


Остановите войну!
for scientists:


default search action
8th SNPD 2007: Qingdao, China
- Wenying Feng, Feng Gao:
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China. IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 2
- Xun Zhou, Shengfei Shi, Jizhou Luo, Wei Zhang:
Lifetime Optimized Methods of Correlated Data Gathering on Sensor Networks. 3-8 - Runhua Shi, Hong Zhong, Liusheng Huang:
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. 9-13 - Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang:
Coverage-preserving Data Gathering in Wireless Sensor Networks. 14-19 - Jinghua Zhu, Jianzhong Li, Hong Gao:
Tasks Allocation for Real-Time Applications in Heterogeneous Sensor Networks for Energy Minimization. 20-25 - Yongxuan Lai, Xiaobo Fan, Hong Chen, Ting-Ting Xie:
Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks. 26-31 - Shaofei Wu, Siying Wei, Jinlong Zhang:
A service-based Workflow Model for Virtual Enterprise. 32-36 - Ming Chen, Zhenwu Wang:
An Approach for Web Services Composition based on QoS and Discrete Particle Swarm Optimization. 37-41 - Fuzhi Zhang, Yan Wang, Lin Wang:
A Web service discovery algorithm based on dynamic composition. 42-46 - Jianhua Yang:
Fuzzy Integrative Performance Evaluation for Supply Chain System. 47-52 - Gong Chen, Heqin Zhou, Jiefeng Yan:
A Novel Method for Moving Object Detection in Foggy Day. 53-58 - Lei Tang, Zonggui Zhao:
The Wavelet-based Contourlet Transform for Image Fusion. 59-64 - Yong Zhao, Zongde Fang, Kanwei Wang, Hui Pang:
Multilevel Minimum Cross Entropy Threshold Selection Based on Quantum Particle Swarm Optimization. 65-69 - Xinwu Li:
A New Model of Printer Color Management Based on Legendre Neural Network. 70-74 - Xiangbin Shi, Fang Liu, Ling Du, Xiaohong Chen, Yuansheng Xing:
A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGs. 75-80 - Ming Yin, Yun Xie, Fen Guo, Shuting Cai:
Research on Adaptive Error Concealment for Video Transmission over packet-lossy channel. 81-85 - Shijin Li, Hao Li, Zhijian Wang:
A Novel Approach to Commercial Detection in News Video. 86-90 - Shu-Chang Liu, Jing Bi, Zhiqiang Jia, Rui Chen, Jie Chen, Minmin Zhou:
Automatic Audio Classification and Speaker Identification for Video Content Analysis. 91-96 - Yichun Xu, Renbin Xiao:
Identifying Code for Directed Graph. 97-101 - Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:
Examination of Processing Load in Applying DACS Scheme to Practical Network. 102-107 - Dali Zhao, Yunhui Men, Linliang Zhao:
Hop-Distance Algorithm for Self-Localization of Wireless Sensor Networks. 108-112 - Zhenqi Wang, Jin Liu:
Internet Applications Usage Accounting Based on Flow. 113-116 - Qian Feng, Meng Chen:
The Research on the Construct Technology of the Test System Based on the Network. 117-122 - Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou:
A Hybrid and Efficient Scheme of Multicast Source Authentication. 123-125 - Renwang Su:
New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents. 126-131 - Hongwei Li, Shixin Sun:
Identity-Based cryptography for Grid. 132-137 - Xiaolin Wang, Jianqin Zhou, Yubing Zang:
A note on homogeneous bent functions. 138-142 - Ming Li, Baodong Qin, Fanyu Kong, Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. 143-148 - Jingjun Zhang, Furong Li, Yang Zhang, Liguo Wang:
Non-functional Attributes Modeling in Software Architecture. 149-153 - Jianmin Jiang, Hongping Shu, Li Xu:
An Architecture for Software Systems with time constraints. 154-159 - Xiaoyang Tong, Xiaoru Wang:
Agent-oriented Petri Net based Modeling of Dynamic Behavior for Wide-area Backup Protection. 160-165 - Yixing Xia, Yaowu Chen:
A Component-based Framework for Embedded Digital Instrumentation Software with Design Patterns. 166-170 - Sheng Fang, Yongquan Liang, Shenyuan Li:
What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code. 171-176 - Jun Gao:
Machine-Vision-Based Measurement of BGA Connector Solder Balls. 177-180 - Haiying Zhang, Chaowei Yuan:
A Method for Blind Detection of OFDM Signal Based on Power Spectrum Reprocessing. 181-186 - Guang Yang, Kexiong Chen, Maiyu Zhou, Zhonglin Xu, Yongtian Chen:
Study on Statistics Iterative Thresholding Segmentation Based on Aviation Image. 187-188 - Fuheng Liu, Xuhong Liu, Guijuan Kuang, Yi Xiu:
Improved Image Coding Algorithm Based on Embedded Zerotree. 189-192 - Wenjun Xiao, Weidong Chen, Mingxin He, Wenhong Wei, Behrooz Parhami:
Biswapped Networks and Their Topological Properties. 193-198 - Fuyong Yuan, Jian Liu, Chunxia Yin:
A Scalable Search Algorithm on Unstructured P2P Networks. 199-204 - Zhengyuan Ning, Xianwei Lai, Shanli Hu, Qingqing Zhan:
Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal Logic. 205-210 - Wenhong Wei, Wenjun Xiao:
Matrix Multiplication on the Biswapped-Mesh Network. 211-215 - Zenggang Xiong, Yang Yang, Xuemin Zhang, Dairong Yu, Li Liu:
Integrated Multi-Agent and Semantic P2P Grid Resource Discovery Model. 216-220 - Yongmei Hu, Yanan Fu, Lei Jia, Qiqiang Li:
An algorithm of job shop rolling scheduling based on singular rough sets. 221-225 - Wei Li:
Research on the Knowledge-based Decision Support System for the Safety of Rockets. 226-231 - Yang Xu, Houfeng Wang:
A Hibrid Model for Computational Morphology Application. 232-237 - Shuxia Yang:
Power Consumption Forecast by Combining Neural Networks with Immune Algorithm. 238-241 - Xiao Yang, Jiancheng Wan, Ling Zhang:
Arithmetic Computing Based Chinese Automatic Parsing Method. 242-247 - Aimin Wang, Qiang Song:
Prediction of R in Sinter Process based on Grey Neural Network Algebra. 248-252 - Chengzhi Cao, Xiaofeng Guo, Yang Liu:
Research on Ant Colony Neural Network PID Controller and Application. 253-258 - (Withdrawn) Design and Implementation of Wireless Computational Grid based on JavaSpace. 259-261
- Linchun Li, Jianhua Li, Ling Tie, Jun Pan:
ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. 262-267 - Hongwei Zhao, Shihui Pei, Pingping Liu:
Distributed Key Establishment Scheme in Wireless Sensor Network. 268-273 - Lichao Wang, Qiyong Lu, Xi Chen:
Application and Analysis of Time Domain Cross Correlation for Traffic Flow Speed Measurement. 274-279 - Ming Yin, Yun Xie, Fen Guo, Shuting Cai:
Improvements on MB-layer Rate Control Scheme for H.264 video Using complexity estimation. 280-284 - Lijun Sun, Ying He:
Improving Blind Equalization Algorithm for Wireless Communication Systems. 285-288 - Ke Zhang, Zhong Li, Xiaoou Zhao:
Edge Detection of Images based on Fuzzy Cellular Automata. 289-294 - Mengmeng Zhang, Yuehai Wang, Changnian Zhang, Shumin Zhou:
Motion Vector Data Decoding Using Spatial-Temporal Source Redundancy. 295-298 - Jiguo Yu, Jingjing Song, Wenjun Liu, Li Zhao, Baoxiang Cao:
KZCAN: A Kautz based content-addressable network. 299-304 - Wuming Luo, Pingyang Han:
Study On Non-FIFO Arc in Time-Dependent Networks. 305-310 - Lianxing Jia Wei Zhu, Chenggong Zhai, Yi Du:
Research on an Integrated Network Management System. 311-316 - Yong Zhang, Xianghong Yan, Yang Song, Hongmei Zhu:
The Computer Bracket Pressure Monitor System of Fully Mechanized Coalface in Coal Mine Based On CAN Bus. 317-322 - Tao Yu, Shanzhi Chen, Ming Ai, Xin Li, Yuhong Li, Zhen Qin:
A Framework for Reliability Computation of the IP Network. 323-327 - Lili Wang, Wei Gu:
Numerical Solution of A Type of Nonlinear Parabolic Equations. 328-333 - Shuli Wang, Jianming Zhang:
Positive solutions of m-points conjugate boundary value problems. 334-338 - Jinzhu Zhang, Zhen Jin
, Huimin Zhang:
Existence of Nonoscillatory Solution for Second Order Nonlinear Neutral Delay Differential Equation. 339-342 - Hongxia Shen, Zhen Jin
:
Two dimensional pattern formation of prey-predator system. 343-346 - Hongyang Ma, Bingquan Chen:
Quantum network based on multiparty quantum secret sharing. 347-351 - Xin Lü, Zhi Ma:
Quantum Information Security Protocols and Quantum Coding Theory. 352-356 - Sinjae Lee, Shaojian Zhu, Yanggon Kim:
P2P Trust Model: The Resource Chain Model. 357-362 - (Withdrawn) Network Protocols Analyzing by an Environmental Bisimulation Method. 363-367
- Kongfa Hu, Zhenzhi Gong, Qingli Da:
A Rapid Grouping Aggregation Algorithm Based on the Multi-Dimension Hierarchical Encoding. 368-373 - Jun Gao:
Getting Fuzzy Control Query Table by Data Mining. 374-378 - ZhengWei Li, Shixiong Xia, Niuqiang, Zhanguo Xia:
Coal Thickness Prediction Based on Support Vector Machine Regression. 379-383 - Zhijun Ma, Li Chen, Yizhen Zhang:
BDA information management and decision support based on DW. 384-387 - Zhijun Ma, Quan Shi, Bin Li:
Battle Damage Assessment based on Bayesian Network. 388-391 - Hongwei Zhao, Xiaolin Zhao, Yiming Qi:
Infrared Point Target Detection and Tracking Based on DSP. 392-394 - Jingwen Tian, Meijuan Gao, Jin Li:
Intelligent Window Based on Embedded System. 395-399 - Qiang Huang, Xiaofeng Liang, Yingying Zhu:
Dependable distributed embedded system assessment platform design. 400-405 - Mingshan Liu, Yuan Zhou:
Application of Embedded System in Construction Machinery. 406-411 - Peng Liu, Guojun Dai, Tingting Fu:
A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. 412-416 - Yongquan Liang, Zhongying Zhao, Qingtian Zeng:
Mining User's Interest from Reading Behavior in E-learning System. 417-422 - Jie Yin, Yuexuan Wang, Cheng Wu:
An Approach to Build Accessible Grid Service. 423-428 - Youngkon Lee, Gwyduk Yeom:
A Research for Quality Preservation Methodology for SOA Environment. 429-434 - Yuping Qin, Qing Ai, Xiukun Wang, Xiangna Li:
Study on Classification Algorithm of Multi-subject Text. 435-438 - Rongsheng Xie, Keshuo Wu, Jiangbo Du, Chunguang Li:
Survey of Public Key Digital Watermarking Systems. 439-443 - Zhuo Chen, Xiang-Shuang Liu, Xiaodong Zhunag:
An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence. 444-449 - Yan Li:
Application of Multi-Agent for Collaborative Product Design Engineering. 450-454 - Shaozhong Song, Libiao Zhang, Shu Hua:
The application of particle swarm optimizaton algorithm in training forward neural network. 455-457 - Jun Wang, Huixue Sun:
Studies on CAD System with Artificial Intelligence. 458-463 - Meijuan Gao, Jingwen Tian, Kai Li:
Research on Detecting Method of Submarine Oil Pipelines Corrosion Degree Based on Chaos Genetic Algorithm Neural Network. 464-469 - Changtong Luo
, Bo Yu
:
Low Dimensional Simplex Evolution - A Hybrid Heuristic for Global Optimization. 470-474 - Zhaowen Wei, Junyan Yan, Yunpeng Ou:
An Enhancement Dynamic Contract Net Protocol. 475-480 - Jingsong He, Jian Tang, Qiansheng Fang:
Study on The Property of Training Samples and Learning Space with Genetic Algorithms. 481-486 - Hong Zhang, Zhengxing Cai, Fan Yang, Wei Wei:
Research on Lossless Image Compression Algorithms Using Fermat Number Transform. 487-490 - Chunmei Wang, Suzhen Wang, Chongming Zhang, Junzhong Zou:
Maximum Variance Image Segmentation Based on Improved Genetic Algorithm. 491-494 - Muhammad Kamran, Haroon-Ur-Rashid Khan, Shi Feng:
Distortion Analysis in Scalable Image Compression Scheme based on efficient Codebook selection. 495-500 - Jiajin Lei, Chao Lu:
Fusion of ICA Spatial and Temporal and Localized Features for Face Recognition. 501-506 - Xiaojuan Li, Cunshe Chen, Anbo Liang, Yan Shi:
Local And Global Features Extracting and Fusion For microbial Recognition. 507-511 - Congying Han, Guoping He, Huanqing Cui, Xuping Zhang:
Distributed Parallel Algorithm For Nonlinear Optimization Without Derivatives. 512-515 - Jiuyuan Huo, Liqun Liu, Li Liu, Yi Yang, Lian Li:
Selection of the Order of Autoregressive Models for Host Load Prediction in Grid. 516-521 - Beihong Jin, Sihua Tian, Chen Lin, Xin Ren, Yu Huang:
An Integrated Prefetching and Caching Strategy for Mobile Web Caching System. 522-527 - Mohammad Moallemi, Mohammad Hossien Yaghmaee
, Mahmoud Naghibzadeh:
A Fault-Tolerant Mutual Exclusion Resource Reservation Protocol for Clustered Mobile Ad hoc Networks. 528-533 - Liming He:
Time Synchronization with Extended Clock Model for Wireless Sensor Networks. 534-539 - Weifeng Lu, Meng Wu:
Analysis of communication traffic characteristics of two-hop-relay cellular system in the dead spots. 540-545 - Wei Rong, Muqing Wu, Tianhang Yu:
LSMR: a Label Switching Multipath Routing protocol for Ad Hoc Networks. 546-551 - Long Jin, Xvming Shi:
A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog Deviation. 552-557 - Jingwen Tian, Meijuan Gao, Yujuan Xiang:
The Study of Compost Quality Evaluation Modeling Method Based on Fuzzy Neural Network for Sewage Treatment. 558-563 - Wei Zhou, Meiying Yang, Liyan Han:
A Nonparametric Approach to Pricing Convertible Bond via Neural Network. 564-569 - Xuemei Liu, Shusheng Zhong, Xiaoliang Bai:
A Modified SOFM Segmentation Method in Reverse Engineering. 570-573 - Lei Yu, Jia Ma, Fuji Ren, Shingo Kuroiwa:
Automatic Text Summarization Based on Lexical Chains and Structural Features. 574-578 - Yumin Dong, Shufen Xiao:
Hybrid Application On Job-Shop Scheduling by Genetic Algorithm and MAS Spring-Net. 579-584 - Ruo Ando:
Parallel analysis of polymorphic viral code using automated deduction system. 585-592 - Xiaoguang Liu, Gang Wang, Jing Liu:
A Double Level Granularity for Multimedia on Demand System. 593-596 - Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao:
Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids. 597-602 - Lijie Zhang, Hui Liu, Yan Wang:
Numerical Simulation of A Difference Scheme Applied in Image Processing Based on Four-Order PDEs. 603-605 - Qinyong Ma, Shenkang Wang, Dongdong Nie, Jianfeng Qiu:
Recognizing Humans Based on Gait Moment Image. 606-610 - Hong Zhang, Hongjun Su, Xianyu Su:
A Phase Unwrapping Algorithm for 3D Reconstruction. 611-615 - Yanhua Ma, Chuanjun Liu, Haiying Sun:
A Tristate Filter for Image Denoising Processing. 616-621 - Tingting Zheng, Jiaxing Cheng, Junjun Mao, Jie Song:
Multifractal and R/S Analysis of Protein Structure. 622-626 - Cunshe Chen, Xiaojuan Li, Huimei Yuan:
Quality assessment of beef based of computer vision and electronic nose. 627-631 - Jinquan Wang, Xiaoguang Gao, Jianguo Shi, Zhengsheng Li:
Double Unmanned Air Vehicle's Path Planning for Scout via Cross-Entropy Method. 632-635 - Ziqiang Wang, Xia Sun, Dexian Zhang:
A PACA-Based Multicast Routing Algorithm. 636-639