http://iet.metastore.ingenta.com
1887

Third International Conference on Cyberspace Technology (CCT 2015)

Buy conference proceeding
$126.00
(plus tax if applicable)
  • Location: Beijing, China
  • Conference date: 17-18 Oct. 2015
  • ISBN: 978-1-78561-089-9
  • Conference number: CP678
  • The following topics are dealt with: data security; pattern clustering; scheduling; multiprocessing systems; cloud computing; resource allocation; cognitive radio; speech processing; virtual machines; recommender systems; computer networks; image processing; intrusion detection; optical communication systems; and pattern classification.

1 - 20 of 72 items found

  • An Integrated ILP Model for Routing, Modulation Level and Spectrum Allocation in The Next Generation DCN
  • Privacy-preserving multi-keywor ranked search over encrypted big data [keywor read keyword]
  • A risk-elimination and weight-adjustment algorithm for optical networks
  • Finding rumor source in weighted scale-free networks
  • A novel hybrid chaotic sequence and its performance analysis
  • Effect of troposphere delay on measurement of high dynamic receiver
  • Gait recognition based on DWT and t-SNE
  • An user selection algorithm for the heterogeneous network
  • Research on comprehensive performance assessment for WSN based on analytic network process
  • Study on data model of power grid planning evaluation business
  • Buiding and test of network security situational awareness model based on Bayesian method [Building]
  • Research on multi-robot formation controlling method
  • Image CAPTCHA technology research based on the mechanism of finger-guessing game
  • Research for the arithmetic of cloud computing intrusion detection
  • Key management scheme for bottleneck steiner tree based cloud computing
  • A non-cooperative game model of intrusion detection system in cloud computing
  • Novel security architecture of satellite communication network
  • Research on the rate matching of LTE
  • Study on game theory strategy of groundwater pollution control in big data
  • Cloud computing key management mechanism for cloud storage
1 2 3 4 | Next >
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address