Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A Revised Discrete Particle Swarm Optimization for Cloud Workflow Scheduling
Zhangjun Wu, Zhiwei Ni, Lichuan Gu, Xiao Liu
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning
Shabtai, A, Fledel, Y, Elovici, Y
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Continuous Verification Using Keystroke Dynamics
Shimshon, T, Moskovitch, R, Rokach, L, Elovici, Y
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Differential Fault Analysis on PRESENT Key Schedule
Gaoli Wang, Shaohui Wang
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Credit Card Customer Segmentation and Target Marketing Based on Data Mining
Wei Li, Xuemei Wu, Yayun Sun, Quanju Zhang
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
A Novel Weight Design in Multi-objective Evolutionary Algorithm
Fang-Qing Gu, Hai-Lin Liu
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry
Chen Yuqiang, Guo Jianlan, Hu Xuanzi
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Semantic Modeling: Computational Models of the Concepts
Wolfengagen, V
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Lattice-Based Proxy Signature
Yali Jiang, Fanyu Kong, Xiuling Ju
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Efficient and Secure Authentication Protocol for VANET
Hui Liu, Hui Li, Zhanxin Ma
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Intelligent Digital Photo Management System Using Ontology and SWRL
Yanmei Chai, Tian Xia, Jianming Zhu, Haifeng Li
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
An Adaptive Feature Extraction Method for Motor-Imagery BCI Systems
Cheng Chen, Wei Song, Jiacai Zhang, Zhiping Hu, He Xu
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Research on Wireless Sensor Network Security
Yan-Xiao Li, Lian Qin, Qian Liang
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks
Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
An Improved Genetic Algorithm for Job Shop Scheduling Problem
Ren Qing-dao-er-ji, Yuping Wang, Xiaojing Si
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
Motion Segmentation Using Central Distance Features and Low-Pass Filter
Shu-Juan Peng
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
A Scheme for Confidentiality Protection of OpenID Authentication Mechanism
Xiangwu Ding, Junyin Wei
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
A Streamline Placement Method Highlighting Flow Field Topology
Wenyao Zhang, Bo Sun, Yi Wang
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding
The Approach of ACARS Data Encryption and Authentication
Meng Yue, Xiaofeng Wu
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Published in 2010 International Conference on Computational Intelligence and Security (01.12.2010)
Get full text
Conference Proceeding