The Community for Technology Leaders
2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (2007)
Haier International Training Center, Qingdao, China
July 30, 2007 to Aug. 1, 2007
ISBN: 0-7695-2909-7
TABLE OF CONTENTS
Introduction

Committee Members (PDF)

pp. xxi-xxv

Keynote 1 (PDF)

pp. xxvi

Keynote 2 (PDF)

pp. xxvii
Papers

Communication Optimization Algorithms based on Extend Data Flow Graph (Abstract)

Zhao Rong-cai , National Digital Switching System, China
Xue-rong Gong , National Digital Switching System, China
Lin-sheng Lu , Jiangnan Institute of Computing Technology, China
pp. 3-8

Study on Distributing Pattern of Shared Data in CC-NUMA System (Abstract)

Guoteng Pan , National University of Defense Technology, China
Qiang Dou , National University of Defense Technology, China
Lunguo Xie , National University of Defense Technology, China
pp. 9-14

A Novel Algorithm for Load Balancing in Distributed Systems (Abstract)

Ying-Yuan Xiao , Tianjin University of Technology, China
Yun-Sheng Liu , Huazhong University of Science and Technology, China
Hua-Feng Deng , Huazhong University of Science and Technology, China
pp. 15-19

A Replication and Cache based Distributed Metadata Management System for Data Grid (Abstract)

Ke Shi , Huazhong University of Science and Technology, China
pp. 20-25

New Synchronization Scheme between Audio and Video (Abstract)

Li-feng Qi , Jilin University, China
Yan Zhao , Jilin University, China
He-xin Chen , Jilin University, China
pp. 26-29

A New Scheme for Off-line Signature Verification Using DWT and Fuzzy Net (Abstract)

Zhiqiang Ma , Shandong University, China
Yizheng Qiao , Shandong University, China
Wei Tian , Shandong University, China
pp. 30-35

A New Kind of Hybrid Filter Based on the Peak-and-Valley Filter and PCNN (Abstract)

Chuan-xu Wang , Qingdao University of Science and Technology, China
Yun Liu , Qingdao University of Science and Technology, China
Xiang-guang Zhang , Qingdao University of Science and Technology, China
pp. 36-39

Slices Mining Based on Singular Value (Abstract)

Hui Liu , Qingdao Technological University, China
Lijie Zhang , Qingdao Technological University, China
Haili Yin , Qingdao Technological University, China
pp. 40-43

ParzenWindows Estimation Using Laplace Kernel: A Novel Parametric Analysis with Information Content (Abstract)

Jian Tang , University of Science and Technology of China
QianSheng Fang , Anhui Institute of Architecture and Industry, China
Jingsong He , MOE, China; University of Science and Technology of China
pp. 44-49

Concept Hierarchies Generation for Classification using Fuzzy Formal Concept Analysis (Abstract)

Yan Zhao , Shanghai University, China
Wen Zhou , Shanghai University, China
Zongtian Liu , Shanghai University, China
pp. 50-55

The Intelligent Damage Assessment and Intelligent Reconfiguration System of Ship Diesel System (Abstract)

Yue Hou , Naval University of Engineering, China
Jin-yun Pu , Naval University of Engineering, China
pp. 56-61

Periodic solution for a class of higher-dimension impulsive functional differential equations with parameter (Abstract)

M. J. Gai , Naval Aeronautical Engineering Institute, China
G. Zhou , Naval Aeronautical Engineering Institute, China
J. G. Yin , Naval Aeronautical Engineering Institute, China
X. H. Hou , Ludong University, China
pp. 62-66

A New Mechanical Algorithm for Solving System of Volterra Integral Equation (Abstract)

Weiming Wang , East China Normal University, China; Wenzhou University, China
Zhenbing Zeng , East China Normal University, China
Lu Yang , East China Normal University, China
pp. 67-72

Classification for a class of second-order singular equations on time scales (Abstract)

Lianghong Zhang , Jinan University, China
Chao Zhang , Jinan University, China
pp. 73-76

Positive Solutions for Quasilinear Second Order Differential Equation (Abstract)

Yunhai Wang , Hebei University of Science and Technology, China
Shijie Dong , Mechanical Engineering College, China
Zhifeng Gao , Hebei University of Science and Technology, China
pp. 77-80

Research on Matching between User Queries and Web Pages Based on BAM (Abstract)

Yajun Du , Xihua University, China
Bo Deng , Xihua University, China
pp. 81-85

Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force Transducers (Abstract)

Ping Chen , Shandong University of Technology, China
Yan Chen , McGill University, Canada
Benoit Boulet , McGill University, Canada
Mingbo Zhao , Shandong University of Technology, China
pp. 86-91

Automatic Keyphrase Extraction from Chinese Books (Abstract)

Xiaodong Shi , Xiamen University, China
Yijiang Chen , Xiamen University, China
Changle Zhou , Xiamen University, China
Chang Su , Xiamen University, China
pp. 92-97

The Application of Fuzzy Neural Network in the Iatrical Monitor (Abstract)

Shaoqing Jia , Shandong University of Technology, China
Mingbo Zhao , Shandong University of Technology, China
Ping Chen , Shandong University of Technology, China
pp. 98-103

Using Trust Metric to Detect Malicious Behaviors in WSNs (Abstract)

Yang Bo , South China Agricultural University, China
Zhang Mingwu , South China Agricultural University, China
Zhang Wenzheng , National Laboratory for Modern Communications, China
Qi Yu , South China Agricultural University, China
pp. 104-108

MAC Performance and Improvement in Mobile Wireless Sensor Networks (Abstract)

Huimin Zhang , Beijing University of Posts and Telecommunications, China
Lin Zhang , Beijing University of Posts and Telecommunications, China
Bing Liu , Beijing University of Posts and Telecommunications, China
Ke Yu , Beijing University of Posts and Telecommunications, China
pp. 109-114

The Upper Bound of the Number of Nodes on Fixed Energy Budget in Wireless Sensor Networks (Abstract)

Guifa Teng , University of Hebei agriculture, China
Lisheng Ren , University of Hebei agriculture, China
Fang Wang , University of Hebei agriculture, China
pp. 115-118

Agent-based Trust Model in Wireless Sensor Networks (Abstract)

Haiguang Chen , Shanghai Normal University, China; Fudan University, China
Huafeng Wu , Fudan University, China
Chuanshan Gao , Fudan University, China
Xi Zhou , Fudan University, China
pp. 119-124

An Attitude-adaptation Negotiation Strategy in Electronic Market Environments (Abstract)

Yongquan Liang , Shandong University of Science and Technology, China
Qijia Tian , Shandong University of Science and Technology, China
Xingpeng Xiao , Shandong University of Science and Technology, China
Shujuan Ji , Shandong University of Science and Technology, China
Jixue Li , Shandong University of Science and Technology, China
pp. 125-130

Web Marine Spatial Information Service Based on Electronic Nautical Charts (Abstract)

Yingjun Zhang , Dalian Maritime University, China
Feixiang Zhu , Dalian Maritime University, China
Wenhai Sang , Dalian Maritime University, China
pp. 131-136

The Design and Implementation of XML-based Workflow Engine (Abstract)

Jing Xu , Nankai University, China
Xuemeng Li , Nankai University, China
Xin Jin , Nankai University, China
pp. 137-142

HIDE -- A Web-based Hydrological Integrated Data Environment (Abstract)

Yao Liang , Virginia Polytechnic Institute and State University, USA
Nimmy Ravindran , Virginia Polytechnic Institute and State University, USA
pp. 143-148

An Energy Efficient Query Processing Algorithm Based on Relevant Node Selection for Wireless Sensor Networks (Abstract)

Guilin Li , Harbin Institute of Technology, China
Jianzhong Li , Harbin Institute of Technology, China
pp. 149-154

Delay-Minimum Energy-Aware Routing Protocol (DERP) for Wireless Sensor Networks (Abstract)

Liming He , Beijing University of Posts and Telecommunications, China
pp. 155-160

Energy-Efficient Multi-Path Routing with Short Latency and Low Overhead for Wireless Sensor Networks (Abstract)

Liming He , Beijing University of Posts and Telecommunications, China
pp. 161-167

Localized Flooding Backbone Construction for Location Privacy in Sensor Networks (Abstract)

Min Song , Old Dominion University, USA
Yingchang Xiang , Rizhao Polytechnic, China
Kai Xing , The George Washington University, USA
Xiuzhen Cheng , The George Washington University, USA
Dechang Chen , Uniformed Services University of the Health Sciences, USA
pp. 167-171

Research on Logical Function Blocks in ForCES-Based Routers (Abstract)

Ligang Dong , Zhejiang Gongshang University, China
Bin Zhuge , Zhejiang Gongshang University, China
Weiming Wang , Zhejiang Gongshang University, China
pp. 172-177

A New Inner Congestion Control Mechanism in Terabit Routers (Abstract)

Guochang Kang , Xidian University, China
Chu Ke , ZTE Corporation, China
Changshan Wang , Xidian University, China
Huaxi Gu , Xidian University, China
Kun Wang , Xidian University, China
pp. 178-181

DynaNP - A Coarse-grain Dataflow Network Processor Architecture with Dynamic Configurable Processing Path (Abstract)

Tao Li , National University of Defense Technology, China
Zhi-gang Sun , National University of Defense Technology, China
Xiao-ming Zhang , National University of Defense Technology, China
pp. 182-187

Two Certificateless Aggregate Signatures From Bilinear Maps (Abstract)

Kefei Chen , Shanghai Jiaotong University, China
Zheng Gong , Shanghai Jiaotong University, China; Graduate School of Chinese Academy of Sciences, China
Xuan Hong , Shanghai Jiaotong University, China
Yu Long , Shanghai Jiaotong University, China
pp. 188-193

Publicly Verifiable Secret Sharing with Enrollment Ability (Abstract)

Rong Hao , Qingdao University, China; Shandong University, China
Jia Yu , Qingdao University, China
Fanyu Kong , Shandong University, China
pp. 194-199

Forward-Secure Traceable Ring Signature (Abstract)

Daxing Li , Shandong University, China
Chengyu Hu , Shandong University, China
pp. 200-204

An Efficient ID-Based Restrictive Partially Blind Signature Scheme (Abstract)

Shangteng Huang , Shanghai Jiao Tong University, China
Xiaoming Hu , Shanghai Jiao Tong University, China
pp. 205-209

Geometric Design of Developable Bezier and B-spline Parametric Surfaces (Abstract)

Min Zhou , Northwestern Polytechnical University, China
Quanyi Lv , Northwestern Polytechnical University, China
Hongchan Zheng , Northwestern Polytechnical University, China
Junqing Yang , Xi'an Aerotechnical College, China
pp. 210-215

Offset Approximation Algorithm for Subdivision Surfaces (Abstract)

Xiaohong An , Northwestern Polytechnical University, China
Junqing Yang , Xi'an Aerotechnical College, China
Lining Zhang , Northwestern Polytechnical University, China
Min Zhou , Northwestern Polytechnical University, China
pp. 216-221

The Research and Application of Fuzzy Immune PID Control in the Load Control System of Tube Mill (Abstract)

Xiangjie Liu , North China Electric Power University, China
Wen Tan , North China Electric Power University, China
Guili Yuan , North China Electric Power University, China
Jizhen Liu , North China Electric Power University, China
pp. 222-226

State-based Time-Series Analysis and Prediction (Abstract)

Jixin Ma , The University of Greenwich, UK
pp. 227-232

Data Mining Prediction of Shovel Cable Service Lifespan (Abstract)

Ao Yang , Yunnan University, China
Lizhen Wang , Yunnan University, China
Hong Zhang , University of Alberta, Canada
pp. 233-238

Rough Set Approach for Processing Information Table (Abstract)

E. Xu , Liaoning University of Technology, China; Liaoning Technical University, China
Shao Liangshan , Liaoning Technical University, China
Tong Shaocheng , Liaoning University of Technology, China
Ye Baiqing , Liaoning Technical University, China
pp. 239-243

An Novel Association Rule Mining Based Missing Nominal Data Imputation Method (Abstract)

Junyi Shen , Xian Jiaotong University, Chin
Jianhua Wu , Xian Jiaotong University, China; Jinan University Zhuhai College, China
Qinbao Song , Xian Jiaotong University, Chin
pp. 244-249

Learning Bayesian Network Structure from Distributed Homogeneous Data (Abstract)

Gong Xiu Jun , Tianjin University, China
Kui Xiang Gou , Tianjin University, China
Zheng Zhao , Tianjin University, China
pp. 250-254

Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring Element (Abstract)

Xiang-guang Zhang , China Ocean University, China; Qingdao University of Science and Technology, China
Yun Liu , Qingdao University of Science and Technology, China
Chuan-xu Wang , China Ocean University, China; Qingdao University of Science and Technology, China
pp. 255-258

Image Segmentation with Multi-Scale GVF Snake Model Based on B-Spline Wavelet (Abstract)

Liu Jun , Tianjin Huahai Computer Technology Co. Ltd., China
Zhang Jun , Tianjin University, China
pp. 259-263

Group Delay Based Approach for Frequency Estimation in Complex Noises (Abstract)

Lihua Fu , China University of Geosciences, China
Yuantong Shen , China University of Geosciences, China
Meng Zhang , Central China Normal University, China
Hongwei Li , China University of Geosciences, China
pp. 264-268

Robust Algorithm of Vehicle Classification (Abstract)

Shengli Shi , South China University of Technology, China
Zhong Qin , South China University of Technology, China
Jianmin Xu , South China University of Technology, China
pp. 269-272

Key-Insulated Group Signature Scheme with Verifier-Local Revocation (Abstract)

Rupeng Li , Shandong University, China
Jia Yu , Qingdao University, China
Guowen Li , Shandong University, China
Daxing Li , Shandong University, China
Jin Wang , Chinese People's Public Security University, China
pp. 273-278

Security Analysis of wrNAF and SPA Resistant Scalar Multiplication (Abstract)

Fanyu Kong , Shandong University, China
Daxing Li , Shandong University, China
Ming Li , Shandong University, China
Baodong Qin , Shandong University, China
pp. 279-284

Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings (Abstract)

Rongbo Lu , Jishou University, China
Dake He , Southwest Jiaotong University, China
Changji Wang , Sun Yat-Sen University, China
pp. 285-290

An Efficient ID-Based Partially Blind Signature Scheme (Abstract)

Xiaoming Hu , Shanghai Jiao Tong University, China
Shangteng Huang , Shanghai Jiao Tong University, China
pp. 291-296

A Fuzzy Clustering Method Based on Domain Knowledge (Abstract)

Lizhen Wang , Yunnan University, China
Junli Lu , Yunnan University, China
Yaobo Li , Yunnan University, China
pp. 297-302

XML Query Recommendation Based On Association Rules (Abstract)

Jinxiang Dong , Zhejiang University, China
Yijun Bei , Zhejiang University, China
Feng Shao , Zhejiang University, China
Gang Chen , Zhejiang University, China
Lihua Yu , Zhejiang University, China
pp. 303-308

An IA-Based Classification Rule Mining Algorithm (Abstract)

Dexian Zhang , Henan University of Technology, China
Qingzhou Zhang , Henan University of Technology, China
Ziqiang Wang , Henan University of Technology, China
pp. 309-313

Secure Routing for Mobile Ad Hoc Networks (Abstract)

Yang Lu , PLA University of Science and Technology
Jing Liu , PLA University of Science and Technology
Fei Fu , PLA University of Science and Technology
Junmo Xiao , PLA University of Science and Technology
pp. 314-318

Adaptive Backoff Algorithm Based on Network Congestion in Multi-hop Wireless Ad hoc Networks (Abstract)

Wei Ding , Beijing University of Posts and Telecommunications, China
Hailun Xia , Beijing University of Posts and Telecommunications, China
Zhimin Zeng , Beijing University of Posts and Telecommunications, China
pp. 319-324

Scatternet Formation Algorithm in Multi-hop Environment based on Bionics (Abstract)

Mingbo Zhao , Shandong University of Technology, China
Jingjing Wang , Qingdao University of Science and Technology, China
pp. 325-330

Multi-path-based Distributed TCP Caching for Wireless Sensor Networks (Abstract)

Hao Huang , Central China Normal University, China
Yuhua Liu , Central China Normal University, China
Kaihua Xu , Central China Normal University, China
pp. 331-335

Rough Neural Network Modeling Through Supervised G-K Fuzzy Clustering (Abstract)

Yaonan Wang , Hunan University, China
Huixian Huang , Xiangtan University, China
Dongbo Zhang , Xiangtan University, China
pp. 336-341

Chinese Question Classification Based on Ensemble Learning (Abstract)

Kang Chen , Beijing Institute of Technology, China
Yu Zhang , Shandong Economic University, China
Keliang Jia , Beijing Institute of Technology, China; Shandong Economic University, China
Xiaozhong Fan , Beijing Institute of Technology, China
pp. 342-347

A Parsing Model Based on Ordered Tree Inclusion Matching (Abstract)

Xiao Yang , Shandong University, China
Jiancheng Wan , Shandong University, China
Fang Tan , Ruprecht-Karls University of Heidelberg, Germany
pp. 348-353

Study on Prediction of Prosodic Phrase Boundaries in Chinese TTS (Abstract)

Ziping Zhao , Nankai University, China
Yaoting Zhu , Nankai University, China
pp. 354-358

Artificial Immunity-Based Feature Extraction for Spam Detection (Abstract)

Ohm Sornil , National Institute of Development Administration, Thailand
Burim Sirisanyalak , National Institute of Development Administration, Thailand
pp. 359-364

Semantic Approach to Visualization Service Discovery (Abstract)

Chen Dingfang , Wuhan University of Technology, China
Gao Shu , Wuhan University of Technology, China
pp. 365-370

A Resource Allocation Model with Cost-Performance Ratio in Data Grid (Abstract)

Liutong Xu , Beijing University of Posts and Telecommunications, China
Xiangang Zhao , Beijing University of Posts and Telecommunications, China
Bai Wang , Beijing University of Posts and Telecommunications, China
pp. 371-376

An Efficient Hybrid P2P Incentive Scheme (Abstract)

Muhammad Hanif Durad , Beijing Institute of Technology, China
Yuanda Cao , Beijing Institute of Technology, China
Zhitao Guan , Beijing Institute of Technology, China
Liehuang Zhu , Beijing Institute of Technology, China
pp. 377-382

Image with Less InformationWatermarking Algorithm Based on DWT (Abstract)

Liu Mingxia , Taishan College, China
Zhu Xiangcai , Taishan College, China
Hou Yingkun , Taishan College, China
Zhu Lili , Taishan College, China
pp. 383-387

A Content Protection Scheme for H.264-based Video Sequence (Abstract)

Bin Yue , Beijing Information Technology Institute, China
Kefeng Fan , China Electronics Standardization Institute, China
Xiaojun Yu , Beijing Information Technology Institute, China
Meihua Wang , Beijing Information Technology Institute, China
pp. 388-393

Emotion Classification of Mandarin Speech Based on TEO Nonlinear Features (Abstract)

Su Guangchuan , Beijing Institute of Technology, China
Gao Hui , Astronaut Research and Training Center of China
Chen Shanguang , Astronaut Research and Training Center of China
pp. 394-398

Stochastic Network Fluid Modeling with Probabilistic Wavelet System (Abstract)

Zhi Liu , Guangdong University of Technology, China
Yun Zhang , Guangdong University of Technology, China
pp. 399-403

A Novel Approach to Detect the Presence of LSB Steganographic Messages (Abstract)

Zhen Yang , Nanjing University of Posts and Telecommunications, China
Xi Shao , Nanjing University of Posts and Telecommunications, China
Zongyuan Deng , Nanjing University of Posts and Telecommunications, China
pp. 404-408

Multiple Positive Solutions for Second Order m-Point Boundary Value Problems (Abstract)

Yanping Guo , Hebei University of Science and Technology, China
Yunhai Wang , Hebei University of Science and Technology, China
Zhenfeng Gao , Hebei University of Science and Technology, China
pp. 409-412

LATEX The existence of positive solutions for multi-point BVPs with dependence on the first order derivative (Abstract)

Xiumin Li , Hebei University of Science and Technology, China
Bin Wang , Hebei Professional and Technological College of Chemical and Pharmaceutical Engineering, China
Weihua Jiang , Hebei University of Science and Technology, China
pp. 413-416

Optimal Guaranteed Cost Control for a Class of Uncertain Systems with both State and Input Delays via Delta Operator Approach (Abstract)

Hongjiu Yang , Hebei University of Science and Technology, China
Jinhui Zhang , Beijing Institute of Technology, China
Jiqing Qiu , Hebei University of Science and Technology, China
pp. 417-422

Robust Stability of Uncertain Cellular Neural Networks with Time-Varying Delays (Abstract)

Jiqing Qiu , Hebei University of Science and Technology, China
Peng Shi , University of Glamorgan, United Kingdom
Zhifeng Gao , Hebei University of Science and Technology, China
Lianqing Su , Hebei University of Science and Technology, China
pp. 423-426

A Log-Sigmoid Lagrangian Neural Network for Solving Nonlinear Programming (Abstract)

Limei Zhou , Qingdao University of Technology, China
Liwei Zhang , Dalian University of Technology, China
pp. 427-431

An Ontology Framework for EC Automated Negotiation Protocol (Abstract)

Shujuan Ji , Shandong University of Science and Technology, China
Hongmei Yang , Shandong University of Science and Technology, China
Yongquan Liang , Shandong University of Science and Technology, China
Qijia Tian , Shandong University of Science and Technology, China
pp. 432-437

The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Technological Innovation Projects (Abstract)

Hongxia Jin , Agricultural University of Hebei, China
Xiaoxuan Chen , North China Electric Power University, China
Jianna Zhao , North China Electric Power University, China
pp. 438-443

The Evaluation Study of Knowledge Management Performance Based on Grey -AHP Method (Abstract)

Peide Liu , Shandong Economic University, China
Xin Zhang , Shandong Economic University, China
Fang Jin , Shandong Economic University, China
pp. 444-449

An improved adaptive Genetic Algorithm in Optimization of Partner Selection (Abstract)

Jianghong Han , Hefei University of Technology, China
Xuesen Ma , Member, IEEE; Hefei University of Technology, China
Yuefei Wang , Hefei University of Technology, China
Zhenchun Wei , Hefei University of Technology, China
pp. 455-460

An Ant Colony System Hybridized with Randomized Algorithm for TSP (Abstract)

Chengming Qi , Beijing Union University, China
pp. 461-465

A New Optimization Engine for the LSF Vector Quantization (Abstract)

Lu Huang , University of Science and Technology China, China
Jingsong He , University of Science and Technology China, China
Jian Tang , University of Science and Technology China, China
pp. 466-471

Stability Analysis Of Timing Acquisition Methods With Multi-hypothesis In Indoor UWB Multipath And MAI Channel (Abstract)

Liying Huang , South China University of Technology, China
Hongjiang Wang , South China University of Technology, China
Shengming Jiang , South China University of Technology, China
Fei Ji , South China University of Technology, China
Gang Wei , South China University of Technology, China
pp. 478-483

An Innovative Restoration Algorithm with Prioritized Preemption Enabled (Abstract)

Jingyi Wang , Beijing University of Posts & Telecommunications, China
Zhiyu Zhou , Lucent Technology, China
Jian Wu , Beijing University of Posts & Telecommunications, China
pp. 484-489

Congestion Control Model Based on Hop-by-hop Feedback for Active Networks (Abstract)

Li Zeng-zhi , Xi.an Jiaotong University, China
Nie Fei , Xi.an Jiaotong University, China; Air Force Engineer University, China
pp. 490-494

Two multi-constrained multicast QoS routing algorithms (Abstract)

Huang Lin , Dalian University of Technology, China
Zhang Yu-Lin , Shandong University of Science and Technology, China
Ren Yong-Hong , Liaoning Normal University, China
pp. 495-500

The SIS Epidemic Model with Impulsive Effects (Abstract)

Zhen Jin , North University of China, China
Mainul Haque , Krishnath College, India
pp. 505-507

Global Stability of A Tuberculosis Model with Vertical Transmission (Abstract)

Fengqin Zhang , Yuncheng University, China
Zhen Jin , North University of China, China
Chun Ma , North University of China, China
pp. 508-511

Oscillations of a class of second-order nonlinear delay differential equations with variable sign coefficients (Abstract)

Xiaoyou Han , North China University of Technology, China
Jianguo Zhang , North China University of Technology, China
Hongxia Zhu , North China University of Technology, China
Jietao Zou , North China University of Technology, China
pp. 512-516

Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking (Abstract)

Jing Qiu , Beijing Institute of Technology, China
LeJian Liao , Beijing Institute of Technology, China
pp. 517-521

A Method to Construct Dynamic S-box Based on Chaotic Map (Abstract)

Xiaofeng Liao , Chongqing University, China
Ping Wang , Southwest University, China
Jing Qiu , Southwest University, China
pp. 522-525

Threats Analysis and Prevention for Grid and Web Service Security (Abstract)

Jirong Sun , Sichuan University, Chin
Jiancheng Ni , Sichuan University, China; Qufu Normal University, China
Zhishu Li , Sichuan University, Chin
Zhonghe Gao , Qufu Normal University, China
pp. 526-531

A Framework for Revocation of Proxy Certificates in a Grid (Abstract)

Akshai Aggarwal , University of Windsor, Canada
Shushan Zhao , University of Windsor, Canada
Robert D. Kent , University of Windsor, Canada
pp. 532-537

User Interface Design Model (Abstract)

Wan Jiancheng , Shandong University, China
Lu Xudong , Shandong University, China
pp. 538-543

Xregion: A structure-based approach to Storing XML Data in Relational Databases (Abstract)

Meng Xue , University of Alberta, Canada
Li-Yan Yuan , University of Alberta, Canada
pp. 544-551

The existence of periodic solutions for a class impulsive differential equations (Abstract)

Xiujun Liu , Hebei University of Science and Technology, China
Yanping Guo , Hebei University of Science and Technology, China
Wei Xiang , Hebei University of Science and Technology, China
pp. 552-555

Test Cases Generation from UML Activity Diagrams (Abstract)

Inyoung Ko , Information and Communications University, Korea
Jongmoon Baik , Information and Communications University, Korea
Sungwon Kang , Information and Communications University, Korea
Hyungchoul Kim , Information and Communications University, Korea
pp. 556-561

Nash Equilibrium Stability of Rent-seeking Competition And Its Game Analysis (Abstract)

Hongliang Zhao , Qingdao Technological University, China
Silian Sui , Qingdao Technological University, China
Bin Wang , Qingdao Technological University, China
pp. 562-566

Classification and Existence of Non-oscillatory Solutions for Two-Dimensional Neutral Difference System (Abstract)

Binbin Du , Naval Aeronautical Engineering Institute, China
Guang Zhang , Tianjin University of Commerce, China
pp. 567-572

An Optimized Breaking Index for the Boussinesq-Type Numerical Model (Abstract)

Shuang Li , Institute of Oceanology, Chinese Academy of Sciences, China; Graduate School, Chinese Academy of Sciences, China
Hailun He , Institute of Oceanology, Chinese Academy of Sciences, China; Graduate School, Chinese Academy of Sciences, China
Jinbao Song , Institute of Oceanology, Chinese Academy of Sciences, China
pp. 573-577

Validity Test of the Eigenfunction Expansion Method in the Transient Wave Propagation Simulation (Abstract)

Hailun He , Institute of Oceanology, Chinese Academy of Sciences, China; Graduate School, Chinese Academy of Sciences, China
Jinbao Song , Institute of Oceanology, Chinese Academy of Sciences, China
Shuang Li , Institute of Oceanology, Chinese Academy of Sciences, China; Graduate School, Chinese Academy of Sciences, China
pp. 578-581

SAT-based Bounded Model Checking for SE-LTL (Abstract)

Zhou Conghua , Jiangsu University, China
Ju Shiguang , Jiangsu University, China
pp. 582-587

Research and Application of Software-reuse (Abstract)

Aiguang Yang , Qingdao University of Science and Technology, China
Yong Liu , Qingdao University of Science and Technology, China
pp. 588-593

The differences of COTS-based project stakeholders (Abstract)

Yunmei Du , Sun Yat-sen University, China
Shixian Li , Sun Yat-sen University, China
pp. 594-598

A Unified-Index Based Distributed Specification for Heterogeneous Components Management (Abstract)

Yuezhi Zhou , Tsinghua University, China
Ming Zhong , Tsinghua University, China
Cunhao Fang , Tsinghua University, China
Pengwei Tian , Tsinghua University, China
Yaoxue Zhang , Tsinghua University, China
pp. 599-604

Multi-device User Interface Development with Composition-oriented User Interface Design Patterns (Abstract)

Jiancheng Wan , Shandong University, China
Shihong Feng , Shandong University, China; Shandong Economic University, China
pp. 605-610

A Hybrid Metaheuristic ACO-GA with an Application in Sports Competition Scheduling (Abstract)

Huang Guangdong , China University of Geosciences, China
Ling Ping , Beihang University, China
Wang Qun , China University of Geosciences, China
pp. 611-616

GA in Optimized Control of Central Air-conditioning System Based on ANN Simulation (Abstract)

Jin Zhang , Guangdong Polytechnic Normal University, China
Xian-Mei Zhao , Guangdong Polytechnic Normal University, China
Hao-Yan Li , Guangdong Polytechnic Normal University, China
pp. 617-622

Model for Parallel Verification of Programs (Abstract)

Kang Lishan , Wuhan University, China
He Pei , Wuhan University, China; Changsha University of Science and Technology, China
Li Qiongzhang , Wuhan University, China
pp. 623-628

A Survey of Reasoning in Parallelization (Abstract)

Mikhail Chalabine , Linkoping University, Sweden
Christoph Kessler , Linkoping University, Sweden
pp. 629-634

Non-interactive Designated Confirmer Signature with Specific Verifier (Abstract)

Yong Li , Graduate School of Chinese Academy of Sciences, China
pp. 635-640

Protocol Engineering Principles for Cryptographic Protocols Design (Abstract)

Kefei Chen , Shanghai Jiao Tong University, China; National Laboratory of Modern Communications, China
Ling Dong , Shanghai Jiao Tong University, China; National Laboratory of Modern Communications, China
Yanfei Zheng , Shanghai Jiao Tong University, China; National Laboratory of Modern Communications, China
Mi Wen , Shanghai Jiao Tong University, China; National Laboratory of Modern Communications, China
pp. 641-646

A Provably Secure ID-Based Mediated Signcryption Scheme (Abstract)

Bo Yang , South China Agricultural University, China
Yong Yu , Xidian University, China
Ying Sun , South China Agricultural University, China
pp. 647-652

A Business Modeled Approach for Trust Management in P2P (Abstract)

Vidya Priyadarshini , Sri Venkateswara College of Engineering, India
T. Srinivasan , Sri Venkateswara College of Engineering, India
Smrithika Appaiah , Sri Venkateswara College of Engineering, India
pp. 653-658

A PSO-Based Web Document Classification Algorithm (Abstract)

Qingzhou Zhang , Henan University of Technology, China
Ziqiang Wang , Henan University of Technology, China
Dexian Zhang , Henan University of Technology, China
pp. 659-664

Data Mining Based on Clonal Selection Wavelet Network (Abstract)

Zhenguo Chen , North China Institute of Science and Technology, China
pp. 665-669

An Improved Semantic Smoothing Model for Model-Based Document Clustering (Abstract)

Jian Yin , Sun Yat-Sen University, China
Jiarong Cai , Sun Yat-Sen University, China
Yubao Liu , Sun Yat-Sen University, China
pp. 670-675

A Quick Algorithm for Computing Core Based on the Positive Region (Abstract)

Zhang-Yan Xu , Guangxi Normal University, China; University of Science and Technology Beijing, China
Wei-Dong Cai , University of Ji'nan, China; University of Science and Technology Beijing, China
Bing-Ru Yang , University of Science and Technology Beijing, China
Wei Song , University of Science and Technology Beijing, China
pp. 676-681

Finding Frequent Items in SlidingWindows over Data Streams Using EBF (Abstract)

ShuYun Wang , Fudan University, China
HeXiang Xu , Fudan University, China
YunFa Hu , Fudan University, China
pp. 682-687

Survivable and Efficient Clustered Keying in Wireless Sensor Network (Abstract)

Zhang Xizheng , Hunan Institute of Engineering, China
pp. 688-693

Knowledge-based system to define context in commercial applications (Abstract)

Javier Carb? , Carlos III University of Madrid, Spain
Nayat S?nchez-Pi , Carlos III University of Madrid, Spain
Jos? Manuel Molina , Carlos III University of Madrid, Spain
Virginia Fuentes , Carlos III University of Madrid, Spain
pp. 694-699

A Traceability Link Model for the Unified Process (Abstract)

Ilka Philippow , Technical University of Ilmenau, Germany
Patrick Maeder , Technical University of Ilmenau, Germany
Matthias Riebisch , Technical University of Ilmenau, Germany
pp. 700-705

Hierarchical Junction Trees as the Secondary Structure for Inference in Bayesian Networks (Abstract)

Libing Wu , Wuhan University, China
Dan Wu , University of Windsor, Canada
pp. 706-712

Noisy Speech Recognition Based on Speech Enhancement (Abstract)

Hongmei Tang , Hebei University of Technology, China
Xia Wang , Hebei University of Technology, China
Xiaoqun Zhao , Tongji University, China
pp. 713-716

Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System (Abstract)

Debin Pang , Harbin Institute of Technology, China
Ning Zhang , Harbin Institute of Technology, China
pp. 717-721

HVS-based Imperceptibility Measure of Watermark in Watermarked Color Image (Abstract)

Yongquan Liang , Shandong University of Science and Technology, China
Lianshan Liu , Shandong University of Science and Technology, China
Haibin Sun , Shandong University of Science and Technology, China
Hongmei Yang , Shandong University of Science and Technology, China
pp. 722-727

Detecting Arithmetic of Passenger?s Location Based on Image Processing (Abstract)

Ying Yang , Northeastern University, China
Jing Sheng , Northeastern University, China
Wei Zhou , Northeastern University, China
pp. 728-731

A Combining Approach for Chinese Word Segmentation (Abstract)

Aiqing Wang , Qingdao Technological University, China
Sen Zhang , Beijing University of Technology, China
pp. 738-743

Performance Evaluation of TriBA -- A Novel Scalable Architecture for High Performance Applications (Abstract)

Shi Feng , Beijing Institute of Technology, China
Haroon-Ur-Rashid Khan , Beijing Institute of Technology, China
pp. 744-749

Research on RTOS-Integrated TMR for Fault Tolerant Systems (Abstract)

Hao Fu , Zhejiang University, China
Ming Cai , Zhejiang University, China
Liu Fang , Zhejiang University, China
Jinxiang Dong , Zhejiang University, China
Peng Liu , Zhejiang University, China; Hangzhou Dianzi University, China
pp. 750-755

Bitmap Filtering: An Efficient Speedup Method for XML Structural Matching (Abstract)

Lihua Yu , Zhejiang University, China
Yijun Bei , Zhejiang University, China
Jinxiang Dong , Zhejiang University, China
Feng Shao , Zhejiang University, China
Gang Chen , Zhejiang University, China
pp. 756-761

A Modified Model for Private Data Security Facing E-commerce (Abstract)

Jianshi Li , Guizhou University, China
Ruxia Sun , Binzhou College, China
Chunyong Yin , Guizhou University, China; Binzhou College,China
pp. 762-765

Approach toward flexible semantic E-business in Web Service Community (Abstract)

Jinshuo Liu , Wuhan University, China
Xinmeng Chen , Wuhan University, China
Jiazhen Xu , Wuhan University, China
Xuejuan Huang , Wuhan University, China
Hua Li , Wuhan University, China
pp. 766-771

Ontology-Based Semantic Integration Method for Domain-Specific Scientific Data (Abstract)

Changjun Hu , University of Science and Technology Beijing, China
Xiaoming Zhang , University of Science and Technology Beijing, China; Hebei University of Science and Technology, China
Chongchong Zhao , University of Science and Technology Beijing, China
Qian Zhao , University of Science and Technology Beijing, China
pp. 772-777

A Learner Model for Learning-by-Example Context (Abstract)

Nicole Tourigny , Universite Laval, Canada
Laurence Capus , Universite Laval, Canada
Yuan Fan Zhang , Universite Laval, Canada
pp. 778-785

Research on Building Polygon Map Generalization Algorithm (Abstract)

Liang Wu , China University of Geosciences, China
Zhong Xie , China University of Geosciences, China
Zi Ye , China University of Geosciences, China
pp. 786-791

Video Transmission over Ad Hoc Networks Using Multiple Description Coding and Clustering-based Multiple Paths (Abstract)

Jun Fan , Huazhong University of Science & Technology, China
Shengsheng Yu , Huazhong University of Science & Technology, China
Yuan Chen , Huazhong University of Science & Technology, China
Jingli Zhou , Huazhong University of Science & Technology, China
pp. 792-797

Rotation Invariant Image Classification Based on MPEG-7 Homogeneous Texture Descriptor (Abstract)

Jun Ma , Shandong University, China
Xinshun Xu , Shandong University, China
Lei Zhang , Shandong University, China
Bo Yuan , University of Southern California, Los Angeles, USA
pp. 798-803

Research on Topology Discovery for IPv6 Networks (Abstract)

Danxia Ye , University of Electronic Science and Technology of China, China
Junhai Luo , University of Electronic Science and Technology of China, China
Mingyu Fang , University of Electronic Science and Technology of China, China
pp. 804-809

Design of Multimedia Conference Control System based on SIP (Abstract)

Jianyun Ni , Tianjin University of Technology, China
Jing Luo , Tianjin Polytechnic University, China
pp. 810-814

Improved BSS Based Schemes for Active Steganalysis (Abstract)

Xiaoqin Liu , Ordnance Engineering College
Jiazhen Wang , Ordnance Engineering College
Zhenbao Zhang , Ordnance Engineering College
Bo Xu , Ordnance Engineering College
pp. 815-818

A Vision-Based Road Surveillance System Using Improved Background Subtraction and Region Growing Approach (Abstract)

Jinglei Zhang , Tianjin University, China; Tianjin University of Technology, China
Zhengguang Liu , Tianjin University, China
pp. 819-822

Variable Step Size Technique for Adaptive Blind Decorrelation (Abstract)

Shifeng Ou , Jilin University, China
Ying Gao , Jilin University, China
Xiaohui Zhao , Jilin University, China; Laboratoire d'Informatique de Paris 6, France
pp. 823-826

Speech Enhancement Employing Modified a Priori SNR Estimation (Abstract)

Ying Gao , Jilin University, China
Xiaohui Zhao , Jilin University, China; Laboratoire d'Informatique de Paris 6, France
Shifeng Ou , Jilin University, China
pp. 827-831

A Kalman Smoothing Algorithm for Speech Enhancement Based on the Properties of Vocal Tract Varying Slowly (Abstract)

Xin Wang , University of Science and Technology of China, China
Hui Li , University of Science and Technology of China, China
Wei Lu , University of Science and Technology of China, China
Bei-qian Dai , University of Science and Technology of China, China
pp. 832-836

Job-attention Replica Replacement Strategy (Abstract)

Luo Siwei , Beijing Jiaotong University, China
Ai Lihua , Beijing Jiaotong University, China
pp. 837-840

A P2P Architecture for Large-scale VoD Service (Abstract)

Kejian Liu , University of Electronic Science & Technology of China, China
Lianhai Yuan , University of Technology, Leshan, China
Ai Wu , University of Electronic Science & Technology of China, China
Xinsong Liu , University of Electronic Science & Technology of China, China
pp. 841-846

Exploiting Heterogeneity of Nodes to Enhance Search Performance in Large-Scale Peer-to-Peer Network (Abstract)

Yadong Gong , Sun Yat-sen University, China
Xiaola Lin , Sun Yat-sen University, China
pp. 847-852

The Relation of CMM and Software Lifecycle Model (Abstract)

Zhang Sen , Beijing University of Technology, China
Yao Zheng , Graduate School, Chinese Academy of Sciences, China
pp. 864-869

New Quality Metrics for Object-Oriented Programs (Abstract)

Shaochun Xu , Laurentian University, Canada
Dapeng Liu , Wayne State University, USA
pp. 870-875

Address Fragment-Compact Garbage Collection (Abstract)

Yin Baolin , Beihang University, China
Yang Fei , Beihang University, China
pp. 876-881

A Formal Testing Framework for UML Statecharts (Abstract)

Xuede Zhan , Hangzhou Dianzi University, China
pp. 882-887

Fuzzy Many-Valued Context Analysis Based on Formal Description (Abstract)

Cao Baoxiang , Qufu Normal University, China
Wang Yan , Qufu Normal University, China
pp. 888-892

Knowledge Interconnection Based on Binary Semantic Relation Analysis (Abstract)

Yan Wang , Qufu Normal University, China
Yuxia Lei , Qufu Normal University, China; Institute of Computing Technology, Beijing
Baoxiang Cao , Qufu Normal University, China
pp. 893-898

A New Orientation for Multi-Class SVM (Abstract)

Tu Xu , SouthWest JiaoTong University, China
Yu Luo , SouthWest JiaoTong University, China
Dake He , SouthWest JiaoTong University, China
pp. 899-904

A Hierarchical Clustering Based on Overlap Similarity Measure (Abstract)

Zhiling Hong , Xiamen University, China
Fangfei Weng , Xiamen University, China
Jun Qu , Xiamen University, China
Qingshan Jiang , Xiamen University, China
pp. 905-910

OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale Networks (Abstract)

Hong Yao , Huazhong University of Science and Technology, China
Sirui Yang , Huazhong University of Science and Technology, China
Hai Jin , Huazhong University of Science and Technology, China
Xiaofei Liao , Huazhong University of Science and Technology, China
pp. 911-916

A Virus Immunization Model Based on Communities in Large Scale Networks (Abstract)

Shu Chen , Hunan Business College, China
Dingding Li , Hunan Univ., China
Jianhua Sun , Hunan Univ., China
Hao Chen , Hunan Univ., China
Jizha Qin , Hunan Univ., China
pp. 917-922

Security Analysis and Improvement of a (t, n) Threshold Proxy Signature Scheme (Abstract)

Ming Li , Shandong University, China
Daxing Li , Shandong University, China
Baodong Qin , Shandong University, China
Fanyu Kong , Shandong University, China
Jia Yu , Qingdao University, China
pp. 923-926

Efficient Modular Exponentiation with Three-Moduli (2^{n}?1,2^{n}+3) (Abstract)

Huanguo Zhang , Wuhan University, China
Bangju Wang , Wuhan University, China
Yuhua Wang , Wuhan University, China
pp. 927-931

A Mixed Fast Particle Filter (Abstract)

Hongbin Deng , Beijing Institute of Technology, China
Fasheng Wang , Beijing Institute of Technology, China
Qingjie Zhao , Beijing Institute of Technology, China
pp. 932-936

Experiment of Phase Unwrapping Algorithm in Interferometric Synthetic Aperture Sonar (Abstract)

Jun Yun , Ocean Univ. of China, China
Zhi-nong Zou , Naval Univ. of Engineering, China
Jin-song Tang , Naval Univ. of Engineering, China
Ai-qing Wang , Qingdao Technological University, China
pp. 937-942

A New Data Protecting Scheme Based on TPM (Abstract)

Huanguo Zhang , Wuhan University, China
Jian He , Commanding Communications Academy
Bo Zhang , Hubei Water Resources Technical College
Mingdi Xu , Wuhan University, China
pp. 943-947

On the Encryption of Image Decompression with User?s Identity (Abstract)

Zhengliang Huan , Tiashan University, China
Deyun Yang , Tiashan University, China; Qufu Normal University, China
pp. 948-951

Towards Semi-Automatic Generation of Provably Correct Algorithmic Programs (Abstract)

Jinyun Xue , Chinese Academy of Sciences, China; Jiangxi Normal University, China
Haihe Shi , Chinese Academy of Sciences, China; Graduate University of Chinese Academy of Sciences, China; Jiangxi Normal University, China
pp. 952-957

Distributed Secure Information Sharing Model for E-Government in China (Abstract)

Xin L? , State Information Center, Beijing, China
pp. 958-962

QoS Performance Analysis in Deployment of DiffServ-aware MPLS Traffic Engineering (Abstract)

Dongli Zhang , University of Ottawa, Canada
Dan Ionescu , University of Ottawa, Canada
pp. 963-967

Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks (Abstract)

Wei Zhang , Beijing University of Technology, China
Jingsha He , Beijing University of Technology, China
pp. 968-973

Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic (Abstract)

Guo Fang , Chongqing University of Posts and Telecommunications, China
Wang Ruyan , Chongqing University of Posts and Telecommunications, China
Wu Dapeng , Beijing University of Posts and Telecommunications, China
pp. 974-978

Research on XML United-Signature Technology and Its Implementation (Abstract)

Jiaxin Qiao , Anhui University of Finance & Economics, China
pp. 979-983

Experimentation of Interferometric Synthetic Aperture Sonar (Abstract)

Jin-song Tang , Naval Univ. of Engineering Wuhan, China
Ming Chen , Naval Univ. of Engineering Wuhan, China
Jun Yun , Ocean Univ. of China Qingdao, China
pp. 984-988

A Robust 3D Model Watermarking Scheme Based on Feature Recognition (Abstract)

Chun-Xia Li , Qingdao University of Science & Technology, China
Sheng-He Sun , Harbin Institute of Technology, China
Shu-Guo Yang , Qingdao University of Science & Technology, China
Yao-Qun Xu , Heilongjiang Business University, China
pp. 989-993

Trustable Ad Hoc Networks of Agent Societies (Abstract)

Vasu Alagar , Concordia University, Canada
ZongYuan Yang , East China Normal University, China
KaiYu Wan , Concordia University, Canada
pp. 994-1000

Clustering Ensemble based on the Fuzzy KNN Algorithm (Abstract)

Fangfei Weng , Xiamen University, China
Qingshan Jiang , Xiamen University, China
Zhiling Hong , Xiamen University, China
Lifei Chen , Xiamen University, China
pp. 1001-1006

An Improved Attribute Reduction Algorithm Based on Rough Set (Abstract)

Yimin Chen , Shanghai University, China
Haijun Wang , Shanghai University, China
Shaoliang Wei , Shanghai University, China
pp. 1007-1010

Mining of Reuse Patterns in CDMA Network Optimization (Abstract)

Hongxu Cui , Beijing University of Posts and Telecommunications, China
Wen Ye , Beijing University of Posts and Telecommunications, China
pp. 1011-1016

A Connection Degree-Based Rough Sets Model and its Application to Knowledge Reduction (Abstract)

Dongxiao Yang , Jining Medical College, China
Bing Huang , Nanjing Audit University, China; Nanjing University, China
Liuling Dai , Beijing Institute of Technology, China
pp. 1017-1021

Incorporating a PMF-Based Injury Model into a Multi-Agent Representation of Crowd Behavior (Abstract)

Min Song , Old Dominion University, USA
Frederic (Rick) D. McKenzie , Old Dominion University, USA
Herbie H. Piland, III , Old Dominion University, USA
pp. 1022-1027

SINS/GPS Integrated Navigation for Autonomous Underwater Vehicle with Wavelet Package Analysis and Neural Networks (Abstract)

Xiao-su Xu , Southeast University Nanjing, China
Qi Wang , Southeast University Nanjing, China
pp. 1028-1033

Detecting Cumulated Anomaly by a Dubiety Degree based detection Model (Abstract)

Gang Lu , Beijing University of Chemical Technology, China
Junkai Yi , Beijing University of Chemical Technology, China
Kevin L? , Brunel University, UK
pp. 1034-1039

An Adaptive Probability Access Mechanism for Wireless Sensor Network (Abstract)

Haibin Yu , Chinese Academy of Sciences, China
Wei Liang , Chinese Academy of Sciences, China
Chang Che , Shenyang Jianzhu University, China
pp. 1040-1045

A Mesh-Based QoS Aware Multicast Routing Protocol (Abstract)

Ohm Sornil , National Institute of Development Administration, Thailand
Dayin Promkotwong , National Institute of Development Administration, Thailand
pp. 1046-1051

An Improved Estimation Algorithm for User Vertical Protection Level (Abstract)

Zhimin Li , Qingdao Technological University, China
Yueming Dai , Qingdao Technological University, China
Xijun Zhu , Qingdao University of Science and Technology, China
pp. 1052-1055

Solutions of the fractional differential equations with constant coefficients (Abstract)

Xiuyun Zhang , Donghua University, China
Chunhai Kou , Donghua University, China
pp. 1056-1059

Numerical Stability of Delay Integro-Differential Equations under Resolvent Conditions (Abstract)

Jing-jun Zhao , Harbin Institute of Technology, China
Yang Xu , Harbin Institute of Technology, China
pp. 1060-1063

Matrix Method for Principal Normal Form of Propositional Formula (Abstract)

Wang Ting-ming , Normal College of Qingdao University, China
Wang Aiqing , Qingdao Technological University, China
pp. 1064-1067

Application of Concurrent Subspace Design to Shape Design of Autonomous Underwater Vehicle (Abstract)

Peng Wang , Northwestern Polytechnical University, China
Lichuan Zhang , Northwestern Polytechnical University, China
Yonghu Wang , Northwestern Polytechnical University, China
Baowei Song , Northwestern Polytechnical University, China
pp. 1068-1071

Modeling electronic institutions with extended colored Petri net (Abstract)

Yong Huang , Zhejiang University, China; Guilin University of Electronic Technology, China
Ji Gao , Zhejiang University, China; Guilin University of Electronic Technology, China
Guoyong Cai , Zhejiang University, China; Guilin University of Electronic Technology, China
pp. 1072-1077

OR-ATP: An Operation Refinement Approach As a Process of Automatic Theorem Proving (Abstract)

Jinkui Hou , Shandong University, China
Jiancheng Wan , Shandong University, China
Shuaiqiang Wang , Shandong University, China
pp. 1078-1083

Culture-Centered Design: Cultural Factors in Interface Usability and Usability Tests (Abstract)

Kan Zhang , Chinese Academy of Sciences, China
Xianghong Sun , Chinese Academy of Sciences, China
Huiyang Li , Chinese Academy of Sciences, China; Graduate University of Chinese Academy of Sciences, China
pp. 1084-1088

A Collaborative Retrieval System--Full Text Base and Database (Abstract)

Chenghong Zhang , Fudan University, China
Zhenghua Wang , Fudan University, China
Yuqin Li , Fudan University, China
Chuanyao Yang , Fudan University, China
Yunfa Hu , Fudan University, China
pp. 1089-1094

Efficient XML query using Relational Data Model (Abstract)

Sungchul Hong , Towson University, USA
Yeong-Tae Song , Towson University, USA
pp. 1095-1100

Two Symmetrical Decomposition Methods for Structure-complex Petri Nets and Their Applications (Abstract)

Qingtian Zeng , Shandong University of Science and Technology, China
pp. 1101-1106

A Dynamic and Interactive Diagnosing and Testing Method for Development of Digital TV Receiver System (Abstract)

Fang Miao , Chengdu University of Technology, China
HongYang Yu , Conexant Chengdu Corp., China
GuangDe Wang , Chengdu University of Technology, China
WenJia Zhang , Conexant Chengdu Corp., China
pp. 1107-1112

Concept Index for Document Retrieval with Peer-to-Peer Network (Abstract)

Wenbin Fang , University of Nankai, China
Wenhui Ma , University of Nankai, China
Jing Liu , University of Nankai, China
Gang Wang , University of Nankai, China
pp. 1119-1123

Automated Test Data Generation Algorithm Based on Reversed Binary Tree (Abstract)

Jia-Guang Sun , Tsinghua University, China
Jun-Yi Li , Hunan University, China
pp. 1124-1128

Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation (Abstract)

David M. Weiss , Avaya Labs Research
Xiao Ma , Avaya Labs Research
J. Jenny Li , Avaya Labs Research
pp. 1129-1134

Performance Modeling and Evaluation of e-commerce Systems Using UML 2.0 (Abstract)

K. Rajani Kanth , M S Ramaiah Institute of Technology, India
D. Evangelin Geetha , M S Ramaiah Institute of Technology, India
Ch. Ram Mohan Reddy , BMS College of Engineering, India
T. V. Suresh Kumar , M S Ramaiah Institute of Technology, India
pp. 1135-1140

Security Analysis for Internet Banking Models (Abstract)

Osama Dandash , Monash University, Australia
Phu Dung Le , Monash University, Australia
Bala Srinivasan , Monash University, Australia
pp. 1141-1146

A Yellow Page Information Retrieval System Based on Sorted Duality Interrelevant Successive Tree and Industry Ontology (Abstract)

Yuqin Li , Fudan University, China
Chenghong Zhang , Fudan University, China
Yunfa Hu , Fudan University, China
Chuanyao Yang , Fudan University, China
Zhenghua Wang , Fudan University, China
pp. 1147-1152

The Architecture of CAR Component Web Services (Abstract)

Qian Mo , Beijing Technology and Business University, China
Zhicheng Chen , Tsinghua University, China
Mingyi Mao , Beijing Technology and Business University, China
pp. 1153-1157

Study on Government Information Resources Exchange Based on Directory Service (Abstract)

Cheng-shu Lv , Dongbei University of Finance and Economics, China
Yan-zhang Wang , Dalian University of Technology, China
Xing-kai Yang , Dalian University of Technology, China; Dongbei University of Finance and Economics, China
pp. 1158-1163

Automatic attack plan recognition from intrusion alerts (Abstract)

Ma Jie , Huazhong University of Science and Technology, China
Wang Li , Huazhong University of Science and Technology, China
Ma Yang-ming , Huazhong University of Science and Technology, China
Li Zhi-tang , Huazhong University of Science and Technology, China
Zhang Ai-fang , Huazhong University of Science and Technology, China
pp. 1170-1175

A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem (Abstract)

Fengyin Li , The Qufu Normal University, China
Hongwei Ju , The Qufu Normal University, China
Jiguo Yu , The Qufu Normal University, China
pp. 1176-1182
Author Index

Author Index (PDF)

pp. 1183
83 ms
(Ver 3.3 (11022016))