default search action
EIDWT 2017: Wuhan, China
- Leonard Barolli, Mingwu Zhang, Xu An Wang:
Advances in Internetworking, Data & Web Technologies, The 5th International Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017. Lecture Notes on Data Engineering and Communications Technologies 6, Springer 2018, ISBN 978-3-319-59462-0 - Zhen Cao, Minqing Zhang, Xiaolong Chen, Wenjun Sun, Chun Shan:
An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble. 1-12 - Yiqun Liu:
Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem. 13-21 - Zhengnan Yuan, Zihao Wang, He Xu:
Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural Network. 22-33 - Miralda Cuka, Kosuke Ozera, Ryoichiro Obukata, Donald Elmazi, Tetsuya Oda, Leonard Barolli:
Implementation of a GA-based Simulation System for Placement of IoT Devices: Evaluation for a WSAN Scenario. 34-42 - Hufsa Mohsin:
A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining. 43-53 - Zhenlin Li, Wei Zhang, Yitao Ding, Ping Bai:
A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts. 54-63 - Shinji Sakamoto, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of WMN-PSOHC and WMN-PSO Simulation Systems for Node Placement in Wireless Mesh Networks: A Comparison Study. 64-74 - Yi Liu, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
Effects of Number of Activities the Member Failures on Qualified Voting in P2P Mobile Collaborative Team: A Comparison Study for Two Fuzzy-Based Systems. 75-88 - Tetsuya Oda, Miralda Cuka, Ryoichiro Obukata, Makoto Ikeda, Leonard Barolli:
A User Prediction and Identification System for Tor Networks Using ARIMA Model. 89-97 - Ryoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Keita Matsuo, Leonard Barolli:
Implementation of an Actor Node for an Ambient Intelligence Testbed: Evaluation and Effects of Actor Node on Human Sleeping Condition. 98-106 - Yu Zhou:
Designing the Light Weight Rotation Boolean Permutation on Internet of Things. 107-118 - Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian:
The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering. 119-125 - Qingli Zhao, Jin Li, Lei Yang:
Numerical Simulation for the Nonlinear Elliptic Problem. 126-137 - Fuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu:
Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion. 138-149 - Fuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu:
Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement. 150-159 - Zheheng Rao, Chunyan Zeng, Nan Zhao, Min Liu, Minghu Wu, Zhifeng Wang:
A Deep Network with Composite Residual Structure for Handwritten Character Recognition. 160-166 - Huanyu Li, Yunqiang Li:
An Ensemble Hashing Framework for Fast Image Retrieval. 167-177 - Huanyu Li, Jing Wang, Hua Shen:
A Novel Construction and Design of Network Learning Platform in Cloud Computing Environment. 178-186 - Tarik A. Rashid, Arazo M. Mustafa, Ari M. Saeed:
Automatic Kurdish Text Classification Using KDC 4007 Dataset. 187-198 - Ping Bai, Wei Zhang, Zhenlin Li, Xu An Wang:
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm. 199-211 - Weiwei Shen, Han Wu, He Xu, Peng Li:
A New Middleware Architecture for RFID Data Management. 212-221 - Lu Cheng, Xiaozhong Pan, Yuechuan Wei, Liqun Lv:
Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE. 222-232 - Ye Sun, Jingyi Zhang, Xin Xiang, Kechu Yi:
Design and Implementation of Simulated DME/P Beaconing System Based on FPGA. 233-242 - Xiaobei Li, Jingyi Zhang, Rui Wang, Yazhou Zou:
LDPC Codes Estimation Model of Decoding Parameter and Realization. 243-252 - Yongjun Zhang, Jialin Ma, Zhijian Wang, Bolun Chen:
A Novel Query Extension Method Based on LDA. 253-261 - Wen Quan, Jian Wang, Lei Lei, Maolin Gao:
Target Recognition Method Based on Multi-class SVM and Evidence Theory. 262-272 - Wen Quan, Jian Wang, Zhongmin He, Jiaofeng Zuo:
Selective Ensemble Based on Probability PSO Algorithm. 273-280 - Ling Li, Feng Ye, Qian Huang:
The Research of QoS Monitoring-Based Cloud Service Selection. 281-288 - Feng Ye, Yong Chen, Qian Huang, Ling Li:
Developing Cloud-Based Tools for Water Resources Data Analysis Using R and Shiny. 289-297 - Yan-Jing Hu:
Perception Mining of Network Protocol's Dormant Behavior. 298-307 - Cong Liu, Xiang Li, Minghu Wu:
Video Stabilization Algorithm Based on Kalman Filter and Homography Transformation. 308-313 - Modesta Pousada, Santi Caballé, Jordi Conesa, Antoni Bertrán, Beni Gómez-Zúñiga, Eulàlia Hernández, Manuel Armayones, Joaquim Moré:
Towards a Web-Based Teaching Tool to Measure and Represent the Emotional Climate of Virtual Classrooms. 314-327 - Xiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu:
An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation. 328-339 - Liqun Lv, Xiaoyuan Yang:
A New Broadcast Encryption Scheme for Multi Sets. 340-348 - Liqun Lv, Wenjun Sun, Xiaoyuan Yang, Xu An Wang:
Key Encapsulation Mechanism from Multilinear Maps. 349-357 - Yongqiang Li, Zhong Wang, Qinggang Fan, Yan-Ning Cai, Baisong Chen:
An Multi-hop Broadcast Protocol for VANETs. 358-366 - Zhi-Qiang Gao, Long-Jun Zhang:
DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in Spark. 367-377 - Weiwei Kong, Yang Lei, Jing Ma:
Technique for Image Fusion Based on PCNN and Convolutional Neural Network. 378-389 - Fang Wan, Huazhong Jin, GuangBo Lei, Ou Ruan:
Fast Iterative Reconstruction Based on Condensed Hierarchy Tree. 390-399 - Qiang Wang:
An Optimal Model of Web Cache Based on Improved K-Means Algorithm. 400-411 - Kaiqing Hao, Lei Wang:
Detecting Crowdsourcing Spammers in Community Question Answering Websites. 412-423 - Yitao Yang, Runqiu Hu, Chengyan Qiu, Guozi Sun, Huakang Li:
A Spam Message Detection Model Based on Bayesian Classification. 424-435 - Runqiu Hu, Yitao Yang:
Spam Mail Filtering Method Based on Suffix Tree. 436-447 - Wenhui Wu, Xuan Guo, Zhiting Xiao, Renyi Wen:
MP3 Audio Watermarking Algorithm Based on Unipolar Quantization. 448-456 - Caiquan Xiong, Yuan Li, Ke Lv:
Multi-documents Summarization Based on the TextRank and Its Application in Argumentation System. 457-466 - Ying Tong, Rui Chen, Liangbao Jiao, Yu Yan:
An Unconstrained Face Detection Algorithm Based on Visual Saliency. 467-474 - Huazhong Jin, Fang Wan, Ou Ruan:
Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image. 475-488 - Rui Chen, Ying Tong, Jie Yang, Minghu Wu:
Compressed Video Sensing with Multi-hypothesis Prediction. 489-496 - Qingping Wang, Ou Ruan, Zihao Wang:
Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol. 497-508 - Chao Xu, Yonghui Chen, Hui Yu, Yan Jiang, Guomin Sun:
A Combined Security Scheme for Network Coding. 509-517 - Yaqi Lu, Minghu Wu, Nan Zhao, Min Liu, Cong Liu:
Gaussian Scale Patch Group Sparse Representation for Image Restoration. 518-523 - Yudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang:
An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding. 524-531 - Yiqun Liu, Jianqi Zhang, Zhen Zhang, Haining Luo, Xiaorui Wang:
A Three-Dimensional Digital Watermarking Technique Based on Integral Image Cryptosystem and Discrete Fresnel Diffraction. 532-540 - Ayushi Gupta, Sharmistha Rai, Himali Singal, Monika Chaudhary, Rishabh Kaushal:
Building Real-Time Travel Itineraries Using 'off-the-shelf' Data from the Web. 541-552 - Ghulam Hafeez, Nadeem Javaid, Saman Zahoor, Itrat Fatima, Zahoor Ali Khan, Safeerullah:
Energy Efficient Integration of Renewable Energy Sources in Smart Grid. 553-562 - Fahim Ahmed, Nadeem Javaid, Awais Manzoor, Malik Ali Judge, Fozia Feroze, Zahoor Ali Khan:
Cost and Comfort Based Optimization of Residential Load in Smart Grid. 563-572 - Asif Khan, Nadeem Javaid, Adnan Ahmed, Saqib Kazmi, Hafiz Majid Hussain, Zahoor Ali Khan:
Efficient Utilization of HEM Controller Using Heuristic Optimization Techniques. 573-584 - Ranran Song, Min Liu, Minghu Wu, Juan Wang, Cong Liu:
A Shadow Elimination Algorithm Based on HSV Spatial Feature and Texture Feature. 585-591 - Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li:
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment. 592-602 - Jindan Zhang, Baocang Wang, Xu An Wang:
Improved Online/Offline Attribute Based Encryption and More. 603-610 - Xu An Wang, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang:
On the Security of a Cloud Data Storage Auditing Protocol IPAD. 611-617 - Yongjun Zhang, Jialin Ma, Zijian Wang, Bolun Chen:
LF-LDA: A Topic Model for Multi-label Classification. 618-628 - Qian Huang, Chao Zhang, Feng Ye, Qi Wang, Sisi Chen:
Data Analysis for Infant Formula Nutrients. 629-636 - Chong Wang, Qi Wang, Qian Huang, Feng Ye:
A Classification Method Based on Improved BIA Model for Operation and Maintenance of Information System in Large Electric Power Enterprise. 637-644 - Flora Amato, Nicola Mazzocca, Francesco Moscato, Fatos Xhafa:
A Model Profile for Pattern-Based Definition and Verification of Composite Cloud Services. 645-656 - Yongqiang Li, Zhong Wang, Qinggang Fan, Yan-Ning Cai, Yubin Wu, Yunjie Zhu:
A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks. 657-666 - Wenjun Sun, Liqun Lv, Yang Su, Xu An Wang:
Cyber-Attack Risks Analysis Based on Attack-Defense Trees. 667-678 - Yang Lei:
Multi-focus Image Fusion Method Based on NSST and IICM. 679-689 - Rui-Chao Hu, Bing-He Wang:
Pilot Contamination Elimination in Massive MIMO Systems. 690-701 - Yan-Yu Duan, Qing-Ge Gong, Zhen-Sheng Peng, Yun Wang, Zhi-Qiang Gao:
Improved Leader-Follower Method in Formation Transformation Based on Greedy Algorithm. 702-711 - Wenshuai Yang, Hongxu Zhao, Zhiqiang Gao:
A Kind of Improved Hidden Native Bayesian Classifier. 712-720 - Zhen-Sheng Peng, Qing-Ge Gong, Yan-Yu Duan, Yun Wang, Zhi-Qiang Gao:
Study of a Disaster Relief Troop's Transportation Problem Based on Minimum Cost Maximum Flow. 721-733 - Yun Wang, Zhi-Ming Zhang, Zhen-Shen Peng, Yan-Yu Duan, Zhi-Qiang Gao:
A Cascading Diffusion Prediction Model in Micro-blog Based on Multi-dimensional Features. 734-746 - Mingfei Liu, Yi Qu, Yefeng Zhang:
Multi-target Detection of FMCW Radar Based on Width Filtering. 747-755 - Lingling Zeng, Wei Ren, Min Lei, Yu Yang:
DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX. 756-766 - An-Hui Li, Jing Wang, Ya-Qi Wang:
Research on CSER Rumor Spreading Model in Online Social Network. 767-775
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.