default search action
IPTC 2011: Wuhan, China
- 2nd International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2011, Wuhan, China, October 22-23, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1130-5
- Xiong Liu, Haiwei Xue, Yiqi Dai:
A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel. 1-4 - Yi Sun, Hongxiang Sun, Qiaoyan Wen, Hua Zhang:
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model. 5-8 - Yunji Zhao, Hailong Pei:
Model Update Particle Filter for Multiple Objects Detection and Tracking. 9-12 - Yu Qin, QiuXin Wu, XiaoBo Chu:
Design and Analysis on Direct Anonymous Attestation for Security Chip. 13-18 - Songzhu Mei, Jiangjiang Wu, Yong Cheng, Jun Ma, Jiangchun Ren, Xiaoxing Li:
Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing. 19-23 - Ajay Jangra, Nitin Goel, Priyanka:
Efficient Power Saving Adaptive Routing Protocol (EPSAR) for MANETs Using AODV and DSDV: Simulation and Feasibility Analysis. 24-26 - Xueming Li, Minling Xing, Jiapei Zhang:
A Comprehensive Prediction Method of Visit Priority for Focused Crawler. 27-30 - Yun Li, Shufang Song, Mahmoud Daneshmand, Weina Duan:
A Cooperative Relay Method and Performance for Wireless Networks. 31-34 - Wei Zhou, Liu Chen:
Formal Specification for Byzantine Fault Tolerant Algorithm Suiting Web Services. 35-38 - Jiangjiang Wu, Jie Zhou, Jun Ma, Songzhu Mei, Jiangchun Ren:
An Active Data Leakage Prevention Model for Insider Threat. 39-42 - Chen Liu, Zhou Wei:
Multi-feature Method: An Integrated Content Based Image Retrieval System. 43-46 - Han-ping Gao, Zu-qiao Yang:
Integrated Visual Saliency Based Local Feature Selection for Image Retrieval. 47-50 - YuHong Ma, Kai Xie, Minfang Peng:
A Parallel Gaussian Filtering Algorithm Based on Color Difference. 51-54 - Ting Zhang, Jingsha He, Yang Zhang:
Trust Based Secure Localization in Wireless Sensor Networks. 55-58 - Xumei Yi, Cao Peng:
The Shapes of Halftone-AM-Dots Based on Information Hiding. 59-62 - Changxing Lin, Jian Zhang, Beibei Shao:
A High Speed Parallel Timing Recovery Algorithm and Its FPGA Implementation. 63-66 - Jia Xu, Liupeng Feng:
A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and Quantization. 67-70 - Xiang'e Sun, Yun Ling, Jun Gao:
A Deconvolution Approach of 2D Data Statistical. 71-74 - Lei Yuan, Heming Zhao:
Research of Electronic Equipment Fault Diagnosis Algorithm Based on RBF Neural Network. 75-78 - Da Lu, Guofan Liu, Lingli Zhu:
An Optimization for CAVLC Code Table Lookup Algorithm in H.264 Decoder. 79-82 - Yong Peng, Chongjie Dong, Huijun Zheng:
Research on Genetic Algorithm Based on Pyramid Model. 83-86 - Yin Hu, Chaoyang Zhang:
An Improved Bayesian Algorithm for Filtering Spam E-Mail. 87-90 - Wenjia Wang, Dingwei Wang:
A Comprehensive Trust Model with Multi-participant Viewpoints in Online Auctions. 91-95 - Chao Wu, Yiquan Wu:
Multitemporal Images Change Detection Using Nonsubsampled Contourlet Transform and Kernel Fuzzy C-Means Clustering. 96-99 - Sheng Ma:
Some Remarks on Convergence in Credibility Measure and Convergence in Credibility Distribution of Fuzzy Variable. 100-103 - Xiaohong Xiao, You Xu:
The Design and Implementation of C-like Language Interpreter. 104-107 - Haoyong Lv, Hengyao Tang:
Machine Learning Methods and Their Application Research. 108-110 - Peng Zheng, Weihua Wang, Juan Wang:
A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks. 111-114 - Qin Jiang:
Some Remarks on Charactertics Function and Density Function of Uncertain Variable. 115-118 - Ru-jun Xu, Li-xin Ma, Bo Hu, He-ran Ma, Bo-hao Tao:
Intelligent High-Voltage Discharge Fault Detection and Its Diagnosis Methods Based on ANN. 119-122 - Xi Li, Hang Dai:
The Color Components' Exchanging on Different Color Spaces and the Using for Image Segmentation. 123-126 - Haitang Zhang, Jinqing Jiang, Ziliang Wang, Jinshan Chen, Yanhong Cui:
Study on Approach to Improve the Quality of Veterinary Medicine Graduates by Strengthen Practical Skills. 127-130 - Xueming Li, Jiapei Zhang, Minling Xing:
Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence Features. 131-134 - Xiang'e Sun, Yun Ling, Jun Gao:
The Research on Anisotropic Parameter Estimation for Vertical Transerse Isotropy: Based on 3D VSP, Walkaway VSP and Full Azimuth Seismic Data. 135-138 - Hongyun Cai, Zhen Li, Junfeng Tian:
A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment. 139-142 - Qian Zhao, Xueying Liu:
An Improved Multi-objective Population Migration Optimization Algorithm. 143-146 - Yuwu Lu, Xueying Liu:
A New Population Migration Algorithm Based on the Chaos Theory. 147-150 - Chunxia Tu:
Study on QoS Protection Mechanism of VoIP Systems. 151-153 - Gaizhen Yang:
The Application of MapReduce in the Cloud Computing. 154-156 - Yin Hu, Pei Lin:
Research and Implementation of Packet Classification Based on NDIS Intermediate Layer under Windows Platform. 157-160 - Hong-fu Liu, Cong Zhang, Rui-fan Liang:
Optimization of Masking Expansion Algorithm in Psychoacoustic Models. 161-164 - Kuobin Dai:
Secure Digital Library Technology Research Based on VPN. 165-168 - Xinzhi Wang, Lechang Sun, Jingju Liu, Qiang Li:
VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTM. 169-172 - Juan He:
An Analytic Network Process Model of Trust in B2C E-Commerce. 173-176 - Zhihong Wu, Xiaohong Xiao:
Study on Histogram Equalization. 177-179 - Xun Pan, Jing-yuan Zhang, Cheng-jiang Liu:
Numerical Simulation and Analysis of Cavitation Characteristics of Ship Propeller. 180-183 - Lei Lu, Lei Zhang:
The Chaotic Cipher Based on CNNs and Its Application in Network. 184-187 - Kailiang Liang:
A Network Construction Solution in Colleges or Universities. 188-191 - Kailiang Liang:
Research on Thin AP Architecture to Deploy Campus WLAN. 192-195 - Haoyong Lv, Zhihong Wu:
A Survey of Computer Graphics and Graphics Image Processing Technology. 196-198 - Kuobin Dai:
IPv4 to IPv6 Transition Research Based on the Campus Network. 199-202 - Ying Xue:
Research of SCM System Based on the Internet of Things on EPC. 203-205 - Guangyan Xu, Meng Zhang:
Robust Control of One Arm Space Manipulator with Parameters Uncertainties Compensated. 206-209 - Guangyan Xu, Huanqiang Wang:
Research of Circular-Like Satellite Formation Flying at Critical Inclination. 210-213 - Zhonglin He, Zhihua Hu:
A New Method for Impossible Differential Cryptanalysis of 8-Round AES-128. 214-217 - Gui-ming Shao, Chaofan Xiong:
Exploration and Example for Mathematical Application Issues in U.S. Mathematics Textbooks. 218-221 - Xiao-jun Zhu, Shi-qin Lv, Liu-juan Fan, Xue-li Yu:
The EEG Signal Process Based on EEMD. 222-225 - Kuobin Dai:
Teaching and Research of Cryptography in Information and Computer Science. 226-230 - Kuobin Dai:
Network Security Mechanisms Research. 231-234 - Jinfeng Wang:
Applied Study on Information Technology and College English Teaching Integration. 235-237 - Chao-yang Zhang:
An Improved Binary Image Watermarking Algorithm Based on Singular Value Decomposition. 238-241 - Chao-yang Zhang:
An Improved Computer Notary System Protocols. 242-244 - Chao-yang Zhang, Chao Wei:
Research and Application of the Stronger Security Dual Signature. 245-247 - Zhihua Hu, Zhonglin He:
A New Method for Impossible Differential Cryptanalysis of 7-Round AES-192. 248-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.