive Property Knowledgebase. Bin Li, Haibo Kuang, Xiaohe Chen, Xuri Tang, Chen Chen |
| 2011 | Contours-Matching in Building Reconstruction from a Single Image. Xin Zheng, Xiumin Zhang, Fuqing Duan, Wei Liu |
| 2011 | Cooperative Neural Network Background Model for Multi-Modal Video Surveillance. Zhiming Wang, Hong Bao |
| 2011 | Correlation Factor Analysis of FEA Model Simplification Methods of Printed Circuit Board. Su Zou, Chuanri Li, Fei Xu, Liang Qiao |
| 2011 | Cryptoanalysis and Improvement of Verifier-based Key Agreement Protocol in Cross-Realm Setting. Jing-feng Li, Weifeng Guo, Lai-shun Zhang, Yun-Peng Li |
| 2011 | DBS Application to Chinese Adjectives. Qiuxiang Feng, Degen Huang, Xiuying Li, Rongpei Wang |
| 2011 | Data Mining Technique in the Internal Auditing of Enterprise Groups. Aijun Yang, Ping Song |
| 2011 | Data Sources of Webometrics. Longqing Shi, Qingfeng Zhao |
| 2011 | Design and Implement of SerialPort class on Upper machine System. Chuanyi Fu, Jinmei Zhan, Juntao Chen |
| 2011 | Design and Implementation of Bus Net Routing Algorithm. Min Luo, Haiquan Wang, Chunhe Xia, Lihua Wang, Ya Wang |
| 2011 | Design and Implementation of an Electromagnetic Analysis System for Smart Cards. Kun Gu, Liji Wu, Xiangyu Li, Xiangxin Zhang |
| 2011 | Design of Instrument Control System Based on LabView. Jianhua Kang, Fangyi She, FangZheng Yang, Tao Wang |
| 2011 | Design of Intelligent Decision-making System in Multi-UUV Formation Control Simulation. Hong Han, Fengju Kang, Shengjie Wang |
| 2011 | Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving. Vrizlynn L. L. Thing, Tong-Wei Chua, Ming-Lee Cheong |
| 2011 | Design of the DS-UWB Communication System Based on Chaotic Variable Spreading Factor. Dong Li, Jiang Fei Bo |
| 2011 | Differential Energy Watermarking Based on Macro-block Prediction. Qian Zeng, Guorui Feng |
| 2011 | Discretization Based on Positive Domain and Information Entropy. Juan Zhao, Mingchun Wang, Kun Liu, Can Wang |
| 2011 | Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu |
| 2011 | Dynamic Fuzzy Semisupervised Multitask Learning. Meiyin Dai, Fanzhang Li |
| 2011 | Dynamic risk measurement of futures based on wavelet theory. Jianhui Yang, Peng Lin |
| 2011 | Efficient Password-Based Authenticated Key Exchange from Lattices. Yi Ding, Lei Fan |
| 2011 | Efficient e-Discovery Process Utilizing Combination Method of Machine Learning Algorithms. Taerim Lee, Bon Min Goo, Hun Kim, Sang-Uk Shin |
| 2011 | Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks. Keke Wu, Huiyun Li, Xucheng Yin, Guoqing Xu |
| 2011 | Energy-efficient MAC Protocol Designed for Wireless Sensor Network for IoT. Jun Hu, Zeng Ma, Chunsheng Sun |
| 2011 | Energy-efficient Multi-task Scheduling Based on MapReduce for Cloud Computing. Xiaoli Wang, Yuping Wang |
| 2011 | Evaluating the Effect of Loading Forensic Tools on the Volatile Memory for Digital Evidences. Zhen Su, Lian-Hai Wang |
| 2011 | Existence and Global Attractivity of Almost Periodic Solution of Hopfield Neural Networks with Time Delays. Yanshuang Meng |
| 2011 | Existence of Almost Periodic and Almost Automorphic Solutions for Second Order Differential Equations. Lan Li |
| 2011 | Experimental Study the Measurement of Acoustic Wave Flight Time under Strong Noise in the Boiler. Feng Tian, Chenghui Zhang |
| 2011 | Exploring Centrality-Lethality Rule from Evolution Constraint on Essential Hub and Nonessential Hub in Yeast Protein-Protein Interaction Network. Yun-Yuan Dong, Yang Jun, Qi-jun Liu, Yong-Xian Wang, Zhenghua Wang |
| 2011 | Exponentially Synchronization of Stochastic Complex Networks with Time-varying Delays and Switching Topology via Pinning Control. Jingyi Wang, Jianwen Feng, Yi Zhao |
| 2011 | FBctlr - A Novel Approach for Storage Performance Virtualization. Liu Liu, Zhenhan Liu, Lu Xu, Junwei Zhang |
| 2011 | FTA Based Runtime Evaluation of System Reliability for Autonomous Unmanned Vehicle. Guoqi Li |
| 2011 | Face Recognition with Statistical Local Line Binary Pattern. Zheng-Chun Sun, Jian Cheng |
| 2011 | Face Reconstruction from Skull Based on Partial Least Squares Regression. Donghua Huang, Fuqing Duan, Qingqiong Deng, Zhongke Wu, Mingquan Zhou |
| 2011 | Fast Iris Boundary Location Based on Window Mapping Method. Yu Li, Zhou Xue |
| 2011 | Fast Network Traffic Anomaly Detection Based on Iteration. Hua Jiang, Liaojun Pang |
| 2011 | Fast Verification of Memory Consistency for Chip Multi-Processor. Zheng Lv, Hao Chen, Feng Chen, Yi Lv |
| 2011 | Fast and Effectively Identify Pornographic Images. Yanjun Fu, Weiqiang Wang |
| 2011 | Feature selection algorithm based on the Community discovery. Xiaoqiang Jia |
| 2011 | Fingerprint Composition-Feature Extraction Using Directional Filter Banks. Chao Rong Li, Ming Qing Huang, Jianping Li |
| 2011 | Finite Volume Methods for the Second Order Singular Perturbation Problems. Chongnan He |
| 2011 | Geometric Recognitions Models of Fault Characteristics in Mobile Core Network. Sulin Pang, Shouyang Wang |
| 2011 | Global Prefetcher Aggressiveness Control for Chip-Multiprocessor. Limin Han, Deyuan Gao, Xiaoya Fan, Liwen Shi, Jianfeng An |
| 2011 | Global Synchronization of Hybrid Coupled Neural Networks with Time-varying Delay. Xuefei Wu, Chen Xu |
| 2011 | Glowworm swarm optimization algorithm for solving multi-constrained QoS multicast routing problem. Deng-xu He, Hua-Zheng Zhu, Gui-Qing Liu |
| 2011 | Hierarchical ID-Based Blind Signature from Lattices. Liang Chen, Yongquan Cui, Xueming Tang, Dongping Hu, Xin Wan |
| 2011 | Hierarchical Identity-based Broadcast Encryption Scheme on Lattices. Jinman Zhang, Qin Chen |
| 2011 | Hybrid Genetic Algorithm for TSP. Lai Nian, Jinhua Zheng |
| 2011 | Identity-based SIP Authentication and Key Agreement. Shaobo Wu, Chengshu Li |
| 2011 | Image Matching Algorithm Based on Analysis of Reliability in Log-Polar Field. Yiping Xu, Jing Tan, Hongping Li, Yan Tian |
| 2011 | Image Quality Assessment Based on Binary Structure Information. Chun-Hsien Chou, Yun-Hsiang Hsu |
| 2011 | Image Scrambling Based on Chaos Theory and Vigenère Cipher. Shanshan Li, Yinghai Zhao |
| 2011 | Improved BFO with Adaptive Chemotaxis Step for Global Optimization. Ben Niu, Hong Wang, Lijing Tan, Li Li |
| 2011 | Improved Word Similarity Computation for Chinese Using Sub-word Information. Peng Jin, John Carroll, Yunfang Wu, Diana McCarthy |
| 2011 | Improved differential evolution algorithm with adaptive mutation and control parameters. Huirong Li, Yuelin Gao, Li Chao, Peng-Jun Zhao |
| 2011 | Improvement of the MapReduce Model Based on Message Middleware Oriented Data Intensive Computing. Junwei Ge, Xian Jiang, Yiqiu Fang |
| 2011 | Improving Privacy of Property-based Attestation without a Trusted Third Party. Xing-Lan Zhang, Weiwei Liu |
| 2011 | Improving the Performance of Personalized Recommendation with Ontological User Interest Model. Zhenglian Su, Jun Yan, Haisong Chen, Jiaojiao Zhang |
| 2011 | Inducing Chinese Selectional Preference Based on HowNet. Yuxiang Jia, Hongying Zan, Ming Fan |
| 2011 | Inertia Weight Particle Swarm Optimization with Boltzmann Exploration. Feng Chen, Xinxin Sun, Dali Wei |
| 2011 | Information Hiding Algorithm Based on Stentiford Visual Attention Model. Jie Ling, Ju Liu, Jiande Sun, Jianping Qiao, Feng Wang, Feng Feng |
| 2011 | Iterative Learning Control of Double Servo Valve Controlled Electro Hydraulic Servo System. Shaojuan Yu, Junjun Song |
| 2011 | Joint Synchronization and Channel Estimation Algorithm of FH-OFDM Systems in Aviation Mobile Communications. Yong-mao Cheng, Wang-da Chen, Hui Qu, Tian-yi Cai |
| 2011 | K-times Proxy Re-encryption. Xu An Wang, Ziqing Wang, Yi Ding, Shujun Bai |
| 2011 | Kernel-based Behavior Analysis for Android Malware Detection. Takamasa Isohara, Keisuke Takemori, Ayumu Kubota |
| 2011 | Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen |
| 2011 | Knowledge Discovery Method from Abnormal Monitoring Data. Shisong Zhu, Liang Chen, Shuhong Cao |
| 2011 | Learning Local Binary Patterns with Enhanced Boosting for Face Recognition. Fanyi Xiao, Yixiong Liang, Xiaohui Qu |
| 2011 | Level Set Region Based Image Segmentation Using Lattice Boltzmann Method. Souleymane Balla-Arabé, Bin Wang, Xinbo Gao |
| 2011 | Lifeline: Emergency Ad Hoc Network. Se-Hang Cheong, Kai-Ip Lee, Yain-Whar Si, Leong Hou U |
| 2011 | Local Reconstruction Error of l2 Norm for Discriminant Feature Extraction. Yu Hou, Caikou Chen |
| 2011 | MOEA/D with Uniform Design for the Multiobjective 0/1 Knapsack Problem. Yan-Yan Tan, Yong-Chang Jiao, Xin-Kuan Wang |
| 2011 | Marshmallow: A Content-Based Publish-Subscribe System over Structured P2P Networks. Sheng Gao, Guohui Li, Pei Zhao |
| 2011 | Measuring Semantic Relatedness between Words Using Lexical Context. Wei He, Xiaoping Yang, Dupei Huang |
| 2011 | Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers. Jozsef Hegedus, Yoan Miche, Alexander Ilin, Amaury Lendasse |
| 2011 | Methodology for Statistical Distribution Determination of Various Data Sources. Changqing Liu, Wencai Luo |
| 2011 | Minimal Echo State Networks for Visualisation. Tzai-Der Wang, Xiaochuan Wu, Colin Fyfe |
| 2011 | Model Composition and Generating Tests for Web Applications. Bo Song, Shengwen Gong, Shengbo Chen |
| 2011 | Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms. Xiang Fan, William W. Guo, Mark Looi |
| 2011 | Modeling the Uncertain Data in the K-anonymity Privacy Protection Model. Jiawei Wu, Guohua Liu |
| 2011 | Monitoring the PSO Process Based on Fuzzy Random Variables. J. Q. Feng, C. Xu, W. X. Xie |
| 2011 | Multi-Agents Model Analysis for the Evolution of Industrial Clusters. Yajuan Yang, Lian Ren |
| 2011 | Multi-Level Kernel Machine for Scene Image Classification. Junlin Hu, Ping Guo |
| 2011 | Multi-Side Multi-Instance Algorithm. Shu Zhao, Chao Xu, Yanping Zhang, Jun Ma |
| 2011 | Multi-Undeniable Signature Schemes. Xunxun Shen, Maozhi Xu, Yanhui Zhao |
| 2011 | Multi-jammer Localization in Wireless Sensor Networks. Tianzhen Cheng, Ping Li, Sencun Zhu |
| 2011 | Multi-objective Optimization of Bus Dispatching Based on Improved Genetic Algorithm. Jinling Du, Chunxiao Wang, Feng Zhang |
| 2011 | Multi-user Detection Method for MIMO-OFDM Uplink Transmission. Yanli Wang |
| 2011 | Multiobjective Interaction Programming for Two-Persons. Min Jiang, Zhiqing Meng, Xinsheng Xu, Rui Shen, Gengui Zhou |
| 2011 | Multiresolution Streamline Placement for 2D Flow Fields. Wenyao Zhang, Manrui Zhang, Bo Sun |
| 2011 | Neural network in the application of EEG signal classification method. Huaping Jia |
| 2011 | New Heuristic Algorithm of RNA Secondary Structure Prediction with Pseudoknots. Zhendong Liu, Zhijun Zhang, Zaixue Liu, Daming Zhu |
| 2011 | Normalizing Modularity Matrices for Data Clustering. Rong Wang |
| 2011 | Novel Quantization Watermarking Based on Random Angle Modulation. Xinshan Zhu, Shuoling Peng |
| 2011 | Obtaining the Resonant Frequency of the Bubble in the Ship Wake by ANSYS. Zhang Qun, Yingmin Wang |
| 2011 | Off-line Text-independent Writer Identification Using a Mixture of Global and Local Features. Yiu-ming Cheung, Junping Deng |
| 2011 | On Cluster Synchronization for Linearly Coupled Complex Networks. Yi Zhao, Jianwen Feng, Jingyi Wang |
| 2011 | On the Representation and Querying of Sets of Possible Worlds in the K-anonymity Privacy Protecting Model. Jieyuan Li, Guohua Liu |
| 2011 | Optimality Conditions for Fractional Programming with B (p, r, a) Invex Functions. Xiang You Li, Qing Xiang Zhang |
| 2011 | Optimization Plan of Using the Arrival and Departure Track in District Station Based on Hybrid Algorithm. Feng Tian, Haiyang Wang, Xiaoping Sun, Jia Liu, Chuanyun Wang |
| 2011 | Optimization of Vehicle Routing Problem Based on Max-Min Ant System with Parameter Adaptation. Xia Liu, Chao Yang |
| 2011 | Optimized Approach for Computing Multi-base Chains. Xinchun Yin, Ting Yang, Jianting Ning |
| 2011 | Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow. Qi He, Huifang Li |
| 2011 | Orthogonal Test Algorithm on TD-SCDMA Network Optimization. Hua Huang, Yuan Ding |
| 2011 | PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction. Liumei Zhang, Jianfeng Ma, Yichuan Wang, ShaoWei Pan |
| 2011 | Parabolic Adjustment of Image Clearness Algorithm Based on Retinex Theory. Wenzhang He, Rui Liu, Ruimin Zhao |
| 2011 | Pattern Recognition with Spatial Data Mining in Web: An Infrastructure to Engineering of the Urban Cadaster. André Fabiano de Moraes, Lia Caetano Bastos |
| 2011 | Pedestrian Detection Based on HOG-LBP Feature. Guolong Gan, Jian Cheng |
| 2011 | Pedestrian Recognition Based on Saliency Detection and Kalman Filter Algorithm in Aerial Video. Xingbao Wang, Chunping Liu, Gong Liu, Long Liu, Shengrong Gong |
| 2011 | Performance Analysis of the Single Pattern Matching Algorithm Based on Prefix Searching. Xi-hong Wu |
| 2011 | Phylogenetic Tree of DNA Sequences Constructed by a New Method-H Curve. Shulei Wu, Huandong Chen, Dachao Li |
| 2011 | Predictions for Coal Spontaneous Combustion Stage Based on an Artificial Neural Network. Gaochang Zhao |
| 2011 | Privacy Preserving Naïve Bayesian Classifier Based on Transition Probability Matrix. Xing Yang, Yubao Liu, Zhan Li, Jiajie Mo |
| 2011 | Probabilistic Trajectory Modeling of Flight Vehicles Based on Parameter Deviations. Changqing Liu, Wencai Luo |
| 2011 | Promotion Analysis Based on Fitting in Multi-Level Space. Li Sun, Ming Zhu, Jiyun Li |
| 2011 | Property-Based Remote Attestation Oriented to Cloud Computing. Siyuan Xin, Yong Zhao, Yu Li |
| 2011 | Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. Weidong Zhong, Xu An Wang, Ziqing Wang, Yi Ding |
| 2011 | Qualitative Analysis for a Kind of Predator-Prey Model of Holling III-Function Response with Nonlinear Density Dependent. Wei-wei Zheng, Li-gui Luo, Lei Zhao |
| 2011 | Qualitative Modeling for Parallel Software System Reliability Evaluation. Ziqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu |
| 2011 | Query-Aware Anonymization in Location-Based Service. Wei Li, Guangye Li, Chunlei Liu |
| 2011 | Real-time LOD Algorithm Based on Triangle Collapse Optimization. Jun Chen, Xiong Shi |
| 2011 | Recovering Coverage Holes by Using Mobile Sensors in Wireless Sensor Networks. Fei Li, Shuming Xiong, Liangmin Wang |
| 2011 | Reinforcement Learning for the N-Persons Iterated Prisoners' Dilemma. Juan Enrique Agudo, Colin Fyfe |
| 2011 | Relative Local Mean Classifier with Optimized Decision Rule. Guihua Wen, Lijun Jiang |
| 2011 | Relative Stability of Solution for Hua's Macroeconomic Model. Jing Zhang, Jinjie Zhang |
| 2011 | Reliability Analysis of System-in-the-Loop Network Platform Based on Delays. Yafen Shen, Jiaxi Chen, Jing Yuan, Ning Huang |
| 2011 | Research and Implementation of DPA-resistant SMS4 Block Cipher. Xiaoyi Duan, Ronglei Hu, Xiu Ying Li |
| 2011 | Research and Implementation on the Digital Medical Image Enhancement Methods Based on Gradient Smooth and Context Smooth. Liu Jing, Xiong Jie |
| 2011 | Research of Access Control in Electronic Medical Record Based on UCON. Jianguo Ju, Weihe Chen, Yongzhao Zhan |
| 2011 | Research of Blocking Factor Combined with Improved Ant Colony Algorithm in VRP. Zhenqiu Liang |
| 2011 | Research of Rapid Attention-Information Extraction in Human-Robot Interaction. Fei Gong, Lun Xie, Nan Li, Zhi-Liang Wang |
| 2011 | Research on Access Control Mechanism for Digital Products Trading. Fenghua Li, Yinyan Xu, Dongdong Li, Jinghui Zhang |
| 2011 | Research on Improved Greedy Algorithm for Train Rescheduling. Zhenhuan He |
| 2011 | Research on Industrial Building's Reliability Assessment Based on Projection Pursuit Model. Lei Zhang, Jie Liu |
| 2011 | Research on Nonlinear Predictive Control Rolling Optimization Strategy Based on SAPSO. Bi-Ying Zhou |
| 2011 | Research on Privacy-preserving in Distributed Mining Based on the Attribute Similarity. Qiu Lu, Xiao-hui Cheng |
| 2011 | Research on characteristics of plates on Chinese stock market. Peng Lin, Jianhui Yang |
| 2011 | Research on the Maximum Flow in Large-scale Network. Yanping Zhang, Bo Hua, Juan Jiang, Yuan Zhang, Xiaoyan Chen |
| 2011 | Researches and Simulations of Information Hiding in Alamouti Transmission System. Liquan Chen, Miao Lu, Jingbo Chen |
| 2011 | Researching on the Growth Operator SWFZIRS of Growth Evolution Algorithms. Shengjie Sun, Sheng Zhong, Baihai Zhang |
| 2011 | Resource Optimization for Uncertain Traffic Demand in Multi-radio Multi-channel Wireless Networks. Kai Peng, Jing Xu, Wei Liu, Xiaohui Chen, Jian Wu |
| 2011 | Robust Adaptive Sliding Mode Control Design for a Class of Uncertain Neutral Systems with Distributed Delays. Ruliang Wang, Dongmei Gao, Yanbo Li |
| 2011 | Robust Stability for Uncertain Neutral Systems with Time-varying and Distributed Delays. Yuan-xin Liang |
| 2011 | SVM Combined with FCM and PSO for Fuzzy Clustering. Yifang Yang, Guoqiang Chen, Yanchun Guo |
| 2011 | Saliency-based Adaptive Scaling for Image Retargeting. Tanchao Zhu, Weiming Wang, Ping Liu, Yongming Xie |
| 2011 | Schistosoma Cercariae Image Recognition via Sparse Representation. Shenhai Yan, Yang Liu, Xiantong Huang |
| 2011 | Search Engine Optimization Based on Algorithm of BP Neural Networks. Shuo Wang, Kaiying Xu, Yong Zhang, Fei Li |
| 2011 | Secure Data Aggregation Scheme for Clustered Wireless Sensor Networks. Jiang Hong Guo, Jian Feng Ma, Xiu Qiang Wu |
| 2011 | Security Analysis of Some Recent Authentication Protocols for RFID. Ben Niu, Hui Li, Xiaoyan Zhu, Chao Lv |
| 2011 | Security Authentication Scheme Based on Certificateless Signature and Fingerprint Recognition. Yanqiong Zhu, Hui Xu, Zhan Gao |
| 2011 | Security Problems and Countermeasures with Commercial Banking Computer Networks. Yuncheng Liu, Xingchun Sun, Xiaoqin Mao |
| 2011 | Sequential Bayesian Method for Formulating Uncertainty in Sparse Data. Changqing Liu, Wencai Luo |
| 2011 | Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011 Yuping Wang, Yiu-ming Cheung, Ping Guo, Yingbin Wei |
| 2011 | Similarity Matching over Uncertain Time Series. Yanfei Zuo, Guohua Liu, Xiaoli Yue, Wei Wang, Honghua Wu |
| 2011 | Simplified Business Process Model Mining Based on Structuredness Metric. Weidong Zhao, Xi Liu, Anhua Wang |
| 2011 | Simulation of Influence of Desired Velocity Distribution and Herd Effect on Pedestrian Evacuation. Yanfei Yu, Yonglin Min |
| 2011 | Soft-Voting Classification using Locally Linear Reconstruction. Xiaohui Tian, Rong Wang |
| 2011 | Software Fault Prediction Framework Based on aiNet Algorithm. Qian Yin, Ruiyi Luo, Ping Guo |
| 2011 | Spares Consumption Prediction Based on BP Neural Network. Feng Guo, Chen-Yu Liu, Su-qin Zhang, Bin Zhou |
| 2011 | Spares Consumption Quota Model Based on BP Neural Network. Chen-Yu Liu, Feng Guo, Yuan-lei Li, Su-qin Zhang |
| 2011 | Sparse Representation for Multi-Label Image Annotation. Bingxin Xu, Ping Guo |
| 2011 | Spatial Prediction of Dissolved Organic Carbon Using GIS and ANN Modeling in River Networks. Yingchun Fu, Xiantie Zeng, Xueyu Lu |
| 2011 | Spectral Clustering and its Research Progress. Chuanyi Fu, Huandong Chen, Jieqing Xing |
| 2011 | Speech Feature Analysis Using Temporal Linear Embedding. Lifang Xue, Xiu-shuang Yi |
| 2011 | Stability Analysis of Neutral-type Fuzzy Neural Networks with Distributed Delays. Shujun Long, Liping Jia |
| 2011 | Stochastic Modeling File Population in P2P Network. Fang Qun, Wu Xu, Xu Yong |
| 2011 | Stock Selection Based on Data Clustering Method. Ruizhong Wang |
| 2011 | Streamline-based Visualization of 3D Explosion Fields. Yi Wang, Wenyao Zhang, Jianguo Ning |
| 2011 | Structural Health Monitoring via Dynamic Visualization. Peng Sun, Xin Guo |
| 2011 | Study on Friction Coefficient Mechanism Model of Tandem Cold Mill in Unstable Condition. Hao Peifeng |
| 2011 | Study on Role-Based Access Control with Time Constraint. Zhenghong Liu, Yuhong Jia, Tieli Sun |
| 2011 | Sufficient Optimality Conditions and Duality for a Minmax Fractional Problem. Jihong Jia |
| 2011 | Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process. Baojiang Cui, Ce Bian, Tao Guo, Yongle Hao, Jianxin Wang |
| 2011 | Systematical Vulnerability Detection in Browser Validation Mechanism. Chufeng Zeng, Qingxian Wang |
| 2011 | TKNN: An Improved KNN Algorithm Based on Tree Structure. Li Juan |
| 2011 | Testing Anti-denial of Service Attacks Based on Mobile Agent. Huimei Wang, Ming Xian, Guoyu Wang |
| 2011 | The 0/1 Multi-objective Knapsack Problem Based on Regional Search. Weiqi Chen, Zhifeng Hao, Hai-Lin Liu |
| 2011 | The AES Encryption and Decryption Realization Based on FPGA. Luan Lan |
| 2011 | The Analysis of Influence Factors of the Confidence Level on University Students' Network Shopping. Junfeng He, Hui Sun |
| 2011 | The Application Study about Lucene in Document Retrieval for Office. Daiwen Wu |
| 2011 | The Application of Binary Particle Swarm Algorithm in Face Recognition. Guojian Cheng, Caiyun Shi, Kai Zhu, Kevin Gong |
| 2011 | The Application of Graph Theory in Old Chinese Phonology Study. Jiajia Hu, Ning Wang |
| 2011 | The Application of Neural Network in the Intelligent Fault Diagnosis System. Ming Chang, Hongwei Chen, Yingying Wang, Yueou Ren, Hao Kang |
| 2011 | The Application of the Internet of Things in Hainan Tourism Scenic Spot. Yuanguai Lin |
| 2011 | The BSC Alarm Management System Based on Rough Set Theory in Mobile Communication. Chao Deng, Sulin Pang |
| 2011 | The Classification of k-anonymity Data. Bingchun Lin, Guohua Liu |
| 2011 | The Construction and Application of Distance and Open Experimental Platform. Jiangfeng Yu, Youju Qi |
| 2011 | The Design of Cooperative Intrusion Detection System. Guojun Zhang, Liping Chen, Weitao Ha |
| 2011 | The Design of Fuzzy Classifier Based on Sugeno Type Fuzzy Complex-Value Integral. Sheng-Quan Ma, Fu-chuan Chen, Qiang Wang, Zhi-qing Zhao |
| 2011 | The Estimation Algorithm of Laplacian Eigenvalues for the Tangent Bundle. Mengxuan Dong, Fanzhang Li |
| 2011 | The Estimation of Mixing Matrix Based on Bernoulli-Gaussian Model. Jiechang Wen, Taowen Wang |
| 2011 | The Finite Element Analysis of the Electromagnetic Levitation System Based on the Large Air Gap. Zhengfeng Ming, Rui Wen |
| 2011 | The Guidance and Control of Small Net-recovery UAV. Jiatong Chen, Yong Wang |
| 2011 | The Implementation of Trust Model in the P2P Patch Distribution System. Jihai Huang, Yu Su, Min Cao |
| 2011 | The Iterative Regularization Method Based on Image Decomposition Model. Min Li, Chen Xu, Xiaoli Sun, Weiqiang Zhang |
| 2011 | The Multispectral Image Edge Detection Based on Clifford Gradient. Hui Liu, Chen Xu, Wenming Cao |
| 2011 | The Overview of Feature Selection Algorithms Based Swarm Intelligence and Rough Set. Chengmin Sun, Dayou Liu |
| 2011 | The Problem about Grey Incidence Cluster Analysis. Yanping Cao, Chunmei Gong |
| 2011 | The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring. Hao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Lang Qin |
| 2011 | The Simulation of Trajectory for Homing Depth Charge Attacking the Submarine with Different Guide Orderliness. Zong-ji Li, Shan-Zheng Cheng, Lei Ren |
| 2011 | The Study of Improved Marker-Controlled Watershed Crown Segmentation Algorithm. Guang Deng, Zengyuan Li |
| 2011 | Time Series Forecasting Method Based on Huang Transform and BP Neural Network. W. Q. Zhang, C. Xu |
| 2011 | Traitor Tracing and Revocation Mechanisms with Privacy-Preserving. Yi Ding, Lei Fan |
| 2011 | Uniform Design Based Hybrid Genetic Algorithm for Multiobjective Bilevel Convex Programming. Liping Jia, Yuping Wang, Lei Fan |
| 2011 | Using Organizational Evolutionary Particle Swarm Techniques to Generate Test Cases for Combinatorial Testing. Xiaoying Pan, Hao Chen |
| 2011 | Using a Dynamic K-means Algorithm to Detect Anomaly Activities. Li Han |
| 2011 | Using the Callback Function Realization Touch Screen Gestures Recognition of Computer. ShuangCheng Ma |
| 2011 | VAR Model Analysis on Japan's OFDI and Industrial Structural Upgrading. Ren Liang |
| 2011 | VVCS: Verifiable Visual Cryptography Scheme. Yanyan Han, Xiaoni Cheng, Dong Yao, Wencai He |
| 2011 | Voice-based Local Search Using a Language Model Look-ahead Structure for Efficient Pruning. Yao Lu, Gang Liu, Wei Chen, Jesper Ø. Olsen |
| 2011 | Weak-pseudo-R0 Algebras. Yong-lin Liu, Xiao-bo Cai |