


default search action
CyberC 2012: Sanya, China
- 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2624-7

- Yingjie Xia, Yiwen Fang, Zhoumin Ye:

MPI-Based Twi-extraction of Traffic State Evaluation Rules. 1-4 - Somya D. Mohanty

, Arun Velagapalli, Mahalingam Ramkumar:
An Efficient TCB for a Generic Content Distribution System. 5-12 - Xiang Li, Yanxu Zhu, Gang Yin, Tao Wang, Huaimin Wang:

Exploiting Attribute Redundancy in Extracting Open Source Forge Websites. 13-20 - Xuan Ding, Wei Wang:

Enabling Dynamic Analysis of Anonymized Social Network Data. 21-26 - Xufeng Shang, Yubo Yuan:

Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery. 27-30 - Shengdun Liang, Yuchun Guo:

Local Oriented Efficient Detection of Overlapping Communities in Large Networks. 31-38 - Zheng Shan, Haoran Guo, Jianmin Pang:

BTMD: A Framework of Binary Translation Based Malcode Detector. 39-43 - Jing Wang, Yuchun Guo:

Scrapy-Based Crawling and User-Behavior Characteristics Analysis on Taobao. 44-52 - Wanqing Wang, Yongjun Zhao, Jie Huang:

A New Evidence Combination Scheme for Decision Assistant. 53-57 - Jeff Warren, Michael Clear, Ciaran McGoldrick

:
Metadata Independent Hashing for Media Identification & P2P Transfer Optimisation. 58-65 - Liang Ming, Dan Feng, Fang Wang, Haifeng Sun, Sen Wu:

A High Performance and High Reliability Storage Server for Parallel File System. 66-72 - Guoyi Zhang, Minghui Fang, Mingkai Qian, Shijin Xu:

Parallel Cloning Simulation of Flood Mitigation Operations in the Upper-Middle Reach of Huaihe River. 73-80 - Naixiang Ao, Yingying Xu, Changjia Chen, Yuchun Guo:

Offline Downloading: A Non-Traditional Cloud-Accelerated and Peer-Assisted Content Distribution Service. 81-88 - Edna Dias Canedo

, Rafael Timóteo de Sousa Júnior
, Robson de Oliveira Albuquerque
, Fábio Lúcio Lopes de Mendonça
:
File Exchange in a Private Cloud Supported by a Trust Model. 89-96 - Chigozirim Oriaku, Ihsam Alshahib Lami:

Holistic View Angles of Cloud Computing Services Provisions. 97-105 - Ahmad Abba Haruna

, Syed Nasir Mehmood Shah, M. Nordin B. Zakaria, Anindya Jyoti Pal:
Deadline Based Performance Evaluation of Job Scheduling Algorithms. 106-110 - Fabio Marturana, Gianluigi Me

, Simone Tacconi:
A Case Study on Digital Forensics in the Cloud. 111-116 - Lilliam N. Robinson-Oses, Miguel Vargas-Lombardo

:
Service Layer and Axioms for User Access to the Cloud by Means of Ontologies. 117-120 - Ling-Zi Xiao, Yi-Chun Zhang:

A Case Study of Text-Based CAPTCHA Attacks. 121-124 - Talip Munire, Jamal Anwar, Wenqiang Guo:

A Proposed Steganography Method to Uyghur Script. 125-128 - Michael Naseimo Daikpor, Oluwole Adegbenro:

Arithmetic Operations on Elliptic Curves Defined over Un-conventional Element Finite Fields. 129-136 - Jayaprakash Kar

:
Provably Secure Identity-Based Aggregate Signature Scheme. 137-142 - Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:

Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver. 143-150 - Lidong Zhai, Wei Guo, Zhaopeng Jia, Li Guo, Jinqiao Shi:

Worm Propagation Model for Heterogeneous Network. 151-154 - Cheng-Qiang Huang, Long-Hai Li, Shao-Feng Fu:

An Improved Construction for Reusable Anonymous Return Channels Based on Universal Re-encryption. 155-159 - Rima Djellab, Mohamed Benmohammed:

Securing Encryption Key Distribution in WLAN via QKD. 160-165 - Tong Zhang, Qi Wu, Wen Liu, Liang Chen:

Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain. 166-169 - Lynne Y. Williams, Diane M. Neal

:
The Digital Aggregated Self: A Literature Review. 170-177 - Chunlei Wang, Lan Fang, Yiqi Dai, Liang Ming, Qing Miao, Dongxia Wang:

Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making. 178-184 - Amira Bradai, Hossam Afifi:

Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods. 185-190 - Di Liu, Zhi-Jiang Zhang, Ni Zhang:

A Biometrics-Based SSO Authentication Scheme in Telematics. 191-194 - Pijush Barthakur

, Manoj Dahal, Mrinal Kanti Ghose
:
A Framework for P2P Botnet Detection Using SVM. 195-200 - Riyanat O. Shittu, Alex Healing, Robin E. Bloomfield, Muttukrishnan Rajarajan:

Visual Analytic Agent-Based Framework for Intrusion Alert Analysis. 201-207 - Xiaolei Li, Dongmei Sun:

A Dual-Mode Fingerprint Fusion Encryption Method Based on Fuzzy Vault. 208-215 - João Ferreira, Henrique Santos

:
Keystroke Dynamics for Continuous Access Control Enforcement. 216-223 - Liang Chen, Tong Zhang, Wen Liu, Chengmin Gao:

Non-interactive Exponential Homomorphic Encryption Algorithm. 224-227 - Peng Cao, Huiyan Jiang, Bo Liu, Weiwei Shan:

Memory Bandwidth Optimization Strategy of Coarse-Grained Reconfigurable Architecture. 228-231 - Yang Shi, Desen Zhang, Mingyan Xiao, Minghua Lu:

SOA-Based Simulation Framework: A Way to Simulation Composability. 232-236 - Sining Ma, Xi Chen

, Guicai Song, Juan Wang, Limin Sun, Jia Yan:
The Converged Service Oriented Architecture in Smart Home Service. 237-240 - Alexander Cameron, Markus Stumptner

, Nanda Nandagopal
, Wolfgang Mayer
, Todd Mansell:
Rule-Based Control of Decentralised Asynchronous SOA for Real-Time Applications. 241-248 - Pen-Choug Sun, Michael O. Odetayo

, Rahat Iqbal
, Anne E. James
:
A Core Broking Model for E-Markets. 249-256 - Zexin Jiang:

A Novel Simulation Time and Wall Clock Time Synchronization Algorithm for HLA. 257-260 - Xuexiang Wang, Weiwei Shan, Hao Liu:

Uniform SystemC Co-Simulation Methodology for System-on-Chip Designs. 261-267 - Ming Chen, Bai Na:

An Efficient and Flexible Embedded Memory IP Compiler. 268-273 - Weiyuan Sun, Xing Chen, Fangyi Liu, Liang Zhao:

Collection System for Pressure Information of Buildings Based on the IoT and CAN Bus. 274-277 - Bo Li, Enwei Zhou, Hao Wu

, Yijian Pei, Bin Shen:
Fragment Aware Scheduling for Advance Reservations in Multiprocessor Systems. 278-285 - Peng Cao, Yong Cai, Bo Liu, Weiwei Shan:

Configuration Cache Management for Coarse-Grained Reconfigurable Architecture with Multi-Array. 286-291 - Jie Li, Xinxiang Ke, Peng Cao, Weiwei Shan:

A New Approach to Implement Discrete Wavelet Transform on Coarse-Grained Reconfigurable Architecture. 292-297 - Jinjiang Xing, Yan Zhang, Jian Li, Yuncheng Feng:

Sequential Scheduling in Space Missions. 298-303 - Saleh Usman

, Asad Mahmood, Muhammad Rehan Ashraf:
Porting of OSSIE on Texas Instrument's DAVINCI SoC Based SDR Platform. 304-308 - D. Dheeraj, B. Nitish, Shruti Ramesh:

Optimization of Automatic Conversion of Serial C to Parallel OpenMP. 309-314 - Santosh Kumar Jena, M. B. Srinivas:

On the Suitability of Multi-Core Processing for Embedded Automotive Systems. 315-322 - Babar Iqbal, Asif Iqbal, Mário Guimarães, Kashif Khan, Hanan Al Obaidli:

Amazon Kindle Fire from a Digital Forensics Perspective. 323-329 - Zhanchun Gao, Yuying Liang:

Improving the Collaborative Filtering Recommender System by Using GPU. 330-333 - Mahmood Aghajani, Dayang N. A. Jawawi

:
An Implementation of Embedded Real Time System Framework in Service Oriented Architecture. 334-340 - Chi-Tsun Cheng

, Henry Leung:
A Multi-Objective Optimization Framework for Cluster-Based Wireless Sensor Networks. 341-347 - Chi-Tsun Cheng

, Chi Kong Tse
:
An Analysis on the Delay-Aware Data Collection Network Structure Using Pareto Optimality. 348-352 - Bo Zeng, Yabo Dong, Zhidan Liu

, Dongming Lu:
A Workload-Aware Link Scheduling for Heterogeneous Wireless Sensor Networks. 353-359 - Jiyu Zhang, Liusheng Huang, Hongli Xu, Mingjun Xiao, Weijie Guo:

An Incremental BP Neural Network Based Spurious Message Filter for VANET. 360-367 - Hao Liu, Fulong Jiang, Guoliang Yao:

An Appointment Based MAC Protocol for Wireless Sensor Networks. 368-372 - Ning Cao, Russell Higgs

, Gregory M. P. O'Hare
:
An Intelligent Evaluation Model Based on the LEACH Protocol in Wireless Sensor Networks. 381-388 - Dong Ting:

A Clustering Routing Algorithm Based on Reliability in Wireless Sensor Network. 389-392 - Dima Hamdan, Oum-El-Kheir Aktouf, Ioannis Parissis, Bachar El-Hassan, Abbas Hijazi, Bassam Moslem:

A Self-Monitoring, Adaptive and Resource Efficient Approach for Improving QoS in Wireless Sensor Networks. 393-400 - Huu Nghia Le, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:

Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor Networks. 401-407 - Bo Liu, Peng Cao, Jinjiang Yang:

Hybrid-Priority Configuration Cache Supervision Method for Coarse Grained Reconfigurable Architecture. 408-414 - Mahmoud A. M. Albreem, Mohd Fadzli Mohd Salleh:

Lattice Sphere Decoding Technique Assisted Optimum Detection for Block Data Transmission Systems. 415-418 - Lixia Liu, Gang Hu, Ming Xu, Yuxing Peng:

Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness View. 419-422 - Xi Chen

, Limin Sun, Hongsong Zhu, Yan Zhen, Hongbin Chen:
Application of Internet of Things in Power-Line Monitoring. 423-426 - Kai Chen, Hongyun Zheng, Yongxiang Zhao, Yuchun Guo:

Improved Solution to TCP Incast Problem in Data Center Networks. 427-434 - A. A. Pandit, Anup Kumar:

Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems. 435-442 - Zheng Xiang, Qiuli Kong:

A Mobility Management Architecture for IPv4/IPv6 Networks. 443-446 - Boniface O. Anyaka, Udochukwu B. Akuru

:
Electromagnetic Wave Effect on Human Health: Challenges for Developing Countries. 447-452 - Xingyun Geng, Li Wang, Dong Zhou, Huiqun Wu, Wen Cao, Yuanpeng Zhang

, Yalan Chen, Weijia Lu, Kui Jiang, Jiancheng Dong
:
Online and Intelligent Route Decision-Making from the Public Health DataSet. 453-456 - Ali Raza, Stephen Clyde:

Testing Health-Care Integrated Systems with Anonymized Test-Data Extracted from Production Systems. 457-464 - Yingtao Niu, Fuqiang Yao, Jianzhong Chen:

Low-Complexity Anti-Jamming Capability Evaluation Method of Wireless Communication System. 465-468 - Gao Qiang, Yu Zhong Yuan:

Analysis and Simulation of New Method in LTE-Advanced System to Improve System Performance. 469-472 - Tongfei Zhang, Wenjing Liu:

FFT-Based OFDM in Broadband-PLC and Narrowband-PLC. 473-478 - Xiaorong Zhu, Yong Wang:

Capacity of Hybrid Spectrum Sharing System and Analysis Model in Cognitive Radio. 479-484 - M. Kaleem Iqbal, M. Bilal Iqbal, Iftikhar Rasheed

, M. Abdullah Sandhu:
4G Evolution and Multiplexing Techniques with Solution to Implementation Challenges. 485-488 - Suyog Pawar, Prabha Kasliwal:

Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor Network. 489-492 - Mohammad Abu Hanif, Moon Ho Lee:

SER Analysis of 8x8 QOSTC with Less Decoding Complexity. 493-496 - Yeonju Lee, Kwangsoo Kim

, Byeong-Hee Roh
:
DDoS Attack by File Request Redirection in Kad P2P Network. 497-500 - Yansi Yang, Yingyun Yang, Xuan Zeng:

Improvement of Texture Image Retrieval Algorithm Based on Sparse Coding. 501-506 - Jaechun No, Sung-Soon Park:

Exploiting the Effect of NAND Flash-Memory SSD on Filesystem Design. 507-511 - Majing Su, Hongli Zhang, Binxing Fang, Ning Yan:

A measurement. 512-518 - Bolun Cai, Zhifeng Luo, Kerui Li

:
A Coarse-to-Fine Approach for Motion Pattern Discovery. 519-522 - Xinzhi Xu, Jingbo Guo:

A Fast System Identification Method Based on Minimum Phase Space Volume. 523-526 - Xiaoguang Wang:

A Genetic Algorithm for Task Scheduling Based on User Overall Satisfaction. 527-530 - Jianhui Shi, Wenbo Zhou, Ying Liu:

The Domain Decomposition Method in Land Surface Model. 531-534 - Mohamed Waleed Fakhr:

Sparse Watermark Embedding and Recovery Using Compressed Sensing Framework for Audio Signals. 535-539 - Md. Hashem Ali Khan, Moon Ho Lee:

Performance Evaluation of Beamforming Algorithm with Jacket Matrix Based Eigenvalue Decomposition. 540-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














