Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (ICCIPT 2014), April 23-24, 2014, Shanghai, China /
Collection of selected, peer reviewed papers from the International Conference on Computers and Information Processing Technologies (ICCIPT 2014), April 23-24, 2014, Shanghai, China. The 223 papers are grouped as follows: Chapter 1: Advanced Computing Technology and Mathematical Modeling, Chapter 2:...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico Congresos, conferencias eBook |
Idioma: | Inglés |
Publicado: |
Zurich, Switzerland :
Trans Tech Publications,
[2014]
|
Colección: | Applied mechanics and materials ;
v. 571-572. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Computers and Information Processing Technologies I; Preface and Conference Organization; Table of Contents; Chapter 1: Advanced Computing Technology and Mathematical Modeling; A Dirichlet-Neumann Alternating Algorithm Using Elliptical Arc Artificial Boundary for Exterior Problems with a Concave Angle; A Large-Scale and Flexible BMS Design; A Quantitative Evaluation Method Based on Hierarchical Architecture Model of Cloud Service Availability; Research on MapReduce Task Dynamic Balancing Strategy Based on File Label; Researches on Data Privacy in Cloud Computing Based on Game Theory.
- The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.
- A Tag-Based Signature Scheme with Shorter Signature LengthAn Identity-Based Conditional Proxy Re-Encryption in Cloud Computing Environments; Fine-Grained Access Control with Efficient Revocation in Cloud Storage; Integrity and Fidelity Evaluation of Digital Evidence in Live Forensics; MANET-Based Stable Clustering Algorithm and its Performance Analysis; Reinforcement Learning for Cloud Computing Digital Library; Research on Audit Model of Users' Operation Normalization Based on Graph Theory in Power System; Research on Design and Construction Method of Bent Functions.
- A Novelty Model for Reliability Assessment of Complex SystemA Multi-Attribute Decision-Making Method Based on SPAOWA Operator; The Forecasting Research of Beijing Tourism Demand Based on the BP Neural Network; A Class of Singular Volterra-Fredholm Type Difference Inequality in Engineering; A Class of Volterra-Fredholm Difference Inequality with Weakly Singularity in Engineering; Application Research of the Polynomial Fitting Model in Transformation of Plane Rectangular Coordinate; Identification and Optimization of Soil Water Movement Model Based on GA under Drip-Irrigation.
- Regression Analysis of Lower Extremity Injury Influencing Factors under Frontal CrashSetting of Academic Warning Based on Multivariate Copula Functions; The Application of Iteration Learning Control in Silkworm Incubation Chamber System; Chapter 2: Detection and Optimization Algorithms, Artificial Intelligence and Intelligent Systems; Fault Diagnoses Using Inverse Fuzzy Model; A Community Detection Method Based on Multi-Objective Optimization Method; A High Precision Indoor Positioning System Based on VLC and Smart Handheld.