default search action
4. CCIS 2016: Beijing, China
- 4th International Conference on Cloud Computing and Intelligence Systems, CCIS 2016, Beijing, China, August 17-19, 2016. IEEE 2016, ISBN 978-1-5090-1256-5
- Schahram Dustdar, Eduard H. Hovy, Xiangyang Li, Moncef Gabbouj:
Keynote speech. - Qingchao Kong, Wenji Mao, Chunyang Liu:
Popularity prediction based on interactions of online contents. 1-5 - Xiaojuan Ban, Ruoyi Liu, Qing Shen, Yu Wang:
Weighted extreme learning machine for balance and optimization learning. 6-10 - Taiwen Huang, Lei Li, Yazhao Zhang, Junqi Chi:
Summarization based on multiple feature combination. 11-15 - Xiaopeng Ji, Zhiqiang Wei, Lei Huang, Yun Gao:
Violation vehicle automated snap and road congestion detection. 16-20 - Jie Nie, Lei Huang, Zhen Li, Chenxi Wei, Bowei Hong, Wenwu Zhu:
Thinking like psychologist: Learning to predict personality by using features from portrait and social media. 21-26 - Huaiyu Xu, Dong Zhao, Jiaqi An, Liang Liu:
Indoor shop recognition via simple but efficient fingerprinting on smartphones. 27-31 - Jianlong Xu, Zibin Zheng, Zhun Fan, Wenhua Liu:
Online personalized QoS prediction approach for cloud services. 32-37 - Siwen Zheng, Yu Liu, Zhenchao Ouyang:
A machine learning-based tourist path prediction. 38-42 - Guoshun Nan, Xiuquan Qiao, Junliang Chen:
A popularity-aware prefetching using MDP for wireless video streaming over information-centric networks. 43-47 - Linghui Li, Junping Du, MeiYu Liang, Jangmyung Lee, Luoming Meng:
Video super-resolution based on nonlinear mapping and patch similarity. 48-56 - Yanhui Guo, Yingjie He, Xiaoming Liu:
Research and implementation of load balancing algorithm for mass mobile application detection task. 57-61 - Jieming Gu, Chengze Li, Dian Lei, Qi Li:
Combination attack of android applications analysis scheme based on privacy leak. 62-66 - Fang Wei, Miao Zhang:
A risk assessment scheme of intellignet terminal based on attack tree. 67-71 - Dian Lei, Yang Liu, Chengze Li, Jieming Gu, Qi Li:
Defect trigger model: Analysis method of mobile application defect. 72-76 - Feng Dong, Yanhui Guo, Chengze Li, Guoai Xu, Fang Wei:
ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive Bayes. 77-81 - Da Zun, Tao Qi, Liping Chen:
Research on automated testing framework for multi-platform mobile applications. 82-87 - Xuan Liu, Haitao Zhang, Jingxian Fang, Guan Guan, Yundi Huang:
Intelligent shopping cart with quick payment based on dynamic target tracking. 88-93 - Yong Peng, Jie Liang, Qi Li:
A control flow obfuscation method for Android applications. 94-98 - Hewei Yu, Yangyu Hu, Yang Gao, Juan Xu, Miao Zhang:
Research on the technology of massive Android application data processing. 99-103 - Yanhui Guo, Jianpeng Hou, Weiping Chen, Qi Li:
A method to detect Android ad plugins based on decompiled digital sequence. 104-108 - Sijie Zhou, Long Chen, Yu Zhang, Jing Jin, Xingyu Wang:
Exploring (C)overt attention for multi-objective gaze-independent BCIs, visual angle not exceeding 1 degree. 109-112 - Jing Li, Shimin Wei, Lei Guo, Xin Feng:
Adaptive fuzzy control of a front-wheel drive bicycle robot. 113-116 - Jiawei Wu, Du Zhou, Xiuquan Qiao:
Fast automation moisture meter based on intellient control strategy. 117-120 - Jie Zhao, Guo-xiang Chang, Long Han, Li Wang:
Flexible neural network adaptive control based on the particle swarm optimization algorithm. 121-124 - Huitong Ge, Yuehui Jin, Tan Yang:
A QoE-based control system for bitrate adaption of wireless-accessed video stream. 125-130 - Zhenhui Xu, Yuting Yang, Nan Jiang, Chunxu Zhang, Pei Huang:
The estimation of weighted solution convex polyhedron in SMT problem. 131-135 - Yuan Ge, Juan Yin, Yan Zhang, Ke Lou:
Fault location in distributed information systems. 136-140 - Kun Niu, Zhipeng Gao, Haizhen Jiao, Nanjie Deng:
K-means+: A developed clustering algorithm for big data. 141-144 - Zhaowei Qu, Jianru Yan, Sixing Yin:
Association-rules-based data imputation with spark. 145-149 - Kan Liu, Yi Sun, Dezheng Zhang:
An intelligent drug matching method for traditional Chinese medicine. 150-154 - Wen Wang, Qiaowei Jiang, Tao Lv, Wenming Guo, Cong Wang:
An improved text similarity algorithm research for clinical decision support system. 155-159 - Qiaowei Jiang, Wen Wang, Xu Han, Shasha Zhang, Xinyan Wang, Cong Wang:
Deep feature weighting in Naive Bayes for Chinese text classification. 160-164 - Liping Chen, Kun Lin, Junping Du, Kun Li:
Research on user relationship networks of SNS based on the Forest Fire model. 165-170 - Xu Han, Tao Lv, Qiaowei Jiang, Xinyan Wang, Cong Wang:
Text summarization using Sentence-Level Semantic Graph Model. 171-176 - Zhenbing Liu, Chunyang Gao, Huihua Yang, Qijia He:
Cost-sensitive sparse representation based classification. 177-181 - Xinliang Liu, Dandan Sun:
A study on the impact of online takeout based on the Baidu index on the management of university cafeteria. 182-185 - Xiong Luo, Jing Deng, Ji Liu, Weiping Wang, Xiaojuan Ban:
A quantized kernel least mean square scheme with entropy-guided learning for intelligent data analysis. 186-190 - Guangyuan Fu, Qingchao Wang, Hongqiao Wang, Dongying Bai:
Group based non-sparse localized multiple kernel learning algorithm for image classification. 191-195 - Peng Nie:
A multi-dimension factor decision-making model framework based on Random Forests. 196-199 - Yongqiang Weng, Chunshan Wu, Qiaowei Jiang, Wenming Guo, Cong Wang:
Application of support vector machines in medical data. 200-204 - Yiming Xing, Xiaojuan Ban, Chong Guo, Yu Wang:
Probabilistic forecasting of traffic flow using kernel based extreme learning maching and quantum-bahaved particle swarm optimization. 205-209 - Min Chang, Yuansheng Lou, Lei Qiu:
An approach for time series similarity search based on Lucene. 210-214 - Kejing He, Chenyang Li:
Structure-based classification of web documents using Support Vector Machine. 215-219 - Yi Liu, Zhengqiu Yang, Jiapeng Xiu, Chen Liu:
Research on an anti-crawling mechanism and key algorithm based on sliding time window. 220-223 - Zexi Di, Jiapeng Xiu, Jinze Lin, Yunzhe Qian:
Research on movie-box prediction model and algorithm based on neural network. 224-228 - Chunshan Wu, Yongqiang Weng, Qiaowei Jiang, Wenming Guo, Cong Wang:
Applied research on visual mining technology in medical data. 229-233 - Yang Li, Ying Xue, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang:
An attack pattern mining algorithm based on fuzzy logic and sequence pattern. 234-238 - Xiang Li, Jianyi Liu, Yanyu Huo, Ru Zhang, Yuangang Yao:
An Android malware detection method based on AndroidManifest file. 239-243 - Ying Xue, Yang Li, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang:
Phishing sites detection based on Url Correlation. 244-248 - Meilian Lu, Jinliang Liu:
Hier-UIM: A hierarchy user interest model for personalized news recommender. 249-254 - Yong Peng, Jie Liang, Guoai Xu:
Malware detection method for the industrial control systems. 255-259 - Zihao Chen, Zhengmin Li:
A collaborative recommendation algorithm based on user cluster classification. 260-263 - Yutong Gao, Feifan Song, Xiaqing Xie, Xuebin Gao:
Implicit semantic text retrieval and distributed implementation for rural medical care. 264-267 - Lei Qiu, Yuansheng Lou, Min Chang:
Research on theme crawler based on Shark-Search and PageRank algorithm. 268-271 - Quangu Chen, Yuehui Jin, Tan Yang:
A supervised no-reference QOE assessment model on IPTV services. 272-277 - Dongping Zhao, Jiapeng Xiu, Yu Bai, Zhengqiu Yang:
An improved item-based movie recommendation algorithm. 278-281 - Jiapeng Xiu, Qun He, Zhengqiu Yang, Chen Liu:
Research on a multi-objective constrained optimization evolutionary algorithm. 282-286 - Liu Liu, Meng Luo Ming, Yang Yang:
A transmission algorithm of ant colony system based large-scale data for WSN network. 287-292 - Hassan M. Elkamchouchi, Darwish A. E. Mohamed, Osama G. Mohamed, Wael A. E. Ali:
Robust doa estimation and data detection for mobile communication in multipath environment. 293-297 - Zhanzhi Du, Yonghua Li, Siye Wang:
Design of dynamic networking scheme among dummy Bluetooth devices. 298-302 - Bo Li, Yonghua Li, Siye Wang:
Optimal workflows of AllJoyn network with centralized management gateway. 303-307 - Cheng Chen, Yang Wang, Yong ZhuZhao, Huixia Ding, Hong bin Zhao:
A suppression mechanism of cascading fault in the interdependent coupling smart grid. 308-313 - Xiaojun Ban, Xing Liu, Yalan Zhang:
Non-Newtonian fluids based on adaptive time step. 314-318 - Jiqun Dong, Xiuquan Qiao:
A novel service provisioning mechanism in content-centric networking. 319-326 - Zhipeng Gao, Yinghao Qin, Kun Niu:
An effective merge strategy based hierarchy for improving small file problem on HDFS. 327-331 - Xiaosheng Tang, Boda Han, Han Chen:
A hybrid index for multi-dimensional query in HBase. 332-336 - Kaiyang Qu, Luoming Meng, Yang Yang:
A dynamic replica strategy based on Markov model for hadoop distributed file system (HDFS). 337-342 - Yuangang Yao, Jinxia Wei, Jianyi Liu, Ru Zhang:
Efficiently secure multiparty computation based on homomorphic encryption. 343-349 - Zhonghao Lu, Jingyu Wang, Qi Qi:
SARN: A scalable resource managing framework for YARN. 350-355 - Jing Yu, Dan Tao, Zhaowen Lin:
A hybrid web log based intrusion detection model. 356-360 - Xiaoyan Cui, Shimeng Yang, Darning Wang:
An algorithm of apriori based on medical big data and cloud computing. 361-365 - Dongyan Deng, Kejing He, Yanhua Chen:
Dynamic virtual machine consolidation for improving energy efficiency in cloud data centers. 366-370 - Soheil Mazaheri, Yong Chen, Elham Hojati, Alan Sill:
Cloud benchmarking in bare-metal, virtualized, and containerized execution environments. 371-376 - Jun Liao, Chaohui Jiang, Chun Guo:
Data privacy protection based on sensitive attributes dynamic update. 377-381 - Shenling Liu, Chunyuan Zhang, Le Bo:
Improve security and availability for cloud storage. 382-387 - Peidong Sha, Zhixiang Zhu:
The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing. 388-392 - Linshu Ouyang, Feng Dong, Miao Zhang:
Android malware detection using 3-level ensemble. 393-397 - Shaohui Wang, Tian Liu, Fu Xiao, Ruchuan Wang:
Privacy-preserving k-NN computation over encrypted cloud data without key sharing. 398-403 - Gery Ducatel, Joshua Daniel, Theo Dimitrakos, Fadi Ali El-Moussa, Robert Rowlingson, Ali Sajjad:
Managed security service distribution model. 404-408 - Hongliang Zhu, Wenhan Liu, Jing Wang, Yang Xin:
Based on the character of cloud storage string encryption and cipher text retrieval of string research. 409-413 - Lei Zhang, Kewang Sun, Qi Cui, Sixiang Wang, Xiaolin Li, Jianguo Di:
Multi adaptive hardware Trojan detection method based on power characteristics template. 414-418 - Peng Zhang, Xiaoqiang Sun, Ting Wang, Sizhu Gu, Jianping Yu, Weixin Xie:
An accelerated fully homomorphic encryption scheme over the integers. 419-423 - Songyang Wu, Yong Zhang:
Efficient verification of data possession in cloud computing. 424-428 - Khaled Riad:
Multi-authority trust access control for cloud storage. 429-433 - Muhan Fan, Sujie Shao, Lanlan Rui:
A mining algorithm for frequent closed pattern on data stream based on sub-structure compressed in prefix-tree. 434-439 - Yaomin Wen, Junping Du, Jangmyung Lee:
Abnormal event detection based on social force model combined with crowd violent flow. 440-446 - Yifan Yuan, Junping Du, Jangmyung Lee:
Tourism activity recognition and discovery based on improved LDA model. 447-455 - Boyuan Ma, Xiaojuan Ban, Yu Wang, Xu Liu:
Recognition of blacklisted vehicle based on SIFT feature. 456-460 - Tao Lv, Jiang Liu, Fan Lu, Peng Zhang, Xinyan Wang, Cong Wang:
Semi-structured document extraction based on document element block model. 461-465 - Yu Wang, Xiaojuan Ban, Boyuan Ma, Yifei Guo, Jinglu Bai:
Research of Bayesian underground positioning technology based on SIFT feature. 466-470 - Shufeng Peng, Huiyuan Fu, Guangfu Che:
Distinguishing small moving objects and noises in the barn scene. 471-475 - Gaoya Wang, Huiyuan Fu, Yingxin Liu:
Real time abnormal crowd behavior detection based on adjacent flow location estimation. 476-479 - Shuangqun Li, Xinchen Liu, Wu Liu, Huadong Ma, Haitao Zhang:
A discriminative null space based deep learning approach for person re-identification. 480-484 - Zhongqiang Wang, Jian Peng, Yu Chen, Limiao Ning:
Passengers' choices on airport drop-off service: A decision forecast based on social learning and machine learning. 485-489 - Shuai Wang, Jiapeng Xiu, Chen Liu, Zhengqiu Yang:
A decision model of identifying user travel pattern based on the intelligent terminal sensor data. 490-493 - Zihang Xu, Junping Du, Lingfei Ye, Dan Fan:
Multi-feature indexing for image retrieval based on hypergraph. 494-500
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.