default search action
NPC 2008: Shanghai, China - Workshops
- Jian Cao, Minglu Li, Chuliang Weng, Yang Xiang, Xin Wang, Hong Tang, Feng Hong, Hong Liu, Yinglin Wang:
IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3354-4
NSS 2008
- Ming Luo, Yingyou Wen, Hong Zhao:
A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks. 3-10 - Wen Tao Zhu:
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem. 11-17 - Suriadi Suriadi, Ernest Foo, Jason Smith:
Conditional Privacy Using Re-encryption. 18-25 - Fu Xiao, Xie Li:
Using Outlier Detection to Reduce False Positives in Intrusion Detection. 26-33 - Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo:
Identity-Based On-Line/Off-Line Signcryption. 34-41 - Bo Chen, Guosun Zeng, Li Li:
Attribute Delegation Authorization Based on Subjective Trust Evaluation. 42-49 - Daxin Tian, Yang Xiang:
A Multi-core Supported Intrusion Detection System. 50-55 - Donglin Liu:
Synchronization of Discrete Chaotic Dynamical Systems Using Active Control. 56-59 - Hongbo Zhou:
Secure Prophet Address Allocation for Mobile Ad Hoc Networks. 60-67 - Eun-Jun Yoon, Kee-Young Yoo:
Two Security Problems of RFID Security Method with Ownership Transfer. 68-73 - Rong-Jian Chen, Jui-Lin Lai:
Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions. 74-81 - Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang:
Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. 82-87 - Chenghua Tang, Shunzheng Yu:
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism. 88-95 - María-Dolores Cano, Juan A. Romero, Fernando Cerdán:
Experimental Tests on SCTP over IPSec. 96-102 - Fei Gao, Wen Tao Zhu:
A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks. 103-110 - Dayong Ye, Quan Bai, Minjie Zhang:
Ontology-Based Knowledge Representation for a P2P Multi-agent Distributed Intrusion Detection System. 111-118 - A. John Prakash, V. Rhymend Uthariaraj:
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication. 119-124 - Krerk Piromsopa, Sirisara Chiamwongpaet:
Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection. 125-131 - Hong-Rong Yang, Ming Xu, Ning Zheng:
An Improved Method for Ranking of Search Results Based on User Interest. 132-138 - Fen Liu, Lei Hu:
ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience. 139-146 - Saleh I. Almotairi, Andrew J. Clark, George M. Mohay, Jacob Zimmermann:
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. 147-154 - Sarosh Hashmi, John Brooke:
Towards Time Limited Secure Agent Execution on Malicious Host: A Concept Paper. 155-162 - David Lai, Zhongwei Zhang:
Self-Authentication of Encrypted Channels in Service Network Graph. 163-167 - Ejaz Ahmed, Andrew J. Clark, George M. Mohay:
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. 168-175 - Li He, Shunzheng Yu, Min Li:
Anomaly Detection Based on Available Bandwidth Estimation. 176-183 - Lian Lin, Zhongwen Li, Liang Shi:
Spam Mail Filtering Based on Network Processor. 184-189 - Sufatrio, Roland H. C. Yap:
Extending BAN Logic for Reasoning with Modern PKI-Based Protocols. 190-197 - Min Li, Shunzheng Yu, Li He:
Detecting Network-Wide Traffic Anomalies Based on Spatial HMM. 198-203 - Ying Zhao, Yini Wang, Jiumei Huang, Xuelin Shi:
A Stable Clock Synchronization Based on Clock Drift Rate. 204-209 - Md. Rafiqul Islam, Jaipal Singh, Ashley Chonka, Wanlei Zhou:
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. 210-217 - Yanli Yu, Keqiu Li, Yong Zhang, Lianpeng Xu:
A Service Trust Model with Passive Trust. 218-225 - Xinjie Guan, Xili Wan, Junzhou Luo:
A Maximum Entropy Based Multi-dimensional Trust Model. 226-232
ATNCTA 2008
- Yunpeng Xiao, Yang Tao, Wenji Li, Qian Li:
An Effective P2P Collaborative Mode for Mobile Web Surfing. 235-241 - Yu Wu, Gongxiao Wang, Weisheng Li, Zhijun Li:
Automatic Chatbot Knowledge Acquisition from Online Forum via Rough Set and Ensemble Learning. 242-246 - Guofeng Zhao, Wei Yang, Hong Tang, Yanbing Liu:
An MAODV-Based Energy Saving Multicast Routing Algorithm. 247-250 - Junwei Ge, Yiqiu Fang, Shayne Flint:
Chaos of Software Requirements. 251-257 - Hongjian Li, Hong Tang, Shixin Sun, Yusheng Dou:
A Parallel Algorithm for Simulating Photochemical Reaction. 258-262 - Yanbing Liu, Jun Huang:
A Novel Genetic Algorithm and Its Application in TSP. 263-266 - Yusheng Dou, Mingze Bai, Hongjian Li, Hong Tang:
Parallel Computing in Semiclassical Dynamics Simulation of Photochemical Reactions. 267-272 - Aixiang Cui, Duanbing Chen, Yan Fu:
Community Detection Based on Weighted Networks. 273-280 - Ying Wan, Duanbing Chen, Yan Fu:
A New Efficient Algorithm for Detecting Communities in Complex Networks. 281-286 - Hong Tang, Rui She, Chen He, Yusheng Dou:
Construction and Application of Linux Virtual Server Cluster for Scientific Computing. 287-289 - Yue Liu, Daowei Zhang:
An Empirical Study on the Informatization and E-commerce Development Level in Chongqing. 290-295 - Hong Tang, Fei Xue, Peng Huang:
MP-MAODV: A MAODV-Based Multipath Routing Algorithm. 296-301 - Xing-jiang Yu, Yang Tao:
Benefit Optimization Resource Scheduling Algorithm in Three-Dimensional QoS Model in Grid Computing. 302-305 - Xing-jiang Yu, Yang Tao:
Classified Optimization Scheduling Algorithm Driven by Multi-QoS Attributes in Economical Grid. 306-309 - Peng Lin, WenLong Luo, Yanbing Liu:
A Spatial Renewal Video Traffic Model Based on Buffering Metrics. 310-314 - Qin Lu, Weishi Zhang, Bo Su:
An Exception Handling Framework for Service-Oriented Computing. 315-322 - Zi-fu Fan, Xu-yan Yang, Xiaoyu Wan:
Research on Mapping of MPCC SCF to SIP Protocol in Parlay/OSA API. 323-327 - Yi Zhang, Wenxing Chen:
A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc Networks. 328-330 - Zixiang Zhao, Kun Bai:
Research on T-bridge Algorithm of Web Session Fuzzy Clustering. 331-335 - Yi Zhang, Tianxi Cui, Hong Tang:
A New Secure E-mail Scheme Based on Elliptic Curve Cryptography Combined Public Key. 336-340 - Chuan Xu, Hong Tang, Guofeng Zhao:
Traflow: Design and Complementation of a Real Time Traffic Measurement System in High-Speed Networks. 341-344 - Jinyu Shi, Weishi Zhang, Jianping Jiang, Xiuguo Zhang:
Research on Design and Its Key Technologies of Web Service Platform in P2P Environment. 345-350
HPN 2008
- Bin Dai, Yuan Luo, A. J. Han Vinck:
Wiretap Channel with Side Information from Part of Encoder. 353-357 - Zhi Chen, Wei Chen, Pingyi Fan, Khaled Ben Letaief:
Relay Aided Wireless Multicast Utilizing Network Coding: Outage Behaviour and Diversity Gain. 358-364 - Xiaofu Wu, Chunming Zhao, Xiaohu You:
Generation-Based Network Coding over Networks with Delay. 365-368 - Jianwei Xie, Pingyi Fan:
Capacity and Delay of the Wireless Network with Special Relay Nodes. 369-374 - Min Li, Xueyue Cao, Leiming Xu, Ping Zhang, Chi Yuan, Shuping Peng, Zhengbin Li:
A Distributed Fast Light-path Set-up Protocol for Grid over OBS Networks. 375-382 - Wang Yu, Zhijian Wang, Xiaofeng Zhou:
A Volunteer Computing in High Performance Environment Based on Availability Model. 383-386 - Shuang Yang, Xin Wang:
A Probabilistic Approach to Analyze the Effect of Free-Riders in P2P Streaming Services. 387-391 - Han Liu, Xiaodong Tu, Jun Xie:
Network Coding for P2P Live Media Streaming. 392-398 - Suk Yu Hui, Kai-Hau Yeung, Kin Yeung Wong:
Optimal Placement of Mesh Points in a Wireless Mesh Network Using Multi-path Routing Protocol. 399-403 - Pingli Gu, Jiuyun Xu, Changbao Li, Youxiang Duan:
Towards Mapping Large Scale Ontologies Based on RFCA with Attribute Reduction. 407-411 - Hong-fei Zhan, Xin-jian Gu, Guo-ning Qi:
Design of a Collaborative Ontology Editing System for Enterprise Process Integration. 412-417 - Susu Nousala, William P. Hall:
Emerging Autopoietic Communities - Scalability of Knowledge Transfer in Complex Systems. 418-425 - Georg von Krogh, Seonwoo Kim, Zeynep Erden:
Fostering the Knowledge-Sharing Behavior of Customers in Interorganizational Healthcare Communities. 426-433 - Tien-Chin Wang, Echo Huang, Hsing-Hui Yang, Juh-Cheng Yang:
Fitting Grey Relation Model for the Performance of E-government Service: The Case of Kaohsiung City Service On-Line System in Taiwan. 434-439 - Jing Wang, Hongming Cai, Boyi Xu, Lihong Jiang:
CUCS: A Web Page Classification Algorithm for Large Training Set. 440-445 - Yao Lu, Guoyi Zhang:
A DL-Based Approach for Eliminating Concept Restriction Conflicts in Ontology Merging. 446-451 - Hangzai Luo, Jiahang Yang, Aoying Zhou, Jianping Fan, Tianming Hu:
Knowledge Mining and Visualization on News Webpages and Large-Scale News Video Database. 452-459 - Yinglin Wang:
Object Lifecycle Evolution History Modeling and Reuse for Knowledge Management. 460-466 - Ning-rong Tao, Zu-hua Jiang:
Acquiring Compressor Design Case Knowledge Using Rough Set Theory. 467-474 - Yanwei Chen, Demin Li, Chenwen Wang, Jiacun Wang:
MFDSSF: A Mobile Fuzzy Decision Support System for Firefighter Cooperation in Ad Hoc Networks. 475-482 - Bensheng Yun, Junwei Yan, Min Liu:
Behavior-Based Web Services Matchmaking. 483-487 - Qi Gao, Junwei Yan, Min Liu:
A Semantic Approach to Recommendation System Based on User Ontology and Spreading Activation Model. 488-492 - Yi Yu, Junwei Yan, Min Liu:
Semantic Mapping in Product Design and Catalog Integration. 493-498 - Ji-Xi Chen, Qi Xu, Xinjian Gu, Guoning Qi, Hong-Fei Zhan:
Research on the Modeling of Semantic-Based Web Resources Feature. 499-503 - Qiang Lu, Ming Chen, Zhiguang Wang:
A Semantic Annotation Based Software Knowledge Sharing Space. 504-509 - Xijuan Liu:
Research on Product Design Knowledge Reuse through Linkage with Design Iteration Records. 510-515 - Rongwei Ye, Yinglin Wang, Jianmei Guo, Qi Xiong:
A Method to Guarantee Ontology Consistency on Property Range Changes. 516-521
CWUWNet 2008
- Zhongwen Guo, Xiaodong Liu, Yuan Feng:
An Adaptive Transmission Control Mechanism for Underwater Acoustic Sensor Network. 525-530 - Yuan Feng, Lipeng Zhang, Peng Zhou:
EBMD: Energy-Balanced Multi-path Data Propation Algorithm for Sensor Networks. 531-540 - Wenjin Xu, Jianfeng Liu:
A Novel Communication Structure for Wireless Sensor Network. 541-544 - Shumei Wang, Hongyang Ma:
Quantum Secure Communication Network on EPR States. 545-548 - Hongyang Ma, Zhongwen Guo:
A Group Quantum Communication Network Using Quantum Secret Sharing. 549-552 - Chongqing Zhang, Ruisheng Jia, Sheng Fang:
Data Gathering Approaches for Underwater Sensor Networks. 553-560 - Yong Liu, Xuhao Liu, Ai-guang Yang:
The Application and Research of Ontology in Knowledge Management Field. 561-564 - Yu-ting Sun, Wei-qin Lv, Lipeng Zhang, Peng Zhou:
EBAT: Energy Balanced Adaptive Transmission Algorithm for Sensor Networks. 565-574
HPSECA 2008
- Xiaokun Liu, Minglu Li, Xinhua Lin, Xiaozheng Cheng:
Implementation and Optimization of MPICH2 Multicast on Optical Fiber Network. 577-582 - Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng:
A Resource Scheduling Strategy for Intrusion Detection on Multi-core Platform. 583-590
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.