Search dblp for Publications

export results for "stream:streams/conf/iptc:"

 download as .bib file

@inproceedings{DBLP:conf/iptc/CaiLT11,
  author       = {Hongyun Cai and
                  Zhen Li and
                  Junfeng Tian},
  title        = {A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {139--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.42},
  doi          = {10.1109/IPTC.2011.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/CaiLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Dai11,
  author       = {Kuobin Dai},
  title        = {Secure Digital Library Technology Research Based on {VPN}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {165--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.49},
  doi          = {10.1109/IPTC.2011.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Dai11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Dai11a,
  author       = {Kuobin Dai},
  title        = {IPv4 to IPv6 Transition Research Based on the Campus Network},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {199--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.58},
  doi          = {10.1109/IPTC.2011.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Dai11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Dai11b,
  author       = {Kuobin Dai},
  title        = {Teaching and Research of Cryptography in Information and Computer
                  Science},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {226--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.64},
  doi          = {10.1109/IPTC.2011.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Dai11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Dai11c,
  author       = {Kuobin Dai},
  title        = {Network Security Mechanisms Research},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {231--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.65},
  doi          = {10.1109/IPTC.2011.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Dai11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/GaoY11,
  author       = {Han{-}ping Gao and
                  Zu{-}qiao Yang},
  title        = {Integrated Visual Saliency Based Local Feature Selection for Image
                  Retrieval},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {47--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.19},
  doi          = {10.1109/IPTC.2011.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/GaoY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/He11,
  author       = {Juan He},
  title        = {An Analytic Network Process Model of Trust in {B2C} E-Commerce},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {173--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.51},
  doi          = {10.1109/IPTC.2011.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/He11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/HeH11,
  author       = {Zhonglin He and
                  Zhihua Hu},
  title        = {A New Method for Impossible Differential Cryptanalysis of 8-Round
                  {AES-128}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {214--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.62},
  doi          = {10.1109/IPTC.2011.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/HeH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/HuH11,
  author       = {Zhihua Hu and
                  Zhonglin He},
  title        = {A New Method for Impossible Differential Cryptanalysis of 7-Round
                  {AES-192}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {248--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.73},
  doi          = {10.1109/IPTC.2011.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/HuH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/HuL11,
  author       = {Yin Hu and
                  Pei Lin},
  title        = {Research and Implementation of Packet Classification Based on {NDIS}
                  Intermediate Layer under Windows Platform},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {157--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.47},
  doi          = {10.1109/IPTC.2011.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/HuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/HuZ11,
  author       = {Yin Hu and
                  Chaoyang Zhang},
  title        = {An Improved Bayesian Algorithm for Filtering Spam E-Mail},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {87--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.29},
  doi          = {10.1109/IPTC.2011.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/HuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/JangraGP11,
  author       = {Ajay Jangra and
                  Nitin Goel and
                  Priyanka},
  title        = {Efficient Power Saving Adaptive Routing Protocol {(EPSAR)} for MANETs
                  Using {AODV} and {DSDV:} Simulation and Feasibility Analysis},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {24--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.13},
  doi          = {10.1109/IPTC.2011.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/JangraGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Jiang11,
  author       = {Qin Jiang},
  title        = {Some Remarks on Charactertics Function and Density Function of Uncertain
                  Variable},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {115--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.36},
  doi          = {10.1109/IPTC.2011.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Jiang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LeiL11,
  author       = {Lei Lu and
                  Lei Zhang},
  title        = {The Chaotic Cipher Based on CNNs and Its Application in Network},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {184--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.54},
  doi          = {10.1109/IPTC.2011.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LeiL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LiD11,
  author       = {Xi Li and
                  Hang Dai},
  title        = {The Color Components' Exchanging on Different Color Spaces and the
                  Using for Image Segmentation},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {123--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.38},
  doi          = {10.1109/IPTC.2011.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LiD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LiSDD11,
  author       = {Yun Li and
                  Shufang Song and
                  Mahmoud Daneshmand and
                  Weina Duan},
  title        = {A Cooperative Relay Method and Performance for Wireless Networks},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {31--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.15},
  doi          = {10.1109/IPTC.2011.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LiSDD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LiXZ11,
  author       = {Xueming Li and
                  Minling Xing and
                  Jiapei Zhang},
  title        = {A Comprehensive Prediction Method of Visit Priority for Focused Crawler},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {27--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.14},
  doi          = {10.1109/IPTC.2011.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LiXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LiZX11,
  author       = {Xueming Li and
                  Jiapei Zhang and
                  Minling Xing},
  title        = {Automatic Summarization for Chinese Text Based on Sub Topic Partition
                  and Sentence Features},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {131--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.40},
  doi          = {10.1109/IPTC.2011.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LiZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Liang11,
  author       = {Kailiang Liang},
  title        = {A Network Construction Solution in Colleges or Universities},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {188--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.55},
  doi          = {10.1109/IPTC.2011.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Liang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Liang11a,
  author       = {Kailiang Liang},
  title        = {Research on Thin {AP} Architecture to Deploy Campus {WLAN}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {192--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.56},
  doi          = {10.1109/IPTC.2011.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Liang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LinZS11,
  author       = {Changxing Lin and
                  Jian Zhang and
                  Beibei Shao},
  title        = {A High Speed Parallel Timing Recovery Algorithm and Its {FPGA} Implementation},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {63--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.23},
  doi          = {10.1109/IPTC.2011.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LinZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LiuW11,
  author       = {Chen Liu and
                  Zhou Wei},
  title        = {Multi-feature Method: An Integrated Content Based Image Retrieval
                  System},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {43--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.18},
  doi          = {10.1109/IPTC.2011.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LiuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LiuXD11,
  author       = {Xiong Liu and
                  Haiwei Xue and
                  Yiqi Dai},
  title        = {A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.8},
  doi          = {10.1109/IPTC.2011.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LiuXD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LiuZL11,
  author       = {Hong{-}fu Liu and
                  Cong Zhang and
                  Rui{-}fan Liang},
  title        = {Optimization of Masking Expansion Algorithm in Psychoacoustic Models},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {161--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.48},
  doi          = {10.1109/IPTC.2011.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LiuZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LuL11,
  author       = {Yuwu Lu and
                  Xueying Liu},
  title        = {A New Population Migration Algorithm Based on the Chaos Theory},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {147--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.44},
  doi          = {10.1109/IPTC.2011.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LuLZ11,
  author       = {Da Lu and
                  Guofan Liu and
                  Lingli Zhu},
  title        = {An Optimization for {CAVLC} Code Table Lookup Algorithm in {H.264}
                  Decoder},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {79--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.27},
  doi          = {10.1109/IPTC.2011.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LuLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LvT11,
  author       = {Haoyong Lv and
                  Hengyao Tang},
  title        = {Machine Learning Methods and Their Application Research},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {108--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.34},
  doi          = {10.1109/IPTC.2011.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LvT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/LvW11,
  author       = {Haoyong Lv and
                  Zhihong Wu},
  title        = {A Survey of Computer Graphics and Graphics Image Processing Technology},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {196--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.57},
  doi          = {10.1109/IPTC.2011.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/LvW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Ma11,
  author       = {Sheng Ma},
  title        = {Some Remarks on Convergence in Credibility Measure and Convergence
                  in Credibility Distribution of Fuzzy Variable},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {100--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.32},
  doi          = {10.1109/IPTC.2011.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Ma11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/MaXP11,
  author       = {YuHong Ma and
                  Kai Xie and
                  Minfang Peng},
  title        = {A Parallel Gaussian Filtering Algorithm Based on Color Difference},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {51--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.20},
  doi          = {10.1109/IPTC.2011.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/MaXP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/MeiWCMRL11,
  author       = {Songzhu Mei and
                  Jiangjiang Wu and
                  Yong Cheng and
                  Jun Ma and
                  Jiangchun Ren and
                  Xiaoxing Li},
  title        = {Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation
                  in Cloud Computing},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {19--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.12},
  doi          = {10.1109/IPTC.2011.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/MeiWCMRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/PanZL11,
  author       = {Xun Pan and
                  Jing{-}yuan Zhang and
                  Cheng{-}jiang Liu},
  title        = {Numerical Simulation and Analysis of Cavitation Characteristics of
                  Ship Propeller},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {180--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.53},
  doi          = {10.1109/IPTC.2011.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/PanZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/PengDZ11,
  author       = {Yong Peng and
                  Chongjie Dong and
                  Huijun Zheng},
  title        = {Research on Genetic Algorithm Based on Pyramid Model},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {83--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.28},
  doi          = {10.1109/IPTC.2011.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/PengDZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/QinWC11,
  author       = {Yu Qin and
                  QiuXin Wu and
                  XiaoBo Chu},
  title        = {Design and Analysis on Direct Anonymous Attestation for Security Chip},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {13--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.11},
  doi          = {10.1109/IPTC.2011.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/QinWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ShaoX11,
  author       = {Gui{-}ming Shao and
                  Chaofan Xiong},
  title        = {Exploration and Example for Mathematical Application Issues in {U.S.}
                  Mathematics Textbooks},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {218--221},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.63},
  doi          = {10.1109/IPTC.2011.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ShaoX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/SunLG11,
  author       = {Xiang'e Sun and
                  Yun Ling and
                  Jun Gao},
  title        = {A Deconvolution Approach of 2D Data Statistical},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {71--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.25},
  doi          = {10.1109/IPTC.2011.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/SunLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/SunLG11a,
  author       = {Xiang'e Sun and
                  Yun Ling and
                  Jun Gao},
  title        = {The Research on Anisotropic Parameter Estimation for Vertical Transerse
                  Isotropy: Based on 3D VSP, Walkaway {VSP} and Full Azimuth Seismic
                  Data},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {135--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.41},
  doi          = {10.1109/IPTC.2011.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/SunLG11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/SunSWZ11,
  author       = {Yi Sun and
                  Hongxiang Sun and
                  Qiaoyan Wen and
                  Hua Zhang},
  title        = {A Deterministic Protocol for Rational Secret Sharing in Asynchronous
                  Model},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {5--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.9},
  doi          = {10.1109/IPTC.2011.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/SunSWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Tu11,
  author       = {Chunxia Tu},
  title        = {Study on QoS Protection Mechanism of VoIP Systems},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {151--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.45},
  doi          = {10.1109/IPTC.2011.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Tu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Wang11,
  author       = {Jinfeng Wang},
  title        = {Applied Study on Information Technology and College English Teaching
                  Integration},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {235--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.66},
  doi          = {10.1109/IPTC.2011.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/WangSLL11,
  author       = {Xinzhi Wang and
                  Lechang Sun and
                  Jingju Liu and
                  Qiang Li},
  title        = {{VISHNU:} {A} Software Behavior Trustworthiness Control Method Based
                  on {DRTM}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {169--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.50},
  doi          = {10.1109/IPTC.2011.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/WangSLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/WangW11,
  author       = {Wenjia Wang and
                  Dingwei Wang},
  title        = {A Comprehensive Trust Model with Multi-participant Viewpoints in Online
                  Auctions},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {91--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.30},
  doi          = {10.1109/IPTC.2011.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/WangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/WuW11,
  author       = {Chao Wu and
                  Yiquan Wu},
  title        = {Multitemporal Images Change Detection Using Nonsubsampled Contourlet
                  Transform and Kernel Fuzzy C-Means Clustering},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {96--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.31},
  doi          = {10.1109/IPTC.2011.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/WuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/WuX11,
  author       = {Zhihong Wu and
                  Xiaohong Xiao},
  title        = {Study on Histogram Equalization},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {177--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.52},
  doi          = {10.1109/IPTC.2011.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/WuX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/WuZMMR11,
  author       = {Jiangjiang Wu and
                  Jie Zhou and
                  Jun Ma and
                  Songzhu Mei and
                  Jiangchun Ren},
  title        = {An Active Data Leakage Prevention Model for Insider Threat},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {39--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.17},
  doi          = {10.1109/IPTC.2011.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/WuZMMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/XiaoX11,
  author       = {Xiaohong Xiao and
                  You Xu},
  title        = {The Design and Implementation of C-like Language Interpreter},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {104--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.33},
  doi          = {10.1109/IPTC.2011.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/XiaoX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/XuF11,
  author       = {Jia Xu and
                  Liupeng Feng},
  title        = {A Feature-Based Robust Digital Image Watermarking Scheme Using Image
                  Normalization and Quantization},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {67--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.24},
  doi          = {10.1109/IPTC.2011.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/XuF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/XuMHMT11,
  author       = {Ru{-}jun Xu and
                  Li{-}xin Ma and
                  Bo Hu and
                  He{-}ran Ma and
                  Bo{-}hao Tao},
  title        = {Intelligent High-Voltage Discharge Fault Detection and Its Diagnosis
                  Methods Based on {ANN}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {119--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.37},
  doi          = {10.1109/IPTC.2011.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/XuMHMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/XuW11,
  author       = {Guangyan Xu and
                  Huanqiang Wang},
  title        = {Research of Circular-Like Satellite Formation Flying at Critical Inclination},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {210--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.61},
  doi          = {10.1109/IPTC.2011.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/XuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/XuZ11,
  author       = {Guangyan Xu and
                  Meng Zhang},
  title        = {Robust Control of One Arm Space Manipulator with Parameters Uncertainties
                  Compensated},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {206--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.60},
  doi          = {10.1109/IPTC.2011.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/XuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Xue11,
  author       = {Ying Xue},
  title        = {Research of {SCM} System Based on the Internet of Things on {EPC}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {203--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.59},
  doi          = {10.1109/IPTC.2011.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Xue11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Yang11,
  author       = {Gaizhen Yang},
  title        = {The Application of MapReduce in the Cloud Computing},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {154--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.46},
  doi          = {10.1109/IPTC.2011.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Yang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/YiP11,
  author       = {Xumei Yi and
                  Cao Peng},
  title        = {The Shapes of Halftone-AM-Dots Based on Information Hiding},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {59--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.22},
  doi          = {10.1109/IPTC.2011.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/YiP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/YuanZ11,
  author       = {Lei Yuan and
                  Heming Zhao},
  title        = {Research of Electronic Equipment Fault Diagnosis Algorithm Based on
                  {RBF} Neural Network},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {75--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.26},
  doi          = {10.1109/IPTC.2011.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/YuanZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Zhang11,
  author       = {Chao{-}yang Zhang},
  title        = {An Improved Binary Image Watermarking Algorithm Based on Singular
                  Value Decomposition},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {238--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.70},
  doi          = {10.1109/IPTC.2011.70},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Zhang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/Zhang11a,
  author       = {Chao{-}yang Zhang},
  title        = {An Improved Computer Notary System Protocols},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {242--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.71},
  doi          = {10.1109/IPTC.2011.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/Zhang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhangHZ11,
  author       = {Ting Zhang and
                  Jingsha He and
                  Yang Zhang},
  title        = {Trust Based Secure Localization in Wireless Sensor Networks},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {55--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.21},
  doi          = {10.1109/IPTC.2011.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhangHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhangJWCC11,
  author       = {Haitang Zhang and
                  Jinqing Jiang and
                  Ziliang Wang and
                  Jinshan Chen and
                  Yanhong Cui},
  title        = {Study on Approach to Improve the Quality of Veterinary Medicine Graduates
                  by Strengthen Practical Skills},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {127--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.39},
  doi          = {10.1109/IPTC.2011.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhangJWCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhangW11,
  author       = {Chao{-}yang Zhang and
                  Chao Wei},
  title        = {Research and Application of the Stronger Security Dual Signature},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {245--247},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.72},
  doi          = {10.1109/IPTC.2011.72},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhaoL11,
  author       = {Qian Zhao and
                  Xueying Liu},
  title        = {An Improved Multi-objective Population Migration Optimization Algorithm},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {143--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.43},
  doi          = {10.1109/IPTC.2011.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhaoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhaoP11,
  author       = {Yunji Zhao and
                  Hailong Pei},
  title        = {Model Update Particle Filter for Multiple Objects Detection and Tracking},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {9--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.10},
  doi          = {10.1109/IPTC.2011.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhaoP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhengWW11,
  author       = {Peng Zheng and
                  Weihua Wang and
                  Juan Wang},
  title        = {A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {111--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.35},
  doi          = {10.1109/IPTC.2011.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhengWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhouC11,
  author       = {Wei Zhou and
                  Liu Chen},
  title        = {Formal Specification for Byzantine Fault Tolerant Algorithm Suiting
                  Web Services},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {35--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.16},
  doi          = {10.1109/IPTC.2011.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhouC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/ZhuLFY11,
  author       = {Xiao{-}jun Zhu and
                  Shi{-}qin Lv and
                  Liu{-}juan Fan and
                  Xue{-}li Yu},
  title        = {The {EEG} Signal Process Based on {EEMD}},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {222--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.67},
  doi          = {10.1109/IPTC.2011.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/ZhuLFY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iptc/2011,
  title        = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6099690/proceeding},
  isbn         = {978-1-4577-1130-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iptc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics