The SCEAS System
Navigation Menu

Conferences in DBLP

(imsccs)
2006 (conf/imsccs/2006-2)


  1. Conference Organizations. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:- [Conf]

  2. Preface - Message from General and Program Chairs. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:- [Conf]
  3. Huiqiang Wang, Ruijuan Zheng, Xueyao Li, Daxin Liu
    A Bio-inspired Multidimensional Network Security Model. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:3-7 [Conf]
  4. Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian
    Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:8-12 [Conf]
  5. Feng Cao, Zhenfu Cao, Licheng Wang
    An Improvement of an Identity-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:13-18 [Conf]
  6. Jijuan Wu, Long Liu, Jibao Lai, Jun Yao
    The Real-time Judging System of Figure Skating Based-on WLAN. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:19-24 [Conf]
  7. Da Wei, Yanheng Liu, Xuegang Yu, Xiaodong Li
    Research of Mobile IPv6 Application Based On Diameter Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:25-29 [Conf]
  8. Guo-sheng Zhao, Huiqiang Wang, Jian Wang
    A Novel Quantitative Analysis Method for Network Survivability. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:30-33 [Conf]
  9. Xiuqun Wang, Honglun Hou, Yueting Zhuang
    Secure Byzantine Fault Tolerant LDAP System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:34-39 [Conf]
  10. Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
    Designated Verifier Proxy Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:40-47 [Conf]
  11. Feng Cao, Zhenfu Cao
    A Proxy-Protected Signature Scheme Based on Finite Automaton. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:48-55 [Conf]
  12. Yi Xie, Shun-Zheng Yu
    A Novel Model for Detecting Application Layer DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:56-63 [Conf]
  13. Shuhua Wu, Yuefei Zhu, Qiong Pu
    Resource Efficient Hardware Design for RSA. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:64-68 [Conf]
  14. Xianhai Zhang, Yongtian Yang, Yan Zhu
    A Secure Hierarchical Fragile Watermarking Method with Tamper Localization. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:69-74 [Conf]
  15. Shaobin Cai, Wenbin Yao, Nianmin Yao, Guochang Gu
    MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:75-80 [Conf]
  16. Sheng Guo, Zhenfu Cao, Rongxing Lu
    An Efficient ID-Based Multi-proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:81-88 [Conf]
  17. Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
    Group Oriented Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:89-92 [Conf]
  18. Jie Jiang, Deren Chen, Tim Chen, Xiaodong Shen
    A Security Grid Portal Using PKI and Online Proxy Certificate Repository. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:93-96 [Conf]
  19. Jian Wang, Huiqiang Wang, Guo-sheng Zhao
    ERAS - an Emergency Response Algorithm for Survivability of Critical Services. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:97-100 [Conf]
  20. Kaihua Xu, Jiwei Cao, Yuhua Liu, Shaohua Tao
    An Algorithm of Topology Discovery in Large Multi-Subnet Physical Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:101-104 [Conf]
  21. Hao Li, Peishun Liu
    An Identification System Combined with Fingerprint and Cryptography. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:105-108 [Conf]
  22. Shengbao Wang, Zhenfu Cao, Haiyong Bao
    Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:109-112 [Conf]
  23. Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo
    Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:113-116 [Conf]
  24. Feng Cao, Zhenfu Cao
    Cryptanalysis on a Proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:117-120 [Conf]
  25. Ye Guo, Miaoliang Zhu
    An Agent-Oriented Network Worm Defense System based on Optimized Path. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:121-128 [Conf]
  26. Hongfeng Zhu, Tianhua Liu, Chuansheng Zhou, Guiran Chang
    Research and Implementation of Zero-Copy Technology Based on Device Driver in Linux. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:129-134 [Conf]
  27. Miaomiao Zhang, Gongliang Chen, Jianhua Li
    Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:135-141 [Conf]
  28. Guang Lu, Yu Fei, Guangxue Yue, Miaoliang Zhu
    Worm Intrusion Alarm Modeling Based on Network Traffic Character. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:142-147 [Conf]
  29. Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
    Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:148-154 [Conf]
  30. Hui He, Mingzeng Hu, Hongli Zhang
    Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:155-159 [Conf]
  31. Tianhua Liu, Hongfeng Zhu, Chuansheng Zhou, Guiran Chang
    A New Method of TOE Architecture Based on the ML403 Development Board in Linux. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:160-166 [Conf]
  32. L. B. Xu, G. X. Wu, F. Q. You
    A Structured P2P System with Match Path and Probability Balance Tree. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:167-174 [Conf]
  33. Yuan Yuan, Decai Huang, Duanyang Liu
    An Integer Wavelet Based Multiple Logo-watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:175-179 [Conf]
  34. Yong Qin, Chenggui Zhao
    Efficient Split Scheduling Scheme for Traffic Balancing on Multi-Link Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:180-185 [Conf]
  35. Yongxiang Zhao, Changjia Chen
    Adaptive Prefix Query (APQ) For Route Table Finding In Overnet. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:186-191 [Conf]
  36. Junrui Hao, Shaohua Yu
    An Innovation Three Color Marker in DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:192-198 [Conf]
  37. Keqiu Li, Takashi Nanya, Bo Jiang, Wenyu Qu
    State-of-Art Techniques for Object Caching over the Internet. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:199-206 [Conf]
  38. Ruijuan Zheng, Huiqiang Wang
    A Computer Immune System: LAN Immune System Model based on Host (LISMH). [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:207-211 [Conf]
  39. Deyun Chen, Mouzun Li
    Parameters Optimization and Simulation of Transducer Based on Finite Element Method in Electrical Capacitance Tomography System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:212-216 [Conf]
  40. Ling Qin, Yixin Chen, Jianli Luo, Ling Chen, Jing Guo
    Diversity Guaranteed Ant Colony Algorithm Based on Immune Strategy. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:217-223 [Conf]
  41. Ping Kuang, Peisu Xiang, Leiting Chen
    A Novel FCM's Initial Parameters Acquisition Method. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:224-229 [Conf]
  42. Xudong Chen, Qingxin Zhu, Yong Liao, Ping Kuang
    A Dynamic Stochastic Heuristical Algorithm for Flexible Workload Management *. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:230-236 [Conf]
  43. Xi-zhe Zhang, Tian-yang Lv, Shaobin Huang, Zhengxuan Wang
    Distance Ratio Fractal for Complex Mapping z <- za. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:237-243 [Conf]
  44. Fangni Chen, Lei Shen, Shiju Li
    Constructions of Euclidean Geometry LDPC Codes and Performance Analysis in MIMO-OFDM System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:244-248 [Conf]
  45. Jimin Wang, Lingdi Ping, Jiebing Wang, Kang Sun
    A New Computing Model for C-Like Hardware Description Languages. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:249-256 [Conf]
  46. Jianghua Li, Longwen Li
    Research of Transmission and Control of Real-time MPEG-4VideoStreaming for Multi-channel Over Wireless QoS Mechanism. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:257-261 [Conf]
  47. Ying Liu, Dan Liu, Fan Zhang, Qingxin Zhu
    Application of Optimal Search Theory in the Detection of Water Pollution Accident Source. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:262-265 [Conf]
  48. Jianhua Yan, Jun Yu
    Emission Image Reconstruction Based on Incremental Optimization Transfer Algorithm. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:266-269 [Conf]
  49. Guangshun Li, Guang-Sheng Ma, Donghai Li
    Complex Data Flow Matching Algorithm Based on TDG. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:270-273 [Conf]
  50. Junhua Wu, Guang-Sheng Ma, Guangshun Li
    Sharing Methods of Multi-objective Functions Based on TED. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:274-278 [Conf]
  51. Xuemei Huang, Wenqiang Zhang
    Mesh Generation from 3D Scattered Data in ACL Surgical Navigation System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:279-282 [Conf]
  52. Yige Li, Kanglin Xie, Tao Hao
    Combining Couvreur's Algorithm with Bitstate-Hashing for Emptiness Check. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:283-286 [Conf]
  53. Jianpei Zhang, Lili Cheng, Jun Ma
    A New Multiple Classifiers Combination Algorithm. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:287-291 [Conf]
  54. Kin Keung Lai, Lean Yu, Shouyang Wang
    Mean-Variance-Skewness-Kurtosis-based Portfolio Optimization. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:292-297 [Conf]
  55. Donghai Li, Guang-Sheng Ma, Gang Feng
    Optimized Design of Interconnected Bus on Chip for Low Power. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:298-302 [Conf]
  56. Xiaobin Zhu, Jichun Wu, Jianfeng Wu
    Application of SCE-UA to Optimize the Management Model of Groundwater Resources in Deep Aquifers of the Yangtze Delta. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:303-308 [Conf]
  57. Hongwei Liao, Ling Tie, Zhao Du
    A Vertical Handover Decision Algorithm Based on Fuzzy Control Theory. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:309-313 [Conf]
  58. Lanshun Nie, Xiaofei Xu, De-chen Zhan
    Collaborative Planning in Supply Chains by Lagrangian Relaxation. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:314-321 [Conf]
  59. Dianxun Shuai, Qing Shuai, Yuming Dong, Liangjun Huang
    Problem-Solving in Multi-Agent Systems: A Novel Generalized Particle Model. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:322-329 [Conf]
  60. Wenyu Qu, Masaru Kitsuregawa, Keqiu Li, Hong Shen
    An Execution Prototype of Mobile Agent-Based Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:330-338 [Conf]
  61. Changting Shi, Rubo Zhang, Ge Yang
    Fault Diagnosis of AUV Based on Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:339-343 [Conf]
  62. Liying Zheng, Kai Tian
    A Lower Bound for the Chaotic Control Parameter of Wang-Smith's CSA. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:344-346 [Conf]
  63. Rigui Zhou, Liang Zhou, Nan Jiang, Qiulin Ding
    Dynamic Analysis and Application of QANN. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:347-351 [Conf]
  64. Bo Peng, Qingxin Zhu
    An Optimal Non-adaptive Search Plan for 3D Models Retrieval. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:352-355 [Conf]
  65. Feng Gang
    Design of Modular Multiplier Based on Improved Montgomery Algorithm and Systolic Array. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:356-359 [Conf]
  66. Rubo Zhang, Jing Liu
    Underwater Image Segmentation with Maximum Entropy based on Particle Swarm Optimization (PSO). [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:360-636 [Conf]
  67. Yuquin Lee, Wenyun Zhao
    An Ontology-Based Approach for Domain Requirements Elicitation and Analysis. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:364-371 [Conf]
  68. Xi-lan Feng, Zhiquiang Jiang, Jin-fa Shi, Xue-wen Zong
    Windows DNA-based Study on the Integrated Application of Manufacturing Information System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:372-377 [Conf]
  69. Yuquin Lee, Wenyun Zhao
    A Feature Oriented Approach to Managing Domain Requirements Dependencies in Software Product Lines. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:378-386 [Conf]
  70. Xiaoqin Xie, Kaiyun Chen
    Uniform Service Description With Semantics for Search and Composition. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:387-390 [Conf]
  71. Ruzhi Xu, Yunjiao Xue, Peiyao Nie, Yuan Zhang, Desheng Li
    Research on CMMI-based Software Process Metrics. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:391-397 [Conf]
  72. Yiyuan Li, Jianwei Yin, Jinxiang Dong
    A Component Management System for Mass Customization. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:398-404 [Conf]
  73. Xiaoning Feng, Qun Liu, Zhuo Wang
    AUV Modeling and Analysis using a Colored Object-Oriented Petri Net. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:405-409 [Conf]
  74. Liangliang Kong, Zhaolin Yin
    The Extension of the Unit Testing Tool Junit for Special Testings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:410-415 [Conf]
  75. Xiaoli Zhi, Weiqin Tong
    Embedded Software Standardization and Re-engineering in Practice. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:416-419 [Conf]
  76. Fei Wang, Aihua Ren
    A Configuration Management Supporting System Based on CMMI. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:420-423 [Conf]
  77. Ping Wang, Changsong Sun, Lijie Li
    Primary Research on Internetware Reliability Technology. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:424-428 [Conf]
  78. Qinming He, Jianfei Qian, Hua Chen, Fangzhong Qi
    Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:429-432 [Conf]
  79. Xiong Xie, Weishi Zhang, Lei Xu
    A Description Model to Support Knowledge Management. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:433-436 [Conf]
  80. Cao Yan, Du Jiang, Yang Lina, Yang Yanli, Bai Yu, Zhang Dawei, Zhao Rujia
    Development of a Sheet Metal Part Stock Layout System Based on OPENCASCADE Platform. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:437-441 [Conf]
  81. Wenying Guo, Deren Chen
    Semantic Approach for e-learning System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:442-446 [Conf]
  82. Weidong Yang, Ning Gu, Baile Shi
    Reverse Engineering XML. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:447-454 [Conf]
  83. Dan Yu, Weiping Zhang, Xinmeng Chen
    New Generation of E-Learning Technologies. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:455-459 [Conf]
  84. Yan Gao, Bin Zhang, Jun Na, Lei Yang, Yu Dai, Qiang Gong
    Optimal Selection of Web Services with End-to-End Constraints. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:460-467 [Conf]
  85. Kin Fun Li, Louis Yu, Weibin Liao
    A Study of Chinese Web Characteristics and Their Implications on Web Search. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:468-474 [Conf]
  86. Xiaojie Dong, Weiqin Tong, Jin Feng
    Using Categorization to Further Enhance the Utilization of Semantic Web in UDDI. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:475-479 [Conf]
  87. Yukui Fei
    Dynamic Behavior Specification of Web Component Based on Logic Programming. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:480-482 [Conf]
  88. Xianzhong Tian, TongSen Hu
    A SVR-based Fuzzy System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:483-487 [Conf]
  89. Zijing Tan, Wei Wang, Baile Shi
    Extending Tree Automata to Obtain Consistent Query Answer from Inconsistent XML Document. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:488-495 [Conf]
  90. Xin-ying Wang, Sheng-sheng Wang, Zhengxuan Wang, Tian-yang Lv, Xi-zhe Zhang
    A New Position Updating Algorithm for Moving Objects. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:496-503 [Conf]
  91. Jing Guo, Wei Guo, Dongru Zhou
    Indexing of Constrained Moving Objects for Current and Near Future Positions in GIS. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:504-509 [Conf]
  92. Bin Jiang, Da-fung Zhang, Chao Yang, Guangxue Yue, Fei Yu
    A Privacy Policy of P3P Based on Relational Database. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:510-515 [Conf]
  93. Xufeng Zhang, Weiwei Sun, Wei Wang, Yahui Feng, Baile Shi
    Generating Incremental ETL Processes Automatically. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:516-521 [Conf]
  94. Zhili Zhang, Lei Shi, Shen Guo, Deyu Qi, Fugang Li
    Appling Association Rule to Web Prediction. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:522-527 [Conf]
  95. Teng Lv, Ping Yan
    Mapping Relational Schemas to XML DTDs with Constraints. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:528-533 [Conf]
  96. Decai Huang, Lingli Wang
    Analysis on the Drawbacks of the Commonly Used Measures of the Significance of Attributes in Decision-Table & A New Measure. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:534-539 [Conf]
  97. Wenjie Zhang, Jianzhong Li, Wei Zhang
    Spatio-temporal Pattern Query Processing based on Effective Trajectory Splitting Models in Moving Object Database. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:540-547 [Conf]
  98. Kung Chen, Chung-Hsin Chen, Shin-Yuan Chang, Chiehfen Chen, Yu-Chuan Li
    A Rapid Development Environment for Synthesizing Guideline-Based Decision Support Systems. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:548-554 [Conf]
  99. Jing Guo, Wei Guo, Dongru Zhou
    Querying about the Near Future Positions of Moving Objects. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:555-559 [Conf]
  100. Tian-yang Lv, Shaobin Huang, Xi-zhe Zhang, Zhengxuan Wang
    A Robust Hierarchical Clustering Algorithm and its Application in 3D Model Retrieval. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:560-567 [Conf]
  101. Yangu Zhang, Min Yao, Bin Shen
    Research on Methodology of Fuzzy Retrieve Based on Soft Computing. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:568-571 [Conf]
  102. Jianhua Dai, Weidong Chen, Hongying Gu, Yunhe Pan
    Particle Swarm Algorithm for Minimal Attribute Reduction of Decision Data Tables. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:572-575 [Conf]
  103. Tao Wu, Lifan Fei
    The Research and Application of the Web Maps Issuing Technology. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:576-581 [Conf]
  104. Bing Liang, Qun Liu
    A Data Fusion Approach for Power Saving in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:582-586 [Conf]
  105. Xun Chen, Peng Han, Qiusheng He, Shi-liang Tu
    A Viable Localization Scheme for Dynamic Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:587-593 [Conf]
  106. Zupeng Li, Xiaochuan Yin, Peiyang Yao, Jinnan Huang
    Implementation of P2P Computing in Design of MANET Routing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:594-602 [Conf]
  107. Guiran Chang, Chuan Zhu, Matthew Y. Ma, Weiguo Zhu, Jingbo Zhu
    Implementing a SIP-based Device Communication Middleware for OSGi Framework with Extension to Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:603-310 [Conf]
  108. Yanheng Liu, Daxin Tian, Bin Li
    A Wireless Intrusion Detection Method Based on Dynamic Growing Neural Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:611-615 [Conf]
  109. Jae-Young Choi, Jun-Hui Lee, Yeong-Jee Chung
    Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:616-621 [Conf]
  110. Do-Seong Kim, Yeong-Jee Chung
    Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:622-626 [Conf]
  111. Haidong Yuan, Huadong Ma, Hongyu Liao
    Coordination Mechanism in Wireless Sensor and Actor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:627-634 [Conf]
  112. Wenjie Chen, Lifeng Chen, Zhang-long Chen, Shi-liang Tu
    WITS: A Wireless Sensor Network for Intelligent Transportation System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:635-641 [Conf]
  113. Lei Zhang, Shoubao Yang, Weifeng Sun, DaPeng Wang
    Markov-Based Analytical Model for TCP Unfairness over Wireless Mesh Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:642-648 [Conf]
  114. Song Han, Guochang Gu
    The Architecture and Interlayer Adaptation of Ad Hoc & Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:649-653 [Conf]
  115. Qing Gao, Shanping Li, Wei Shi
    Power-Efficient Routing Mechanism in Sensor Networks based on Node-Density. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:654-656 [Conf]
  116. Wanhong Zou, Xiuzi Ye, Wei Peng, Zhiyang Chen
    A Brief Review on Application of Mobile Computing in Construction. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:657-661 [Conf]
  117. Yuhua Liu, Haiyan Zhu, Kaihua Xu, Wei Teng
    An Improved Route Repair Approach of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:662-665 [Conf]
  118. Jianguo Sun, BingQuan Liu, Xuan Wang
    Research of Sentence-Level Intelligent Input Method Based on Symbian OS. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:666-670 [Conf]
  119. Zhongwen Li, Yang Xiang, Hong Chen
    Performance Optimization of Checkpointing Schemes with Task Duplication. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:671-677 [Conf]
  120. Hengshuai Yao, Diao Dongcui, Zengqi Sun
    Historical Temporal Difference Learning: Some Initial Results. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:678-685 [Conf]
  121. Li Pan, Hong Zheng
    Bayesian Image Segmentation and the Data Preprocessing Method using Fuzzy C-mean Clustering. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:686-691 [Conf]
  122. Ziqian Liu, Changjia Chen
    On The Even-Out Effect of Probabilistic Sampling. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:692-698 [Conf]
  123. Yuhua Liu, Wei Teng, Kaihua Xu, Haiyan Zhu
    A Genetic Algorithm with Dual-Structure Code and Adaptive Strategy for Link Enhancement Problem. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:699-705 [Conf]
  124. Baowen Zhang, Jian-Hua Li, Jinyuan You
    A Dynamic Capacity Assignment Approach for EJB Instance Pools. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:706-710 [Conf]
  125. Wei Cao, Kentaro Shimizu
    Identification of GPI-(like)-Anchored Proteins by Using SVM. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:711-715 [Conf]
  126. Dianxun Shuai, Yuzhe Liu, Qing Shuai, Liangjun Huang, Yuming Dong
    Self-Organizing Data Clustering Based on Quantum Entanglement Model. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:716-723 [Conf]
  127. Dianxun Shuai, Qing Shuai, Liangjun Huang, Yuzhe Liu, Yuming Dong
    A Novel Stochastic Generalized Cellular Automata For Self-Organizing Data Clustering. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:724-730 [Conf]
  128. Tong Wang, Da-xin Liu, Wei Sun
    A Novel Mining Approach for Schemas in XML Documents. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:731-734 [Conf]
  129. Jing Yang
    An Improved Cascade SVM Training Algorithm with Crossed Feedbacks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:735-738 [Conf]
  130. Hui Ning, Haifeng Yuan, Shugang Chen
    Temporal Association Rules in Mining Method. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:739-742 [Conf]
  131. Guangli Liu, Yongshun Wu, Lu Yang
    Weighted Ordinal Support Vector Clustering. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:743-745 [Conf]
  132. Jie Liu, Xiufeng Piao, Shaobin Huang
    A Privacy-Preserving Mining Algorithm of Association Rules in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:746-750 [Conf]
  133. Kang Sun, Xuezeng Pan, Jiebing Wang, Jimin Wang
    Design of A Novel Asynchronous Reconfigurable Architecture for Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:751-757 [Conf]
  134. Jigang Wang, Guochang Gu, Shibo Xie, Lifeng Xu
    Design of Smart Phone-Oriented Embedded Real-time Operating System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:758-763 [Conf]
  135. Liang Liang, Bo Zhou, Xuegong Zhou, Chenglian Peng
    System Prototyping Based on SystemC Transaction-Level Modeling. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:764-770 [Conf]
  136. Guoyin Zhang, Luyuan Chen, Aihong Yao
    Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for Linux. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:771-775 [Conf]
  137. Xiaoxiao Liu, Guangsheng Ma, Qiang Sun
    An Advanced Timing Characterization Method Considering Global False Path. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:776-779 [Conf]
  138. Luan Ou, Hong Peng
    Knowledge and Process Based Decision Support in Business Intelligence System. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:780-786 [Conf]
  139. Wenbin Yao, Nianmin Yao, Shaobin Cai, Jun Ni
    Verification Environment for a SCMP Architecture. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:787-791 [Conf]
  140. Guo-dong Lei, Gong-min Liu, Pingjian Ming, Wenping Zhang, Minggang Zhu
    CGNS Data Format Used for A 2D/3D Finite Volume Unstructured Grid Flow Solver. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:792-799 [Conf]
  141. Daming Li, Ruo Li, Pingwen Zhang
    A Cellular Automaton Technique for the Modeling of Solidification Microstructure in Multi-Component Alloys. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:800-806 [Conf]
  142. Yunfeng Bai, Daming Xu, Weisheng Bi, Jingjie Guo, Hengzhi Fu
    Numerical Simulation for the Transport Phenomena in Melting Processes of Blade-Like Castings Using a Continuum Model. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:807-814 [Conf]
  143. Daming Xu, Jun Ni
    A Numerical Approach of Direct-SIMPLE Deduced Pressure Equations to Simulations of Transport Phenomena During Shaped Casting. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:815-821 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002