Login / Signup
CIS (2)
2005
2009
2005
2009
Keyphrases
Publications
2009
Yong-bao Liu
,
Mi Zhou
,
Xing He
Fault Diagnosis of the Gas Turbine Based on Multi-operating Condition Information Fusion.
CIS (2)
(2009)
Xueming Wang
,
Nan Cui
Research of Security Mobile Payment Protocol in Communication Restrictions Scenarios.
CIS (2)
(2009)
Li-hua Zou
,
Yun-cheng Liu
A New Algorithm of Counting Human Based on Segmentation of Human Faces in Color Image.
CIS (2)
(2009)
Rong Guo
,
Yuhui Wang
A Hybrid Approach of Hazard Estimation for Chemical Hazard Installations.
CIS (2)
(2009)
Zeng-li Liu
,
Shuang Xu
,
Haiyan Quan
,
Yi-gang Guo
Study of Spectrum Analysis Based on EMD Adaptive Filter.
CIS (2)
(2009)
Shichong Tan
,
Hui Zhu
,
Yumin Wang
Some Notes on Password Authenticated Key Exchange Based on RSA.
CIS (2)
(2009)
Jianwen Feng
,
Anding Dai
,
Francis R. Austin
,
Ling He
Anti-synchronization of Two Different Hyperchaotic Systems with Fully Uncertain Parameters.
CIS (2)
(2009)
Jiqiang Feng
,
Weixin Xie
,
Chen Xu
A New Population Diversity Model in Intelligence Optimization Algorithms.
CIS (2)
(2009)
Ru Li
,
Liaojun Pang
,
Qingqi Pei
,
Guozhen Xiao
Anonymous Communication in Wireless Mesh Network.
CIS (2)
(2009)
Hongge Sun
,
Weisheng Wang
,
Yi Cao
,
Shenxue He
,
Xin Yan
Application of Fuzzy Data Fusion in Multi-sensor Environment Monitor.
CIS (2)
(2009)
Pengfei Li
,
Jiakun Li
Application of Communication and Remote Control in PLC Based on ZigBee.
CIS (2)
(2009)
Dingxie He
,
Hongxia Liu
The Application of Elementary Transformation.
CIS (2)
(2009)
Xu Xiang
Providing Efficient Secure DHTs Routing.
CIS (2)
(2009)
Gang Yang
,
Ziye Yan
,
Hong Zhao
Touching String Segmentation Using MRF.
CIS (2)
(2009)
Hong-jun Heng
,
Bing-zhong Zheng
,
Ya-jing Li
Study of SVM-Based Air-Cargo Demand Forecast Model.
CIS (2)
(2009)
Xiaohong Hu
,
Xu Qian
A Novel Graph-based Image Annotation with Two Level Bag Generators.
CIS (2)
(2009)
Yinan Zhang
,
Ning Du
,
Miao Qi
,
Chengxi Wang
,
Jun Kong
Association Analysis and Content-Based Information Hiding Approach with High Hiding Capacity.
CIS (2)
(2009)
Huijuan Xiao
,
Wen Zeng
A Hard Disk Encryption System Realized by the Digital Signal Processor.
CIS (2)
(2009)
Xinjian Zhuo
,
Yongmei Su
One Application of CNN in Word-Processing.
CIS (2)
(2009)
Jian-lin Huang
,
Fei-peng Li
Quick Similarity Measurement of Source Code Based on Suffix Array.
CIS (2)
(2009)
Long Wan
,
Wenxing Bao
Research and Application of Animal Disease Intelligent Diagnosis Based on Support Vector Machine.
CIS (2)
(2009)
Yipin Lin
,
Xiaofeng Wang
A Hase-based SAKA Protocol Algorithm.
CIS (2)
(2009)
Xizhe Zhang
,
Ying Yin
,
Mingwei Zhang
,
Bin Zhang
Web Service Community Discovery Based on Spectrum Clustering.
CIS (2)
(2009)
Li Ren
,
Xin-yi Xiang
Research on the Energy Analysis of Lake Ecological Functions.
CIS (2)
(2009)
Yi Liu
,
Man Sha
Research on Prediction of Traffic Flow at Non-detector Intersections Based on Ridge Trace and Fuzzy Linear Regression Analysis.
CIS (2)
(2009)
Wei Huang
,
Hong Peng
Observation Reduction for State-Action Tables.
CIS (2)
(2009)
Jianqin Zhou
,
Wei Xiong
,
Zemao Zhao
,
Lin You
The Tight Error Linear Complexity of Periodic Sequences.
CIS (2)
(2009)
Peng Wu
,
Guoxin Wu
A Reputation-Based Trust Model for P2P Systems.
CIS (2)
(2009)
Yali Jiang
,
Xiuling Ju
Lattice-Based CCA-Secure Cryptosystem from IBE System.
CIS (2)
(2009)
Chuanrong Zhang
,
Yuqing Zhang
New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme.
CIS (2)
(2009)
Zhiyuan Xie
,
Junhui He
,
Shaohua Tang
A CPK-Based Security Scheme at Network Layer.
CIS (2)
(2009)
Lequan Min
,
Xiaobo Jiang
,
Youyan Fu
,
Yunhao Yi
,
Yan Meng
,
Hai Yan
Nonlinear Regression Based Analysis on Cyanobacteria Blooms and Water Quality in a Beijing Shallow Lake.
CIS (2)
(2009)
Dukun Ding
,
Cunxi Xie
,
Xuanzi Hu
Immune Controller Design for Vertical-Joint Industry Robot.
CIS (2)
(2009)
Qingui Xu
,
Guixiong Liu
Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection.
CIS (2)
(2009)
Xiaoming Hu
,
Zhe Zhang
,
Yinchun Yang
Identity Based Proxy Re-Signature Schemes without Random Oracle.
CIS (2)
(2009)
Guoqi Li
,
Yang Xiao
,
Minyan Lu
,
Yuchao Zhang
A Formal Method Based Case Study for Access Control.
CIS (2)
(2009)
Min-Qing Zhang
,
Bin Dong
,
Xiaoyuan Yang
A New Self-Updating Hash Chain Structure Scheme.
CIS (2)
(2009)
Jun Wang
,
Jian-Wen Chen
,
Yongliang Wang
,
Di Zheng
Intelligent Load Balancing Strategies for Complex Distributed Simulation Applications.
CIS (2)
(2009)
Tianxiang Feng
,
Hongxia Liu
The Computer Realization of the QR Decomposition on Matrices with Full Column Rank.
CIS (2)
(2009)
Yuan-Yuan Li
AOP-Based Attack on Obfuscated Java Code.
CIS (2)
(2009)
Gang Xu
,
Geng Zhao
,
Lequan Min
An Extended Method for Obtaining S-Boxes Based on Discrete Chaos Map System.
CIS (2)
(2009)
Manman Geng
,
Futai Zhang
Batch Verification for Certificateless Signature Schemes.
CIS (2)
(2009)
Hu Ming
,
Wang Yan
The Collision Rate Tests of Two Known Message Digest Algorithms.
CIS (2)
(2009)
Bolin Liu
,
Shaochuan Fu
Efficiency Measurement of Logistics Public Companies Basing on the Modified DEA Model.
CIS (2)
(2009)
Lan Wang
,
Qian Zhang
A New Method of Generating Robot-Used Maps.
CIS (2)
(2009)
Mingjie Chen
,
Kefeng Fan
,
Wei Mo
,
Subing Zhang
Implementation and Evaluation of a Novel Audio Watermarking Scheme.
CIS (2)
(2009)
Changzheng Xu
,
Yaqi Wang
,
Qiang Wei
,
Qingxian Wang
A Novel Trust Model Based on Temporal Historical Data for Access Control.
CIS (2)
(2009)
Xiaoyan Yang
,
Zhen Liu
The Security Matrix Factorization Agreement with Two Parties.
CIS (2)
(2009)
Yunpeng Wang
,
Haiyang Yu
,
Shiwu Li
,
Yi Chen
Research on Temporal and Spatial Data Models Based on GIS for Urban Traffic Planning Information Support System.
CIS (2)
(2009)
Hong-biao Mei
,
Jiang Wang
,
Zi-hui Ren
An Adaptive Dynamic Ant System Based on Acceleration for TSP.
CIS (2)
(2009)