


default search action
4. CCIS 2016: Beijing, China
- 4th International Conference on Cloud Computing and Intelligence Systems, CCIS 2016, Beijing, China, August 17-19, 2016. IEEE 2016, ISBN 978-1-5090-1256-5 
- Schahram Dustdar  , Eduard H. Hovy , Eduard H. Hovy , Xiangyang Li, Moncef Gabbouj: , Xiangyang Li, Moncef Gabbouj:
 Keynote speech.
- Qingchao Kong, Wenji Mao, Chunyang Liu: 
 Popularity prediction based on interactions of online contents. 1-5
- Xiaojuan Ban, Ruoyi Liu, Qing Shen, Yu Wang: 
 Weighted extreme learning machine for balance and optimization learning. 6-10
- Taiwen Huang, Lei Li, Yazhao Zhang, Junqi Chi: 
 Summarization based on multiple feature combination. 11-15
- Xiaopeng Ji, Zhiqiang Wei, Lei Huang, Yun Gao: 
 Violation vehicle automated snap and road congestion detection. 16-20
- Jie Nie, Lei Huang, Zhen Li, Chenxi Wei, Bowei Hong, Wenwu Zhu: 
 Thinking like psychologist: Learning to predict personality by using features from portrait and social media. 21-26
- Huaiyu Xu, Dong Zhao, Jiaqi An, Liang Liu: 
 Indoor shop recognition via simple but efficient fingerprinting on smartphones. 27-31
- Jianlong Xu, Zibin Zheng  , Zhun Fan , Zhun Fan , Wenhua Liu: , Wenhua Liu:
 Online personalized QoS prediction approach for cloud services. 32-37
- Siwen Zheng, Yu Liu, Zhenchao Ouyang  : :
 A machine learning-based tourist path prediction. 38-42
- Guoshun Nan, Xiuquan Qiao, Junliang Chen: 
 A popularity-aware prefetching using MDP for wireless video streaming over information-centric networks. 43-47
- Linghui Li, Junping Du, MeiYu Liang, Jangmyung Lee, Luoming Meng: 
 Video super-resolution based on nonlinear mapping and patch similarity. 48-56
- Yanhui Guo, Yingjie He, Xiaoming Liu: 
 Research and implementation of load balancing algorithm for mass mobile application detection task. 57-61
- Jieming Gu, Chengze Li, Dian Lei, Qi Li  : :
 Combination attack of android applications analysis scheme based on privacy leak. 62-66
- Fang Wei, Miao Zhang: 
 A risk assessment scheme of intellignet terminal based on attack tree. 67-71
- Dian Lei, Yang Liu, Chengze Li, Jieming Gu, Qi Li  : :
 Defect trigger model: Analysis method of mobile application defect. 72-76
- Feng Dong, Yanhui Guo, Chengze Li, Guoai Xu, Fang Wei: 
 ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive Bayes. 77-81
- Da Zun, Tao Qi, Liping Chen: 
 Research on automated testing framework for multi-platform mobile applications. 82-87
- Xuan Liu, Haitao Zhang, Jingxian Fang, Guan Guan, Yundi Huang: 
 Intelligent shopping cart with quick payment based on dynamic target tracking. 88-93
- Yong Peng, Jie Liang, Qi Li  : :
 A control flow obfuscation method for Android applications. 94-98
- Hewei Yu, Yangyu Hu, Yang Gao, Juan Xu, Miao Zhang: 
 Research on the technology of massive Android application data processing. 99-103
- Yanhui Guo, Jianpeng Hou, Weiping Chen, Qi Li  : :
 A method to detect Android ad plugins based on decompiled digital sequence. 104-108
- Sijie Zhou, Long Chen, Yu Zhang  , Jing Jin , Jing Jin , Xingyu Wang: , Xingyu Wang:
 Exploring (C)overt attention for multi-objective gaze-independent BCIs, visual angle not exceeding 1 degree. 109-112
- Jing Li, Shimin Wei, Lei Guo, Xin Feng: 
 Adaptive fuzzy control of a front-wheel drive bicycle robot. 113-116
- Jiawei Wu, Du Zhou, Xiuquan Qiao: 
 Fast automation moisture meter based on intellient control strategy. 117-120
- Jie Zhao, Guo-xiang Chang, Long Han, Li Wang: 
 Flexible neural network adaptive control based on the particle swarm optimization algorithm. 121-124
- Huitong Ge, Yuehui Jin, Tan Yang: 
 A QoE-based control system for bitrate adaption of wireless-accessed video stream. 125-130
- Zhenhui Xu, Yuting Yang, Nan Jiang, Chunxu Zhang, Pei Huang: 
 The estimation of weighted solution convex polyhedron in SMT problem. 131-135
- Yuan Ge, Juan Yin, Yan Zhang, Ke Lou: 
 Fault location in distributed information systems. 136-140
- Kun Niu, Zhipeng Gao, Haizhen Jiao, Nanjie Deng: 
 K-means+: A developed clustering algorithm for big data. 141-144
- Zhaowei Qu, Jianru Yan, Sixing Yin: 
 Association-rules-based data imputation with spark. 145-149
- Kan Liu, Yi Sun, Dezheng Zhang: 
 An intelligent drug matching method for traditional Chinese medicine. 150-154
- Wen Wang, Qiaowei Jiang, Tao Lv, Wenming Guo, Cong Wang: 
 An improved text similarity algorithm research for clinical decision support system. 155-159
- Qiaowei Jiang, Wen Wang, Xu Han, Shasha Zhang, Xinyan Wang, Cong Wang: 
 Deep feature weighting in Naive Bayes for Chinese text classification. 160-164
- Liping Chen, Kun Lin, Junping Du, Kun Li: 
 Research on user relationship networks of SNS based on the Forest Fire model. 165-170
- Xu Han, Tao Lv, Qiaowei Jiang, Xinyan Wang, Cong Wang: 
 Text summarization using Sentence-Level Semantic Graph Model. 171-176
- Zhenbing Liu, Chunyang Gao, Huihua Yang, Qijia He: 
 Cost-sensitive sparse representation based classification. 177-181
- Xinliang Liu, Dandan Sun: 
 A study on the impact of online takeout based on the Baidu index on the management of university cafeteria. 182-185
- Xiong Luo, Jing Deng, Ji Liu, Weiping Wang, Xiaojuan Ban: 
 A quantized kernel least mean square scheme with entropy-guided learning for intelligent data analysis. 186-190
- Guangyuan Fu, Qingchao Wang, Hongqiao Wang, Dongying Bai: 
 Group based non-sparse localized multiple kernel learning algorithm for image classification. 191-195
- Peng Nie: 
 A multi-dimension factor decision-making model framework based on Random Forests. 196-199
- Yongqiang Weng, Chunshan Wu, Qiaowei Jiang, Wenming Guo, Cong Wang: 
 Application of support vector machines in medical data. 200-204
- Yiming Xing, Xiaojuan Ban, Chong Guo, Yu Wang: 
 Probabilistic forecasting of traffic flow using kernel based extreme learning maching and quantum-bahaved particle swarm optimization. 205-209
- Min Chang, Yuansheng Lou, Lei Qiu: 
 An approach for time series similarity search based on Lucene. 210-214
- Kejing He  , Chenyang Li: , Chenyang Li:
 Structure-based classification of web documents using Support Vector Machine. 215-219
- Yi Liu, Zhengqiu Yang, Jiapeng Xiu, Chen Liu: 
 Research on an anti-crawling mechanism and key algorithm based on sliding time window. 220-223
- Zexi Di, Jiapeng Xiu, Jinze Lin, Yunzhe Qian: 
 Research on movie-box prediction model and algorithm based on neural network. 224-228
- Chunshan Wu, Yongqiang Weng, Qiaowei Jiang, Wenming Guo, Cong Wang: 
 Applied research on visual mining technology in medical data. 229-233
- Yang Li, Ying Xue, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang: 
 An attack pattern mining algorithm based on fuzzy logic and sequence pattern. 234-238
- Xiang Li, Jianyi Liu, Yanyu Huo, Ru Zhang, Yuangang Yao: 
 An Android malware detection method based on AndroidManifest file. 239-243
- Ying Xue, Yang Li, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang: 
 Phishing sites detection based on Url Correlation. 244-248
- Meilian Lu, Jinliang Liu: 
 Hier-UIM: A hierarchy user interest model for personalized news recommender. 249-254
- Yong Peng, Jie Liang, Guoai Xu: 
 Malware detection method for the industrial control systems. 255-259
- Zihao Chen, Zhengmin Li: 
 A collaborative recommendation algorithm based on user cluster classification. 260-263
- Yutong Gao, Feifan Song, Xiaqing Xie, Xuebin Gao: 
 Implicit semantic text retrieval and distributed implementation for rural medical care. 264-267
- Lei Qiu, Yuansheng Lou, Min Chang: 
 Research on theme crawler based on Shark-Search and PageRank algorithm. 268-271
- Quangu Chen, Yuehui Jin, Tan Yang: 
 A supervised no-reference QOE assessment model on IPTV services. 272-277
- Dongping Zhao, Jiapeng Xiu, Yu Bai, Zhengqiu Yang: 
 An improved item-based movie recommendation algorithm. 278-281
- Jiapeng Xiu, Qun He, Zhengqiu Yang, Chen Liu: 
 Research on a multi-objective constrained optimization evolutionary algorithm. 282-286
- Liu Liu, Meng Luo Ming, Yang Yang: 
 A transmission algorithm of ant colony system based large-scale data for WSN network. 287-292
- Hassan M. Elkamchouchi, Darwish A. E. Mohamed, Osama G. Mohamed, Wael A. E. Ali  : :
 Robust doa estimation and data detection for mobile communication in multipath environment. 293-297
- Zhanzhi Du, Yonghua Li, Siye Wang: 
 Design of dynamic networking scheme among dummy Bluetooth devices. 298-302
- Bo Li, Yonghua Li, Siye Wang: 
 Optimal workflows of AllJoyn network with centralized management gateway. 303-307
- Cheng Chen, Yang Wang, Yong ZhuZhao, Huixia Ding, Hong bin Zhao: 
 A suppression mechanism of cascading fault in the interdependent coupling smart grid. 308-313
- Xiaojun Ban, Xing Liu, Yalan Zhang  : :
 Non-Newtonian fluids based on adaptive time step. 314-318
- Jiqun Dong, Xiuquan Qiao: 
 A novel service provisioning mechanism in content-centric networking. 319-326
- Zhipeng Gao, Yinghao Qin, Kun Niu: 
 An effective merge strategy based hierarchy for improving small file problem on HDFS. 327-331
- Xiaosheng Tang, Boda Han, Han Chen: 
 A hybrid index for multi-dimensional query in HBase. 332-336
- Kaiyang Qu, Luoming Meng, Yang Yang: 
 A dynamic replica strategy based on Markov model for hadoop distributed file system (HDFS). 337-342
- Yuangang Yao, Jinxia Wei, Jianyi Liu, Ru Zhang: 
 Efficiently secure multiparty computation based on homomorphic encryption. 343-349
- Zhonghao Lu, Jingyu Wang  , Qi Qi: , Qi Qi:
 SARN: A scalable resource managing framework for YARN. 350-355
- Jing Yu, Dan Tao, Zhaowen Lin: 
 A hybrid web log based intrusion detection model. 356-360
- Xiaoyan Cui, Shimeng Yang, Darning Wang: 
 An algorithm of apriori based on medical big data and cloud computing. 361-365
- Dongyan Deng, Kejing He  , Yanhua Chen: , Yanhua Chen:
 Dynamic virtual machine consolidation for improving energy efficiency in cloud data centers. 366-370
- Soheil Mazaheri, Yong Chen  , Elham Hojati, Alan Sill , Elham Hojati, Alan Sill : :
 Cloud benchmarking in bare-metal, virtualized, and containerized execution environments. 371-376
- Jun Liao, Chaohui Jiang, Chun Guo: 
 Data privacy protection based on sensitive attributes dynamic update. 377-381
- Shenling Liu  , Chunyuan Zhang, Le Bo: , Chunyuan Zhang, Le Bo:
 Improve security and availability for cloud storage. 382-387
- Peidong Sha, Zhixiang Zhu: 
 The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing. 388-392
- Linshu Ouyang, Feng Dong, Miao Zhang: 
 Android malware detection using 3-level ensemble. 393-397
- Shaohui Wang, Tian Liu, Fu Xiao, Ruchuan Wang: 
 Privacy-preserving k-NN computation over encrypted cloud data without key sharing. 398-403
- Gery Ducatel, Joshua Daniel, Theo Dimitrakos  , Fadi Ali El-Moussa, Robert Rowlingson, Ali Sajjad: , Fadi Ali El-Moussa, Robert Rowlingson, Ali Sajjad:
 Managed security service distribution model. 404-408
- Hongliang Zhu, Wenhan Liu, Jing Wang, Yang Xin: 
 Based on the character of cloud storage string encryption and cipher text retrieval of string research. 409-413
- Lei Zhang, Kewang Sun, Qi Cui, Sixiang Wang, Xiaolin Li, Jianguo Di: 
 Multi adaptive hardware Trojan detection method based on power characteristics template. 414-418
- Peng Zhang, Xiaoqiang Sun, Ting Wang, Sizhu Gu, Jianping Yu, Weixin Xie: 
 An accelerated fully homomorphic encryption scheme over the integers. 419-423
- Songyang Wu, Yong Zhang: 
 Efficient verification of data possession in cloud computing. 424-428
- Khaled Riad  : :
 Multi-authority trust access control for cloud storage. 429-433
- Muhan Fan, Sujie Shao, Lanlan Rui: 
 A mining algorithm for frequent closed pattern on data stream based on sub-structure compressed in prefix-tree. 434-439
- Yaomin Wen, Junping Du, Jangmyung Lee: 
 Abnormal event detection based on social force model combined with crowd violent flow. 440-446
- Yifan Yuan, Junping Du, Jangmyung Lee: 
 Tourism activity recognition and discovery based on improved LDA model. 447-455
- Boyuan Ma, Xiaojuan Ban, Yu Wang, Xu Liu: 
 Recognition of blacklisted vehicle based on SIFT feature. 456-460
- Tao Lv, Jiang Liu, Fan Lu, Peng Zhang, Xinyan Wang, Cong Wang: 
 Semi-structured document extraction based on document element block model. 461-465
- Yu Wang, Xiaojuan Ban, Boyuan Ma, Yifei Guo, Jinglu Bai: 
 Research of Bayesian underground positioning technology based on SIFT feature. 466-470
- Shufeng Peng, Huiyuan Fu, Guangfu Che: 
 Distinguishing small moving objects and noises in the barn scene. 471-475
- Gaoya Wang, Huiyuan Fu, Yingxin Liu: 
 Real time abnormal crowd behavior detection based on adjacent flow location estimation. 476-479
- Shuangqun Li, Xinchen Liu, Wu Liu, Huadong Ma, Haitao Zhang: 
 A discriminative null space based deep learning approach for person re-identification. 480-484
- Zhongqiang Wang, Jian Peng, Yu Chen, Limiao Ning: 
 Passengers' choices on airport drop-off service: A decision forecast based on social learning and machine learning. 485-489
- Shuai Wang, Jiapeng Xiu, Chen Liu, Zhengqiu Yang: 
 A decision model of identifying user travel pattern based on the intelligent terminal sensor data. 490-493
- Zihang Xu, Junping Du, Lingfei Ye, Dan Fan: 
 Multi-feature indexing for image retrieval based on hypergraph. 494-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














