2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
FRDV: A DTN Routing Based on Human Moving Status in Urban Environments 城市环境中基于人的移动状态的DTN路由
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00018-9_31
Wenzao Li, Bing Wan, Zhan Wen, Jianwei Liu, Yue Cao, Tao Wu, Jiliu Zhou
{"title":"FRDV: A DTN Routing Based on Human Moving Status in Urban Environments","authors":"Wenzao Li, Bing Wan, Zhan Wen, Jianwei Liu, Yue Cao, Tao Wu, Jiliu Zhou","doi":"10.1007/978-3-030-00018-9_31","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_31","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"28 1","pages":"344-355"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80312997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Application of ATC Operation Security Based on Data Mining 基于数据挖掘的空管运行安全应用研究
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00018-9_54
Zhaoyue Zhang, Jing Zhang, Sen Wang
{"title":"Research on Application of ATC Operation Security Based on Data Mining","authors":"Zhaoyue Zhang, Jing Zhang, Sen Wang","doi":"10.1007/978-3-030-00018-9_54","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_54","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"83 1","pages":"617-625"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77133088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction of Garlic Price Based on ARIMA Model 基于ARIMA模型的大蒜价格预测
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00006-6_66
Baojia Wang, Pingzeng Liu, Chao Zhang, Junmei Wang, Liu Peng
{"title":"Prediction of Garlic Price Based on ARIMA Model","authors":"Baojia Wang, Pingzeng Liu, Chao Zhang, Junmei Wang, Liu Peng","doi":"10.1007/978-3-030-00006-6_66","DOIUrl":"https://doi.org/10.1007/978-3-030-00006-6_66","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"731-739"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76178684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reversible Data Hiding in Partially-Encrypted Images 可逆数据隐藏在部分加密的图像
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00012-7_61
Haishan Chen, Wien Hong, J. Ni, Tung-Shou Chen
{"title":"Reversible Data Hiding in Partially-Encrypted Images","authors":"Haishan Chen, Wien Hong, J. Ni, Tung-Shou Chen","doi":"10.1007/978-3-030-00012-7_61","DOIUrl":"https://doi.org/10.1007/978-3-030-00012-7_61","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"112 1","pages":"670-679"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87468993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on STC Platform 基于STC平台的集群异构网络基准性能测试方法
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00009-7_21
Junhua Xi, Kouquan Zheng
{"title":"The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on STC Platform","authors":"Junhua Xi, Kouquan Zheng","doi":"10.1007/978-3-030-00009-7_21","DOIUrl":"https://doi.org/10.1007/978-3-030-00009-7_21","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"14 1","pages":"223-231"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87672072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate UHF Tag Authentication Using Near-Field Capabilities 使用近场功能的精确UHF标签认证
Cui Zhao, H. Ding, Kaiyan Cui, Fan Liang
{"title":"Accurate UHF Tag Authentication Using Near-Field Capabilities","authors":"Cui Zhao, H. Ding, Kaiyan Cui, Fan Liang","doi":"10.1007/978-3-030-00018-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_2","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"20 1","pages":"16-26"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87569029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Big Data Fusion Method of Smart Grid in the Environment of Internet of Things 物联网环境下智能电网大数据融合方法研究
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00018-9_56
Ke Jia, Xiaoming Ju, Hongbin Zhang
{"title":"Research on Big Data Fusion Method of Smart Grid in the Environment of Internet of Things","authors":"Ke Jia, Xiaoming Ju, Hongbin Zhang","doi":"10.1007/978-3-030-00018-9_56","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_56","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"155 1","pages":"636-647"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86301457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of the Product Quality Traceability System for Winter Jujube 冬枣产品质量追溯系统的设计与实现
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00009-7_62
Bangguo Li, Pingzeng Liu, Xiaotong Wu, Jianyong Zhang
{"title":"Design and Implementation of the Product Quality Traceability System for Winter Jujube","authors":"Bangguo Li, Pingzeng Liu, Xiaotong Wu, Jianyong Zhang","doi":"10.1007/978-3-030-00009-7_62","DOIUrl":"https://doi.org/10.1007/978-3-030-00009-7_62","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"8 1","pages":"694-705"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83672785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Graph-Based Model for Inter-networking Access Control 一个轻量级的基于图的网络访问控制模型
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00015-8_51
Zhongmiao Kang, Wenting Jiang, Yan Chen
{"title":"A Lightweight Graph-Based Model for Inter-networking Access Control","authors":"Zhongmiao Kang, Wenting Jiang, Yan Chen","doi":"10.1007/978-3-030-00015-8_51","DOIUrl":"https://doi.org/10.1007/978-3-030-00015-8_51","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"56 1","pages":"589-597"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83976243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope 虚拟支气管镜的三维气道树中心线提取算法
Xiang Yu, Yanbo Li, Hui Lu, Le Wang
{"title":"3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope","authors":"Xiang Yu, Yanbo Li, Hui Lu, Le Wang","doi":"10.1007/978-3-030-00006-6_1","DOIUrl":"https://doi.org/10.1007/978-3-030-00006-6_1","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"28 1","pages":"3-12"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82657715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信