| 2009 | A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud. Ji Hu, Andreas Klein |
| 2009 | A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms. My Chau Tu, Dongil Shin, Dongkyoo Shin |
| 2009 | A Comparison of Social Service Selection Techniques. Elodie Billionniere, David Greiman, Kinnis Gosha |
| 2009 | A Design of Data Acquisition of High Speed CCD Camera. Wan Xiao Feng, Bingyi Wang, Zeng Pu, Liu Shung |
| 2009 | A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration. Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda |
| 2009 | A Framework for Identifier-Based Routing for Future Internet. Jie Hou, Yaping Liu, Zhenghu Gong |
| 2009 | A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors. Behzad Zare Moayedi, Mohammad Abdollahi Azgomi |
| 2009 | A General Framework of Brain-Computer Interface with Visualization and Virtual Reality Feedback. Gufei Sun, Kuangda Li, Xiaoqiang Li, Bofeng Zhang, Shizhong Yuan, Gengfeng Wu |
| 2009 | A Hybrid Algorithm for Solving Two-Part Division Problem in Network Community Detection. Chengying Mao, Man Luo, Zhenmei Zhu |
| 2009 | A Hybrid Approach for Chinese Named Entity Recognition in Music Domain. Xueqing Zhang, Zhen Liu, Huizhong Qiu, Yan Fu |
| 2009 | A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network. Hao Chen, Yajun Guo |
| 2009 | A Kind of Improved Vector Space Model. Xiaoping Xu, Junhu Yan |
| 2009 | A Lightweight RFID Authentication Protocol Using Step by Step Symmetric Key Change. Kyoungyoul Kim, Kyungho Chung, Juseok Shin, Hyunwoo Kang, Sejin Oh, Chunho Han, Kwangseon Ahn |
| 2009 | A Load-Balancing and Energy-Aware Routing Protocol for MANET Accessing Internet. Jian Xu, Xiangcai Zhu |
| 2009 | A Memetic Algorithm Based on P Systems for IIR Digital Filter Design. Chunxiu Liu, Gexiang Zhang, Xuebai Zhang, Hongwen Liu |
| 2009 | A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping. Huiqiang Wang, Xikun Dong, Haifeng Wang |
| 2009 | A Mobile Health Monitoring System Using RFID Ring-Type Pulse Sensor. Yu-Chi Wu, Pei-Fan Chen, Zhi-Huang Hu, Chao-Hsu Chang, Gwo-Chuan Lee, Wen-Ching Yu |
| 2009 | A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks. Rabindra Bista, Kyoung-Jin Jo, Jae-Woo Chang |
| 2009 | A New Connected Component Analysis Algorithm Based on Max-Tree. Yan Fu, Xu Chen, Hui Gao |
| 2009 | A New Method for Coverage in Wireless Sensor Networks. N. Attarzadeh, Ali Barati, Ali Movaghar |
| 2009 | A Newly Developed Diamond Search Algorithm. Hui Chen, Hai-Tao Jia |
| 2009 | A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless Networks. Ke Liu, Supeng Leng, Huirong Fu, Longjiang Li |
| 2009 | A Novel Variable-Boundary-Coded Quantum Genetic Algorithm for Function Optimization. Hegen Xiong, Kai Xiong, Qiuhua Tang |
| 2009 | A Peer to Peer Large Data Parallel Computing System and its Application in High-Resolution Video Processing. Yanru Chen, Guowei Chen, Mitsuji Matsumoto |
| 2009 | A Practical Solution for Automatic Service Discovery and Usage over Resource Poor Ad-hoc Sensor Networks. Nuno Costa, António Pereira, Carlos Serôdio |
| 2009 | A Rare Feature Recognition Approach Based on Fuzzy ART Neural Networks. Jun Zha, Cong Lu, HongGuang Lv |
| 2009 | A Remote Monitoring System of IDC Room Based on ZigBee Wireless Sensor Networks. Shuchao Ma, Ming Zhu, Lei Wang, Lei Shu, Suran Li, Shumin Huang |
| 2009 | A Routing Misbehavior Detection and Mitigating Scheme Based on Reputation in Hybrid Wireless Mesh Networks. Jinsong Gui |
| 2009 | A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing Theory. Qian Zhao, Huiqiang Wang, Guangsheng Feng, Xu Lu, Hongwu Lv |
| 2009 | A Short Distance Data Dissemination Protocol for Wireless Sensor Networks. Kyungho Chung, Sungsoo Kim, Yonghwan Kim, Myung Sil Choi, Yongsoo Park, Kwangseon Ahn |
| 2009 | A Software Agent Based Simulation Model for Systems with Decision Units. Yuan Miao |
| 2009 | A Study of High Concurrency Workload Influence on Modern Processor. Baojie Chai, Dawei Liu, Jie Zhao, Wenjun Yang |
| 2009 | A Study on Buffer Efficiency and Surround Routing Strategy in Delay Tolerant Network. Qian He, Yang Li, Xiumei Fan |
| 2009 | A Symmetric Key Based RFID Authentication Protocol Using Encrypted Tag ID. Juseok Shin, Yongsoo Park, Sungsoo Kim, Youngbak Kim, Kyungoul Kim, Wonseok Choi, Kwangseon Ahn |
| 2009 | A Synthetic Network Management Model Based on ForCES FE Model. Fenggen Jia, Kangping Liu, Bin Zhuge, Weiming Wang |
| 2009 | A Utility-Based Adaptive Resource Allocation Policy in Virtualized Environment. Jian Wan, Peipei Shan, Xianghua Xu |
| 2009 | A Web Text Filter Based on Rough Set Weighted Bayesian. Yu Wu, Kun She, William Zhu, Xiaojun Yue, Huiqiong Luo |
| 2009 | ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network. Chunguang Ma, Xiangjun Lin, Hongwu Lv, Huiqiang Wang |
| 2009 | Acceptance and Applications of Smart Cards Technology in University Settings. Abdulrahman A. Mirza, Khaled Alghathbar |
| 2009 | Achieving Information Security in Network Computing Systems. Vincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa |
| 2009 | Adaptive Dimensioning of Cloud Data Centers. Wenhong Tian |
| 2009 | Adaptive Fuzzy Control with Modulated Membership Function Applies to Path Tracking Based on Location System. Wei-Jun Pan, Chih-Chun Lin, Leehter Yao |
| 2009 | An Adaptive Low Latency Cross-Layer MAC Protocol for Wireless Sensor Networks. Zhenzhou Tang, Qian Hu |
| 2009 | An Analysis of Security in Social Networks. Weimin Luo, Jingbo Liu, Jing Liu, Chengyu Fan |
| 2009 | An Approach to Multi-issue Active Negotiation Control Algorithm in Multi-stages. Lipeng Wang, Mingjun Xin |
| 2009 | An Improved Intrusion Detection Method in Mobile AdHoc Network. Fangchao Yin, Xin Feng, Yonglin Han, Libai He, Huan Wang |
| 2009 | An Improved Method to Reduce Over-Segmentation of Watershed Transformation and its Application in the Contour Extraction of Brain Image. Hui Zhu, Bofeng Zhang, Anping Song, Wu Zhang |
| 2009 | An Intelligent MANet Routing Method MEC. Sheng Cao, Yong Chen |
| 2009 | An On-line Monitor System on Off-Gases of Vehicles with WSN's Design Based on Zigbee Technology. Zhiqin Liu, Xiufeng Jiang, Haihao Wang, Kai Zhang |
| 2009 | Automatic Segmentation in Tongue Image by Mouth Location and Active Appearance Model. Xiuqin Zhong, Hongguang Fu, Junhua Yang, Weiming Wang |
| 2009 | Autonomic Trust Extraction for Trustworthy Service Discovery in Urban Computing. Kyounghee Jung, Younghee Lee |
| 2009 | Behavioral Study of UNIX Commands in a Faulty Environment. Cássio Martini Martins Pereira, Rodrigo Fernandes de Mello |
| 2009 | Blog Hotness Evaluation Model Based on Text Opinion Analysis. Jianjiang Li, Xuechun Zhang, Yu Weng, Changjun Hu |
| 2009 | Bowling Alone and Trust Decline in Social Network Sites. Paolo Massa, Martino Salvetti, Danilo Tomasoni |
| 2009 | Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement. Kai Hwang, Sameer Kulkareni, Yue Hu |
| 2009 | Compact Routing on Random Power Law Graphs. Mingdong Tang, Jing Yang, Guoqing Zhang |
| 2009 | Comparison of Neural Network and Kriging Method for Creating Simulation-Optimization Metamodels. Yuan Ren, Guangchen Bai |
| 2009 | Composition Planning for Networked Appliances. Chatchawin Namman, Anirach Mingkhwan |
| 2009 | Cooperative Alert Topic Detection Model in Distributed Environment. Jianjiang Li, Chengxiu Xue, Yu Weng, Changjun Hu |
| 2009 | Correlation Between Forehead EEG and Sensorimotor Area EEG in Motor Imagery Task. Kuangda Li, Gufei Sun, Bofeng Zhang, Shaochun Wu, Gengfeng Wu |
| 2009 | Crawling Strategy of Focused Crawler Based on Niche Genetic Algorithm. Huilian Fan, Guangpu Zeng, Xianli Li |
| 2009 | Cryptanalysis of Two Identity Based Signcryption Schemes. Qi Xia, Chunxiang Xu |
| 2009 | Cyber-I: Vision of the Individual's Counterpart on Cyberspace. Jie Wen, Kai Ming, Furong Wang, Benxiong Huang, Jianhua Ma |
| 2009 | Data Caching Based on Improved DGA in Ad Hoc Networks. Hongbin Song, Xiaoqiang Xiao, Ming Xu, Lei Lin |
| 2009 | Delay-Dependent Robust Global Asymptotic Stability for Stochastic Neural Networks with Discrete-Delay and Unbounded Distributed Delays. Jinzhong Cui, Mengzhuo Luo, Shouming Zhong |
| 2009 | Dependability Analysis for AADL Models by PVS. Geng Chen, Lei Luo, Rong Gong, Shenglin Gui |
| 2009 | Design Optimization under Aleatory and Epistemic Uncertainties. Juan Wei, Bo Yang, Wei Liu |
| 2009 | Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy. Jinlong Hou, Yongxin Zhu, Le Zhang, Yuzhuo Fu, Feng Zhao, Li Yang, Guoguang Rong |
| 2009 | Design of 3D Positioning Algorithm Based on RFID Receiver Array for In Vivo Micro-Robot. Le Zhang, Yongxin Zhu, Tingting Mo, Jinlong Hou, Hao Hu |
| 2009 | Design of a Rule Based System Using Structured Query Language. Umair Abdullah, Mohammad Jamil Sawar, Aftab Ahmed |
| 2009 | Designing a Network Acquisition System of Competitive Intelligence. Guoliang Shi, Xiaorong Mou, Xu Wan |
| 2009 | Discovery and Visualization of Hierarchical Overlapping Communities from Bibliography Information. Pushpa Kumar, Li Wang, J. Chauhan, Kang Zhang |
| 2009 | Dynamic Social Network Analysis Using Latent Space Model and an Integrated Clustering Algorithm. Aiwu Xu, Xiaolin Zheng |
| 2009 | Efficient Video Quality Assessment for Broadcasting Multimedia Signal. Xingang Liu, Kook-Yeol Yoo, Ho-Youl Jung, Yongwan Park |
| 2009 | Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, Chengdu, China, 12-14 December, 2009 |
| 2009 | Energy-Efficient Cluster-Based Scheme for Handling Node Failure in Real-Time Sensor Networks. Hamid Karimi, Mehdi Kargahi, Nasser Yazdani |
| 2009 | Evolutionary Design of Relatively Large Combinational Circuits with an Extended Stepwise Dimension Reduction. Zhifang Li, Wenjian Luo, Lihua Yue, Xufa Wang |
| 2009 | Fast Complex Network Clustering Algorithm Using Agents. Di Jin, Dayou Liu, Bo Yang, Jie Liu |
| 2009 | Finding Arc and Vertex-Disjoint Paths in Networks. Zheng Xie, Hongze Leng, Zhi Chen, Jun Zhang |
| 2009 | Formal Analysis of Fault Recovery in Self-Organizing Systems. Jan Calta, Miroslaw Malek |
| 2009 | Generating an Approximately Optimal Detector Set by Evolving Random Seeds. Jie Zhang, Wenjian Luo, Baoliang Xu |
| 2009 | Grey Prediction Control of Adaptive Resources Allocation in Virtualized Computing System. Xianghua Xu, Yanna Yan, Jian Wan |
| 2009 | Influence Diagram Model with Interval-Valued Utilities. Lihua Zhou, Weiyi Liu, Lizhen Wang |
| 2009 | Integration of Resource Poor Wireless Sensor Networks into Smart Spaces. Nuno Costa, António Pereira, Carlos Serôdio |
| 2009 | Intelligent Context-Based Adaptation for Spatial Routing Applications in Dynamic Environment. Dejian Meng, Stefan Poslad, Yide Zhang |
| 2009 | Interactive Pervasive Wireless Services over GPRS and Bluetooth. Yong Tang |
| 2009 | Intrusion Detection Based on Data Mining. George S. Oreku, Fredrick Japhet Mtenzi |
| 2009 | Intrusion Detection in the Cloud. Sebastian Roschke, Feng Cheng, Christoph Meinel |
| 2009 | Joint Topology-Transparent Scheduling and Multipath QoS Routing in MANETs. Yuan Li, Baolin Sun, Xing Luo |
| 2009 | Key Techniques of Interoperable DRM on Linux Platform. Yulin Wang, Xuebin Liu |
| 2009 | Learning Navigation Map on Ontology. Tianying Chen, Hongguang Fu |
| 2009 | Low Power Embedded Speech Enhancement System Based on a Fixed-Point DSP. Yu Cai, Jianping Yuan, Xiaochuan Ma, Chaohuan Hou |
| 2009 | Measuring the Probability of Correctness of Contextual Information in Context Aware Systems. Nermin Brgulja, Rico Kusber, Klaus David, Matthias Baumgarten |
| 2009 | Mobile Phones as 3-DOF Controllers: A Comparative Study. Nicholas Katzakis, Masahiro Hori |
| 2009 | Modeling Reputation Scheme in P2P File-Sharing by Stochastic Activity Networks. Peiqing Zhang, Bjarne E. Helvik |
| 2009 | Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA. Hongwu Lv, Huiqiang Wang, Qian Zhao, Chunguang Ma |
| 2009 | Models of Information and Psychological Operations Used in International Conflicts. A. V. Manoilo |
| 2009 | Multi-metric Routing Decisions in VANET. Xiao-Bo Wang, Yu-Liang Yang, Jian-wei An |
| 2009 | Multi-objective Optimization of Cross-Layer Configuration for Cognitive Wireless Network. Hong Jiang, Yujun Bao, Qiang Li, Yu Qing Huang |
| 2009 | Multicasting Tree Transformation for Concurrent Modest Multimedia Service. Mi-young Kang, Ji-Seung Nam, Seo-Gyun Kim |
| 2009 | Multidimensional Pervasive Adaptation into Ambient Intelligent Environments. Yacine Bellik, Gaëtan Pruvost, Achilles Kameas, Christos Goumopoulos, Hani Hagras, Michael Gardner, Tobias Heinroth, Wolfgang Minker |
| 2009 | Noise Source Recognition Based on Two-Level Architecture Neural Network Ensemble for Incremental Learning. Gao Zhihua, B. Kerong, Cui Lilin |
| 2009 | Notice of Violation of IEEE Publication PrinciplesA Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval). |
| 2009 | On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes. Jianhong Zhang, Hua Chen, Shengnan Gao |
| 2009 | On-demand Query Processing in Mobile Ad Hoc Networks. Longjiang Li, Supeng Leng, Yuming Mao |
| 2009 | P2P-Based Single Sign-On. Yong Ma, Xuewen Chen, Ling Li, Yaoming Luo |
| 2009 | Password Recovery for RAR Files Using CUDA. Guang Hu, Jianhua Ma, Benxiong Huang |
| 2009 | Pattern Matching with Independent Wildcard Gaps. Fan Min, Xindong Wu, Zhenyu Lu |
| 2009 | People Reidentification in a Camera Network. I. O. de Oliveira, J. L. de Souza Pio |
| 2009 | Performance Study of RFID Localisation in a Challenging Indoor Environment. Siok Kheng Tan, Zhong Fan |
| 2009 | Policy Description Language for Dynamic Access Control Models. Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka |
| 2009 | Position Calculating and Path Tracking of Three Dimensional Location System Based on Different Wave Velocities. Chih-Chun Lin, She-Shang Xue, Leehter Yao |
| 2009 | Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. Wassim Itani, Ayman I. Kayssi, Ali Chehab |
| 2009 | Public-Mailbox-Based Online Homework-Automatic-Processing Platform. Yuan Lin, Riping Gen, Guixian Xu |
| 2009 | Publish and Subscribe Model Based on WS-Notification. Guangpu Zeng, Huilian Fan |
| 2009 | REAR: Real-Time Energy Aware Routing for Wireless Adhoc Micro Sensors Network. Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar, Muhammad Zubair Aziz |
| 2009 | Real Hardware Verification by Software for Bootstrap Using TSC. Kunio Miyamoto, Hidehiko Tanaka |
| 2009 | Realization of Intelligent Dynamic Topology Management in Next Generation Network. Cong Wu, Shiguo Xu |
| 2009 | Reducing Program Environment Misjudgement on VM Detection Using TSC. Kunio Miyamoto, Hidehiko Tanaka |
| 2009 | Reliability and Dependability Modeling and Analysis of Dynamic Aspects in Complex Systems. Salvatore Distefano |
| 2009 | Replica Placement in Multi-tier Data Grid. Qaisar Rasool, Jianzhong Li, Shuo Zhang |
| 2009 | Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform. Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang |
| 2009 | Research of Fingerprint Image Quality Estimation. Yulan Zhao, Chunfeng Jiang, Xiufeng Fang, Bin Huang |
| 2009 | Research of Fingerprint Recognition. Chunfeng Jiang, Yulan Zhao, Wei Xu, Xiangping Meng |
| 2009 | Research of Summarization Extraction in Multiple Topics Document. Tao Liao, Zongtian Liu |
| 2009 | Research on Component-Based Model Driven Architecture Development and Assembly. Fei Chen, Wan-hua Cao, Yong Huang |
| 2009 | Research on Network Flow Evaluation Benchmark Model. Zhou Jian, Hu Longmao, Zhou Yanran |
| 2009 | Research on One Intelligent Prediction Method for Water Bloom. Xiaoyi Wang, Zaiwen Liu, Shiping Zhu, Jun Dai, Chenling Zhu, Minghua Yang |
| 2009 | Research on Parallelization of Aspect-Oriented Program. Tengfei He, Xiaoguang Mao |
| 2009 | Research on Secure and Reconfigurable Architecture Based on Embedded Hardware. Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang |
| 2009 | Research on Social Relation Extraction of Web Persons. Tian Gan, Qian Mo |
| 2009 | Research on the Application of Expert Knowledge Map Based on Social Network Analysis. Tong Liu, Yanqin Shi, Chensheng Wu |
| 2009 | Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless Networks. Chunmei Chen, Hong Jiang, Shi-en Yang |
| 2009 | Robust Medical Data Delivery for Wireless Pervasive Healthcare. Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy |
| 2009 | Robust and Fast Keypoint Recognition Based on SE-FAST. Xueting Tan, Xubo Yang, Shuangjiu Xiao |
| 2009 | Routing on Shortest Pair of Disjoint Paths with Bandwidth Guaranteed. Hongze Leng, Meilian Liang, Junqiang Song, Zheng Xie, Jun Zhang |
| 2009 | Runtime Safety Models in Open Systems of Systems. Daniel Schneider, Mario Trapp |
| 2009 | SRD-DFA: Achieving Sub-rule Distinguishing with Extended DFA Structure. Gao Xia, Xiaofei Wang, Bin Liu |
| 2009 | Salmon: Precise 3D Contours in Real Time. Tariq Khan, John Morris, Khurram Jawed, Georgy L. Gimel'farb |
| 2009 | Securing Session Initiation Protocol in Voice over IP Domain. Iyad Alsmairat, Rajan Shankaran, Mehmet A. Orgun, Eryk Dutkiewicz |
| 2009 | Security Analysis of NSSK Protocol and its Improvement. Junguo Liao, Bin Zhu, Yong He |
| 2009 | Semantic Web Services Composition Model Based on Domain Ontology Cost Graph. Wu Chongyun, Wen Jun |
| 2009 | Similarity Computation Using Reconfigurable Embedded Hardware. Darshika G. Perera, Kin Fun Li |
| 2009 | Solving Aircraft-Sequencing Problem Based on Bee Evolutionary Genetic Algorithm and Clustering Method. Siliang Wang |
| 2009 | Study on Buffer Optimal Control Algorithm Based on Infinitesimal Perturbation Analysis for Broadband Satellite Networks. Lei Wang, Ning He |
| 2009 | Synthesis and Analysis in Artificial Intelligence: The Role of Theory in Agent Implementation. Roxanne B. Raine, Rieks op den Akker, Zhiqiang Cai, Arthur C. Graesser, Danielle S. McNamara |
| 2009 | TCBC: Trap Caching Bounds Checking for C. Yoshitaka Arahori, Katsuhiko Gondow, Hideo Maejima |
| 2009 | The Optimal Design of Tree Structure Based on Ant Colony of Wireless Sensor Networks Routing. Gang Hu, Pan Zhang, Wei Zhang |
| 2009 | Toward an Understanding of User-Defined Conditional Preferences. Zhiyong Yu, Zhiwen Yu, Xingshe Zhou, Yuichi Nakamura |
| 2009 | Towards Integrated Simulation of Cyber-Physical Systems: A Case Study on Intelligent Water Distribution. Jing Lin, Sahra Sedigh, Ann Miller |
| 2009 | Using Nature to Best Clarify Computer Security and Threats. George S. Oreku, Fredrick Mtenzi |
| 2009 | VDE: Seamless Mobility on Desktop Environment. Xiaofei Liao, Xianwen Chen, Hai Jin, Zongfen Han |
| 2009 | Verification of a Lock-Free Implementation of Multiword LL/SC Object. Hui Gao, Yan Fu, Wim H. Hesselink |
| 2009 | Water-Bloom Medium-Term Prediction Based on Gray-BP Neural Network Method. Shiping Zhu, Zaiwen Liu, Xiaoyi Wang, Jun Dai |
| 2009 | Web Service Selection Algorithm Based on Particle Swarm Optimization. Hong Xia, Yan Chen, Zengzhi Li, Haichang Gao, Yanping Chen |
| 2009 | World Models and Technologies of Psychological Impact to Resolve International Conflicts. A. V. Manoilo |