default search action
2. CCIS 2012: Hangzhou, China
- 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2012, Hangzhou, China, October 30 - November 1, 2012. IEEE 2012, ISBN 978-1-4673-1857-0
- Xue Li, Junping Du, Lingling Zi, Katsunori Shimohara:
Study and implementation of personalized searching system based on user's interest model. 1-5 - Song Bi, Dehui Sun, Liqun Han, Zhe Dong, Zhenwu Lei:
Research on method of feature extraction and recognition of road condition from nighttime video without vehicle segmentation. 6-10 - Yun Zhang, Junping Du, Jangmyung Lee:
A new fast interpolation method based on edge extraction. 11-15 - Haoyang Chen, Yasukuni Mori, Ikuo Matsuba:
Archive-shared cooperative coevolutionary algorithm using Nash equilibria preservation. 16-20 - Benjie Lu, Zhiqing Liu, Hui Gao:
An adaptive prolog programming language with machine learning. 21-24 - Jianan Wu, Chunguang Zhou, Zhangxu Li, Xuefei Xia, Seng Zhang, You Zhou:
A novel algorithm for generating simulated genetic data based on K-medoids. 25-28 - Liyun Ru, Anhui Wang, Yingying Wu, Shaoping Ma:
Auto-scaled Bayesian browsing model in massive data. 29-33 - Xinjian Zhuo, Jinrui Han, Jincheng Han:
Network coding link optimization problems based on genetic and particle swarm algorithm. 34-37 - Jiali Bian, Lin Liu, Jian Kuang:
An Android-based distributed test data acquisition intelligent system for mobile network optimization. 38-42 - Nan Zhao, Yuan Dong, Jiwei Zhang, Xiaofu Chang:
Color-based maximally stable extremal region for sports genre categorization. 43-46 - Hongying Zhang, Zheng Hu:
Research on civil aviation aircraft registration number recognition. 47-51 - Hanwen Li, Yi Wan, Guanghui Ma:
A fast collision detection method for clothing animation. 52-55 - Shuisheng Liu, Yuan Dong, Wei Liu, Jian Zhao:
Multi-view face detection based on cascade classifier and skin color. 56-60 - Yuxia Sun, Yajie Wang, Fei Li:
Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo. 61-64 - Wanliang Wang, Minqian Liu, Xin Wang:
Multi-characters interaction based on honeycomb. 65-69 - Yu Dai, Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang:
PCA-based dimensionality reduction method for user information in Universal Network. 70-74 - Zhe Li, Weiqing Sun, Lingfeng Wang:
A neural network based distributed intrusion detection system on cloud platform. 75-79 - Lisha Hou, Junping Du, Lingling Zi, Min Zuo, Katsunori Shimohara:
Image scaling method based on protected region. 80-84 - Yahao Yan, Junping Du, Qingping Li, Min Zuo, JangMyung Lee:
Multi-focus image fusion algorithm based on NSCT. 85-89 - Yan Peng, Tian Zhou:
Research on the Apriori algorithm in extracting the key factor. 90-93 - Shangfei Wang, Peijia Shen, Zhilei Liu:
Facial expression recognition from infrared thermal images using temperature difference by voting. 94-98 - Min Jin, Huaxiang Lu:
Parallel particle swarm optimization with genetic communication strategy and its implementation on GPU. 99-104 - Yingyou Chen, Qing Wu:
Micro-blog category based on feature-words category dispersion. 105-108 - Bin Xie, Qing Wu:
HMM-based Tri-training algorithm in human activity recognition with smartphone. 109-113 - Yan Shi, Qin Wang, Huiyan Zhang:
Hybrid ensemble PSO-GSO algorithm. 114-117 - Qin Wang, Yan Shi, Guangping Zeng, Xuyan Tu:
Improving global optimization ability of GSO using ensemble learning. 118-121 - Qing Wu, Zhenbang Li:
An adaptive service selection approach in mobile environment. 122-126 - Zheng Wang, Jingling Zhang, Wanliang Wang:
Using GA-based simulation to cooperative climate strategy of climate game problem. 127-131 - Jiajia Zhang, Xuan Wang, Ling Yang, Jia Ji, Dongsheng Zhi:
Analysis of UCT algorithm policies in imperfect information game. 132-137 - Yue Liu, Liu Yang, Zaixia Teng, Junjun Gao:
Demand forecasting method based on adjacent substitution rate estimation by GA. 138-142 - Chunming Wei, Yingchun Yang:
Mandarin isolated words recognition method based on pitch contour. 143-147 - Zhenshan Hou, Mingliang Cui, Ping Li, Liuliu Wei, Wenhao Ying, Wanli Zuo:
Session segmentation method based on COBWEB. 148-153 - Xiao Yang, Zhen Tian, Huayang Cui, Zhaoxin Zhang:
Link prediction on evolving network using tensor-based node similarity. 154-158 - Xin Wang, Qing Ma, Wanliang Wang:
Kinect driven 3D character animation using semantical skeleton. 159-163 - Ming-Wen Shao, Min Liu, Jinghua Hao:
Attribute characteristics of combined formal contexts. 164-169 - Bo Li, Zhengcai Cao, Min Liu, Jinghua Hao:
Approach to complex hydrogen reactor optimization modeling based on ANFIS. 170-175 - Fangfang Qu, Dong Ren, Xiaobo Liu, Zhenyu Jing, Lin Yan:
A face image illumination quality evaluation method based on Gaussian low-pass filter. 176-180 - Yingying Jiang, Feng Tian, Hongan Wang, Guozhong Dai:
Combining hand-drawn concept maps with RFID tags. 181-184 - Shengguo Chen, Zhengxing Sun, Jie Zhou, Yi Li:
Semi-supervised image segmentation combining SSFCM and Random Walks. 185-190 - Minghao Yang, Jianhua Tao, Hao Li, Kaihui Mu:
Multimodal emotion estimation and emotional synthesize for interaction virtual agent. 191-196 - Qinyan Zhang, Li Shi:
3D face model reconstruction based on stretching algorithm. 197-200 - Qing Tian, Rong Wang:
The research of intelligent method for blurring image reconstruction. 201-205 - Ruimei Zhang, Changcheng Liu, Chuandui Wang:
Research on connect 6 programming based on MTD(F) and Deeper-Always Transposition Table. 206-208 - Chao Zou, Yueming Lu, Fangwei Zhang, Songlin Sun:
Load-based controlling scheme of virtual machine migration. 209-213 - Jian Li, DanJie Song, Sicong Chen, Xiaofeng Lu:
A simple fully homomorphic encryption scheme available in cloud computing. 214-217 - Ya-Wei Zhao, Yong Wang:
Partition-based cloud data storage and processing model. 218-223 - Jian Li, Sicong Chen, DanJie Song:
Security structure of cloud storage based on homomorphic encryption scheme. 224-227 - Yongkang Fu, Bin Sun:
A scheme of data confidentiality and fault-tolerance in cloud storage. 228-233 - Chao Dong, Bolun Huang, Zhenming Lei, Jie Yang:
Chinese Multimedia Messaging Service (MMS) analysis using hadoop. 234-239 - Yulong Ren, Wen Tang:
A service integrity assurance framework for cloud computing based on MapReduce. 240-244 - Han Qian, Qiaoyan Wen:
A cloud-based system for enhancing security of Android devices. 245-249 - Yang Yu, Qiaoyan Wen:
The design of the cloud mobile OA system. 250-254 - Jinglong Lv, Yong Zhang, Yinglei Teng, Yang Liu, Yihai Xing:
The research on distributed storage mechanism used in clustered opportunistic network. 255-259 - Zhaohai Zhang, Qiaoyan Wen:
An authorization model for multi-tenancy services in cloud. 260-263 - Minxian Xu, Wenhong Tian:
An online load balancing scheduling algorithm for cloud data centers considering real-time multi-dimensional resource. 264-268 - Wenhong Tian, Chee Shin Yeo, Ruini Xue, Yuanliang Zhong:
Power-aware scheduling of real-time virtual machines in cloud data centers considering fixed processing intervals. 269-273 - Wenfang Zhao, Fei Gao:
Design of dynamic fine-grained role-based access control strategy. 274-278 - Xiuqin Lin, Zhonghan Du, Juan Yang:
The simple optimization of WLC algorithm based on LVS cluster system. 279-282 - Xiaowei Li, Hongxiang Sun, Qiaoyan Wen:
An approach for secure-communication between XEN virtual machines. 283-286 - Zhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu:
Multi-domain cloud social network service platform supporting online collaborations on campus. 287-291 - Zhen Xu, Aimin Yu, Wensi Yang:
Real-time remote attestation of IaaS cloud. 292-297 - Sarawut Ramjan:
Flexible security rule-based system on cloud service for e-travel agent. 298-302 - Juan Yang, Han Du, Bin Wu, Xinxin Ge:
The research and design of parallel recommendation algorithm based on mapreduce. 303-307 - Lingyun Wei, Shuo Qi:
Three-staged cloud computing service supply chain coordination by combined contract. 308-312 - Xu Wu, Xiaqing Xie, Chunwen Li:
Research and implementation of a role-based trustworthiness mechanism for IaaS. 313-317 - Yashi Wang, Lijuan Min, Hanhua Lu:
A functional framework for software and system of systems method. 318-322 - Jianjun Xie, Junling Huang, Fang Qian, Jianjun Yu:
Towards universal cloud service for distributed large scale scientific data. 323-327 - Yongzheng Ma, Xiaomeng Lu, Zhengyi Shao, Hongwei Yang, Kai Nan:
Towards a collaboration cloud for astronomical observations. 328-332 - Cao LeThanhMan, Makoto Kayashima:
Desktop workload characteristics and their utility in optimizing virtual machine placement in cloud. 333-337 - Rui Ye, Qing Wu:
SOA based cloud computing trust model research with a curve fitting method. 338-343 - Wasin Treesinthuros:
E-commerce transaction security model based on cloud computing. 344-347 - Yeqiao Wang, Chunxiao Fan, Zhigang Wen:
A study for task time performance dynamic prediction model in cloud resource scheduling. 348-353 - Dexin Cui, Guoliang Chen, Yinlong Xu, Gaifan Li:
A scalable and efficient multicast system for data center. 354-359 - Yannong Huang, Yiqing Yang, Mike Rossi, Bin Xu:
Towards a unified architecture of cloud service delivery platform. 360-364 - Zhongzhi Shi, Guang Jiang, Bo Zhang, Jinpeng Yue, Xiaofei Zhao:
Cross-media cloud computing. 365-370 - Zhichao Cao, Qing Li, Ze-Yuan Wang, Weihua Li, Jun Li, Ruiyang Du:
A cloud computing based framework of group-enterprise service integration and sharing. 371-375 - Yujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang:
Distributed agent based cooperative differential evolution: A master-slave model. 376-380 - Xin Wang, Hongming Zhu, Qin Liu, Xiaowen Yang, Jiakai Xiao:
Performance evaluation on data reconciliation algorithm in distributed system. 381-385 - Zhou Lei, Jinfeng Xiang, Zhebo Zhou, Feng Duan, Yu Lei:
A multi-objective scheduling strategy based on MOGA in cloud computing environment. 386-391 - Xiang Li, Xiaohong Jiang, Peng Huang, Kejiang Ye:
DartCSim: An enhanced user-friendly cloud simulation system based on CloudSim with better performance. 392-396 - Bernd Zwattendorfer, Arne Tauber:
Secure cloud authentication using eIDs. 397-401 - Tongrang Fan, Feng Zhao, Feng Gao:
Research on cloud resource economics management model based on Internet Innovation Union. 402-406 - Qinyun Dai, Haijun Yang, Qinfeng Yao, Yaliang Chen:
An improved security service scheme in mobile cloud environment. 407-412 - Zhengqiu Yang, Tong Li, Jiapeng Xiu, Chen Liu:
An optimized load algorithm of parallel data warehouse based on the cloud computing platform. 413-417 - Chen Liu, Shan Yang, Jiapeng Xiu, Zhengqiu Yang:
The interest community mining method of social network based on the weak association rules. 418-421 - Jingyi Gong, Kaifeng Han:
A method to ensure data security in e-business cloud. 422-425 - Yong Zhang, Xiangxue Li, Haifeng Qian:
An anonymous remote attestation for trusted cloud computing. 426-429 - Lingyun Wei, Shenghui Zhai:
Coordination mechanism with quantity discount contract for cloud service supply chain. 430-434 - Han Li, Qiuxin Wu:
A distributed intrusion detection model based on cloud theory. 435-439 - Xiaoni Wang, Xuedong Gao:
The research of a resource-aware cloud computing architecture based on web security. 440-443 - Wei Chen, Qiaoyan Wen:
An architecture for dynamic management and monitoring of virtual machines. 444-448 - Chunge Zhu, Xinran Liu, Yixian Yang, Hong Zhang, Qianhua Xu:
A trust mechanism in Internet-Based Virtual Computing Environment. 449-453 - Xiuwen Wang, Shoufeng Cao, Lihong Wang:
Research and implementation on an admission control policy for temporally correlated workloads in virtual application environments. 454-458 - Yexia Cheng, Yuejin Du, Junfeng Xu, Chunyang Yuan, Zhi Xue:
Research on security evaluation of cloud computing based on attack graph. 459-465 - Hui Zhang, Ke Xu:
A dynamic aware-feedback system for service replica management. 466-470 - Guangjun Wu, Yanqin Zhang, Dongan Wang, Shupeng Wang, Ming Chen:
The data reliability techniques in BC-KVDB. 471-475 - Feng Xie, Yong Peng, Wei Zhao, Dongqing Chen, Xiaoran Wang, Xingmei Huo:
A risk management framework for cloud computing. 476-480 - Hong Zhang, Xinran Liu, Chunge Zhu, Qian Liu:
An integrated runtime monitoring method for Internet-Based Virtual Computing Environment. 481-487 - Zhengqiu Yang, Meiling Liu, Jiapeng Xiu, Chen Liu:
Study on cloud resource allocation strategy based on particle swarm ant colony optimization algorithm. 488-491 - Xin Pan, Suli Zhang:
A remote sensing image cloud processing system based on Hadoop. 492-494 - Yidong Cui, Fuquan Sun:
A model for collecting virtual machine usage in cloud computing environment. 495-498 - Feng Ye, Zhijian Wang, Zhenyu Yue, Xinkun Xu, Yuansheng Lou:
CloudUDDI: An extended UDDI model for cloud services. 499-503 - Jie Liu, Fang Liu, Dazhong He:
The identification for P2P Thunder traffic based on deep flow identification. 504-507 - Junfeng Xu, Wei Zhang, Bo Sun:
RCSA-P: A remote control system architecture with high scalability. 508-513 - Weitao Wang, Yuehui Jin, Tan Yang, Yidong Cui:
A video quality assessment method using subjective and objective mapping stategy. 514-518 - Xixi Gong, Yuehui Jin, Yidong Cui, Tan Yang:
Web visualization of distributed network measurement system based on HTML5. 519-523 - Wei Chen, Qiaoyan Wen, Bohou Li:
A propagation model of passive social network worm. 524-528 - Yanan Zhao, Xiangyang Gong, Wendong Wang, Xirong Que:
A rate adaptive algorithm for HTTP streaming. 529-532 - Jianying Liu, Wendong Wang, Xiangyang Gong, Xirong Que, Hao Yang:
A hybrid model based on Kalman Filter and neutral network for traffic prediction. 533-536 - Lulin Jiao, Yan Peng:
Research and implementation of social hot topic detection system based on mirco-blog. 537-542 - Zhi Ren, Jian Zhang, Jibi Li, Hongjiang Lei:
An effective hybrid routing algorithm for opportunistic networks. 543-547 - Wei Li, Wei Jiao, Guangye Li:
A location privacy preserving algorithm for mobile LBS. 548-552 - Liang Guo, Xirong Que, Yidong Cui, Wendong Wang, Shiduan Cheng:
A hybrid social search model based on the user's online social networks. 553-558 - Qiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen:
A content delivery strategy based on resource popularity for P4P architecture. 559-562 - Jiaxi Di, Ke Yu, Xiaofei Wu, Sixi Su:
A novel complex network model for Internet traffic flows. 563-567 - Hengkui Wu, Meixia Duan, Yaping Hu, Siyun Bao:
Sybil-proof ID-to-locator mapping in one hop. 568-571 - Shen Yan, Ze Zong, Yan Ma, Qin Zhao:
The optional routing optimization strategy of Distributed Mobility Management. 572-577 - Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang:
The location selection for CCN router based on the network centrality. 568-582 - Jinxiu Yu, Yueming Lu, Fangwei Zhang, Songlin Sun:
A metric for measuring web search results satisfaction incorporating user behavior. 583-586 - Zhanchun Gao, Yuying Liang, Yanjun Jiang:
Implement of item-based recommendation on GPU. 587-590 - Zhengqiu Yang, Xiaozhe Huang, Jiapeng Xiu, Chen Liu:
SocialRank: Social network influence ranking method. 591-595