Sign in
ICYCS
2008
2008
2008
Keyphrases
Publications
2008
Chun-Chao Yeh
,
Soun-Jan Chiang
Revisit Bayesian Approaches for Spam Detection.
ICYCS
(2008)
Fang Wang
,
Shanzhi Chen
,
Xin Li
,
Yuhong Li
A Route Flap Suppression Mechanism Based on Dynamic Timers in OSPF Network.
ICYCS
(2008)
Ping Zhu
,
Fumin Yang
,
Gang Tu
,
Wei Luo
Fault-Tolerant Scheduling for Periodic Tasks based on DVFS.
ICYCS
(2008)
Zheng Lin
,
Lubin Wang
Multi-Stage Partner Selection Based on Genetic-Ant Colony Algorithm in Agile Supply Chain Network.
ICYCS
(2008)
Chunbiao Li
,
Hankang Wang
The Scroll Control of a New Chaotic System.
ICYCS
(2008)
Long Hong
,
Yanli Chen
,
Ningning Zhou
,
Fangwu Yao
Investigating on the Curriculum Visions of Computing Disciplines.
ICYCS
(2008)
Li Li
,
Guosun Zeng
,
Bo Chen
Trusted Transmission Protocol for Content Security.
ICYCS
(2008)
Yi Li
A New Approach to Teaching Logic in Discrete Mathematics.
ICYCS
(2008)
Baoyan Song
,
Yanyan Cong
,
Jiayang Zhang
,
Xiaoguang Li
,
Ge Yu
An Effective Approach for Continuous Window Query in Wireless Sensor Networks.
ICYCS
(2008)
Liangsheng Chen
On the Chaotic Dynamics Analysis of China Stock Market.
ICYCS
(2008)
Xiao Xiao
,
Luming Yang
,
Weiping Wang
,
Shuai Zhang
A Broadcasting Retransmission Approach Based on Random Linear Network Coding.
ICYCS
(2008)
Jian Xu
,
Fucai Zhou
,
Xinyang Li
,
Muzhou Yang
Hierarchical Data Processing Model and Complete Tree Key Management Mechanism.
ICYCS
(2008)
Fachao Deng
,
An'an Luo
,
Yaokun Zhang
,
Zhen Chen
,
Xuehai Peng
,
Xin Jiang
,
Dongsheng Peng
TNC-UTM: A Holistic Solution to Secure Enterprise Networks.
ICYCS
(2008)
Liang Gu
,
Xuhua Ding
,
Robert H. Deng
,
Yanzhen Zou
,
Bing Xie
,
Weizhong Shao
,
Hong Mei
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect.
ICYCS
(2008)
Xiaohong Chen
,
Zhi Jin
A Scenario-Based Problem Decomposition.
ICYCS
(2008)
A. S. Poornima
,
B. B. Amberker
A New Approach to Securing Broadcast Data in Sensor Networks.
ICYCS
(2008)
Bo Liu
,
LuMing Yang
,
Yunlong Deng
A Vector Matrix Iterative Self-Organizing Assistant Clustering Algorithm of XML Document.
ICYCS
(2008)
Peng Shi
,
Lianhong Ding
A Data Sharing Platform for Materials Service Safety Appraisement.
ICYCS
(2008)
Yongxiang Hu
,
Jingtian Tang
,
Hong Jiang
,
Sancheng Peng
A Fast Algorithm to Estimate Mutual Information for Image Registration.
ICYCS
(2008)
Jinxiang Zhang
,
Jiahai Yang
,
Jianping Wu
A Novel Management Information Retrieval Algorithm Based on NGI.
ICYCS
(2008)
Zhiwen Zeng
,
Ya Gao
,
Zhigang Chen
,
Xiaoheng Deng
Trust Path-Searching Algorithm Based on PSO.
ICYCS
(2008)
Yongxin Gui
,
Zhiming Zhou
Hausdorff Dimension of a Class of Self-affine Fractals Generated by Linear Fibre Coding.
ICYCS
(2008)
Shuren Zhou
,
Ximing Liang
,
Can Zhu
Exploiting LCSVC Algorithm for Expression Recognition.
ICYCS
(2008)
Fuhong Lin
,
Changjia Chen
,
Hongke Zhang
Characterizing Churn in Gnutella Network in a New Aspect.
ICYCS
(2008)
Junjun Tang
,
Jing Wang
,
Cheng Huang
,
Guolun Wang
,
Xiong Wang
Subprime Mortgage Crisis Detection in U.S. Foreign Exchange Rate Market by Multifractal Analysis.
ICYCS
(2008)
Rui Yang
,
Shijie Zhou
,
Chengyu Fan
A New Algorithm for Network Diameter.
ICYCS
(2008)
Min Lu
,
Xiaoyu Jin
Analysis of a C Language Teaching Example Based on the ARCS Model: The Basic Concept and Use of Structure.
ICYCS
(2008)
Chenguang Luo
From Word Automata to Tree Automata.
ICYCS
(2008)
Yangyi Sui
,
Lili Pang
,
Jun Lin
,
Xiaotuo Zhang
Dataflow Visual Programming Language Debugger Supported by Fisheye View.
ICYCS
(2008)
Kai Cao
,
Xiaoyun Zhu
Research and Design of Educational Resource Information Center for Investors Based on J2EE.
ICYCS
(2008)
Fan He
,
Huanguo Zhang
,
Mei Tang
A Test Method of Trusted Computing Supporting Software.
ICYCS
(2008)
Jinwu Hu
,
Liuling Dai
,
Bin Liu
Measure Semantic Similarity between English Words.
ICYCS
(2008)
Ming Luo
,
Yingyou Wen
,
Hong Zhao
An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography.
ICYCS
(2008)
Wenying Zeng
,
Yuelong Zhao
,
Junwei Zeng
Hierarchical Storage System Based on Wireless Mesh Network.
ICYCS
(2008)
Lingli Deng
,
Yeping He
,
Ziyao Xu
Service Authenticity in P2P File-Sharing.
ICYCS
(2008)
Yanhui Fan
,
Hongguo Xu
,
Xibo Liu
Simulation on Kinematics Law of Pedestrian in Vehicle/Pedestrian Contacting Phase.
ICYCS
(2008)
Shengyuan Yang
,
Shi Shu
Robust Feature Extraction for the Composite Surface Mesh from STL File.
ICYCS
(2008)
Lan Li
,
Shaojun Zhang
,
Lei Fan
Behavior-Aware Role Based Trust Management.
ICYCS
(2008)
Wei Dong
,
Chun Chen
,
Jiajun Bu
,
Kougen Zheng
,
Xiaofan Wu
,
Guodong Teng
A Dynamic TimeSynchronization Scheme for Multihop Sensor Networks.
ICYCS
(2008)
Jun Zheng
,
Yan Qin
,
Jianyong Zhu
,
Xinyou Li
Constructing Trust Networks Based on Small-World Theories.
ICYCS
(2008)
Anrong Xue
,
Xiqiang Duan
,
Handa Ma
,
Weihe Chen
,
Shiguang Ju
Privacy Preserving Spatial Outlier Detection.
ICYCS
(2008)
Deping Zhang
,
Changhai Nie
,
Baowen Xu
A Markov Decision Approach to Optimize Testing Profile in Software Testing.
ICYCS
(2008)
Yu Ji
,
Lequan Min
,
Yan Meng
Analytical Criteria for the Local Activity of Three-Port CNN with Five State Variables: Analysis and Application.
ICYCS
(2008)
Shuaijun Li
,
Fei Peng
An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems.
ICYCS
(2008)
Xiaojian Liu
,
Xuejun Liu
,
Jianxin Li
,
Yanzhi Zhao
,
Zhixue Wang
Refinement of UML Interaction for Correct Embedded System Design.
ICYCS
(2008)
Chunsheng Qi
,
Xiao Zheng
,
Biying Kuang
,
Wei Zhou
Design and Implementation of an Integrated Fault-Supervising System for Large HPCs.
ICYCS
(2008)
Yang Lu
,
Jiguo Li
,
Junmo Xiao
Generic Construction of Certificate-Based Encryption.
ICYCS
(2008)
Jiaxin Li
,
Ning Deng
,
Caixia Liu
,
Mengxiao Liu
,
Zuo Wang
,
Qi Zuo
FG-NC: A Schedule Algorithm of Designing Concurrent Multi-direction Data Switch Structure.
ICYCS
(2008)
Jiaqi Liu
,
Zhigang Chen
,
Deng Li
,
Hui Liu
Towards a Self-Adaptive Super-node P2P Overlay Based on Information Exchange.
ICYCS
(2008)
Xuri Chen
,
Weimin Xu
Counter-Attack Trust Model Based on Vague Set for P2P Networks.
ICYCS
(2008)