default search action
ISCTCS 2014: Beijing, China
- Yueming Lu, Xu Wu, Xi Zhang:
Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers. Communications in Computer and Information Science 520, Springer 2015, ISBN 978-3-662-47400-6 - Shuai Zhang, Yueming Lu, Xi Zhang:
Cache Replacement Improving Based on User Group Interest Degree. 1-7 - Xiaodong Yan:
A Uighur Automatic Summarization Method Based on Sub-theme Division. 8-15 - Yan Shao, Yanbing Liu, Jianlong Tan:
Accelerating DFA Construction by Parallelizing Subset Construction. 16-24 - Yi Zheng, Weihong Han, Chengzhang Zhu:
A Novel Feature Selection Method Based on Category Distribution and Phrase Attributes. 25-32 - Fan Yang, Yue Li, Lidong Zhai:
RayDroid: A Framework for Discovering Anomaly in Android. 33-40 - Qian Li, Weiguo Wu, Liang Gao, Lei Wang, Jianhang Huang:
A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering System. 41-47 - Jing Li, Yueming Lu, Xi Zhang:
Extracting News Information Based on Webpage Segmentation and Parsing DOM Tree Reversely. 48-55 - Huailiang Peng, Majing Su, Qiong Dai, Jianlong Tan:
Enhancing Security and Robustness of P2P Caching System. 56-64 - Qipeng Yao, Chuan Zhou, Linbo Xiang, Yanan Cao, Li Guo:
Minimizing the Negative Influence by Blocking Links in Social Networks. 65-73 - Qiuwen Lu, Zhou Zhou, Hongzhou Sha, Qingyun Liu, Hongcheng Sun:
Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System. 74-82 - Weiwei Feng, Peng Wang, Chuan Zhou, Yue Hu, Li Guo:
Nonparametric Topic-Aware Sparsification of Influence Networks. 83-90 - Xiaomei Liu, Yong Sun, Liang Fang, Junpeng Liu, Lingjing Yu:
A Survey of Network Traffic Visualization in Detecting Network Security Threats. 91-98 - Dong Cui, Chuanyi Liu, Meiqi Yang, Jincui Yang:
Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds. 99-106 - Heng Chen, Xiaoshe Dong:
Web-Based Heatmap of Physical Machines in Cloud Computing. 107-113 - Xu Bai, Lei Jiang, Xinxing Liu, Jianlong Tan:
RSA Encryption/Decryption Implementation Based on Zedboard. 114-121 - Xin He, Huiyun Jing:
Security Risk Assessment of Rich Communication Services Over LTE. 122-128 - Yan Chen, Yiguo Pu, Xiaojun Chen, Jinqiao Shi, Xiaojie Yu:
CAS: Content Attribution System for Network Forensics. 129-136 - Xuefeng Du, Xiaodong Yan:
Tracking and Analysis of Hot Words and Posts for University Campus. 137-143 - Yunxue Yang, Shuyuan Jin, Xiaowei He:
Software Vulnerability Severity Evaluation Based on Economic Losses. 144-151 - Xinmin Jiang, Lirong Qiu, Yeqing Li:
A Tibetan Word Sense Disambiguation Method Based on HowNet and Chinese-Tibetan Parallel Corpora. 152-159 - Baohui Li, Kefu Xu, Chuang Zhang, Yue Hu:
SFAPCC: A Secure and Flexible Architecture for Public Cloud Computing. 160-165 - Zilu Zhang, Jinqiao Shi, Lanlan Hu:
Towards Enumeration of NTFS Using USN Journals Under UEFI. 166-174 - Wei Li, Feng Cao:
Trusted Cloud Service Certification and Evaluation. 175-182 - Linghan Li, Yonghua Li, Jiaru Lin, Tianle Zhang:
Enhanced AllJoyn Network with Centralized Management. 183-188 - Hongjie Huang, Shuqiang Yang:
A Method of Evaluating Distributed Storage System Reliability. 189-196 - Xiaowei He, Shuyuan Jin, Yunxue Yang, Huiqiang Chi:
DDoS Detection Based on Second-Order Features and Machine Learning. 197-205 - Na Ye, Lili Dong, Genqing Bian, Jian Li:
Construction of Software and Hardware Resource Pool in Data Center Using Virtualization. 206-212 - Jiqiang Tang, Xiaoxiang Zou, Dongbin Wang:
Design and Performance Analysis of Utility Maximization-Based Cooperative MAC in Multi-rate WiFi Networks. 213-220 - Bin Jia, Zhaowen Lin, Yan Ma:
Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune System. 221-228 - Tianle Zhang, Lixin Liu, Shouyou Song, Yuyu Yuan:
Human Mobility Simulation in Smart Energy Grid. 229-237 - Yuan Jie, Liu Zhishuai, Xiaoyu Qiu:
Community Detection in Complex Networks: Algorithms and Analysis. 238-244 - Axel Rennoch, Marc-Florian Wendland, Andreas Hoffmann, Martin A. Schneider:
Advanced Test Modelling and Execution Based on the International Standardized Techniques TTCN-3 and UTP. 245-252 - Jørgen Bøegh:
Understanding Human Goal Setting as a Means for Supporting Goal Oriented Requirements Engineering. 253-259 - Zeng Guang, Yao Lin, Zhao Ming, Ma Yilan:
The Improvement and Implementation of iSLIP Algorithm Based on FPGA. 260-266 - Huimin Gao, Zeng Guang:
The Optimization Design of High Q Microwave Photonic Filters Based on Cascade Fiber Bragg Gratings. 267-273 - Ma Yilan, Yao Lin, Zeng Guang, Matturdi Bardi:
The Implementation of GFP Protocol Based on EOS in FPGA. 274-280 - Ling Xu, Yueyun Chen, Zheng Gong:
An Improving Algorithm for Combined Input-Crosspoint-Queued Switches. 281-287 - Hui Zhao, Yueyun Chen, Xiaopan Yuan:
A New Network Coding Scheme in Two-relay OFDMA Networks. 288-294 - Hongzhou Sha, Xiaoqian Li, Qingyun Liu, Zhou Zhou, Liang Zhang, Lidong Wang:
RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network. 295-303 - Chao Ding, Mingxia Zeng, Kui Wang, Polo Pei, Zhongzhi Luan, Depei Qian:
An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring Systems. 304-310 - Danfeng Zhu, Rui Wang, Zhongzhi Luan, Depei Qian, Han Zhang, Jihong Cai:
Memory Centric Hardware Prefetching in Multi-core Processors. 311-321 - Lin Ye, Zhongzhi Luan, Hailong Yang:
Performance-Aware Based Correlated Datasets Replication Strategy. 322-327 - Xi Zhang, Guanhong Jiang, Yuan Su:
Monitoring Social Events on Sina Weibo. 328-335 - Yibo Xie, Zhongzhi Luan:
Information Integration of Heterogeneous Employment Service Information of College Graduates. 336-341 - Quan Bai, Gang Xiong, Yong Zhao:
Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic Measurement. 342-349 - Xu Wu, Yue Fan, Xi Zhang, Jin Xu:
Research of eID Mobile Identity Authentication Method. 350-358 - Krishna Moniz, Yuyu Yuan:
Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User Registration. 359-369 - Xu Wu, Weiyi Zhang, Xi Zhang, Jin Xu:
A Method to Build and Expand the Domain Dictionary Automatically Based on WordNet. 370-381 - Jincui Yang, Yuyu Yuan, Tianle Zhang:
Research on Modeling of Software Automatic Test. 382-388 - Xu Wu, Jiada Shi, Xiaqing Xie:
The Design and Implementation of APK eBooks Online Generation System Based on FBReader. 389-400 - Xu Wu, Pengchong Li, Jin Xu, Xiaqing Xie:
Domain-Specific Semantic Retrieval of Institutional Repository Based on Query Extension. 401-411
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.