DASC C

156 papers

YearTitle / Authors
2009A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud.
Ji Hu, Andreas Klein
2009A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms.
My Chau Tu, Dongil Shin, Dongkyoo Shin
2009A Comparison of Social Service Selection Techniques.
Elodie Billionniere, David Greiman, Kinnis Gosha
2009A Design of Data Acquisition of High Speed CCD Camera.
Wan Xiao Feng, Bingyi Wang, Zeng Pu, Liu Shung
2009A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration.
Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda
2009A Framework for Identifier-Based Routing for Future Internet.
Jie Hou, Yaping Liu, Zhenghu Gong
2009A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors.
Behzad Zare Moayedi, Mohammad Abdollahi Azgomi
2009A General Framework of Brain-Computer Interface with Visualization and Virtual Reality Feedback.
Gufei Sun, Kuangda Li, Xiaoqiang Li, Bofeng Zhang, Shizhong Yuan, Gengfeng Wu
2009A Hybrid Algorithm for Solving Two-Part Division Problem in Network Community Detection.
Chengying Mao, Man Luo, Zhenmei Zhu
2009A Hybrid Approach for Chinese Named Entity Recognition in Music Domain.
Xueqing Zhang, Zhen Liu, Huizhong Qiu, Yan Fu
2009A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network.
Hao Chen, Yajun Guo
2009A Kind of Improved Vector Space Model.
Xiaoping Xu, Junhu Yan
2009A Lightweight RFID Authentication Protocol Using Step by Step Symmetric Key Change.
Kyoungyoul Kim, Kyungho Chung, Juseok Shin, Hyunwoo Kang, Sejin Oh, Chunho Han, Kwangseon Ahn
2009A Load-Balancing and Energy-Aware Routing Protocol for MANET Accessing Internet.
Jian Xu, Xiangcai Zhu
2009A Memetic Algorithm Based on P Systems for IIR Digital Filter Design.
Chunxiu Liu, Gexiang Zhang, Xuebai Zhang, Hongwen Liu
2009A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping.
Huiqiang Wang, Xikun Dong, Haifeng Wang
2009A Mobile Health Monitoring System Using RFID Ring-Type Pulse Sensor.
Yu-Chi Wu, Pei-Fan Chen, Zhi-Huang Hu, Chao-Hsu Chang, Gwo-Chuan Lee, Wen-Ching Yu
2009A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks.
Rabindra Bista, Kyoung-Jin Jo, Jae-Woo Chang
2009A New Connected Component Analysis Algorithm Based on Max-Tree.
Yan Fu, Xu Chen, Hui Gao
2009A New Method for Coverage in Wireless Sensor Networks.
N. Attarzadeh, Ali Barati, Ali Movaghar
2009A Newly Developed Diamond Search Algorithm.
Hui Chen, Hai-Tao Jia
2009A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless Networks.
Ke Liu, Supeng Leng, Huirong Fu, Longjiang Li
2009A Novel Variable-Boundary-Coded Quantum Genetic Algorithm for Function Optimization.
Hegen Xiong, Kai Xiong, Qiuhua Tang
2009A Peer to Peer Large Data Parallel Computing System and its Application in High-Resolution Video Processing.
Yanru Chen, Guowei Chen, Mitsuji Matsumoto
2009A Practical Solution for Automatic Service Discovery and Usage over Resource Poor Ad-hoc Sensor Networks.
Nuno Costa, António Pereira, Carlos Serôdio
2009A Rare Feature Recognition Approach Based on Fuzzy ART Neural Networks.
Jun Zha, Cong Lu, HongGuang Lv
2009A Remote Monitoring System of IDC Room Based on ZigBee Wireless Sensor Networks.
Shuchao Ma, Ming Zhu, Lei Wang, Lei Shu, Suran Li, Shumin Huang
2009A Routing Misbehavior Detection and Mitigating Scheme Based on Reputation in Hybrid Wireless Mesh Networks.
Jinsong Gui
2009A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing Theory.
Qian Zhao, Huiqiang Wang, Guangsheng Feng, Xu Lu, Hongwu Lv
2009A Short Distance Data Dissemination Protocol for Wireless Sensor Networks.
Kyungho Chung, Sungsoo Kim, Yonghwan Kim, Myung Sil Choi, Yongsoo Park, Kwangseon Ahn
2009A Software Agent Based Simulation Model for Systems with Decision Units.
Yuan Miao
2009A Study of High Concurrency Workload Influence on Modern Processor.
Baojie Chai, Dawei Liu, Jie Zhao, Wenjun Yang
2009A Study on Buffer Efficiency and Surround Routing Strategy in Delay Tolerant Network.
Qian He, Yang Li, Xiumei Fan
2009A Symmetric Key Based RFID Authentication Protocol Using Encrypted Tag ID.
Juseok Shin, Yongsoo Park, Sungsoo Kim, Youngbak Kim, Kyungoul Kim, Wonseok Choi, Kwangseon Ahn
2009A Synthetic Network Management Model Based on ForCES FE Model.
Fenggen Jia, Kangping Liu, Bin Zhuge, Weiming Wang
2009A Utility-Based Adaptive Resource Allocation Policy in Virtualized Environment.
Jian Wan, Peipei Shan, Xianghua Xu
2009A Web Text Filter Based on Rough Set Weighted Bayesian.
Yu Wu, Kun She, William Zhu, Xiaojun Yue, Huiqiong Luo
2009ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network.
Chunguang Ma, Xiangjun Lin, Hongwu Lv, Huiqiang Wang
2009Acceptance and Applications of Smart Cards Technology in University Settings.
Abdulrahman A. Mirza, Khaled Alghathbar
2009Achieving Information Security in Network Computing Systems.
Vincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa
2009Adaptive Dimensioning of Cloud Data Centers.
Wenhong Tian
2009Adaptive Fuzzy Control with Modulated Membership Function Applies to Path Tracking Based on Location System.
Wei-Jun Pan, Chih-Chun Lin, Leehter Yao
2009An Adaptive Low Latency Cross-Layer MAC Protocol for Wireless Sensor Networks.
Zhenzhou Tang, Qian Hu
2009An Analysis of Security in Social Networks.
Weimin Luo, Jingbo Liu, Jing Liu, Chengyu Fan
2009An Approach to Multi-issue Active Negotiation Control Algorithm in Multi-stages.
Lipeng Wang, Mingjun Xin
2009An Improved Intrusion Detection Method in Mobile AdHoc Network.
Fangchao Yin, Xin Feng, Yonglin Han, Libai He, Huan Wang
2009An Improved Method to Reduce Over-Segmentation of Watershed Transformation and its Application in the Contour Extraction of Brain Image.
Hui Zhu, Bofeng Zhang, Anping Song, Wu Zhang
2009An Intelligent MANet Routing Method MEC.
Sheng Cao, Yong Chen
2009An On-line Monitor System on Off-Gases of Vehicles with WSN's Design Based on Zigbee Technology.
Zhiqin Liu, Xiufeng Jiang, Haihao Wang, Kai Zhang
2009Automatic Segmentation in Tongue Image by Mouth Location and Active Appearance Model.
Xiuqin Zhong, Hongguang Fu, Junhua Yang, Weiming Wang
2009Autonomic Trust Extraction for Trustworthy Service Discovery in Urban Computing.
Kyounghee Jung, Younghee Lee
2009Behavioral Study of UNIX Commands in a Faulty Environment.
Cássio Martini Martins Pereira, Rodrigo Fernandes de Mello
2009Blog Hotness Evaluation Model Based on Text Opinion Analysis.
Jianjiang Li, Xuechun Zhang, Yu Weng, Changjun Hu
2009Bowling Alone and Trust Decline in Social Network Sites.
Paolo Massa, Martino Salvetti, Danilo Tomasoni
2009Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement.
Kai Hwang, Sameer Kulkareni, Yue Hu
2009Compact Routing on Random Power Law Graphs.
Mingdong Tang, Jing Yang, Guoqing Zhang
2009Comparison of Neural Network and Kriging Method for Creating Simulation-Optimization Metamodels.
Yuan Ren, Guangchen Bai
2009Composition Planning for Networked Appliances.
Chatchawin Namman, Anirach Mingkhwan
2009Cooperative Alert Topic Detection Model in Distributed Environment.
Jianjiang Li, Chengxiu Xue, Yu Weng, Changjun Hu
2009Correlation Between Forehead EEG and Sensorimotor Area EEG in Motor Imagery Task.
Kuangda Li, Gufei Sun, Bofeng Zhang, Shaochun Wu, Gengfeng Wu
2009Crawling Strategy of Focused Crawler Based on Niche Genetic Algorithm.
Huilian Fan, Guangpu Zeng, Xianli Li
2009Cryptanalysis of Two Identity Based Signcryption Schemes.
Qi Xia, Chunxiang Xu
2009Cyber-I: Vision of the Individual's Counterpart on Cyberspace.
Jie Wen, Kai Ming, Furong Wang, Benxiong Huang, Jianhua Ma
2009Data Caching Based on Improved DGA in Ad Hoc Networks.
Hongbin Song, Xiaoqiang Xiao, Ming Xu, Lei Lin
2009Delay-Dependent Robust Global Asymptotic Stability for Stochastic Neural Networks with Discrete-Delay and Unbounded Distributed Delays.
Jinzhong Cui, Mengzhuo Luo, Shouming Zhong
2009Dependability Analysis for AADL Models by PVS.
Geng Chen, Lei Luo, Rong Gong, Shenglin Gui
2009Design Optimization under Aleatory and Epistemic Uncertainties.
Juan Wei, Bo Yang, Wei Liu
2009Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy.
Jinlong Hou, Yongxin Zhu, Le Zhang, Yuzhuo Fu, Feng Zhao, Li Yang, Guoguang Rong
2009Design of 3D Positioning Algorithm Based on RFID Receiver Array for In Vivo Micro-Robot.
Le Zhang, Yongxin Zhu, Tingting Mo, Jinlong Hou, Hao Hu
2009Design of a Rule Based System Using Structured Query Language.
Umair Abdullah, Mohammad Jamil Sawar, Aftab Ahmed
2009Designing a Network Acquisition System of Competitive Intelligence.
Guoliang Shi, Xiaorong Mou, Xu Wan
2009Discovery and Visualization of Hierarchical Overlapping Communities from Bibliography Information.
Pushpa Kumar, Li Wang, J. Chauhan, Kang Zhang
2009Dynamic Social Network Analysis Using Latent Space Model and an Integrated Clustering Algorithm.
Aiwu Xu, Xiaolin Zheng
2009Efficient Video Quality Assessment for Broadcasting Multimedia Signal.
Xingang Liu, Kook-Yeol Yoo, Ho-Youl Jung, Yongwan Park
2009Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, Chengdu, China, 12-14 December, 2009
2009Energy-Efficient Cluster-Based Scheme for Handling Node Failure in Real-Time Sensor Networks.
Hamid Karimi, Mehdi Kargahi, Nasser Yazdani
2009Evolutionary Design of Relatively Large Combinational Circuits with an Extended Stepwise Dimension Reduction.
Zhifang Li, Wenjian Luo, Lihua Yue, Xufa Wang
2009Fast Complex Network Clustering Algorithm Using Agents.
Di Jin, Dayou Liu, Bo Yang, Jie Liu
2009Finding Arc and Vertex-Disjoint Paths in Networks.
Zheng Xie, Hongze Leng, Zhi Chen, Jun Zhang
2009Formal Analysis of Fault Recovery in Self-Organizing Systems.
Jan Calta, Miroslaw Malek
2009Generating an Approximately Optimal Detector Set by Evolving Random Seeds.
Jie Zhang, Wenjian Luo, Baoliang Xu
2009Grey Prediction Control of Adaptive Resources Allocation in Virtualized Computing System.
Xianghua Xu, Yanna Yan, Jian Wan
2009Influence Diagram Model with Interval-Valued Utilities.
Lihua Zhou, Weiyi Liu, Lizhen Wang
2009Integration of Resource Poor Wireless Sensor Networks into Smart Spaces.
Nuno Costa, António Pereira, Carlos Serôdio
2009Intelligent Context-Based Adaptation for Spatial Routing Applications in Dynamic Environment.
Dejian Meng, Stefan Poslad, Yide Zhang
2009Interactive Pervasive Wireless Services over GPRS and Bluetooth.
Yong Tang
2009Intrusion Detection Based on Data Mining.
George S. Oreku, Fredrick Japhet Mtenzi
2009Intrusion Detection in the Cloud.
Sebastian Roschke, Feng Cheng, Christoph Meinel
2009Joint Topology-Transparent Scheduling and Multipath QoS Routing in MANETs.
Yuan Li, Baolin Sun, Xing Luo
2009Key Techniques of Interoperable DRM on Linux Platform.
Yulin Wang, Xuebin Liu
2009Learning Navigation Map on Ontology.
Tianying Chen, Hongguang Fu
2009Low Power Embedded Speech Enhancement System Based on a Fixed-Point DSP.
Yu Cai, Jianping Yuan, Xiaochuan Ma, Chaohuan Hou
2009Measuring the Probability of Correctness of Contextual Information in Context Aware Systems.
Nermin Brgulja, Rico Kusber, Klaus David, Matthias Baumgarten
2009Mobile Phones as 3-DOF Controllers: A Comparative Study.
Nicholas Katzakis, Masahiro Hori
2009Modeling Reputation Scheme in P2P File-Sharing by Stochastic Activity Networks.
Peiqing Zhang, Bjarne E. Helvik
2009Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA.
Hongwu Lv, Huiqiang Wang, Qian Zhao, Chunguang Ma
2009Models of Information and Psychological Operations Used in International Conflicts.
A. V. Manoilo
2009Multi-metric Routing Decisions in VANET.
Xiao-Bo Wang, Yu-Liang Yang, Jian-wei An
2009Multi-objective Optimization of Cross-Layer Configuration for Cognitive Wireless Network.
Hong Jiang, Yujun Bao, Qiang Li, Yu Qing Huang
2009Multicasting Tree Transformation for Concurrent Modest Multimedia Service.
Mi-young Kang, Ji-Seung Nam, Seo-Gyun Kim
2009Multidimensional Pervasive Adaptation into Ambient Intelligent Environments.
Yacine Bellik, Gaëtan Pruvost, Achilles Kameas, Christos Goumopoulos, Hani Hagras, Michael Gardner, Tobias Heinroth, Wolfgang Minker
2009Noise Source Recognition Based on Two-Level Architecture Neural Network Ensemble for Incremental Learning.
Gao Zhihua, B. Kerong, Cui Lilin
2009Notice of Violation of IEEE Publication PrinciplesA Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval).
2009On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes.
Jianhong Zhang, Hua Chen, Shengnan Gao
2009On-demand Query Processing in Mobile Ad Hoc Networks.
Longjiang Li, Supeng Leng, Yuming Mao
2009P2P-Based Single Sign-On.
Yong Ma, Xuewen Chen, Ling Li, Yaoming Luo
2009Password Recovery for RAR Files Using CUDA.
Guang Hu, Jianhua Ma, Benxiong Huang
2009Pattern Matching with Independent Wildcard Gaps.
Fan Min, Xindong Wu, Zhenyu Lu
2009People Reidentification in a Camera Network.
I. O. de Oliveira, J. L. de Souza Pio
2009Performance Study of RFID Localisation in a Challenging Indoor Environment.
Siok Kheng Tan, Zhong Fan
2009Policy Description Language for Dynamic Access Control Models.
Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka
2009Position Calculating and Path Tracking of Three Dimensional Location System Based on Different Wave Velocities.
Chih-Chun Lin, She-Shang Xue, Leehter Yao
2009Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures.
Wassim Itani, Ayman I. Kayssi, Ali Chehab
2009Public-Mailbox-Based Online Homework-Automatic-Processing Platform.
Yuan Lin, Riping Gen, Guixian Xu
2009Publish and Subscribe Model Based on WS-Notification.
Guangpu Zeng, Huilian Fan
2009REAR: Real-Time Energy Aware Routing for Wireless Adhoc Micro Sensors Network.
Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar, Muhammad Zubair Aziz
2009Real Hardware Verification by Software for Bootstrap Using TSC.
Kunio Miyamoto, Hidehiko Tanaka
2009Realization of Intelligent Dynamic Topology Management in Next Generation Network.
Cong Wu, Shiguo Xu
2009Reducing Program Environment Misjudgement on VM Detection Using TSC.
Kunio Miyamoto, Hidehiko Tanaka
2009Reliability and Dependability Modeling and Analysis of Dynamic Aspects in Complex Systems.
Salvatore Distefano
2009Replica Placement in Multi-tier Data Grid.
Qaisar Rasool, Jianzhong Li, Shuo Zhang
2009Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform.
Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang
2009Research of Fingerprint Image Quality Estimation.
Yulan Zhao, Chunfeng Jiang, Xiufeng Fang, Bin Huang
2009Research of Fingerprint Recognition.
Chunfeng Jiang, Yulan Zhao, Wei Xu, Xiangping Meng
2009Research of Summarization Extraction in Multiple Topics Document.
Tao Liao, Zongtian Liu
2009Research on Component-Based Model Driven Architecture Development and Assembly.
Fei Chen, Wan-hua Cao, Yong Huang
2009Research on Network Flow Evaluation Benchmark Model.
Zhou Jian, Hu Longmao, Zhou Yanran
2009Research on One Intelligent Prediction Method for Water Bloom.
Xiaoyi Wang, Zaiwen Liu, Shiping Zhu, Jun Dai, Chenling Zhu, Minghua Yang
2009Research on Parallelization of Aspect-Oriented Program.
Tengfei He, Xiaoguang Mao
2009Research on Secure and Reconfigurable Architecture Based on Embedded Hardware.
Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang
2009Research on Social Relation Extraction of Web Persons.
Tian Gan, Qian Mo
2009Research on the Application of Expert Knowledge Map Based on Social Network Analysis.
Tong Liu, Yanqin Shi, Chensheng Wu
2009Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless Networks.
Chunmei Chen, Hong Jiang, Shi-en Yang
2009Robust Medical Data Delivery for Wireless Pervasive Healthcare.
Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy
2009Robust and Fast Keypoint Recognition Based on SE-FAST.
Xueting Tan, Xubo Yang, Shuangjiu Xiao
2009Routing on Shortest Pair of Disjoint Paths with Bandwidth Guaranteed.
Hongze Leng, Meilian Liang, Junqiang Song, Zheng Xie, Jun Zhang
2009Runtime Safety Models in Open Systems of Systems.
Daniel Schneider, Mario Trapp
2009SRD-DFA: Achieving Sub-rule Distinguishing with Extended DFA Structure.
Gao Xia, Xiaofei Wang, Bin Liu
2009Salmon: Precise 3D Contours in Real Time.
Tariq Khan, John Morris, Khurram Jawed, Georgy L. Gimel'farb
2009Securing Session Initiation Protocol in Voice over IP Domain.
Iyad Alsmairat, Rajan Shankaran, Mehmet A. Orgun, Eryk Dutkiewicz
2009Security Analysis of NSSK Protocol and its Improvement.
Junguo Liao, Bin Zhu, Yong He
2009Semantic Web Services Composition Model Based on Domain Ontology Cost Graph.
Wu Chongyun, Wen Jun
2009Similarity Computation Using Reconfigurable Embedded Hardware.
Darshika G. Perera, Kin Fun Li
2009Solving Aircraft-Sequencing Problem Based on Bee Evolutionary Genetic Algorithm and Clustering Method.
Siliang Wang
2009Study on Buffer Optimal Control Algorithm Based on Infinitesimal Perturbation Analysis for Broadband Satellite Networks.
Lei Wang, Ning He
2009Synthesis and Analysis in Artificial Intelligence: The Role of Theory in Agent Implementation.
Roxanne B. Raine, Rieks op den Akker, Zhiqiang Cai, Arthur C. Graesser, Danielle S. McNamara
2009TCBC: Trap Caching Bounds Checking for C.
Yoshitaka Arahori, Katsuhiko Gondow, Hideo Maejima
2009The Optimal Design of Tree Structure Based on Ant Colony of Wireless Sensor Networks Routing.
Gang Hu, Pan Zhang, Wei Zhang
2009Toward an Understanding of User-Defined Conditional Preferences.
Zhiyong Yu, Zhiwen Yu, Xingshe Zhou, Yuichi Nakamura
2009Towards Integrated Simulation of Cyber-Physical Systems: A Case Study on Intelligent Water Distribution.
Jing Lin, Sahra Sedigh, Ann Miller
2009Using Nature to Best Clarify Computer Security and Threats.
George S. Oreku, Fredrick Mtenzi
2009VDE: Seamless Mobility on Desktop Environment.
Xiaofei Liao, Xianwen Chen, Hai Jin, Zongfen Han
2009Verification of a Lock-Free Implementation of Multiword LL/SC Object.
Hui Gao, Yan Fu, Wim H. Hesselink
2009Water-Bloom Medium-Term Prediction Based on Gray-BP Neural Network Method.
Shiping Zhu, Zaiwen Liu, Xiaoyi Wang, Jun Dai
2009Web Service Selection Algorithm Based on Particle Swarm Optimization.
Hong Xia, Yan Chen, Zengzhi Li, Haichang Gao, Yanping Chen
2009World Models and Technologies of Psychological Impact to Resolve International Conflicts.
A. V. Manoilo