


default search action
1. ICICA 2010: Tangshan, China
- Rongbo Zhu, Yanchun Zhang, Baoxiang Liu, Chunfeng Liu:

Information Computing and Applications - First International Conference, ICICA 2010, Tangshan, China, October 15-18, 2010. Proceedings. Lecture Notes in Computer Science 6377, Springer 2010, ISBN 978-3-642-16166-7
Parallel and Distributed Computing
- Morteza Analoui

, Mohammad Hossein Rezvani
:
A Non-strategic Microeconomic Model for Single-Service Multi-rate Application Layer Multicast. 1-8 - Hong-Lin Zhang, Chunyuan Zhang, Dong Liu, Gui-Wu Xie:

Importance Measure Method for Dynamic Fault Tree Based on Isomorphic Node. 9-16 - Zhigang Li, Zhihai Wang, Weijia Guo:

Shortages of the Traditional Calculation of Interference Intensity of the Control Rules. 17-24 - M. Zarina, Mustafa Mat Deris, Ahmad Nazari Mohd Rose, Mohd Isa Awang:

Dynamic Data Replication Strategy Based on Federation Data Grid Systems. 25-32 - D. Doreen Hephzibah Miriam, K. S. Easwarakumar

:
A Novel Approach for QoS Guided Metascheduler for P2P Grid System. 33-40 - Ahmad Shukri Mohd Noor

, Mustafa Mat Deris:
Failure Recovery Mechanism in Neighbor Replica Distribution Architecture. 41-48 - Zhao Jin, Jian Jin, Weiyi Liu:

Autonomous Discovery of Subgoals Using Acyclic State Trajectories. 49-56 - Jing Tan, Zhigang Tao, Changcun Li:

Numerical Computing and Forecasting to Land Subsidence in Coastal Regions of Tangshan. 57-64 - Jixian Xiao, Fangling Lu, Xin Xiao:

Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and Pricing. 65-72 - Su-feng Yin, Xiao-jing Wang, Jian-hui Wu, Guo-li Wang:

Grey Correlation Analysis on the Influential Factors the Hospital Medical Expenditure. 73-78 - Ye Zhao, Shujuan Liu, Yi-li Tan:

Discrete Construction of order-k Voronoi Diagram. 79-85
Trusted and Pervasive Computing
- Chaoping Wang, Aimin Yang, Yan Sun:

Double Verifiably Encrypted Signature-Based Contract Signing Protocol. 86-93 - Sébastien Dourlens, Amar Ramdane-Cherif:

Semantic Memory for Pervasive Architecture. 94-102 - Ming Chen, Kaigui Wu, Jie Xu:

Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange. 103-110 - Leyou Zhang, Yupu Hu, Qing Wu:

Short Signature from the Bilinear Pairing. 111-118 - Jiajun Li, Liping Qin, Jia Zhao:

The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithms. 119-126 - Lei Yang, Yu Dai, Bin Zhang:

Method for Evaluating QoS Trustworthiness in the Service Composition. 127-134 - Fushan Wei, Chuangui Ma, Qingfeng Cheng:

Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings. 135-142 - Wensheng Liu, Liwen Guo, Ming Zhu:

Bayesian Network Based on FTA for Safety Evaluation on Coalmine Haulage System. 143-149
Internet and Web Computing
- Qibo Sun, Shangguang Wang

, Fangchun Yang:
Multi-factor Evaluation Approach for Quality of Web Service. 150-157 - Lei Zhao, Lina Wang, Zuoting Xiong, Dongming Gao:

Execution-Aware Fault Localization Based on the Control Flow Analysis. 158-165 - (Withdrawn) The Influence of Cacheable Models on E-Voting Technology. 166-172

- Hassan Barjini, Mohamed Othman, Hamidah Ibrahim:

An Efficient HybridFlood Searching Algorithm for Unstructured Peer-to-Peer Networks. 173-180 - Jiaxuan Ji, Fenglin Bu, Hongming Cai, Junye Wang:

Ontology Model for Semantic Web Service Matching. 181-188 - Ghalem Belalem

, Fatima Zohra Tayeb, Wieme Zaoui:
Approaches to Improve the Resources Management in the Simulator CloudSim. 189-196 - Saeed Parsa

, Azam Peyvandi-Pour
, Mojtaba Vahidi-Asl:
Introducing a New Predicate Network Model Constructed Based on Null Hypothesis Testing for Software Fault Localization. 197-204
Multimedia Networking and Computing
- Yong Zhang, Zhuoran Li, Jingying Cai, Jianying Wang:

Image Segmentation Based on FCM with Mahalanobis Distance. 205-212 - Jianqing Fu, Jiyi Wu, Jianlin Zhang, Lingdi Ping, Zhuo Li:

A Novel AHP and GRA Based Handover Decision Mechanism in Heterogeneous Wireless Networks. 213-220 - Zheng Liu, Hua Yan:

Annotating Flickr Photos by Manifold-Ranking Based Tag Ranking and Tag Expanding. 221-228 - Zhenxin Zhang, Jigang Tong, Zengqiang Chen, W. H. Ip

, Ching-Yuen Chan
, Kai-Leung Yung
:
Application of Chaos in Network Video Security. 229-236 - Yan Deng, Weiqiang Zhang, Yanmin Qian, Jia Liu:

Integration of Complementary Phone Recognizers for Phonotactic Language Recognition. 237-244 - Feng Gao, Zehua Gao, Liu Wen, Yazhou Wang, Jie Liu, Dahsiung Hsu:

Performance Analysis of IEEE 802.11a Based on Modified Markov Model in Non-saturation Conditions. 245-252 - Norhalina Senan

, Rosziati Ibrahim
, Nazri Mohd Nawi
, Iwan Tri Riyadi Yanto
, Tutut Herawan
:
Soft Set Theory for Feature Selection of Traditional Malay Musical Instrument Sounds. 253-260 - Liang Dai, Yilin Chang, Zhong Shen:

ETSA: An Efficient Task Scheduling Algorithm in Wireless Sensor Networks. 261-268 - Jian Liu:

Comparing Fuzzy Algorithms on Overlapping Communities in Networks. 269-276 - Salima Nebti:

Color Image Segmentation Using Swarm Based Optimisation Methods. 277-284 - Gang Li, Youchuan Wan:

Adaptive Seeded Region Growing for Image Segmentation Based on Edge Detection, Texture Extraction and Cloud Model. 285-292
Evolutionary Computing and Applications
- Saeed Parsa

, Amir Mehrabi-Jorshary, Mohammad Hamzei:
A New Optimization Algorithm for Program Modularization. 293-300 - Chuan-Hua Zhou, An-Shie Xie, Bao-Hua Zhao:

Self-organizing Learning Algorithm for Multidimensional Non-linear Optimization Applications. 301-308 - Chunying Zhang, Jingfeng Guo:

Research on Set Pair Cognitive Map Model. 309-316 - Nazri Mohd Nawi

, Rozaida Ghazali
, Mohd Najib B. Mohd Salleh
:
The Development of Improved Back-Propagation Neural Networks Algorithm for Predicting Patients with Heart Disease. 317-324 - Dan-Guang Pan, Su-Su Lei, Shun-Chuan Wu

:
Two-Stage Damage Detection Method Using the Artificial Neural Networks and Genetic Algorithms. 325-332 - Hui-Ping Cheng, Zheng-Sheng Lin, Hsiao-Fen Hsiao, Ming-Lang Tseng

:
Designing an Artificial Immune System-Based Machine Learning Classifier for Medical Diagnosis. 333-341 - Mingsheng Liu, Jianhua Li, Hui Liu:

Human-Oriented Image Retrieval of Optimized Multi-feature via Genetic Algorithm. 342-349 - Shiman Xie, Beifang Bao, Jianwei Chen:

Genetic Algorithm Based on Activities Resource Competition Relation for the RCPSP. 350-356 - Ruicheng Zhang, Xin Zheng:

A New Flatness Pattern Recognition Model Based on Variable Metric Chaos Optimization Neural Network. 357-364 - Guoli Wang, Jianhui Wu, Sufeng Yin, Liqun Yu, Jing Wang:

Comparison between BP Neural Network and Multiple Linear Regression Method. 365-370 - Chunfeng Liu, Li Feng:

Research of Granularity Pair and Similar Hierarchical Algorithm. 371-378 - Yun Tang, Junsong Luo, Yajuan Hao:

The Research and Application of Parallel Generalized Minimal Residual Algorithm Based on Grid MPI Parallel Running Framework. 379-386
Scientific and Engineering Computing
- Yuxin Zhang, Hengfei Ding

, Wan-Sheng He, Xiaoya Yang:
A New Family of Methods for Nonlinear Equations. 387-394 - Jean Bosco Etoa Etoa:

A Filter Method to Solve Nonlinear Bilevel Programming Problems. 395-406 - Weijun Ma, Qimin Zhang:

Convergence of the Semi-implicit Euler Method for Stochastic Age-Dependent Population Equations with Markovian Switching. 407-414 - Xiaona Fan, Qinglun Yan:

Interior Point Algorithm for Constrained Sequential Max-Min Problems. 415-422 - Li Guo, Xiankun Du:

Representations for the Generalized Drazin Inverse of Bounded Linear Operators. 423-430 - Jacek Cichon

, Rafal Kapelko
, Karol Marchwicki:
Uniformity of Improved Versions of Chord. 431-438 - Xiaona Fan, Qinglun Yan:

Aggregate Homotopy Method for Solving the Nonlinear Complementarity Problem. 439-446 - Shih-Ching Ou, Hung-Yuan Chung, Chun-Yen Chung:

A Biomathematic Models for Tuberculosis Using Lyapunov Stability Functions. 447-453 - Jincai Chang, Zhao Wang, Aimin Yang:

Construction of Transition Curve between Nonadjacent Cubic T-B Spline Curves. 454-461 - Jiarui Qi, Youpo Su, Yahui Sun, Yousong Ding, Lihui Ma:

Finite Element Simulation of Reinforce-concrete Frame Beam to Resist Progressive Collapse. 462-469 - Liyan Feng, Teng Liu, Xuegang Li, Mingyu Tian:

Recognition of Linkage Curve Based on Mathematical Morphology. 470-477 - Ning Li, Jing Jiang, Wenfeng Wang:

Interval Implicitization of Parametric Surfaces. 478-485 - Shuzhao Chen, Qingxiang Cai, Yanchao Yang, Cangyan Xiao:

Calculation Method of Indirect Accident Loss Based on Life Value. 486-492 - Haibo Zhang, Weidong Song:

Hazard Source Identification of Mined-Out Area Based on Grey System Theory. 493-500
Intelligent Computing and Applications
- Hongzhen Xu, Bin Tang, Ying Gui:

Consistency Analysis of Dynamic Evolution of Software Architectures Using Constraint Hypergraph Grammars. 501-508 - Zailani Abdullah

, Tutut Herawan
, Mustafa Mat Deris:
Scalable Model for Mining Critical Least Association Rules. 509-516 - Yuyuan Wen:

Research on the Spatial Structure and Landscape Patterns for the Land Use in Beijing Suburb Based on RS & GIS. 517-524 - Muhammad Sharif, Mohsin Bilal

, Salabat Khan
, M. Arfan Jaffar:
Adaptive Filter and Morphological Operators Using Binary PSO. 525-532 - Jiajun Li, Jia Zhao, Liping Qin:

Driving Factors' Identification Based on Derivative Process of Subjective Default Credit Risk. 533-540 - Fan Jiang, Chunliang Zhang, Yijun Wang:

Mechanical Behavior Analysis of CDIO Production-Blood Vessel Robot in Curved Blood Vessel. 541-548 - Isabelle Tamanini, Plácido Rogério Pinheiro, Mirian Calíope Dantas Pinheiro

:
The Choice of Neuropathological Questionnaires to Diagnose the Alzheimer's Disease Based on Verbal Decision Analysis Methods. 549-556 - Plácido Rogério Pinheiro, Isabelle Tamanini, Francisco Chagas da Silva Filho, Moisés Ângelo de Moura Reis Filho:

Applying Verbal Decision Analysis on the Choice of Materials to the Construction Process of Earth Dams. 557-564 - Yanbo Zhang, Zhiqiang Kang, Chunhua Hou:

Research on Numerical Analysis of Landslide Cataclysm Mechanism and Reinforcement Treatment Scheme in ShengLi Open-Pit Coal Mine. 565-572 - Dianxuan Gong, Chuanan Wei, Ling Wang, Lichao Feng, Lidong Wang:

Adaptive Methods for Center Choosing of Radial Basis Function Interpolation: A Review. 573-580 - Xiaohong Huang, Zhaohua Wang:

Novel Approach for the Design of Half-Band Filter. 581-588 - Yongliang Lin, Xinxing Li:

Key Technique of GMTM for Numerical Analysis Modeling in Geotechnical Engineering: Calculation Region Cutting. 589-596 - Feng Jiang, Zhijun Wang:

Pagerank-Based Collaborative Filtering Recommendation. 597-604

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














