


default search action
3. ICICA 2012: Chengde, China
- Baoxiang Liu, Maode Ma, Jincai Chang:

Information Computing and Applications - Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings. Lecture Notes in Computer Science 7473, Springer 2012, ISBN 978-3-642-34061-1
Internet Computing and Applications
- Jianfang Shan, Zongtian Liu:

A Novel Event Network Matching Algorithm. 1-14 - Kunpeng Jiang, Huifang Guo, Shengping Zhu, Julong Lan:

Static Patterns Matching for High Speed Networks. 15-22 - Niu Li, Xiaoting Han

:
Information Propagation in Online Social Networks Based on User Behavior. 23-30 - Xin Li, Yue-fang Yang:

Research on Operation and Management of Railway Transport of Dangerous Goods in Third-Party Logistics Enterprises. 31-36 - Jing Shen, Yusong Du:

A Password Authentication Scheme against Smart Card Security Breach. 37-44 - Bo Han, Qing Wang, Fajiang Yu, Xianda Zhang:

A Vulnerability Attack Graph Generation Method Based on Scripts. 45-50 - Zailani Abdullah

, Tutut Herawan
, Ahmad Noraziah
, Mustafa Mat Deris:
DFP-Growth: An Efficient Algorithm for Mining Frequent Patterns in Dynamic Database. 51-58 - Xizhe Zhang

, Guolong Zhao, Tianyang Lv, Ying Yin, Bin Zhang:
Analysis on Key Nodes Behavior for Complex Software Network. 59-66 - Junling Ren, Li Zhang:

Webpage Information Hiding Algorithm Based on Integration of Tags and Data. 67-74 - Wei Zhu, Ping Sun, Ying-Nan Ma, Rui Song, Shiwei He, Ke Hui Liu:

Location Method of Underground Pipeline Monitoring Point Based on Cavity Detection. 75-81 - Qichun Zhong, Jinghong Hu:

Research on Purified Internet Environment for College Students. 82-87 - Qianmu Li, Qiugan Shi, Jun Hou, Yong Qi, Hong Zhang:

A Mobile-Certificate Security Method of Satellite-Earth Integration Networks. 88-97
Multimedia Networking and Computing
- Wen-Hsing Lai, Siou-Lin Wang:

Duration Modeling for Emotional Speech. 98-103 - Hongwei Zhao, Xiao Chen, Wei Huang, Pingping Liu, Lingjiao Ma:

Research on Image Retrieval Based on Color and Shape Features. 104-111 - Kaihua Wang, Wenxiang Zhang, Zhanji Gui:

Existence and Simulations of Periodic Solution for Impulsive Predator-Prey System with Stage Structure for the Predator. 112-119 - Yan Yan, Kaihua Wang, Zhanji Gui:

Dynamics and Simulations of Multi-species Competition-Predator System with Impulsive. 120-127 - Ying Chen, Shaobai Zhang:

Research on the Distal Supervised Learning Model of Speech Inversion. 128-135 - Ruei-Chang Chen, Shih-Fong Lee, Yeong-Chau Kuo:

Low Power Pulse Width Modulation Design for Class D Audio Amplifier Systems. 136-143 - Wei Guan, Yuanhai Lv:

A New Logic Method for Education Resource Software Guarantee. 144-151 - Zhenjie Hou, Junsheng Huang, Jianhua Zhang:

Research on 3D Object Rounding Photography Systems and Technology. 152-158 - Dong Li, Yantao Tian, Chuan Wan, ShuaiShi Liu:

Facial Expression Feature Selection Based on Rough Set. 159-166
Intelligent Computing and Applications
- Weisheng Li, Jiao Du, Lifang Zhou:

Concise Representations for State Spaces in Conformant Planning Tasks. 167-174 - Zhengjun Cao, Hanyue Cao:

On Fast Division Algorithm for Polynomials Using Newton Iteration. 175-180 - Ding Wang

, Chunguang Ma, Lan Shi, Yu-Heng Wang:
On the Security of an Improved Password Authentication Scheme Based on ECC. 181-188 - Lin Hu:

Strategies to Develop Personal Knowledge Management Ability Based on M-Learning. 189-195 - Li Liu, Jinkuan Wang, Dongmei Yan, Fulai Liu:

Improved Detection Algorithm for MIMO Wireless Communication System Based on Chase Detector. 196-202 - Mingxin Gan, Xue Dou, Rui Jiang

:
Improving Recommendation Performance through Ontology-Based Semantic Similarity. 203-210 - Ricai Luo, Hua Tan:

Formal Modeling and Model Checking Analysis of the Wishbone System-on-Chip Bus Protocol. 211-220 - Chao Zou, Yueming Lu:

A Time Synchronization Method for Wireless Sensor Networks. 221-228 - Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:

Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius. 229-235 - Zhenfu Wu, Yanfeng Zhao, Li Qi, Jie Chen:

Scale Effect on Soil Attribute Prediction in a Complex Landscape Region. 236-245 - Yanli Liu, Yourong Wang, Jian Zhang:

New Machine Learning Algorithm: Random Forest. 246-252 - Ying Liu, Zongtian Liu:

Efficient Method of Formal Event Analysis. 253-260
Computational Statistics and Applications
- Qiao-qiao Du, Ge Gao, Zong-da Jin, Wei Li, Xiang-yu Chen:

Application of Monte Carlo Simulation in Reliability and Validity Evaluation of Two-Stage Cluster Sampling on Multinomial Sensitive Question. 261-268 - Hai-xin Jiang, Wei Tong:

New Lax-Friedrichs Scheme for Convective-Diffusion Equation. 269-276 - Juan Du:

Span of T-Colorings Multigraphs. 277-283 - Lei Hou, Hanling Li, Ming Zhang, Weijia Wang, Dezhi Lin, Lin Qiu:

Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEM. 284-290 - Zhimeng Sun:

Factor Model Averaging Quantile Regression and Simulation Study. 291-298 - Hassan Barjini, Mohamed Othman, Hamidah Ibrahim, Nur Izura Udzir:

Analytical Studies and Experimental Examines for Flooding-Based Search Algorithms. 299-306 - Shibing You, Yuan Hui, Xue Yu, Lili Bao:

Innovative Study on the Multivariate Statistical Analysis Method of Chromatography Economy Analysis. 307-314 - Xin Wang, Xu Lei, Xuyang Cao, Yang Zhou, Shunde Gao:

Optimization of Lifting Points of Large-Span Steel Structure Based on Evolutionary Programming. 315-322 - Zhijun Luo, Zhibin Zhu, Guohua Chen:

Modifying Feasible SQP Method for Inequality Constrained Optimization. 323-330 - Jianbo Liu, Yanyan Zhang, Yafeng Men, Wenying Chen:

On the Solvable n-Lie Algebras. 331-336 - Yanyan Zhang, Jianbo Liu, Wen Tao, Qin Zhu:

Modules of Lie Algebra G(A). 337-342 - Xiandong Meng, Zhiming He, Xiaowei Niu, Ganzhong Feng:

Detection Performance Analysis of Tests for Spread Targets in Compound-Gaussian Clutter. 343-349 - Yun Wang, Xiaojing Xu, Zhiqin Huang:

Rough Differential Equations in Rough Function Model. 350-357
Cloud and Evolutionary Computing
- Ming Ye, ZeHui Qu:

Cloud Computing Infrastructure and Application Study. 358-364 - Ping Guo, Lin Zhu, Zhujin Liu, Ying He:

An Ant Colony Algorithm for Solving the Sky Luminance Model Parameters. 365-372 - Su Wang, Min Zhu, Jun Zheng, Kai Zheng:

Tugboat Scheduling Problem Based on Trust-Based Ant Colony Optimization. 373-380 - Nawsher Khan, Ahmad Noraziah

, Tutut Herawan
:
A Cloud Architecture with an Efficient Scheduling Technique. 381-388 - Dingcai Shen, Xuewen Xia:

A Local Search Particle Swarm Optimization with Dual Species Conservation for Multimodal Optimization. 389-396 - Nawsher Khan, Ahmad Noraziah

, Tutut Herawan
, Mustafa Mat Deris:
Cloud Computing: Analysis of Various Services. 397-404 - Xiaofeng Chen, Xingyou Xia, Ruiyun Yu:

Quantum Ant Colony Algorithm Based on Bloch Coordinates. 405-412 - Dailin Jiang, Peijie Huang, Piyuan Lin, Jiacheng Jiang:

Energy Efficient VM Placement Heuristic Algorithms Comparison for Cloud with Multidimensional Resources. 413-420 - Lin Jing, Xipei Huang, Yiwen Zhong, Yin Wu, Hui Zhang:

A Python Based 4D Visualization Environment. 421-428 - Ce Zhang, Gang Cui, Bin Jin, Liang Wang:

Study of Trustworthiness Measurement and Kernel Modules Accessing Address Space of Any Process. 429-436 - Xing Xu, Hao Hu, Na Hu, Lin Xiao, Weiqin Ying

:
Human Resource Management System Based on Factory Method Design Pattern. 437-444 - Junzhong Ji, Zhijun Liu, Aidong Zhang, Lang Jiao, Chunnian Liu:

Ant Colony Optimization with Multi-Agent Evolution for Detecting Functional Modules in Protein-Protein Interaction Networks. 445-453 - Zhenjie Hou, Jianhua Zhang:

Research on Genetic Segmentation and Recognition Algorithms. 454-460
Computer Engineering and Applications
- Takayuki Sasajima, Shin-ya Nishizaki

:
Blog-Based Distributed Computation - Implementation of Software Verification System. 461-467 - Jian Deng, Bo Chen, Jiazhi Zeng:

Model Transformation Method for Compensation Events and Tasks from Business Process Model to Flowchart. 468-476 - Rafal Kapelko

:
Towards Efficient Replication of Documents in Chord: Case (r, s) Erasure Codes. 477-483 - Yuanshan Lin, Di Wu, Xin Wang, Xiukun Wang, Shunde Gao:

Path Planning for Crawler Crane Using RRT. 484-491 - Ping Guo, Shuai-Shuai Chen, Ying He:

Study on Data Preprocessing for Daylight Climate Data. 492-499 - Ahmad Noraziah

, Zailani Abdullah
, Tutut Herawan
, Mustafa Mat Deris:
Scalable Technique to Discover Items Support from Trie Data Structure. 500-507 - Rabiei Mamat

, Tutut Herawan
, Ahmad Noraziah
, Mustafa Mat Deris:
On Soft Partition Attribute Selection. 508-515 - Lijun Li, Kaida He, Qiudong He:

Effect of Vocabulary Preparation on Students Vocabulary and Listening Comprehension. 516-523 - Pengfei Zhang, Luojia Wan:

3D Parametric Design on Trough Type Liquid Distributor Based on AutoCAD VBA. 524-530 - Yu Sun, Yuanxiang Li, Gang Liu, Jun Liu:

A Novel Differential Evolution Algorithm with Adaptive of Population Topology. 531-538 - Yijun Li:

Empirical Study on the Relationship between Money Supply and Stock Market in Europe. 539-544 - Yanxia Wang, Xingjie Hui:

Evaluation of Agricultural Information Service System. 545-552 - Li Zhen:

Six-Mode Truncation and Chaotic Characteristics of Atmospheric Convection System. 553-559 - Ying Cai, Ning Li, Chengxia Liu:

Security Uniform Office Format Specification and API Design Based on the Java Platform. 560-568 - Li-Sha Yang, An-Chun Cheng, Ming-Shu Wang, De-Kang Zhu, Shun Chen, Ren-Yong Jia, Xiao-Yue Chen:

Bioinformatics Analysis of the Complete Nucleotide Sequence of Duck Plague Virus UL22 Gene. 569-575
Knowledge Management and Applications
- Choo-Yee Ting, Kok-Chin Khor

, Yok-Cheng Sam:
Evidence Conflict Analysis Approach to Obtain an Optimal Feature Set for Bayesian Tutoring Systems. 576-583 - Ahmad Noraziah

, Ainul Azila Che Fauzi, Noriyani Mohd Zin, Tutut Herawan
:
Binary Vote Assignment Grid Quorum for Managing Fragmented Database. 584-591 - Ahmad Noraziah

, Zailani Abdullah
, Tutut Herawan
, Mustafa Mat Deris:
WLAR-Viz: Weighted Least Association Rules Visualization. 592-599 - Yue Huang, Mingxin Gan, Rui Jiang

:
Ontology-Based Genes Similarity Calculation with TF-IDF. 600-607 - Rui Deng, Liang Zhang, Haimin Guo:

Quantitative Study of Oilfield Casing Damage. 608-615 - Wensheng Guo, Guowu Yang, Qianqi Le, William N. N. Hung:

Complete SAT Solver Based on Set Theory. 616-623 - Jing Feng, Tingjie ShangGuan:

Application of XML Data Mining in GUI Run-Time State Clustering. 624-631 - Shin-ya Nishizaki

, Mizuki Fujii:
Strong Reduction for Typed Lambda Calculus with First-Class Environments. 632-639 - Qianqi Le, Guowu Yang, William N. N. Hung, Wensheng Guo:

Reliable NoC Mapping Based on Scatter Search. 640-647 - Andrea Carvalho Menezes, Plácido Rogério Pinheiro, Mirian Calíope Dantas Pinheiro

, Tarcísio Pequeno Cavalcante:
Towards the Applied Hybrid Model in Decision Making: Support the Early Diagnosis of Type 2 Diabetes. 648-655 - Ping Shen, Shibing You:

Replacement Study of the Retention Time in Chromatography Ecomomic Analysis. 656-662 - Naisheng Wang:

Study on Frustration Tolerance and Training Method of College Students. 663-668 - Youcai Xue, Jianhui Pan:

On Statistical Analysis and Management Countermeasures of Occupation Burnout for College Teachers. 669-676 - Wenyu Zhao, Jun Gao, Xiaotian Liu, Yaping Wu:

Development of a RFID Multi-point Positioning and Attendance System Based on Data Comparison Algorithm. 677-683
Communication Technology and Applications
- Kunpeng Jiang, Julong Lan, Youjun Bu:

High Throughput Constraint Repetition for Regular Expression Matching Algorithm. 684-691 - Weixia Zou, Fang Zhang, Guanglong Du

, Bin Li:
Interference Mitigation Based on Multiple SINR Thresholds in 60GHz Wireless Networks. 692-699 - Xiaohao Li, Zhenwei Zhang:

Analysis of the Coupling Action in Nonlinear Harmonic Vibration Synchronization System. 700-706 - Linlin Dong, Lixin Sun, Xiaoming Jiang, Na Zhu:

Performance Analysis of Hierarchical Modulation with Higher Spectrum Efficiency for a Higher Date Rate T-DMB System. 707-714 - Shutao Wang, Pengwei Zhang, Xiaoqing Shao:

Research on the Controlling Technique of DFBLD in the Spectrum Absorption Optical Fiber Gas Detecting System. 715-721 - Cong Liu, Chuan-gui Ma:

An Efficient and Provable Secure PAKE Scheme with Robust Anonymity. 722-729 - Shouzhi Xu, Pengfei Guo, Bo Xu, Huan Zhou:

Study on QoS of Video Communication over VANET. 730-738 - Yuan Jing, Haoyu Li, Xiaofeng Yang, Li Ma, Ji Ma, Bin Niu:

Phase Noise Estimation and Mitigation for Cognitive OFDM Systems. 739-745 - Laomo Zhang, Ying Ma, Guodong Wang:

An Effective Multipath Approach to Reducing Congestion in WSNs. 746-753 - Yu Zhang, Yana Li, Feng Xia, Ziqiang Luo:

Immunity-Based Gravitational Search Algorithm. 754-761 - Ye Wang, Jian Wang, Jian Yuan:

A Clustering Method Based on Time Heat Map in Mobile Social Network. 762-769 - Jun Ma, Yuanbo Guo, Jinbo Xiong:

TNC-eSA: An Echanced Security Access Solution to Office Networks. 770-777

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














