Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/iptc:"
@inproceedings{DBLP:conf/iptc/CaiLT11, author = {Hongyun Cai and Zhen Li and Junfeng Tian}, title = {A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {139--142}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.42}, doi = {10.1109/IPTC.2011.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/CaiLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Dai11, author = {Kuobin Dai}, title = {Secure Digital Library Technology Research Based on {VPN}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {165--168}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.49}, doi = {10.1109/IPTC.2011.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Dai11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Dai11a, author = {Kuobin Dai}, title = {IPv4 to IPv6 Transition Research Based on the Campus Network}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {199--202}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.58}, doi = {10.1109/IPTC.2011.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Dai11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Dai11b, author = {Kuobin Dai}, title = {Teaching and Research of Cryptography in Information and Computer Science}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {226--230}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.64}, doi = {10.1109/IPTC.2011.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Dai11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Dai11c, author = {Kuobin Dai}, title = {Network Security Mechanisms Research}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {231--234}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.65}, doi = {10.1109/IPTC.2011.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Dai11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/GaoY11, author = {Han{-}ping Gao and Zu{-}qiao Yang}, title = {Integrated Visual Saliency Based Local Feature Selection for Image Retrieval}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {47--50}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.19}, doi = {10.1109/IPTC.2011.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/GaoY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/He11, author = {Juan He}, title = {An Analytic Network Process Model of Trust in {B2C} E-Commerce}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {173--176}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.51}, doi = {10.1109/IPTC.2011.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/He11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/HeH11, author = {Zhonglin He and Zhihua Hu}, title = {A New Method for Impossible Differential Cryptanalysis of 8-Round {AES-128}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {214--217}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.62}, doi = {10.1109/IPTC.2011.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/HeH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/HuH11, author = {Zhihua Hu and Zhonglin He}, title = {A New Method for Impossible Differential Cryptanalysis of 7-Round {AES-192}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {248--251}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.73}, doi = {10.1109/IPTC.2011.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/HuH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/HuL11, author = {Yin Hu and Pei Lin}, title = {Research and Implementation of Packet Classification Based on {NDIS} Intermediate Layer under Windows Platform}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {157--160}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.47}, doi = {10.1109/IPTC.2011.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/HuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/HuZ11, author = {Yin Hu and Chaoyang Zhang}, title = {An Improved Bayesian Algorithm for Filtering Spam E-Mail}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {87--90}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.29}, doi = {10.1109/IPTC.2011.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/HuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/JangraGP11, author = {Ajay Jangra and Nitin Goel and Priyanka}, title = {Efficient Power Saving Adaptive Routing Protocol {(EPSAR)} for MANETs Using {AODV} and {DSDV:} Simulation and Feasibility Analysis}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {24--26}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.13}, doi = {10.1109/IPTC.2011.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/JangraGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Jiang11, author = {Qin Jiang}, title = {Some Remarks on Charactertics Function and Density Function of Uncertain Variable}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {115--118}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.36}, doi = {10.1109/IPTC.2011.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Jiang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LeiL11, author = {Lei Lu and Lei Zhang}, title = {The Chaotic Cipher Based on CNNs and Its Application in Network}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {184--187}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.54}, doi = {10.1109/IPTC.2011.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LeiL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LiD11, author = {Xi Li and Hang Dai}, title = {The Color Components' Exchanging on Different Color Spaces and the Using for Image Segmentation}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {123--126}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.38}, doi = {10.1109/IPTC.2011.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LiD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LiSDD11, author = {Yun Li and Shufang Song and Mahmoud Daneshmand and Weina Duan}, title = {A Cooperative Relay Method and Performance for Wireless Networks}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {31--34}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.15}, doi = {10.1109/IPTC.2011.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LiSDD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LiXZ11, author = {Xueming Li and Minling Xing and Jiapei Zhang}, title = {A Comprehensive Prediction Method of Visit Priority for Focused Crawler}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {27--30}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.14}, doi = {10.1109/IPTC.2011.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LiXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LiZX11, author = {Xueming Li and Jiapei Zhang and Minling Xing}, title = {Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence Features}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {131--134}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.40}, doi = {10.1109/IPTC.2011.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LiZX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Liang11, author = {Kailiang Liang}, title = {A Network Construction Solution in Colleges or Universities}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {188--191}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.55}, doi = {10.1109/IPTC.2011.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Liang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Liang11a, author = {Kailiang Liang}, title = {Research on Thin {AP} Architecture to Deploy Campus {WLAN}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {192--195}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.56}, doi = {10.1109/IPTC.2011.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Liang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LinZS11, author = {Changxing Lin and Jian Zhang and Beibei Shao}, title = {A High Speed Parallel Timing Recovery Algorithm and Its {FPGA} Implementation}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {63--66}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.23}, doi = {10.1109/IPTC.2011.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LinZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LiuW11, author = {Chen Liu and Zhou Wei}, title = {Multi-feature Method: An Integrated Content Based Image Retrieval System}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {43--46}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.18}, doi = {10.1109/IPTC.2011.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LiuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LiuXD11, author = {Xiong Liu and Haiwei Xue and Yiqi Dai}, title = {A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.8}, doi = {10.1109/IPTC.2011.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LiuXD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LiuZL11, author = {Hong{-}fu Liu and Cong Zhang and Rui{-}fan Liang}, title = {Optimization of Masking Expansion Algorithm in Psychoacoustic Models}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {161--164}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.48}, doi = {10.1109/IPTC.2011.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LiuZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LuL11, author = {Yuwu Lu and Xueying Liu}, title = {A New Population Migration Algorithm Based on the Chaos Theory}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {147--150}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.44}, doi = {10.1109/IPTC.2011.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LuLZ11, author = {Da Lu and Guofan Liu and Lingli Zhu}, title = {An Optimization for {CAVLC} Code Table Lookup Algorithm in {H.264} Decoder}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {79--82}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.27}, doi = {10.1109/IPTC.2011.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LuLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LvT11, author = {Haoyong Lv and Hengyao Tang}, title = {Machine Learning Methods and Their Application Research}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {108--110}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.34}, doi = {10.1109/IPTC.2011.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LvT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/LvW11, author = {Haoyong Lv and Zhihong Wu}, title = {A Survey of Computer Graphics and Graphics Image Processing Technology}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {196--198}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.57}, doi = {10.1109/IPTC.2011.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/LvW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Ma11, author = {Sheng Ma}, title = {Some Remarks on Convergence in Credibility Measure and Convergence in Credibility Distribution of Fuzzy Variable}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {100--103}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.32}, doi = {10.1109/IPTC.2011.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Ma11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/MaXP11, author = {YuHong Ma and Kai Xie and Minfang Peng}, title = {A Parallel Gaussian Filtering Algorithm Based on Color Difference}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {51--54}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.20}, doi = {10.1109/IPTC.2011.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/MaXP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/MeiWCMRL11, author = {Songzhu Mei and Jiangjiang Wu and Yong Cheng and Jun Ma and Jiangchun Ren and Xiaoxing Li}, title = {Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {19--23}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.12}, doi = {10.1109/IPTC.2011.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/MeiWCMRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/PanZL11, author = {Xun Pan and Jing{-}yuan Zhang and Cheng{-}jiang Liu}, title = {Numerical Simulation and Analysis of Cavitation Characteristics of Ship Propeller}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {180--183}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.53}, doi = {10.1109/IPTC.2011.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/PanZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/PengDZ11, author = {Yong Peng and Chongjie Dong and Huijun Zheng}, title = {Research on Genetic Algorithm Based on Pyramid Model}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {83--86}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.28}, doi = {10.1109/IPTC.2011.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/PengDZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/QinWC11, author = {Yu Qin and QiuXin Wu and XiaoBo Chu}, title = {Design and Analysis on Direct Anonymous Attestation for Security Chip}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {13--18}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.11}, doi = {10.1109/IPTC.2011.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/QinWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ShaoX11, author = {Gui{-}ming Shao and Chaofan Xiong}, title = {Exploration and Example for Mathematical Application Issues in {U.S.} Mathematics Textbooks}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {218--221}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.63}, doi = {10.1109/IPTC.2011.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ShaoX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/SunLG11, author = {Xiang'e Sun and Yun Ling and Jun Gao}, title = {A Deconvolution Approach of 2D Data Statistical}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {71--74}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.25}, doi = {10.1109/IPTC.2011.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/SunLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/SunLG11a, author = {Xiang'e Sun and Yun Ling and Jun Gao}, title = {The Research on Anisotropic Parameter Estimation for Vertical Transerse Isotropy: Based on 3D VSP, Walkaway {VSP} and Full Azimuth Seismic Data}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {135--138}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.41}, doi = {10.1109/IPTC.2011.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/SunLG11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/SunSWZ11, author = {Yi Sun and Hongxiang Sun and Qiaoyan Wen and Hua Zhang}, title = {A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {5--8}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.9}, doi = {10.1109/IPTC.2011.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/SunSWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Tu11, author = {Chunxia Tu}, title = {Study on QoS Protection Mechanism of VoIP Systems}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {151--153}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.45}, doi = {10.1109/IPTC.2011.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Tu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Wang11, author = {Jinfeng Wang}, title = {Applied Study on Information Technology and College English Teaching Integration}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {235--237}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.66}, doi = {10.1109/IPTC.2011.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/WangSLL11, author = {Xinzhi Wang and Lechang Sun and Jingju Liu and Qiang Li}, title = {{VISHNU:} {A} Software Behavior Trustworthiness Control Method Based on {DRTM}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {169--172}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.50}, doi = {10.1109/IPTC.2011.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/WangSLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/WangW11, author = {Wenjia Wang and Dingwei Wang}, title = {A Comprehensive Trust Model with Multi-participant Viewpoints in Online Auctions}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {91--95}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.30}, doi = {10.1109/IPTC.2011.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/WangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/WuW11, author = {Chao Wu and Yiquan Wu}, title = {Multitemporal Images Change Detection Using Nonsubsampled Contourlet Transform and Kernel Fuzzy C-Means Clustering}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {96--99}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.31}, doi = {10.1109/IPTC.2011.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/WuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/WuX11, author = {Zhihong Wu and Xiaohong Xiao}, title = {Study on Histogram Equalization}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {177--179}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.52}, doi = {10.1109/IPTC.2011.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/WuX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/WuZMMR11, author = {Jiangjiang Wu and Jie Zhou and Jun Ma and Songzhu Mei and Jiangchun Ren}, title = {An Active Data Leakage Prevention Model for Insider Threat}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {39--42}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.17}, doi = {10.1109/IPTC.2011.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/WuZMMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/XiaoX11, author = {Xiaohong Xiao and You Xu}, title = {The Design and Implementation of C-like Language Interpreter}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {104--107}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.33}, doi = {10.1109/IPTC.2011.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/XiaoX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/XuF11, author = {Jia Xu and Liupeng Feng}, title = {A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and Quantization}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {67--70}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.24}, doi = {10.1109/IPTC.2011.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/XuF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/XuMHMT11, author = {Ru{-}jun Xu and Li{-}xin Ma and Bo Hu and He{-}ran Ma and Bo{-}hao Tao}, title = {Intelligent High-Voltage Discharge Fault Detection and Its Diagnosis Methods Based on {ANN}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {119--122}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.37}, doi = {10.1109/IPTC.2011.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/XuMHMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/XuW11, author = {Guangyan Xu and Huanqiang Wang}, title = {Research of Circular-Like Satellite Formation Flying at Critical Inclination}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {210--213}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.61}, doi = {10.1109/IPTC.2011.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/XuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/XuZ11, author = {Guangyan Xu and Meng Zhang}, title = {Robust Control of One Arm Space Manipulator with Parameters Uncertainties Compensated}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {206--209}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.60}, doi = {10.1109/IPTC.2011.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/XuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Xue11, author = {Ying Xue}, title = {Research of {SCM} System Based on the Internet of Things on {EPC}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {203--205}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.59}, doi = {10.1109/IPTC.2011.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Xue11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Yang11, author = {Gaizhen Yang}, title = {The Application of MapReduce in the Cloud Computing}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {154--156}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.46}, doi = {10.1109/IPTC.2011.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Yang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/YiP11, author = {Xumei Yi and Cao Peng}, title = {The Shapes of Halftone-AM-Dots Based on Information Hiding}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {59--62}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.22}, doi = {10.1109/IPTC.2011.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/YiP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/YuanZ11, author = {Lei Yuan and Heming Zhao}, title = {Research of Electronic Equipment Fault Diagnosis Algorithm Based on {RBF} Neural Network}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {75--78}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.26}, doi = {10.1109/IPTC.2011.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/YuanZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Zhang11, author = {Chao{-}yang Zhang}, title = {An Improved Binary Image Watermarking Algorithm Based on Singular Value Decomposition}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {238--241}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.70}, doi = {10.1109/IPTC.2011.70}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Zhang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/Zhang11a, author = {Chao{-}yang Zhang}, title = {An Improved Computer Notary System Protocols}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {242--244}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.71}, doi = {10.1109/IPTC.2011.71}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/Zhang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhangHZ11, author = {Ting Zhang and Jingsha He and Yang Zhang}, title = {Trust Based Secure Localization in Wireless Sensor Networks}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {55--58}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.21}, doi = {10.1109/IPTC.2011.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhangHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhangJWCC11, author = {Haitang Zhang and Jinqing Jiang and Ziliang Wang and Jinshan Chen and Yanhong Cui}, title = {Study on Approach to Improve the Quality of Veterinary Medicine Graduates by Strengthen Practical Skills}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {127--130}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.39}, doi = {10.1109/IPTC.2011.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhangJWCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhangW11, author = {Chao{-}yang Zhang and Chao Wei}, title = {Research and Application of the Stronger Security Dual Signature}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {245--247}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.72}, doi = {10.1109/IPTC.2011.72}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhaoL11, author = {Qian Zhao and Xueying Liu}, title = {An Improved Multi-objective Population Migration Optimization Algorithm}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {143--146}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.43}, doi = {10.1109/IPTC.2011.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhaoL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhaoP11, author = {Yunji Zhao and Hailong Pei}, title = {Model Update Particle Filter for Multiple Objects Detection and Tracking}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {9--12}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.10}, doi = {10.1109/IPTC.2011.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhaoP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhengWW11, author = {Peng Zheng and Weihua Wang and Juan Wang}, title = {A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {111--114}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.35}, doi = {10.1109/IPTC.2011.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhengWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhouC11, author = {Wei Zhou and Liu Chen}, title = {Formal Specification for Byzantine Fault Tolerant Algorithm Suiting Web Services}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {35--38}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.16}, doi = {10.1109/IPTC.2011.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhouC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/ZhuLFY11, author = {Xiao{-}jun Zhu and Shi{-}qin Lv and Liu{-}juan Fan and Xue{-}li Yu}, title = {The {EEG} Signal Process Based on {EEMD}}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {222--225}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.67}, doi = {10.1109/IPTC.2011.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/ZhuLFY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iptc/2011, title = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6099690/proceeding}, isbn = {978-1-4577-1130-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iptc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.