


default search action
EIDWT 2017: Wuhan, China
- Leonard Barolli, Mingwu Zhang, Xu An Wang

:
Advances in Internetworking, Data & Web Technologies, The 5th International Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017. Lecture Notes on Data Engineering and Communications Technologies 6, Springer 2018, ISBN 978-3-319-59462-0 - Zhen Cao, Minqing Zhang, Xiaolong Chen, Wenjun Sun, Chun Shan:

An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble. 1-12 - Yiqun Liu:

Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem. 13-21 - Zhengnan Yuan, Zihao Wang, He Xu:

Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural Network. 22-33 - Miralda Cuka, Kosuke Ozera, Ryoichiro Obukata, Donald Elmazi

, Tetsuya Oda, Leonard Barolli:
Implementation of a GA-based Simulation System for Placement of IoT Devices: Evaluation for a WSAN Scenario. 34-42 - Hufsa Mohsin:

A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining. 43-53 - Zhenlin Li, Wei Zhang, Yitao Ding, Ping Bai:

A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts. 54-63 - Shinji Sakamoto, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:

Performance Evaluation of WMN-PSOHC and WMN-PSO Simulation Systems for Node Placement in Wireless Mesh Networks: A Comparison Study. 64-74 - Yi Liu, Keita Matsuo, Makoto Ikeda, Leonard Barolli:

Effects of Number of Activities the Member Failures on Qualified Voting in P2P Mobile Collaborative Team: A Comparison Study for Two Fuzzy-Based Systems. 75-88 - Tetsuya Oda, Miralda Cuka, Ryoichiro Obukata, Makoto Ikeda, Leonard Barolli:

A User Prediction and Identification System for Tor Networks Using ARIMA Model. 89-97 - Ryoichiro Obukata, Miralda Cuka, Donald Elmazi

, Tetsuya Oda, Keita Matsuo, Leonard Barolli:
Implementation of an Actor Node for an Ambient Intelligence Testbed: Evaluation and Effects of Actor Node on Human Sleeping Condition. 98-106 - Yu Zhou:

Designing the Light Weight Rotation Boolean Permutation on Internet of Things. 107-118 - Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye

, Jingbai Tian:
The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering. 119-125 - Qingli Zhao, Jin Li, Lei Yang:

Numerical Simulation for the Nonlinear Elliptic Problem. 126-137 - Fuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu:

Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion. 138-149 - Fuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu:

Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement. 150-159 - Zheheng Rao, Chunyan Zeng

, Nan Zhao, Min Liu, Minghu Wu, Zhifeng Wang
:
A Deep Network with Composite Residual Structure for Handwritten Character Recognition. 160-166 - Huanyu Li, Yunqiang Li:

An Ensemble Hashing Framework for Fast Image Retrieval. 167-177 - Huanyu Li, Jing Wang, Hua Shen:

A Novel Construction and Design of Network Learning Platform in Cloud Computing Environment. 178-186 - Tarik A. Rashid

, Arazo M. Mustafa
, Ari M. Saeed
:
Automatic Kurdish Text Classification Using KDC 4007 Dataset. 187-198 - Ping Bai, Wei Zhang, Zhenlin Li, Xu An Wang

:
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm. 199-211 - Weiwei Shen, Han Wu, He Xu, Peng Li:

A New Middleware Architecture for RFID Data Management. 212-221 - Lu Cheng, Xiaozhong Pan, Yuechuan Wei, Liqun Lv:

Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE. 222-232 - Ye Sun, Jingyi Zhang, Xin Xiang, Kechu Yi:

Design and Implementation of Simulated DME/P Beaconing System Based on FPGA. 233-242 - Xiaobei Li, Jingyi Zhang, Rui Wang, Yazhou Zou:

LDPC Codes Estimation Model of Decoding Parameter and Realization. 243-252 - Yongjun Zhang, Jialin Ma, Zhijian Wang, Bolun Chen:

A Novel Query Extension Method Based on LDA. 253-261 - Wen Quan, Jian Wang, Lei Lei, Maolin Gao:

Target Recognition Method Based on Multi-class SVM and Evidence Theory. 262-272 - Wen Quan, Jian Wang, Zhongmin He, Jiaofeng Zuo:

Selective Ensemble Based on Probability PSO Algorithm. 273-280 - Ling Li, Feng Ye, Qian Huang:

The Research of QoS Monitoring-Based Cloud Service Selection. 281-288 - Feng Ye, Yong Chen, Qian Huang, Ling Li:

Developing Cloud-Based Tools for Water Resources Data Analysis Using R and Shiny. 289-297 - Yan-Jing Hu:

Perception Mining of Network Protocol's Dormant Behavior. 298-307 - Cong Liu, Xiang Li, Minghu Wu:

Video Stabilization Algorithm Based on Kalman Filter and Homography Transformation. 308-313 - Modesta Pousada, Santi Caballé

, Jordi Conesa, Antoni Bertrán, Beni Gómez-Zúñiga, Eulàlia Hernández
, Manuel Armayones
, Joaquim Moré:
Towards a Web-Based Teaching Tool to Measure and Represent the Emotional Climate of Virtual Classrooms. 314-327 - Xiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu:

An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation. 328-339 - Liqun Lv, Xiaoyuan Yang:

A New Broadcast Encryption Scheme for Multi Sets. 340-348 - Liqun Lv, Wenjun Sun, Xiaoyuan Yang, Xu An Wang:

Key Encapsulation Mechanism from Multilinear Maps. 349-357 - Yongqiang Li, Zhong Wang, Qinggang Fan, Yan-Ning Cai, Baisong Chen:

An Multi-hop Broadcast Protocol for VANETs. 358-366 - Zhi-Qiang Gao, Long-Jun Zhang:

DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in Spark. 367-377 - Weiwei Kong, Yang Lei, Jing Ma:

Technique for Image Fusion Based on PCNN and Convolutional Neural Network. 378-389 - Fang Wan, Huazhong Jin, GuangBo Lei, Ou Ruan:

Fast Iterative Reconstruction Based on Condensed Hierarchy Tree. 390-399 - Qiang Wang:

An Optimal Model of Web Cache Based on Improved K-Means Algorithm. 400-411 - Kaiqing Hao, Lei Wang:

Detecting Crowdsourcing Spammers in Community Question Answering Websites. 412-423 - Yitao Yang, Runqiu Hu

, Chengyan Qiu, Guozi Sun, Huakang Li:
A Spam Message Detection Model Based on Bayesian Classification. 424-435 - Runqiu Hu

, Yitao Yang:
Spam Mail Filtering Method Based on Suffix Tree. 436-447 - Wenhui Wu, Xuan Guo, Zhiting Xiao, Renyi Wen:

MP3 Audio Watermarking Algorithm Based on Unipolar Quantization. 448-456 - Caiquan Xiong, Yuan Li, Ke Lv:

Multi-documents Summarization Based on the TextRank and Its Application in Argumentation System. 457-466 - Ying Tong, Rui Chen, Liangbao Jiao, Yu Yan:

An Unconstrained Face Detection Algorithm Based on Visual Saliency. 467-474 - Huazhong Jin, Fang Wan, Ou Ruan:

Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image. 475-488 - Rui Chen, Ying Tong, Jie Yang, Minghu Wu:

Compressed Video Sensing with Multi-hypothesis Prediction. 489-496 - Qingping Wang, Ou Ruan, Zihao Wang:

Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol. 497-508 - Chao Xu, Yonghui Chen, Hui Yu, Yan Jiang, Guomin Sun:

A Combined Security Scheme for Network Coding. 509-517 - Yaqi Lu, Minghu Wu, Nan Zhao, Min Liu, Cong Liu:

Gaussian Scale Patch Group Sparse Representation for Image Restoration. 518-523 - Yudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang:

An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding. 524-531 - Yiqun Liu, Jianqi Zhang, Zhen Zhang, Haining Luo, Xiaorui Wang:

A Three-Dimensional Digital Watermarking Technique Based on Integral Image Cryptosystem and Discrete Fresnel Diffraction. 532-540 - Ayushi Gupta, Sharmistha Rai, Himali Singal, Monika Chaudhary

, Rishabh Kaushal:
Building Real-Time Travel Itineraries Using 'off-the-shelf' Data from the Web. 541-552 - Ghulam Hafeez

, Nadeem Javaid
, Saman Zahoor, Itrat Fatima, Zahoor Ali Khan, Safeerullah
:
Energy Efficient Integration of Renewable Energy Sources in Smart Grid. 553-562 - Fahim Ahmed, Nadeem Javaid

, Awais Manzoor
, Malik Ali Judge, Fozia Feroze, Zahoor Ali Khan:
Cost and Comfort Based Optimization of Residential Load in Smart Grid. 563-572 - Asif Khan

, Nadeem Javaid
, Adnan Ahmed
, Saqib Kazmi, Hafiz Majid Hussain
, Zahoor Ali Khan:
Efficient Utilization of HEM Controller Using Heuristic Optimization Techniques. 573-584 - Ranran Song, Min Liu, Minghu Wu, Juan Wang, Cong Liu:

A Shadow Elimination Algorithm Based on HSV Spatial Feature and Texture Feature. 585-591 - Alzubair Hassan, Nabeil Eltayieb

, Rashad Elhabob
, Fagen Li:
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment. 592-602 - Jindan Zhang, Baocang Wang, Xu An Wang

:
Improved Online/Offline Attribute Based Encryption and More. 603-610 - Xu An Wang

, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang:
On the Security of a Cloud Data Storage Auditing Protocol IPAD. 611-617 - Yongjun Zhang, Jialin Ma, Zijian Wang, Bolun Chen:

LF-LDA: A Topic Model for Multi-label Classification. 618-628 - Qian Huang, Chao Zhang, Feng Ye, Qi Wang, Sisi Chen:

Data Analysis for Infant Formula Nutrients. 629-636 - Chong Wang, Qi Wang, Qian Huang, Feng Ye:

A Classification Method Based on Improved BIA Model for Operation and Maintenance of Information System in Large Electric Power Enterprise. 637-644 - Flora Amato

, Nicola Mazzocca
, Francesco Moscato, Fatos Xhafa:
A Model Profile for Pattern-Based Definition and Verification of Composite Cloud Services. 645-656 - Yongqiang Li, Zhong Wang, Qinggang Fan, Yan-Ning Cai, Yubin Wu, Yunjie Zhu:

A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks. 657-666 - Wenjun Sun, Liqun Lv, Yang Su, Xu An Wang

:
Cyber-Attack Risks Analysis Based on Attack-Defense Trees. 667-678 - Yang Lei:

Multi-focus Image Fusion Method Based on NSST and IICM. 679-689 - Rui-Chao Hu, Bing-He Wang:

Pilot Contamination Elimination in Massive MIMO Systems. 690-701 - Yan-Yu Duan, Qing-Ge Gong, Zhen-Sheng Peng, Yun Wang, Zhi-Qiang Gao:

Improved Leader-Follower Method in Formation Transformation Based on Greedy Algorithm. 702-711 - Wenshuai Yang, Hongxu Zhao, Zhiqiang Gao:

A Kind of Improved Hidden Native Bayesian Classifier. 712-720 - Zhen-Sheng Peng, Qing-Ge Gong, Yan-Yu Duan, Yun Wang, Zhi-Qiang Gao:

Study of a Disaster Relief Troop's Transportation Problem Based on Minimum Cost Maximum Flow. 721-733 - Yun Wang, Zhi-Ming Zhang, Zhen-Shen Peng, Yan-Yu Duan, Zhi-Qiang Gao:

A Cascading Diffusion Prediction Model in Micro-blog Based on Multi-dimensional Features. 734-746 - Mingfei Liu, Yi Qu, Yefeng Zhang:

Multi-target Detection of FMCW Radar Based on Width Filtering. 747-755 - Lingling Zeng, Wei Ren, Min Lei, Yu Yang:

DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX. 756-766 - An-Hui Li, Jing Wang, Ya-Qi Wang:

Research on CSER Rumor Spreading Model in Online Social Network. 767-775

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














