Login / Signup
WISM (1)
2011
2011
2011
Keyphrases
Publications
2011
Jiang-Zhong Cao
,
Jian-Wei Zhu
,
Xian-Wei Wang
,
Qingyun Dai
A Distributed Processing Method for Design Patent Retrieval System.
WISM (1)
(2011)
Dongbao Wang
,
Yinzhu Wang
Initial-Boundary Value Problem for Viscoelastic Rectangular Plate Equation.
WISM (1)
(2011)
Jingguo Wen
,
Zisheng Lian
The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal Mine.
WISM (1)
(2011)
Peng Li
,
Junhao Wen
,
Junping Dong
,
Fangfang Tang
An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented Architecture.
WISM (1)
(2011)
Yung-Cheng Lee
A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each Participant.
WISM (1)
(2011)
Xin Tang
,
Ruchuan Wang
,
Haiping Huang
An Anti-collusion Trust Model in P2P Networks.
WISM (1)
(2011)
Rui-ping Niu
,
Xiao-fang Mu
,
Gao-feng Sun
Dynamic Authorization of Grid Based on Trust Mechanism.
WISM (1)
(2011)
Fei Wang
,
Lihua Yan
,
Peng Zhou
,
Wei Sun
,
Yuan Ding
The Investigation of WEB Software System Based on Domain-Driven Design.
WISM (1)
(2011)
Jian-Jun Hu
,
Yue-Hong Sun
,
Qing-Zhen Xu
The Genetic Algorithm in the Test Paper Generation.
WISM (1)
(2011)
Jian-Hua Huang
,
Yong-Hong Shi
A Fast and Tolerant Voting Mechanism in Wireless Sensor Networks.
WISM (1)
(2011)
Guilan Yu
,
Jinglong Zuo
,
Delong Cui
Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits Rates.
WISM (1)
(2011)
Yihe Liu
Study on Grid Access Control Strategy Based on Trust and Security Grade.
WISM (1)
(2011)
Zhanqiang Huo
,
Xiaoke Liu
Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16m.
WISM (1)
(2011)
Youming Fu
,
Ruimin Hu
,
Jun Chen
,
Zhongyuan Wang
,
Gang Tian
An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P Network.
WISM (1)
(2011)
Robbie De Sutter
,
Mike Matton
,
Niels Laukens
,
Dieter Van Rijsselbergen
,
Rik Van de Walle
MediaCRM: Enabling Customer Relationship Management in the Broadcast.
WISM (1)
(2011)
Wanqi Li
,
Heng Wang
,
Zhiwei He
Defensive Steganography: A Novel Way against Steganalysis.
WISM (1)
(2011)
Huixi Li
,
Hao Li
A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality M×N Production Model.
WISM (1)
(2011)
Kun Zhang
,
Qingzhong Li
,
Yuliang Shi
Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud Computing.
WISM (1)
(2011)
Mijin Kim
,
Changyoung Kwon
,
Dongho Won
An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols.
WISM (1)
(2011)
Vahide Rafati Porshokooh
,
Abolfazl Toroghi Haghighat
,
Farzad Tashtarian
Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy System.
WISM (1)
(2011)
Xiaolong Bai
,
Liang Hu
,
Zixing Song
,
Feiyan Chen
,
Kuo Zhao
Defense against DNS Man-In-The-Middle Spoofing.
WISM (1)
(2011)
Yinke Dou
,
Xiaomin Cheng
Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness Sensor.
WISM (1)
(2011)
Jinyi Tao
Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine Disaster.
WISM (1)
(2011)
Chengjie Gu
,
Shunyi Zhang
Self-Adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service Awareness.
WISM (1)
(2011)
Haizhou Du
Study of a Fuzzy Clustering Algorithm Based on Interval Value.
WISM (1)
(2011)
Jie Yang
,
Yuanhao Wu
,
Yinan Dou
,
Kun Zhang
Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning Method.
WISM (1)
(2011)
Xinfeng Zhang
,
Junfeng Sun
,
Pengyu Guo
Research on SOA Business Process Disaster Tolerance Recovery Method.
WISM (1)
(2011)
Weigang Li
,
Jianya Zheng
,
Daniel LeZhi Li
W-entropy Index: The Impact of the Members on Social Networks.
WISM (1)
(2011)
Miao He
,
Kexin Jia
,
Ting Cheng
False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR Detector.
WISM (1)
(2011)
Haifeng Zhang
,
Yuying Li
Jordan Triple Multiplicative Maps on the Symmetric Matrices.
WISM (1)
(2011)
Jiang Xingfang
,
Shao Kai
The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in Fiber.
WISM (1)
(2011)
Kakali Chatterjee
,
Asok De
,
Daya Gupta
Timestamp Based Authentication Protocol for Smart Card Using ECC.
WISM (1)
(2011)
Yuying Li
,
Haifeng Zhang
Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random Variables.
WISM (1)
(2011)
Lizi Yin
,
Dianwu Yang
LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying Delays.
WISM (1)
(2011)
Xiaoyan Qiao
,
Haifang Li
,
Jie Xiang
,
Hongxia Deng
The Study of Images Emotion Based on fMRI.
WISM (1)
(2011)
Nannan Xie
,
Liang Hu
,
Nurbol Luktarhan
,
Kuo Zhao
A Classification of Cluster Validity Indexes Based on Membership Degree and Applications.
WISM (1)
(2011)
Baolu Gao
,
Junjie Chen
,
Xiaoyan Xiong
,
Shibo Xiong
Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier.
WISM (1)
(2011)
Li Wang
,
Jin Zhang
The Constrained Computing and Application for Intelligent Generalization of Settlements.
WISM (1)
(2011)
Hongqian Chen
,
Yi Chen
,
Jian Cao
,
Yuehong Sun
An Encrypted Data-Transportation Method for Distributed System.
WISM (1)
(2011)
Lai-Cheng Cao
Improving Security of SET Protocol Based on ECC.
WISM (1)
(2011)
Rui-lian Li
Propagation in LHM Slab Loaded Rectangular Waveguide.
WISM (1)
(2011)
Arash Jodeiri Salimi
,
Ayaz Isazadeh
,
Jaber Karimpour
Admission Control for WebServices in Enterprise Systems Using Expert Systems.
WISM (1)
(2011)
Lin Li
,
Qingzhong Li
,
Yuliang Shi
,
Kun Zhang
A New Privacy-Preserving Scheme DOSPA for SaaS.
WISM (1)
(2011)
Kai Yu
,
Dazhong He
,
Yinan Dou
,
Zhenming Lei
CDMA Mobile Internet User Behavior Analysis Based on RP Interface.
WISM (1)
(2011)
Wei Wen
,
Yequn Wang
,
Henyang Zhang
Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living Time.
WISM (1)
(2011)
Jinling Zhao
,
Dongyan Zhang
,
Dacheng Wang
,
Wenjiang Huang
Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, Beijing.
WISM (1)
(2011)
Jingbo Yuan
,
Shunli Ding
An Alerts Correlation Technology for Large-Scale Network Intrusion Detection.
WISM (1)
(2011)
Wei He
,
Li-zhen Cui
An Adaptive Distribution Model for Multi-dimensional Data in Decentralized Environments.
WISM (1)
(2011)
Brahim Hamadicharef
International Collaborations in Brain-Computer Interface (BCI) Research.
WISM (1)
(2011)
volume 6987, 2011
Web Information Systems and Mining - International Conference, WISM 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part I
WISM (1)
6987 (2011)