default search action
3. CCIS 2014: Shenzhen, China
- IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, CCIS 2014, Shenzhen, China, November 27-29, 2014. IEEE 2014, ISBN 978-1-4799-4720-1
- Wenke Yin, Weiyi Ge, Heng Wang:
CDQA: An ontology-based question answering system for Chinese delicacy. 1-7 - Lixin Xu, Guang Chen, Lei Yang:
Incremental clustering in short text streams based on BM25. 8-12 - Guanglei Chu, Kai Niu, Baoyu Tian:
Automatic image annotation combining SVMS and KNN algorithm. 13-17 - Yun Li, Kai Niu, Baoyu Tian:
Link prediction in Sina Microblog using comprehensive features and improved SVM algorithm. 18-22 - Changqin Quan, Xiquan Wei, Fuji Ren:
Comparison of SVM classification method and semantic similarity method for sentiment classification. 23-28 - Xiao Sun, Fei Gao, Fuji Ren:
Mining the impact of social news on the emotions of users based on deep model. 29-32 - Weihui Deng, Guoyin Wang, Xuerui Zhang, Yishuai Guo, Guangdi Li:
Water quality prediction based on a novel hybrid model of ARIMA and RBF neural network. 33-40 - Li Wang, Mingzhi Liang, Huaikun Xiang:
A self-learning algorithm for predicting the running vehicle attitude. 41-45 - Hui Zhang, Yiqun Liu, Shaoping Ma:
Sentiment Analysis of Microblog text based on joint sentiment-topic model. 46-54 - Liang Xie, Guoyin Wang, Xuerui Zhang, Bin Xiao, Botian Zhou, Fan Zhang:
Remote sensing image enhancement based on wavelet analysis and histogram specification. 55-59 - Miao Sun, Qi Tan, Runwei Ding, Hong Liu:
Cross-domain sentiment classification using deep learning approach. 60-64 - Huasong Huang, Yulong Zhou, Pengjin Chen, Runwei Ding:
Robust hand tracking with posture recognition via online learning. 65-70 - Fangzhi Zhu, Rui Yan, Yong Sun:
Improved minimum squared error method for robust classification. 71-75 - Bowen Li, Lin Zhang, Anrui Hu, Yifan Mai:
A simulation knowledge management system with the application of semantic matching algorithm based on ontology. 76-80 - Xiaohu Sun, Pingping Wu, Hong Liu:
Facial age estimation using bio-inspired features and cost-sensitive ordinal hyperplane rank. 81-85 - Chaofei Wang, Jing Chen, Xiaopeng Liu, Jinwei Zhao:
An improved deep log analysis method based on data reconstruction. 86-90 - Changqin Quan, Bin Zhang, Fuji Ren:
Joined cepstral distance features two-stage multi-class classification for emotional speech. 91-96 - Fuji Ren, Yanqiu Li, Liangfeng Xu, Min Hu, Xiaohua Wang:
Face recognition based on double complementary space and multi-decision classification. 97-102 - Min Hu, Yaona Zheng, Fuji Ren, He Jiang:
Age estimation and gender classification of facial images based on Local Directional Pattern. 103-107 - Min Hu, Xiaoyin Huang, Xiaohua Wang, Kun Li, Fuji Ren, Liangfeng Xu:
Adaptive facial expression recognition method based on MBP and HMOG feature. 108-112 - Xiaohua Wang, Wei Huang, Chao Jin, Min Hu, Fuji Ren:
Fruit recognition based on multi-feature and multi-decision. 113-117 - Xiao Sun, Chongyuan Sun, Fuji Ren:
New word detection and emotional tendency judgment based on mixed model. 118-123 - Tian Chen, Xin Yi, Dandan Shen, Fuji Ren, Wei Wang, Bingdong Yang:
Image restoration method self-adaptive to the dielectric layer color. 124-129 - Xiao Sun, Chengcheng Li, Fuji Ren:
Modeling blog user for Chinese micro-blog sentiment classification with fuzzy SVM. 130-134 - Yongbin Liu, Xiaojie Wang:
A hierarchical intention recognition model for situated dialogue system. 135-139 - Jishen Yu, Feng Liu, Wenli Zhou, Hua Yu:
Hadoop-based network traffic anomaly detection in backbone. 140-145 - Xia Wang, Hongxin Cao:
Study on building library personalized subject service platform in big data environment - Lib 2.0 solutions based on Hadoop framework. 146-149 - Dong Peng, Yuanyuan Qiao, Jie Yang:
Analyzing traffic characteristics between backbone networks based on Hadoop. 149-153 - Yong Qin, Xiedong Cao, Peng Liang, Qichao Hu, Weiwei Zhang:
Research on the analytic factor neuron model based on cloud generator and its application in oil&gas SCADA security defense. 155-159 - Yao Lu, Jun Liu:
A real-time top-k query algorithm and parallelized implementation. 160-164 - Yong Wang, Xiaohu Tang, Lijuan Zhang:
Group strategy for remaining tags in anti-collision algorithm for RFID system. 165-169 - Yong Wang, Xiaohu Tang, Lijuan Zhang:
Prefix-maximized query-tree anti-collision algorithm with robust estimation for RFID system. 170-174 - Lin-Lin Tang, Pingfei Ren, Jeng-Shyang Pan:
An improved k-subset algorithm for load balance problems in Cloud Computing. 175-179 - Jinsong Yin, Yuanyuan Qiao:
Performance modeling and optimization of MapReduce programs. 180-186 - Ruoning Song, Fang Liu:
Real-time anomaly traffic monitoring based on dynamic k-NN cumulative-distance abnormal detection algorithm. 187-192 - Gang He, Peng Yang, Xiaochun Wu:
Analysis of network node behavior based on MapReduce. 193-197 - Houren Xiong, Xingyuan Chen, Bin Zhang, Guangxia Wang:
A finer-grained resource management model oriented to role-based access control. 198-206 - Meng Zhang, Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang:
HFA: Novel naming and routing design for future Internet architecture. 207-211 - Xiaoyan Hu, Jian Gong:
CANR: Cache-Aware Name-based Routing. 212-217 - Yumang Shao, Ying Wu, Yutao Chen:
Design and research of Multi-Agent Control system for central cooling system. 218-221 - Minghuan Tang, Gaofeng Cui, Xun Zou, Weidong Wang, Yinghai Zhang:
A 3D-beamforming scheme for throughput optimization in Heterogeneous Network. 222-227 - Xun Zou, Gaofeng Cui, Minghuan Tang, Songsong Xiao, Weidong Wang:
User grouping method for downlink beamforming in massive MIMO system. 228-233 - Wenwu Li, Chao Li, Miyi Duan:
Method for detecting the obfuscated malicious code based on behavior connection. 234-240 - Wenwu Li, Miyi Duan:
A study on the software Test Case Reuse Model of feature oriented. 241-246 - Fengyi Zhou, Wenjie Chen, Hao Fang:
Robust eye tracking and location method based on Particle filtering algorithm. 247-252 - Haijing Xu, Yingmin Jia:
Lyapunov-based output feedback control of hypersonic vehicle. 253-258 - Xiaohua Wang, Chao Jin, Wei Liu, Min Hu, Fuji Ren:
Face recognition based on adaptive weighting and fuzzy fusion with single training sample. 259-264 - Fuji Ren, Mengni Chen, Yu Gu:
WeWatch: Bi-screen video watching experience on smart devices. 265-270 - Haochong Zhou, Yingmin Jia:
Finite-time consensus of multi-agent systems with double integrator dynamics using only relative position measurements. 271-276 - Hongyuan Lei:
The digital protection and inheritance of Chinese woodblock new year prints. 277-281 - Mengdi Yue, Ling Chen, Jie Zhang, Hong Liu:
Speaker age recognition based on isolated words by using SVM. 282-286 - Baolong Zhao, Zhuo Fu, Jie Zhang, Yuezhao Chen, Runwei Ding:
Binaural sound localization based on time-delay compensation and spatial grid matching. 287-291 - Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang:
The comparison and performance analysis of CCN under mobile environments. 292-296 - Kun Niu, Shubo Zhang, Ran He, Shufan Zhang:
Composite classification methods on composition identification. 297-301 - Alexey Potapov, Vita Batishcheva, Shuchao Pang:
Universalization of narrow methods: Case study on autoencoders. 302-304 - Ying Xia, Linglin Tuo:
An incremental community mining method in dynamic social networks. 305-309 - Guowan He, Jie Wang, Yafeng Zhang, Yan Peng:
Keyword extraction of web pages based on domain thesaurus. 310-314 - Lei An, Hongyu Kang, Yi Xin, Xiaoming Hu, Qin Li, Yin Ling, Heng Gu:
Generalized additive models of hospital admissions with respiratory disease and meteorology. 315-318 - Hongyu Kang, Lei An, Yi Xin, Xiaoming Hu, Qin Li, Ling Yin, Siyue Zhang:
Prevalence and risk factors associated with chronic disease in New Rural Cooperative Medical System: County in central China. 319-322 - Rui Liu, Lixin Ding, Lan Xie:
Catlinks - a category clustering algorithm based on multi-class regression. 323-326 - Chujian Bi, Haoxiang Wang, Rui Bao:
SAR image change detection using regularized dictionary learning and fuzzy clustering. 327-330 - Xi Jiang, Yan Wang, Jianping Chai:
Research of users' viewing habits based on clustering method. 331-335 - Jing Liu, Dongmei Zhang, Yaohong Jin:
Identification of reordering mark "de" in Chinese-English patent machine translation. 336-340 - Jiawei Wang, Fei Su:
A new time-frequency method for EEG artifacts removing. 341-346 - Song Bi, Lei Liu, Cunwu Han, Dehui Sun:
Finding the optimal sequence of features selection based on reinforcement learning. 347-350 - Tarek Abdunabi, Otman A. Basir:
Building diverse and optimized ensembles of gradient boosted trees for high-dimensional data. 351-356 - Tengfei Xue, Yuyu Yuan, Qunchao Fu, Heng Gu, Siyue Zhang, Cong Wang:
The application of text similarity computing in the Clinical Decision Support System. 357-361 - Zhengqiu Yang, Zeping Li, Jiapeng Xiu:
Study on HCPV power forecasting model based on grey neural network and Markov chain. 362-365 - Jiapeng Xiu, Chenchen Zhu, Zhengqiu Yang:
Prediction of solar power generation based on the principal components analysis and the BP neural network. 366-369 - Heng Gu, Weiguang Wang, Peng Liu, Siyue Zhang, Jianyi Liu, Cong Wang:
A system for web page sensitive keywords detection. 370-374 - Hongzheng Li, Yun Zhu, Yang Yang, Yaohong Jin:
Reordering adverbial chunks in Chinese-English patent machine translation. 375-379 - Zhengqiu Yang, Yapei Cao, Jiapeng Xiu:
Power generation forecasting model for photovoltaic array based on generic algorithm and BP neural network. 380-383 - Cheng Yan, Jiapeng Xiu, Chen Liu, Zhengqiu Yang:
A high concentrated photovoltaic output power predictive model based on Fuzzy Clustering and RBF neural network. 384-388 - Shan Feng, Ruifang Liu, Qinlong Wang, Ruisheng Shi:
Word distributed representation based text clustering. 389-393 - Siyue Zhang, Weiguang Wang, Zhao Chen, Heng Gu, Jianyi Liu, Cong Wang:
A web page malicious script detection system. 394-399 - Yue Liu, Long Mei, Su Ki Ooi:
Prediction of soil moisture based on Extreme Learning Machine for an apple orchard. 400-404 - Tao Liu, Anni Cai:
Image semantic segmentation with a novel stochastic model. 405-409 - Zhiying He, Bo Wang, Jianling Huang, Yong Du:
Station passenger flow forecast for urban rail transit based on station attributes. 410-414 - Mingyin Wang, Lei Li, Fang Huang:
Semi-supervised Chinese Open Entity Relation Extraction. 415-420 - Kun Li, Liping Chen, Yidong Cui, Yuehui Jin:
Micro blog topic propagation modeling based on timed Petri-Net. 421-426 - Kazuyuki Matsumoto, Fuji Ren, Qingmei Xiao, Minoru Yoshida, Kenji Kita:
Emotion predicting method based on emotion state change of personae according to the other's utterances. 427-432 - Guoyu Wang, Yongquan Cai, Fujiang Ge:
Using hybrid Neural Network to address Chinese Named Entity Recognition. 433-438 - Qian Zhang, Bin Wu, Juan Yang:
Parallelization of ontology construction and fusion based on MapReduce. 439-443 - Yu Liu, Lei Li, Shuhong Wan, Zhiqiao Gao:
Research on Chinese multi-document hierarchical topic modeling automatic evaluation methods. 444-449 - Niu Na, Gulila Altenbek:
Improved chart parsing applied Kazakh graph analysis. 450-455 - Zhenwei Zhao, Guoqiang Bai:
Exploring the speed limit of SM2. 456-460 - Zhenyu Zhu, Hui Chen, Lianguo Wu:
Cloud computing model based on multiservice access dynamic detection. 461-464 - Yanbing Liu, Haijun Zhang, Jing Ma, Yunpeng Xiao:
Designing of authentication protocol for multi-level security virtual desktops. 465-469 - Yicheng Zheng, Feng Deng, Qingmeng Zhu, Yong Deng:
Cloud storage and search for mass spatio-temporal data through Proxmox VE and Elasticsearch cluster. 470-474 - Di Wu, Yuehui Jin, Tan Yang:
A probe system for analyzing transmission and playback quality of online videos. 475-480 - Migar M. C. Tam, K. S. Li, Spencer K. C. Yung, Ericson K. W. Yuen:
Autonomous Agent Enhanced Workspace (AAEW) for Extended Enterprise (E2) collaboration. 481-486 - Yiwen Nie, Wei Yang, Liusheng Huang, Xiaorong Lu:
A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography. 487-490 - Eric Tsui, Wai Ming Wang, Farzad Sabetzadeh:
Enacting Personal Knowledge Management & learning with web services interoperability tools. 491-494 - Qing Xue, Guifang Zhang, Xiaochun Wang:
Research of image information hiding algorithm based on quadrilateral partition. 495-498 - Hong Shen, Jinglei Meng, Licheng Yu, Xuefeng Fang, Tianzhou Chen, Hui Yan, Honglun Hou:
A quantitative quality control method of big data in cancer patients using artificial neural network. 499-504 - Supachai Tangwongsan, Vuthinant Itthisombat:
A highly effective security model for privacy preserving on cloud storage. 505-509 - Jiangyong Shi, Yuexiang Yang, Jie He, Chuan Tang, Qiang Li:
Design of a comprehensive virtual machine monitoring system. 510-513 - Jie Lin, Chuanyi Liu, Zhichun Ning, Binxing Fang:
Detecting the run time attacks in the cloud with an evidence collection based approach. 514-518 - Chen Liu, Mengxin Liu, Zhengqiu Yang, Jiangpeng Xiu:
Study on the data integration platform of multi-regional SCADA system based on cloud computing. 519-522 - Ferruh Yigit, Ömer Kaan Baykan:
A new feature selection method for text categorization based on information gain and particle swarm optimization. 523-529 - Bing Li, Keith C. C. Chan:
A fast big data collection system using MapReduce framework. 530-535 - Mingxing Tang, Changjian Wang, Yuxing Peng:
MARS: Scheduling non-local tasks in mapreduce. 536-540 - Yiming Shen, Yu Wu, Rui Wan:
Research and design of intelligent navigation data platform. 541-546 - Chuang Ruan, Fang Xiao, Jianping Luo:
Desgn and implementation of mobile payment system for intelligent travel. 547-552 - Yiming Shen, Jianping Luo:
Design and implementation of vehicle fault diagnosis system for intelligent travel. 553-558 - Chuang Ruan, Jianping Luo, Yu Wu:
Map navigation system based on optimal Dijkstra algorithm. 559-564 - Yi Huang, Fang Xiao, Yiming Shen:
Parking guidance system based on intelligent terminal. 565-570 - Qunchao Fu, Wanheng Liu, Tengfei Xue, Heng Gu, Siyue Zhang, Cong Wang:
A big data processing methods for visualization. 571-575 - Cong Liu, Xinyu Zhang, Yigang Diao:
Research on UCL-based trusted computing model of webpage content. 576-581 - Guohua Deng, Donglin Chen, Yanjun Gui, Ling Chen:
Purchase decision of cloud computing services under different instance utilization. 582-586 - Chen Liu, Kun Fan, Zengqiu Yang, Jiapeng Xiu:
A distributed video share system based on Hadoop. 587-590 - Xu Han, Han Jiang, Yanfeng Jiang, Heng Gu, Siyue Zhang, Tao Lv, Cong Wang:
Analysis on meteorological conditions and health factors based on C4.5 algorithm. 591-596 - Xiaojun Yu, Qiaoyan Wen:
MF-PDP: Multi-function provable data possession scheme in cloud computing. 597-603 - Xu Han, Tao Lv, Lin Wei, Yanyan Wu, Jianyi Liu, Cong Wang:
A model for website anomaly detection based on log analysis. 604-608 - Peng Xu, Wenju Zhou, Minrui Fei:
Detection methods for micro-cracked defects of photovoltaic modules based on machine vision. 609-613 - Jiayin Sun, Hongyan Wang, Jiahui Liu:
A cognitive method for melody stream transcription. 614-618 - Xin Ji, Ou Wu, Chenlong Wang, Jinfeng Yang:
Visual feature-based violent video detection. 619-623 - Zhenhong Zhang, Junping Du, Liang Xu, Qingping Li:
Multi-source motion images fusion based on 3D sparse representation. 624-629 - Wen-Cheng Lai, Jhin-Fang Huang, Wei-Jian Lin, Ta Chen Chiu:
Time-interleaved pipelined ADC design for computational intelligence and cloud computing application. 630-633 - Jun Zhou, Junping Du, Suguo Zhu:
Continues target tracking based on NCC and Kalman algorithm. 634-638 - Jingcao Yin, Hongbo Li, Junping Du, Pengcheng He:
Low illumination image Retinex enhancement algorithm based on guided filtering. 639-644 - Shouxin Cao, Junping Du, MeiYu Liang:
High dynamic range motion image sequences reconstruction. 645-650 - Wei Wei, Yingcai Dong, Tingli Su, Min Zuo, Junping Du:
Sliding mode and active disturbance rejection compound synchronization for Hindmarsh-Rose neural networks. 651-655 - Boxin Mao, Xin Jin, Shan Liu, Jianping Chai:
Research on visualization of communication network in social topic. 656-661 - Hailong Zhang, Xiao Guo:
SDN-based load balancing strategy for server cluster. 662-667 - Jinan Duan, Jinhai Zhao, Li Xiao, Chuanshu Yang, Huinian Chen:
A ROP prediction approach based on improved BP neural network. 668-671 - Hongbo Gao, Yuchao Liu, Xinyu Zhang, Guisheng Chen, Deyi Li:
Path planning algorithm regarding rapid parking based on static optimization. 672-678 - Benoit Huyot, Yves Mabiala, Jean-François Marcotorchino:
Online unsupervised anomaly detection in large information systems using copula theory. 679-684 - Jing Liu, Yun Shen, Yitong Liu, Nanxi Li, Dacheng Yang:
An intelligent video streaming delivery of SVC based on rateless UEP convolutional code. 685-690 - Dazhong He, Yun Xie, Hua Yu:
Cache for Flow Content: Solution to dependent packet processing in FPGA. 691-694 - Zhaowei Qu, Yang Xu, Sixing Yin:
A novel clustering-based spectrum sensing in cognitive radio wireless sensor networks. 695-699 - Chao Chen, Yuehui Jin, Tan Yang:
A multi-stage data compression and transmission method for bulk data in low speed network. 700-705 - Guanlin Bian, Yuehui Jin, Tan Yang:
Delay measurement and analysis of network performance on PlanetLab. 706-711 - Xue Liu, Xiaojun Jing, Songlin Sun, Hai Huang:
A novel network based on TD-LTE for counter-terrorism emergency communication in urban area. 712-716 - Yidan Fan, Kun Niu, Nanjie Deng:
A real-time bus arrival prediction method based on energy-efficient cell-tower positioning. 717-721 - Liren Xu, Xiaohong Huang, Zichao Li:
A three-layer distributed measurement system for cloud service network. 722-727 - Yansong Liang, Zhouding Jia, Huanzhong Yao, Jing Chen:
Housing intelligent lighting control strategy research. 728-731 - Yahong Guo, Xiaohong Huang, Ming Di, Yan Ma:
Research on modeling and development process for passive interoperability testing. 732-737 - Min Xu, Xiaohong Huang:
Research on conformance testing method for 6LoWPAN neighbor discovery protocol and system implementation. 738-743
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.