default search action
10th CIS 2014: Kunming, Yunnan, China
- Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7434-4
Intelligent Computation
- Jing Zhang, Huanqin Li:
A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization Algorithm. 1-6 - Hai Zhu, Xiaoli Wang, Hongfeng Wang:
A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic Algorithm. 7-11 - Ya Wang, Ding-Cheng Ji:
A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents. 12-16 - Liu Jie:
Adaptive Central Force Optimization with Variable Population Size. 17-20 - Mingzhao Wang, Xiaoli Wang, Yuping Wang, Zhen Wei:
An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity Measure. 21-24 - Jie Liu, Yanfeng He, Aiping Zhang:
An Improved MULTI-ACS Algorithm for the Waste Collection Vehicle Arc Routing Problem with Turn Constraints. 25-29 - Deqing Li, Wenyi Zeng, Junhong Li, Ping Guo:
Balance Function Analysis in Variable Weight Decision Making. 30-34 - Jiqiang Feng, Chen Xu, Weiqiang Zhang:
Convergence Analysis of Swarm Intelligence Based on Fuzzy Random Variables. 35-38 - Bin Gui, Xianghe Wei, Qiong Shen, Jingshan Qi, Liqiang Guo:
Financial Time Series Forecasting Using Support Vector Machine. 39-43 - Zhengyang Guo, Le Zhang:
Improved Adaptive Median Filter. 44-46 - Ben Niu, Jing Liu, Ying Bi, Ting Xie, Lijing Tan:
Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism. 47-51 - Haixia Long, Shulei Wu, Haiyan Fu:
Improving Metabolic Flux Estimation of Metabolic Networks by QPSO with Penalty Function. 52-57 - Zhenhua Li, Hai-Lin Liu:
Integrating Preferred Weights with Decomposition Based Multi-objective Evolutionary Algorithm. 58-63 - Yajie Pi, Xueyan Song, Jizhou Sun:
Mathematical Models, GRASP Algorithms and Fitness Landscape Analysis for Aircraft Gate Assignment Problem. 64-68 - Yunlong Wu, Guohua Liu, Yuanyuan Liu:
Multi-user Preferences Based Top-k Query Processing Algorithm. 69-73 - Haixia Long, Shulei Wu, Haiyan Fu:
Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization Algorithm. 74-79
Learning Algorithms
- Ruilin Xu:
A Feedback-Based Self-Organizing Query Structure Optimization Algorithm. 80-84 - Yingjuan Xie, Xinnan Fan, Junfeng Chen:
Affinity Propagation-Based Probability Neural Network Structure Optimization. 85-89 - Xin Liu, Yiu-ming Cheung:
An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for Lipreading. 90-93 - Huasheng Tan, Mingang Hua:
Asymptotical Stability Criteria for Time-Delay Static Neural Networks Subject to Stochastic Perturbations. 94-98 - Junfeng Chen, Yingjuan Xie, Jianjun Ni:
Brain Storm Optimization Model Based on Uncertainty Information. 99-103 - Zhenwei Meng, Junlong Qiao, Lijun Zhang:
Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural Network. 104-108 - Qiwen Yang, Shanshan Fu, Yuncan Xue, Shanna Ruan, Junfeng Chen:
Individual Intelligence Based Optimization and Its Application to ITAE Standard Forms. 109-113 - Bin Ju, Mincao Ye, Yuntao Qian, Rong Ni, Chenxi Zhu:
Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix Factorization. 114-118 - Guang-Hao Zhang, Yao Lu, Mukai Chen:
Multi-scale Monte Carlo-Based Tracking Method for Abrupt Motion. 119-123 - Wenzhang He, Hongjian Xu, Zhengyang Guo, Jie Liang, Lina Wang:
The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative. 124-128 - Zhifeng Lin, Jiechang Wen, Qiling Chen:
Wireless Location on CPN Correction Environmental Factors. 129-133
Intelligent Systems and Complex Systems
- Xiaoli Wang, Yuping Wang, Kun Meng:
A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling. 134-138 - Juntao Chen, Shulei Wu, Lan Lin, Jinmei Zhan:
Analysis of Energy Saving and Performance Characteristics of Library Computer Room Intelligent High Heat Transfer and Exchanger. 139-142 - Zhihua Jiang, Zhongwei Si, Chi Luo:
Design & Implementation to an RFID Based Conference Management System. 143-147 - Dan Wang, Mingtao Pei, Lan Zhu:
Detecting Driver Use of Mobile Phone Based on In-Car Camera. 148-151 - Hong Zhang, Hai Zhu:
Failure-Aware Resource Scheduling Policy for Hybrid Cloud. 152-156 - Jun Hu, Chun Guan:
Granular Computing Model Based on Quantum Computing Theory. 157-160 - Xirong Xu, Chun Yin, Sijia Zhang, Yazhen Huang:
Improved Feedback Vertex Sets in Kautz Digraphs K (d, n). 161-165 - Guoqiang Hang, Yang Yang, Danyan Zhang, Xiaohua Li:
Neuron-MOS-based Dynamic Circuits for Multiple-Valued Logic. 166-170
Pattern Recognition and Knowledge Discovery
- Lin Zhu, Ying Wang, Bo Zhao, Xiaozheng Zhang:
A Fast Image Stitching Algorithm Based on Improved SURF. 171-175 - Qirun Huo, Yao Lu:
A Novel Tracking Method Based on Ensemble Metric Learning. 176-179 - Bu Chen, Qian Yin, Ping Guo:
A Study of Deep Belief Network Based Chinese Speech Emotion Recognition. 180-184 - Yan Liang, Wanxuan Lu, Wei Liang, Yucheng Wang:
Action Recognition Using Local Joints Structure and Histograms of 3D Joints. 185-188 - Jie Niu, Xiongzhu Bu, Zhong Li, Yao Wang:
An Improved Bilinear Deep Belief Network Algorithm for Image Classification. 189-192 - Shulei Wu, Huandong Chen, Xiangxiang Xu, Haixia Long, Wenjuan Jiang, Dong Xu:
An Improved Median Filter Algorithm Based on VC in Image Denoising. 193-196 - Zhan Peng, Yuping Wang, Jinfeng Xue:
An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern Sets. 197-200 - Shulei Wu, Huandong Chen, Zhizhong Zhao, Haixia Long, Chunhui Song:
An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color Feature. 201-204 - Haijiao Xu, Peng Pan, Yansheng Lu, Chunyan Xu, Deng Chen:
Bimodal Learning for Multi-concept Image Query. 205-209 - Wenjuan Jiang, Dong Xu, Shulei Wu, Bin Meng:
Design of a Flash Digital Watermarking Application Using MATLAB GUI. 210-212 - Qiguang Miao, Xing Tang, Yi-Ning Quan, Kai Deng:
Detecting Circles on Ego Network Based on Structure. 213-217 - Xianxiang Yang, Heyan Huang, Xin Xin, Quanchao Liu, Xiaochi Wei:
Domain-Specific Product Named Entity Recognition from Chinese Microblog. 218-222 - Junyang Zhao, Zhili Zhang, Chongzhao Han, Lijiang Sun:
Experiments with Feature-Prior Hybrid Ensemble Method for Classification. 223-227 - Tao Li, Weiwei Wang, Long Xu, Xiangchu Feng:
Image Denoising Using Low-Rank Dictionary and Sparse Representation. 228-232 - Xin Zheng, Chenlei Lv, Qingqing Xu, Ping Guo:
Image Up-Scaling: Based on Self Similarity and Local Information. 233-237 - Feng Lv, Huijun Di, Yao Lu:
Joint Sequential Shape Classification and Piecewise Elastic Motion Estimation. 238-241 - Xiao-Ma Xu, Ming-Tao Pei:
Multiview Face Retrieval in Surveillance Video by Active Training Sample Collection. 242-246 - Xiujun Zhang, Chen Xu, Min Li:
Nonlocal Diffusion Tensor for Visual Saliency Detection. 247-251 - Wencai Zou, Yao Lu, Mukai Chen, Feng Lv:
Rapid Face Detection in Static Video Using Background Subtraction. 252-255 - Qingxuan Shi, Yao Lu, Tianfei Zhou:
Spatio-Temporal Context for More Accurate Dense Point Trajectories Estimation. 256-259 - Qian Wang, Qingxuan Shi, Xuedong Tian:
Tracking Non-rigid Object Using Discriminative Features. 260-263 - Yanmei Dong, Mingtao Pei, Xiameng Qin:
Vehicle Color Recognition Based on License Plate Color. 264-267
Data Mining
- Yun Xue, Zhengling Liao, Meihang Li, Jie Luo, Xiaohui Hu, Guiyin Luo, Wen-Sheng Chen:
A New Biclustering Algorithm for Time-Series Gene Expression Data Analysis. 268-272 - Fei Chen, Lin Jiang:
A Parallel Algorithm for Datacleansing in Incomplete Information Systems Using MapReduce. 273-277 - Zhenghai Ai, Zhongwei Si:
Application of Investment Plan Selection Based on Variable Weight Synthesis and Mahalanobis Distance. 278-282 - Junfeng Li, Xueqiang Lv, Kehui Liu:
Extracting Hyponymy of Ontology Concepts from Patent Documents. 283-287 - Weibo Li, Chunhong Zhang, Xiaofeng Qiu, Yang Ji:
Identifying Relevant Messages for Social TV. 288-292 - Yuexia Xu, Wei Su, Ming Cheng, Zhiyi Qu, Hui Li:
N-gram Index Structure Study for Semantic Based Mathematical Formula. 293-298 - Dingjia Liu, Guohua Liu, Yuanyuan Liu:
On Modeling and Querying of Text Corpora. 299-303 - Kai Lin, Rong Ni, Yanhua Shao, Sijing Wu, Xiao-Jiao Ma:
Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, China. 304-307 - Luoyong Niu, Jiaming Hong, Hongbo Huo, Bishi He, Zhe Xu:
The Automatic Classification Research to Medical Imaging Disease Based on Naïve Nayesion Algorithm. 308-311
Optimization Theory and New Methods
- Lei Fan, Xiyang Liu, Liping Jia:
A Minimum-Elimination-Escape Function Method for Multimodal Optimization Problems. 312-316 - Wen Li, Hecheng Li:
An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained Multi-objective Optimization Problems. 317-320 - Liping Jia, Guocheng Zou, Lei Fan:
Combining TOPSIS and Particle Swarm Optimization for a Class of Nonlinear Bilevel Programming Problems. 321-325 - Xuejun Huang, Xiaobin Qu:
Dependence System and its Structure. 326-329 - Hai Sun:
On the Field Patterns in Elliptic-Shaped Microshield Lines Loaded with Left-Handed Materials by the Edge-Based Finite Element Method. 330-333 - Xin Li, Zhaotong Lian:
Optimal Pricing with Yield Management in M/M/c. 334-337 - Xin Yang, Linna Wang, Hongbo Zai, Yanrong Ren:
Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular Automata. 338-342 - Zhongwei Si, Lina Liang, Zhenghai Ai, Zhihua Jiang:
The Hilbert Boundary Value Problem for Beltrami Equation in Clifford Analysis. 343-347 - Xiangyou Li, Qingxiang Zhang:
The Sufficiency of Solution for Multi-objective Semi-infinite Programming. 348-351 - Min Li, Xiaoli Sun, Chen Xu:
Variational Image Decomposition in Shearlet Smoothness Spaces. 352-355
Access Control and Protection
- Lequan Min, Xu Lan, Longjie Hao, Xiuping Yang:
A 6 Dimensional Chaotic Generalized Synchronization System and Design of Pseudorandom Number Generator with Application in Image Encryption. 356-362 - Weijun Shan, Lihui Wang, Qing Li, Limin Guo, Shanshan Liu, Zhimin Zhang:
A Chosen-Plaintext Method of CPA on SM4 Block Cipher. 363-366 - Rui-xia Liu, Yinglong Wang:
A New Sybil Attack Detection for Wireless Body Sensor Network. 367-370 - Lu Chen, Qing Zhou, Gaofeng Huang, Liqiang Zhang:
A Trust-Role Based Context Aware Access Control Model. 371-376 - Guozhen Shi, Mang Su, Fenghua Li, Jiapeng Lou, Qiong Huang:
A User-Based Document Management Mechanism in Cloud. 377-381 - Jia-Zhi Li, Lei Zhang:
Attribute-Based Keyword Search and Data Access Control in Cloud. 382-386 - Hao Liang, Liji Wu, Xiangmin Zhang, Jiabin Wang:
Design of a Masked S-Box for SM4 Based on Composite Field. 387-391 - Kai Luo, Shouzhong Tu, Chunhe Xia, Dan Zhou:
Detecting Compromised VM via Application-Aware Anomaly Detection. 392-396 - Qiao Yan, Nan Lu, Tu-Wen Ning, Xi-Yan Yao, Bao-Guang Li:
IP Traceback Algorithm Based on Deterministic Linear Network Coding. 397-401 - Lihua Dong, Yong Zeng, Ligang Ji, Xucang Han:
Study on the Pass Rate of NIST SP800-22 Statistical Test Suite. 402-404 - Wei Liu, Liji Wu, Xiangmin Zhang, An Wang:
Wavelet-Based Noise Reduction in Power Analysis Attack. 405-409
Cryptography and Cryptanalysis
- Zeleng Zhuang, Jiachao Chen, Haosheng Zhang:
A Countermeasure for DES with Both Rotating Masks and Secured S-Boxes. 410-414 - Lili Wei, Zhaotong Luo, Qiang Qu, Qing He, Jingwei Xu:
A Low-Cost PKC-based RFID Authentication Protocol and its Implementation. 415-419 - Wei Lin, Jinlong Fei, Yuefei Zhu, Xiaolong Shi:
A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering. 420-424 - Dan Ding, Guizhen Zhu:
A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice Vectors. 425-429 - Liang Dai, Huiyun Li, Guoqing Xu, Liying Xiong:
A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs. 430-434 - Xiaowei Han, Beibei Wang, An Wang, Liji Wu, Woogeun Rhee:
Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2. 435-439 - Changji Wang:
An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings. 440-444 - Yi Tang, Shenghui Su:
Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem. 445-449 - Jian Zhao, Hai-Ying Gao:
Attribute-Based Encryption for Restricted Circuits from Lattices. 450-454 - Hao Wang, Zhihua Zheng, Lei Wu:
Hierarchial Identity-Based Encryption Scheme from Multilinear Maps. 455-458 - Chang-Ji Wang, Hai-Tao Lin, Xi-Lei Xu, Kangjia Zheng, Xiaonan Xia:
Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme. 459-463 - Huawang Qin, Xiaohua Zhu, Yuewei Dai:
Provably Secure Identity-Based Threshold Decryption on Access Structure. 464-468 - Guodong Sun, Shenghui Su, Maozhi Xu:
Quantum Algorithm for Polynomial Root Finding Problem. 469-473 - Yanfei Liu, Sha Feng:
Scalable Lightweight Authentication Protocol with Privacy Preservation. 474-478
Data Security and Integrity
- Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang:
A Multiple-Level DCT Based Robust DWT-SVD Watermark Method. 479-483 - Guozhen Shi, Ying Shen, Fenghua Li, Mang Su:
A Reliable Supervision Model and Implementation for the Trading of Digital Works. 484-488 - Mingguang Zou, Zhitang Li:
A Wav-Audio Steganography Algorithm Based on Amplitude Modifying. 489-493 - Wenjing Hu, Liji Wu, An Wang, Xinjun Xie, Zhihui Zhu, Shun Luo:
Adaptive Chosen-Plaintext Correlation Power Analysis. 494-498 - Rui Chang, Liehui Jiang, Hui Shu, Hongqi He:
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition. 499-504 - Yu Zhou, Guohua Liu, Biying Wang:
Diversifying Results of Top-k Querys over Bounded Regions. 505-509 - Liping Chen:
Ensuring Reliability and QoS Optimizing for Web Service Composition. 510-513 - Ye Hu, Liji Wu, An Wang, Beibei Wang:
Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC Card. 514-518 - Tong Zhang, Shuna Zhao, Xue Li:
Method of Non-reference Image Quality Assessment of SSIM Based on Regional Weighted Entropy. 519-523 - Xin Xie, Fenlin Liu, Bin Lu, Fei Xiang:
Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates. 524-528 - Sulin Pang, Yuanxiong Chen:
Stock Index Futures Basis and Liquidity of Correlation Analysis and Application Based on t-GARCH-Copula Model. 529-533 - Xiaomei Wan, Guohua Liu:
Verification of Artifact Lifecycle Model. 534-538 - Peng Wei, Tongge Xu, Xi Qin, Chao Wang:
Visualization of Police Intelligence Data Based on Word Clouds. 539-543
Information System Safety
- Wei Han, Jianchun Xie:
A Developing Method for Parallel Program Based on System Generator. 544-547 - Guo Xie, Dan Zhang, Xinhong Hei, Fucai Qian:
A Feasible Control Strategy for LQG Control Problem with Parameter and Structure Uncertainties. 548-552 - Tingyu Jiang, Yahui Li, Yuan Dong:
A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing Technology. 553-557 - Mingyue Feng, Hua Pan:
A Modified PSO Algorithm Based on Cache Replacement Algorithm. 558-562 - Ya-Ling Zhang, Kai Liu, Shang-Ping Wang, Qin-Dong Sun:
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption. 563-567 - Bin Wang, Ying Liu, Xinhong Hei, Lei Wang, Zhiqiang Zhang:
A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm. 568-572 - Zhoukai Wang, Yikun Zhang, Xinhong Hei, Linjing Sun, Rui Zhou, Ming Zhao:
A Rendering Algorithm for Function Call Diagram in Software Reliability Assurance. 573-577 - Wenjuan Liu, Xinhong Hei, Shinji Fukuma, Shin-ichiro Mori:
A Simple and Real-Time Parallel Compression of Time Series Scientific Simulation Data for Interactive and Cooperative Supercomputing. 578-582 - Peng Guo, Yahui Li, Peng Li, Shuai Liu, Dongya Sun:
A UML Model to Simulink Model Transformation Method in the Design of Embedded Software. 583-587 - Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang:
An Improved Method of Access Control Based on BLP Model in MILS. 588-592 - Hongning Li, Xianjun Liu, Leilei Xu:
Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm in Cognitive Radio Networks. 593-597 - Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang:
Information Flow Control Model and Method in Distribute MILS. 598-602 - Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen:
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. 603-607
Network and Wireless Security
- Yumeng Wang, Yuping Wang, Xingsi Xue, Chen Zhang, Yuanliang Huo:
A New Packet Filter Schema Based on Multi-level Signature Hash and DFA Grouping. 608-614 - Zhongyuan Qin, Yuying Wang, Hengkang Wang, Jie Huang:
A Novel Key Pre-distribution Scheme in Wireless Sensor Networks. 615-619 - Ye Wang, Shaotsung Chang, Gongbing Shan, Hua Li:
A Wireless Sensor System for the Training of Hammer Throwers. 620-623 - Wei Wu, Nan Cheng, Yubin Wang:
Application Research on Retrospective Analysis System in Network Intrusion Detection. 624-627 - Yubin Wang, Chao Li, Nan Cheng:
Internet Security Protection in Personal Sensitive Information. 628-632 - Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo:
Multi-sender Broadcast Authentication in Wireless Sensor Networks. 633-637 - Majeed Alajeely, Asma'a Ahmad, Robin Doss, Vicky H. Mak-Hau:
Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets. 638-642 - Guojun Zhang:
Selection of QoS Support on Artificial Immune Network Classifier for Dynamic Web Service Composition. 643-646
Security Methodologies and Management
- Yue Dai, Shenghui Su:
A Diploma Anti-forgery System Based on Lightweight Digital Signatures. 647-651 - Yuying Wang, Zhongyuan Qin, Qunfang Zhang, Hengkang Wang, Jie Huang:
A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks. 652-656 - Shuhui Zhang, Lianhai Wang, Xiaohui Han:
A KVM Virtual Machine Memory Forensics Method Based on VMCS. 657-661 - Zhongyuan Qin, Kerong Feng, Shuaiqi Hu, Lei Tao, Zunli Hu, Xinshuai Zhang, Jie Huang:
A Novel Identity-Based Security Scheme for Wireless Sensor Networks. 662-666 - Fei Song, Liji Wu, An Wang, Xinyu Zhao:
A Novel Subspace Template Attack Based on Symmetric Cross Entropy Criterion. 667-670 - Zhenbin Zhang, Liji Wu, Zhaoli Mu, Xiangmin Zhang:
A Novel Template Attack on wNAF Algorithm of ECC. 671-675 - Zhong Zeng, Dawu Gu, Junrong Liu, Zheng Guo:
An Improved Side-Channel Attack Based on Support Vector Machine. 676-680 - Nan Cheng, Wei Wu, Yubin Wang:
Brief Talk about the Existing Problems in Safety Management in Classification Testing and Evaluation. 681-684 - Jie Li, Gang Lei, Yong Xian, Xiaoli Wang:
Research on Ground Effect of Shipborne Flying-Wing UAV. 685-688 - Mouna Jouini, Latifa Ben Arfa Rabai:
Surveying and Analyzing Security Problems in Cloud Computing Environments. 689-693 - Jinxin Ma, Guowei Dong, Puhan Zhang, Tao Guo:
SymWalker: Symbolic Execution in Routines of Binary Code. 694-698
System Analysis and Modeling
- Liying Lu, Yingzi Fu, Peixiao Chu, Xiaolin Zhang:
A Bayesian Analysis of Zero-Inflated Count Data: An Application to Youth Fitness Survey. 699-703 - Lianjun Zhang, Yao Lu, Mukai Chen, Wencai Zou:
A Codebook Based Background Subtraction Method for Image Defects Detection. 704-706 - Siyuan Jing, Jin Yang, Kun She:
A Parallel Method for Rough Entropy Computation Using MapReduce. 707-710 - Cong-Yi Zhu, Yu-Mei Huang:
A Preconditioned GMRES Method for Elliptic PDE-constrained Optimization Problems. 711-713 - Ben-Bo Zha, Ru-Liang Wang, Huan-Long Sun, Lei Wang:
A Study of the Design and Parameters Optimization of BP Neural Network Using Improved GEP. 714-719 - Weijun Yang, Yan Yang, Xiaodong Wang, Liang Yang:
An Efficient Approximation Scheme for the Multiple QoS Constraints Routing. 720-723 - Qian Xu, Chuanguo Li:
An Empirical Study on Determinants of Capital Structure in Chinese Listed Companies. 724-728 - Peng Sun, Ziyan Wu, Yunpeng Zhang, Yang Yang:
Analysis and Modeling of Learning Behaviors on Intelligent Tutoring Website. 729-731 - Jianchen Zhu, Zengli Liu:
Analysis of Hybrid Feature Research Based on Extraction LPCC and MFCC. 732-735 - Zhibin Chen, Man Wang, You-Wei Wen, Zhining Zhu:
Choice of Regularization Parameter in Constrained Total Variational Image Restoration Model. 736-740 - Hong Zhang:
Cooperative Advertising Analysis within a Supply Chain Based on Game Theory. 741-745 - Weijun Yang, Yan Yang, Yuanfeng Chen:
Design of Detection and Control System for Diesel Injector. 746-749 - Jianhui Yang, Chuanyang Ruan:
Hesitant Fuzzy Information Aggregation Operators under Confidence Levels. 750-754 - Ming Cheng, Wei Su, Yuexia Xu, Zhiyi Qu, Xuan Wang:
Linear Input Method of Mathematical Formula. 755-760 - Yu-Feng Zhuang, Da-Song Li:
Online Group Purchase Research Based on Commodities Trading. 761-764 - Jing Nie:
Practice and Development of Cloud Computing-Based Mobile Teaching Management and Evaluation System in Vocational Colleges. 765-769 - Mukai Chen, Yao Lu, Guang-Hao Zhang, Wencai Zou:
Real-Time Simulation in Dynamic Electromagnetic Scenes Using PipelineThread Pool. 770-774 - Jianhui Yang, Jie Wu:
Research and Application of a Stochastic Volatility Model with T-distribution Leveraged. 775-779 - Yukun Jian, Lin Dai:
Statistical Inference of DEA Model of Environmental Efficiency Considering Undesirable Outputs. 780-784 - Dongyi He, Fang Luo:
Study on Effect Evaluation of Enterprise Staff Training Based on Grey Correlation Analysis Method. 785-788 - Hongxia Liu, Tianxiang Feng:
Triangular Factorization of Strongly Row (Column) Full Rank Linear Equations. 789-793 - Na Dong, Zhengfeng Ming, Tao Wen:
Two-Phase SVPWM Modulation Method and Its Application in Stepper Motor. 794-797 - Tianxiang Feng:
Ways to Train the Statistical Capacity of Grassroots Statisticians. 798-802
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.