|
Applications of Web Information Systems |
|
|
|
Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine Disaster |
|
|
1 | (10) |
|
|
The Investigation of WEB Software System Based on Domain-Driven Design |
|
|
11 | (8) |
|
|
|
|
|
|
MediaCRM: Enabling Customer Relationship Management in the Broadcast |
|
|
19 | (8) |
|
|
|
|
|
|
Jordan Triple Multiplicative Maps on the Symmetric Matrices |
|
|
27 | (8) |
|
|
|
International Collaborations in Brain-Computer Interface (BCI) Research |
|
|
35 | (8) |
|
|
A Classification of Cluster Validity Indexes Based on Membership Degree and Applications |
|
|
43 | (8) |
|
|
|
|
|
Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random Variables |
|
|
51 | (8) |
|
|
|
Propagation in LHM Slab Loaded Rectangular Waveguide |
|
|
59 | (7) |
|
|
The Study of Images Emotion Based on fMRI |
|
|
66 | (7) |
|
|
|
|
|
The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal Mine |
|
|
73 | (6) |
|
|
|
Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness Sensor |
|
|
79 | (7) |
|
|
|
False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR Detector |
|
|
86 | (6) |
|
|
|
|
Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam Equations |
|
|
92 | (6) |
|
|
|
Initial-Boundary Value Problem for Viscoelastic Rectangular Plate Equation |
|
|
98 | (6) |
|
|
|
An Invariant Subspace Theorem for Sequentially Subdecomposable Operators |
|
|
104 | (5) |
|
|
The Genetic Algorithm in the Test Paper Generation |
|
|
109 | (5) |
|
|
|
|
Applications of Web Mining |
|
|
|
CDMA Mobile Internet User Behavior Analysis Based on RP Interface |
|
|
114 | (10) |
|
|
|
|
|
Personalizing Group Recommendation to Social Network Users |
|
|
124 | (10) |
|
|
|
|
A Novel Frequent Trajectory Mining Method Based on GSP |
|
|
134 | (7) |
|
|
|
|
|
Study of a Fuzzy Clustering Algorithm Based on Interval Value |
|
|
141 | (7) |
|
|
The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in Fiber |
|
|
148 | (7) |
|
|
|
|
|
A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality MxN Production Model |
|
|
155 | (11) |
|
|
|
A Distributed Processing Method for Design Patent Retrieval System |
|
|
166 | (9) |
|
|
|
|
|
An Adaptive Distribution Model for Multi-dimensional Data in Decentralized Environments |
|
|
175 | (9) |
|
|
|
Research on SOA Business Process Disaster Tolerance Recovery Method |
|
|
184 | (8) |
|
|
|
|
Admission Control for WebServices in Enterprise Systems Using Expert Systems |
|
|
192 | (8) |
|
|
|
|
An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P Network |
|
|
200 | (8) |
|
|
|
|
|
|
Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy System |
|
|
208 | (8) |
|
|
Abolfazl Toroghi Haghighat |
|
|
|
e-Government and e-Commerce |
|
|
|
Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri Lanka |
|
|
216 | (10) |
|
|
|
|
W-entropy Index: The Impact of the Members on Social Networks |
|
|
226 | (8) |
|
|
|
|
Improving Security of SET Protocol Based on ECC |
|
|
234 | (8) |
|
|
Geographic Information Systems |
|
|
|
The Constrained Computing and Application for Intelligent Generalization of Settlements |
|
|
242 | (9) |
|
|
|
Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, Beijing |
|
|
251 | (8) |
|
|
|
|
|
|
|
An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols |
|
|
259 | (12) |
|
|
|
|
A Fast and Tolerant Voting Mechanism in Wireless Sensor Networks |
|
|
271 | (12) |
|
|
|
The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model |
|
|
283 | (11) |
|
|
|
A Network-Flow-Based Method for Embedding Rectification |
|
|
294 | (10) |
|
|
|
|
An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented Architecture |
|
|
304 | (8) |
|
|
|
|
|
Defense against DNS Man-In-The-Middle Spoofing |
|
|
312 | (8) |
|
|
|
|
|
|
Defensive Steganography: A Novel Way against Steganalysis |
|
|
320 | (8) |
|
|
|
|
A New Privacy-Preserving Scheme DOSPA for SaaS |
|
|
328 | (8) |
|
|
|
|
|
Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits Rates |
|
|
336 | (8) |
|
|
|
|
An Anti-collusion Trust Model in P2P Networks |
|
|
344 | (8) |
|
|
|
|
An Alerts Correlation Technology for Large-Scale Network Intrusion Detection |
|
|
352 | (8) |
|
|
|
Dynamic Authorization of Grid Based on Trust Mechanism |
|
|
360 | (8) |
|
|
|
|
Timestamp Based Authentication Protocol for Smart Card Using ECC |
|
|
368 | (8) |
|
|
|
|
Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud Computing |
|
|
376 | (8) |
|
|
|
|
A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each Participant |
|
|
384 | (6) |
|
|
An Encrypted Data-Transportation Method for Distributed System |
|
|
390 | (7) |
|
|
|
|
|
Study on Grid Access Control Strategy Based on Trust and Security Grade |
|
|
397 | (5) |
|
|
Intelligent Networked Systems |
|
|
|
Self-adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service Awareness |
|
|
402 | (9) |
|
|
|
Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning Method |
|
|
411 | (8) |
|
|
|
|
|
Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier |
|
|
419 | (7) |
|
|
|
|
|
Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16m |
|
|
426 | (8) |
|
|
|
LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying Delays |
|
|
434 | (7) |
|
|
|
Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living Time |
|
|
441 | (6) |
|
|
|
Author Index |
|
447 | |