Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Liping Jia, Guocheng Zou, Zhonghua Li |
Target-Vector Based Particle Swarm Optimization for Multi-objective Bilevel Programming Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 295-298, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jun Yang, Jingxuan Wei, Jiang Liu |
Adaptive Differential Evolution Algorithm Based on Gradient and Polar Coordinates Search Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 274-277, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hejun Xuan, Yuping Wang 0003, Shanshan Hao, Xiaoli Wang |
Cost-Efficient Divisible Load Scheduling Using Genetic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 14-17, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Di Li, Yadi Zhang, Pengcheng Wen, Linting Bai |
A Retinex Algorithm for Image Enhancement Based on Recursive Bilateral Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 154-157, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shaohui Zhang, Liji Wu, Xiangmin Zhang, Xingjun Wu, Xiangyu Li 0002, Huajun Fang |
A Template Attack-Resistant Masking Scheme for RC4 Based on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 381-384, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cai Dai, Xiujuan Lei |
A Novel Evolutionary Algorithm Based on Decomposition and Adaptive Weight Adjustment for Synthesis Gas Production. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 270-273, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yue 0005, Yuping Wang 0003 |
A Fuzzy Multi-objective Portfolio Selection Model with Transaction Cost and Liquidity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 258-261, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qin Lin, Yun Xue, Wensheng Chen, Shuqun Ye, Wanli Li, Jingjing Liu |
Parallel Large Average Submatrices Biclustering Based on MapReduce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 134-137, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aihong Ren, Xingsi Xue |
Improved Electromagnetism-Like Algorithm for Nonlinear Bilevel Programming Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 70-73, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qingtai Xiao, Shibo Wang, Zhan Zhang, Jianxin Xu |
Analysis of Sunspot Time Series (1749-2014) by Means of 0-1 Test for Chaos Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 215-218, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zhang 0015, Caiming Liu, Zhonghua Li, Hongying Qin, Qin Li 0019, Jinquan Zeng |
Immunity-Based Detection for Large-Scale Behavior of Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 437-440, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofang Guo, Xiaoli Wang, Zhen Wei |
MOEA/D with Adaptive Weight Vector Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 291-294, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yanan Zhang, Yao Lu 0001 |
Robust Object Tracking Enhanced by Correction Dictionary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 239-242, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shulei Wu, Zongan Zhang, Huandong Chen, Jinmei Zhan |
Application of an Improved Method of Wavelet Transform in Image Edge Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 450-453, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Caiming Liu, Yan Zhang 0015, Zhonghua Li, Jiandong Zhang, Hongying Qin, Jinquan Zeng |
Dynamic Defense Architecture for the Security of the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 390-393, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jianguo Jiang, Xiang Jing, Bin Lv, Meimei Li |
A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 303-307, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pengfei Xu 0003, Qiguang Miao, Tiange Liu, Xiaojiang Chen |
Multi-direction Edge Detection Operator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 187-190, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jingbo Jiao, Gangcan Sun, Zhuo Han, Zhongyong Wang |
Exact Physical Layer Security in SIMO Wiretap Channels with Antenna Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 416-419, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jinquan Li, Jinhua Zhang |
A 2-Approximation Algorithm for the Single Machine Due Date Assignment Scheduling Problem in Fuzzy Environment to Minimize the Total Costs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 104-108, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jingzhe Wang, Yue Cheng, Jianchun Xie, Wensheng Niu |
A Real-Time Sensor Guided Runway Detection Method for Forward-Looking Aerial Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 150-153, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fuqiang Zhang, Zengli Liu |
Image Denoising Based on the Bivariate Model of Dual Tree Complex Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 171-174, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Limin Guo, Lihui Wang, Qing Li 0064, Jun Yu, Peng Luo |
Differential Power Analysis on Dynamic Password Token Based on SM3 Algorithm, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 354-357, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wenxue Niu, Congmou Yuan, Dansong Zhang |
Research on Rural Population Flow of China's County Urbanization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 466-469, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Juan Yang, Li Huang |
An Improvement and Application of Genetic BP Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 10-13, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dapeng Qu, Shuwen Liu 0002, Di Zhang, Jun Wang, Chengxi Gao |
Teaching-Learning Based Optimization Algorithm Based on Course by Course Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 48-52, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guoqiang Hang, Yang Yang 0013, Xuanchang Zhou, Xiaohui Hu, Danyan Zhang |
Dynamic Quaternary Circuit with Neuron-MOS Transistor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 129-133, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guo Xie, Dan Zhang, Xinhong Hei 0001, Fucai Qian |
A Feasible Control Strategy for LQG Control Problem with Parameter and Structure Uncertainties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 548-552, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ye Hu, Liji Wu, An Wang 0001, Beibei Wang |
Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 514-518, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mingzhao Wang, Xiaoli Wang, Yuping Wang 0003, Zhen Wei |
An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity Measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 21-24, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ya Wang, Ding-Cheng Ji |
A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 12-16, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haijiao Xu, Peng Pan 0001, Yansheng Lu, Chunyan Xu, Deng Chen |
Bimodal Learning for Multi-concept Image Query. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 205-209, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jinxin Ma, Guowei Dong, Puhan Zhang, Tao Guo |
SymWalker: Symbolic Execution in Routines of Binary Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 694-698, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wenjuan Jiang, Dong Xu, Shulei Wu, Bin Meng |
Design of a Flash Digital Watermarking Application Using MATLAB GUI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 210-212, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tingyu Jiang, Yahui Li, Yuan Dong |
A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 553-557, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Feng, Chen Xu 0004, Weiqiang Zhang |
Convergence Analysis of Swarm Intelligence Based on Fuzzy Random Variables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 35-38, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Juntao Chen, Shulei Wu, Lan Lin, Jinmei Zhan |
Analysis of Energy Saving and Performance Characteristics of Library Computer Room Intelligent High Heat Transfer and Exchanger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 139-142, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ya-Ling Zhang, Kai Liu, Shang-Ping Wang, Qin-Dong Sun |
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 563-567, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Huawang Qin, Xiaohua Zhu, Yuewei Dai |
Provably Secure Identity-Based Threshold Decryption on Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 464-468, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ruilin Xu 0001 |
A Feedback-Based Self-Organizing Query Structure Optimization Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 80-84, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liping Chen |
Ensuring Reliability and QoS Optimizing for Web Service Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 510-513, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaomei Wan, Guohua Liu |
Verification of Artifact Lifecycle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 534-538, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoli Wang, Yuping Wang 0003, Kun Meng |
A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 134-138, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhengyang Guo, Le Zhang |
Improved Adaptive Median Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 44-46, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xin Liu 0011, Yiu-ming Cheung |
An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for Lipreading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 90-93, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yan Liang, Wanxuan Lu, Wei Liang, Yucheng Wang |
Action Recognition Using Local Joints Structure and Histograms of 3D Joints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 185-188, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ming Cheng, Wei Su 0008, Yuexia Xu, Zhiyi Qu, Xuan Wang |
Linear Input Method of Mathematical Formula. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 755-760, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wei, Tongge Xu, Xi Qin, Chao Wang |
Visualization of Police Intelligence Data Based on Word Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 539-543, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhong Zeng, Dawu Gu, Junrong Liu, Zheng Guo 0001 |
An Improved Side-Channel Attack Based on Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 676-680, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Changji Wang |
An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 440-444, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zeleng Zhuang, Jiachao Chen, Haosheng Zhang |
A Countermeasure for DES with Both Rotating Masks and Secured S-Boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 410-414, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Junfeng Chen, Yingjuan Xie, Jianjun Ni |
Brain Storm Optimization Model Based on Uncertainty Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 99-103, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lu Chen, Qing Zhou, Gaofeng Huang, Liqiang Zhang |
A Trust-Role Based Context Aware Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 371-376, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhenbin Zhang, Liji Wu, Zhaoli Mu, Xiangmin Zhang |
A Novel Template Attack on wNAF Algorithm of ECC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 671-675, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ben Niu 0002, Jing Liu 0029, Ying Bi, Ting Xie, Lijing Tan |
Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 47-51, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liu Jie |
Adaptive Central Force Optimization with Variable Population Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 17-20, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jing Zhang, Huanqin Li |
A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 1-6, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peng Guo, Yahui Li, Peng Li, Shuai Liu, Dongya Sun |
A UML Model to Simulink Model Transformation Method in the Design of Embedded Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 583-587, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guojun Zhang |
Selection of QoS Support on Artificial Immune Network Classifier for Dynamic Web Service Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 643-646, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma 0001, Yulong Shen |
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 603-607, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jianhui Yang, Chuanyang Ruan |
Hesitant Fuzzy Information Aggregation Operators under Confidence Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 750-754, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jie Li, Gang Lei, Yong Xian, Xiaoli Wang |
Research on Ground Effect of Shipborne Flying-Wing UAV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 685-688, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liang Dai, Huiyun Li, Guoqing Xu, Liying Xiong |
A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 430-434, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yunlong Wu, Guohua Liu, Yuanyuan Liu |
Multi-user Preferences Based Top-k Query Processing Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 69-73, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Ding, Guizhen Zhu |
A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice Vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 425-429, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wu, Nan Cheng, Yubin Wang |
Application Research on Retrospective Analysis System in Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 624-627, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhongyuan Qin, Kerong Feng, Shuaiqi Hu, Lei Tao, Zunli Hu, Xinshuai Zhang, Jie Huang 0016 |
A Novel Identity-Based Security Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 662-666, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tong Zhang, Shuna Zhao, Xue Li |
Method of Non-reference Image Quality Assessment of SSIM Based on Regional Weighted Entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 519-523, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qian Xu, Chuanguo Li |
An Empirical Study on Determinants of Capital Structure in Chinese Listed Companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 724-728, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jian Zhao, Hai-Ying Gao |
Attribute-Based Encryption for Restricted Circuits from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 450-454, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mingguang Zou, Zhitang Li |
A Wav-Audio Steganography Algorithm Based on Amplitude Modifying. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 489-493, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guodong Sun, Shenghui Su, Maozhi Xu |
Quantum Algorithm for Polynomial Root Finding Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 469-473, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Junfeng Li, Xueqiang Lv, Kehui Liu |
Extracting Hyponymy of Ontology Concepts from Patent Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 283-287, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ben-Bo Zha, Ru-Liang Wang, Huan-Long Sun, Lei Wang |
A Study of the Design and Parameters Optimization of BP Neural Network Using Improved GEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 714-719, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yi Tang, Shenghui Su |
Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 445-449, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chang-Ji Wang, Hai-Tao Lin, Xi-Lei Xu, Kangjia Zheng, Xiaonan Xia |
Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 459-463, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bin Gui, Xianghe Wei, Qiong Shen, Jingshan Qi, Liqiang Guo |
Financial Time Series Forecasting Using Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 39-43, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yukun Jian, Lin Dai |
Statistical Inference of DEA Model of Environmental Efficiency Considering Undesirable Outputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 780-784, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weijun Yang, Yan Yang, Xiaodong Wang 0018, Liang Yang |
An Efficient Approximation Scheme for the Multiple QoS Constraints Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 720-723, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yue Dai, Shenghui Su |
A Diploma Anti-forgery System Based on Lightweight Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 647-651, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bin Ju, Mincao Ye, Yuntao Qian, Rong Ni, Chenxi Zhu |
Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 114-118, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hongning Li, Xianjun Liu, Leilei Xu |
Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm in Cognitive Radio Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 593-597, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dongyi He, Fang Luo |
Study on Effect Evaluation of Enterprise Staff Training Based on Grey Correlation Analysis Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 785-788, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qirun Huo, Yao Lu |
A Novel Tracking Method Based on Ensemble Metric Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 176-179, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuhui Zhang, Lianhai Wang, Xiaohui Han |
A KVM Virtual Machine Memory Forensics Method Based on VMCS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 657-661, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jie Niu, Xiongzhu Bu, Zhong Li, Yao Wang |
An Improved Bilinear Deep Belief Network Algorithm for Image Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 189-192, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rui Chang, Liehui Jiang, Hui Shu, Hongqi He |
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 499-504, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lequan Min, Xu Lan, Longjie Hao, Xiuping Yang |
A 6 Dimensional Chaotic Generalized Synchronization System and Design of Pseudorandom Number Generator with Application in Image Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 356-362, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kai Lin, Rong Ni, Yanhua Shao, Sijing Wu, Xiao-Jiao Ma |
Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 304-307, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhifeng Lin, Jiechang Wen, Qiling Chen |
Wireless Location on CPN Correction Environmental Factors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 129-133, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jing Nie |
Practice and Development of Cloud Computing-Based Mobile Teaching Management and Evaluation System in Vocational Colleges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 765-769, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhihua Jiang, Zhongwei Si, Chi Luo |
Design & Implementation to an RFID Based Conference Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 143-147, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiao-Ma Xu, Ming-Tao Pei |
Multiview Face Retrieval in Surveillance Video by Active Training Sample Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 242-246, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guozhen Shi, Ying Shen, Fenghua Li, Mang Su |
A Reliable Supervision Model and Implementation for the Trading of Digital Works. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 484-488, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qiao Yan, Nan Lu, Tu-Wen Ning, Xi-Yan Yao, Bao-Guang Li |
IP Traceback Algorithm Based on Deterministic Linear Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 397-401, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuying Wang, Zhongyuan Qin, Qunfang Zhang, Hengkang Wang, Jie Huang 0016 |
A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 652-656, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lin Zhu, Ying Wang, Bo Zhao, Xiaozheng Zhang 0003 |
A Fast Image Stitching Algorithm Based on Improved SURF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 171-175, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Deqing Li, Wenyi Zeng, Junhong Li, Ping Guo 0002 |
Balance Function Analysis in Variable Weight Decision Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 30-34, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xianxiang Yang, Heyan Huang, Xin Xin 0001, Quanchao Liu, Xiaochi Wei |
Domain-Specific Product Named Entity Recognition from Chinese Microblog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 218-222, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rui-xia Liu, Yinglong Wang 0001 |
A New Sybil Attack Detection for Wireless Body Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 367-370, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haixia Long, Shulei Wu, Haiyan Fu |
Improving Metabolic Flux Estimation of Metabolic Networks by QPSO with Penalty Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014, pp. 52-57, 2014, IEEE Computer Society, 978-1-4799-7434-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|