CIS 2009:
Beijing,
China
2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers.
IEEE Computer Society 2009, ISBN 978-0-7695-3931-7
Intelligent Systems and Fuzzy Systems
- Yang Zhang, ZhongXiong He:
Economic Control Based on Four-Element Connection Numbers Control.
1-5
- Jinmao Xu, Yaowen Xue, Huimin Gao, Pengzhu Zhang:
Design and Implementation of Simulation System for Monitoring Capital Flow Based on Agent.
6-9
- Wei Huang, Hong Peng:
Observation Reduction for State-Action Tables.
10-14
- Qingui Xu, Guixiong Liu:
Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection.
15-20
- Yuan-Duen Lee, Wen-Chia Tsai, Sheng-Fei Hsu:
Exploring the Relationship Between Parental Information Literacy and Regulating Rules in Family by Data Mining.
21-24
- Liping Chen, Weitao Ha, Guojun Zhang:
A New Web Service Evaluation Model with Fuzzy C-Means Artificial Immune Network Memory Classifier.
25-29
- Jiayang Li, Jianhua Xu:
A Fast Multi-label Classification Algorithm Based on Double Label Support Vector Machine.
30-35
- Dukun Ding, Cunxi Xie, Xuanzi Hu:
Immune Controller Design for Vertical-Joint Industry Robot.
36-40
- Yaolong Li, Guojun Zhang:
Rank Axioms for Poset Greedoids.
41-42
- Guojun Zhang, Yaolong Li:
Global Rank Axioms of Greedoids on Partially Ordered Set.
43-44
- Ming-dong Hou, Zhi-cheng Zhao, Jing-gang Zhang, Jie Tian:
An IMC-PID Control Method with Set-Point Weight.
45-49
Support Vector Machines,
Machine Learning,
and Learning Algorithms
- Fahimeh Farahnakian, Nasser Mozayani:
Reinforcement Learning for Soccer Multi-agents System.
50-52
- Hong-jun Heng, Bing-zhong Zheng, Ya-jing Li:
Study of SVM-Based Air-Cargo Demand Forecast Model.
53-55
- Xiaoxia Han, Gang Xie, Keming Xie, Jun Ren:
Heterogeneous Catalysis Modeling Strategy Integrating Support Vector Regression and Chaotic Particle Swarm Optimization Algorithm.
56-60
- Yi Zhong, Chunguang Zhou, Lan Huang, Yan Wang, Bin Yang:
Support Vector Regression for Prediction of Housing Values.
61-65
- Long Wan, Wenxing Bao:
Research and Application of Animal Disease Intelligent Diagnosis Based on Support Vector Machine.
66-70
- Xiaohong Hu, Xu Qian:
A Novel Graph-based Image Annotation with Two Level Bag Generators.
71-75
- Tianxiang Feng, Hongxia Liu:
The Computer Realization of the QR Decomposition on Matrices with Full Column Rank.
76-79
Evolutionary Computing:
Workshop
Swarm Intelligence
- Zhengjia Wu, Liping Zhang, Wen Wang, Kui Wang:
Research on Job-Shop Scheduling Problem Based on Genetic Ant Colony Algorithms.
114-118
- Orlando Duran, Luiz Airton Consalter:
Integrating PSO and CAM Database for Selecting Cutting Tools.
119-124
- Wenjie You, Shanshan Wu, Guoli Ji:
The Application of an Improved Particle Swarm Optimization (PSO) Algorithm in Pairwise Sequence Alignment.
125-128
- Hui-rong Li, Yue-lin Gao:
Particle Swarm Optimization Algorithm with Adaptive Threshold Mutation.
129-132
- Liang Li, Guangming Yu, Xuesong Chu, Shibao Lu:
The Harmony Search Algorithm in Combination with Particle Swarm Optimization and its Application in the Slope Stability Analysis.
133-136
- Yuhong Duan, Sun Ying:
A Particle Swarm Optimization Algorithm with Ant Search for Solving Traveling Salesman Problem.
137-141
- Hui Zhao, Chun Feng Zhang:
Accuracy Analysis of a Parallel Robot with Particle Swarm Optimization.
142-145
- Ji Cheng:
Integration of Access Control Policy Design into Software Development.
146-150
- Ai-juan Zhang:
Research of an Improved Access Control Model in Active Networks.
151-154
- Simin Mo, Jianchao Zeng:
Performance Analysis of the Artificial Physics Optimization Algorithm with Simple Neighborhood Topologies.
155-160
Neural Networks and Distributed Systems
- Ying Zhang, Zhe-zhao Zeng:
Neural Network Algorithm for the Simultaneous Extraction of All Roots of Algebraic Polynomial.
161-164
- Jinjian Xiao, Jingyu Liu:
Early Forecast and Recognition of the Driver Emergency Braking Behavior.
165-168
- Xinjian Zhuo, Yongmei Su:
One Application of CNN in Word-Processing.
169-172
- Guo-Jian Cheng, Lei Cai, Hua-Xian Pan:
Comparison of Extreme Learning Machine with Support Vector Regression for Reservoir Permeability Prediction.
173-176
- Jiali Hou, Nengshan Feng:
A Research on the Function Relationships in the Modularization Immunity Neural Network Model.
177-181
- Jun Wang, Jian-Wen Chen, Yongliang Wang, Di Zheng:
Intelligent Load Balancing Strategies for Complex Distributed Simulation Applications.
182-186
- Xizhe Zhang, Ying Yin, Mingwei Zhang, Bin Zhang:
Web Service Community Discovery Based on Spectrum Clustering.
187-191
Watermarking,
Cryptography,
and Coding
- Xuewen Xia, Yuanxiang Li, Zhuliang Xia, Rong Wang:
Data Encryption Based on Multi-granularity Reversible Cellular Automata.
192-196
- Jianqin Zhou, Wei Xiong, Zemao Zhao, Lin You:
The Tight Error Linear Complexity of Periodic Sequences.
197-201
- Yi-Chun Zhang, Lei Yang, Pin Xu, Yong-Song Zhan:
A DRM Authentication Scheme Based on Smart-Card.
202-207
- Manman Geng, Futai Zhang:
Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing.
208-212
- Xueming Wang, Nan Cui:
Research of Security Mobile Payment Protocol in Communication Restrictions Scenarios.
213-217
- XiaoYan Yang, Zhen Liu:
The Security Matrix Factorization Agreement with Two Parties.
218-221
- Hui Zhu, Hui Li, Yumin Wang:
An Efficient Fast Authentication Protocol.
222-225
- Yipin Lin, Xiaofeng Wang:
A Hase-based SAKA Protocol Algorithm.
226-228
- Hao Cao, Shimin Wei, Zepeng Zhuo:
Relations between Annihilator Immunity of Boolean Functions and Affine Spaces.
229-232
- Yan Wang, Ming Hu:
Timing Evaluation of the Known Cryptographic Algorithms.
233-237
- Yuan-Yuan Li:
AOP-Based Attack on Obfuscated Java Code.
238-241
- Gong Bei, Shi Guangyuan:
An Anonymous Attestation Scheme of TPM.
242-245
- Hongru Wei, Zhiyin Kou:
Research and Application of Digital Watermark for Video Copyright Protection.
246-250
- Weijia Jiang, Jiguo Li:
Authenticated Tree Based Group Key Agreement.
251-255
- Xiaoming Hu, Zhe Zhang, Yinchun Yang:
Identity Based Proxy Re-Signature Schemes without Random Oracle.
256-259
- Yali Jiang, Xiuling Ju:
Lattice-Based CCA-Secure Cryptosystem from IBE System.
260-264
- Xiu-mei Wen, Wei Zhao, Fan-xing Meng:
Research of a Digital Image Watermarking Algorithm Resisting Geometrical Attacks in Fourier Domain.
265-268
- Mingjie Chen, Kefeng Fan, Wei Mo, Subing Zhang:
Implementation and Evaluation of a Novel Audio Watermarking Scheme.
269-272
- Na Wang, Xia Li, Lingjun Liu:
An Adaptive Multi-objective Image Watermarking Scheme for QIM Using NSGA-II.
273-277
- Dexin Yang, Bo Yang:
A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card.
278-282
- Baoheng Shan, Bin Zhang:
Research on Role-Based Joint Authorization Administration Model.
283-287
- Manman Geng, Futai Zhang:
Batch Verification for Certificateless Signature Schemes.
288-292
- Lianfen Huang, Ying Huang, Zhibin Gao, Jianan Lin, Xueyuan Jiang:
Performance of Authentication Protocols in LTE Environments.
293-297
- Gang Xu, Geng Zhao, Lequan Min:
An Extended Method for Obtaining S-Boxes Based on Discrete Chaos Map System.
298-302
- Hui-long Jin, Guo-dong Liang, Zhi-Hua Liu, Cheng-qian Xu:
The Necessary Condition of Families of Odd-Periodic Perfect Complementary Sequence Pairs.
303-307
- Jian-lin Huang, Fei-peng Li:
Quick Similarity Measurement of Source Code Based on Suffix Array.
308-311
- Huijuan Xiao, Wen Zeng:
A Hard Disk Encryption System Realized by the Digital Signal Processor.
312-314
- Min-Qing Zhang, Bin Dong, Xiaoyuan Yang:
A New Self-Updating Hash Chain Structure Scheme.
315-318
Information and Security Management
- Hu Ming, Wang Yan:
The Collision Rate Tests of Two Known Message Digest Algorithms.
319-323
- Syed Muhammad Khaliq-ur-rehman Raazi, Heejo Lee, Sungyoung Lee, Young-Koo Lee:
BARI: A Distributed Key Management Approach for Wireless Body Area Networks.
324-329
- Yinan Zhang, Ning Du, Miao Qi, Chengxi Wang, Jun Kong:
Association Analysis and Content-Based Information Hiding Approach with High Hiding Capacity.
330-334
- Xin Liu, Neng Wang:
Random Walk-Based Tor Circuit Building Protocol.
335-340
- Ren Shijie, Su Xin:
Digital Watermarking Based on Fast Independent Component Analysis and Discrete Wavelet Transform.
341-343
- Jun Gao:
Computer-Vision-Based Identification of Nail's Surface Shape.
344-347
- Guangliang Liu, Lingyun Li, Shengxian Xie, Junqing Li:
Secret Sharing System and Secret Sharing Matrix.
348-351
- Peng Wu, Guoxin Wu:
A Reputation-Based Trust Model for P2P Systems.
352-356
- Bin Qin, Jian-fei Pan, Guang-zhong Cao, Ge-guo Du:
The Anti-spoofing Study of Vein Identification System.
357-360
- Qiming Liu, Rui Xu, Shaojie Wang:
Modelling and Analysis of an SIRS Model for Worm Propagation.
361-365
- Yangui Xu, Xiangchun Li, Jiachun Zhou, Huanyan Qian:
Worm Detection in an IPv6 Internet.
366-370
- Li Yao, Yu Liu, Yuqing Zhang:
An Integrated Approach to Worm Detection and Automatic Signature Generation.
371-375
- Xiaosong Zhang, Fei Liu, Ting Chen, Hua Li:
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention.
376-379
- Jianyong Wang, Yuling Li, Yuhua Liu, Xiu Jing:
Cluster and Recommendation Based Multi-granularity Trust Model in P2P Network.
380-384
- Yun Deng, Xiao-hui Cheng:
A Study on the Security Technology of Enterprise Mobile Information System.
385-391
Wireless Network Security
- Chuanrong Zhang, Yuqing Zhang:
New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme.
392-396
- Daowen Hua, Xuehui Du, Yanbin Qian, Shaoge Yan:
A DTN Routing Protocol Based on Hierarchy Forwarding and Cluster Control.
397-401
- Enguo Zhu, Guoliang Wu, Gongxun Yang:
Network Security Protection Solutions of Electric Power Enterprise Based on VPN Technology.
402-405
- Zhiyuan Xie, Junhui He, Shaohua Tang:
A CPK-Based Security Scheme at Network Layer.
406-410
- Kai Wei, Shaohua Tang:
A Multi-level Trust Evaluation Model Based on D-S Theory for Grid.
411-415
- Ru Li, Liaojun Pang, Qingqi Pei, Guozhen Xiao:
Anonymous Communication in Wireless Mesh Network.
416-420
- Songbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia:
SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.
421-425
- Bin Yang:
Study on Security of Wireless Sensor Network Based on ZigBee Standard.
426-430
- Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
431-435
- Xiaonan Wang, Dongniang Cheng:
FIMFS: Failure Inferencing Based IP Multicast Fast Self-Healing Approach.
436-440
- Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks.
441-445
Data and Network Security
- Changzheng Xu, Yaqi Wang, Qiang Wei, Qingxian Wang:
A Novel Trust Model Based on Temporal Historical Data for Access Control.
446-449
- Junhao Geng, Sumei Zhang:
Full Business Model Oriented Access Control Method.
450-454
- Songyun Liu, Hejiao Huang:
Role-Based Access Control for Distributed Cooperation Environment.
455-459
- Guoqi Li, Yang Xiao, Minyan Lu, Yuchao Zhang:
A Formal Method Based Case Study for Access Control.
460-463
- Kai-mei Zheng, Xu Qian, Pei-chong Wang:
Dimension Reduction in Intrusion Detection Using Manifold Learning.
464-468
- Li-zhong Geng, Hui-bo Jia:
A Novel Intrusion Detection Scheme for Network-Attached Storage Based on Multi-source Information Fusion.
469-473
- Yang Song, Yuqing Zhang, Yingfei Sun:
Automatic Vulnerability Locating in Binary Patches.
474-477
- Ning Wang, Zhijun Liu, Yuping Huang:
Applying Dynamic Labels of the Biba Model in Forensic Evidence Analysis.
478-482
- Danfeng Zhao, Wei Zhao, Ying Wang, Feng Gao, Qi He, Guohua Liu:
Creating the Cryptograph Index by Query Frequencies in DAS Models.
483-487
- Ning Wang, Wei Zhao, Ying Wang, Qi He, Guohua Liu:
Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases.
488-492
- Jinhong Cui, Xu Wang:
SNS Based Information Authorization Delegation Mechanism and Implementation.
493-497
- Lequan Min, Xiaobo Jiang, Youyan Fu, Yunhao Yi, Yan Meng, Hai Yan:
Nonlinear Regression Based Analysis on Cyanobacteria Blooms and Water Quality in a Beijing Shallow Lake.
498-504
- Li-hua Zou, Yun-cheng Liu:
A New Algorithm of Counting Human Based on Segmentation of Human Faces in Color Image.
505-509
- Xu Xiang:
Providing Efficient Secure DHTs Routing.
510-514
Other Applications
- Yuanyuan Liu, Haibin Yu, Zhiwei He, Xueyi Ye:
Fast Robust Face Detection under a Skin Color Model with Geometry Constraints.
515-519
- Gang Yang, Ziye Yan, Hong Zhao:
Touching String Segmentation Using MRF.
520-524
- Rong Guo, Yuhui Wang:
A Hybrid Approach of Hazard Estimation for Chemical Hazard Installations.
525-528
- Yun Liu, Peng Zhang:
Vision-Based Human-Computer System Using Hand Gestures.
529-532
- Pengfei Li, Jiakun Li:
Application of Communication and Remote Control in PLC Based on ZigBee.
533-536
- Yong-bao Liu, Mi Zhou, Xing He:
Fault Diagnosis of the Gas Turbine Based on Multi-operating Condition Information Fusion.
537-540
- Han Yi, Kaku Ikou, Gengui Zhou, Jianhu Cai, Huazhen Lin:
An Application of Particle Swarm Optimization to Uncapacitated Multilevel Lot-Sizing Problems with Series Structure.
541-544
- Zhou Jia, Guo Yun Fei:
Guaranteeing Maximum Reliability and Minimum Delay QoS Routing Based on WF2Q.
545-549
- Hongge Sun, Weisheng Wang, Yi Cao, Shenxue He, Xin Yan:
Application of Fuzzy Data Fusion in Multi-sensor Environment Monitor.
550-553
- Lan Wang, Qian Zhang:
A New Method of Generating Robot-Used Maps.
554-557
- De-Jun Li, Le-Ping Xu:
The Design for Warp Knitting Machine Traversing Control System Based on DSP.
558-562
- Xintian Liu, Changhong Liu, Lihui Zhao, Hu Huang:
The Random Thermal Analysis with Universal Grey Number in the Electronics.
563-566
- Li Ren, Xin-yi Xiang:
Research on the Energy Analysis of Lake Ecological Functions.
567-570
- Yi Liu, Man Sha:
Research on Prediction of Traffic Flow at Non-detector Intersections Based on Ridge Trace and Fuzzy Linear Regression Analysis.
571-575
- Yunpeng Wang, Haiyang Yu, Shiwu Li, Yi Chen:
Research on Temporal and Spatial Data Models Based on GIS for Urban Traffic Planning Information Support System.
576-579
- Shichong Tan, Hui Zhu, Yumin Wang:
Some Notes on Password Authenticated Key Exchange Based on RSA.
580-583
- Yong Zeng, Jianfeng Ma, Qinqi Pei, Lihua Dong:
A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
584-586
- Jian-Wen Feng, An-ding Dai, Francis R. Austin, Ling He:
Anti-synchronization of Two Different Hyperchaotic Systems with Fully Uncertain Parameters.
587-591
- Dingxie He, Hongxia Liu:
The Application of Elementary Transformation.
592-597
- Zeng-li Liu, Shuang Xu, Hai-yan Quan, Yi-gang Guo:
Study of Spectrum Analysis Based on EMD Adaptive Filter.
598-600
- Bolin Liu, Shaochuan Fu:
Efficiency Measurement of Logistics Public Companies Basing on the Modified DEA Model.
601-605
Copyright © Fri Mar 12 17:07:58 2010
by Michael Ley (ley@uni-trier.de)