Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yueming Lu, Xu Wu, Xi Zhang 0008 (eds.) |
Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![Springer, 978-3-662-47400-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Danfeng Zhu, Rui Wang 0014, Zhongzhi Luan, Depei Qian, Han Zhang, Jihong Cai |
Memory Centric Hardware Prefetching in Multi-core Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 311-321, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xinmin Jiang, Lirong Qiu, Yeqing Li |
A Tibetan Word Sense Disambiguation Method Based on HowNet and Chinese-Tibetan Parallel Corpora. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 152-159, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xi Zhang 0008, Guanhong Jiang, Yuan Su |
Monitoring Social Events on Sina Weibo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 328-335, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowei He, Shuyuan Jin, Yunxue Yang, Huiqiang Chi |
DDoS Detection Based on Second-Order Features and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 197-205, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dong Cui, Chuanyi Liu, Meiqi Yang, Jincui Yang |
Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 99-106, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ling Xu, Yueyun Chen, Zheng Gong |
An Improving Algorithm for Combined Input-Crosspoint-Queued Switches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 281-287, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Jie, Liu Zhishuai, Xiaoyu Qiu |
Community Detection in Complex Networks: Algorithms and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 238-244, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xu Wu, Yue Fan, Xi Zhang 0008, Jin Xu 0009 |
Research of eID Mobile Identity Authentication Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 350-358, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zeng Guang, Yao Lin, Zhao Ming, Ma Yilan |
The Improvement and Implementation of iSLIP Algorithm Based on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 260-266, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yan Shao, Yanbing Liu, Jianlong Tan |
Accelerating DFA Construction by Parallelizing Subset Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 16-24, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bin Jia, Zhaowen Lin, Yan Ma |
Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 221-228, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chao Ding, Mingxia Zeng, Kui Wang, Polo Pei, Zhongzhi Luan, Depei Qian |
An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 304-310, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yi Zheng, Weihong Han, Chengzhang Zhu |
A Novel Feature Selection Method Based on Category Distribution and Phrase Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 25-32, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuai Zhang, Yueming Lu, Xi Zhang 0008 |
Cache Replacement Improving Based on User Group Interest Degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 1-7, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weiwei Feng, Peng Wang 0028, Chuan Zhou 0001, Yue Hu 0002, Li Guo 0001 |
Nonparametric Topic-Aware Sparsification of Influence Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 83-90, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yan Chen, Yiguo Pu, Xiaojun Chen 0004, Jinqiao Shi, Xiaojie Yu |
CAS: Content Attribution System for Network Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 129-136, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hui Zhao, Yueyun Chen, Xiaopan Yuan |
A New Network Coding Scheme in Two-relay OFDMA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 288-294, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Linghan Li, Yonghua Li, Jiaru Lin, Tianle Zhang |
Enhanced AllJoyn Network with Centralized Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 183-188, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Huimin Gao, Zeng Guang |
The Optimization Design of High Q Microwave Photonic Filters Based on Cascade Fiber Bragg Gratings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 267-273, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hongjie Huang, Shuqiang Yang |
A Method of Evaluating Distributed Storage System Reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 189-196, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xuefeng Du, Xiaodong Yan |
Tracking and Analysis of Hot Words and Posts for University Campus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 137-143, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qian Li 0013, Weiguo Wu, Liang Gao, Lei Wang, Jianhang Huang |
A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 41-47, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li, Feng Cao |
Trusted Cloud Service Certification and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 175-182, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Tang, Xiaoxiang Zou, Dongbin Wang |
Design and Performance Analysis of Utility Maximization-Based Cooperative MAC in Multi-rate WiFi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 213-220, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zilu Zhang, Jinqiao Shi, Lanlan Hu |
Towards Enumeration of NTFS Using USN Journals Under UEFI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 166-174, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xu Wu, Pengchong Li, Jin Xu 0009, Xiaqing Xie |
Domain-Specific Semantic Retrieval of Institutional Repository Based on Query Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 401-411, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Quan Bai, Gang Xiong 0001, Yong Zhao |
Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 342-349, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fan Yang, Yue Li, Lidong Zhai |
RayDroid: A Framework for Discovering Anomaly in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 33-40, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Moniz, Yuyu Yuan |
Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User Registration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 359-369, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yunxue Yang, Shuyuan Jin, Xiaowei He |
Software Vulnerability Severity Evaluation Based on Economic Losses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 144-151, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tianle Zhang, Lixin Liu, Shouyou Song, Yuyu Yuan |
Human Mobility Simulation in Smart Energy Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 229-237, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Na Ye, Lili Dong, Genqing Bian, Jian Li |
Construction of Software and Hardware Resource Pool in Data Center Using Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 206-212, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jincui Yang, Yuyu Yuan, Tianle Zhang |
Research on Modeling of Software Automatic Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 382-388, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Heng Chen 0002, Xiaoshe Dong |
Web-Based Heatmap of Physical Machines in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 107-113, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jørgen Bøegh |
Understanding Human Goal Setting as a Means for Supporting Goal Oriented Requirements Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 253-259, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xu Bai, Lei Jiang 0003, Xinxing Liu, Jianlong Tan |
RSA Encryption/Decryption Implementation Based on Zedboard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 114-121, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodong Yan |
A Uighur Automatic Summarization Method Based on Sub-theme Division. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 8-15, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jing Li, Yueming Lu, Xi Zhang 0008 |
Extracting News Information Based on Webpage Segmentation and Parsing DOM Tree Reversely. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 48-55, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xu Wu, Weiyi Zhang, Xi Zhang 0008, Jin Xu 0009 |
A Method to Build and Expand the Domain Dictionary Automatically Based on WordNet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 370-381, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ma Yilan, Yao Lin, Zeng Guang, Matturdi Bardi |
The Implementation of GFP Protocol Based on EOS in FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 274-280, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lin Ye, Zhongzhi Luan, Hailong Yang |
Performance-Aware Based Correlated Datasets Replication Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 322-327, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xu Wu, Jiada Shi, Xiaqing Xie |
The Design and Implementation of APK eBooks Online Generation System Based on FBReader. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 389-400, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Huailiang Peng, Majing Su, Qiong Dai, Jianlong Tan |
Enhancing Security and Robustness of P2P Caching System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 56-64, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Axel Rennoch, Marc-Florian Wendland, Andreas Hoffmann 0001, Martin A. Schneider |
Advanced Test Modelling and Execution Based on the International Standardized Techniques TTCN-3 and UTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 245-252, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Baohui Li, Kefu Xu, Chuang Zhang, Yue Hu 0002 |
SFAPCC: A Secure and Flexible Architecture for Public Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 160-165, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yibo Xie, Zhongzhi Luan |
Information Integration of Heterogeneous Employment Service Information of College Graduates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 336-341, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaomei Liu, Yong Sun, Liang Fang, Junpeng Liu, Lingjing Yu |
A Survey of Network Traffic Visualization in Detecting Network Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 91-98, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hongzhou Sha, Xiaoqian Li, Qingyun Liu, Zhou Zhou 0007, Liang Zhang, Lidong Wang |
RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 295-303, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qiuwen Lu, Zhou Zhou 0007, Hongzhou Sha, Qingyun Liu, Hongcheng Sun |
Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 74-82, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qipeng Yao, Chuan Zhou 0001, Linbo Xiang, Yanan Cao, Li Guo 0001 |
Minimizing the Negative Influence by Blocking Links in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 65-73, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xin He, Huiyun Jing |
Security Risk Assessment of Rich Communication Services Over LTE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 122-128, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Axel Rennoch, Ina Schieferdecker, Jürgen Großmann |
Security Testing Approaches - For Research, Industry and Standardization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 397-406, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hu Li, Peng Zou, Weihong Han, Rongze Xia |
Imbalanced Chinese Text Classification Based on Weighted Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 38-45, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wang, Chenglong Li 0001, Qingfeng Tan, Xuebin Wang |
Generation and Distribution of Decoy Document System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 123-129, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiao Wang, Yulin Liu, Zhichao Chao, Wei He |
A Modified Single-Channel Blind Separation Method Using EMD and ICA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 78-85, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhixiang Tong, Qiankun Zhuang, Qi Guo, Peijun Ma |
Research on Technologies of Software Requirements Prioritization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 9-21, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shaojie Pei, Lumin Zhang, Aiping Li, Yusha Liu |
Microblog Sentiment Classification Based on Supervised and Unsupervised Combination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 138-145, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kuo Zhang 0001, Juan-Zi Li, MingCai Hong, XueDong Yan, Qiang Song |
A Semantics Enabled Intelligent Semi-structured Document Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 328-344, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | You Meng, Lang Yu, Zhongzhi Luan, Depei Qian, Ming Xie, Zhigao Du |
A Black-Box Approach for Detecting the Failure Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 252-259, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ganggang Zhang, Min Zuo, Xinliang Liu, Fan Xia |
Improving the Efficiency of Storing SNS Small Files in HDFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 154-160, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pingping Liu, Zhihong Tian, Xu Wu, Wei Liu |
An Improved Common Vulnerability Scoring System Based on K-means. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 62-69, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohong Shi, Ying Ji, Hui Xie, Yueming Lu |
A Prefetching Mechanism Based on MooseFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 146-153, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kuo Zhang 0001, Juanzi Li, Gang Wu |
Term Committee Based Event Identification and Dependency Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 311-327, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Genxian Liu, Xi Zhang 0008, Dongsheng Wang 0002, Zhenyu Liu 0001, Haixia Wang 0001 |
Security Memory System for Mobile Device or Computer Against Memory Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 1-8, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ningning Song, Longqun Zou, Yunluo Liu |
Research on the Inverted Index Based on Compression and Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 304-310, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cong Yang, Weiguo Wu, Yuanqi Su |
Level Set Method Based Image Segmentation by Combining Local Information with Global Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 351-361, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ying Zhang, Yongzheng Zhang 0002, Jun Xiao |
Detecting the DGA-Based Malicious Domain Names. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 130-137, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Enjie Liu, Xiaohua Feng |
Trustworthiness in the Patient Centred Health Care System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 362-365, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Miandrilala, Yuyu Yuan |
Concept of Service Trustworthiness Management System (STMS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 374-381, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yu Zhang, Feiyan Li |
Adaptive Synchronization of Complex Networks with Time-Varying Delay Nodes and Delay Coupling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 283-289, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guofeng Wang, Chuanyi Liu, Jie Lin |
Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 29-37, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wenhao Wang, Chen Zhang, Quan Zhang |
An Anomaly Detection Model Based on Cloud Model and Danger Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 115-122, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Moniz, Yuyu Yuan |
Filtering Training Data When Training Feed-Forward Artificial Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 212-218, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anqi Huang, Chen Zhang, Chaojing Tang |
Another Improvement of LMAP++: An RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 100-106, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Changning Song |
Android-Based Remote-Control with Real-Time Video Surveillance for Wi-Fi Robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 382-388, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yanjun Jiang, Mingshan Lei |
MD5 Calculation and Decryption Using CUDA on GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 22-28, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang, Chengwei Zhang, Xuanya Li, Can Zhang |
A Mobile Botnet Model Based on Android System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 54-61, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Manawa Anakpa, Yuyu Yuan |
Multidisciplinary Trust Conceptualization: A General Model for Customer Trust Building in e-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 366-373, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Di Wu, Xing Li, Yongmei Sun, Yuefeng Ji, Jie Mao, Yingting Liu |
A Highly Efficient Indoor Localization Scheme Based Only on Mobile Terminal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 161-168, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yunlong Ren, Yue Li, Fangfang Yuan, Fangjiao Zhang |
Hijacking Activity Technology Analysis and Research in Android System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 46-53, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chen Chen, Qingyun Liu, Hongzhou Sha, Zhou Zhou 0007, Chao Zheng |
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 107-114, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shihong Zhou, Lin Yao |
Gigabit Ethernet Data Transfer Based on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 290-296, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuanquan Fan, Wei Wei, Yan Gao, Weiguo Wu |
Introduction and Analysis of Simulators of MapReduce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 345-350, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowei Xie, Yu Yang, Yueming Lu |
A Zones-Based Metadata Management Method for Distributed File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 169-175, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yue Li, Qingyang Gao, Jørgen Bøegh |
The Evaluation of Service Trustworthiness Based on BP-Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 185-190, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gangfu Feng, Chen Zhang, Quan Zhang |
A Design of Linkage Security Defense System Based on Honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 70-77, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jizeng Guan, Xiaolu Zhu, Mingtao Lei, Jianyi Liu, Cong Wang 0003 |
Business Impact Analysis Model Based on the Analytic Hierarchy Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 227-234, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohong Shi, Kun Guo, Yueming Lu, Xi Chen |
Survey on Data Recovery for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 176-184, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shaopeng Wang, Yuan Zhang, Yan Peng |
Flexible Mechanism Research of Workflow System Based on SOA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 86-92, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Luping Chen, Yongzhen Guo, Feng Zhou |
Security Risk Assessment of Mobile Internet Under Cloud Computing Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 219-226, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lilei Lu, Yanhong Shang, Yaping Ge, Jinli Qu |
Research of Digital Campus Construction Based on Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 198-204, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shaolin Qiu, Laibin Zhang, Yuanqiang Huang, Yaming Mao |
An Effective Resource Management Architecture in HSE System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 260-267, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qian Liu, Qianwen He, Yu Zhang |
A Covert Channel Bases on CPU Load in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 276-282, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qi Zhao, Hailong Yang, Guang Wei, Zhongzhi Luan, Depei Qian |
Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi Coprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 268-275, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jørgen Bøegh |
Trust and Trustworthiness in Human Behavior and IT Services - Concepts, Definitions and Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 235-251, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ningning Song, Zhen Mei, Lin Yao |
Research on Efficient Dynamic Cloud Storage Ciphertext Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 297-303, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chengli Mei, Min Zhang, Zhongang Qi, Qi Bi |
Characterizing and Comparing User Location Preference in an Urban Mobile Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 389-396, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shuaisen Wang, Jørgen Bøegh, Jincui Yang |
Research on Trustworthy Sensor Network Based on Zigbee Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 191-197, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tingting Wang 0001, Jørgen Bøegh |
Multi-layer CAPTCHA Based on Chinese Character Deformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers, pp. 205-211, 2013, Springer, 978-3-662-43907-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|