


default search action
3PGCIC 2014: Guangdong, China
- 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4171-1

- Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada:

New Evaluation Criterion of File Replicas Placement for Replication Strategies in Data Grids. 1-8 - Zijing Cheng, Lei He, Jingling Zhao, Kai Lin, Baojiang Cui:

A Security Enhanced IEEE1588 Protocol for Deep-Space Environment. 9-13 - Lequn Mo, Fuyong Lin:

A Dynamic Re-encrypted Ciphertext-Policy Attributed-Based Encryption Scheme for Cloud Storage. 14-19 - Christian Esposito

, Massimo Ficco, Francesco Palmieri
, Vincenzo Loia:
On Reliability and Security in Knowledge Grids. 20-27 - Hang Yang, Fuzheng Zhang, Aidong Xu, Cai Yuan, Chuanlin Chen:

A Method to Predict the Intermittent Power by Classification Model. 28-33 - Hang Yang, Aidong Xu, Huajun Chen, Cai Yuan:

A Review: The Effects of Imperfect Data on Incremental Decision Tree. 34-41 - Huajun Chen, Hang Yang, Aidong Xu, Cai Yuan:

A Decision Support System Using Two-Level Classifier for Smart Grid. 42-45 - Jorge Miguel

, Santi Caballé
, Fatos Xhafa, Josep Prieto
, Leonard Barolli:
A Collective Intelligence Approach for Building Student's Trustworthiness Profile in Online Learning. 46-53 - Xiaona Qiu, Qing Liao:

A Vertical Handoff Decision Algorithm Based on the Movement-Aware of Mobile Nodes. 54-61 - Yong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang

, Weiqi Chen
, Yuran Zeng:
Concept Drift Mining of Fundamental Variables in China Stock Market. 62-68 - Bo Song, Guoping Jiang, Yurong Song:

Epidemic Dynamics in Weighted Adaptive Networks. 69-73 - Chang-Ji Wang, Xi-Lei Xu, Dong-Yuan Shi, Wen-Long Lin:

An Efficient Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-receiver Identity-Based Encryption. 74-81 - Pietro Ruiu

, Olivier Terzo, Giuseppe Carlino
, Rossella Prandi
, Alberto Falzone, Paolo Maggi, Livia Torterolo, Enrico Usai, Gianpaolo Perego:
HPC Cloud Pills: On-Demand Deployment and Execution of HPC Application in Cloud Environments. 82-88 - Cristiana Voicu, Florin Pop, Ciprian Dobre

, Fatos Xhafa:
MOMC: Multi-objective and Multi-constrained Scheduling Algorithm of Many Tasks in Hadoop. 89-96 - Yuan Wang, Yongjun Wang, Jing Liu, Zhijian Huang:

A Network Gene-Based Framework for Detecting Advanced Persistent Threats. 97-102 - Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian

:
Improving Differential Evolution with Ring Topology-Based Mutation Operators. 103-109 - Chengxu Ye, Ping Yang, Shaopeng Liu:

Topic Detection in Chinese Microblogs Using Hot Term Discovery and Adaptive Spectral Clustering. 110-119 - Cheng Wang, Zhixiao Lin, Fangsheng Guotang, Lixiao Zheng, Zhigang Zhu:

Design and Implementation of WPF-based Mini OA System. 120-126 - Yanxiang Ling, Qing Liao:

Improved Recommendation System with Friends on SNS. 127-133 - Yang Chen, You Lin:

Multi-input Functional Encryption Based Electronic Voting Scheme. 134-138 - Guoheng Wei, Huanguo Zhang, Zheng Li:

Distance-Bounding Protocol with Time-Stamped Authentication for RFID. 139-145 - Bin Liang, Zhendong Wu, Lin You:

A Novel Fingerprint-Based Biometric Encryption. 146-150 - Zhengjun Jing

, Guoping Jiang, Chunsheng Gu:
A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps. 151-156 - Jia Yu:

The Analysis of Compressive Sensing Theory. 157-160 - Ling-Ling Xia, Guoping Jiang, Bo Song, Guanhua Zhu:

Rumor Spreading Model Considering the Importance and Fuzziness of Information. 161-166 - Jian Huang, Chunwei Liu

, Jinhui Qie:
Developing Map Matching Algorithm for Transportation Data Center. 167-170 - Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:

Static Compliance Checking beyond Separation of Duty Constraints. 171-178 - Huixia Luo, Guidong Zhang, Yongjun Shen, Jialin Hu:

Mixed Fruit Fly Optimization Algorithm Based on Lozi's Chaotic Mapping. 179-183 - Feng Dan, Yajie Ma, Fengxing Zhou, Shaowu Lu:

A Multi-attribute Vertical Handover Algorithm Based on Adaptive Weight in Heterogeneous Wireless Network. 184-188 - Xiaolong Liu, Qiang Wei, Ziwei Ye:

Static-Dynamic Control Flow Integrity. 189-196 - Hui Zeng, Liyan Xiong, Jianjun Chen:

The Chinese Conceptual Graph Matching Algorithm Based on Conceptual Sub-graph Weight Self-Adjustment. 197-200 - Hui Zeng, Jun Wang, Tao Wan:

Chinese Person Name Recognition Based on Naive Bayes. 201-204 - Yang Jing, Zeng Hui, Huang Jiangping:

Vinyl Acetate Polymerization Rate Prediction Based on FOA GNN. 205-208 - Jing Yang, Qi Zhu, Haizhou Xu:

An Improved Method of Interrogative Sentence Similarity Compute and Application in Q&A System. 209-212 - Wei Zhang:

Strain Sensitizing of High-Sensitivity SAW Sensor Based on FBG. 213-216 - Wei Zhang:

An Improved Image Encoding Algorithm Based on EZW and Huffman Joint Encoding. 217-220 - Yueshun He, Wei Zhang, Nan Jiang, Xiaoyan Luo:

The Research of Scale-Free Sensor Network Topology Evolution Based on the Energy Efficient. 221-226 - Yueshun He, Wei Zhang, Nan Jiang, Xiaoyan Luo:

The Research of Wireless Sensor Network Channel Propagation Model in the Wild Environment. 227-231 - Ping Pan, Xinyue Mao, Ping Yang, Huiling Zhou:

Reliability Analysis of Business Continuity Based on SPN in Information System Security Management. 232-236 - Ping Zhen, Geng Zhao, Lequan Min, Xiaodong Li:

A Survey of Chaos-Based Cryptography. 237-244 - Xiaoqian Zhang, Xiaoqing Tan, Cui Liang:

High Efficient Multi-party Quantum Secret Sharing Scheme. 245-250 - Xiaoqing Tan, Xiaoqian Zhang, Cui Liang:

Multi-party Quantum Secure Direct Communication. 251-255 - Qinshu Xiao, Wenan Zhou, Baojiang Cui, Lingrong Li:

An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters. 256-261 - Li Yong-Fei, Tian Li-Qin:

Comprehensive Evaluation Method of Reliability of Internet of Things. 262-266 - Jianhong Zhang, Weina Zeng:

Self-Certified Public Auditing for Data Integrity in Cloud Storage. 267-273 - Xiang-Zhan Yu, Haining Yu:

An Asynchronous Periodic Sequential Patterns Mining Algorithm with Multiple Minimum Item Supports. 274-281 - Lidia Ogiela, Marek R. Ogiela:

Computer-Aided Enterprise Management. 282-285 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:

Intelligent Bio-inspired Approach for Secrecy Management in the Cloud. 286-289 - Tomasz Hachaj

, Marek R. Ogiela:
Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface. 290-294 - Miroslaw Trzupek, Marek R. Ogiela:

Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image Retrieval. 295-299 - Philip Moore

, Tarik Qassem, Fatos Xhafa:
'NoSQL' and Electronic Patient Record Systems: Opportunities and Challenges. 300-307 - Tarik Qassem, George Tadros, Philip Moore

, Fatos Xhafa:
Emerging Technologies for Monitoring Behavioural and Psychological Symptoms of Dementia. 308-315 - Weiqi Chen

, Kang Liu, Lijun Su, Mei Liu, Zhifeng Hao, Yong Hu, Xiangzhou Zhang
:
Discovering Many-to-One Causality in Software Project Risk Analysis. 316-323 - Li-Xia Lei, Yuejin Zhang:

Photon Pulses based Heterodyne Detection Precision Ranging System. 324-328 - Hongyang Yan, Xuan Li, Jin Li:

Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing. 329-332 - Hongli Chen, Zhaohua Huang:

Medical Image Feature Extraction and Fusion Algorithm Based on K-SVD. 333-337 - Gansen Zhao, Libo Li, Zijing Li, Qiaoying Lin:

Multiple Nested Schema of HBase for Migration from SQL. 338-343 - Hongli Chen, ShanGuo Lv:

Adaptive Cloud Bandwidth Rental and Allocation Strategy. 344-349 - ShanGuo Lv, YiQin Cao:

An Algorithm of Video Network Transmission Based on Unbalanced Multiple Description Coding. 350-354 - Gansen Zhao, Qiaoying Lin, Libo Li, Zijing Li:

Schema Conversion Model of SQL Database to NoSQL. 355-362 - Jun Yang, Zheli Liu, Chunfu Jia, Kai Lin, Zijing Cheng:

New Data Publishing Framework in the Big Data Environments. 363-366 - Xiaoyi Zhou, Jixin Ma

, Wencai Du, Yihong Li:
A Dynamic Multiple Digital Watermarking Model based on Temporal Series. 367-371 - Li Qiang, Wenan Zhou, Baojiang Cui, Liu Na:

Security Analysis of TAU Procedure in LTE Network. 372-376 - Li-Xia Lei, Yuejin Zhang:

Design of a New EPON Connection Automatic Protection System. 377-381 - Dan Zou, Yan Mei:

All-Optical Signal Processing with New DPSK Based on Multi-dimensional Complex. 382-385 - Lishan Ke, Zhiqiang Lin:

Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences. 386-389 - ShanGuo Lv, Hongli Chen:

Research of Trust Model Personalized Dynamic Recommendation System Based on Auction Mechanism. 390-393 - Ugo Gentile

, Stefano Marrone
, Nicola Mazzocca
, Roberto Nardone
:
A Cost-Energy Trade-Off Model in Smart Energy Grids. 394-399 - Mario Sicuranza

, Mario Ciampi
:
A Semantic Access Control for Easy Management of the Privacy for EHR Systems. 400-405 - Flora Amato

, Francesco Moscato:
A Modeling Profile for Availability Analysis of Composite Cloud Services. 406-413 - Mario Barbareschi

, Alessandra De Benedictis
, Antonino Mazzeo
, Antonino Vespoli:
Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware Accelerators. 414-419 - Anita Alicante, Massimo Benerecetti

, Anna Corazza
, Stefano Silvestri
:
A Distributed Information Extraction System Integrating Ontological Knowledge and Probabilistic Classifiers. 420-425 - Aniello Minutolo

, Angelo Esposito
, Mario Ciampi
, Massimo Esposito
, Giorgio Cassetti:
An Automatic Method for Deriving OWL Ontologies from XML Documents. 426-431 - Flora Amato

, Annibale Elia, Alessandro Maisto
, Antonino Mazzeo
, Serena Pelosi:
Automatic Population of Italian Medical Thesauri: A Morphosemantic Approach. 432-436 - Daniela D'Auria, Dario Di Mauro, Davide Maria Calandra, Francesco Cutugno

:
Interactive Headphones for a Cloud 3D Audio Application. 437-442 - Jie Ma, Haiyang Yu, Xiaoli Gong, Xiaoyu Zhang:

Research on Online Measurement Method of Smartphone Energy Consumption. 443-447 - Ran Li, Qingqing Liu, Mingqiang Wang, Xianglin We:

A Novel Framework for Application of Cloud Computing in Wireless Mesh Networks. 448-452 - Xiaoli Gong, Qi Du, Xu Li, Jin Zhang, Ye Lu:

Performance Overhead of Xen on Linux 3.13 on ARM Cortex-A7. 453-456 - Guomin Zhang, Chao Hu, Na Wang, Xianglin Wei, Chang-you Xing:

GMCR: A Novel Scheme for Improving Quality of Service of Live Streaming. 457-462 - Xianglin Wei, Jianhua Fan, Ming Chen, Guomin Zhang:

A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems. 463-468 - Qingcheng Li, Ye Lu, Xiaoli Gong, Jin Zhang:

Optimizational Method of HBase Multi-dimensional Data Query Based on Hilbert Space-Filling Curve. 469-474 - Bing Zhao, Ziyue Wang, Baojiang Cui, Xiaobing Liang:

An Enhanced Secure Mechanism of Low Level Reader Protocol (LLRP) V1.1. 475-480 - Haifeng Jin, Baojiang Cui, Jianxin Wang:

Mining Mobile Internet Packets for Malware Detection. 481-486 - Baojiang Cui, Baolian Long, Tingting Hou:

Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language. 487-491 - Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu:

Program Crash Analysis Based on Taint Analysis. 492-498 - Jingling Zhao, Huiyun Zhang, Baojiang Cui:

Sentence Similarity Based on Semantic Vector Model. 499-503 - Shuai Shao, Guowei Dong, Tao Guo, Tianchang Tang, Chenjie Shi:

Analysis on Password Protection in Android Applications. 504-507 - Xiaobing Liang, Yingjie Lv, Bing Zhao, Ying Liu, Zhiqiang Sun, Wei Cen:

A RFID Mutual Authentication Security Protocol Design and Analysis. 508-512 - Yongle Hao, Hongliang Liang, Daijie Zhang, Qian Zhao, Baojiang Cui:

JavaScript Malicious Codes Analysis Based on Naive Bayes Classification. 513-519 - Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng:

OpenSSL HeartBleed: Security Management of Implements of Basic Protocols. 520-524 - Yanyan Han, Wencai He, Shuai Ji, Qing Luo:

A Digital Watermarking Algorithm of Color Image based on Visual Cryptography and Discrete Cosine Transform. 525-530 - Xue Qiu, Qiong Jia, Shuguang Wang, Chunhe Xia, Liangshuang Lv:

Automatic Generation Algorithm of Penetration Graph in Penetration Testing. 531-537 - Mengru Cai, Zhendong Wu, Jianwu Zhang:

Research and Prevention of Rogue AP Based MitM in Wireless Network. 538-542 - Binbin Yu, Jianwu Zhang, Zhendong Wu:

Improved EAP-AKA Protocol Based on Redirection Defense. 543-547 - Xi Shi:

A Statistical Integrity Authentication Scheme without Grouping for Streaming Data. 548-552 - Fuqiang Di, Minqing Zhang, Jia Liu:

Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis. 553-558 - Wang Ying:

Encrypted Botnet Detection Scheme. 559-565 - Hui Li, Xin Lu:

Challenges and Trends of Big Data Analytics. 566-567 - Yonglin Sun, Yongjun Wang, Xiaobin Wang:

Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves? 568-572 - Yusuke Gotoh, Akihiro Kimura:

Evaluation of Division Based Broadcasting System Considering Additional Information. 573-578 - Yuzo Taenaka, Masaki Tagawa, Kazuya Tsukamoto:

Experimental Deployment of a Multi-channel Wireless Backbone Network Based on an Efficient Traffic Management Framework. 579-584 - Roy Fisher, Gerhard P. Hancke

:
DTLS for Lightweight Secure Data Streaming in the Internet of Things. 585-590 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:

A Study of Robustness Enhancement Technique on P2P Sensor Data Stream Delivery System Using Distributed Hashing. 591-596 - Yoshimasa Ishi, Tomoya Kawakami, Tomoki Yoshihisa, Yuuichi Teranishi:

An Evaluation of a P2P Sensor Data Streaming System Considering the Number of Hops on the PIAX Testbed. 597-602 - Zhengrong Wu, Aidong Xu, Tao Zhang, Chuanlin Chen:

Integrated Technical Planning for Regional Smart Grid. 603-608 - Dan Zou, Yuejin Zhang:

WDM-PON Breakpoint Precision Detection System Based Broadband Chaos Light. 609-615 - Yuxin Ding, Wei Dai, Yibin Zhang, Chenglong Xue:

Malicious Code Detection Using Opcode Running Tree Representation. 616-621 - Qiu-Yu Zhang

, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform. 622-627 - Xiang Lu, Jianxun Liu:

Performance of Space Network Time Synchronization Protocol in Proximity Link. 628-632

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














