Trustworthy computing and services : International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 ; revised selected papers (English)
- New search for: International Standard Conference on Trustworthy Computing and Services
- Further information on International Standard Conference on Trustworthy Computing and Services:
- http://d-nb.info/gnd/1074722132
- New search for: Yueming, Lu
- New search for: Xu, Wu
- New search for: Xi, Zhang
- New search for: Lu, Yueming
- New search for: International Standard Conference on Trustworthy Computing and Services
- Further information on International Standard Conference on Trustworthy Computing and Services:
- http://d-nb.info/gnd/1074722132
2015
-
ISBN:
- Conference Proceedings / Print
-
Title:Trustworthy computing and services : International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 ; revised selected papers
-
Contributors:Yueming, Lu ( editor ) / Xu, Wu ( editor ) / Xi, Zhang ( editor ) / Lu, Yueming ( editor ) / International Standard Conference on Trustworthy Computing and Services
-
Conference:ISCTCS 2014 ; 2014 ; Beijing
International Standard Conference on Trustworthy Computing and Services ; 2014 ; Beijing -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , Heidelberg [u.a.]
-
Publication date:2015
-
Size:XII, 414 S.
-
Remarks:235 mm x 155 mm, 0 g
Ill., graph. Darst.
Literaturangaben
Digital preservation by Badische Landesbibliothek -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Print
-
Language:English
-
Contract number:978-3-662-47400-6
- New search for: 005.8
- Further information on Dewey Decimal Classification
- New search for: 54.38 / 54.32
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Cache Replacement Improving Based on User Group Interest DegreeZhang, Shuai / Lu, Yueming / Zhang, Xi et al. | 2015
- 8
-
A Uighur Automatic Summarization Method Based on Sub-theme DivisionYan, Xiaodong et al. | 2015
- 16
-
Accelerating DFA Construction by Parallelizing Subset ConstructionShao, Yan / Liu, Yanbing / Tan, Jianlong et al. | 2015
- 25
-
A Novel Feature Selection Method Based on Category Distribution and Phrase AttributesZheng, Yi / Han, Weihong / Zhu, Chengzhang et al. | 2015
- 33
-
RayDroid: A Framework for Discovering Anomaly in AndroidYang, Fan / Li, Yue / Zhai, Lidong et al. | 2015
- 41
-
A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering SystemLi, Qian / Wu, Weiguo / Gao, Liang / Wang, Lei / Huang, Jianhang et al. | 2015
- 48
-
Extracting News Information Based on Webpage Segmentation and Parsing DOM Tree ReverselyLi, Jing / Lu, Yueming / Zhang, Xi et al. | 2015
- 56
-
Enhancing Security and Robustness of P2P Caching SystemPeng, Huailiang / Su, Majing / Dai, Qiong / Tan, Jianlong et al. | 2015
- 65
-
Minimizing the Negative Influence by Blocking Links in Social NetworksYao, Qipeng / Zhou, Chuan / Xiang, Linbo / Cao, Yanan / Guo, Li et al. | 2015
- 74
-
Self-Adaptive Frequency Scaling Architecture for Intrusion Detection SystemLu, Qiuwen / Zhou, Zhou / Sha, Hongzhou / Liu, Qingyun / Sun, Hongcheng et al. | 2015
- 83
-
Nonparametric Topic-Aware Sparsification of Influence NetworksFeng, Weiwei / Wang, Peng / Zhou, Chuan / Hu, Yue / Guo, Li et al. | 2015
- 91
-
A Survey of Network Traffic Visualization in Detecting Network Security ThreatsLiu, Xiaomei / Sun, Yong / Fang, Liang / Liu, Junpeng / Yu, Lingjing et al. | 2015
- 99
-
Sentinel: In Case of the Untrustworthy Behaviors Inside the CloudsCui, Dong / Liu, Chuanyi / Yang, Meiqi / Yang, Jincui et al. | 2015
- 107
-
Web-Based Heatmap of Physical Machines in Cloud ComputingChen, Heng / Dong, Xiaoshe et al. | 2015
- 114
-
RSA Encryption/Decryption Implementation Based on ZedboardBai, Xu / Jiang, Lei / Liu, Xinxing / Tan, Jianlong et al. | 2015
- 122
-
Security Risk Assessment of Rich Communication Services Over LTEHe, Xin / Jing, Huiyun et al. | 2015
- 129
-
CAS: Content Attribution System for Network ForensicsChen, Yan / Pu, Yiguo / Chen, Xiaojun / Shi, Jinqiao / Yu, Xiaojie et al. | 2015
- 137
-
Tracking and Analysis of Hot Words and Posts for University CampusDu, Xuefeng / Yan, Xiaodong et al. | 2015
- 144
-
Software Vulnerability Severity Evaluation Based on Economic LossesYang, Yunxue / Jin, Shuyuan / He, Xiaowei et al. | 2015
- 152
-
A Tibetan Word Sense Disambiguation Method Based on HowNet and Chinese-Tibetan Parallel CorporaJiang, Xinmin / Qiu, Lirong / Li, Yeqing et al. | 2015
- 160
-
SFAPCC: A Secure and Flexible Architecture for Public Cloud ComputingLi, Baohui / Xu, Kefu / Zhang, Chuang / Hu, Yue et al. | 2015
- 166
-
Towards Enumeration of NTFS Using USN Journals Under UEFIZhang, Zilu / Shi, Jinqiao / Hu, Lanlan et al. | 2015
- 175
-
Trusted Cloud Service Certification and EvaluationLi, Wei / Cao, Feng et al. | 2015
- 183
-
Enhanced AllJoyn Network with Centralized ManagementLi, Linghan / Li, Yonghua / Lin, Jiaru / Zhang, Tianle et al. | 2015
- 189
-
A Method of Evaluating Distributed Storage System ReliabilityHuang, Hongjie / Yang, Shuqiang et al. | 2015
- 197
-
DDoS Detection Based on Second-Order Features and Machine LearningHe, Xiaowei / Jin, Shuyuan / Yang, Yunxue / Chi, Huiqiang et al. | 2015
- 206
-
Construction of Software and Hardware Resource Pool in Data Center Using VirtualizationYe, Na / Dong, Lili / Bian, Genqing / Li, Jian et al. | 2015
- 213
-
Design and Performance Analysis of Utility Maximization-Based Cooperative MAC in Multi-rate WiFi NetworksTang, Jiqiang / Zou, Xiaoxiang / Wang, Dongbin et al. | 2015
- 221
-
Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune SystemJia, Bin / Lin, Zhaowen / Ma, Yan et al. | 2015
- 229
-
Human Mobility Simulation in Smart Energy GridZhang, Tianle / Liu, Lixin / Song, Shouyou / Yuan, Yuyu et al. | 2015
- 238
-
Community Detection in Complex Networks: Algorithms and AnalysisJie, Yuan / Liu, Zhishuai / Qiu, Xiaoyu et al. | 2015
- 245
-
Advanced Test Modelling and Execution Based on the International Standardized Techniques TTCN-3 and UTPRennoch, Axel / Wendland, Marc-Florian / Hoffmann, Andreas / Schneider, Martin et al. | 2015
- 253
-
Understanding Human Goal Setting as a Means for Supporting Goal Oriented Requirements EngineeringBöegh, Jörgen et al. | 2015
- 260
-
The Improvement and Implementation of iSLIP Algorithm Based on FPGAZeng, Guang / Yao, Lin / Zhao, Ming / Ma, Yilan et al. | 2015
- 267
-
The Optimization Design of High Q Microwave Photonic Filters Based on Cascade Fiber Bragg GratingsGao, Huimin / Zeng, Guang et al. | 2015
- 274
-
The Implementation of GFP Protocol Based on EOS in FPGAMa, Yilan / Yao, Lin / Guang, Zeng / Bardi, Matturdi et al. | 2015
- 281
-
An Improving Algorithm for Combined Input-Crosspoint-Queued SwitchesXu, Ling / Chen, Yueyun / Gong, Zheng et al. | 2015
- 288
-
A New Network Coding Scheme in Two-relay OFDMA NetworksZhao, Hui / Chen, Yueyun / Yuan, Xiaopan et al. | 2015
- 295
-
RAMID: A Novel Risk Assessment Model of Information Dissemination on Social NetworkSha, Hongzhou / Li, Xiaoqian / Liu, Qingyun / Zhou, Zhou / Zhang, Liang / Wang, Lidong et al. | 2015
- 304
-
An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring SystemsDing, Chao / Zeng, Mingxia / Wang, Kui / Pei, Polo / Luan, Zhongzhi / Qian, Depei et al. | 2015
- 311
-
Memory Centric Hardware Prefetching in Multi-core ProcessorsZhu, Danfeng / Wang, Rui / Luan, Zhongzhi / Qian, Depei / Zhang, Han / Cai, Jihong et al. | 2015
- 322
-
Performance-Aware Based Correlated Datasets Replication StrategyYe, Lin / Luan, Zhongzhi / Yang, Hailong et al. | 2015
- 328
-
Monitoring Social Events on Sina WeiboZhang, Xi / Jiang, Guanhong / Su, Yuan et al. | 2015
- 336
-
Information Integration of Heterogeneous Employment Service Information of College GraduatesXie, Yibo / Luan, Zhongzhi et al. | 2015
- 342
-
Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic MeasurementBai, Quan / Xiong, Gang / Zhao, Yong et al. | 2015
- 350
-
Research of eID Mobile Identity Authentication MethodWu, Xu / Fan, Yue / Zhang, Xi / Xu, Jin et al. | 2015
- 359
-
Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User RegistrationMoniz, Krishna / Yuan, Yuyu et al. | 2015
- 370
-
A Method to Build and Expand the Domain Dictionary Automatically Based on WordNetWu, Xu / Zhang, Weiyi / Zhang, Xi / Xu, Jin et al. | 2015
- 382
-
Research on Modeling of Software Automatic TestYang, Jincui / Yuan, Yuyu / Zhang, Tianle et al. | 2015
- 389
-
The Design and Implementation of APK eBooks Online Generation System Based on FBReaderWu, Xu / Shi, Jiada / Xie, Xiaqing et al. | 2015
- 401
-
Domain-Specific Semantic Retrieval of Institutional Repository Based on Query ExtensionWu, Xu / Li, Pengchong / Xu, Jin / Xie, Xiaqing et al. | 2015