Modeling Botnets' Similarity Based on Communication Feature Extraction and IP Assembly (Unknown)
- New search for: Li, R.-H.
- New search for: Li, R.-H.
In:
CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION-
;
33
;
45-54
;
2010
-
ISSN:
- Article (Journal) / Print
-
Title:Modeling Botnets' Similarity Based on Communication Feature Extraction and IP Assembly
-
Contributors:Li, R.-H. ( author )
-
Published in:CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION- ; 33 ; 45-54
-
Publisher:
- New search for: SCIENCE PRESS
-
Publication date:2010-01-01
-
Size:10 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 004
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 004 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 33
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Temporal and Spatial Correlation Based Missing Values Imputation Algorithm in Wireless Sensor NetworksPan, L.-Q. et al. | 2010
- 12
-
Energy-Hole Avoidance for WSN Based on Adjust Transmission PowerZeng, Z.-W. et al. | 2010
- 23
-
Performance Analysis of a Network-Layer Soft Vertical Handoff Scheme Without Packet ReorderingShu, T. et al. | 2010
- 36
-
Delay Optimization Based Overlay Routing StrategyYe, P. et al. | 2010
- 45
-
Modeling Botnets' Similarity Based on Communication Feature Extraction and IP AssemblyLi, R.-H. et al. | 2010
- 55
-
On the Complexity of Optimal Scheduling Multi-Rate Nested Periodic Traffic in an Input-Queued SwitchWu, J. et al. | 2010
- 63
-
Virtual Network with High Performance: VegaNetChen, W.-L. et al. | 2010
- 74
-
A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing PlatformZhang, X. et al. | 2010
- 82
-
The System Architecture and Security Structure of Trusted PDAZhao, B. et al. | 2010
- 93
-
A Distributed Usage Control System Based on Trusted ComputingChu, X.-B. et al. | 2010
- 103
-
Identity-Based Multi-Signcryption Scheme without Random OraclesZhang, B. et al. | 2010
- 111
-
The Three-Party Password-Authenticated Key Exchange Protocol with Stronger SecurityDing, X.-F. et al. | 2010
- 119
-
Methodology for Automatic Inference of Task Hierarchies in Complex SystemsGao, C.-N. et al. | 2010
- 128
-
Research on Privacy-Protection Policy for Pervasive ComputingWei, Z.-Q. et al. | 2010
- 139
-
Research on Trust Framework in Multi-Agent System from the Cognitive ViewWang, J.-F. et al. | 2010
- 152
-
An Identity (ID)-Based and Self-Certified Secret Sharing SchemePei, Q.-Q. et al. | 2010
- 157
-
Research on the Framework of Morphological Associative MemoriesFeng, N.-Q. et al. | 2010
- 167
-
Geometry Knowledge Acquisition and Representation on OntologyZhong, X.-Q. et al. | 2010
- 175
-
An Efficient Genuine-Video Identification Algorithm: TDIAZhou, G.-R. et al. | 2010
- 184
-
Adaptive Lifting Wavelet Transform and Image Compression Via TextureZhang, J. et al. | 2010
- 193
-
Resource Constrained Web ServicesLi, G. et al. | 2010
- 208
-
A Survey of Membrane Computing as a New Branch of Natural ComputingZhang, G.-X. et al. | 2010
- 215
-
Top-K Graph Patterns Mining Based on Some Joint Significance MeasureLiu, Y. et al. | 2010
- 231
-
A Novel Algorithm for Attribute Reduction Based on Consistency CriterionYang, M. et al. | 2010
- 240
-
A Structure Matching Method Based on Partial Functional DependenciesLi, G.-H. et al. | 2010
- 251
-
Learning First-Order Rules for Derived Predicates from Plan ExamplesRao, D.-N. et al. | 2010
- 267
-
Semantic Annotation of Web Data Based on Ensemble Learning and 2D Correlative-Chain Conditional Random FieldsDing, Y.-H. et al. | 2010
- 279
-
Research on Extreme Learning of Neural NetworksDeng, W.-Y. et al. | 2010
- 288
-
A Reachability Determining Algorithm of Petri Net Based on Process VerificationYu, F. et al. | 2010
- 300
-
The Decision-Making Neural Networks Model for Solving the Graph Isomorphism ProblemNan, J.-H. et al. | 2010
- 305
-
Sticker Model for Maximum Clique Problem and Maximum Independent SetFan, Y.-K. et al. | 2010
- 311
-
The Optimization of DNA Encodings Based on Modified PSO/GA AlgorithmCui, G.-Z. et al. | 2010
- 317
-
Research of Collectives Optimization on Modern Multicore ClustersZhang, P.-Y. et al. | 2010
- 326
-
A Kind of Hierarchical Ring Interconnection Networks-on-ChipWang, W. et al. | 2010
- 335
-
An Efficient and Provably Secure IBE Scheme Under The Standard ModelXu, P. et al. | 2010
- 345
-
A Novel Super-Peer Based Trust Model for Peer-to-Peer NetworksTian, C.-Q. et al. | 2010
- 356
-
A Hierarchical Network Distance Prediction MechanismXing, C.-Y. et al. | 2010
- 365
-
Elitist Pool Evolutionary Algorithm for On-Line Evolution of Digital CircuitsHe, G.-L. et al. | 2010
- 373
-
A Survey on Management of Data ProvenanceGao, M. et al. | 2010
- 390
-
Research on Trust Mechanism for Peer-to-Peer NetworkLi, Y.-J. et al. | 2010
- 406
-
A Model Checking Approach for Solving Epistemic RiddlesLuo, X.-Y. et al. | 2010
- 415
-
An Algorithm for Extracting Minimal Unsatisfiable Subformulae in First-Order Logic Based on Refutation ImplicationZhang, J.-M. et al. | 2010
- 427
-
An Abstract Domain of One-Variable Interval Linear InequalitiesChen, L.-Q. et al. | 2010
- 440
-
Software Stability Analysis Based on Change Impact SimulationZhang, L. et al. | 2010
- 452
-
An Approach of Software Reliability Evaluation in the Open EnvironmentLu, W. et al. | 2010
- 463
-
Detecting Memory Leak Via VMMWang, X.-L. et al. | 2010
- 473
-
A Monadic Slicing Algorithm for a Program with PointersZhang, Y.-Z. et al. | 2010
- 483
-
A Breakpoint Debugging Method for LR(k) GrammarsXu, F. et al. | 2010
- 493
-
Exploring Multiple Execution Paths Based on Dynamic Lazy AnalysisChen, K. et al. | 2010
- 504
-
Studies of Network Coordinative Forensics ComputingZhang, Y.-D. et al. | 2010
- 514
-
Grid Security Interoperation and Its ApplicationZou, D.-Q. et al. | 2010
- 526
-
A Multi-QoS Based Local Optimal Model of Service SelectionHu, J.-Q. et al. | 2010
- 535
-
A Generating System to Generate Legitimate and Reasonable SentencesHu, Y. et al. | 2010
- 545
-
A New Manifold Reconstruction Method Based on IsomapMeng, D.-Y. et al. | 2010
- 556
-
A Novel Intelligent Single Particle OptimizerJi, Z. et al. | 2010
- 562
-
Formal Definition of Generalized Virus and Its Identifying AlgorithmHe, H.-J. et al. | 2010
- 569
-
A Novel General Steganalysis Technique Based on Cover Image DescribingMao, J.-F. et al. | 2010
- 580
-
Research on the Implement Mechanism of EPON VoD QoS Multicast Based on UtilityZhang, J.-Y. et al. | 2010
- 589
-
Symbolic Test Generation and Execution of Route ProtocolXing, Y. et al. | 2010
- 596
-
Method for Computing Minimal Siphons in Petri Nets and the Performance AnalysisZhang, J.-Q. et al. | 2010
- 603
-
A Technique of 3D Reconstruction of Blood Vessel's Skeleton Based on SnakesCao, Z.-G. et al. | 2010
- 613
-
P2P-Based Video-on-Demand Systems: A SurveyShen, S.-J. et al. | 2010
- 625
-
A New Methodology to Deal with Dynamical Uncertain Causalities (I): The Static Discrete DAG CaseZhang, Q. et al. | 2010
- 652
-
The d-Subtree Partition ProblemCai, Y.-G. et al. | 2010
- 666
-
Study on Complexity in Hyper Surface ClassificationHe, Q. et al. | 2010
- 672
-
Mining Chaotic Iterative Functions by Co-evolution over Heterogeneous PopulationsZheng, J.-L. et al. | 2010
- 687
-
Problems on Large-Scale Speech Corpus and the Applications in TTSZhang, S. et al. | 2010
- 697
-
Masquerade Detection Based on Shell Commands and Multiple Behavior Pattern MiningTian, X.-G. et al. | 2010
- 706
-
Research on Trusted Network ConnectionZhang, H.-G. et al. | 2010
- 718
-
ABC Supporting QoS Unicast Routing Scheme Based on the Artificial Fish SwarmWang, X.-W. et al. | 2010
- 726
-
Distributed Partner Selection Algorithm for Decode-and-Forward Cooperative DiversityQu, C.-H. et al. | 2010
- 736
-
Combined Static and Dynamic Immutability Analysis of Java ProgramYu, L.-Q. et al. | 2010
- 747
-
An Adaptive Suffix Tree Based Algorithm for Repeats Identification in a DNA SequenceHuo, H.-W. et al. | 2010
- 755
-
Geometric Thermodynamical Selection for Evolutionary Multi-Objective OptimizationYing, W.-Q. et al. | 2010
- 768
-
Reusing Partially Synthesized Textures for Real-Time Synthesis of Large TexturesChen, X. et al. | 2010
- 776
-
Human Interaction Recognition Using Spatio-Temporal WordsHan, L. et al. | 2010
- 785
-
Polynomial-Time Algorithm for Sorting Genomes by Generalized TranslocationsYin, X. et al. | 2010
- 797
-
Fine-Grained Parallel RNA Secondary Structure Prediction Using SCFGs on FPGAXia, F. et al. | 2010
- 813
-
A Dynamic Partitioning Algorithm Based on Approximate Local Search for Optimistic Parallel Discrete Event SimulationZhang, Y.-X. et al. | 2010
- 822
-
Topological Properties of Biswapped Networks(BSNs): Node Symmetry and Maximal Fault ToleranceChen, W.-D. et al. | 2010
- 833
-
A Parallel Scheduling Algorithm for Solving Transport EquationsZhou, D.-Y. et al. | 2010
- 841
-
A Newton Algorithm for Nonlinear RegressionHan, M. et al. | 2010
- 847
-
Research on Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-Agent SystemsSu, J.-S. et al. | 2010
- 855
-
A Novel Constrained Optimization Evolutionary Algorithm Based on Orthogonal Experimental DesignCai, Z.-X. et al. | 2010
- 865
-
Locality Preserving Multi-Projection Vector Fisher Discriminant AnalysisZhang, Z. et al. | 2010
- 877
-
An Extended Non-Interference Security Model (ENISM) and Its CSP-Based Description and Verification MethodCui, J. et al. | 2010
- 890
-
An Algebraic Model of Service Oriented Trustworthy Software ArchitectureZhao, H.-Q. et al. | 2010
- 900
-
A Time Petri Net Model Based on Uniform DistributionPan, L. et al. | 2010
- 908
-
Workflow Performance Analysis Based on Invariant Decomposition AlgorithmPang, S.-C. et al. | 2010
- 919
-
Pencil Sketch Painting with Virtual Point Light Source on Image PlaneTong, Q. et al. | 2010
- 927
-
Developability Optimization Algorithm for 3D Mesh SurfacesXu, P.-F. et al. | 2010
- 935
-
A Novel Local Invariant Feature Detection and Description AlgorithmYang, H. et al. | 2010
- 945
-
H. 264 Video Encryption Algorithm Based on Region of InterestYu, J.-Q. et al. | 2010
- 955
-
Data Field Based Large Scale Ontology MappingZhong, Q. et al. | 2010
- 966
-
High Performance Lossless Compression of Scientific Floating DataHe, K.-J. et al. | 2010
- 977
-
An Efficient Random Access Block Inverted File Self-Index TechnologyLiu, X.-Z. et al. | 2010
- 988
-
P2P Super-Peer Topology Construction Based on Hierarchical Quadrant SpaceFeng, J.-X. et al. | 2010
- 1004
-
Research on Flow Distribution Technology for Multimode Terminals in Heterogeneous NetworksSun, Y. et al. | 2010
- 1014
-
A Novel Page Ranking Algorithm Based on Social AnnotationsLiu, K.-P. et al. | 2010
- 1024
-
An Improved Color Coding Algorithm Based on Hybrid ArchitectureWang, J.-X. et al. | 2010
- 1032
-
Two-Level Partition Scheduling in Hard Real Time System Under Strong Partition ConstraintsLi, X.-Y. et al. | 2010
- 1040
-
General Multi-Party Protocol for Computing Inverses Over a Shared Secret ModulusHu, H.-M. et al. | 2010
- 1050
-
The Bit Security of Two Variants of Paillier Trapdoor FunctionSu, D. et al. | 2010
- 1060
-
Detection of PS and Stego Images Based on Noise Models and Features IntegrationLuo, X.-Y. et al. | 2010
- 1073
-
A Survey on Exact Algorithms for Dominating Set Related Problems in Arbitrary GraphsLu, G. et al. | 2010
- 1088
-
Line Feature Based Man-Made Object Recognition with InvarianceWei, H. et al. | 2010
- 1100
-
Research on On-Line Two-Way Adaptive Pen Gesture Interface FrameworkXu, L.-S. et al. | 2010
- 1110
-
Soft Body Simulation with Multiple Local Fracturing EffectsZeng, L. et al. | 2010
- 1115
-
Survey on Lie Group Machine LearningLi, F.-Z. et al. | 2010
- 1127
-
The Local Search Algorithms for Maximum 3-Satisfiability ProblemZhu, D.-M. et al. | 2010
- 1140
-
Fixed Parameter Enumeration Algorithm for Feedback Vertex Set in Weighted Undirected GraphsWang, J.-X. et al. | 2010
- 1153
-
Research on Access Driven Cache Timing Attacks Against CamelliaZhao, X.-J. et al. | 2010
- 1165
-
Security Analysis on Trust Chain of Trusted Computing PlatformXu, M.-D. et al. | 2010
- 1177
-
Improvement and Efficient Implementation of Differential Attack Algorithm to MDx on GPGPUZhou, L. et al. | 2010
- 1183
-
A Division-of-Labor Based Threshold Authenticated Encryption SchemeTan, Z.-W. et al. | 2010
- 1195
-
PaSeM: Parallel and Conflict-Free Network Traffic Session ManagementZhang, J.-Y. et al. | 2010
- 1213
-
Output-Oriented Queued Switch Architecture with Input Conflict-Free AlgorithmXia, Y. et al. | 2010
- 1226
-
RulerRep: Filtering out Inaccurate Ratings in Reputation Systems Based on Departure DegreeShan, M.-H. et al. | 2010
- 1236
-
An Index Based Efficient k-Dominant Skyline AlgorithmYin, J. et al. | 2010
- 1246
-
Research of Key-Phrase Extraction Based on Lexical ChainLiu, M. et al. | 2010
- 1256
-
Biomedical Named Entity Recognition through a Multi-Agent Meta-Learning FrameworkWang, H.-C. et al. | 2010
- 1263
-
A New Software Reliability Model Considering Warps Between Different Software Failure ProcessesLou, J.-G. et al. | 2010
- 1272
-
A Novel Eye Gaze Tracking Technique Based on Pupil Center Cornea Reflection TechniqueZhang, C. et al. | 2010
- 1286
-
A Unified Particle-Based Method for Newtonian and Viscoelastic Fluids AnimationChang, Y.-Z. et al. | 2010
- 1295
-
Texture Image Segmentation Using Level Set Function Evolved by Gaussian Mixture ModelXiao, C.-X. et al. | 2010
- 1305
-
An Adaptive Compensation Timing Synchronization Algorithm for DOCSIS Up ChannelWang, Q. et al. | 2010
- 1315
-
Privacy Preservation Algorithm for Service-Oriented Information SearchZhu, Q. et al. | 2010
- 1324
-
A Service-Oriented Adaptive Search Method over Encrypted Data in Trusted DatabaseSong, W. et al. | 2010
- 1339
-
Purpose Fusion: The Risk Purpose Based Privacy-Aware Data Access ControlLiu, Y.-M. et al. | 2010
- 1349
-
A Data Model Anomalies Detection Method for Business Process ModelLiu, Z.-Q. et al. | 2010
- 1359
-
A Continuous Nearest Neighbor Query Method for Uncertain Data in Obstructed SpacesLi, C.-W. et al. | 2010
- 1369
-
Uncertain Neighbors' Collaborative Filtering Recommendation AlgorithmHuang, C.-G. et al. | 2010
- 1378
-
Answering Probabilistic Reachability Queries over Uncertain GraphsYuan, Y. et al. | 2010
- 1387
-
RAKING: An Efficient K-Maximal Frequent Pattern Mining Algorithm on Uncertain Graph DatabaseHan, M. et al. | 2010
- 1396
-
Continuous K Nearest Neighbor Queries of Moving Objects in Road NetworksZhao, L. et al. | 2010
- 1405
-
TKEP: An Efficient Top-K Query Processing Algorithm on Massive DataHan, X.-X. et al. | 2010
- 1418
-
A Multi-Label Classification Algorithm Based on Random Walk ModelZheng, W. et al. | 2010
- 1427
-
An Approximate Non-Derivable Itemset Mining Algorithm over Data StreamsHuang, C.-Z. et al. | 2010
- 1437
-
The Effect of Similarity Support in K-Nearest-Neighborhood Based Collaborative FilteringLuo, X. et al. | 2010
- 1446
-
An Index Structure for Efficient Query Processing in Object Deputy DatabseHuang, Z.-Q. et al. | 2010
- 1460
-
FClock: An Adaptive Buffer Replacement Algorithm for SSDTang, X. et al. | 2010
- 1472
-
A Data Placement Strategy for Data-Intensive Applications in CloudZheng, P. et al. | 2010
- 1481
-
SPQ: A Scalable Pattern Query Method over Data StreamsLi, F.-F. et al. | 2010
- 1492
-
MTPower: A Parallel Database Storage Engine for Batch InsertionChen, H. et al. | 2010
- 1500
-
DBCC-Join: A Novel Cache-Conscious Disk-Based Join AlgorithmHan, X.-X. et al. | 2010
- 1512
-
The Performance Analysis of Main Memory Database Indices on Multi-Core ProcessorsGuo, C. et al. | 2010
- 1523
-
Sector-Based Compression and Compression Strategy Selection Method for Column StoresWang, Z.-X. et al. | 2010
- 1533
-
Research on Construction Methods of Logical Carrying NetworkQi, N. et al. | 2010
- 1541
-
A Novel Structured Overlay Network with Constant Degree and Small-World FeaturesLiang, H.-M. et al. | 2010
- 1548
-
Wireless Sensor Network-Based Topology Structures for the Internet of Things LocalizationGu, J.-J. et al. | 2010
- 1557
-
Construction and Reconfiguration Scheme of the Hierarchical Reconfiguration Network Based on the ComponentsLiu, Q. et al. | 2010
- 1569
-
Dynamic Load Balance Scheme Based on Mobility and Service Cognition in Integrated 3G/WLAN NetworksLiu, Q. et al. | 2010
- 1580
-
A Load Balancing Method in Superlayer of Hierarchical DHT-Based P2P NetworkZhang, Y.-X. et al. | 2010
- 1591
-
Distributed Control Plane: Adaptive Load Balancing for Parallel BGP Route ComputingJiang, X.-Z. et al. | 2010
- 1602
-
Federation-Based Global Network Performance MeasurementWang, J.-L. et al. | 2010
- 1611
-
The Survey of Service Nodes Placement Theories for Content NetworksYin, H. et al. | 2010
- 1621
-
An Approach of Model Checking Time or Space PerformanceNiu, J. et al. | 2010
- 1634
-
An Efficient Low-Delay Routing Algorithm for Opportunistic Networks Based on Exchange of Increments in Packet IndexesRen, Z. et al. | 2010
- 1643
-
Game-Theoretic Approach for Network Access Selection in Heterogeneous Integrated NetworksChen, Q.-B. et al. | 2010
- 1653
-
Performance Evaluation of Real-Time QoS Guarantee Based on Schedulability of PacketsWang, G.-C. et al. | 2010
- 1663
-
A Cooperative Game Model for Traffic Engineering and Overlay Routing Based on Trustworthy and Controllable NetworkWang, P. et al. | 2010
- 1675
-
Security Integration of WAPI Based WLAN and 3GJiang, Q. et al. | 2010
- 1686
-
A Controllable and Trusted Anonymous Communication SchemeWu, Z.-Q. et al. | 2010
- 1703
-
Research of Platform Anonymous Identity Management Based on Trusted ChipYu, A.-M. et al. | 2010
- 1713
-
Defend Against Application-Layer Distributed Denial-of-Service Attacks Based on Session Suspicion Probability ModelXiao, J. et al. | 2010
- 1725
-
A Distributed Trust Model for Peer-to-Peer Networks Based on Multi-Dimension-History VectorTan, Z.-H. et al. | 2010
- 1736
-
A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted FloodingChen, J. et al. | 2010
- 1748
-
Analysis for Network Attack-Defense Based on Stochastic Game ModelWang, Y.-Z. et al. | 2010
- 1763
-
Trust Degree Based Inter-Domain Routing MechanismTan, J. et al. | 2010
- 1777
-
On Synchronization and Evaluation Method of Chipped Many-Core ProcessorXu, W.-Z. et al. | 2010
- 1788
-
Parallel Data Cube Computation on Graphic Processing UnitsZhou, G.-L. et al. | 2010
- 1799
-
Distributed Dynamic Fault-Tolerant Routing in Fat TreeHu, N.-D. et al. | 2010
- 1809
-
An Application-Level Checkpointing Based on Extended Data Flow Analysis for OpenMP ProgramsFu, H.-Y. et al. | 2010
- 1823
-
Ontology Induction Based on Social AnnotationsLiu, K.-P. et al. | 2010
- 1835
-
Generative Model Based Atomic Video Primitives PursuingZhao, Y.-D. et al. | 2010
- 1845
-
Semantic Trajectory Based Video Event DetectionWang, X.-F. et al. | 2010
- 1859
-
Reliable Resource Provision Policy for Cloud ComputingTian, G.-H. et al. | 2010
- 1873
-
Performance Testing and Analysis to Storage Medium of Distributed File SystemXu, C.-C. et al. | 2010
- 1881
-
Performance Management for Multi-Tenant Web ApplicationsLin, H.-L. et al. | 2010
- 1896
-
Test Data Generation Algorithms of Combinatorial Testing and Comparison Based on Cross-Entropy and Particle Swarm Optimization MethodZha, R.-J. et al. | 2010
- 1909
-
Mining and Analyzing Behavioral Characteristic of Developers in Open Source SoftwareYuan, L. et al. | 2010
- 1919
-
Approximate Join Aggregate on Massive DataHan, X.-X. et al. | 2010
- 1934
-
ISU-Tree: A Uncertain High-Dimensional Indexing Algorithm for Probabilistic k Nearest Neighbor QueryZhuang, Y. et al. | 2010
- 1943
-
Visible k Nearest Neighbor Queries over Uncertain DataWang, Y.-Q. et al. | 2010
- 1953
-
The Adaptive Fragmentation for XML Stream DisseminationHuo, H. et al. | 2010
- 1963
-
A Method of Detecting Phishing Web Pages Based on Hungarian Matching AlgorithmZhang, W.-F. et al. | 2010
- 1976
-
An Efficient Regular Expression Matching Algorithm for Network Security InspectionZhang, S.-Z. et al. | 2010
- 1987
-
An Attack Graph-Based Probabilistic Computing Approach of Network SecurityYe, Y. et al. | 2010
- 1997
-
YASS Steganalysis Based on Local RandomnessLei, Y. et al. | 2010
- 2003
-
A Secure Communication Model for Defending Against Insider Packet Dropping AttacksZhang, Z.-K. et al. | 2010
- 2015
-
Content-Aware Image Resizing Based on Hybrid EnergyLei, L.-X. et al. | 2010
- 2022
-
Graphics Hardware Accelerated Continuous Collision Detection Between Deformable ObjectsTang, M. et al. | 2010
- 2033
-
A SaaS-Friendly Service Community Model and Its Application in the Nationwide Service Network for Sharing Science and Technology InformationWang, Z.-H. et al. | 2010
- 2044
-
Research on Data Combination Privacy Preservation Mechanism for SaaSZhang, K. et al. | 2010
- 2055
-
TLA Based Customization and Verification Mechanism of Business Process for SaaSShi, Y.-L. et al. | 2010
- 2068
-
Service Relations and Its Application in Services-Oriented ComputingChen, S.-Z. et al. | 2010
- 2084
-
Framework of Context-Aware Based Service SystemMo, T. et al. | 2010
- 2093
-
A Service Discovery Method Based on Referral Network and Ant-Colony AlgorithmXie, X.-Q. et al. | 2010
- 2104
-
A Profit Optimization Oriented Service Selection Method for Dynamic Service CompositionWang, X.-Z. et al. | 2010
- 2116
-
A Service Selection Model Using Mixed Intelligent OptimizationChen, Y.-P. et al. | 2010
- 2126
-
Research on Context-Awareness Mobile SNS Service Selection MechanismWang, Y.-X. et al. | 2010
- 2136
-
QoS-Skyline Based Dynamic Service SelectionWu, J. et al. | 2010
- 2147
-
An Active and Opportunistic Service Replacement Algorithm Orienting Transactional Composite Service Dynamic AdaptationYin, Y. et al. | 2010
- 2163
-
Requirements Semantics-Driven Aggregated Production for On-Demand ServiceWen, B. et al. | 2010
- 2177
-
A Process Algebra Based Method for Value Analysis on Service Process ModelMa, C. et al. | 2010
- 2190
-
An Approach to Improve the Service Availability on the Basis of Business Service AbstractionWen, Y. et al. | 2010
- 2202
-
A Methodological Study of Evaluating the Dependability of SOA Software SystemZhao, H.-Q. et al. | 2010
- 2211
-
Kernelization Algorithm of Maximum Leaf Spanning TreeGao, W.-Y. et al. | 2010
- 2219
-
Answering Threshold-Based Reachability Queries Over Probabilistic GraphsYuan, Y. et al. | 2010
- 2229
-
GRkNN: Group Reverse k-Nearest-Neighbor Query in Spatial DatabasesSong, X.-Y. et al. | 2010
- 2239
-
Research on Index of Multi-Tenant Based on Key-Values for SaaS ApplicationKong, L.-J. et al. | 2010
- 2248
-
Representation and Reasoning of the Spatial Relations of the Spatial NetworksHao, Z.-X. et al. | 2010
- 2258
-
HV-Recovery: A High Efficient Recovery Technique for Flash-Based DatabaseLu, Z.-P. et al. | 2010
- 2267
-
Using a Joint Link Similarity Evaluation Based Method for Crawling the Resources on WebZhang, N.-Z. et al. | 2010
- 2281
-
Reasoning about Structural Integrity Constraints for XMLZhang, J.-M. et al. | 2010
- 2291
-
An Algorithms for Learning the Structure of Utility Graph Based on Nearest-Biclusters Collaborative FilteringWang, L.-M. et al. | 2010
- 2300
-
An Integrated Metrics Based Routing Protocol for Wireless Mesh NetworksShen, C. et al. | 2010
- 2312
-
Modifying Guest OS to Optimize I/O Virtualization in KVMZhang, B.-B. et al. | 2010
- 2321
-
Toward a Software Architectural Design Approach for Trusted Software Based on MonitoringWen, J. et al. | 2010
- 2335
-
Spectra-Based Fault Localization by Increasing Marginal WeightTan, D.-G. et al. | 2010
- 2343
-
An Analogic Selection Sorting Algorithm for Synthesis of Reversible Logic CircuitsWan, S.-S. et al. | 2010
- 2353
-
SAN-EBON: A Novel P2P Location Network Based on Structured Overlay Network for P2P Workflow SystemGao, L. et al. | 2010
- 2364
-
Scheduling for Security-Critical Real-Time Applications on Heterogeneous ClustersZhu, X.-M. et al. | 2010
- 2378
-
Bayes Causal Network Based Method for Role Identification in Multi-Camera SurveillanceMing, A.-L. et al. | 2010
- 2387
-
A Fourier Shape Descriptor Based on Multi-Level Chord Length FunctionWang, B. et al. | 2010
- 2397
-
Study on a New Algorithm for Gray Image RepresentationZheng, Y.-P. et al. | 2010
- 2407
-
A Line Generation Algorithm on 3D Face-Centered Cubic GridHe, L.-J. et al. | 2010