Information Computing and Applications

Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings, Part II

Editors:

ISBN: 978-3-642-34040-6 (Print) 978-3-642-34041-3 (Online)

Table of contents (115 chapters)

previous Page of 6
  1. Front Matter

    Pages -

  2. Internet Computing and Applications

    1. No Access

      Book Chapter

      Pages 1-8

      Research on User Authentication Scheme against the Man-in-the-Middle Attack

    2. No Access

      Book Chapter

      Pages 9-14

      Study on Network Security Proactive Defense Model Based on Honey Pot Technology

    3. No Access

      Book Chapter

      Pages 15-20

      Framework of Server and Storage Virtualization

    4. No Access

      Book Chapter

      Pages 21-26

      Efficient Management Scheme of Campus Information

    5. No Access

      Book Chapter

      Pages 27-33

      Web Service Technology in College Financial Information Service System

    6. No Access

      Book Chapter

      Pages 34-40

      Efficient Network Monitoring System

    7. No Access

      Book Chapter

      Pages 41-46

      Software Design for Network Monitoring System

    8. No Access

      Book Chapter

      Pages 47-52

      Network Content Safety Design of Monitoring System

    9. No Access

      Book Chapter

      Pages 53-60

      Improvement Intrusion Detection Based on SVM

    10. No Access

      Book Chapter

      Pages 61-66

      Research on Subject Information Service Platform of University Library

    11. No Access

      Book Chapter

      Pages 67-75

      Networks Intrusion Behavior Prediction Based on Threat Model

    12. No Access

      Book Chapter

      Pages 76-84

      An Requirement-Aware Approach for Composing Web Services

    13. No Access

      Book Chapter

      Pages 85-91

      Efficient Modeling Scheme Based on Smart Neural Network

    14. No Access

      Book Chapter

      Pages 92-97

      Programming Design of Device Driver Based on Windows CE.Net

  3. Multimedia Networking and Computing

    1. No Access

      Book Chapter

      Pages 98-105

      Contourlet-Based Fusion Method for Video Surveillance Using the Pulse Coupled Neural Networks Model

    2. No Access

      Book Chapter

      Pages 106-111

      Consensus-Based Detection Method for Visible and Thermal Videos

    3. No Access

      Book Chapter

      Pages 112-118

      M-Learning English Course Design in Chinese Local University

    4. No Access

      Book Chapter

      Pages 119-126

      Multi-objective Optimization for Data Placement Strategy in Cloud Computing

    5. No Access

      Book Chapter

      Pages 127-132

      Web-Based Teaching System of Tourism English

    6. No Access

      Book Chapter

      Pages 133-137

      Explore Sharing Platform of Medical Educational Teaching Resources with IT Technology

previous Page of 6