Preface (PDF)
Organizing Committee (PDF)
Program Committee (PDF)
Reviewers (PDF)
An Improved Fuzzy Clustering Method to Detect Moving Objects (Abstract)
Fuzzy Partition Based Curvelets and Wavelets Denoise Algorithm (Abstract)
Variable Universe Multiple-Fuzzifications Control (Abstract)
Models for Predicting the Value of E-Commerce Trade in China (Abstract)
Knowledge Elicitation and Acquisition for Simulation Validation (Abstract)
Security Operation Center Based on Immune System (Abstract)
A New Algorithm for the Longest Common Subsequence Problem (Abstract)
Arithmetic Model Research of IDS Alarm Controlling (Abstract)
Using Relational Database to Build OWL Ontology from XML Data Sources (Abstract)
The Research of ASW Helicopter ACGF Construction Based on CXBR (Abstract)
On Spam Detection Based on Cognitive Pattern Recognition (Abstract)
Chinese Keyword Extraction Based on N-Gram and Word Co-occurrence (Abstract)
Multi-objective Evaluation Strategy for Evolvable Analog Circuit (Abstract)
Application of Genetic Algorithms to Computing Unit Hydrograph (Abstract)
A Novel Assembly Evolutionary Algorithm for n-Queens Problem (Abstract)
Quantum-Inspired Swarm Evolution Algorithm (Abstract)
Using Expert?s Knowledge to Build Bayesian Networks (Abstract)
Cooperative Q Learning Based on Blackboard Architecture (Abstract)
A Shot Clustering Based Algorithm for Scene Segmentation (Abstract)
Visual Mouse: SIFT Detection and PCA Recognition (Abstract)
Models of Vehicle Speeds Measurement with a Single Camera (Abstract)
Reconstruction of Partially Occluded Face by Fast Recursive PCA (Abstract)
DT-CWT Feature Based Face Recognition Using Supervised Kernel ONPP (Abstract)
Automatic Fire Smoke Detection Based on Image Visual Features (Abstract)
A Robust Algorithm for Iris Localization Based on Radial Symmetry (Abstract)
Using Nonlinear Features in Automatic English Lexical Stress Detection (Abstract)
Dissymmetrical P2P Topology and Resource Locating Algorithm (Abstract)
Research on the Instrument on Network(ION) and Its Key Technologies (Abstract)
Stability Analysis for Grid Services Dynamic Scheduling System (Abstract)
Routing Algorithm of Network Coding on Multicast (Abstract)
A Parallel Data Processing Middleware Based on Clusters (Abstract)
Agent-Based Distributed Conceptual Design of Virtual Prototyping for Complex Products (Abstract)
Research on Multi-mode Fusion Tracking of OTHR Based on Auction Algorithm (Abstract)
An Improved Information Fusion Algorithm Based on SVM (Abstract)
Forecasting Method on Pear Scab Based on Fusion Reasoning (Abstract)
Association Rules Mining Using Multi-objective Coevolutionary Algorithm (Abstract)
Research and Realization of Text Mining Algorithm on Web (Abstract)
An Active Data Integration Model Based on P2P Routing Service (Abstract)
The Correlation between the Wavelet Base Properties and Image Compression (Abstract)
An Improved Clustering Algorithm Based on Ant Colony Approach (Abstract)
The Implementation Architecture of Content Protection in P2P Network (Abstract)
Transductive Support Vector Machine for Personal Inboxes Spam Categorization (Abstract)
Random Jump Index: A Trustworthy Index for Random Insertion (Abstract)
Study of Lyapunov Exponent Spectra for Axial-Flow Compression System (Abstract)
Specification of Access Control Policies for Web Services (Abstract)
?CLinux Security Enhancement Technology Based on MAC (Abstract)
UCGS: A Usage Control Approach for Grid Services (Abstract)
Trusted Computing Enabled Access Control for Virtual Organizations (Abstract)
A Protecting Protocol of Mobile Agent Integrity (Abstract)
An Improved Trust Negotiation Protocol with Hidden Credentials (Abstract)
A High-Efficiency Intrusion Prediction Technology Based on Markov Chain (Abstract)
Ad Hoc Networks Security Mechanism Based on CPK (Abstract)
Group Oriented Secure Routing Protocol of Mobile Agents (Abstract)
Anonymous Agent with Anonymous Itinerary (Abstract)
Characteristic Analysis of Virus Spreading in Ad Hoc Networks (Abstract)
Secure Vault: An Intrusion Prevention Model for Ender-Users (Abstract)
The Communication Protocol for Wireless Sensor Network about LEACH (Abstract)
A Formulation for Ideal Signature Functionality and Its Realization (Abstract)
A Method on Detecting Unpredictability of Chaotic Signal (Abstract)
A New Mechanism for Trusted Code Remote Execution (Abstract)
Fair E-Cash System without Trustees for Multiple Banks (Abstract)
Security in E-Commerce and the Economics of Immediate Satisfaction (Abstract)
A Modified GJR-GARCH Model with Information Disseminating Speed (Abstract)
A Fast Algorithm Based on Tabled SAE Reuse (Abstract)
A Novel Conditional Access Architecture for TV Service Protection (Abstract)
Trust-Contexts Modeling, Organization and Trust Estimation on the Web (Abstract)
Detecting Malicious Witness Reports in Multi-agent Systems (Abstract)
Searching for the Classification Concept in WCO (Abstract)
A Research on the Steganography Capacity of the Reed-Solomon Codes (Abstract)
Text Information Hiding Based on Part of Speech Grammar (Abstract)
Watermarking 3D Meshes Based on Fixed Spectral Basis (Abstract)
DCT-Based Video Watermarking Transcoding Technique (Abstract)
Passphrase with Semantic Noises and a Proof on Its Higher Information Rate (Abstract)
Forward-Secure Public-Key Encryption Scheme with Tamper Evidence (Abstract)
Content Dependent Image Watermarking Using Chaos and Robust Hash (Abstract)
A Robust Dual Digital-Image Watermarking Technique (Abstract)
Steganalysis Based on Lifting Wavelet Transform for Palette Images (Abstract)
Moving Targets Detection and Tracking Based on Nonlinear Adaptive Filtering (Abstract)
A New Blind Signature and Threshold Blind Signature Scheme from Pairings (Abstract)
Double Secret Keys and Double Random Numbers Authentication Scheme (Abstract)
Efficient Identity Authentication Protocol and Its Formal Analysis (Abstract)
ID-Based Authenticated Blind Signature Scheme from Bilinear Pairings (Abstract)
Cryptanalysis and Improvement on an Threshold Key Issuing Protocol (Abstract)
A Schema of Automated Design Security Protocols (Abstract)
An Efficient Group Key Agreement Protocol from Bilinear Pairings (Abstract)
An Improvement of Authentication Test for Security Protocol Analysis (Abstract)
A Verifiable Multi-secret Sharing Scheme (VMSS) (Abstract)
Unambiguous Measurements Based Quantum Cryptography (Abstract)
SPUC: Security Protocol for Ubiquitous Computing (Abstract)
A Proxy Blind Signature Scheme with Proxy Revocation (Abstract)
Efficient Secure Group Signature Scheme with Revocation (Abstract)
An Efficient Group Signature Scheme without Random Oracles (Abstract)
Multi-secret Sharing Threshold Visual Cryptography Scheme (Abstract)
Restricted-Verifier Precise Bounded-Concurrent Zero-Knowledge (Abstract)
An Improved Quick Algorithm for Aligning DNA/RNA Sequences (Abstract)
Traffic Forecasting Based on Chaos Analysis in GSM Communication Network (Abstract)
Platform Technology of Web Services-Oriented DCS Data Exchanging (Abstract)
Model-Based Fault Diagnosis for the Spacecraft Power System (Abstract)
A Novel RED Scheme with Preferential Dynamic Threshold Deployment (Abstract)
New Temporal Error Concealment Method for H.264 Based on Motion Strength (Abstract)
Speech Quality of IEEE 802.11b and 802.11g Wireless LANs (Abstract)
Automatic Generating Test Cases for Testing Web Applications (Abstract)
A Metadata Configuration Model for Component-Based Software Integration Testing (Abstract)
The Research of Broken Filaments Detection Device on Viscose Filament Yarn (Abstract)
Study on Wuhan Railway Transit Project Information System (Abstract)
Application of Three-Dimensional Visualization in Landscape Planning (Abstract)
Network Forensic Computing Based on ANN-PCA (Abstract)
Time Bounding Event Reasoning in Computer Forensic (Abstract)
Author Index (PDF)