IAS-2009-16
A Synchronic Audio Information Hiding Algorithm Based on
LSB
Wang Junjie
IAS-2009-27
Real-time target tracking in long gray-scale image
sequence
Yiming Chen, Xiaoming Peng
IAS-2009-33
An Efficient CQI Feedback Reduction Scheme for Multi-User
OFDMA network with AMC Mode
xiong xiong
IAS-2009-36
A novel method for plane array infrared image to detect
point target
hong che, longhe sun
IAS-2009-39
Stability monitoring and analysis of Opencast uranic slope Based on GPS
yufeng zhu
IAS-2009-44
An Adaptive Watermarking Algorithm Based on Multi-scale
Morphological Gradient and Fussy theory in Wavelet Domain
Chen Wen-yong, Fan Yan-bin
IAS-2009-55
Restudying the Artificial Immune Model for Network
Intrusion Detection
Xianjin Fang, Jingzhao Li, Longshu
Li
IAS-2009-61
A Fragile Watermarking Scheme for Tamper-Proof of Web
Pages
Xian Zhong Long, Hong Peng
IAS-2009-64
Development of a Java-oriented software general component
library
XIAO Han, ZHANG Zu-xun, HU Hua-liang
IAS-2009-70
Car license plate location based on the density and
projection
Jun Ren SU, Zheng MA
IAS-2009-81
Privacy Protection Model for Distributed Service System
in Converged Network
Shangqin Zhong, Chen Liu, Zhengqiu
Yang
IAS-2009-100
Bearings Fault Diagnosis Based on the Optimal Impulse
Response Wavelet
dan zhang
IAS-2009-111
On-Line Diagnosis of the Motor Circuit Based on RBF-CMGA
Mingjiang Hu, Liqiao Qi
IAS-2009-114
A Novel OFDM Interpolation Algorithm Based on Comb-Type
Pilot
chunlong he
IAS-2009-131
Automatic Localization and Marking for Features of Skull
by CT Image
Bin Yu, Anbing Wang, Mingquaen Zhou
IAS-2009-141
INTRUSION DETECTION BASED ON ¡§HYBRID¡¨ PROPAGATION IN
BAYESIAN NETWORKS
Farah Jemili, Mohamed Ben
Ahmed, Montaceur Zaghdoud
IAS-2009-153
Security metrics for SOA
Vinoth Sivasubramanian
IAS-2009-165
Organizational Barriers to the Implementation of Security
Engineering
Bryan Cline
IAS-2009-169
ID-based non-interactive deniable authentication protocol
Weimin Shi
IAS-2009-179
Digital Watermark Method Based on
Wenlue Chen Wenlue Chen
IAS-2009-185
Binary Image Watermarking Algorithm Based on Singular
Value Decomposition
hu zhihua hu
zhihua
IAS-2009-189
A secret sharing scheme based on NTRU algorithm
Bu Shan Yue
IAS-2009-193
On Security Notions for Verifiably Encrypted Signature
Xu an Wang, Xiaoyuan Yang
IAS-2009-196
Proxy Re-encryption Scheme Based on SK Identity Based
Encryption
Xu an Wang, Xiaoyuan Yang
IAS-2009-200
Data Security Analysis of WebGIS
Based on Tile-Map Technique
Li Haiting, Li Yanhong
IAS-2009-203
A new image restoration algorithm based on variational derivative
Zhang Wenjuan, Feng Xiangchu
IAS-2009-221
Study of Embedded System Design Based RFID Securities
Shi Lingfeng, Lai Xinquan, Guo
Baolong
IAS-2009-226
Construction of Intelligentized
Hu Kai
IAS-2009-231
Visibility Estimation Based on Mean Shift
Chen Wenbing, Yang Jianwei
IAS-2009-235
Implementation of G.729 Codec Based on Mediastreamer Technology
Liting Hu, Hezhi Lin, Lianfen Huang, Jianan Lin
IAS-2009-238
A Watermarking Scheme Based on Two-dimensional Wavelet
Filter Parametrization
Cheng Guosheng
IAS-2009-242
Image Retrieval Based on Primary Cluster
Chen Wenbing, Yang Jianwei, Wang wei
IAS-2009-247
Fast Fractal Image Coding Using Ambient-Cross Sum of
Normalized Block
Gaoping Li
IAS-2009-250
An Effective Texture Spectrum Descriptor
wu xiaosheng
IAS-2009-256
The application on the evaluation of quality of
universities undergraduate theory teaching work based on artificial neural
network
Jun-qiao Qi
IAS-2009-269
Application and Research of
Feng TIAN, Xiao-bing HAN, Ying WEI
IAS-2009-281
Lossy Compression of CFA Image Based on Multiwavelet
Packet
QiGui Zhang
IAS-2009-284
A Digital Certificate Application Scheme in Content
Protection System for High Definition Digital Interface
Kefeng Fan
IAS-2009-290
Analysis of person identification based on Motor imagery
EEG
Xuecai Bao, Jinli Wang, Jianfeng Hu
IAS-2009-297
Words Clustering Based on Keywords Indexing from
Large-scale Categorization Corpora
hua liu
IAS-2009-308
Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling
Enke LI, Xiaoning FU, Shangqian
LIU, Shimin YIN
IAS-2009-311
A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion to
Image Denoising
Weibin Zhang, Xiangchu Feng, Weiwei
Wang
IAS-2009-327
Infrared Face Recognition Based on Blood Perfusion and
Fisher Linear Discrimination Analysis
Xie zhihua
IAS-2009-330
E-Government System: From the Perspective of
Dependability
MANISH POKHAREL
IAS-2009-340
Research on Equiponderant Forwarding within Multi-nexthop Interfaces
Ning-Ning Liang, Xuan-Yong Zhu, Ju-Long
Lan, Juan Shen
IAS-2009-346
Certi ß öcateless One-Way Authenticated Two-Party Key
Chen wuping
IAS-2009-349
Improved Multi-grade Fuzzy Comprehensive Evaluation for
Mechanism Selection
kaidi liu, jimei
hao, yanjun pang
IAS-2009-352
A deep copy protection framework for electronic devices
within home
Yang Zhan, Haibo Tian, Yaoyu Zhang, Yumin Wang
IAS-2009-355
One-way Hash function construction based on conservative
chaotic systems
Qing-hua ZHANG, Han ZHANG, Zhao-hui
LI
IAS-2009-361
An Improved SPECK Image Coding Algorithm
Baojun Han
IAS-2009-367
Resistance DPA Attack of RSA on Smartcard
Jin Jifang
IAS-2009-391
Insider DoS Attacks on Epidemic
Propagation Strategies of Network Reprogramming in Wireless Sensor Networks
Yu ZHANG, Xing She ZHOU, Yee Wei LAW, Marimuthu
PALANISWAMI
IAS-2009-403
A Model of Intrusion Prevention Base on Immune
yaping jiang, zengyu cai, yong gan
IAS-2009-407
An Accurate Image Juggling Authentication Algorithm
Jianquan XIE, Chunhua YANG, Qing XIE
IAS-2009-411
Using the Danger Theory of Immune Systems for Intrusion
Detection
lu hong
IAS-2009-431
A Secure ID-Based Explicit Authenticated Key Agreement
Protocol without Key Escrow
Mengbo Hou, Qiuliang Xu
IAS-2009-434
Texture feature analysis on erosion and wear in artillery
chamber
FU Xiao-ning, LI En-ke, GAO Wen-jing
IAS-2009-437
SPAM WEEDING,DETECTION AND
FILTERING ON P2P SYSTEM
PACKIAVATHY MANICKAVELU, SARULADHA K
IAS-2009-440
FREM-based adaptive target queue length ATFREM algorithm
王 连枝
IAS-2009-448
A New JPEG Resistant Color Image Watermarking Algorithm
Based on Quantization Index Modulation
Jie Nie, Zhiqiang Wei, Zhen Li
IAS-2009-453
Non-repudiation Protocols with Expected Delivery
Li Yanping
IAS-2009-456
Browser-side Countermeasures for Deceptive Phishing
Attack
Huajun Huang, Shaohong Zhong,
Junshan Tan
IAS-2009-460
Image retrieval based on character-matching technology
shan zhao, jing
liu
IAS-2009-468
A Robust Watermark Algorithm for JPEG2000 Images
Gao Haiying
IAS-2009-478
A New Multi-Bank E-cash Protocol with Anonymity Control
Lingling Wang
IAS-2009-484
Forward-Secure Certificate-Based Encryption
Yang Lu, Jiguo Li
IAS-2009-489
Emergency Command System for geologic disasters
prevention
wenbiao peng, chaojun
yan, lihua deng
IAS-2009-505
Image Quality Evaluation Based on Human Visual Perception
Fan Zhang
IAS-2009-515
Study on Ultrasonic Ranging System Design
Deng Lihua
IAS-2009-525
Boosting Graph Embedding with Application to Facial
Expression Recognition
Lei Xiong, Duyan
Bi, Xu Zhou, Shiping Ma
IAS-2009-528
Microarray Image Segmentation Using Region Growing
Algorithm and Mathematical Morphology
Ping Ye, Guirong Weng
IAS-2009-532
Fuzzy Identity Based Encryption Scheme with Some Assigned
Attributes
Ximing Li, Bo Yang
IAS-2009-543
Automatic Reception of High-frequency CW Telegraph with
Support Vector Machine
Guo-jun Li
IAS-2009-546
An Improved Scheme of Single Sign-On Protocol
Jian Yang
IAS-2009-549
Deadlock Detection Based on Resource Allocation Graph
Ni Qinqin
IAS-2009-552
Comments on Two Password Authentication Schemes
Zuowen Tan
IAS-2009-558
The SOBER Family Ciphers Reconfigurable Processing
Architecture Design
wang zhiyuan
IAS-2009-571
Optimal Face Recognition Method using Ant Colony based
Back Propagation Network
Banani Saha, Dichen Dolkar
IAS-2009-575
An Audio Watermarking Method of Resistance StatisticsAttack Based on Psychoacoustic Model
Liu Xiaoli
IAS-2009-584
Interactive Visualisation of 3D
City Models Based on Adaptive Streaming of 3D-GIS Data
Zhenping Zhang, Jitao Fang
IAS-2009-588
Research on the Switched LAN Monitor Mechanism and its
Implementation Method based on ARP spoofing
Zhan Gao,
Xiangdong Hu, Wei Li
IAS-2009-598
Fingerprint-based Encrypted Fuzzy Vault
Feng Quan, Su Fei, Cai Anni
IAS-2009-608
Webpage Encryption Based on Polymorphic Javascript Algorithm
Bai Zhongying, Qin Jiancheng
IAS-2009-613
An Implementation Strategy of Global OLTP based on ODS in
Heterogeneous Environment
Yue Zhang, Jie Liu, hang li
IAS-2009-618
Assessment of Color Video Quality with Singular Value
Decomposition of Complex Matrix
Fuqiang Zhang, Junli Li
IAS-2009-623
Image denoising based on
nonlocal diffusion
Yu Han, Wei-Wei Wang, Xiang-Chu Feng
IAS-2009-626
A Modified Run-length Image Data Hiding for High
Embedding Capacity
Lin Rey-Sern, Hu Shang-Wen
IAS-2009-631
Domain Administration of Task-role Based Access Control
for Process Collaboration Environments
Yahui Lu, Li Zhang
IAS-2009-636
An Attack Model Based on Both-Branch Fuzzy Logic and
Fuzzy Petri Net
Qiuqin LU
IAS-2009-640
the Method of Equalization based on Iterative Interference Cancellation for
SCCPM System
wusheng zhao, yongqing
fu, zhixue han
IAS-2009-646
Analysis of One-way Alterable Length Hash Function Based
on Cell Neural Network
yang qunting
IAS-2009-652
Design and Implementation of SIP-based VoIP Surveillance
System
Ching-Lung Chang, Yi-Ji Jheng
IAS-2009-656
Design and Implementation of SIP-based VoIP Tester
Ching-Lung Chang, Yi-Fong Lin
IAS-2009-662
Perona-Malik Model Based on Wave Atom
Guojun Liu, Xiangchu Feng, Binbin Hao
IAS-2009-667
The Research on the Simulation Application of Fuzzy
Control in STATCOM
Yongtao Dai
IAS-2009-677
Sample-based generation of dictionaries in the keyword
spotting system
Lu Li, Ge Fengpei, Ta Li
IAS-2009-682
A New Feature Selection Method for Malcodes
Detection
Zhang Xiaokang, Shuai Jianmei
IAS-2009-685
The Research of NULL Convention Logic Circuit Computing
Model targeted at Block Cipher Processing
cui yalei, dai zibin
IAS-2009-702
A Fast Correlation Attack via Parallel Computing
Qiong Liu, Yupu Hu
IAS-2009-705
A Joint Multiscale Algorithm
with Auto-adapted Threshold for Image Denoising
He Jin
IAS-2009-708
Accelerating RC4 encryption algorithm using \"Ultra Gridsec\" Scheme and \"HIMAN\" Grid
Middleware and secure data passes inside \"HIMAN\" using the accelerated
RC4
Hisham Kholidy
IAS-2009-719
Grounding Grids Corrosion Diagnosis Based on Large Change
Sensitivity
liu liqiang, luo
xianjue, niu tao
IAS-2009-723
A New Conic Curve Digital Signature Scheme
Lin You
IAS-2009-727
A New Scheme for Multisensor
Image Fusion System
Liu Weiguang, Wang Wenqi, Cui
Jiangtao
IAS-2009-731
Nonlocal Curvature-Driven Diffusion Model for Image Inpainting
li li, wang weiwei, han yu
IAS-2009-734
National Information Infrastructure Security and Cyber
Terrorism
Jianfeng Li
IAS-2009-739
A Support Vector Machines Security Assessment Method
Based on Group Decision-marking for Electric Power Information System
Xiaorong Cheng, yan Wei, xin Geng
IAS-2009-752
W-Aegis: A Propagation Behavior Based Worm Detection
Model for Local Networks
Zhanyong TANG, Rui QI, Yangxia
LUO, Dingyi FANG
IAS-2009-756
Dynamic Behavior of SIS Epidemic Model with Feedback on
Regular Lattice
Damin Zhang, Shaohong Cai
IAS-2009-760
A high-efficiency Data Distribution Algorithm in
Distributed Storage
liu zhen
IAS-2009-766
A Novel Distributed Single Sign-On Scheme with
Dynamically Changed Threshold Value
Shangping Zhong, Xiangwen Liao,
Xue Zhang, Jingqu Lin
IAS-2009-771
A Time-and-times-limited Strong Direct Anonymous
Attestation Scheme
Yue Chen
IAS-2009-778
Reduction Specular Reflection
components of Chrome-plated Surface with Varying Light Direction
Li Chang Jiang, Zhong ZHANG
IAS-2009-785
A study on the Algorithm Based on Image Color Correlation
Mining
Yongyue Chen
IAS-2009-800
An Anti-attack Watermarking Based on Synonym Substitution
Algorithm for Chinese Text
Lin Linjianbin, He Lu, Li Tianzhi, Fang Dingyi
IAS-2009-804
Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams
Min Li, Bo Wang
IAS-2009-808
Whole Frame Loss Recovery Algorithm for H.264 decoders
Min Li, Bo Wang
IAS-2009-813
An approach to group decision making based on Incomplete
Linguistic Preference Relations
Tien-Chin Wang, Shu-Chen Peng,
Shu-Chen Hsu, Juifang Chang
IAS-2009-818
Constructions of Some Difference-Balanced d-form
Functions
Tongjian YAN, LI Hong
IAS-2009-822
Evaluation Research of the talent training on the Digital
Entertainment Based on Set Pair Analysis
WANG Xizhong
IAS-2009-843
Application of the Fuzzy Entropy Weight in Risk
Assessment of the Engineering Project
Yingchen WANG
IAS-2009-847
Safety Evaluation Management on the Construction Based on
Set Pair Analysis
Yingchen WANG
IAS-2009-853
Appraisal Research of the Data Mining and Knowledge
Discovery in University Library based on the Unascertained Measure Model
Hua JIANG
IAS-2009-867
Performance Analysis for
Tao You, Cheng-lie Du, Yi-an Zhu
IAS-2009-872
Supporting Technology for Virtual Numerical Control
System based on RTX and Reflective Memory Network
Tao You, Cheng-lie Du, Da-peng
Zhang
IAS-2009-875
Simulation Modeling Method of Production System Based on
Aspect-oriented Technology
Tao You, Cheng-lie Du, Yi-an Zhu
IAS-2009-879
Cepstrum-based Audio Watermarking Algorithm against the A/D and D/A Attacks
Xiaoming Zhang, Zhaoyang Yu
IAS-2009-884
An order-preserving encryption method operating the
encrypted data directly
Youxiang Duan, Yanqiu Li
IAS-2009-890
Yuan Bai, Xing zhang
IAS-2009-897
Exploiting RFC2828 as a Domain Vocabulary for Identifying
IT Security Literature
Lidong WANG, Liping QIAN
IAS-2009-903
Design of Fault Diagnosis System of FPSO Production Process
Based on MSPCA
han miao
IAS-2009-909
An Intrusion detection system for network storage based
on system calls
Li-zhong Geng,
Hui-bo Jia
IAS-2009-927
Cost-Benefit Analysis of China¡¦s Internet Content
Regulation
Qiang Song, Gang Li
IAS-2009-933
Research on Active Defence
Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel
Xuedou Yu
IAS-2009-947
A Novel Micropayment Scheme with Complete Anonymity
Xin Zhao, Yuqin Lv, Wenxin He
IAS-2009-953
Risk Assessment Model for E-commerce Security Based on
FCE
IAS-2009-966
Two efficient fragile web page watermarking schemes
peng sun, hongtao lu
IAS-2009-970
The Research of Simulation for Network Security Based on
System Dynamics
Kong Hong-shan, Zhang Ming-qing, Tang Jun, Luo Chang-yuan
IAS-2009-977
A new Algorithm for Outlier Detection based on Offset
Yue Zhang, Jie Liu
IAS-2009-981
Information Security Solution Decision-making Based on
Entropy Weight and Gray Situation Decision
CHEN Lin, LI Li, HU Yong, LIAN Ke
IAS-2009-984
An Improving Technique of Color Histogram in
Segmentation-based Image Retrieval
zhenhua zhang
IAS-2009-988
The Design and Implenmatation of Security Defense Technology Based on
Mandatory Running Control
Wu Kehe, Zhang Tong, Ma Gang
IAS-2009-994
User QoS Preference Description,Computation and
Application
Quan Liang, Yuanzhuo Wang
IAS-2009-1000
Service Selection Algorithm with QoS
Preference in Grid Environment
Quan Liang, Yuanzhuo Wang
IAS-2009-1004
Research of Access Control of USB Storage Device with
Information Security in Unauthorized Internet Access Monitoring System
GAO Teng
IAS-2009-1008
Researches on Integrating Database Access Control and
Privacy Protection
Yonghong Yu
IAS-2009-1014
Finding RFID Tags using Scalable, Efficient and Secure
Search Protocol
Sheikh Ahamed
IAS-2009-1032
An Evaluation Model for Degree of Topic Relatedness Based
on Dynamic Matching
Bin Yu
IAS-2009-1038
Adaptive Spatially Postprocessing
Technique to Remove Blocking Artifacts for DCT Coded Image
Jin Wang, Heechang Kim, Jongho Kim,
Jechang Jeong
IAS-2009-1042
A New Source Address Validation Scheme Based on IBS
Ning-ning Lu
IAS-2009-1047
Quantum secure direct communication based on partially
entangled states
Yang Xinyuan, Ma Zhi, Lü Xin, Li Hongxin
IAS-2009-1052
Self-selecting Sub-secret Keys Sharing Scheme Based on
Polynomials over Elliptic Curve
Wang caimei, Li Zhengmao
IAS-2009-1055
A Multi-View Nonlinear Active Shape Model Based on 3D
transformation Shape Search
Yi Faling, Xiong
Wei, Huang Zhanpeng, Zhao Jie
IAS-2009-1059
Watermarking Relational Databases for Ownership
Protection Based on DWT
Chuanxian Jiang
IAS-2009-1067
A Secure Semi-Fragile JPEG Image Authentication Scheme
Based On Discrete Cosine Transform
Mona Fatma Mursi,
Ghazy Assassa, Hatim Aboalsamh, Khaled Alghathbar
IAS-2009-1082
Vision based Navigation System of Intelligent Vehicles : a Robust Vehicle Tracking Approach using Mean
Shift Procedure
SHEN Huan
IAS-2009-1087
2-level-Wavelet-based License Plate Edge Detection
Ming-Kan Wu, Jing-Siang Wei Wei,
Hao-Chung Shih, Chian C. Ho
IAS-2009-1091
Shibboleth Access for Resources on the National Grid
Service (SARoNGS)
Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards,
David Wallom, Tiejun Ma,
Robert Frank, David Spence, Steven Young, Claire Devereux, Neil Geddes
IAS-2009-1095
Detecting Stepping-Stone Intruders with Long Connection
Chains
Wei Ding, Matthew Hausknecht, Shou-Hsuan Huang, Zach Riggle
IAS-2009-1100
A New Efficient and Strongly Secure Authenticated Key
Exchange Protocol
Qingfeng Cheng, Guangguo Han,
Chuangui Ma
IAS-2009-1104
A Novel Boiler Flame Image Segmentation and Tracking
Algorithm Based on YCbCr Color Space
Min Xie
IAS-2009-1110
The Research of Mobile Agent-based Distributed
zheng guping
IAS-2009-1113
Novel OFDMA Uplink Initial Ranging scheme for IEEE
802.16e
Hengli Pang, Bingbing Li, Gang Liu
IAS-2009-1116
Analysis the Properties of TLS Based on Temporal Logic of
Knowledge
Chao Lv, Hui Li, Jianfeng Ma
IAS-2009-1126
Image Encryption with Discrete Fractional Cosine
Transform and Chaos
Lin Zhang, Jianhua Wu, Nanrun Zhou
IAS-2009-1130
A Performance Evaluation of Security Mechanisms for Web
services
Bachar Alrouh, Gheorghita Ghinea
IAS-2009-1135
StSUT2 structure prediction based on nucleic acid
sequence using GA-BP
Zhengwei Zhu, Yuying Guo, Yuhong Jin
IAS-2009-1141
Judging Smelting End-point of Fuming Furnace Using
Tertiary Tuyere Flame
Zhengwei Zhu, Yuying Guo
IAS-2009-1146
Research on Early Warning for Worm Propagation Based on
Area-Alert-Level
lina zhu, chaoyi sun, li feng
IAS-2009-1150
Dynamic Behavior of SIRS Model with Feedback on Complex
Networks
Damin Zhang, Shaohong Cai
IAS-2009-1153
The Research on the Measurement of
Qiang Song, Gang Li
IAS-2009-1159
Augmented Addition Operation of Conic Curves over Ring Zn
LI Guojing
IAS-2009-1162
f8 Keystream Generator with SMS4 as Core Algorithm
Yingsong Wang, Wei Chen
IAS-2009-1168
A Frequent-Domain VideoTranscoder
with Spatial Downscaling for H.264/AVC
Bo Wang, Min Li
IAS-2009-1174
Waveform Analysis Mathematic Based on Ultrasonic
Displacement Measure
wang yuhui
IAS-2009-1179
Ic-MMSE Iterative Detectors for V-BLAST Systems with Channel Estimation
Error
Wang Yan, Yuxia Li, Biao Shi
IAS-2009-1183
Cryptoanalysis on two Signcryption Schemes
jianhong zhang
IAS-2009-1197
Defending against UDP Flooding by Negative Selection
Algorithm based on Eigenvalue Sets
Xu Rui, Ma Wen-li, Zheng Wen-ling
IAS-2009-1213
Research on Integration of Safety Analysis in
Model-driven Software Development
chen feng
IAS-2009-1218
Analysis of a Mathematical Model for SIRS Worm
Propagation
Chen Junhua
IAS-2009-1224
Modeling and Analyzing the Spread of
Chen Junhua
IAS-2009-1230
A Two-stage Approach for Jump-diffusion Model and
Application to Daily Data of USD/CNY Exchange Rates
Ruicheng Yang, Fenglei Wang, Yingying
Zhou
IAS-2009-1238
Multi-Role Aggregation Algorithm in Event Driven Wireless
Sensor Networks
Ying Chen, Jian Shu, LinLan Liiu,
Jiajie Gong
IAS-2009-1244
Remark on Yu et al.¡¦s Online/Offline signature scheme in
CT-RSA 2008
XiaoLong Ma, ZhiWei Wang, YiXian
Yang
IAS-2009-1247
Negotiation-based Cross-domain Access Control in Grid
Environments
Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang
IAS-2009-1250
A novel video shot segmentation based on textural
features
yin wang, xinqi lin, xiangming wen
IAS-2009-1256
Implementing and Testing Producer-Consumer Problem using
Aspect-Oriented Programming
Zhang Yang, Zhang Jingjun, Zhang
Dongwen
IAS-2009-1260
An Identification Method for Transient Capacitive Current
of Distribution Network by ICMAC
Janwen Zhao, Yuanbin Hou
IAS-2009-1267
Secure Disk with Authenticated Encryption and IV
Verification
Fangyong Hou, Hongjun He
IAS-2009-1271
Octagonal Search Algorithm with Early Termination for
Fast Motion Estimation on H.264
Zhaopeng Cui, Dujuan Wang, Guang
Jiang, Chengke Wu
IAS-2009-1293
Image Denoising and
Magnification via Kernel Fitting and Modified SVD
Benyong Liu, Xiang Liao
IAS-2009-1296
A Rapid Recursive Method and its Implementation for Modualr Inversion
Bai-wen Fu
IAS-2009-1314
Nonlinear Identification Based on Diagonal Recurrent
Neural Network and Particle Filter
Xiaolong Deng, Pingfang Zhou
IAS-2009-1321
A New Scheme to Privacy-Preserving Collaborative Data
Mining
Jianming Zhu
IAS-2009-1325
Compensating function of Formant Instantaneous
Characteristics in Speaker Identification
Limin Hou, Juanmin Xie
IAS-2009-1330
A Two-Description Distributed Video Coding
Anhong Wang, Yao Zhao, Zhihong Li
IAS-2009-1335
A Fragile Software Watermarking for Tamper-Proof
Changle Zhang, Hong Peng, Xianzhong
Long
IAS-2009-1340
Guess and Determine Attack on SOSEMANUK
Lin Ding
IAS-2009-1346
Intrusion Detection Based on One-class SVM and SNMP MIB
date
cuimei bao
IAS-2009-1353
E-government Security Management: Key Factors and
Countermeasure
wang jinfu
IAS-2009-1356
Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation
Xie zhihua
IAS-2009-1366
Curvelet Domain Watermark Detection Using Alpha-Stable Models
chengzhi deng
IAS-2009-1372
Trusted Computing Based
Zhen YANG
IAS-2009-1375
The Sync Tracing Based on Improved Genetic Algorithm
Neural Network
Yuanbin Hou, Chunfeng Song
IAS-2009-1378
Soft DSP Design Methodology of Face Recognition System on
Nios II Embedded Platform
Hao-Chung Shih, Chian C. Ho
IAS-2009-1381
Network Traffic Anomaly Detection Based on
Self-Similarity Using HHT and Wavelet Transform
Cheng Xiaorong, Xie Kun, Wang Dong
IAS-2009-1387
Threats Identification in Healthcare Information Systems
using Genetic Algoritm and Cox Regression
Rabiah Ahmad
IAS-2009-1391
Algebraic Attack to SMS4 and the Comparison with AES
Ji Wen, Hu Lei, Ou Haiwen
IAS-2009-1401
An improved Image Encryption Scheme Based on Line Maps
Li Juan, Feng Yong, Yang Xuqiang
IAS-2009-1414
A Role and Activity Based Access Control Model for
University Identity and Access Management System
Shuliang Zheng, Dongxing Jiang
IAS-2009-1418
The Improving of IKE with PSK for Using in
Yu Dingguo, Chen
IAS-2009-1421
Multiresolution target detection in wavelet domain for SAR imagery
yuan xiaohong
IAS-2009-1425
Low bit rate ROI-based SAR image compression
yuan xiaohong
IAS-2009-1439
An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-time
Systems
xian-bo He
IAS-2009-1449
An Optimal Blind Signature padding with Message Recovery
Jingran Wang, Haifeng Qian
IAS-2009-1455
History and Future Information Based Trust Model in C
Shaomin Zhang, Xiayan Zhang
IAS-2009-1462
New Greedy Algorithm for Computing Double-Base Chains
Ming Li, Kunpeng Wang
IAS-2009-1466
Network Security Situation Awareness using Exponential
and Logarithmic Analysis
Xiaobin Tan, Guihong Qin, Yong Zhang, Ping Liang
IAS-2009-1470
Image Retrieval Based on Composite of Mean Shift and
Assignment Model
Chen Wenbing, Li Yizhou
IAS-2009-1475
Non-interactive Evaluation of Encrypted Elementary
Functions
Liang Chen, Chengmin Gao, Yong Xu
IAS-2009-1480
Scanning Task Scheduling Strategy in Distributed
Vulnerability Detection System
Baoyi Wang, Jing Li, Xueying Guo
IAS-2009-1484
Roaming Authentication and Key Agreement Protocol with
Anonymity for Wireless Mesh Sensor Networks
Qingquan Peng,
IAS-2009-1487
Fuzzy Intrusion Detection System via Data mining
technique With sequences of System Calls
Mohammad Akbarpour Sekeh
IAS-2009-1506
The Three-Party Password Authenticated Key Exchange
Protocol with Stronger Security
Ding XiaoFei, Ma ChuanGui
IAS-2009-1512
Hierarchical Distributed Alert Correlation Model
Donghai Tian
IAS-2009-1516
Octa-Log-Polar Fourier Transform for Image Registration
Xian-xiang Wu, Bao-long Guo, Juan WANG
IAS-2009-1522
Fingerprint Matching Using Multiple Sets of Invariant
Moments
Ju Cheng Yang,
IAS-2009-1525
An Eco-Defending Architecture for Network Security Based
on Immunity and
Tongrang Fan, Yan Sun, Yongbin Zhao
IAS-2009-1530
A Novel Approach for Audio Watermarking
Mazdak Zamani, Azizah Manaf, Rabiah Ahmad
IAS-2009-1535
Research on Gravity-based Anomaly Intrusion Detection
Algorithm
Baoyi Wang, Ranran Jin, Xiaomin Zhao
IAS-2009-1538
Study on Centralized Authorization Model Supporting
Multiple Access Control Models
Shaomin Zhang, Haiyan Zhang
IAS-2009-1548
An improved weighted-feature clustering algorithm for
k-anonymity
Lijian Lu, Xiaojun Ye
IAS-2009-1557
Cryptanalysis of a Knapsack Public Key Cryptosystem
Wang Baocang
IAS-2009-1563
Research on Security Architecture for Defending Insider
Threat
Wang Hui
IAS-2009-1567
A New Knapsack Public-Key Cryptosystem
Zhang Weidong, Wang Baocang, Hu Yupu
IAS-2009-1574
Novel Fast Mode Decision Algorithm for P-Slices in
H.264/AVC
IAS-2009-1579
Anti-protocol attacks digital watermarking Based on
Media-Hash and SVD
WANG Jing-pei, SUN Shui-fa
IAS-2009-1584
Network Traffic Emulation Based on Representative Network
Behavior and Protocols
Yan Pan, Tao Wang
IAS-2009-1590
A RST Invariant Watermarking Scheme Using SVM and Image
Moments for Synchronization
Wu Jianzhen
IAS-2009-1596
An Improved Genetic Algorithm for Power Grid
Youchan Zhu, Xueying Guo,
Jing Li
IAS-2009-1605
Improvement of an EPC Gen2 compliant RFID authentication
protocol
Kuo-Hui Yeh, N.W. Lo
IAS-2009-1616
An Effective Scheme for Defending Denial-of-Sleep Attack
in Wireless Sensor Networks
chen chen, li hui, pei qingqi, pang
liaojun
IAS-2009-1622
ID-based Key Management Strategies of Clustering Wireless
Sensor Networks
Zhiming Zhang
IAS-2009-1625
Multimodal Biometric Recognition Based on Complex KFDA
Zhifang Wang, Qiong Li, Qi
Han, Xiamu Niu
IAS-2009-1628
An Approach to Checking SOC Timing Safety
Du Zhenjun
IAS-2009-1644
A New Interacting Multiple Model Algorithm Based on the
Unscented Particle Filter
Xiaolong Deng, Pingfang Zhou
IAS-2009-1647
Appraisal Model of MIS in Enterprises Based on the
Unascertained Measurement
sun yonghao
IAS-2009-1655
GOP-level Transmission Distortion Modeling for Video
Streaming over Mobile Networks
Yu Han
IAS-2009-1661
A Model Based on Information Entropy to Measure Developer
Turnover Risk on Software Project
Rong Jiang
IAS-2009-1664
Performance Evaluation of IEEE802.11-based Ad-hoc Wireless
Networks in Vehicular Environments
shen yong
IAS-2009-1670
Optimal Information Rates of Novel Graph Based Access
Structures
Mingkun Yang
IAS-2009-1676
Research on Intrusion Detection Based on an Improved SOM
Neural Network
Jiang Dianbo
IAS-2009-1682
Windows Memory Analysis Based on KPCR
Ruichao Zhang, Lianhai Wang, Shuhui
Zhang
IAS-2009-1687
Practical Quantum No-Key Protocol with Identification
Yang Wu, Li Yang
IAS-2009-1690
An Automated Mechanism of Security Test on Network
Protocols
Yahui Yang, Yunfei Chen, Min Xia
IAS-2009-1693
Adaptive-Push Peer-to-Peer Video Streaming System Based
on Dynamic Unstructured Topology
Xiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang
IAS-2009-1698
A New Fingerprint Sequences Matching Algorithm for
Content-based Copy Detection
Rongxian Nie, Guiguang Ding, Jianmin
Wang, Li Zhang
IAS-2009-1704
Towards Secure Content Based Dissemination of XML
Documents
Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad
IAS-2009-1709
research on system of Chinese document copy detection
Cheng yuzhu, Qiu chunrong, Tang
weiqi, Den wenda
IAS-2009-1724
Sinusoidal Signals Pattern Based Robust Video
Watermarking in the 3D-CWT Domain
Cheng Deng
IAS-2009-1734
Image moment-based Registration scheme utilizing Support
Vector Machine
Wu Jianzhen
IAS-2009-1738
A Efficient hierarchical group key management scheme based on orthogonal
vectors
Jing Wang, Xiaola Lin
IAS-2009-1744
Universal Steganalysis to
Images with WBMC model
yang xiaoyuan, wang shifeng, liu jia
IAS-2009-1747
Threats to Health Information Security
Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail
IAS-2009-1751
Membership-based Access Control for Trust Negotiation in
Open Systems
Ruo-Fei Han, Hou-Xiang Wang, Hui Li,
Yu-Hua Wang
IAS-2009-1756
Evaluation and Simulation on the Performance of DHTs required by P2PSIP
Zengming Tian, xiangming wen, Yong Sun, Wei Zheng, Yinbo Cheng
IAS-2009-1767
POSITION VERIFICATION IN MULTI-HOP VEHICULAR NETWORKS
Deepa Rajan, Chetan Yeole, Harsha Nakade, Ye Zhu, Huirong Fu
IAS-2009-1775
A database protection system aiming at SQL attack
Liwu Deng, Ruzhi Xu, Lizheng Jiang
IAS-2009-1781
Intelligent Clustering with PCA and Unsupervised Learning
Algorithm in Intrusion Alert Correlation
Maheyzah Md Siraj, Mohd Aizaini Maarof,
Siti Zaiton Mohd Hashim
IAS-2009-1784
Security Threats and Countermeasures for Intra-Vehicle
Networks
David Wampler, Huirong Fu, Ye Zhu
IAS-2009-1789
An Improvement of AODV Protocol Based on Reliable
Delivery in
LIU Jian, LI Fangmin
IAS-2009-1794
Efficient Protection Scheme for SVC Content Based On
Network Coding
Ji Lu, Song Xiao, Chengke Wu
IAS-2009-1799
Application of Particle Swarm Optimization in Fussy
Neural Networks
Qingnian Wang, Kun Yan, Xiaofeng
Wan, Meiling Yuan
IAS-2009-1810
DWT-Based Shot Boundary Detection Using Support Vector
Machine
Li Jun, Ding YouDong
IAS-2009-1816
Information Security Wireless Sensor Grid
MingMIng Li, BaiPing Li, Wei Li, Lei
Chen
IAS-2009-1825
H2S: A Secure and Efficient Data Aggregative Retrieval
Scheme in Unattended Wireless Sensor Networks
Wei Ren
IAS-2009-1829
Identity based Multi-Proxy Multi-Signcryption
Scheme for Electronic Commerce
Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu
IAS-2009-1835
Information Security Monitoring System based on Data
Mining
Guangjuan Lv
IAS-2009-1841
Quality Assessment of Aluminum Alloy Resistance Spot
Welding Based on Wavelet and Statistic Analysis
Peng Zhao
IAS-2009-1847
Optimal Combination of H.264AVC Coding Tools for
Yu Han
IAS-2009-1851
Image compression algorithm based on decreasing bits
coding
Shengbing CHE, Zuguo CHE, Haiyang
WANG, Qiangbo HUANG
IAS-2009-1857
A Method for Access Trusted Services Based on
Service-Oriented Architecture
Xin Yu, Yu Bai
IAS-2009-1860
Distributed Event-triggered Trust Management for Wireless
Sensor Networks
Sibo Liu, Liaojun Pang, Qingqi Pei,
Hua Ma, Qingquan Peng
IAS-2009-1863
BAN logic based Kerberos protocol analysis
Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, Weidong Kou
IAS-2009-1869
A Digital Watermarking Algorithm for DEM Image Based on
Stationary Wavelet Transform
He Xiang
IAS-2009-1874
Modeling the co-evololution DNS
worms and anti-worms in IPv6 networks
Pantelis Kammas, Thodoros Komninos,
Yannis Stamatiou
IAS-2009-1881
System-generated technology research on improving the
accounting
Yuzhong Mao, Guangming Yang
IAS-2009-1887
Distributed Video Coding Based on Multiple Description
Hongxia Ma
IAS-2009-1892
ECC-Cache: A Novel Low Power Scheme to Protect
Large-Capacity L2 Caches from Transiant Faults
Liu Guanghui
IAS-2009-1897
Secure Constructing Bluetooth Scatternet
Based on BTCP
Xin Yu, YuPing Wang
IAS-2009-1907
An Extensible and Virtualization-Compatible IDS
Management Architecture
Sebastian Roschke, Feng Cheng, Christoph Meinel
IAS-2009-1913
Number-theoretic Attack on Lyuu-Wu's
Multi-proxy Multi-signature Scheme
Fanyu Kong, Jia Yu
IAS-2009-1919
Research on Quantitative Evaluation for Integrity
Yunchuan Guo, Lihua Yin, Yuan
Zhou
IAS-2009-1922
Application of Bloom Filter for GTP Stateful
Inspection in Network Processor
Liu Zhenyu
IAS-2009-1928
Resisting Abuse-Freeness Fair Electronic Payment Protocol
Kai Fan, Xiaofei Yu, Hui Li, Yue Wang, Weidong Kou
IAS-2009-1934
Swarm Intelligence:Ant-based
Robot Path Planning
Jing Zhou, Guan-Zhong Dai, De-Quan He, Ma Jun, Cai
Xiao-Yan
IAS-2009-1940
Infrared Small Weak Target Detection via HOSA
Gaoyu ZHANG
IAS-2009-1944
Super Resolution Using a Simple and Practical Sequence
Alignment
Kunkun Ma, Peimin Yan, Yongwen
Xue
IAS-2009-1957
Approaches to Formal Verification of Security Protocols
Suvansh Lal
IAS-2009-1972
Research on new classification methods of remote sensing
of mass ingredient without vegetation of Hei Shan
Gorge in
Shudong Wang
IAS-2009-1977
Performance Analysis of Anonymous Communication System
3-Mode Net
Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi
Ito, Noboru Babaguchi
IAS-2009-1983
Joint entropy analysis model for DDoS
attack detection
Rahmani Hamza
IAS-2009-2001
Space Time Block Coded MIMO System with Redundant
Antennas
Feng Wang
IAS-2009-2004
Efficient Certificate-Based Signature Scheme
Yang Ming, Yumin Wang
IAS-2009-2019
A Comparative Statistical Analysis of Pseudorandom Bit
Sequences
Rashidah Kadir, Mohd Aizaini Maarof
IAS-2009-2025
ROBUST IMAGE WATERMARKING IN THE WAVELET DOMAIN FOR COPYRIGHT
PROTECTION
Ali Ameri Mahabadi, Mohammad Eshghi
IAS-2009-2031
A Digital Watermarking Algorithm for DEM Image Based on
Stationary Wavelet Transform
He Xiang
IAS-2009-2035
The Reversible Network Cascade Based on Reversible Logic
Gate Coding Method
Hui Li, Zhijin Guan, Shanli Chen,
Yuxin Chen
IAS-2009-2040
RSA/SHIFT SECURED IFFT/FFT BASED OFDM WIRELESS SYSTEM
Abdelsalam Almarimi, D. Rajaveerappa
IAS-2009-2044
UNIVERSAL STEGANALYSIS BASED ON STATISTICAL MODELS USING
REORGANIZATION OF BLOCK-BASED DCT COEFFICIENTS
Shaohui Liu
IAS-2009-2047
Quality Assessment of Aluminum Alloy Resistance Spot
Welding Based on Wavelet and Statistic Analysis
Peng Zhao, Cunhai Pan, Sumei Du
IAS-2009-2051
DCT-based Robust Watermarking with Swarm Intelligence
Concepts
Hsiang-Cheh Huang
IAS-2009-2057
Evaluating Intrusion Detection Systems in High Speed
Networks
Faeiz Alserhani, Monis Akhlaq
IAS-2009-2082
An intrusion detection algorithm based on decision tree
technology
Juan Wang
IAS-2009-2085
Redundant Ridgelet Transform
and Its Application to Image Processing
Yan Li
IAS-2009-2093
Small Moving Infrared Target Detection Algorithm under
Low SNR Background
wang kai
IAS-2009-2099
Collusion-Resilient fingerprinting Using Cropping and Subsampling
Yueh-Hong Chen