The Community for Technology Leaders
2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (2007)
Haier International Training Center, Qingdao, China
July 30, 2007 to Aug. 1, 2007
ISBN: 0-7695-2909-7
TABLE OF CONTENTS
Introduction

Committee Members (PDF)

pp. xviii

Keynote 1 (PDF)

pp. xxiii

Keynote 2 (PDF)

pp. xxiv
Papers

Lifetime Optimized Methods of Correlated Data Gathering on Sensor Networks (Abstract)

Jizhou Luo , Harbin Institute of Technology, China
Wei Zhang , Harbin Institute of Technology, China
Shengfei Shi , Harbin Institute of Technology, China
Xun Zhou , Harbin Institute of Technology, China
pp. 3-8

A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP (Abstract)

Liusheng Huang , University of Science and Technology of China
Hong Zhong , Anhui University, China
Ruanhua Shi , Anhui University, China
pp. 9-13

Coverage-preserving Data Gathering in Wireless Sensor Networks (Abstract)

Hongli Xu , Univ. of Science & Technology of China, China
Jumin Wu , Univ. of Science & Technology of China, China
Yang Wang , Univ. of Science & Technology of China, China
Liusheng Huang , Univ. of Science & Technology of China, China
pp. 14-19

Tasks Allocation for Real-Time Applications in Heterogeneous Sensor Networks for Energy Minimization (Abstract)

Jinghua Zhu , Harbin Institute of Technology, China
Jianzhong Li , Harbin Institute of Technology, China
Hong Gao , Harbin Institute of Technology, China
pp. 20-25

Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks (Abstract)

Xiaobo Fan , Renmin University of China; MOE
Yongxuan Lai , Renmin University of China; MOE
Tingting Xie , Renmin University of China; MOE
Hong Chen , Renmin University of China; MOE
pp. 26-31

A service-based Workflow Model for Virtual Enterprise (Abstract)

Wu Shaofei , HuaZhong University of Science & Technology, China
Wei Siying , WuHan Institute of Technology, China
Zhang Jinlong , HuaZhong University of Science & Technology, China
pp. 32-36

An Approach for Web Services Composition Based on QoS and Discrete Particle Swarm Optimization (Abstract)

Zhen-wu Wang , China University of Petroleum, China
Ming Chen , China University of Petroleum, China
pp. 37-41

A Web service discovery algorithm based on dynamic composition (Abstract)

Fu zhi Zhang , Yanshan University, China
Yan Wang , Yanshan University, China
Lin Wang , Yanshan University, China
pp. 42-46

Fuzzy Integrative Performance Evaluation for Supply Chain System (Abstract)

Jianhua Yang , Shandong Institute of Business and Technology, China
pp. 47-52

A Novel Method for Moving Object Detection in Foggy Day (Abstract)

Heqin Zhou , University of Science and Technology of China
Gong Chen , University of Science and Technology of China
Jiefeng Yan , University of Science and Technology of China
pp. 53-58

The Wavelet-based Contourlet Transform for Image Fusion (Abstract)

Zong-gui Zhao , China Electronics Technology Group Corporation, China
Lei Tang , PLA University of Science and Technology, China; Nanjing Army Command College, China
pp. 59-64

Multilevel Minimum Cross Entropy Threshold Selection Based on Quantum Particle Swarm Optimization (Abstract)

Kanwei Wang , Northwestern Polytechnical University, China
Yong Zhao , Northwestern Polytechnical University, China
Hui Pang , Northwestern Polytechnical University, China
Zongde Fang , Northwestern Polytechnical University, China
pp. 65-69

A New Model of Printer Color Management Based on Legendre Neural Network (Abstract)

Li Xinwu , Jiangxi University of Finance and Economics, China
pp. 70-74

A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGs (Abstract)

Xiang-bin Shi , Shenyang Institute of Aeronautical Engineering, China
Liu Fang , Liaoning University, China
Xing Yuan-sheng , Liaoning University, China
Du Ling , Liaoning University, China
Chen Xiao-hong , Liaoning University, China
pp. 75-80

Research on adaptive Error Concealment for Video Transmission over Packet-lossy Channel (Abstract)

Cai Shuting , Guangdong University of Technology, China
Xie Yun , Guangdong University of Technology, China
Yin Ming , Guangdong University of Technology, China
Guo Fen , South China University of Technology, China
pp. 81-85

A Novel Approach to Commercial Detection in News Video (Abstract)

Zhijian Wang , Hohai University, China
Shijin Li , Hohai University, China
Hao Li , Hohai University, China
pp. 86-90

Automatic Audio Classification and Speaker Identification for Video Content Analysis (Abstract)

Jie Chen , Beijing University of Posts and Telecommunications, China
Min-Min Zhou , Beijing University of Posts and Telecommunications, China
Zhi-Qiang Jia , Beijing University of Posts and Telecommunications, China
Rui Chen , Beijing University of Posts and Telecommunications, China
Jing Bi , Beijing University of Posts and Telecommunications, China
Shu-Chang Liu , Beijing University of Posts and Telecommunications, China
pp. 91-96

Identifying Code for Directed Graph (Abstract)

Yi-Chun Xu , China Three Gorges University, China
Ren-Bin Xiao , China Three Gorges University, China
pp. 97-101

Examination of Processing Load in Applying DACS Scheme to Practical Network (Abstract)

Masaharu Tadauchi , Toyota Technological Institute, Japan
Naohiro Ishii , Aichi Institute of Technology, Japan
Kazuya Odagiri , Aichi Institute of Technology, Japan
Rihito Yaegashi , Shibaura Institute of Technology, Japan
pp. 102-107

Hop-Distance Algorithm for Self-Localization of Wireless Sensor Networks (Abstract)

Dali Zhao , Northeastern University, China
Yunhui Men , Northeastern University, China
Linliang Zhao , Northeastern University, China
pp. 108-112

Internet Applications Usage Accounting Based on Flow (Abstract)

Zhenqi Wang , North China Electric Power University, China
Jin Liu , North China Electric Power University, China
pp. 113-116

The Research on the Construct Technology of the Test System Based on the Network (Abstract)

Meng Chen , Ordnance Engineering College, China
Qian Feng , Ordnance Engineering College, China
pp. 117-122

A Hybrid and Efficient Scheme of Multicast Source Authentication (Abstract)

Jin-xin He , Jilin University, China
Gao-chao Xu , Jilin University, China
Xiao-dong Fu , Jilin University, China
Zhi-guo Zhou , Jilin University, China; Northeast Normal University, China
pp. 123-125

Identity-Based Cryptography for Grid (Abstract)

Shixin Sun , University of Electronic Science and Technology, China
Hongwei Li , University of Electronic Science and Technology, China
pp. 132-137

A note on homogeneous bent functions (Abstract)

Yubing Zang , Shandong TV University, China
Xiaolin Wang , Anhui University of Technology, China
Jianqin Zhou , Anhui University of Technology, China
pp. 138-142

Wide-w-NAF Method for Scalar Multiplication on Koblitz Curves (Abstract)

Ming Li , Shandong University, China
Daxing Li , Shandong University, China
Baodong Qin , Shandong University, China
Fanyu Kong , Shandong University, China
pp. 143-148

Non-Functional Attributes Modeling in Software Architecture (Abstract)

Zhang Yang , Hebei University of Engineering, China
Zhang Jingjun , Hebei University of Engineering, China
Li Furong , Hebei University of Engineering, China
Wang Liguo , Hebei University of Engineering, China
pp. 149-153

An Architecture for Software Systems with Time Constraints (Abstract)

Li Xu , Fujian Normal University, China
Jianmin Jiang , Fujian Normal University, China
Hongping Shu , Chengdu University of Information, China
pp. 154-159

Agent-oriented Petri Net based Modeling of Dynamic Behavior for Wide-area Backup Protection (Abstract)

Xiaoru Wang , Southwest Jiaotong University, China
Xiaoyang Tong , Southwest Jiaotong University, China
pp. 160-165

A Component-based Framework for Embedded Digital Instrumentation Software with Design Patterns (Abstract)

Xia Yixing , Zhejiang University, China
Chen Yaowu , Zhejiang University, China
pp. 166-170

What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code (Abstract)

Liang Yong-Quan , Shandong University of Science and Technology, China
Li Shen-Yuan , Shandong University of Science and Technology, China
Fang Sheng , Shandong University of Science and Technology, China
pp. 171-176

Machine-Vision-Based Measurement of BGA Connector Solder Balls (Abstract)

Gao Jun , Shanghai Institute of Technology, China
pp. 177-180

A Method for Blind Detection of OFDM Signal Based on Power Spectrum Reprocessing (Abstract)

Hai-ying Zhang , Beijing University of Posts and Telecommunications, China
Chao-wei Yuan , Beijing University of Posts and Telecommunications, China
pp. 181-186

Study on Statistics Iterative Thresholding Segmentation Based on Aviation Image (PDF)

Maiyu Zhou , Aviation University of Air Force, China
Yongtian Chen , Aviation University of Air Force, China
Zhonglin Xu , Aviation University of Air Force, China
Guang Yang , Aviation University of Air Force, China
Kexiong Chen , Aviation University of Air Force, China
pp. 187-188

Improved Image Coding Algorithm Based on Embedded Zerotree (Abstract)

Kuang Guijuan , Laiyang Agriculture University, China
Liu Fuheng , Laiyang Agriculture University, China
Yi Xiu , Shandong Cadre, China
Liu Xuhong , Beijing Institute of Machinery, China
pp. 189-192

Biswapped Networks and Their Topological Properties (Abstract)

Mingxin He , South China University of Technology, China
Weidong Chen , South China University of Technology, China; South China Normal University, China
Wenjun Xiao , South China University of Technology, China
Behrooz Parhami , University of California, Santa Barbara, USA
Wenhong Wei , South China University of Technology, China
pp. 193-198

A Scalable Search Algorithm on Unstructured P2P Networks (Abstract)

Jian Liu , Yanshan University, China
Chunxia Yin , Yanshan University, China
Fuyong Yuan , Yanshan University, China
pp. 199-204

Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal Logic (Abstract)

Zhengyuan Ning , Fujian Agriculture and Forestry University, China
Shanli Hu , Fuzhou University, China
Xianwei Lai , Fujian Agriculture and Forestry University, China
Qingqing Zhan , Fuzhou University, China
pp. 205-210

Matrix Multiplication on the Biswapped-Mesh Network (Abstract)

Wenhong Wei , South China University of Technology, China
Wenjun Xiao , South China University of Technology, China
pp. 211-215

Integrated Agent and Semantic P2P Grid Resource Discovery Model (Abstract)

Dairong Yu , University of Science and Technology Beijing, China
Xuemin Zhang , Xiaogan University, China
Li Liu , University of Science and Technology Beijing, China
Zenggang Xiong , University of Science and Technology Beijing, China; Xiaogan University, China
Yang Yang , University of Science and Technology Beijing, China
pp. 216-220

An algorithm of job shop rolling scheduling based on singular rough sets (Abstract)

Yongmei Hu , Shandong University, China
Qiqiang Li , Shandong University, China
Lei Jia , Shandong University, China
Yanan Fu , Shandong University, China
pp. 221-225

Research on the Knowledge-based Decision Support System for the Safety of Rockets (Abstract)

Wei Li , Chongqing Jiaotong University, China
pp. 226-231

A Hybrid Model for Computational Morphology Application (Abstract)

Xu Yang , Peking University, China
Wang Hou-feng , Peking University, China
pp. 232-237

Power Consumption Forecast by Combining Neural Networks with Immune Algorithm (Abstract)

Yang Shuxia , North China Electric Power University, China
pp. 238-241

Arithmetic Computing Based Chinese Automatic Parsing Method (Abstract)

Jiancheng Wan , Shandong University, China
Ling Zhang , Shandong University, China
Xiao Yang , Shandong University, China
pp. 242-247

Prediction of R in Sinter Process based on Grey Neural Network Algebra (Abstract)

Song Qiang , Anyang Institute of Technology
Wang Ai-min , Wuhan University of Technology, China; Anyang Normal University
pp. 248-252

Research on Ant Colony Neural Network PID Controller and Application (Abstract)

Guo Xiaofeng , Shenyang University of Technology, China
Liu Yang , Shenyang University of Technology, China
Cao Chengzhi , Shenyang University of Technology, China
pp. 253-258

Design and Implementation of Wireless Computational Grid based on JavaSpace (Abstract)

Wen Bin , Jingchu University of Technology, China
Liu Chang-qing , Jingchu University of Technology, China
pp. 259-261

ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks (Abstract)

Jianhua Li , Shanghai Jiao Tong University, China
Linchun Li , Shanghai Jiao Tong University, China
Ling Tie , Shanghai Jiao Tong University, China
Jun Pan , Shanghai Jiao Tong University, China
pp. 262-267

Distributed Key Establishment Scheme in Wireless Sensor Network (Abstract)

Pei Shi-Hui , Jilin University, China
Zhao Hong-Wei , Jilin University, China
Liu Ping-Ping , Jilin University, China
pp. 268-273

Application and Analysis of Time Domain Cross Correlation for Traffic Flow Speed Measurement (Abstract)

Xi Chen , Fudan University, China
Lichao Wang , Fudan University, China
Qiyong Lu , Fudan University, China
pp. 274-279

Improvements on MB-layer Rate Control Scheme for H.264 video Using complexity estimation (Abstract)

Guo Fen , South China University of Technology, China
Cai Shuting , Guangdong University of Technology, China
Yin Ming , Guangdong University of Technology, China
Xie Yun , Guangdong University of Technology, China
pp. 280-284

Improving Blind Equalization Algorithm for Wireless Communication Systems (Abstract)

Ying He , Henan Business College, China
Lijun Sun , Henan University of Technology, China
pp. 285-288

Edge Detection of Images based on Fuzzy Cellular Automata (Abstract)

Ke Zhang , North China Electric Power University, China
Xiao-Ou Zhao , Agricultural University of Hebei, China
Zhong Li , North China Electric Power University, China
pp. 289-294

Motion Vector Data Decoding Using Spatial-Temporal Source Redundancy (Abstract)

Mengmeng Zhang , North China University of Technology, China
Changnian Zhang , North China University of Technology, China
Shumin Zhou , Chinese Academy of Sciences, China
Yuehai Wang , North China University of Technology, China
pp. 295-298

KZCAN: A Kautz Based Content-Addressable Network (Abstract)

Baoxiang Cao , Qufu Normal University, China
Jiguo Yu , Qufu Normal University, China
Li Zhao , Qufu Normal University, China
Jingjing Song , Qufu Normal University, China
Wenjun Liu , Qufu Normal University, China
pp. 299-304

Study on Non-FIFO Arc in Time-Dependent Networks (Abstract)

Han Pingyang , Academy of Military Transportation PLA, China
Luo Wuming , Institute of Military Transportation, China
pp. 305-310

Research on an Integrated Network Management System (Abstract)

Yi Du , Command Communications Academy, China
Lianxing Jia , Command Communications Academy, China
Chenggong Zhai , Command Communications Academy, China
Wei Zhu , Command Communications Academy, China
pp. 311-316

The Computer Bracket Pressure Monitor System of Fully Mechanized Coalface in Coal Mine Based on CAN Bus (Abstract)

Xiang-hong Yan , Shan Dong University of Science and Technology, China
Zhang Yong , Shan Dong University of Science and Technology, China; Tai Shan Medical College, China
Zhu Hong-mei , Shan Dong University of Science and Technology, China; Shan Dong Agricultural University, China
Song Yang , Shan Dong University of Science and Technology, China
pp. 317-322

A Framework for Reliability Computation of the IP Network (Abstract)

Tao Yu , Beijing University of Posts and Telecommunications, China
Yuhong Li , University of Posts and Telecommunications, China
Shanzhi Chen , China Academy of Telecommunication Technology, China
Xin Li , University of Posts and Telecommunications, China
Zhen Qin , Institute of China electronic system engineering corp, China
Ming Ai , China Academy of Telecommunication Technology, China
pp. 323-327

Numerical Solution of A Type of Nonlinear Parabolic Equations (Abstract)

Wei Gu , University of Science and Technology, China
Lili Wang , Qingdao Technical University, China
pp. 328-333

Positive Solutions of m-point Conjugate Boundary Value Problems (Abstract)

Jianming Zhang , Taiyuan University of Technology, China
Shuli Wang , Taiyuan University of Technology, China
pp. 334-338

Existence of Nonoscillatory Solution for Second Order Nonlinear Neutral Delay Differential Equation (Abstract)

Jinzhu Zhang , North University of China
Zhen Jin , North University of China
Huimin Zhang , North University of China
pp. 339-342

Two Dimensional Pattern Formation of Prey-predator System (Abstract)

Hongxia Shen , North University of China
Zhen Jin , North University of China
pp. 343-346

Quantum network based on multiparty quantum secret sharing (Abstract)

Bingquan Chen , Qingdao University of Technology, China
Hongyang Ma , Qingdao University of Technology, China
pp. 347-351

Quantum Information Security Protocols and Quantum Coding Theory (Abstract)

Zhi Ma , Information Engineering University, China
Xin Lü , State Information Center, China
pp. 352-356

P2P Trust Model: The Resource Chain Model (Abstract)

Sinjae Lee , Towson University, USA
Shaojian Zhu , Towson University, USA
Yanggon Kim , Towson University, USA
pp. 357-362

Network Protocols Analyzing by an Environmental Bisimulation Method (Abstract)

Min Gan , Zhejiang Water Conservancy and Hydropower College, China
Guoying Yue , Zhejiang Water Conservancy and Hydropower College, China
Hongfa Wang , Zhejiang Water Conservancy and Hydropower College, China
pp. 363-367

A Rapid Grouping Aggregation Algorithm Based on the Multi-Dimension Hierarchical Encoding (Abstract)

Kong-fa Hu , Southeast University, China; Yangzhou University, China
Zhen-zhi Gong , Southeast University, China
Qing-li Da , Southeast University, China
pp. 368-373

Obtaining Fuzzy Control Query Table by Data Mining (Abstract)

Gao Jun , Shanghai Institute of Technology, China
pp. 374-378

Coal Thickness Prediction Based on Support Vector Machine Regression (Abstract)

Xia Shixiong , China University of Mining and Technology, China
Xia Zhanguo , China University of Mining and Technology, China
Niuqiang , China University of Mining and Technology, China
Li Zhengwei , China University of Mining and Technology, China
pp. 379-383

BDA information management and decision support based on DW (Abstract)

Chen Li , Ordnance Engineering College, China
Ma Zhi-jun , Ordnance Engineering College, China
Zhang Yi-zhen , PLA 71345 army, China
pp. 384-387

Battle Damage Assessment based on Bayesian Network (Abstract)

Shi Quan , Ordnance Engineering College, China
Li Bin , Ordnance Engineering College, China
Ma Zhi-jun , Ordnance Engineering College, China
pp. 388-391

Infrared Point Target Detection and Tracking Based on DSP (Abstract)

Zhang Xiao-lin , Jilin University, China
Qi Yi-ming , Jilin University, China
Zhao Hong-wei , Jilin University, China
pp. 392-394

Intelligent Window Based on Embedded System (Abstract)

Jingwen Tian , Beijing Union University, China; Beijing University of Chemical Technology
Meijuan Gao , Beijing Union University, China; Beijing University of Chemical Technology
Jin Li , Beijing University of Chemical Technology
pp. 395-399

Dependable distributed embedded system assessment platform design (Abstract)

Zhu Yingying , Shenzhen University, China
Liang XiaoFeng , Shenzhen University, China
Qiang Huang , Shenzhen University, China
pp. 400-405

Application of Embedded System in Construction Machinery (Abstract)

Yuan Zhou , Jilin University, China
Ming-shan Liu , Jilin University, China
pp. 406-411

A Web Services Based Email Extension for Remote Monitoring of Embedded Systems (Abstract)

Tingting Fu , Hangzhou Dianzi University, China
Peng Liu , Hangzhou Dianzi University, China
Guojun Dai , Hangzhou Dianzi University, China
pp. 412-416

Mining User's Interest from Reading Behavior in E-learning System (Abstract)

Yongquan Liang , Shandong University of Science and Technology, China
Qingtian Zeng , Shandong University of Science and Technology, China
Zhongying Zhao , Shandong University of Science and Technology, China
pp. 417-422

An Approach to Build Accessible Grid Service (Abstract)

Wang Yue-Xuan , Tsinghua University, China
Yin Jie , Tsinghua University, China
Wu Cheng , Tsinghua University, China
pp. 423-428

A Research for Quality Preservation Methodology for SOA Environment (Abstract)

Gwyduk Yeom , The University of Seoul, Korea
Youngkon Lee , Korea Polytechnic University, Korea
pp. 429-434

Study on Classification Algorithm of Multi-subject Text (Abstract)

Yu-ping Qin , Dalian University of Technology, China; Bohai University, China
Qing Ai , Bohai University, China
Xiu-kun Wang , Dalian University of Technology, China
Xiang-na Li , Bohai University, China
pp. 435-438

Survey of Public Key Digital Watermarking Systems (Abstract)

Jiangbo Du , Xiamen University of Technology, China
Rongsheng Xie , Xiamen University of Technology, China
Chunguang Li , Xiamen University of Technology, China
Keshou Wu , Xiamen University of Technology, China
pp. 439-443

An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence (Abstract)

Zhuang Xiao-dong , Qingdao University, China
Chen Zhuo , Qingdao University of Science and Technology, China
Liu Xiang-shuang , Hisense Mobile Technology Ltd., China
pp. 444-449

The application of particle swarm optimization algorithm in training Forward Neural Network (Abstract)

Shu-hua , Neusoft Institute in Dalian of Information, China
Song Shao-zhong , Jilin University, China
Zhang Li-biao , Jilin University, China
pp. 455-457

Studies on CAD Systems with Artificial Intelligence (Abstract)

Jun Wang , Yanshan University, China
Sun Huixue , Yanshan University, China
pp. 458-463

Research on Detecting Method of Submarine Oil Pipelines Corrosion Degree Based on Chaos Genetic Algorithm Neural Network (Abstract)

Meijuan Gao , Beijing Union University, China; Beijing University of Chemical Technology, China
Kai Li , Beijing University of Chemical Technology, Chin
Jingwen Tian , Beijing Union University, China; Beijing University of Chemical Technology, China
pp. 464-469

Low Dimensional Simplex Evolution--A Hybrid Heuristic for Global Optimization (Abstract)

Changtong Luo , Jilin University, China
Bo Yu , Dalian University of Technology, China
pp. 470-474

An Enhancement Dynamic Contract Net Protocol (Abstract)

Jun-Yan Yan , Guangxi University, China
Yun-Peng Ou , Guangxi University, China
Zhao-Wen Wei , Guangxi University, China
pp. 475-480

Study on The Property of Training Samples and Learning Space with Genetic Algorithms (Abstract)

QianSheng Fang , Anhui Institute of Architecture and Industry, China
Jingsong He , MOE, China; University of Science and Technology of China, China
Jian Tang , University of Science and Technology of China, China
pp. 481-486

Research on Lossless Image Compression Algorithms Using Fermat Number Transform (Abstract)

Cai Zhengxing , China University of Mining and Technology, China
Yang Fan , China University of Mining and Technology, China
Zhang Hong , China University of Mining and Technology, China
Wei Wei , China University of Mining and Technology, China
pp. 487-490

Maximum Variance Image Segmentation Based on Improved Genetic Algorithm (Abstract)

Su-zhen Wang , Shandong University of Science and Technology, China
Chong-ming Zhang , Shanghai Normal University, China
Jun-zhong Zou , East China University of Science and Technology, China
Chun-mei Wang , East China University of Science and Technology, China; Shanghai Normal University, China
pp. 491-494

Distortion Analysis in Scalable Image Compression Scheme based on efficient Codebook selection (Abstract)

Haroon-ur-Rashid Khan , Beijing Institute of Technology, China
Muhammad Kamran , Beijing Institute of Technology, China; University of Engineering and Technology, Pakistan
Shi Feng , Beijing Institute of Technology, China
pp. 495-500

Fusion of ICA Spatial, Temporal and Localized Features for Face Recognition (Abstract)

Chao Lu , Towson University, USA
Jiajin Lei , Towson University, USA
pp. 501-506

Local and Global Features Extracting and Fusion for Microbial Recognition (Abstract)

Liang Anbo , Lai Yang Agriculture University, China
Li Xiaojuan , Capital Normal University, China
Chen Cunshe , Beijing Technology and Business University, China
Shi Yan , Lai Yang Agriculture University, China
pp. 507-511

Distributed Parallel Algorithm For Nonlinear OptimizationWithout Derivatives (Abstract)

Guoping He , Shandong University of Science and Technology, China
Xuping Zhang , Shandong University of Science and Technology, China
Congying Han , Shanghai Jiaotong University, China
Huanqing Cui , Shandong University of Science and Technology, China
pp. 512-515

Selection of the Order of Autoregressive Models for Host Load Prediction in Grid (Abstract)

Lian Li , Lanzhou University, China
Yi Yang , Lanzhou University, China
Jiuyuan Huo , Jiao tong University, China; Lanzhou University, China
Liqun Liu , Lanzhou University, China
Li Liu , Lanzhou University, China
pp. 516-521

An Integrated Prefetching and Caching Scheme for Mobile Web Caching System (Abstract)

Sihua Tian , Chinese Academy of Sciences, China
Chen Lin , Chinese Academy of Sciences, China
Yu Huang , Chinese Academy of Sciences, China
Beihong Jin , Chinese Academy of Sciences, China
Xin Ren , Chinese Academy of Sciences, China
pp. 522-527

A Fault-Tolerant Mutual Exclusion Resource Reservation Protocol for Clustered Mobile Ad hoc Networks (Abstract)

Mahmoud Naghibzadem , Ferdowsi University of Mashhad, Iran
Mohammad Hossien Yaghmaee Moghaddam , Ferdowsi University of Mashhad, Iran
Mohammad Moallemi , Ferdowsi University of Mashhad, Iran
pp. 528-533

Time Synchronization with Extended Clock Model for Wireless Sensor Networks (Abstract)

Liming He , Beijing University of Posts and Telecommunications, China
pp. 534-539

Analysis of Communication Traffic Characteristics of Two-hop-relay Cellular System in the Dead Spots (Abstract)

Wei-feng Lu , Nanjing University of Posts and Telecommunications, China
Meng Wu , Nanjing University of Posts and Telecommunications, China
pp. 540-545

LSMR:A Label Switching Multipath Routing Protocol for Ad Hoc Networks (Abstract)

Tianhang Yu , Beijing Astronautics Control Center, China
Wei Rong , Beijing University of Posts and Telecommunications, China
Muqing Wu , Beijing University of Posts and Telecommunications, China
pp. 546-551

A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog Deviation (Abstract)

Xvming Shi , Guangxi Research Institute of Meteorological Disasters Mitigation, China
Long Jin , Guangxi Research Institute of Meteorological Disasters Mitigation, China
pp. 552-557

The Study of Compost Quality Evaluation Modeling Method Based on Fuzzy Neural Network for Sewage Treatment (Abstract)

Jingwen Tian , Beijing Union University, China; Beijing University of Chemical Technology, China
Meijuan Gao , Beijing Union University, China; Beijing University of Chemical Technology, China
Yujuan Xiang , Beijing University of Chemical Technology, China
pp. 558-563

A Nonparametric Approach to Pricing Convertible Bond via Neural Network (Abstract)

Meiying Yang , Beijing University of Aeronautics and Astronautics, China
Liyan Han , Beijing University of Aeronautics and Astronautics, China
Wei Zhou , Beijing University of Aeronautics and Astronautics, China
pp. 564-569

A Modified SOFM Segmentation Method in Reverse Engineering (Abstract)

Xue-mei Liu , North China Institute of Water Conservancy and Hydroelectric Power, China
Xue-mei Liu , Northwestern Polytechnical University, China
Xiao-liang Bai , Northwestern Polytechnical University, China
Shu-sheng Zhong , Northwestern Polytechnical University, China
pp. 570-573

Automatic Text Summarization Based on Lexical Chains and Structural Features (Abstract)

Jia Ma , The University of Tokushima, Japan
Shingo Kuroiwa , The University of Tokushima, Japan
Lei Yu , The University of Tokushima, Japan
Fuji Ren , The University of Tokushima, Japan; Beijing University of Posts and Telecommunications, China
pp. 574-578

Hybrid Application On Job-Shop Scheduling by Genetic Algorithm and MAS Spring-Net (Abstract)

Dong Yumin , Qingdao Technological University, China
Xiao Shufen , Qingdao Technological University, China
pp. 579-584

Parallel analysis of polymorphic viral code using automated deduction system (Abstract)

Ruo Ando , National Institute of Information and Communication Technology, Japan
pp. 585-592

A Double Level Granularity for Multimedia on Demand System (Abstract)

Xiaoguang Liu , Nankai University, China
Jing Liu , Nankai University, China
Gang Wang , Nankai University, China
pp. 593-596

Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids (Abstract)

Xiaohu Liu , Huazhong Univ. of Sci. and Tech., China
Yinghui Zhao , Huazhong Univ. of Sci. and Tech., China
Cheng Wang , Huazhong Univ. of Sci. and Tech., China
Congfeng Jiang , Huazhong Univ. of Sci. and Tech., China
pp. 597-602

Numerical Simulation of a Difference Scheme Applied in Image Processing Based on Four-Order PDEs (Abstract)

Hui Liu , Qingdao Technological University, China
Yan Wang , Qingdao Technological University, China
Lijie Zhang , Qingdao Technological University, China
pp. 603-605

Recognizing Humans Based on Gait Moment Image (Abstract)

Jianfeng Qiu , Zhejiang University, China
Qinyong Ma , Zhejiang University, China
Shenkang Wang , Zhejiang University, China
Dongdong Nie , Shanghai Jiao Tong University, China
pp. 606-610

Phase Unwrapping Algorithm for 3D Reconstruction (Abstract)

H. Zhang , Armstrong Atlantic State University, USA
X. Y. Su , Sichuan University, China
H. Su , Armstrong Atlantic State University, USA
pp. 611-615

A Tristate Approach Based on Weighted Mean and Backward Iteration (Abstract)

Yanhua Ma , Qingdao University of Science and Technology, China
Chuanjun Liu , Hisense Mobil Communications Technology Corporation, China
Haiying Sun , Qingdao University of Science and Technology, China
pp. 616-621

Multifractal and R/S Analysis of Protein Structure (Abstract)

Zheng Tingting , Anhui University, China
Song Jie , Anhui University, China
Mao Junjun , Anhui University, China
Cheng Jiaxing , Anhui University, China
pp. 622-626

Quality Assessment of Beef Based of Computer Vision and Electronic Nose (Abstract)

Chen Cunshe , Beijing Technology and Business University, China
Li Xiaojuan , Capital Normal University, China
Yuan Huimei , Capital Normal University, China
pp. 627-631

Double Unmanned Aerial Vehicle's Path Planning for Scout via Cross-Entropy Method (Abstract)

Jianguo Shi , Northwestern Polytechnical University, China
Zhengsheng Li , Northwestern Polytechnical University, China
Jinquan Wang , Northwestern Polytechnical University, China
Xiaoguang Gao , Northwestern Polytechnical University, China
pp. 632-635

A PACA-Based Multicast Routing Algorithm (Abstract)

Xia Sun , Henan University of Technology, China
Ziqiang Wang , Henan University of Technology, China
Dexian Zhang , Henan University of Technology, China
pp. 636-639

A Formal Approach to Specifying Architecture Aspects and Their Weaving Logic (Abstract)

Jiancheng Wan , Shandong University, China
Chunhua Yang , Shandong University, China; Shandong Institute of Light Industry, China
pp. 640-645

A Lightweight Value-based Software Architecture Evaluation (Abstract)

Chang-Ki Kim , ETRI, Korea
Jongmoon Baik , Information Communications University, Korea
Dan-Hyung Lee , Information Communications University, Korea
In-Young Ko , Information Communications University, Korea
pp. 646-649

Mapping Software Design Changes to Source Code Changes (Abstract)

Tie Feng , Jilin University, China
Xiangchen Tan , Jilin University, China
Jiachen Zhang , Jilin University, China
pp. 650-655

The Management and Validation of Business Rules in Telecom Operator's Settlement and Apportion System (Abstract)

Biying Lin , North China Electric Power University, China
Yanhui Zhang , North China Electric Power University, China
pp. 656-661

A Scalable Peer-to-Peer Overlay for Applications with Time Constraints (Abstract)

Bo Liu , Huazhong University of Sci and Tech, China
Yansheng Lu , Huazhong University of Sci and Tech, China
pp. 662-667

The Research of Local Area Storage Grid System (Abstract)

Peihe Tang , Guangxi University of Technology, China
Hao Liu , Guangxi University of Technology, China
pp. 668-672

A New Double Scheduling DBA Algorithm for Next Generation Access Network (Abstract)

Wei Chen , Zhejiang University, China
Jingtao Song , Zhejiang University, China
Hanyang Lu , Zhejiang University, China
Jinan Leng , Zhejiang University, China
pp. 673-678

Organization Technology in Mobile Peer-to-peer Network Based on Mobile Unit (Abstract)

Lin-lin Ci , Beijing Institute of Technology, China
Ye Liang , Beijing Institute of Technology, China
pp. 679-682

Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop Network (Abstract)

Junde Song , Beijing University of Posts and Telecommunications, China
Junli Xu , Shandong Jianzhu University, China
Wenan Zhou , Beijing University of Posts and Telecommunications, China
Xiuhua Fu , Shandong University of Technology, China; Beijing University of Posts and Telecommunications, China
pp. 683-688

A Policy-Based Energy Efficient Clustering Scheme for Wireless Sensor Networks (Abstract)

Min Xiao , Huazhong Normal University, China
Debao Xiao , Huazhong Normal University, China
Gaolin Chen , Fujian Normal University, China
pp. 689-694

An Adaptive Counter Propagation Network (Abstract)

Xiaoying Tai , Ningbo University, China
Yihong Dong , Ningbo University, China; Zhejiang University, China
Chao Sun , Ningbo University, China
pp. 695-700

A Dyeing Color Matching Method Combining RBF Neural Networks with Genetic Algorithms (Abstract)

Bing-sen Zhang , Qingdao University, China
Ai-song Shi , Qingdao University, China
Hai-tao Li , Ocean University of China
pp. 701-706

Aerodynamic Parameter Fitting Based on Robust Least Squares Support Vector Machines (Abstract)

Hongcai Zhang , Northwestern Polytechnical University, China
Chao Shi , Northwestern Polytechnical University, China
Xusheng Gan , Northwestern Polytechnical University, China
Yongmei Cheng , Northwestern Polytechnical University, China
pp. 707-711

Efficient Partially Blind Signature from LFSR (Abstract)

Kefei Chen , Shanghai Jiaotong University, China
Zheng Gong , Shanghai Jiaotong University, China; Graduate School of Chinese Academy of Sciences, China
Yu Long , Shanghai Jiaotong University, China
pp. 717-722

An Approach to Convert Any Threshold Signature into a Threshold Group Signature (Abstract)

Rupeng Li , Shandong University, China
Jia Yu , Qingdao University, China
Daxing Li , Shandong University, China
Guowen Li , Shandong University, China
pp. 723-726

A Study of Secure Multi-party Ranking Problem (Abstract)

Wen Liu , Beijing University of Posts and Telecommunications, China
Ping Chen , Beijing University of Posts and Telecommunications, China
Shou-Shan Luo , Beijing University of Posts and Telecommunications, China
pp. 727-732

A Survey on Failure Prediction of Large-Scale Server Clusters (Abstract)

Siyuan Ma , Xi'an Jiaotong University, China
Xiaoshe Dong , Xi'an Jiaotong University, China
Weiqing Dong , Xi'an Jiaotong University, China
Zhenghua Xue , Xi'an Jiaotong University, China
pp. 733-738

Alert Verification Based on Attack Classification in Collaborative Intrusion Detection (Abstract)

Min Xiao , Huazhong Normal University, China
Debao Xiao , Huazhong Normal University, China
pp. 739-744

A Hybrid Parallel Algorithm for Complex Decision Problem Optimization (Abstract)

Yan Luo , Shanghai Jiao Tong University, China
Changrui Yu , Shanghai University of Finance and Economics, China
pp. 745-750

Eliminating Redundant Communication of Code Generation for Distributed Memory Machines (Abstract)

Lei Wang , Beijing University of Aeronautics & Astronautics, China
Rong Cai Zhao , National Digital Switching System Engineering & Technological R&D Center, China
Ya Nan Shen , National Digital Switching System Engineering & Technological R&D Center, China
pp. 751-756

Equivalence of the Oscillation of Two Coupled Difference Systems (Abstract)

X. Y. Zeng , Naval Aeronautical Engineering Institute, China
pp. 757-761

On the Higher Order Difference Equation x_{n+1} = (x_{n-k+1})/(-1+x_{n}x_{n-1}...x_{n-k+1}) (Abstract)

X. Y. Zeng , Naval Aeronautical Engineering Institute, China
D. C. Zhang , Naval Aeronautical Engineering Institute, China
L. Y. Wang , Naval Aeronautical Engineering Institute, China
pp. 762-765

Periodic Growing of Two Populations Intergrowth System (Abstract)

Ying Gao , Yanbei Normal University, China
pp. 766-769

Positive solutions of m-point boundary value problems for second order differential equations with an advanced argument (Abstract)

Changlong Yu , Hebei University of Science and Technology, China
Yunhai Wang , Hebei University of Science and Technology, China
Yanping Guo , Hebei University of Science and Technology, China
pp. 770-773

Analysis of Source Codes Created by Beginners in Programming Education (Abstract)

Naohiro Ishii , Aichi Institute of Technology, Japan
Chieko Matsuyama , Sugiyama Jogakuen University, Japan
Toyoshiro Nakashima , Sugiyama Jogakuen University, Japan
pp. 774-781

Tailoring Software Evolution Process (Abstract)

Fei Dai , Yunnan University, China
Tong Li , Yunnan University, China
pp. 782-787

Research on Visualization Techniques for Web Usability Analysis (Abstract)

Jianli Duan , Qingdao Technological University, China
Ning Zhang , Dalian Maritime University, China
pp. 788-791

Image Denoising Based on MORF and Minimization Total Variation (Abstract)

Chengwu Lu , Chongqing University of arts and sciences, China; Xidian University, China
pp. 792-796

Improvement of PageRank for Focused Crawler (Abstract)

Fuyong Yuan , Yanshan University, China
Jian Liu , Yanshan University, China
Chunxia Yin , Yanshan University, China
pp. 797-802

Generalized Association Rule Mining Algorithms based on Data Cube (Abstract)

Zhang Hong , China University of Mining and Technology, China
Cai Zheng-Xing , China University of Mining and Technology, China
Kong Ling-Dong , China University of Mining and Technology, China
Zhang Bo , China University of Mining and Technology, China
pp. 803-808

Advances of Research in Fuzzy Integral for Classifiers' fusion (Abstract)

Zixing Cai , Central South University, China
Zhizhou Kong , Hunan University, China
pp. 809-814

An Efficient K-means Clustering Algorithm Based on Influence Factors (Abstract)

Mingwei Leng , Shangrao Normal College, China
Haitao Tang , Shangrao Normal College, China
Xiaoyun Chen , Lanzhou University, China
pp. 815-820

Research on Distributed E-Commerce System Architecture (Abstract)

Xu Zhao , China University of Ming and Technology, China
Zhang Ling , China University of Ming and Technology, China
Xia Yang , China University of Ming and Technology, China
Zhang Qiang , China University of Ming and Technology, China
pp. 821-825

A Policy-Based Framework for Designing Strategies for Service Negotiation (Abstract)

Hua-mao Gu , Zhejiang Gongshang University, China
Yu Cheng , Zhejiang University, China
pp. 826-831

An XML-based Representation for Generic Bill of Materials (GBOM) (Abstract)

Fusheng Qiu , Harbin Institute of Technology, China
Wenjian Liu , Harbin Institute of Technology, China
pp. 832-837

Modeling Web Service Choreography and Orchestration with Colored Petri Nets (Abstract)

Xinguo Deng , Wuhan University, China
Weiqing Cheng , Wuhan University, China
Ziyu Lin , Wuhan University, China
Lina Fang , Wuhan University, China
Ling Li , Wuhan University, China
Ruliang Xiao , Wuhan University, China; Hunan Finance & Economics College, China
pp. 838-843

A New Supervised Clustering Algorithm for Data Set with Mixed Attributes (Abstract)

Shijin Li , Hohai University, China
Yuelong Zhu , Hohai University, China
Xiaohua Zhang , Hohai University, China
Jing Liu , Hohai University, China
pp. 844-849

Evaluation of High-tech Program Based on Rough Set Theory (Abstract)

Tinghuai Ma , Nanjing University of Info. & Sci. Tech., China
Meili Tang , Nanjing University of Info. & Sci. Tech., China
pp. 850-854
Author Index

Author Index (PDF)

pp. 855
104 ms
(Ver )