{"title":"An Anomaly Detection Model Based on Cloud Model and Danger Theory","authors":"Wenhao Wang, Chen Zhang, Quan Zhang","doi":"10.1007/978-3-662-43908-1_15","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_15","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124376686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidisciplinary Trust Conceptualization: A General Model for Customer Trust Building in e-Commerce","authors":"Manawa Anakpa, Yuyu Yuan","doi":"10.1007/978-3-662-43908-1_45","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_45","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127717492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android-Based Remote-Control with Real-Time Video Surveillance for Wi-Fi Robot","authors":"Chang-Yeoung Song","doi":"10.1007/978-3-662-43908-1_47","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_47","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering Training Data When Training Feed-Forward Artificial Neural Network","authors":"Krishna Moniz, Yuyu Yuan","doi":"10.1007/978-3-662-43908-1_28","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_28","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Single-Channel Blind Separation Method Using EMD and ICA","authors":"Jiao Wang, Yulin Liu, Zhichao Chao, W. He","doi":"10.1007/978-3-662-43908-1_10","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_10","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction and Analysis of Simulators of MapReduce","authors":"Yuanquan Fan, Wei Wei, Yan Gao, Weiguo Wu","doi":"10.1007/978-3-662-43908-1_42","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_42","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Technologies of Software Requirements Prioritization","authors":"Zhixiang Tong, Qiankun Zhuang, Qi Guo, Peijun Ma","doi":"10.1007/978-3-662-43908-1_2","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_2","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114908446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Evaluation of Service Trustworthiness Based on BP-Neural Network","authors":"Yue Li, Qingyang Gao, J. Bøegh","doi":"10.1007/978-3-662-43908-1_24","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_24","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}