International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 : 10 - 12 Oct. 2012, Sanya, China (Englisch)
- Neue Suche nach: Beijing-Jiaotong-Daxue
- Weitere Informationen zu Beijing-Jiaotong-Daxue:
- http://d-nb.info/gnd/16340862-2
- Neue Suche nach: Beijing-Jiaotong-Daxue
- Weitere Informationen zu Beijing-Jiaotong-Daxue:
- http://d-nb.info/gnd/16340862-2
2012
-
ISBN:
- Konferenzband / Elektronische Ressource
-
Titel:International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 : 10 - 12 Oct. 2012, Sanya, China
-
Weitere Titelangaben:Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
-
Beteiligte:
-
Kongress:International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery ; 4 ; 2012 ; Sanya
CyberC ; 4 ; 2012 ; Sanya -
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsort:Piscataway, NJ
-
Erscheinungsdatum:2012
-
Format / Umfang:Online-Ressource
-
Anmerkungen:"Technically co-sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Simulation, and IEEE Task Force on Networked Mobile Systems"--PDF welcome page
IEEE Computer Society Order Number E4810
Includes bibliographical references and index -
ISBN:
-
Medientyp:Konferenzband
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 54.70 / 54.32
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
MPI-Based Twi-extraction of Traffic State Evaluation RulesXia, Yingjie / Fang, Yiwen / Ye, Zhoumin et al. | 2012
- 5
-
An Efficient TCB for a Generic Content Distribution SystemMohanty, S.D. / Velagapalli, A. / Ramkumar, M. et al. | 2012
- 13
-
Exploiting Attribute Redundancy in Extracting Open Source Forge WebsitesLi, Xiang / Zhu, Yanxu / Yin, Gang / Wang, Tao / Wang, Huaimin et al. | 2012
- 21
-
Enabling Dynamic Analysis of Anonymized Social Network DataDing, Xuan / Wang, Wei et al. | 2012
- 27
-
Social Network Analysis in Multiple Social Networks Data for Criminal Group DiscoveryShang, Xufeng / Yuan, Yubo et al. | 2012
- 31
-
Local Oriented Efficient Detection of Overlapping Communities in Large NetworksLiang, Shengdun / Guo, Yuchun et al. | 2012
- 39
-
BTMD: A Framework of Binary Translation Based Malcode DetectorShan, Zheng / Guo, Haoran / Pang, Jianmin et al. | 2012
- 44
-
Scrapy-Based Crawling and User-Behavior Characteristics Analysis on TaobaoWang, Jing / Guo, Yuchun et al. | 2012
- 53
-
A New Evidence Combination Scheme for Decision AssistantWang, Wanqing / Zhao, Yongjun / Huang, Jie et al. | 2012
- 58
-
Metadata Independent Hashing for Media Identification & P2P Transfer OptimisationWarren, Jeff / Clear, Michael / McGoldrick, Ciaran et al. | 2012
- 66
-
A High Performance and High Reliability Storage Server for Parallel File SystemMing, Liang / Feng, Dan / Wang, Fang / Sun, Haifeng / Wu, Sen et al. | 2012
- 73
-
Parallel Cloning Simulation of Flood Mitigation Operations in the Upper-Middle Reach of Huaihe RiverZhang, Guoyi / Fang, Minghui / Qian, Mingkai / Xu, Shijin et al. | 2012
- 81
-
Offline Downloading: A Non-Traditional Cloud-Accelerated and Peer-Assisted Content Distribution ServiceNaixiang, Ao / Yingying, Xu / Changjia, Chen / Yuchun, Guo et al. | 2012
- 89
-
File Exchange in a Private Cloud Supported by a Trust ModelCanedo, Edna Dias / Junior, Rafael Timoteo de_Sousa / Albuquerque, Robson de_Oliveira / de Mendonca, Fabio Lucio Lopes et al. | 2012
- 97
-
Holistic View Angles of Cloud Computing Services ProvisionsOriaku, Chigozirim / Lami, Ihsam Alshahib et al. | 2012
- 106
-
Deadline Based Performance Evaluation of Job Scheduling AlgorithmsAbba, Haruna Ahmed / Shah, Syed Nasir Mehmood / Zakaria, Nordin B. / Pal, Anindya J. et al. | 2012
- 111
-
A Case Study on Digital Forensics in the CloudMarturana, Fabio / Me, Gianluigi / Tacconi, Simone et al. | 2012
- 117
-
Service Layer and Axioms for User Access to the Cloud by Means of OntologiesRobinson-Oses, Lilliam N. / Vargas-Lombardo, Miguel et al. | 2012
- 121
-
A Case Study of Text-Based CAPTCHA AttacksLing-Zi, Xiao / Yi-Chun, Zhang et al. | 2012
- 125
-
A Proposed Steganography Method to Uyghur ScriptTalip, Munire / Jamal, Anwar / Wenqiang, Guo et al. | 2012
- 129
-
Arithmetic Operations on Elliptic Curves Defined over Un-conventional Element Finite FieldsDaikpor, Michael Naseimo / Adegbenro, Oluwole et al. | 2012
- 137
-
Provably Secure Identity-Based Aggregate Signature SchemeKar, Jayaprakash et al. | 2012
- 143
-
Security Analysis of the Micro Transport Protocol with a Misbehaving ReceiverAdamsky, Florian / Khayam, Syed Ali / Jager, Rudolf / Rajarajan, Muttukrishnan et al. | 2012
- 151
-
Worm Propagation Model for Heterogeneous NetworkZhai, Lidong / Guo, Wei / Jia, Zhaopeng / Guo, Li / Shi, Jinqiao et al. | 2012
- 155
-
An Improved Construction for Reusable Anonymous Return Channels Based on Universal Re-encryptionHuang, Cheng-Qiang / Li, Long-Hai / Fu, Shao-Feng et al. | 2012
- 160
-
Securing Encryption Key Distribution in WLAN via QKDDjellab, Rima / Benmohammed, Mohammed et al. | 2012
- 166
-
Homomorphism Encryption Algorithm for Elementary Operations over Real Number DomainTong, Zhang / Qi, Wu / Wen, Liu / Liang, Chen et al. | 2012
- 170
-
The Digital Aggregated Self: A Literature ReviewWilliams, Lynne Y. / Neal, Diane M. et al. | 2012
- 178
-
Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision MakingChunlei, Wang / Lan, Fang / Yiqi, Dai / Liang, Ming / Qing, Miao / Dongxia, Wang et al. | 2012
- 185
-
Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic MethodsBradai, Amira / Afifi, Hossam et al. | 2012
- 191
-
A Biometrics-Based SSO Authentication Scheme in TelematicsLiu, Di / Zhang, Zhi-Jiang / Zhang, Ni et al. | 2012
- 195
-
A Framework for P2P Botnet Detection Using SVMBarthakur, Pijush / Dahal, Manoj / Ghose, Mrinal Kanti et al. | 2012
- 201
-
Visual Analytic Agent-Based Framework for Intrusion Alert AnalysisShittu, Riyanat / Healing, Alex / Bloomfield, Robin / Muttukrishnan, Rajarajan et al. | 2012
- 208
-
A Dual-Mode Fingerprint Fusion Encryption Method Based on Fuzzy VaultLi, Xiaolei / Sun, Dongmei et al. | 2012
- 216
-
Keystroke Dynamics for Continuous Access Control EnforcementFerreira, Joao / Santos, Henrique et al. | 2012
- 224
-
Non-interactive Exponential Homomorphic Encryption AlgorithmChen, Liang / Tong, Zhang / Liu, Wen / Gao, Chengmin et al. | 2012
- 228
-
Memory Bandwidth Optimization Strategy of Coarse-Grained Reconfigurable ArchitectureCao, Peng / Jiang, Huiyan / Liu, Bo / Shan, Weiwei et al. | 2012
- 232
-
SOA-Based Simulation Framework: A Way to Simulation ComposabilityShi, Yang / Zhang, De-Sen / Xiao, Ming-Yan / Lu, Ming-Hua et al. | 2012
- 237
-
The Converged Service Oriented Architecture in Smart Home ServiceMa, Sining / Chen, Xi / Song, Guicai / Wang, Juan / Sun, Limin / Yan, Jia et al. | 2012
- 241
-
Rule-Based Control of Decentralised Asynchronous SOA for Real-Time ApplicationsCameron, Alexander / Stumptner, Markus / Nandagopal, Nanda / Mayer, Wolfgang / Mansell, Todd et al. | 2012
- 249
-
A Core Broking Model for E-MarketsSun, Pen-Choug / Odetayo, Michael / Iqbal, Rahat / James, Anne et al. | 2012
- 257
-
A Novel Simulation Time and Wall Clock Time Synchronization Algorithm for HLAJiang, Zexin et al. | 2012
- 261
-
Uniform SystemC Co-Simulation Methodology for System-on-Chip DesignsWang, Xuexiang / Shan, Weiwei / Liu, Hao et al. | 2012
- 268
-
An Efficient and Flexible Embedded Memory IP CompilerMing, Chen / Na, Bai et al. | 2012
- 274
-
Collection System for Pressure Information of Buildings Based on the IoT and CAN BusSun, Weiyuan / Chen, Xing / Liu, Fangyi / Zhao, Liang et al. | 2012
- 278
-
Fragment Aware Scheduling for Advance Reservations in Multiprocessor SystemsLi, Bo / Zhou, Enwei / Wu, Hao / Pei, Yijian / Shen, Bin et al. | 2012
- 286
-
Configuration Cache Management for Coarse-Grained Reconfigurable Architecture with Multi-ArrayCao, Peng / Cai, Yong / Liu, Bo / Shan, Weiwei et al. | 2012
- 292
-
A New Approach to Implement Discrete Wavelet Transform on Coarse-Grained Reconfigurable ArchitectureLi, Jie / Ke, Xinxiang / Cao, Peng / Shan, Weiwei et al. | 2012
- 298
-
Sequential Scheduling in Space MissionsXing, Jinjiang / Zhang, Yan / Li, Jian / Feng, Yuncheng et al. | 2012
- 304
-
Porting of OSSIE on Texas Instrument's DAVINCI SoC Based SDR PlatformUsman, Saleh / Mahmood, Asad / Ashraf, Muhammad Rehan et al. | 2012
- 309
-
Optimization of Automatic Conversion of Serial C to Parallel OpenMPDheeraj, D. / Nitish, B. / Ramesh, Shruti et al. | 2012
- 315
-
On the Suitability of Multi-Core Processing for Embedded Automotive SystemsJena, Santosh Kumar / Srinivas, M.B. et al. | 2012
- 323
-
Amazon Kindle Fire from a Digital Forensics PerspectiveIqbal, Babar / Iqbal, Asif / Guimaraes, Mario / Khan, Kashif / Obaidli, Hanan Al et al. | 2012
- 330
-
Improving the Collaborative Filtering Recommender System by Using GPUZhanchun, Gao / Yuying, Liang et al. | 2012
- 334
-
An Implementation of Embedded Real Time System Framework in Service Oriented ArchitectureAghajani, Mahmood / Jawawi, Dayang N.A. et al. | 2012
- 341
-
A Multi-Objective Optimization Framework for Cluster-Based Wireless Sensor NetworksCheng, Chi-Tsun / Leung, Henry et al. | 2012
- 348
-
An Analysis on the Delay-Aware Data Collection Network Structure Using Pareto OptimalityCheng, Chi-Tsun / Tse, Chi K. et al. | 2012
- 353
-
A Workload-Aware Link Scheduling for Heterogeneous Wireless Sensor NetworksZeng, Bo / Dong, Yabo / Liu, Zhidan / Lu, Dongming et al. | 2012
- 360
-
An Incremental BP Neural Network Based Spurious Message Filter for VANETZhang, Jiyu / Huang, Liusheng / Xu, Hongli / Xiao, Mingjun / Guo, Weijie et al. | 2012
- 368
-
An Appointment Based MAC Protocol for Wireless Sensor NetworksLiu, Hao / Jiang, Fulong / Yao, Guoliang et al. | 2012
- 373
-
A Protocol for Intrusion Detection Based on Learning Automata in Forwarding Packets for Distributed Wireless Sensor NetworksFathinavid, Amir Hosein / Aghababa, Amir Bagheri et al. | 2012
- 381
-
An Intelligent Evaluation Model Based on the LEACH Protocol in Wireless Sensor NetworksCao, Ning / Higgs, Russell / OHare, Gregory M.P. et al. | 2012
- 389
-
A Clustering Routing Algorithm Based on Reliability in Wireless Sensor NetworkTing, Dong et al. | 2012
- 393
-
A Self-Monitoring, Adaptive and Resource Efficient Approach for Improving QoS in Wireless Sensor NetworksHamdan, Dima / Aktouf, Oum-El-Kheir / Parissis, Ioannis / Hassan, Bachar El / Hijazi, Abbas / Moslem, Bassam et al. | 2012
- 401
-
Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor NetworksLe, Huu Nghia / Zalyubovskiy, Vyacheslav / Choo, Hyunseung et al. | 2012
- 408
-
Hybrid-Priority Configuration Cache Supervision Method for Coarse Grained Reconfigurable ArchitectureLiu, Bo / Cao, Peng / Yang, Jinjiang et al. | 2012
- 415
-
Lattice Sphere Decoding Technique Assisted Optimum Detection for Block Data Transmission SystemsAlbreem, Mahmoud A.M. / Salleh, M.F.M. et al. | 2012
- 419
-
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness ViewLiu, Lixia / Hu, Gang / Xu, Ming / Peng, Yuxing et al. | 2012
- 423
-
Application of Internet of Things in Power-Line MonitoringChen, Xi / Sun, Limin / Zhu, Hongsong / Zhen, Yan / Chen, Hongbin et al. | 2012
- 427
-
Improved Solution to TCP Incast Problem in Data Center NetworksChen, Kai / Zheng, Hongyun / Zhao, Yongxiang / Guo, Yuchun et al. | 2012
- 435
-
Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware SystemsPandit, A.A. / Kumar, Anup et al. | 2012
- 443
-
A Mobility Management Architecture for IPv4/IPv6 NetworksXiang, Zheng / Kong, Qiuli et al. | 2012
- 447
-
Electromagnetic Wave Effect on Human Health: Challenges for Developing CountriesAnyaka, Boniface O. / Akuru, Udochukwu B. et al. | 2012
- 453
-
Online and Intelligent Route Decision-Making from the Public Health DataSetGeng, Xingyun / Wang, Li / Zhou, Dong / Wu, Huiqun / Cao, Wen / Zhang, Yuanpeng / Chen, Yalan / Lu, Weijia / Jiang, Kui / Dong, Jiancheng et al. | 2012
- 457
-
Testing Health-Care Integrated Systems with Anonymized Test-Data Extracted from Production SystemsRaza, Ali / Clyde, Stephen et al. | 2012
- 465
-
Low-Complexity Anti-Jamming Capability Evaluation Method of Wireless Communication SystemNiu, Yingtao / Yao, Fuqiang / Chen, Jianzhong et al. | 2012
- 469
-
Analysis and Simulation of New Method in LTE-Advanced System to Improve System PerformanceQiang, Gao / Yuan, Yu Zhong et al. | 2012
- 473
-
FFT-Based OFDM in Broadband-PLC and Narrowband-PLCZhang, Tongfei / Liu, Wenjing et al. | 2012
- 479
-
Capacity of Hybrid Spectrum Sharing System and Analysis Model in Cognitive RadioZhu, Xiaorong / Wang, Yong et al. | 2012
- 485
-
4G Evolution and Multiplexing Techniques with Solution to Implementation ChallengesIqbal, M. Kaleem / Iqbal, M. Bilal / Rasheed, Iftikhar / Sandhu, Abdullah et al. | 2012
- 489
-
Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor NetworkPawar, Suyog / Kasliwal, Prabha et al. | 2012
- 493
-
SER Analysis of 8x8 QOSTC with Less Decoding ComplexityHanif, Mohammad Abu / Lee, Moon Ho et al. | 2012
- 497
-
DDoS Attack by File Request Redirection in Kad P2P NetworkLee, Yeonju / Kim, Kwangsoo / Roh, Byeong-Hee et al. | 2012
- 501
-
Improvement of Texture Image Retrieval Algorithm Based on Sparse CodingYang, Yansi / Yang, Yingyun / Zeng, Xuan et al. | 2012
- 507
-
Exploiting the Effect of NAND Flash-Memory SSD on Filesystem DesignNo, Jaechun / Park, Sung-soon et al. | 2012
- 512
-
A measurementSu, Majing / Zhang, Hongli / Fang, Binxing / Yan, Ning et al. | 2012
- 519
-
A Coarse-to-Fine Approach for Motion Pattern DiscoveryCai, Bolun / Luo, Zhifeng / Li, Kerui et al. | 2012
- 523
-
A Fast System Identification Method Based on Minimum Phase Space VolumeXu, Xinzhi / Guo, Jingbo et al. | 2012
- 527
-
A Genetic Algorithm for Task Scheduling Based on User Overall SatisfactionWang, Xiaoguang et al. | 2012
- 531
-
The Domain Decomposition Method in Land Surface ModelShi, Jianhui / Zhou, Wenbo / Liu, Ying et al. | 2012
- 535
-
Sparse Watermark Embedding and Recovery Using Compressed Sensing Framework for Audio SignalsFakhr, Mohamed Waleed et al. | 2012
- 540
-
Performance Evaluation of Beamforming Algorithm with Jacket Matrix Based Eigenvalue DecompositionKhan, Md. Hashem Ali / Lee, Moon Ho et al. | 2012
- 546
-
Author index| 2012
- 550
-
[Publisher's information]| 2012
- C4
-
[Cover art]| 2012
- i
-
[Title page i]| 2012
- iii
-
[Title page iii]| 2012
- iv
-
[Copyright notice]| 2012
- v
-
Table of contents| 2012
- xii
-
Welcome to CyberC 2012| 2012
- xiii
-
Message from the Technical Program Chairs| 2012
- xix
-
Reviewers| 2012
- xv
-
Message from the Steering Committee Chair| 2012
- xvi
-
Program Committee and Technical Program Committee| 2012