IAS-2009-16

A Synchronic Audio Information Hiding Algorithm Based on LSB

Wang Junjie

 

IAS-2009-27

Real-time target tracking in long gray-scale image sequence

Yiming Chen, Xiaoming Peng

 

IAS-2009-33

An Efficient CQI Feedback Reduction Scheme for Multi-User OFDMA network with AMC Mode

xiong xiong

 

IAS-2009-36

A novel method for plane array infrared image to detect point target

hong che, longhe sun

 

IAS-2009-39

Stability monitoring and analysis of Opencast uranic slope Based on GPS

yufeng zhu

 

IAS-2009-44

An Adaptive Watermarking Algorithm Based on Multi-scale Morphological Gradient and Fussy theory in Wavelet Domain

Chen Wen-yong, Fan Yan-bin

 

IAS-2009-55

Restudying the Artificial Immune Model for Network Intrusion Detection

Xianjin Fang, Jingzhao Li, Longshu Li

 

IAS-2009-61

A Fragile Watermarking Scheme for Tamper-Proof of Web Pages

Xian Zhong Long, Hong Peng

 

IAS-2009-64

Development of a Java-oriented software general component library

XIAO Han, ZHANG Zu-xun, HU Hua-liang

 

IAS-2009-70

Car license plate location based on the density and projection

Jun Ren SU, Zheng MA

 

IAS-2009-81

Privacy Protection Model for Distributed Service System in Converged Network

Shangqin Zhong, Chen Liu, Zhengqiu Yang

 

IAS-2009-100

Bearings Fault Diagnosis Based on the Optimal Impulse Response Wavelet

dan zhang

 

IAS-2009-111

On-Line Diagnosis of the Motor Circuit Based on RBF-CMGA

Mingjiang Hu, Liqiao Qi

 

IAS-2009-114

A Novel OFDM Interpolation Algorithm Based on Comb-Type Pilot

chunlong he

 

IAS-2009-131

Automatic Localization and Marking for Features of Skull by CT Image

Bin Yu, Anbing Wang, Mingquaen Zhou

 

IAS-2009-141

INTRUSION DETECTION BASED ON ¡§HYBRID¡¨ PROPAGATION IN BAYESIAN NETWORKS

Farah Jemili, Mohamed Ben Ahmed, Montaceur Zaghdoud

 

IAS-2009-153

Security metrics for SOA

Vinoth Sivasubramanian

 

IAS-2009-165

Organizational Barriers to the Implementation of Security Engineering

Bryan Cline

 

IAS-2009-169

ID-based non-interactive deniable authentication protocol

Weimin Shi

 

IAS-2009-179

Digital Watermark Method Based on NAM and Integer Wavelets

Wenlue Chen Wenlue Chen

 

IAS-2009-185

Binary Image Watermarking Algorithm Based on Singular Value Decomposition

hu zhihua hu zhihua

 

IAS-2009-189

A secret sharing scheme based on NTRU algorithm

Bu Shan Yue

 

IAS-2009-193

On Security Notions for Verifiably Encrypted Signature

Xu an Wang, Xiaoyuan Yang

 

IAS-2009-196

Proxy Re-encryption Scheme Based on SK Identity Based Encryption

Xu an Wang, Xiaoyuan Yang

 

IAS-2009-200

Data Security Analysis of WebGIS Based on Tile-Map Technique

Li Haiting, Li Yanhong

 

IAS-2009-203

A new image restoration algorithm based on variational derivative

Zhang Wenjuan, Feng Xiangchu

 

IAS-2009-221

Study of Embedded System Design Based RFID Securities

Shi Lingfeng, Lai Xinquan, Guo Baolong

 

IAS-2009-226

Construction of Intelligentized Teaching Resources Center Based on Multi-Agent

Hu Kai

 

IAS-2009-231

Visibility Estimation Based on Mean Shift

Chen Wenbing, Yang Jianwei

 

IAS-2009-235

Implementation of G.729 Codec Based on Mediastreamer Technology

Liting Hu, Hezhi Lin, Lianfen Huang, Jianan Lin

 

IAS-2009-238

A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization

Cheng Guosheng

 

IAS-2009-242

Image Retrieval Based on Primary Cluster

Chen Wenbing, Yang Jianwei, Wang wei

 

IAS-2009-247

Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block

Gaoping Li

 

IAS-2009-250

An Effective Texture Spectrum Descriptor

wu xiaosheng

 

IAS-2009-256

The application on the evaluation of quality of universities undergraduate theory teaching work based on artificial neural network

Jun-qiao Qi

 

IAS-2009-269

Application and Research of Mobile E-Commerce Security Based on WPKI

Feng TIAN, Xiao-bing HAN, Ying WEI

 

IAS-2009-281

Lossy Compression of CFA Image Based on Multiwavelet Packet

QiGui Zhang

 

IAS-2009-284

A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface

Kefeng Fan

 

IAS-2009-290

Analysis of person identification based on Motor imagery EEG

Xuecai Bao, Jinli Wang, Jianfeng Hu

 

IAS-2009-297

Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora

hua liu

 

IAS-2009-308

Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling

Enke LI, Xiaoning FU, Shangqian LIU, Shimin YIN

 

IAS-2009-311

A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion to Image Denoising

Weibin Zhang, Xiangchu Feng, Weiwei Wang

 

IAS-2009-327

Infrared Face Recognition Based on Blood Perfusion and Fisher Linear Discrimination Analysis

Xie zhihua

 

IAS-2009-330

E-Government System: From the Perspective of Dependability

MANISH POKHAREL

 

IAS-2009-340

Research on Equiponderant Forwarding within Multi-nexthop Interfaces

Ning-Ning Liang, Xuan-Yong Zhu, Ju-Long Lan, Juan Shen

 

IAS-2009-346

Certi ß öcateless One-Way Authenticated Two-Party Key

Chen wuping

 

IAS-2009-349

Improved Multi-grade Fuzzy Comprehensive Evaluation for Mechanism Selection

kaidi liu, jimei hao, yanjun pang

 

IAS-2009-352

A deep copy protection framework for electronic devices within home

Yang Zhan, Haibo Tian, Yaoyu Zhang, Yumin Wang

 

IAS-2009-355

One-way Hash function construction based on conservative chaotic systems

Qing-hua ZHANG, Han ZHANG, Zhao-hui LI

 

IAS-2009-361

An Improved SPECK Image Coding Algorithm

Baojun Han

 

IAS-2009-367

Resistance DPA Attack of RSA on Smartcard

Jin Jifang

 

IAS-2009-391

Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks

Yu ZHANG, Xing She ZHOU, Yee Wei LAW, Marimuthu PALANISWAMI

 

IAS-2009-403

A Model of Intrusion Prevention Base on Immune

yaping jiang, zengyu cai, yong gan

 

IAS-2009-407

An Accurate Image Juggling Authentication Algorithm

Jianquan XIE, Chunhua YANG, Qing XIE

 

IAS-2009-411

Using the Danger Theory of Immune Systems for Intrusion Detection

lu hong

 

IAS-2009-431

A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow

Mengbo Hou, Qiuliang Xu

 

IAS-2009-434

Texture feature analysis on erosion and wear in artillery chamber

FU Xiao-ning, LI En-ke, GAO Wen-jing

 

IAS-2009-437

SPAM WEEDING,DETECTION AND FILTERING ON P2P SYSTEM

PACKIAVATHY MANICKAVELU, SARULADHA K

 

IAS-2009-440

FREM-based adaptive target queue length ATFREM algorithm

王 连枝

 

IAS-2009-448

A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index Modulation

Jie Nie, Zhiqiang Wei, Zhen Li

 

IAS-2009-453

Non-repudiation Protocols with Expected Delivery

Li Yanping

 

IAS-2009-456

Browser-side Countermeasures for Deceptive Phishing Attack

Huajun Huang, Shaohong Zhong, Junshan Tan

 

IAS-2009-460

Image retrieval based on character-matching technology

shan zhao, jing liu

 

IAS-2009-468

A Robust Watermark Algorithm for JPEG2000 Images

Gao Haiying

 

IAS-2009-478

A New Multi-Bank E-cash Protocol with Anonymity Control

Lingling Wang

 

IAS-2009-484

Forward-Secure Certificate-Based Encryption

Yang Lu, Jiguo Li

 

IAS-2009-489

Emergency Command System for geologic disasters prevention

wenbiao peng, chaojun yan, lihua deng

 

IAS-2009-505

Image Quality Evaluation Based on Human Visual Perception

Fan Zhang

 

IAS-2009-515

Study on Ultrasonic Ranging System Design

Deng Lihua

 

IAS-2009-525

Boosting Graph Embedding with Application to Facial Expression Recognition

Lei Xiong, Duyan Bi, Xu Zhou, Shiping Ma

 

IAS-2009-528

Microarray Image Segmentation Using Region Growing Algorithm and Mathematical Morphology

Ping Ye, Guirong Weng

 

IAS-2009-532

Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes

Ximing Li, Bo Yang

 

IAS-2009-543

Automatic Reception of High-frequency CW Telegraph with Support Vector Machine

Guo-jun Li

 

IAS-2009-546

An Improved Scheme of Single Sign-On Protocol

Jian Yang

 

IAS-2009-549

Deadlock Detection Based on Resource Allocation Graph

Ni Qinqin

 

IAS-2009-552

Comments on Two Password Authentication Schemes

Zuowen Tan

 

IAS-2009-558

The SOBER Family Ciphers Reconfigurable Processing Architecture Design

wang zhiyuan

 

IAS-2009-571

Optimal Face Recognition Method using Ant Colony based Back Propagation Network

Banani Saha, Dichen Dolkar

 

IAS-2009-575

An Audio Watermarking Method of Resistance StatisticsAttack Based on Psychoacoustic Model

Liu Xiaoli

 

IAS-2009-584

Interactive Visualisation of 3D City Models Based on Adaptive Streaming of 3D-GIS Data

Zhenping Zhang, Jitao Fang

 

IAS-2009-588

Research on the Switched LAN Monitor Mechanism and its Implementation Method based on ARP spoofing

Zhan Gao, Xiangdong Hu, Wei Li

 

IAS-2009-598

Fingerprint-based Encrypted Fuzzy Vault

Feng Quan, Su Fei, Cai Anni

 

IAS-2009-608

Webpage Encryption Based on Polymorphic Javascript Algorithm

Bai Zhongying, Qin Jiancheng

 

IAS-2009-613

An Implementation Strategy of Global OLTP based on ODS in Heterogeneous Environment

Yue Zhang, Jie Liu, hang li

 

IAS-2009-618

Assessment of Color Video Quality with Singular Value Decomposition of Complex Matrix

Fuqiang Zhang, Junli Li

 

IAS-2009-623

Image denoising based on nonlocal diffusion

Yu Han, Wei-Wei Wang, Xiang-Chu Feng

 

IAS-2009-626

A Modified Run-length Image Data Hiding for High Embedding Capacity

Lin Rey-Sern, Hu Shang-Wen

 

IAS-2009-631

Domain Administration of Task-role Based Access Control for Process Collaboration Environments

Yahui Lu, Li Zhang

 

IAS-2009-636

An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net

Qiuqin LU

 

IAS-2009-640

the Method of Equalization based on Iterative Interference Cancellation for SCCPM System

wusheng zhao, yongqing fu, zhixue han

 

IAS-2009-646

Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network

yang qunting

 

IAS-2009-652

Design and Implementation of SIP-based VoIP Surveillance System

Ching-Lung Chang, Yi-Ji Jheng

 

IAS-2009-656

Design and Implementation of SIP-based VoIP Tester

Ching-Lung Chang, Yi-Fong Lin

 

IAS-2009-662

Perona-Malik Model Based on Wave Atom

Guojun Liu, Xiangchu Feng, Binbin Hao

 

IAS-2009-667

The Research on the Simulation Application of Fuzzy Control in STATCOM

Yongtao Dai

 

IAS-2009-677

Sample-based generation of dictionaries in the keyword spotting system

Lu Li, Ge Fengpei, Ta Li

 

IAS-2009-682

A New Feature Selection Method for Malcodes Detection

Zhang Xiaokang, Shuai Jianmei

 

IAS-2009-685

The Research of NULL Convention Logic Circuit Computing Model targeted at Block Cipher Processing

cui yalei, dai zibin

 

IAS-2009-702

A Fast Correlation Attack via Parallel Computing

Qiong Liu, Yupu Hu

 

IAS-2009-705

A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising

He Jin

 

IAS-2009-708

Accelerating RC4 encryption algorithm using \"Ultra Gridsec\" Scheme and \"HIMAN\" Grid Middleware and secure data passes inside \"HIMAN\" using the accelerated RC4

Hisham Kholidy

 

IAS-2009-719

Grounding Grids Corrosion Diagnosis Based on Large Change Sensitivity

liu liqiang, luo xianjue, niu tao

 

IAS-2009-723

A New Conic Curve Digital Signature Scheme

Lin You

 

IAS-2009-727

A New Scheme for Multisensor Image Fusion System

Liu Weiguang, Wang Wenqi, Cui Jiangtao

 

IAS-2009-731

Nonlocal Curvature-Driven Diffusion Model for Image Inpainting

li li, wang weiwei, han yu

 

IAS-2009-734

National Information Infrastructure Security and Cyber Terrorism

Jianfeng Li

 

IAS-2009-739

A Support Vector Machines Security Assessment Method Based on Group Decision-marking for Electric Power Information System

Xiaorong Cheng, yan Wei, xin Geng

 

IAS-2009-752

W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks

Zhanyong TANG, Rui QI, Yangxia LUO, Dingyi FANG

 

IAS-2009-756

Dynamic Behavior of SIS Epidemic Model with Feedback on Regular Lattice

Damin Zhang, Shaohong Cai

 

IAS-2009-760

A high-efficiency Data Distribution Algorithm in Distributed Storage

liu zhen

 

IAS-2009-766

A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value

Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin

 

IAS-2009-771

A Time-and-times-limited Strong Direct Anonymous Attestation Scheme

Yue Chen

 

IAS-2009-778

Reduction Specular Reflection components of Chrome-plated Surface with Varying Light Direction

Li Chang Jiang, Zhong ZHANG

 

IAS-2009-785

A study on the Algorithm Based on Image Color Correlation Mining

Yongyue Chen

 

IAS-2009-800

An Anti-attack Watermarking Based on Synonym Substitution Algorithm for Chinese Text

Lin Linjianbin, He Lu, Li Tianzhi, Fang Dingyi

 

IAS-2009-804

Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams

Min Li, Bo Wang

 

IAS-2009-808

Whole Frame Loss Recovery Algorithm for H.264 decoders

Min Li, Bo Wang

 

IAS-2009-813

An approach to group decision making based on Incomplete Linguistic Preference Relations

Tien-Chin Wang, Shu-Chen Peng, Shu-Chen Hsu, Juifang Chang

 

IAS-2009-818

Constructions of Some Difference-Balanced d-form Functions

Tongjian YAN, LI Hong

 

IAS-2009-822

Evaluation Research of the talent training on the Digital Entertainment Based on Set Pair Analysis

WANG Xizhong

 

IAS-2009-843

Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering Project

Yingchen WANG

 

IAS-2009-847

Safety Evaluation Management on the Construction Based on Set Pair Analysis

Yingchen WANG

 

IAS-2009-853

Appraisal Research of the Data Mining and Knowledge Discovery in University Library based on the Unascertained Measure Model

Hua JIANG

 

IAS-2009-867

Performance Analysis for Interconnection Ways in Complex Virtual Testing System

Tao You, Cheng-lie Du, Yi-an Zhu

 

IAS-2009-872

Supporting Technology for Virtual Numerical Control System based on RTX and Reflective Memory Network

Tao You, Cheng-lie Du, Da-peng Zhang

 

IAS-2009-875

Simulation Modeling Method of Production System Based on Aspect-oriented Technology

Tao You, Cheng-lie Du, Yi-an Zhu

 

IAS-2009-879

Cepstrum-based Audio Watermarking Algorithm against the A/D and D/A Attacks

Xiaoming Zhang, Zhaoyang Yu

 

IAS-2009-884

An order-preserving encryption method operating the encrypted data directly

Youxiang Duan, Yanqiu Li

 

IAS-2009-890

Building Trust Territories In Ad Hoc Networks

Yuan Bai, Xing zhang

 

IAS-2009-897

Exploiting RFC2828 as a Domain Vocabulary for Identifying IT Security Literature

Lidong WANG, Liping QIAN

 

IAS-2009-903

Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA

han miao

 

IAS-2009-909

An Intrusion detection system for network storage based on system calls

Li-zhong Geng, Hui-bo Jia

 

IAS-2009-927

Cost-Benefit Analysis of China¡¦s Internet Content Regulation

Qiang Song, Gang Li

 

IAS-2009-933

Research on Active Defence Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel

Xuedou Yu

 

IAS-2009-947

A Novel Micropayment Scheme with Complete Anonymity

Xin Zhao, Yuqin Lv, Wenxin He

 

IAS-2009-953

Risk Assessment Model for E-commerce Security Based on FCE

YAO YOULI

 

IAS-2009-966

Two efficient fragile web page watermarking schemes

peng sun, hongtao lu

 

IAS-2009-970

The Research of Simulation for Network Security Based on System Dynamics

Kong Hong-shan, Zhang Ming-qing, Tang Jun, Luo Chang-yuan

 

IAS-2009-977

A new Algorithm for Outlier Detection based on Offset

Yue Zhang, Jie Liu

 

IAS-2009-981

Information Security Solution Decision-making Based on Entropy Weight and Gray Situation Decision

CHEN Lin, LI Li, HU Yong, LIAN Ke

 

IAS-2009-984

An Improving Technique of Color Histogram in Segmentation-based Image Retrieval

zhenhua zhang

 

IAS-2009-988

The Design and Implenmatation of Security Defense Technology Based on Mandatory Running Control

Wu Kehe, Zhang Tong, Ma Gang

 

IAS-2009-994

User QoS Preference Description,Computation and Application

Quan Liang, Yuanzhuo Wang

 

IAS-2009-1000

Service Selection Algorithm with QoS Preference in Grid Environment

Quan Liang, Yuanzhuo Wang

 

IAS-2009-1004

Research of Access Control of USB Storage Device with Information Security in Unauthorized Internet Access Monitoring System

GAO Teng

 

IAS-2009-1008

Researches on Integrating Database Access Control and Privacy Protection

Yonghong Yu

 

IAS-2009-1014

Finding RFID Tags using Scalable, Efficient and Secure Search Protocol

Sheikh Ahamed

 

IAS-2009-1032

An Evaluation Model for Degree of Topic Relatedness Based on Dynamic Matching

Bin Yu

 

IAS-2009-1038

Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts for DCT Coded Image

Jin Wang, Heechang Kim, Jongho Kim, Jechang Jeong

 

IAS-2009-1042

A New Source Address Validation Scheme Based on IBS

Ning-ning Lu

 

IAS-2009-1047

Quantum secure direct communication based on partially entangled states

Yang Xinyuan, Ma Zhi, Lü Xin, Li Hongxin

 

IAS-2009-1052

Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve

Wang caimei, Li Zhengmao

 

IAS-2009-1055

A Multi-View Nonlinear Active Shape Model Based on 3D transformation Shape Search

Yi Faling, Xiong Wei, Huang Zhanpeng, Zhao Jie

 

IAS-2009-1059

Watermarking Relational Databases for Ownership Protection Based on DWT

Chuanxian Jiang

 

IAS-2009-1067

A Secure Semi-Fragile JPEG Image Authentication Scheme Based On Discrete Cosine Transform

Mona Fatma Mursi, Ghazy Assassa, Hatim Aboalsamh, Khaled Alghathbar

 

IAS-2009-1082

Vision based Navigation System of Intelligent Vehicles : a Robust Vehicle Tracking Approach using Mean Shift Procedure

SHEN Huan

 

IAS-2009-1087

2-level-Wavelet-based License Plate Edge Detection

Ming-Kan Wu, Jing-Siang Wei Wei, Hao-Chung Shih, Chian C. Ho

 

IAS-2009-1091

Shibboleth Access for Resources on the National Grid Service (SARoNGS)

Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards, David Wallom, Tiejun Ma, Robert Frank, David Spence, Steven Young, Claire Devereux, Neil Geddes

 

IAS-2009-1095

Detecting Stepping-Stone Intruders with Long Connection Chains

Wei Ding, Matthew Hausknecht, Shou-Hsuan Huang, Zach Riggle

 

IAS-2009-1100

A New Efficient and Strongly Secure Authenticated Key Exchange Protocol

Qingfeng Cheng, Guangguo Han, Chuangui Ma

 

IAS-2009-1104

A Novel Boiler Flame Image Segmentation and Tracking Algorithm Based on YCbCr Color Space

Min Xie

 

IAS-2009-1110

The Research of Mobile Agent-based Distributed

zheng guping

 

IAS-2009-1113

Novel OFDMA Uplink Initial Ranging scheme for IEEE 802.16e

Hengli Pang, Bingbing Li, Gang Liu

 

IAS-2009-1116

Analysis the Properties of TLS Based on Temporal Logic of Knowledge

Chao Lv, Hui Li, Jianfeng Ma

 

IAS-2009-1126

Image Encryption with Discrete Fractional Cosine Transform and Chaos

Lin Zhang, Jianhua Wu, Nanrun Zhou

 

IAS-2009-1130

A Performance Evaluation of Security Mechanisms for Web services

Bachar Alrouh, Gheorghita Ghinea

 

IAS-2009-1135

StSUT2 structure prediction based on nucleic acid sequence using GA-BP

Zhengwei Zhu, Yuying Guo, Yuhong Jin

 

IAS-2009-1141

Judging Smelting End-point of Fuming Furnace Using Tertiary Tuyere Flame

Zhengwei Zhu, Yuying Guo

 

IAS-2009-1146

Research on Early Warning for Worm Propagation Based on Area-Alert-Level

lina zhu, chaoyi sun, li feng

 

IAS-2009-1150

Dynamic Behavior of SIRS Model with Feedback on Complex Networks

Damin Zhang, Shaohong Cai

 

IAS-2009-1153

The Research on the Measurement of China Internet Illegal and Harmful Content

Qiang Song, Gang Li

 

IAS-2009-1159

Augmented Addition Operation of Conic Curves over Ring Zn

LI Guojing

 

IAS-2009-1162

f8 Keystream Generator with SMS4 as Core Algorithm

Yingsong Wang, Wei Chen

 

IAS-2009-1168

A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVC

Bo Wang, Min Li

 

IAS-2009-1174

Waveform Analysis Mathematic Based on Ultrasonic Displacement Measure

wang yuhui

 

IAS-2009-1179

Ic-MMSE Iterative Detectors for V-BLAST Systems with Channel Estimation Error

Wang Yan, Yuxia Li, Biao Shi

 

IAS-2009-1183

Cryptoanalysis on two Signcryption Schemes

jianhong zhang

 

IAS-2009-1197

Defending against UDP Flooding by Negative Selection Algorithm based on Eigenvalue Sets

Xu Rui, Ma Wen-li, Zheng Wen-ling

 

IAS-2009-1213

Research on Integration of Safety Analysis in Model-driven Software Development

chen feng

 

IAS-2009-1218

Analysis of a Mathematical Model for SIRS Worm Propagation

Chen Junhua

 

IAS-2009-1224

Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate

Chen Junhua

 

IAS-2009-1230

A Two-stage Approach for Jump-diffusion Model and Application to Daily Data of USD/CNY Exchange Rates

Ruicheng Yang, Fenglei Wang, Yingying Zhou

 

IAS-2009-1238

Multi-Role Aggregation Algorithm in Event Driven Wireless Sensor Networks

Ying Chen, Jian Shu, LinLan Liiu, Jiajie Gong

 

IAS-2009-1244

Remark on Yu et al.¡¦s Online/Offline signature scheme in CT-RSA 2008

XiaoLong Ma, ZhiWei Wang, YiXian Yang

 

IAS-2009-1247

Negotiation-based Cross-domain Access Control in Grid Environments

Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang

 

IAS-2009-1250

A novel video shot segmentation based on textural features

yin wang, xinqi lin, xiangming wen

 

IAS-2009-1256

Implementing and Testing Producer-Consumer Problem using Aspect-Oriented Programming

Zhang Yang, Zhang Jingjun, Zhang Dongwen

 

IAS-2009-1260

An Identification Method for Transient Capacitive Current of Distribution Network by ICMAC

Janwen Zhao, Yuanbin Hou

 

IAS-2009-1267

Secure Disk with Authenticated Encryption and IV Verification

Fangyong Hou, Hongjun He

 

IAS-2009-1271

Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264

Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu

 

IAS-2009-1293

Image Denoising and Magnification via Kernel Fitting and Modified SVD

Benyong Liu, Xiang Liao

 

IAS-2009-1296

A Rapid Recursive Method and its Implementation for Modualr Inversion

Bai-wen Fu

 

IAS-2009-1314

Nonlinear Identification Based on Diagonal Recurrent Neural Network and Particle Filter

Xiaolong Deng, Pingfang Zhou

 

IAS-2009-1321

A New Scheme to Privacy-Preserving Collaborative Data Mining

Jianming Zhu

 

IAS-2009-1325

Compensating function of Formant Instantaneous Characteristics in Speaker Identification

Limin Hou, Juanmin Xie

 

IAS-2009-1330

A Two-Description Distributed Video Coding

Anhong Wang, Yao Zhao, Zhihong Li

 

IAS-2009-1335

A Fragile Software Watermarking for Tamper-Proof

Changle Zhang, Hong Peng, Xianzhong Long

 

IAS-2009-1340

Guess and Determine Attack on SOSEMANUK

Lin Ding

 

IAS-2009-1346

Intrusion Detection Based on One-class SVM and SNMP MIB date

cuimei bao

 

IAS-2009-1353

E-government Security Management: Key Factors and Countermeasure

wang jinfu

 

IAS-2009-1356

Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation

Xie zhihua

 

IAS-2009-1366

Curvelet Domain Watermark Detection Using Alpha-Stable Models

chengzhi deng

 

IAS-2009-1372

Trusted Computing Based Mobile DRM Authentication Scheme

Zhen YANG

 

IAS-2009-1375

The Sync Tracing Based on Improved Genetic Algorithm Neural Network

Yuanbin Hou, Chunfeng Song

 

IAS-2009-1378

Soft DSP Design Methodology of Face Recognition System on Nios II Embedded Platform

Hao-Chung Shih, Chian C. Ho

 

IAS-2009-1381

Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform

Cheng Xiaorong, Xie Kun, Wang Dong

 

IAS-2009-1387

Threats Identification in Healthcare Information Systems using Genetic Algoritm and Cox Regression

Rabiah Ahmad

 

IAS-2009-1391

Algebraic Attack to SMS4 and the Comparison with AES

Ji Wen, Hu Lei, Ou Haiwen

 

IAS-2009-1401

An improved Image Encryption Scheme Based on Line Maps

Li Juan, Feng Yong, Yang Xuqiang

 

IAS-2009-1414

A Role and Activity Based Access Control Model for University Identity and Access Management System

Shuliang Zheng, Dongxing Jiang

 

IAS-2009-1418

The Improving of IKE with PSK for Using in Mobile Computing Environments

Yu Dingguo, Chen Nan, Tan Chengxiang

 

IAS-2009-1421

Multiresolution target detection in wavelet domain for SAR imagery

yuan xiaohong

 

IAS-2009-1425

Low bit rate ROI-based SAR image compression

yuan xiaohong

 

IAS-2009-1439

An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-time Systems

xian-bo He

 

IAS-2009-1449

An Optimal Blind Signature padding with Message Recovery

Jingran Wang, Haifeng Qian

 

IAS-2009-1455

History and Future Information Based Trust Model in C2C

Shaomin Zhang, Xiayan Zhang

 

IAS-2009-1462

New Greedy Algorithm for Computing Double-Base Chains

Ming Li, Kunpeng Wang

 

IAS-2009-1466

Network Security Situation Awareness using Exponential and Logarithmic Analysis

Xiaobin Tan, Guihong Qin, Yong Zhang, Ping Liang

 

IAS-2009-1470

Image Retrieval Based on Composite of Mean Shift and Assignment Model

Chen Wenbing, Li Yizhou

 

IAS-2009-1475

Non-interactive Evaluation of Encrypted Elementary Functions

Liang Chen, Chengmin Gao, Yong Xu

 

IAS-2009-1480

Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System

Baoyi Wang, Jing Li, Xueying Guo

 

IAS-2009-1484

Roaming Authentication and Key Agreement Protocol with Anonymity for Wireless Mesh Sensor Networks

Qingquan Peng, Qingqi Pei, Xiuqiang Wu, Liaojun Pang

 

IAS-2009-1487

Fuzzy Intrusion Detection System via Data mining technique With sequences of System Calls

Mohammad Akbarpour Sekeh

 

IAS-2009-1506

The Three-Party Password Authenticated Key Exchange Protocol with Stronger Security

Ding XiaoFei, Ma ChuanGui

 

IAS-2009-1512

Hierarchical Distributed Alert Correlation Model

Donghai Tian

 

IAS-2009-1516

Octa-Log-Polar Fourier Transform for Image Registration

Xian-xiang Wu, Bao-long Guo, Juan WANG

 

IAS-2009-1522

Fingerprint Matching Using Multiple Sets of Invariant Moments

Ju Cheng Yang, Dong Sun Park

 

IAS-2009-1525

An Eco-Defending Architecture for Network Security Based on Immunity and Mobile Agents

Tongrang Fan, Yan Sun, Yongbin Zhao

 

IAS-2009-1530

A Novel Approach for Audio Watermarking

Mazdak Zamani, Azizah Manaf, Rabiah Ahmad

 

IAS-2009-1535

Research on Gravity-based Anomaly Intrusion Detection Algorithm

Baoyi Wang, Ranran Jin, Xiaomin Zhao

 

IAS-2009-1538

Study on Centralized Authorization Model Supporting Multiple Access Control Models

Shaomin Zhang, Haiyan Zhang

 

IAS-2009-1548

An improved weighted-feature clustering algorithm for k-anonymity

Lijian Lu, Xiaojun Ye

 

IAS-2009-1557

Cryptanalysis of a Knapsack Public Key Cryptosystem

Wang Baocang

 

IAS-2009-1563

Research on Security Architecture for Defending Insider Threat

Wang Hui

 

IAS-2009-1567

A New Knapsack Public-Key Cryptosystem

Zhang Weidong, Wang Baocang, Hu Yupu

 

IAS-2009-1574

Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC

kan chang

 

IAS-2009-1579

Anti-protocol attacks digital watermarking Based on Media-Hash and SVD

WANG Jing-pei, SUN Shui-fa

 

IAS-2009-1584

Network Traffic Emulation Based on Representative Network Behavior and Protocols

Yan Pan, Tao Wang

 

IAS-2009-1590

A RST Invariant Watermarking Scheme Using SVM and Image Moments for Synchronization

Wu Jianzhen

 

IAS-2009-1596

An Improved Genetic Algorithm for Power Grid

Youchan Zhu, Xueying Guo, Jing Li

 

IAS-2009-1605

Improvement of an EPC Gen2 compliant RFID authentication protocol

Kuo-Hui Yeh, N.W. Lo

 

IAS-2009-1616

An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks

chen chen, li hui, pei qingqi, pang liaojun

 

IAS-2009-1622

ID-based Key Management Strategies of Clustering Wireless Sensor Networks

Zhiming Zhang

 

IAS-2009-1625

Multimodal Biometric Recognition Based on Complex KFDA

Zhifang Wang, Qiong Li, Qi Han, Xiamu Niu

 

IAS-2009-1628

An Approach to Checking SOC Timing Safety

Du Zhenjun

 

IAS-2009-1644

A New Interacting Multiple Model Algorithm Based on the Unscented Particle Filter

Xiaolong Deng, Pingfang Zhou

 

IAS-2009-1647

Appraisal Model of MIS in Enterprises Based on the Unascertained Measurement

sun yonghao

 

IAS-2009-1655

GOP-level Transmission Distortion Modeling for Video Streaming over Mobile Networks

Yu Han

 

IAS-2009-1661

A Model Based on Information Entropy to Measure Developer Turnover Risk on Software Project

Rong Jiang

 

IAS-2009-1664

Performance Evaluation of IEEE802.11-based Ad-hoc Wireless Networks in Vehicular Environments

shen yong

 

IAS-2009-1670

Optimal Information Rates of Novel Graph Based Access Structures

Mingkun Yang

 

IAS-2009-1676

Research on Intrusion Detection Based on an Improved SOM Neural Network

Jiang Dianbo

 

IAS-2009-1682

Windows Memory Analysis Based on KPCR

Ruichao Zhang, Lianhai Wang, Shuhui Zhang

 

IAS-2009-1687

Practical Quantum No-Key Protocol with Identification

Yang Wu, Li Yang

 

IAS-2009-1690

An Automated Mechanism of Security Test on Network Protocols

Yahui Yang, Yunfei Chen, Min Xia

 

IAS-2009-1693

Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured Topology

Xiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang

 

IAS-2009-1698

A New Fingerprint Sequences Matching Algorithm for Content-based Copy Detection

Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang

 

IAS-2009-1704

Towards Secure Content Based Dissemination of XML Documents

Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad

 

IAS-2009-1709

research on system of Chinese document copy detection

Cheng yuzhu, Qiu chunrong, Tang weiqi, Den wenda

 

IAS-2009-1724

Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT Domain

Cheng Deng

 

IAS-2009-1734

Image moment-based Registration scheme utilizing Support Vector Machine

Wu Jianzhen

 

IAS-2009-1738

A Efficient hierarchical group key management scheme based on orthogonal vectors

Jing Wang, Xiaola Lin

 

IAS-2009-1744

Universal Steganalysis to Images with WBMC model

yang xiaoyuan, wang shifeng, liu jia

 

IAS-2009-1747

Threats to Health Information Security

Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail

 

IAS-2009-1751

Membership-based Access Control for Trust Negotiation in Open Systems

Ruo-Fei Han, Hou-Xiang Wang, Hui Li, Yu-Hua Wang

 

IAS-2009-1756

Evaluation and Simulation on the Performance of DHTs required by P2PSIP

Zengming Tian, xiangming wen, Yong Sun, Wei Zheng, Yinbo Cheng

 

IAS-2009-1767

POSITION VERIFICATION IN MULTI-HOP VEHICULAR NETWORKS

Deepa Rajan, Chetan Yeole, Harsha Nakade, Ye Zhu, Huirong Fu

 

IAS-2009-1775

A database protection system aiming at SQL attack

Liwu Deng, Ruzhi Xu, Lizheng Jiang

 

IAS-2009-1781

Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation

Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim

 

IAS-2009-1784

Security Threats and Countermeasures for Intra-Vehicle Networks

David Wampler, Huirong Fu, Ye Zhu

 

IAS-2009-1789

An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad hoc Networks

LIU Jian, LI Fangmin

 

IAS-2009-1794

Efficient Protection Scheme for SVC Content Based On Network Coding

Ji Lu, Song Xiao, Chengke Wu

 

IAS-2009-1799

Application of Particle Swarm Optimization in Fussy Neural Networks

Qingnian Wang, Kun Yan, Xiaofeng Wan, Meiling Yuan

 

IAS-2009-1810

DWT-Based Shot Boundary Detection Using Support Vector Machine

Li Jun, Ding YouDong

 

IAS-2009-1816

Information Security Wireless Sensor Grid

MingMIng Li, BaiPing Li, Wei Li, Lei Chen

 

IAS-2009-1825

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

Wei Ren

 

IAS-2009-1829

Identity based Multi-Proxy Multi-Signcryption Scheme for Electronic Commerce

Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu

 

IAS-2009-1835

Information Security Monitoring System based on Data Mining

Guangjuan Lv

 

IAS-2009-1841

Quality Assessment of Aluminum Alloy Resistance Spot Welding Based on Wavelet and Statistic Analysis

Peng Zhao

 

IAS-2009-1847

Optimal Combination of H.264AVC Coding Tools for Mobile Multimedia Broadcasting Application

Yu Han

 

IAS-2009-1851

Image compression algorithm based on decreasing bits coding

Shengbing CHE, Zuguo CHE, Haiyang WANG, Qiangbo HUANG

 

IAS-2009-1857

A Method for Access Trusted Services Based on Service-Oriented Architecture

Xin Yu, Yu Bai

 

IAS-2009-1860

Distributed Event-triggered Trust Management for Wireless Sensor Networks

Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng

 

IAS-2009-1863

BAN logic based Kerberos protocol analysis

Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, Weidong Kou

 

IAS-2009-1869

A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform

He Xiang

 

IAS-2009-1874

Modeling the co-evololution DNS worms and anti-worms in IPv6 networks

Pantelis Kammas, Thodoros Komninos, Yannis Stamatiou

 

IAS-2009-1881

System-generated technology research on improving the accounting

Yuzhong Mao, Guangming Yang

 

IAS-2009-1887

Distributed Video Coding Based on Multiple Description

Hongxia Ma

 

IAS-2009-1892

ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant Faults

Liu Guanghui

 

IAS-2009-1897

Secure Constructing Bluetooth Scatternet Based on BTCP

Xin Yu, YuPing Wang

 

IAS-2009-1907

An Extensible and Virtualization-Compatible IDS Management Architecture

Sebastian Roschke, Feng Cheng, Christoph Meinel

 

IAS-2009-1913

Number-theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme

Fanyu Kong, Jia Yu

 

IAS-2009-1919

Research on Quantitative Evaluation for Integrity

Yunchuan Guo, Lihua Yin, Yuan Zhou

 

IAS-2009-1922

Application of Bloom Filter for GTP Stateful Inspection in Network Processor

Liu Zhenyu

 

IAS-2009-1928

Resisting Abuse-Freeness Fair Electronic Payment Protocol

Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, Weidong Kou

 

IAS-2009-1934

Swarm Intelligence:Ant-based Robot Path Planning

Jing Zhou, Guan-Zhong Dai, De-Quan He, Ma Jun, Cai Xiao-Yan

 

IAS-2009-1940

Infrared Small Weak Target Detection via HOSA

Gaoyu ZHANG

 

IAS-2009-1944

Super Resolution Using a Simple and Practical Sequence Alignment

Kunkun Ma, Peimin Yan, Yongwen Xue

 

IAS-2009-1957

Approaches to Formal Verification of Security Protocols

Suvansh Lal

 

IAS-2009-1972

Research on new classification methods of remote sensing of mass ingredient without vegetation of Hei Shan Gorge in Yellow River basin

Shudong Wang

 

IAS-2009-1977

Performance Analysis of Anonymous Communication System 3-Mode Net

Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, Noboru Babaguchi

 

IAS-2009-1983

Joint entropy analysis model for DDoS attack detection

Rahmani Hamza

 

IAS-2009-2001

Space Time Block Coded MIMO System with Redundant Antennas

Feng Wang

 

IAS-2009-2004

Efficient Certificate-Based Signature Scheme

Yang Ming, Yumin Wang

 

IAS-2009-2019

A Comparative Statistical Analysis of Pseudorandom Bit Sequences

Rashidah Kadir, Mohd Aizaini Maarof

 

IAS-2009-2025

ROBUST IMAGE WATERMARKING IN THE WAVELET DOMAIN FOR COPYRIGHT PROTECTION

Ali Ameri Mahabadi, Mohammad Eshghi

 

IAS-2009-2031

A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform

He Xiang

 

IAS-2009-2035

The Reversible Network Cascade Based on Reversible Logic Gate Coding Method

Hui Li, Zhijin Guan, Shanli Chen, Yuxin Chen

 

IAS-2009-2040

RSA/SHIFT SECURED IFFT/FFT BASED OFDM WIRELESS SYSTEM

Abdelsalam Almarimi, D. Rajaveerappa

 

IAS-2009-2044

UNIVERSAL STEGANALYSIS BASED ON STATISTICAL MODELS USING REORGANIZATION OF BLOCK-BASED DCT COEFFICIENTS

Shaohui Liu

 

IAS-2009-2047

Quality Assessment of Aluminum Alloy Resistance Spot Welding Based on Wavelet and Statistic Analysis

Peng Zhao, Cunhai Pan, Sumei Du

 

IAS-2009-2051

DCT-based Robust Watermarking with Swarm Intelligence Concepts

Hsiang-Cheh Huang

 

IAS-2009-2057

Evaluating Intrusion Detection Systems in High Speed Networks

Faeiz Alserhani, Monis Akhlaq

 

IAS-2009-2082

An intrusion detection algorithm based on decision tree technology

Juan Wang

 

IAS-2009-2085

Redundant Ridgelet Transform and Its Application to Image Processing

Yan Li

 

IAS-2009-2093

Small Moving Infrared Target Detection Algorithm under Low SNR Background

wang kai

 

IAS-2009-2099

Collusion-Resilient fingerprinting Using Cropping and Subsampling

Yueh-Hong Chen