


default search action
NPC 2008: Shanghai, China - Workshops
- Jian Cao, Minglu Li, Chuliang Weng, Yang Xiang, Xin Wang, Hong Tang, Feng Hong, Hong Liu, Yinglin Wang:

IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3354-4
NSS 2008
- Ming Luo, Yingyou Wen, Hong Zhao:

A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks. 3-10 - Wen Tao Zhu:

Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem. 11-17 - Suriadi Suriadi, Ernest Foo

, Jason Smith:
Conditional Privacy Using Re-encryption. 18-25 - Fu Xiao, Xie Li:

Using Outlier Detection to Reduce False Positives in Intrusion Detection. 26-33 - Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo

:
Identity-Based On-Line/Off-Line Signcryption. 34-41 - Bo Chen, Guosun Zeng, Li Li:

Attribute Delegation Authorization Based on Subjective Trust Evaluation. 42-49 - Daxin Tian, Yang Xiang

:
A Multi-core Supported Intrusion Detection System. 50-55 - Donglin Liu:

Synchronization of Discrete Chaotic Dynamical Systems Using Active Control. 56-59 - Hongbo Zhou:

Secure Prophet Address Allocation for Mobile Ad Hoc Networks. 60-67 - Eun-Jun Yoon, Kee-Young Yoo:

Two Security Problems of RFID Security Method with Ownership Transfer. 68-73 - Rong-Jian Chen, Jui-Lin Lai:

Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions. 74-81 - Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang:

Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. 82-87 - Chenghua Tang, Shunzheng Yu:

A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism. 88-95 - María-Dolores Cano

, Juan A. Romero, Fernando Cerdán
:
Experimental Tests on SCTP over IPSec. 96-102 - Fei Gao, Wen Tao Zhu:

A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks. 103-110 - Dayong Ye

, Quan Bai
, Minjie Zhang
:
Ontology-Based Knowledge Representation for a P2P Multi-agent Distributed Intrusion Detection System. 111-118 - A. John Prakash

, V. Rhymend Uthariaraj:
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication. 119-124 - Krerk Piromsopa

, Sirisara Chiamwongpaet:
Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection. 125-131 - Hong-Rong Yang, Ming Xu, Ning Zheng:

An Improved Method for Ranking of Search Results Based on User Interest. 132-138 - Fen Liu, Lei Hu:

ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience. 139-146 - Saleh I. Almotairi, Andrew J. Clark, George M. Mohay, Jacob Zimmermann:

Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. 147-154 - Sarosh Hashmi, John Brooke:

Towards Time Limited Secure Agent Execution on Malicious Host: A Concept Paper. 155-162 - David Lai

, Zhongwei Zhang:
Self-Authentication of Encrypted Channels in Service Network Graph. 163-167 - Ejaz Ahmed, Andrew J. Clark, George M. Mohay:

A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. 168-175 - Li He, Shunzheng Yu, Min Li:

Anomaly Detection Based on Available Bandwidth Estimation. 176-183 - Lian Lin, Zhongwen Li, Liang Shi:

Spam Mail Filtering Based on Network Processor. 184-189 - Sufatrio, Roland H. C. Yap:

Extending BAN Logic for Reasoning with Modern PKI-Based Protocols. 190-197 - Min Li, Shunzheng Yu, Li He:

Detecting Network-Wide Traffic Anomalies Based on Spatial HMM. 198-203 - Ying Zhao, Yini Wang, Jiumei Huang, Xuelin Shi:

A Stable Clock Synchronization Based on Clock Drift Rate. 204-209 - Md. Rafiqul Islam, Jaipal Singh, Ashley Chonka, Wanlei Zhou

:
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. 210-217 - Yanli Yu, Keqiu Li, Yong Zhang, Lianpeng Xu:

A Service Trust Model with Passive Trust. 218-225 - Xinjie Guan, Xili Wan, Junzhou Luo:

A Maximum Entropy Based Multi-dimensional Trust Model. 226-232
ATNCTA 2008
- Yunpeng Xiao, Yang Tao, Wenji Li, Qian Li:

An Effective P2P Collaborative Mode for Mobile Web Surfing. 235-241 - Yu Wu, Gongxiao Wang, Weisheng Li, Zhijun Li:

Automatic Chatbot Knowledge Acquisition from Online Forum via Rough Set and Ensemble Learning. 242-246 - Guofeng Zhao, Wei Yang, Hong Tang, Yanbing Liu:

An MAODV-Based Energy Saving Multicast Routing Algorithm. 247-250 - Junwei Ge, Yiqiu Fang, Shayne Flint:

Chaos of Software Requirements. 251-257 - Hongjian Li

, Hong Tang, Shixin Sun, Yusheng Dou:
A Parallel Algorithm for Simulating Photochemical Reaction. 258-262 - Yanbing Liu, Jun Huang:

A Novel Genetic Algorithm and Its Application in TSP. 263-266 - Yusheng Dou, Mingze Bai, Hongjian Li

, Hong Tang:
Parallel Computing in Semiclassical Dynamics Simulation of Photochemical Reactions. 267-272 - Aixiang Cui, Duanbing Chen, Yan Fu:

Community Detection Based on Weighted Networks. 273-280 - Ying Wan, Duanbing Chen, Yan Fu:

A New Efficient Algorithm for Detecting Communities in Complex Networks. 281-286 - Hong Tang, Rui She, Chen He, Yusheng Dou:

Construction and Application of Linux Virtual Server Cluster for Scientific Computing. 287-289 - Yue Liu, Daowei Zhang:

An Empirical Study on the Informatization and E-commerce Development Level in Chongqing. 290-295 - Hong Tang, Fei Xue, Peng Huang:

MP-MAODV: A MAODV-Based Multipath Routing Algorithm. 296-301 - Xing-jiang Yu, Yang Tao:

Benefit Optimization Resource Scheduling Algorithm in Three-Dimensional QoS Model in Grid Computing. 302-305 - Xing-jiang Yu, Yang Tao:

Classified Optimization Scheduling Algorithm Driven by Multi-QoS Attributes in Economical Grid. 306-309 - Peng Lin

, WenLong Luo, Yanbing Liu:
A Spatial Renewal Video Traffic Model Based on Buffering Metrics. 310-314 - Qin Lu, Weishi Zhang, Bo Su:

An Exception Handling Framework for Service-Oriented Computing. 315-322 - Zi-fu Fan, Xu-yan Yang, Xiaoyu Wan:

Research on Mapping of MPCC SCF to SIP Protocol in Parlay/OSA API. 323-327 - Yi Zhang, Wenxing Chen:

A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc Networks. 328-330 - Zixiang Zhao, Kun Bai:

Research on T-bridge Algorithm of Web Session Fuzzy Clustering. 331-335 - Yi Zhang, Tianxi Cui, Hong Tang:

A New Secure E-mail Scheme Based on Elliptic Curve Cryptography Combined Public Key. 336-340 - Chuan Xu, Hong Tang, Guofeng Zhao:

Traflow: Design and Complementation of a Real Time Traffic Measurement System in High-Speed Networks. 341-344 - Jinyu Shi, Weishi Zhang, Jianping Jiang, Xiuguo Zhang:

Research on Design and Its Key Technologies of Web Service Platform in P2P Environment. 345-350
HPN 2008
- Bin Dai, Yuan Luo, A. J. Han Vinck:

Wiretap Channel with Side Information from Part of Encoder. 353-357 - Zhi Chen, Wei Chen, Pingyi Fan

, Khaled Ben Letaief
:
Relay Aided Wireless Multicast Utilizing Network Coding: Outage Behaviour and Diversity Gain. 358-364 - Xiaofu Wu, Chunming Zhao, Xiaohu You:

Generation-Based Network Coding over Networks with Delay. 365-368 - Jianwei Xie, Pingyi Fan

:
Capacity and Delay of the Wireless Network with Special Relay Nodes. 369-374 - Min Li, Xueyue Cao, Leiming Xu, Ping Zhang, Chi Yuan, Shuping Peng, Zhengbin Li:

A Distributed Fast Light-path Set-up Protocol for Grid over OBS Networks. 375-382 - Wang Yu, Zhijian Wang, Xiaofeng Zhou:

A Volunteer Computing in High Performance Environment Based on Availability Model. 383-386 - Shuang Yang, Xin Wang:

A Probabilistic Approach to Analyze the Effect of Free-Riders in P2P Streaming Services. 387-391 - Han Liu, Xiaodong Tu, Jun Xie:

Network Coding for P2P Live Media Streaming. 392-398 - Suk Yu Hui, Kai-Hau Yeung

, Kin Yeung Wong:
Optimal Placement of Mesh Points in a Wireless Mesh Network Using Multi-path Routing Protocol. 399-403 - Pingli Gu, Jiuyun Xu, Changbao Li, Youxiang Duan:

Towards Mapping Large Scale Ontologies Based on RFCA with Attribute Reduction. 407-411 - Hong-fei Zhan, Xin-jian Gu, Guo-ning Qi:

Design of a Collaborative Ontology Editing System for Enterprise Process Integration. 412-417 - Susu Nousala, William P. Hall:

Emerging Autopoietic Communities - Scalability of Knowledge Transfer in Complex Systems. 418-425 - Georg von Krogh

, Seonwoo Kim, Zeynep Erden:
Fostering the Knowledge-Sharing Behavior of Customers in Interorganizational Healthcare Communities. 426-433 - Tien-Chin Wang, Echo Huang, Hsing-Hui Yang, Juh-Cheng Yang:

Fitting Grey Relation Model for the Performance of E-government Service: The Case of Kaohsiung City Service On-Line System in Taiwan. 434-439 - Jing Wang, Hongming Cai, Boyi Xu, Lihong Jiang:

CUCS: A Web Page Classification Algorithm for Large Training Set. 440-445 - Yao Lu, Guoyi Zhang:

A DL-Based Approach for Eliminating Concept Restriction Conflicts in Ontology Merging. 446-451 - Hangzai Luo, Jiahang Yang, Aoying Zhou, Jianping Fan, Tianming Hu:

Knowledge Mining and Visualization on News Webpages and Large-Scale News Video Database. 452-459 - Yinglin Wang:

Object Lifecycle Evolution History Modeling and Reuse for Knowledge Management. 460-466 - Ning-rong Tao, Zu-hua Jiang:

Acquiring Compressor Design Case Knowledge Using Rough Set Theory. 467-474 - Yanwei Chen, Demin Li, Chenwen Wang, Jiacun Wang:

MFDSSF: A Mobile Fuzzy Decision Support System for Firefighter Cooperation in Ad Hoc Networks. 475-482 - Bensheng Yun, Junwei Yan, Min Liu:

Behavior-Based Web Services Matchmaking. 483-487 - Qi Gao, Junwei Yan, Min Liu:

A Semantic Approach to Recommendation System Based on User Ontology and Spreading Activation Model. 488-492 - Yi Yu, Junwei Yan, Min Liu:

Semantic Mapping in Product Design and Catalog Integration. 493-498 - Ji-Xi Chen, Qi Xu, Xinjian Gu, Guoning Qi, Hong-Fei Zhan:

Research on the Modeling of Semantic-Based Web Resources Feature. 499-503 - Qiang Lu, Ming Chen, Zhiguang Wang:

A Semantic Annotation Based Software Knowledge Sharing Space. 504-509 - Xijuan Liu:

Research on Product Design Knowledge Reuse through Linkage with Design Iteration Records. 510-515 - Rongwei Ye, Yinglin Wang, Jianmei Guo, Qi Xiong:

A Method to Guarantee Ontology Consistency on Property Range Changes. 516-521
CWUWNet 2008
- Zhongwen Guo, Xiaodong Liu, Yuan Feng:

An Adaptive Transmission Control Mechanism for Underwater Acoustic Sensor Network. 525-530 - Yuan Feng, Lipeng Zhang, Peng Zhou:

EBMD: Energy-Balanced Multi-path Data Propation Algorithm for Sensor Networks. 531-540 - Wenjin Xu, Jianfeng Liu:

A Novel Communication Structure for Wireless Sensor Network. 541-544 - Shumei Wang, Hongyang Ma

:
Quantum Secure Communication Network on EPR States. 545-548 - Hongyang Ma

, Zhongwen Guo:
A Group Quantum Communication Network Using Quantum Secret Sharing. 549-552 - Chongqing Zhang, Ruisheng Jia, Sheng Fang:

Data Gathering Approaches for Underwater Sensor Networks. 553-560 - Yong Liu, Xuhao Liu, Ai-guang Yang:

The Application and Research of Ontology in Knowledge Management Field. 561-564 - Yuting Sun, Weiqin Lv, Lipeng Zhang, Peng Zhou:

EBAT: Energy Balanced Adaptive Transmission Algorithm for Sensor Networks. 565-574
HPSECA 2008
- Xiaokun Liu, Minglu Li, Xinhua Lin, Xiaozheng Cheng:

Implementation and Optimization of MPICH2 Multicast on Optical Fiber Network. 577-582 - Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng:

A Resource Scheduling Strategy for Intrusion Detection on Multi-core Platform. 583-590

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














