Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation Bailing LiuFeng XiaoKe Deng Research Article 14 January 2011 Pages: 135 - 147
Fingerprint segmentation based on an AdaBoost classifier Eryun LiuHeng ZhaoJie Tian Research Article 14 January 2011 Pages: 148 - 157
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions Wenfeng YangYupu Hu Research Article 14 January 2011 Pages: 158 - 162
A simple fingerprinting scheme for large user groups Defa HuQiaoliang Li Research Article 14 January 2011 Pages: 163 - 168
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI Lei HanJiqiang LiuXueye Wei Research Article 14 May 2011 Pages: 169 - 180
FlowTrust: trust inference with network flows Guojun WangJie Wu Research Article 09 May 2011 Pages: 181 - 194
Dominance-based fuzzy rough approach to an interval-valued decision system Xibei YangMing Zhang Research Article 19 February 2011 Pages: 195 - 204
Type-2 fuzzy description logic Ruixuan LiKunmei WenBing Li Research Article 14 January 2011 Pages: 205 - 215
Individual difference of artificial emotion applied to a service robot Wei WangZhiliang WangXuejing Gu Research Article 06 May 2011 Pages: 216 - 226
Efficient normalized cross correlation calculation method for stereo vision based robot navigation Yehu Shen Research Article 14 January 2011 Pages: 227 - 235
Improving performance by creating a native join-index for OLAP Yansong ZhangShan WangJiaheng Lu Research Article 16 February 2011 Pages: 236 - 249
Psu: a novel low-latency constant-degree overlay network Lan LiWenjun Xiao Research Article 04 June 2011 Pages: 250 - 258