Weiwei Feng, Peng Wang, Chuan Zhou, Yue Hu, Li Guo
{"title":"Nonparametric Topic-Aware Sparsification of Influence Networks","authors":"Weiwei Feng, Peng Wang, Chuan Zhou, Yue Hu, Li Guo","doi":"10.1007/978-3-662-47401-3_11","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_11","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133065083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Mobility Simulation in Smart Energy Grid","authors":"Tianle Zhang, Lixin Liu, Shouyou Song, Yuyu Yuan","doi":"10.1007/978-3-662-47401-3_30","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_30","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116735960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Integration of Heterogeneous Employment Service Information of College Graduates","authors":"Yibo Xie, Zhongzhi Luan","doi":"10.1007/978-3-662-47401-3_44","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_44","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danfeng Zhu, Rui Wang, Zhongzhi Luan, D. Qian, Han Zhang, Jihong Cai
{"title":"Memory Centric Hardware Prefetching in Multi-core Processors","authors":"Danfeng Zhu, Rui Wang, Zhongzhi Luan, D. Qian, Han Zhang, Jihong Cai","doi":"10.1007/978-3-662-47401-3_41","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_41","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126688393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Implementation of GFP Protocol Based on EOS in FPGA","authors":"Ma Yilan, Yao Lin, Zeng Guang, M. Bardi","doi":"10.1007/978-3-662-47401-3_36","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_36","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Risk Assessment of Rich Communication Services Over LTE","authors":"Xin He, Huiyun Jing","doi":"10.1007/978-3-662-47401-3_16","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_16","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Uighur Automatic Summarization Method Based on Sub-theme Division","authors":"Xiaodong Yan","doi":"10.1007/978-3-662-47401-3_2","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_2","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Optimization Design of High Q Microwave Photonic Filters Based on Cascade Fiber Bragg Gratings","authors":"Huimin Gao, Zeng Guang","doi":"10.1007/978-3-662-47401-3_35","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_35","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongzhou Sha, Xiaoqian Li, Qingyun Liu, Zhou-yu Zhou, L. Zhang, Lidong Wang
{"title":"RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network","authors":"Hongzhou Sha, Xiaoqian Li, Qingyun Liu, Zhou-yu Zhou, L. Zhang, Lidong Wang","doi":"10.1007/978-3-662-47401-3_39","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_39","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of eID Mobile Identity Authentication Method","authors":"Xu Wu, Yueke Fan, Xi Zhang, Jin Xu","doi":"10.1007/978-3-662-47401-3_46","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_46","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}