default search action
10th TrustCom 2011: Changsha, China
- IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2135-9
- Ivan Stojmenovic:
Access Control in Distributed Systems: Merging Theory with Practice. 1-2 - Huaimin Wang:
TRUSTIE: Design of a Trustworthy Software Production Environment. 3-4 - Moon Ho Lee:
Jacket Matrix and Its Applications to Signal Processing. 5-6 - Yang Xiang:
Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments. 7-8 - Valtteri Niemi:
Privacy, Identity and Trust in Context-Aware Mobile Services. 9-10 - Hakem Beitollahi, Geert Deconinck:
A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks. 11-20 - Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of Success Rates of Denial-of-Service Attacks. 21-28 - Lin Liu:
Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets. 29-36 - Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha:
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. 37-44 - Ben S. Y. Fung, Patrick P. C. Lee:
A Privacy-Preserving Defense Mechanism against Request Forgery Attacks. 45-52 - Lei Zhang, Shui Yu, Di Wu, Paul A. Watters:
A Survey on Latest Botnet Attack and Defense. 53-60 - Zorana Bankovic, José Manuel Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón:
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques. 61-72 - Jianan Hao, Wentong Cai:
Trusted Block as a Service: Towards Sensitive Applications on the Cloud. 73-82 - Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan:
Privacy-Preserved Access Control for Cloud Computing. 83-90 - Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
DACC: Distributed Access Control in Clouds. 91-98 - Imad M. Abbadi, Muntaha Alawneh, Andrew P. Martin:
Secure Virtual Layer Management in Clouds. 99-110 - Mahbub Ahmed, Yang Xiang:
Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing. 111-117 - Jemal H. Abawajy:
Establishing Trust in Hybrid Cloud Computing Environments. 118-125 - Lingfeng Chen, Doan B. Hoang:
Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud. 126-133 - Mark Heydenrych, Elizabeth Marie Ehlers:
A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection. 134-141 - Ji Guo, Alan Marshall, Bosheng Zhou:
A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks. 142-149 - Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang:
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code. 150-159 - Hong Song, Xiao Xiao, Weiping Wang, Luming Yang:
DENNC: A Wireless Malicious Detection Approach Based on Network Coding. 160-165 - Chi-Man Pun, Xiaochen Yuan, C. L. Philip Chen:
Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution. 166-172 - Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Forecasting the Distribution of Network Traffic for Anomaly Detection. 173-180 - Silvio Cesare, Yang Xiang:
Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs. 181-189 - Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
A Method for Detecting Unknown Malicious Executables. 190-196 - Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen:
Privacy Crisis Due to Crisis Response on the Web. 197-205 - Mahdi Asadpour, Mohammad Torabi Dashti:
A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets. 206-213 - Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser:
Learning Whom to Trust in a Privacy-Friendly Way. 214-225 - Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala:
Semantics-Enhanced Privacy Recommendation for Social Networking Sites. 226-233 - Hervais Simo Fhom, Kpatcha M. Bayarou:
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems. 234-241 - Ricardo Jorge Santos, Jorge Bernardino, Marco Vieira:
Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses. 242-249 - Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang:
Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems. 250-257 - Wanita Sherchan, Surya Nepal, Athman Bouguettaya:
A Trust Prediction Model for Service Web. 258-265 - Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang:
IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation. 266-273 - Zheng Yan, Raimo Kantola, Peng Zhang:
A Research Model for Human-Computer Trust Interaction. 274-281 - Sancheng Peng, Guojun Wang:
Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. 282-287 - Aarthi Krishna, Vijay Varadharajan:
A Hybrid Trust Model for Authorisation Using Trusted Platforms. 288-295 - Partheeban Chandrasekaran, Babak Esfandiari:
A Model for a Testbed for Evaluating Reputation Systems. 296-303 - Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang:
SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup. 304-311 - Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann:
A Reputation Mechanism for Virtual Reality - Five-Sense Oriented Feedback Provision and Subjectivity Alignment. 312-319 - Wenjun Jiang, Guojun Wang:
SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks. 320-327 - Jianming Fu, Xinwen Liu, Binling Cheng:
Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing. 328-335 - Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu:
Case-Based Trust Evaluation from Provenance Information. 336-343 - Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu:
A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories. 344-351 - Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai:
Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration. 352-361 - Rehab Alnemr, Maxim Schnjakin, Christoph Meinel:
Towards Context-Aware Service-Oriented Semantic Reputation Framework. 362-372 - Xiaolin Cao, Máire O'Neill:
A Private and Scalable Authentication for RFID Systems Using Reasonable Storage. 373-380 - Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma:
SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk. 381-388 - Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy:
An EAP Framework for Unified Authentication in Wireless Networks. 389-397 - Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu:
Inter-Chip Authentication through I/O Character. 398-402 - Fuwen Liu, Hartmut König:
A Simple Balanced Password-Authenticated Key Agreement Protocol. 403-408 - Tassos Dimitriou, Ahmad Sabouri:
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks. 409-416 - Harinda Fernando, Jemal H. Abawajy:
Mutual Authentication Protocol for Networked RFID Systems. 417-424 - Wei Feng, Yu Qin, Aimin Yu, Dengguo Feng:
A DRTM-Based Method for Trusted Network Connection. 425-435 - Julian Jang, Hon Hwang, Surya Nepal:
Biometric Enabled Portable Trusted Computing Platform. 436-442 - André Seffrin, Sorin A. Huss:
Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis. 443-450 - Firas Bader, Andra Radoveneanu, Hani Ragab Hassen:
A New Security Architecture for BitTorrent. 451-455 - Owen Sacco, Alexandre Passant, Stefan Decker:
An Access Control Framework for the Web of Data. 456-463 - Gonzalo Huerta Cánepa, Dongman Lee, Seon-Yeong Han:
Trust ME: A Trust Decision Framework for Mobile Environments. 464-471 - Yanjun Zuo, Suhas Lande:
A Logical Framework of Proof-Carrying Survivability. 472-481 - Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang:
CNSSA: A Comprehensive Network Security Situation Awareness System. 482-487 - Daniel Granlund, Christer Åhlund:
A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support. 488-493 - Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu:
Secret Sharing Scheme with Fairness. 494-500 - Yongming Xie, Guojun Wang:
Distributed Private-Key Generation Scheme with Self-Certified Identity. 501-508 - Qian Sun, Min Wu:
A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks. 509-516 - Ahmed Al-Khazzar, Nick Savage:
Biometric Identification Using User Interactions with Virtual Worlds. 517-524 - Jianyong Huang, Willy Susilo, Jennifer Seberry:
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. 525-532 - Andriy Panchenko, Otto Spaniol, André Egners, Thomas Engel:
Lightweight Hidden Services. 533-540 - Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov:
Security Issues in NoSQL Databases. 541-547 - Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau:
A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks. 548-555 - Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. 556-563 - Miao Xie, Song Han, Biming Tian:
Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks. 564-571 - Junjie Xiong, Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu:
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks. 572-581 - Fabio Marturana, Gianluigi Me, Rosamaria Berte, Simone Tacconi:
A Quantitative Approach to Triaging in Mobile Forensics. 582-588 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks. 589-596 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Cross-Platform Application Sharing Mechanism. 597-605 - Udaya Kiran Tupakula, Vijay Varadharajan:
TVLAN: Trusted and Virtualised Local Area Networks. 606-612 - Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin:
A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems. 613-620 - Helen Balinsky, Neil C. A. Moore, Steven J. Simske:
Intelligent Assistant for Context-Aware Policies. 621-630 - Helen Balinsky, Liqun Chen, Steven J. Simske:
Publicly Posted Composite Documents in Variably Ordered Workflows. 631-638 - Trey Reece, Daniel B. Limbrick, William H. Robinson:
Design Comparison to Identify Malicious Hardware in External Intellectual Property. 639-646 - Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Global Trust Management. 647-654 - Andreu Pere Isern-Deyà, M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà:
A Secure Multicoupon Solution for Multi-merchant Scenarios. 655-663 - Stephen W. Neville, Michael Horie:
Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions. 664-672 - Haiyang Jiang, Jianhua Yang, Gaogang Xie:
Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors. 673-680 - Bhume Bhumiratana:
A Model for Automating Persistent Identity Clone in Online Social Network. 681-686 - Kaiyu Wan, Vangalur S. Alagar:
Dependable Context-Sensitive Services in Cyber Physical Systems. 687-694 - Rongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin:
Statistical Fault Localization via Semi-dynamic Program Slicing. 695-700 - Chunlei Mei, Maoxiang Yi, Zhifei Shen:
Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination. 701-705 - Carlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur:
Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service. 706-713 - Fatemeh Barani, Mahdi Abadi:
An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs. 714-720 - Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari:
An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology. 721-725 - Tong Liu, Prathima Agrawal:
A Trusted Integrity Measurement Architecture for Securing Enterprise Network. 726-731 - Fang Huang, Cai-xia Wang, Jun Long:
Design and Implementation of Single Sign on System with Cluster CAS for Public Service Platform of Science and Technology Evaluation. 732-737 - Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:
A Framework for the Assessment of the Trustworthiness of Digital Records over Time. 738-744 - Mei Liu, Ge Fu, Jiwu Jing:
eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems. 745-750 - Aimin Yu, Shijun Zhao:
Enhancing Flexibility of TCG's TNC through Layered Property Attestation. 751-756 - Md. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi:
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning. 757-764 - Ryan K. L. Ko, Peter Jagadpramana, Bu-Sung Lee:
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. 765-771 - Xinxin Fan, Guang Gong, Honggang Hu:
Remedying the Hummingbird Cryptographic Algorithm. 772-778 - Jinfang Sheng, Wen Zou, Liu Yang, Bin Wang:
A RFID-Based Context-Aware Service Model. 779-784 - Muntaha Alawneh, Imad M. Abbadi:
Defining and Analyzing Insiders and Their Threats in Organizations. 785-794 - Chi-Man Pun, Jing-Jing Jiang, C. L. Philip Chen:
Adaptive Client-Side LUT-Based Digital Watermarking. 795-799 - Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang:
Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability. 800-805 - Hyun-Jung Lee, Kwang-Woo Lee, Dongho Won:
Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System. 806-811 - Chi-won Song, Sungmin Park, Dongwook Kim, Sooyong Kang:
Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service. 812-817 - Warodom Werapun, Julien Fasson, Béatrice Paillassa:
Home Service Communities and Authentication. 818-823 - Qiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang:
Key Privacy in McEliece Public Key Cryptosystem. 824-828 - Ronald Petrlic:
Integrity Protection for Automated Teller Machines. 829-834 - Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi:
Group Formation with Neighbor Similarity Trust in P2P E-Commerce. 835-840 - Surya Nepal, Wanita Sherchan, Cécile Paris:
STrust: A Trust Model for Social Networks. 841-846 - Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing. 847-852 - Zheng Yan, Raimo Kantola, Peng Zhang:
Theoretical Issues in the Study of Trust in Human-Computer Interaction. 853-856 - Yu Chen, Zheng Yan, Valtteri Niemi:
Implementation of a Reputation System for Pervasive Social Networking. 857-862 - Marc Barisch:
Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems. 863-872 - Peng Zhang, Hanlin Sun, Zheng Yan:
Building up Trusted Identity Management in Mobile Heterogeneous Environment. 873-877 - Giampaolo Bella, Lizzie Coles-Kemp:
Internet Users' Security and Privacy While They Interact with Amazon. 878-883 - Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang:
A New Multivariate Hash Function with HAIFA Construction. 884-888 - Dong Yan, Wang Qi:
The Role of Trust in Social Life. 889-892 - Timo Kiravuo:
Reputation Based Collaboration among Ethernet Switches. 893-896 - Xunru Yin, Wenping Ma:
Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2. 897-899 - Ronghua Shi, Qian Su, Ying Guo, Moon Ho Lee:
Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem. 900-904 - Ronghua Shi, Jinjing Shi, Ying Guo, Moon Ho Lee:
Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation. 905-910 - Xiaoping Lou, Zhigang Chen:
Quantum Distributed Ballot Scheme Based on Entanglement Swapping. 911-915 - Isredza Rahmi A. Hamid, Jemal H. Abawajy:
Phishing Email Feature Selection Approach. 916-921 - Yujing Liu, Wei Peng, Jinshu Su:
Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning. 922-926 - Adeela Waqar, Asad Raza, Haider Abbas:
User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment. 927-932 - Sheikh Mahbub Habib, Sebastian Ries, Max Mühlhäuser:
Towards a Trust Management System for Cloud Computing. 933-939 - Chew-Yean Yam, Adrian Baldwin, Simon Shiu, Christos Ioannidis:
Migration to Cloud as Real Option: Investment Decision under Uncertainty. 940-949 - Chaitanya Belwal, Albert M. K. Cheng, Walid Taha:
Release Offset Bounds for Response Time Analysis of P-FRP Using Exhaustive Enumeration. 950-957 - Ekain Azketa, Juan P. Uribe, Marga Marcos, Luís Almeida, J. Javier Gutiérrez:
Permutational Genetic Algorithm for the Optimized Assignment of Priorities to Tasks and Messages in Distributed Real-Time Systems. 958-965 - Chaitanya Belwal, Albert M. K. Cheng:
Feasibility Interval for the Transactional Event Handlers of P-FRP. 966-973 - Mohamed-Lamine Boukhanoufa, Ansgar Radermacher, François Terrier:
Offline Validation of Real-Time Application Constraints Considering Adaptation Rules. 974-980 - Ricardo Marau, Karthik Lakshmanan, Paulo Pedreiras, Luís Almeida, Raj Rajkumar:
Efficient Elastic Resource Management for Dynamic Embedded Systems. 981-990 - Miao Zhou, Santiago Bock, Alexandre Peixoto Ferreira, Bruce R. Childers, Rami G. Melhem, Daniel Mossé:
Real-Time Scheduling for Phase Change Main Memory Systems. 991-998 - Borislav Nikolic, Muhammad Ali Awan, Stefan M. Petters:
SPARTS: Simulator for Power Aware and Real-Time Systems. 999-1004 - Ankita Arora, Sri Parameswaran, Roshan G. Ragel, Darshana Jayasinghe:
A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel Attacks. 1005-1014 - Guangjun Xie, Guangzhi Xu, Gang Wang, Jing Liu, Rui Cao, Yan Gao:
hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs. 1015-1022 - Ming-Feng Chang, Wen-Yew Liang:
Learning-Directed Dynamic Voltage and Frequency Scaling for Computation Time Prediction. 1023-1029 - Xiaowen Chen, Shuming Chen:
DSBS: Distributed and Scalable Barrier Synchronization in Many-Core Network-on-Chips. 1030-1037 - Yazhi Huang, Qing'an Li, Chun Jason Xue:
Minimizing Schedule Length via Cooperative Register Allocation and Loop Scheduling for Embedded Systems. 1038-1044 - Yibo Guo, Qingfeng Zhuge, Jingtong Hu, Edwin Hsing-Mean Sha:
Optimal Data Placement for Memory Architectures with Scratch-Pad Memories. 1045-1050 - Owen R. Kelly, Hakan Aydin, Baoxian Zhao:
On Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task Sets. 1051-1059 - Chaitanya Belwal, Albert M. K. Cheng:
A Sufficient Schedulability Test for Real-Time Software Transactional Memory. 1060-1067 - Dakshina Dasari, Björn Andersson, Vincent Nélis, Stefan M. Petters, Arvind Easwaran, Jinkyu Lee:
Response Time Analysis of COTS-Based Multicores Considering the Contention on the Shared Memory Bus. 1068-1075 - Xiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang, Yuzhuo Fu, Meikang Qiu:
Efficient Implementation of Thermal-Aware Scheduler on a Quad-core Processor. 1076-1082 - Buyoung Yun, Kang G. Shin, Shige Wang:
Thermal-Aware Scheduling of Critical Applications Using Job Migration and Power-Gating on Multi-core Chips. 1083-1090 - Chaitanya Belwal, Albert M. K. Cheng:
Schedulability Analysis of Transactions in Software Transactional Memory Using Timed Automata. 1091-1098 - Stefan Schäckeler, Nityananda Jayadevaprakash:
Visualization of Computational Processes of Procedural Abstraction Optimization Passes. 1099-1108 - Christian Wiederseiner, Vahid Garousi, Michael Smith:
Tool Support for Automated Traceability of Test/Code Artifacts in Embedded Software Systems. 1109-1117 - Xiaoli Gong, Jie Ma, Qingcheng Li, Jin Zhang:
Automatic Model Building and Verification of Embedded Software with UPPAAL. 1118-1124 - Geng Chen, Lei Luo, Lijie Wang:
A Precise Memory Model for Operating System Code Verification. 1125-1132 - Takahiro Chiba, Yuichi Itami, Myungryun Yoo, Takanori Yokoyama:
A Distributed Real-Time Operating System with Location-Transparent System Calls for Task Management and Inter-task Synchronization. 1133-1138 - Dong Jin, Tatsuo Tsuji:
Parallel Data Cube Construction Based on an Extendible Multidimensional Array. 1139-1145 - Hallstein Asheim Hansen:
Safety Verification of Non-linear, Planar Proportional Control with Differential Inclusions. 1146-1153 - Hüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, Rolf Johansson:
Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts. 1154-1163 - Risat Mahmud Pathan, Jan Jonsson:
FTGS: Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors. 1164-1175 - Sara Tucci Piergiovanni, Chokri Mraidha, Ernest Wozniak, Agnes Lanusse, Sébastien Gérard:
A UML Model-Based Approach for Replication Assessment of AUTOSAR Safety-Critical Applications. 1176-1187 - Hongfei Yin, Hongjun Dai, Zhiping Jia:
Verification-Based Multi-backup Firmware Architecture, an Assurance of Trusted Boot Process for the Embedded Systems. 1188-1195 - Matthias Hagner, Adina Aniculaesei, Ursula Goltz:
UML-Based Analysis of Power Consumption for Real-Time Embedded Systems. 1196-1201 - Yann-Hang Lee, Preetham Chandrian, Bo Li:
Efficient Java Native Interface for Android Based Mobile Devices. 1202-1209 - Yi-Zong Ou, Edward T.-H. Chu, Wen-wei Lu, Jane W.-S. Liu, Ta-Chih Hung, Jwu-Sheng Hu:
Resource Management for Robotic Applications. 1210-1216 - Shaohua Liang, Md. Zakirul Alam Bhuiyan, Guojun Wang:
Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs. 1217-1223 - Feng Zeng, Lan Yao, Zhigang Chen, Huamei Qi:
A Distributed and Shortest-Path-Based Algorithm for Maximum Cover Sets Problem in Wireless Sensor Networks. 1224-1228 - Kenichi Asami, Hayato Hagiwara, Mochimitsu Komori:
Visual Navigation System with Real-Time Image Processing for Patrol Service Robot. 1229-1234 - Hao Liu, Wei Guo, Chao Lu, Jizeng Wei:
An Efficient Stereoscopic Game Conversion System for Embedded Platform. 1235-1240 - Patrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, Bernd Niehoff:
Autonomous Parameter and Schedule Configuration for TDMA-Based Communication Protocols Such as FlexRay. 1241-1246 - Alexandre Wagner Chagas Faria, Leandro Pfleger de Aguiar, Daniel S. D. Lara, Antonio Alfredo Ferreira Loureiro:
Comparative Analysis of Power Consumption in the Implementation of Arithmetic Algorithms. 1247-1254 - Xiaojian Liu, Zhixue Wang:
Extending EAST-ADL2 to Support Aspectual Requirement Specification and Analysis for Automotive Software. 1255-1263 - Qiong Wang, Cong Liu, Zhiying Wang:
An Advanced and Effective Literature Search Algorithm Based on Analytic Hierarchy Process. 1264-1270 - Taner Tuncer, Yetkin Tatar:
Detection DoS Attack on FPGA Using Fuzzy Association Rules. 1271-1276 - Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu:
Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks. 1277-1282 - Zhou Lu, Kailong Zhang, Xingshe Zhou:
A Software Fault-Tolerant Method Based on Exception Handling in RT/E System. 1283-1287 - Hongzhi Song, Guodong Si, Lei Yang, Huakun Liang, Lixia Zhang:
Using Project-Based Learning and Collaborative Learning in Software Engineering Talent Cultivation. 1288-1293 - Li Cheng, Cong Wang:
Study of Experiment Structure in the Computer Networks Course Using PBL Methodology. 1294-1297 - Yinbo Xie, Chengcheng Guo, Jianfeng Yang:
The Effective Second Classroom on Embedded System Education. 1298-1302 - Zhenzhou Tang, Chang Li, Chunrong Zhang, Xiaoqiu Shi:
The Practice Teaching Reform of Modern Communication Technologies Course for Non-communication Majors. 1303-1307 - Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li:
Reform and Practice of Training Engineering Professionals in 2C+E Computer Science. 1308-1312 - Chaoxiang Chen, Shiping Ye, Binbin Zhou, Guoyong Dai:
Study and Practice on Teaching Team Construction of Computer Specialties in Private Undergraduate Universities and Colleges. 1313-1318 - Qifan Yang, Jianping Cai, Jianzhong Wu, Meimei Huo:
Course Improvements to 'the Principle of Computer Organization' Based on the Goal of Disciplinary Education: Taking the Examples of the Computing Science Faculty of Zhejiang University City College. 1319-1322 - Yikui Zhang, Yunfen Tian, Liwei Zhu, Haoxiang Zuo:
Teaching Method Practicing on Embedded Software Engineering Curriculum. 1323-1327 - Weihua Cao, Gang Chen, Xin Chen, Min Wu:
Optimal Tracking Agent: A New Framework for Multi-agent Reinforcement Learning. 1328-1334 - Xing Gu, Qun Yang, Dechang Pi, He-yang Ke:
A Global Scheduling Algorithm Based on Dynamic Critical Path. 1335-1338 - Yisong Lin, Tao Tang, Guibin Wang:
Power Optimization for GPU Programs Based on Software Prefetching. 1339-1346 - Xia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, Pingpeng Yuan:
I/O Scheduling by Using Multi-network Interfaces of Virtualization System. 1347-1354 - Lingjie Zhang, Ying Zhao, Kaixi Hou:
The Research of Levenberg-Marquardt Algorithm in Curve Fittings on Multiple GPUs. 1355-1360 - Jun Zhang, Renjun Shao:
Object-Level Data Model for Keyword Search over Relational Databases. 1361-1366 - Che-Lun Hung, Yaw-Ling Lin, Kuan-Ching Li, Hsiao-Hsi Wang, Shih-Wei Guo:
Efficient GPGPU-Based Parallel Packet Classification. 1367-1374 - Jun Peng, Huiyuan Xian, Xiaoyong Zhang, Zheqin Li:
Context-Aware Vertical Handoff Decision Scheme in Heterogeneous Wireless Networks. 1375-1380 - Wei Liu, Feiyan Shi, Wei Du:
An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications. 1381-1386 - Bingning Han, Lihong Jiang, Hongming Cai:
Abnormal Process Instances Identification Method in Healthcare Environment. 1387-1392 - Deng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, Zhong Ren:
A Simulation Study of Unstructured P2P Overlay for Multimedia Streaming. 1393-1399 - Haibo Yu, Tsunenori Mine, Makoto Amamiya:
Towards User Intent Based Searching. 1400-1407 - Kun-Ming Yu, Shu-Hao Wu:
An Efficient Load Balancing Multi-core Frequent Patterns Mining Algorithm. 1408-1412 - Tian-Liang Huang, Tian-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li, Ching-Hsien Hsu, Hsi-Ya Chang:
Fault Tolerance Policy on Dynamic Load Balancing in P2P Grids. 1413-1420 - Sheng Liu, Hongdan Liu, Zhenguo Gao:
Power Control Game Algorithm Based on Combination Pricing Function. 1421-1424 - Libing Wu, Yalin Ke, Yanxiang He, Nan Liu:
A Block Gathering Based on Mobile Web Page Segmentation Algorithm. 1425-1430 - Chuncong Xu, Xiaomeng Huang, Guangwen Yang, Yang Zhou:
A Two-Layered Replica Management Method. 1431-1436 - Yi Li, Mingzhe Zhang, Jiaqi Gu:
An Email Server Optimized for Storage Issues. 1437-1443 - Kefei Wang, Heying Zhang, Lihong Peng, Baohua Fan:
Improving the Adaptiveness of FAST TCP Based on the Stability with Time-Delay. 1444-1451 - Ming Fang, Songqiao Chen, Kefei Wang:
Achieving High Throughput in High-Radix Switch. 1452-1456 - Xiaohua Zhang, Yuto Yoshida, Ning Xie:
Anisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from Real Image. 1457-1463 - Atsushi Mizoguchi, Kazunori Miyata:
Modeling Trees with Rugged Surfaces. 1464-1471 - Emmanuel Kondela, Huang Dong Jun:
A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space Detection. 1472-1476 - Muhammad Hassan, Ahsen Mehmood, Muhammad Faisal Khan:
An Efficient Method of Tracking across Multiple Cameras. 1477-1481 - Jinshun Li, Yanyu Hu:
Nose Surgery Simulation Based on Volumetric Laplacian Deformation. 1482-1487 - Yizhi Liu, Xiangdong Wang, Yongdong Zhang, Sheng Tang:
Fusing Audio-Words with Visual Features for Pornographic Video Detection. 1488-1493 - Sanding Luo, Xiaomin Fang, Cong Zhao, Yisha Luo:
Text Line Based Correction of Distorted Document Images. 1494-1499 - Cuiqin Hou, Yibin Hou, Zhangqin Huang, Qian Liu:
Overlapping One-Class SVMs for Utterance Verification in Speech Recognition. 1500-1504 - Fan Guo, Zixing Cai, Jin Tang:
Chinese Traffic Police Gesture Recognition in Complex Scene. 1505-1511 - Yunlong Zhang, Jingyu Zhou, Jia Cheng:
Preference-Based Top-K Influential Nodes Mining in Social Networks. 1512-1518 - Xiaoping Fan, Yueshan Xie, Zhifang Liao, Xiaoqing Li, Li-min Liu:
A Weighted Cluster Ensemble Algorithm Based on Graph. 1519-1523 - Yan Gao, Jin Liu, PeiXun Ma:
The Hot Keyphrase Extraction Based on TF*PDF. 1524-1528 - Fahmi Bargui, Hanêne Ben-Abdallah, Jamel Feki:
A Decision Making Ontology Building Process for Analytical Requirements Elicitation. 1529-1536 - Weiguo Liu, Jia OuYang:
Clustering Algorithm for High Dimensional Data Stream over Sliding Windows. 1537-1542 - Jiang Cao, XinJun Mao, Huining Yan, Yushi Huang, Huaimin Wang, Xicheng Lu:
Capability as Requirement Metaphor. 1543-1549 - Chengying Mao:
Variable Precision Rough Set-Based Fault Diagnosis for Web Services. 1550-1555 - Jianhua Li, Songqiao Chen, Lin Jian, Hongyu Zhang:
A Web Services Composition Model and Its Verification Algorithm Based on Interface Automata. 1556-1563 - Zaiwen Feng, Keqing He, Rong Peng, Buqing Cao:
Towards a Behavior-Based Restructure Approach for Service Composition. 1564-1571 - Yi Guo, XinJun Mao, Cuiyun Hu:
Design Pattern for Self-Organization Multi-agent Systems Based on Policy. 1572-1577 - Bin Wang, Dan Yin, Taiwen Wu, Jinfang Sheng:
Plug-In Based Integrated Development Platform for Industrial Control System-P-IDP4ICS. 1578-1583 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
A Certificate Driven Access Control Strategy for Service Composition and Its Analysis. 1584-1591 - Nan Zhang, Jiwu Jing, Peng Liu:
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era. 1592-1599 - Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen:
Towards Detecting Thread Deadlock in Java Programs with JVM Introspection. 1600-1607 - Jiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, Jiangchun Ren:
VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT File System. 1608-1615 - Yu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang:
A Property-Based Attestation Scheme with the Variable Privacy. 1616-1623 - Jun Peng, Junbo Li, Shuo Li, Jing Li:
Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor Networks. 1624-1629 - Zhongke Zhang, Yun Wang:
An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks. 1630-1637 - Muhammad Bilal, Pauline M. L. Chan:
A Game Theoretic Coalitional Bidding Scheme for Efficient Routing in Vehicular Ad Hoc Networks. 1638-1645 - Zhiwu Huang, Yuan Cheng, Weirong Liu:
A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless Sensor Networks. 1646-1651 - Weike Chen, Heng Shou, Wenfeng Li:
A Method for Searching the Centroid of a 3D Cluster Based on RSSI. 1652-1656 - Zheng Ma, Weijia Jia, Guojun Wang:
Routing with Virtual Region Coordinates in Wireless Sensor Networks. 1657-1661 - Jin Zheng, Xinlin Xu, Guojun Wang:
Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks. 1662-1667 - Poonam Goyal, Navneet Goyal, Rohan Sunil Karwa, Matthew John:
Phase-Wise Clustering of Time Series Gene Expression Data. 1668-1674 - Emanuele Covino, Giovanni Pani:
A Formal Approach for Modeling Interactive Visual Interfaces. 1675-1683 - Wenqi Huang, Liang Yu:
A Quasi Physical Method for the Equal Sphere Packing Problem. 1684-1690 - Hailin Chen, Zuping Zhang, Jing Xia:
A Refined and Heuristic Algorithm for LD tagSNPs Selection. 1691-1694 - Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Minghui Wang, Wenyue Zhang:
Improved Partial Parallel Decision Feedback Multiuser Detection for Multiuser-MIMO System. 1695-1698 - Kim-Yung Lu:
A Data Simulator for ZigBee-Base Wireless Sensor Network System. 1699-1703 - Balázs Karlócai, Andras Bojárszky, János Levendovszky:
Energy Aware Routing Protocols for Wireless Sensor Networks Using Discrete Transmission Energies. 1704-1707 - Zaid Ahmed Zabanoot, Geyong Min:
Performance Design and Analysis of Handoff in Hierarchical Wireless Networks. 1708-1714 - Xinqing Yan, Yan Xu, Bin Li:
A Biased Modified Binary Query Tree Protocol for RFID Tag Collision Resolution. 1715-1720 - Fei Shi, Dongxu Jin, Weijie Liu, JooSeok Song:
Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks. 1721-1726 - Dongxu Jin, Fei Shi, JooSeok Song:
Energy-Efficiency Media Independent Handover Mechanism. 1727-1732 - Yinghui Meng, Jian Chen, Yingyou Wen, Hong Zhao:
The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network. 1733-1738 - Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. 1739-1744 - Li Gao, Xiaomin Wang, Wenfang Zhang:
Chaotic Hash Function Based on Tandem-DM Construction. 1745-1749 - Annapurna P. Patil, K. Rajani Kanth, Apoorva Yadhava, H. P. Rakshith, Joseph Tom:
Implementation and Performance Evaluation of an Adaptive Routing Algorithm in MANETs. 1750-1755 - Younchan Jung, Enrique Festijo:
Session Key Generation for a Group Call and Device for Security Control. 1756-1762 - Wenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, Jianzhong Wang:
Identification of Masses in Digital Mammogram Using an Optimal Set of Features. 1763-1768 - Wenfei Chen, Zuohua Miao, Delie Ming:
Automated Inspection Using X-Ray Imaging. 1769-1772 - Jianhua Li, Songqiao Chen, Yongjun Li, Qian Zhang:
Semantic Web Service Automatic Composition Based on Service Parameter Relationship Graph. 1773-1778 - Yanhua Zhang, Chunhong Zhang, Gang Wang:
Exploit TIVs to Find Faster Paths. 1779-1782 - Zhen Chen, Chunhong Zhang, Yang Ji:
Context Awareness for Self-Adaptiveness in Smart Terminals. 1783-1788 - Andreas Bontozoglou, Kun Yang, Ken Guild:
Simulation Tools Enabling Research in Convergence of Fixed and Mobile Networks. 1789-1794 - Sha Sha, Rosemary Halliwell:
Performance Modelling and Analysis of Dynamic Class-Based Call Admission Control Algorithm Using Fuzzy Logic for Heterogeneous Wireless Networks. 1795-1800
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.