8. SNPD 2007:
Qingdao,
China
Wenying Feng, Feng Gao (Eds.):
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China.
IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 2
- Xun Zhou, Shengfei Shi, Jizhou Luo, Wei Zhang:
Lifetime Optimized Methods of Correlated Data Gathering on Sensor Networks.
3-8
- Ruanhua Shi, Hong Zhong, Liusheng Huang:
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
9-13
- Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang:
Coverage-preserving Data Gathering in Wireless Sensor Networks.
14-19
- Jinghua Zhu, Jianzhong Li, Hong Gao:
Tasks Allocation for Real-Time Applications in Heterogeneous Sensor Networks for Energy Minimization.
20-25
- Yongxuan Lai, Xiaobo Fan, Hong Chen, Ting-Ting Xie:
Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks.
26-31
- Shaofei Wu, Siying Wei, Jinlong Zhang:
A service-based Workflow Model for Virtual Enterprise.
32-36
- Ming Chen, Zhenwu Wang:
An Approach for Web Services Composition based on QoS and Discrete Particle Swarm Optimization.
37-41
- Fuzhi Zhang, Yan Wang, Lin Wang:
A Web service discovery algorithm based on dynamic composition.
42-46
- Jianhua Yang:
Fuzzy Integrative Performance Evaluation for Supply Chain System.
47-52
- Gong Chen, Heqin Zhou, Jiefeng Yan:
A Novel Method for Moving Object Detection in Foggy Day.
53-58
- Lei Tang, Zonggui Zhao:
The Wavelet-based Contourlet Transform for Image Fusion.
59-64
- Yong Zhao, Zongde Fang, Kanwei Wang, Hui Pang:
Multilevel Minimum Cross Entropy Threshold Selection Based on Quantum Particle Swarm Optimization.
65-69
- Xinwu Li:
A New Model of Printer Color Management Based on Legendre Neural Network.
70-74
- Xiangbin Shi, Fang Liu, Ling Du, Xiaohong Chen, Yuansheng Xing:
A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGs.
75-80
- Ming Yin, Yun Xie, Fen Guo, Shuting Cai:
Research on Adaptive Error Concealment for Video Transmission over packet-lossy channel.
81-85
- Shi-Jin Li, Hao Li, Zhijian Wang:
A Novel Approach to Commercial Detection in News Video.
86-90
- Shu-Chang Liu, Jing Bi, Zhiqiang Jia, Rui Chen, Jie Chen, Minmin Zhou:
Automatic Audio Classification and Speaker Identification for Video Content Analysis.
91-96
- Yichun Xu, Renbin Xiao:
Identifying Code for Directed Graph.
97-101
- Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:
Examination of Processing Load in Applying DACS Scheme to Practical Network.
102-107
- Dali Zhao, Yunhui Men, Linliang Zhao:
Hop-Distance Algorithm for Self-Localization of Wireless Sensor Networks.
108-112
- Zhenqi Wang, Jin Liu:
Internet Applications Usage Accounting Based on Flow.
113-116
- Qian Feng, Meng Chen:
The Research on the Construct Technology of the Test System Based on the Network.
117-122
- Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou:
A Hybrid and Efficient Scheme of Multicast Source Authentication.
123-125
- Renwang Su:
New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents.
126-131
- Hongwei Li, Shixin Sun:
Identity-Based cryptography for Grid.
132-137
- Xiaolin Wang, Jianqin Zhou, Yubing Zang:
A note on homogeneous bent functions.
138-142
- Ming Li, Baodong Qin, Fanyu Kong, Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves.
143-148
- Jingjun Zhang, Furong Li, Yang Zhang, Liguo Wang:
Non-functional Attributes Modeling in Software Architecture.
149-153
- Jianmin Jiang, Hongping Shu, Li Xu:
An Architecture for Software Systems with time constraints.
154-159
- Xiaoyang Tong, Xiaoru Wang:
Agent-oriented Petri Net based Modeling of Dynamic Behavior for Wide-area Backup Protection.
160-165
- Yixing Xia, Yaowu Chen:
A Component-based Framework for Embedded Digital Instrumentation Software with Design Patterns.
166-170
- Sheng Fang, Yongquan Liang, Shenyuan Li:
What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code.
171-176
- Jun Gao:
Machine-Vision-Based Measurement of BGA Connector Solder Balls.
177-180
- Haiying Zhang, Chaowei Yuan:
A Method for Blind Detection of OFDM Signal Based on Power Spectrum Reprocessing.
181-186
- Guang Yang, Kexiong Chen, Maiyu Zhou, Zhonglin Xu, Yongtian Chen:
Study on Statistics Iterative Thresholding Segmentation Based on Aviation Image.
187-188
- Fuheng Liu, Xuhong Liu, Guijuan Kuang, Yi Xiu:
Improved Image Coding Algorithm Based on Embedded Zerotree.
189-192
- Wenjun Xiao, Weidong Chen, Mingxin He, Wenhong Wei, Behrooz Parhami:
Biswapped Networks and Their Topological Properties.
193-198
- Fuyong Yuan, Jian Liu, Chunxia Yin:
A Scalable Search Algorithm on Unstructured P2P Networks.
199-204
- Zhengyuan Ning, Xianwei Lai, Shanli Hu, Qingqing Zhan:
Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal Logic.
205-210
- Wenhong Wei, Wenjun Xiao:
Matrix Multiplication on the Biswapped-Mesh Network.
211-215
- Zenggang Xiong, Yang Yang, Xuemin Zhang, Dairong Yu, Li Liu:
Integrated Multi-Agent and Semantic P2P Grid Resource Discovery Model.
216-220
- Yongmei Hu, Yanan Fu, Lei Jia, Qiqiang Li:
An algorithm of job shop rolling scheduling based on singular rough sets.
221-225
- Wei Li:
Research on the Knowledge-based Decision Support System for the Safety of Rockets.
226-231
- Yang Xu, Houfeng Wang:
A Hibrid Model for Computational Morphology Application.
232-237
- Shuxia Yang:
Power Consumption Forecast by Combining Neural Networks with Immune Algorithm.
238-241
- Xiao Yang, Jiancheng Wan, Ling Zhang:
Arithmetic Computing Based Chinese Automatic Parsing Method.
242-247
- Aimin Wang, Qiang Song:
Prediction of R in Sinter Process based on Grey Neural Network Algebra.
248-252
- Chengzhi Cao, Xiaofeng Guo, Yang Liu:
Research on Ant Colony Neural Network PID Controller and Application.
253-258
- Bin Wen, Changqing Liu:
Design and Implementation of Wireless Computational Grid based on JavaSpace.
259-261
- Linchun Li, Jianhua Li, Ling Tie, Jun Pan:
ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks.
262-267
- Hongwei Zhao, Shihui Pei, Pingping Liu:
Distributed Key Establishment Scheme in Wireless Sensor Network.
268-273
- Lichao Wang, Qiyong Lu, Xi Chen:
Application and Analysis of Time Domain Cross Correlation for Traffic Flow Speed Measurement.
274-279
- Ming Yin, Yun Xie, Fen Guo, Shuting Cai:
Improvements on MB-layer Rate Control Scheme for H.264 video Using complexity estimation.
280-284
- Lijun Sun, Ying He:
Improving Blind Equalization Algorithm for Wireless Communication Systems.
285-288
- Ke Zhang, Zhong Li, Xiaoou Zhao:
Edge Detection of Images based on Fuzzy Cellular Automata.
289-294
- Mengmeng Zhang, Yuehai Wang, Changnian Zhang, Shumin Zhou:
Motion Vector Data Decoding Using Spatial-Temporal Source Redundancy.
295-298
- Jiguo Yu, Jingjing Song, Wenjun Liu, Li Zhao, Baoxiang Cao:
KZCAN: A Kautz based content-addressable network.
299-304
- Wuming Luo, Pingyang Han:
Study On Non-FIFO Arc in Time-Dependent Networks.
305-310
- Lianxing Jia Wei Zhu, Chenggong Zhai, Yi Du:
Research on an Integrated Network Management System.
311-316
- Yong Zhang, Xianghong Yan, Yang Song, Hongmei Zhu:
The Computer Bracket Pressure Monitor System of Fully Mechanized Coalface in Coal Mine Based On CAN Bus.
317-322
- Tao Yu, Shanzhi Chen, Ming Ai, Xin Li, Yuhong Li, Zhen Qin:
A Framework for Reliability Computation of the IP Network.
323-327
- Lili Wang, Wei Gu:
Numerical Solution of A Type of Nonlinear Parabolic Equations.
328-333
- Shuli Wang, Jianming Zhang:
Positive solutions of m-points conjugate boundary value problems.
334-338
- Jinzhu Zhang, Zhen Jin, Huimin Zhang:
Existence of Nonoscillatory Solution for Second Order Nonlinear Neutral Delay Differential Equation.
339-342
- Hongxia Shen, Zhen Jin:
Two dimensional pattern formation of prey-predator system.
343-346
- Hongyang Ma, Bingquan Chen:
Quantum network based on multiparty quantum secret sharing.
347-351
- Xin Lü, Zhi Ma:
Quantum Information Security Protocols and Quantum Coding Theory.
352-356
- Sinjae Lee, Shaojian Zhu, Yanggon Kim:
P2P Trust Model: The Resource Chain Model.
357-362
- Min Gan, Guoying Yue, Hongfa Wang:
Network Protocols Analyzing by an Environmental Bisimulation Method.
363-367
- Kongfa Hu, Zhenzhi Gong, Qingli Da:
A Rapid Grouping Aggregation Algorithm Based on the Multi-Dimension Hierarchical Encoding.
368-373
- Jun Gao:
Getting Fuzzy Control Query Table by Data Mining.
374-378
- ZhengWei Li, ShiXiong Xia, Niuqiang, Zhanguo Xia:
Coal Thickness Prediction Based on Support Vector Machine Regression.
379-383
- Zhijun Ma, Li Chen, Yizhen Zhang:
BDA information management and decision support based on DW.
384-387
- Zhijun Ma, Quan Shi, Bin Li:
Battle Damage Assessment based on Bayesian Network.
388-391
- Hongwei Zhao, Xiaolin Zhao, Yiming Qi:
Infrared Point Target Detection and Tracking Based on DSP.
392-394
- Jingwen Tian, Meijuan Gao, Jin Li:
Intelligent Window Based on Embedded System.
395-399
- Qiang Huang, Xiaofeng Liang, Yingying Zhu:
Dependable distributed embedded system assessment platform design.
400-405
- Mingshan Liu, Yuan Zhou:
Application of Embedded System in Construction Machinery.
406-411
- Peng Liu, Guojun Dai, Tingting Fu:
A Web Services Based Email Extension for Remote Monitoring of Embedded Systems.
412-416
- Yongquan Liang, Zhongying Zhao, Qingtian Zeng:
Mining User's Interest from Reading Behavior in E-learning System.
417-422
- Jie Yin, Yuexuan Wang, Cheng Wu:
An Approach to Build Accessible Grid Service.
423-428
- Youngkon Lee, Gwyduk Yeom:
A Research for Quality Preservation Methodology for SOA Environment.
429-434
- Yuping Qin, Qing Ai, Xiukun Wang, Xiangna Li:
Study on Classification Algorithm of Multi-subject Text.
435-438
- Rongsheng Xie, Keshuo Wu, Jiangbo Du, Chunguang Li:
Survey of Public Key Digital Watermarking Systems.
439-443
- Zhuo Chen, Xiangshuang Liu, Xiaodong Zhunag:
An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence.
444-449
- Yan Li:
Application of Multi-Agent for Collaborative Product Design Engineering.
450-454
- Shaozhong Song, Libiao Zhang, Shu Hua:
The application of particle swarm optimizaton algorithm in training forward neural network.
455-457
- Jun Wang, Huixue Sun:
Studies on CAD System with Artificial Intelligence.
458-463
- Meijuan Gao, Jingwen Tian, Kai Li:
Research on Detecting Method of Submarine Oil Pipelines Corrosion Degree Based on Chaos Genetic Algorithm Neural Network.
464-469
- Changtong Luo, Bo Yu:
Low Dimensional Simplex Evolution --- A Hybrid Heuristic for Global Optimization.
470-474
- Zhaowen Wei, Junyan Yan, Yunpeng Ou:
An Enhancement Dynamic Contract Net Protocol.
475-480
- Jingsong He, Jian Tang, Qiansheng Fang:
Study on The Property of Training Samples and Learning Space with Genetic Algorithms.
481-486
- Hong Zhang, Zhengxing Cai, Fan Yang, Wei Wei:
Research on Lossless Image Compression Algorithms Using Fermat Number Transform.
487-490
- Chunmei Wang, Suzhen Wang, Chongming Zhang, Junzhong Zou:
Maximum Variance Image Segmentation Based on Improved Genetic Algorithm.
491-494
- Muhammad Kamran, Haroon-Ur-Rashid Khan, Shi Feng:
Distortion Analysis in Scalable Image Compression Scheme based on efficient Codebook selection.
495-500
- Jiajin Lei, Chao Lu:
Fusion of ICA Spatial and Temporal and Localized Features for Face Recognition.
501-506
- Xiaojuan Li, Cunshe Chen, Anbo Liang, Yan Shi:
Local And Global Features Extracting and Fusion For microbial Recognition.
507-511
- Congying Han, Guoping He, Huanqing Cui, Xuping Zhang:
Distributed Parallel Algorithm For Nonlinear Optimization Without Derivatives.
512-515
- Jiuyuan Huo, Liqun Liu, Li Liu, Yi Yang, Lian Li:
Selection of the Order of Autoregressive Models for Host Load Prediction in Grid.
516-521
- Beihong Jin, Sihua Tian, Chen Lin, Xin Ren, Yu Huang:
An Integrated Prefetching and Caching Strategy for Mobile Web Caching System.
522-527
- Mohammad Moallemi, Mohammad Hossien Yaghmaee, Mahmoud Naghibzadeh:
A Fault-Tolerant Mutual Exclusion Resource Reservation Protocol for Clustered Mobile Ad hoc Networks.
528-533
- Liming He:
Time Synchronization with Extended Clock Model for Wireless Sensor Networks.
534-539
- Weifeng Lu, Meng Wu:
Analysis of communication traffic characteristics of two-hop-relay cellular system in the dead spots.
540-545
- Wei Rong, Muqing Wu, Tianhang Yu:
LSMR: a Label Switching Multipath Routing protocol for Ad Hoc Networks.
546-551
- Long Jin, Xvming Shi:
A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog Deviation.
552-557
- Jingwen Tian, Meijuan Gao, Yujuan Xiang:
The Study of Compost Quality Evaluation Modeling Method Based on Fuzzy Neural Network for Sewage Treatment.
558-563
- Wei Zhou, Meiying Yang, Liyan Han:
A Nonparametric Approach to Pricing Convertible Bond via Neural Network.
564-569
- Xuemei Liu, Shusheng Zhong, Xiaoliang Bai:
A Modified SOFM Segmentation Method in Reverse Engineering.
570-573
- Lei Yu, Jia Ma, Fuji Ren, Shingo Kuroiwa:
Automatic Text Summarization Based on Lexical Chains and Structural Features.
574-578
- Yumin Dong, Shufen Xiao:
Hybrid Application On Job-Shop Scheduling by Genetic Algorithm and MAS Spring-Net.
579-584
- Ruo Ando:
Parallel analysis of polymorphic viral code using automated deduction system.
585-592
- Xiaoguang Liu, Gang Wang, Jing Liu:
A Double Level Granularity for Multimedia on Demand System.
593-596
- Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao:
Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids.
597-602
- Lijie Zhang, Hui Liu, Yan Wang:
Numerical Simulation of A Difference Scheme Applied in Image Processing Based on Four-Order PDEs.
603-605
- Qinyong Ma, Shenkang Wang, Dongdong Nie, Jianfeng Qiu:
Recognizing Humans Based on Gait Moment Image.
606-610
- Hong Zhang, Hongjun Su, Xianyu Su:
A Phase Unwrapping Algorithm for 3D Reconstruction.
611-615
- Yanhua Ma, Chuanjun Liu, Haiying Sun:
A Tristate Filter for Image Denoising Processing.
616-621
- Tingting Zheng, Jiaxing Cheng, Junjun Mao, Jie Song:
Multifractal and R/S Analysis of Protein Structure.
622-626
- Cunshe Chen, Xiaojuan Li, Huimei Yuan:
Quality assessment of beef based of computer vision and electronic nose.
627-631
- Jinquan Wang, Xiaoguang Gao, Jianguo Shi, Zhengsheng Li:
Double Unmanned Air Vehicles Path Planning for Scout via Cross-Entropy Method.
632-635
- Ziqiang Wang, Xia Sun, Dexian Zhang:
A PACA-Based Multicast Routing Algorithm.
636-639
- Chunhua Yang, Jiancheng Wan:
A Formal Approach to Specifying Architecture Aspects and Their Weaving logic.
640-645
- Chang-Ki Kim, Danhyung Lee, In-Young Ko, Jongmoon Baik:
A Lightweight value-based Software Architecture Evaluation.
646-649
- Xiangchen Tan, Tie Feng, Jiachen Zhang:
Mapping Software Design Changes to Source Code Changes.
650-655
- Biying Lin, Yanhui Zhang:
The Management and Validation of Business Rules in Telecom Operator Settlement and Apportion System.
656-661
- Bo Liu, Yansheng Lu:
A Scable Peer-to-Peer Overlay for Applications with Time Constraints.
662-667
- Peihe Tang, Hao Liu:
The research of local area storage grid system.
668-672
- Wei Chen, Jingtao Song, Jinan Leng, Hanyang Lu:
A New Double scheduling DBA Algorithm for next generation access network.
673-678
- Ye Liang, Linlin Ci:
Organization technology of Mobile Peer-to-peer Network Based on Mobile Unit.
679-682
- Xiuhua Fu, Wenan Zhou, Junli Xu, Junde Song:
Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop Network.
683-688
- Min Xiao, Gaolin Chen, Debao Xiao:
A Policy-Based Energy Efficient Clustering Scheme for Wireless Sensor Networks.
689-694
- Yi-hong Dong, Chao Sun, Xiaoying Tai:
An Adaptive Counter Propagation Network.
695-700
- Haitao Li, Aisong Shi, Bingsen Zhang:
A Dyeing Color Matching Method Combining RBF Neural Networks with Genetic Algorithms.
701-706
- Xusheng Gan, Hongcai Zhnag, Yongmei Cheng, Chao Shi:
Aerodynamic Parameter Fitting Based on Robust Least Squares Support Vector Machines.
707-711
- Zhisheng Zhang, Yaming Sun:
Assessment on Fault-tolerance Performance Using Neural Network Model Based on Ant Colony Optimization Algorithm for Fault Diagnosis in Distribution Systems of Electric Power Systems.
712-716
- Zheng Gong, Yu Long, Kefei Chen:
Efficient Partially Blind Signature from LFSR.
717-722
- Guowen Li, Jia Yu, Rupeng Li, Daxing Li:
An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
723-726
- Wen Liu, Shoushan Luo, Ping Chen:
A Study of Secure Multi-party Ranking Problem.
727-732
- Zhenghua Xue, Xiaoshe Dong, Siyuan Ma, Weiqing Dong:
A Survey on Failure Prediction of Large-Scale Server Clusters.
733-738
- Min Xiao, Debao Xiao:
Alert Verification Based on Attack Classification in Collaborative Intrusion Detection.
739-744
- Yan Luo, Changrui Yu:
A Hybrid Parallel Algorithm for Complex Decision Problem Optimization.
745-750
- Yanan Shen, Rongcai Zhao, Lei Wang:
Eliminating Redundant Communication of Code Generation for Distributed Memory Machines.
751-756
- X. Y. Zeng:
Equivalence of the Oscillation of Two Coupled Difference Systems.
757-761
- L. Y. Wang, D. C. Zhang, B. Shi, X. Y. Zeng:
On the Higher Order Difference Equation xn+1 = (xn-k+1)/(-1+xnxn-1...xn-k+1).
762-765
- Ying Gao:
Peirodic Growing of Two Populations Intergrowth System.
766-769
- Yanping Guo, Yunhai Wang, Changlong Yu:
Positive solutions of m-point boundary value problems for second order differential equations with an advanced argument.
770-773
- Chieko Matsuyama, Toyoshiro Nakashima, Naohiro Ishii:
Analysis of Source Codes by Beginners in Programming Education.
774-781
- Fei Dai, Tong Li:
Tailoring Software Evolution Process.
782-787
- Jianli Duan, Ning Zhang:
Research on Visualization Techniques for Web Usability Analysis.
788-791
- Chengwu Lu:
Image Denoising Based on MORF and Minimization Total Variation.
792-796
- Fuyong Yuan, Chunxia Yin, Jian Liu:
Improvement of PageRank for Focused Crawler.
797-802
- Hong Zhang, Bo Zhang, Lingdong Kong, Zhengxing Cai:
Generalized Association Rule Mining Algorithms based on Data Cube.
803-808
- Zhizhou Kong, Zixing Cai:
Advances of Research in Fuzzy Integral for Classifiers fusion.
809-814
- Mingwei Leng, Haitao Tang, Xiaoyun Chen:
An Efficient K-means Clustering Algorithm Based on Influence Factors.
815-820
- Yang Xia, Qiang Zhang, Zhao Xu, Zhang Ling:
Research on Distributed E-Commerce System Architecture.
821-825
- Cheng Yu, Huamao Gu:
A Policy-Based Framework for Designing Strategies for Service Negotiation.
826-831
- Fusheng Qiu, Wenjian Liu:
An XML-based Representation for Generic Bill of Materials (GBOM).
832-837
- Xinguo Deng, Ziyu Lin, Weiqing Chen, Ruliang Xiao, Lina Fang, Ling Li:
Modeling Web Service Choreography and Orchestration with Colored Petri Nets.
838-843
- Shijin Li, Yuelong Zhu, Jing Liu, Xiaohua Zhang:
A New Supervised Clustering Algorithm for Data Set with Mixed Attributes.
844-849
- Tinghuai Ma, Meili Tang:
Evaluation of High-tech Program Based on Rough Set Theory.
850-854
Copyright © Fri Mar 12 17:21:51 2010
by Michael Ley (ley@uni-trier.de)