default search action
3PGCIC 2014: Guangdong, China
- 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4171-1
- Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada:
New Evaluation Criterion of File Replicas Placement for Replication Strategies in Data Grids. 1-8 - Zijing Cheng, Lei He, Jingling Zhao, Kai Lin, Baojiang Cui:
A Security Enhanced IEEE1588 Protocol for Deep-Space Environment. 9-13 - Lequn Mo, Fuyong Lin:
A Dynamic Re-encrypted Ciphertext-Policy Attributed-Based Encryption Scheme for Cloud Storage. 14-19 - Christian Esposito, Massimo Ficco, Francesco Palmieri, Vincenzo Loia:
On Reliability and Security in Knowledge Grids. 20-27 - Hang Yang, Fuzheng Zhang, Aidong Xu, Cai Yuan, Chuanlin Chen:
A Method to Predict the Intermittent Power by Classification Model. 28-33 - Hang Yang, Aidong Xu, Huajun Chen, Cai Yuan:
A Review: The Effects of Imperfect Data on Incremental Decision Tree. 34-41 - Huajun Chen, Hang Yang, Aidong Xu, Cai Yuan:
A Decision Support System Using Two-Level Classifier for Smart Grid. 42-45 - Jorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto, Leonard Barolli:
A Collective Intelligence Approach for Building Student's Trustworthiness Profile in Online Learning. 46-53 - Xiaona Qiu, Qing Liao:
A Vertical Handoff Decision Algorithm Based on the Movement-Aware of Mobile Nodes. 54-61 - Yong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang, Weiqi Chen, Yuran Zeng:
Concept Drift Mining of Fundamental Variables in China Stock Market. 62-68 - Bo Song, Guoping Jiang, Yurong Song:
Epidemic Dynamics in Weighted Adaptive Networks. 69-73 - Chang-Ji Wang, Xi-Lei Xu, Dong-Yuan Shi, Wen-Long Lin:
An Efficient Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-receiver Identity-Based Encryption. 74-81 - Pietro Ruiu, Olivier Terzo, Giuseppe Carlino, Rossella Prandi, Alberto Falzone, Paolo Maggi, Livia Torterolo, Enrico Usai, Gianpaolo Perego:
HPC Cloud Pills: On-Demand Deployment and Execution of HPC Application in Cloud Environments. 82-88 - Cristiana Voicu, Florin Pop, Ciprian Dobre, Fatos Xhafa:
MOMC: Multi-objective and Multi-constrained Scheduling Algorithm of Many Tasks in Hadoop. 89-96 - Yuan Wang, Yongjun Wang, Jing Liu, Zhijian Huang:
A Network Gene-Based Framework for Detecting Advanced Persistent Threats. 97-102 - Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian:
Improving Differential Evolution with Ring Topology-Based Mutation Operators. 103-109 - Chengxu Ye, Ping Yang, Shaopeng Liu:
Topic Detection in Chinese Microblogs Using Hot Term Discovery and Adaptive Spectral Clustering. 110-119 - Cheng Wang, Zhixiao Lin, Fangsheng Guotang, Lixiao Zheng, Zhigang Zhu:
Design and Implementation of WPF-based Mini OA System. 120-126 - Yanxiang Ling, Qing Liao:
Improved Recommendation System with Friends on SNS. 127-133 - Yang Chen, You Lin:
Multi-input Functional Encryption Based Electronic Voting Scheme. 134-138 - Guoheng Wei, Huanguo Zhang, Zheng Li:
Distance-Bounding Protocol with Time-Stamped Authentication for RFID. 139-145 - Bin Liang, Zhendong Wu, Lin You:
A Novel Fingerprint-Based Biometric Encryption. 146-150 - Zhengjun Jing, Guoping Jiang, Chunsheng Gu:
A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps. 151-156 - Jia Yu:
The Analysis of Compressive Sensing Theory. 157-160 - Ling-Ling Xia, Guoping Jiang, Bo Song, Guanhua Zhu:
Rumor Spreading Model Considering the Importance and Fuzziness of Information. 161-166 - Jian Huang, Chunwei Liu, Jinhui Qie:
Developing Map Matching Algorithm for Transportation Data Center. 167-170 - Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:
Static Compliance Checking beyond Separation of Duty Constraints. 171-178 - Huixia Luo, Guidong Zhang, Yongjun Shen, Jialin Hu:
Mixed Fruit Fly Optimization Algorithm Based on Lozi's Chaotic Mapping. 179-183 - Feng Dan, Yajie Ma, Fengxing Zhou, Shaowu Lu:
A Multi-attribute Vertical Handover Algorithm Based on Adaptive Weight in Heterogeneous Wireless Network. 184-188 - Xiaolong Liu, Qiang Wei, Ziwei Ye:
Static-Dynamic Control Flow Integrity. 189-196 - Hui Zeng, Liyan Xiong, Jianjun Chen:
The Chinese Conceptual Graph Matching Algorithm Based on Conceptual Sub-graph Weight Self-Adjustment. 197-200 - Hui Zeng, Jun Wang, Tao Wan:
Chinese Person Name Recognition Based on Naive Bayes. 201-204 - Yang Jing, Zeng Hui, Huang Jiangping:
Vinyl Acetate Polymerization Rate Prediction Based on FOA GNN. 205-208 - Jing Yang, Qi Zhu, Haizhou Xu:
An Improved Method of Interrogative Sentence Similarity Compute and Application in Q&A System. 209-212 - Wei Zhang:
Strain Sensitizing of High-Sensitivity SAW Sensor Based on FBG. 213-216 - Wei Zhang:
An Improved Image Encoding Algorithm Based on EZW and Huffman Joint Encoding. 217-220 - Yueshun He, Wei Zhang, Nan Jiang, Xiaoyan Luo:
The Research of Scale-Free Sensor Network Topology Evolution Based on the Energy Efficient. 221-226 - Yueshun He, Wei Zhang, Nan Jiang, Xiaoyan Luo:
The Research of Wireless Sensor Network Channel Propagation Model in the Wild Environment. 227-231 - Ping Pan, Xinyue Mao, Ping Yang, Huiling Zhou:
Reliability Analysis of Business Continuity Based on SPN in Information System Security Management. 232-236 - Ping Zhen, Geng Zhao, Lequan Min, Xiaodong Li:
A Survey of Chaos-Based Cryptography. 237-244 - Xiaoqian Zhang, Xiaoqing Tan, Cui Liang:
High Efficient Multi-party Quantum Secret Sharing Scheme. 245-250 - Xiaoqing Tan, Xiaoqian Zhang, Cui Liang:
Multi-party Quantum Secure Direct Communication. 251-255 - Qinshu Xiao, Wenan Zhou, Baojiang Cui, Lingrong Li:
An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters. 256-261 - Li Yong-Fei, Tian Li-Qin:
Comprehensive Evaluation Method of Reliability of Internet of Things. 262-266 - Jianhong Zhang, Weina Zeng:
Self-Certified Public Auditing for Data Integrity in Cloud Storage. 267-273 - Xiang-Zhan Yu, Haining Yu:
An Asynchronous Periodic Sequential Patterns Mining Algorithm with Multiple Minimum Item Supports. 274-281 - Lidia Ogiela, Marek R. Ogiela:
Computer-Aided Enterprise Management. 282-285 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Intelligent Bio-inspired Approach for Secrecy Management in the Cloud. 286-289 - Tomasz Hachaj, Marek R. Ogiela:
Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface. 290-294 - Miroslaw Trzupek, Marek R. Ogiela:
Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image Retrieval. 295-299 - Philip Moore, Tarik Qassem, Fatos Xhafa:
'NoSQL' and Electronic Patient Record Systems: Opportunities and Challenges. 300-307 - Tarik Qassem, George Tadros, Philip Moore, Fatos Xhafa:
Emerging Technologies for Monitoring Behavioural and Psychological Symptoms of Dementia. 308-315 - Weiqi Chen, Kang Liu, Lijun Su, Mei Liu, Zhifeng Hao, Yong Hu, Xiangzhou Zhang:
Discovering Many-to-One Causality in Software Project Risk Analysis. 316-323 - Li-Xia Lei, Yuejin Zhang:
Photon Pulses based Heterodyne Detection Precision Ranging System. 324-328 - Hongyang Yan, Xuan Li, Jin Li:
Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing. 329-332 - Hongli Chen, Zhaohua Huang:
Medical Image Feature Extraction and Fusion Algorithm Based on K-SVD. 333-337 - Gansen Zhao, Libo Li, Zijing Li, Qiaoying Lin:
Multiple Nested Schema of HBase for Migration from SQL. 338-343 - Hongli Chen, ShanGuo Lv:
Adaptive Cloud Bandwidth Rental and Allocation Strategy. 344-349 - ShanGuo Lv, YiQin Cao:
An Algorithm of Video Network Transmission Based on Unbalanced Multiple Description Coding. 350-354 - Gansen Zhao, Qiaoying Lin, Libo Li, Zijing Li:
Schema Conversion Model of SQL Database to NoSQL. 355-362 - Jun Yang, Zheli Liu, Chunfu Jia, Kai Lin, Zijing Cheng:
New Data Publishing Framework in the Big Data Environments. 363-366 - Xiaoyi Zhou, Jixin Ma, Wencai Du, Yihong Li:
A Dynamic Multiple Digital Watermarking Model based on Temporal Series. 367-371 - Li Qiang, Wenan Zhou, Baojiang Cui, Liu Na:
Security Analysis of TAU Procedure in LTE Network. 372-376 - Li-Xia Lei, Yuejin Zhang:
Design of a New EPON Connection Automatic Protection System. 377-381 - Dan Zou, Yan Mei:
All-Optical Signal Processing with New DPSK Based on Multi-dimensional Complex. 382-385 - Lishan Ke, Zhiqiang Lin:
Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences. 386-389 - ShanGuo Lv, Hongli Chen:
Research of Trust Model Personalized Dynamic Recommendation System Based on Auction Mechanism. 390-393 - Ugo Gentile, Stefano Marrone, Nicola Mazzocca, Roberto Nardone:
A Cost-Energy Trade-Off Model in Smart Energy Grids. 394-399 - Mario Sicuranza, Mario Ciampi:
A Semantic Access Control for Easy Management of the Privacy for EHR Systems. 400-405 - Flora Amato, Francesco Moscato:
A Modeling Profile for Availability Analysis of Composite Cloud Services. 406-413 - Mario Barbareschi, Alessandra De Benedictis, Antonino Mazzeo, Antonino Vespoli:
Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware Accelerators. 414-419 - Anita Alicante, Massimo Benerecetti, Anna Corazza, Stefano Silvestri:
A Distributed Information Extraction System Integrating Ontological Knowledge and Probabilistic Classifiers. 420-425 - Aniello Minutolo, Angelo Esposito, Mario Ciampi, Massimo Esposito, Giorgio Cassetti:
An Automatic Method for Deriving OWL Ontologies from XML Documents. 426-431 - Flora Amato, Annibale Elia, Alessandro Maisto, Antonino Mazzeo, Serena Pelosi:
Automatic Population of Italian Medical Thesauri: A Morphosemantic Approach. 432-436 - Daniela D'Auria, Dario Di Mauro, Davide Maria Calandra, Francesco Cutugno:
Interactive Headphones for a Cloud 3D Audio Application. 437-442 - Jie Ma, Haiyang Yu, Xiaoli Gong, Xiaoyu Zhang:
Research on Online Measurement Method of Smartphone Energy Consumption. 443-447 - Ran Li, Qingqing Liu, Mingqiang Wang, Xianglin We:
A Novel Framework for Application of Cloud Computing in Wireless Mesh Networks. 448-452 - Xiaoli Gong, Qi Du, Xu Li, Jin Zhang, Ye Lu:
Performance Overhead of Xen on Linux 3.13 on ARM Cortex-A7. 453-456 - Guomin Zhang, Chao Hu, Na Wang, Xianglin Wei, Chang-you Xing:
GMCR: A Novel Scheme for Improving Quality of Service of Live Streaming. 457-462 - Xianglin Wei, Jianhua Fan, Ming Chen, Guomin Zhang:
A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems. 463-468 - Qingcheng Li, Ye Lu, Xiaoli Gong, Jin Zhang:
Optimizational Method of HBase Multi-dimensional Data Query Based on Hilbert Space-Filling Curve. 469-474 - Bing Zhao, Ziyue Wang, Baojiang Cui, Xiaobing Liang:
An Enhanced Secure Mechanism of Low Level Reader Protocol (LLRP) V1.1. 475-480 - Haifeng Jin, Baojiang Cui, Jianxin Wang:
Mining Mobile Internet Packets for Malware Detection. 481-486 - Baojiang Cui, Baolian Long, Tingting Hou:
Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language. 487-491 - Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu:
Program Crash Analysis Based on Taint Analysis. 492-498 - Jingling Zhao, Huiyun Zhang, Baojiang Cui:
Sentence Similarity Based on Semantic Vector Model. 499-503 - Shuai Shao, Guowei Dong, Tao Guo, Tianchang Tang, Chenjie Shi:
Analysis on Password Protection in Android Applications. 504-507 - Xiaobing Liang, Yingjie Lv, Bing Zhao, Ying Liu, Zhiqiang Sun, Wei Cen:
A RFID Mutual Authentication Security Protocol Design and Analysis. 508-512 - Yongle Hao, Hongliang Liang, Daijie Zhang, Qian Zhao, Baojiang Cui:
JavaScript Malicious Codes Analysis Based on Naive Bayes Classification. 513-519 - Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng:
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols. 520-524 - Yanyan Han, Wencai He, Shuai Ji, Qing Luo:
A Digital Watermarking Algorithm of Color Image based on Visual Cryptography and Discrete Cosine Transform. 525-530 - Xue Qiu, Qiong Jia, Shuguang Wang, Chunhe Xia, Liangshuang Lv:
Automatic Generation Algorithm of Penetration Graph in Penetration Testing. 531-537 - Mengru Cai, Zhendong Wu, Jianwu Zhang:
Research and Prevention of Rogue AP Based MitM in Wireless Network. 538-542 - Binbin Yu, Jianwu Zhang, Zhendong Wu:
Improved EAP-AKA Protocol Based on Redirection Defense. 543-547 - Xi Shi:
A Statistical Integrity Authentication Scheme without Grouping for Streaming Data. 548-552 - Fuqiang Di, Minqing Zhang, Jia Liu:
Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis. 553-558 - Wang Ying:
Encrypted Botnet Detection Scheme. 559-565 - Hui Li, Xin Lu:
Challenges and Trends of Big Data Analytics. 566-567 - Yonglin Sun, Yongjun Wang, Xiaobin Wang:
Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves? 568-572 - Yusuke Gotoh, Akihiro Kimura:
Evaluation of Division Based Broadcasting System Considering Additional Information. 573-578 - Yuzo Taenaka, Masaki Tagawa, Kazuya Tsukamoto:
Experimental Deployment of a Multi-channel Wireless Backbone Network Based on an Efficient Traffic Management Framework. 579-584 - Roy Fisher, Gerhard P. Hancke:
DTLS for Lightweight Secure Data Streaming in the Internet of Things. 585-590 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:
A Study of Robustness Enhancement Technique on P2P Sensor Data Stream Delivery System Using Distributed Hashing. 591-596 - Yoshimasa Ishi, Tomoya Kawakami, Tomoki Yoshihisa, Yuuichi Teranishi:
An Evaluation of a P2P Sensor Data Streaming System Considering the Number of Hops on the PIAX Testbed. 597-602 - Zhengrong Wu, Aidong Xu, Tao Zhang, Chuanlin Chen:
Integrated Technical Planning for Regional Smart Grid. 603-608 - Dan Zou, Yuejin Zhang:
WDM-PON Breakpoint Precision Detection System Based Broadband Chaos Light. 609-615 - Yuxin Ding, Wei Dai, Yibin Zhang, Chenglong Xue:
Malicious Code Detection Using Opcode Running Tree Representation. 616-621 - Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform. 622-627 - Xiang Lu, Jianxun Liu:
Performance of Space Network Time Synchronization Protocol in Proximity Link. 628-632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.