DocumentCode :
2654942
Title :
[Title page i]
fYear :
2011
fDate :
22-23 Oct. 2011
Abstract :
The following topics are dealt with: self adaptive jamming strategy; deterministic protocol; model update particle filter; object detection; trusted bytecode virtual machine module; power saving adaptive routing protocol; formal specification; Byzantine fault tolerant algorithm; active data leakage prevention model; content based image retrieval system; parallel Gaussian filtering algorithm; trust based secure localization; high speed parallel timing recovery algorithm; feature-based robust digital image watermarking; electronic equipment fault diagnosis algorithm; RBF neural network; genetic algorithm; machine learning methods; automatic summarization; Chinese text; e-commerce environment; improved multi-objective population migration optimization; cloud computing; masking expansion algorithm; software behavior trustworthiness control method; computer graphics; graphics image processing technology; Internet of things; impossible differential cryptanalysis; mathematics textbooks; EEG signal process; cryptography; network security mechanisms; English teaching integration; improved binary image watermarking algorithm and stronger security dual signature.
Keywords :
Gaussian processes; Internet; cloud computing; computer graphics; computer network security; cryptography; digital signatures; electroencephalography; electronic commerce; fault tolerant computing; formal specification; genetic algorithms; image watermarking; learning (artificial intelligence); natural language processing; object detection; particle filtering (numerical methods); radial basis function networks; routing protocols; text analysis; Byzantine fault tolerant algorithm; Chinese text; EEG signal process; English teaching integration; Internet of things; RBF neural network; active data leakage prevention model; automatic summarization; cloud computing; computer graphics; content based image retrieval system; cryptography;; deterministic protocol; e-commerce environment; electronic equipment fault diagnosis algorithm; feature-based robust digital image watermarking; formal specification; genetic algorithm; graphics image processing technology; high speed parallel timing recovery algorithm; impossible differential cryptanalysis; improved binary image watermarking algorithm; improved multi objective population migration optimization; machine learning methods; masking expansion algorithm; mathematics textbooks; model update particle filter; network security mechanisms; object detection; parallel Gaussian filtering algorithm; power saving adaptive routing protocol;; self adaptive jamming strategy; software behavior trustworthiness control method; stronger security dual signature; trust based secure localization; trusted bytecode virtual machine module;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence Information Processing and Trusted Computing (IPTC), 2011 2nd International Symposium on
Conference_Location :
Hubei
Print_ISBN :
978-1-4577-1130-5
Type :
conf
DOI :
10.1109/IPTC.2011.1
Filename :
6103588
Link To Document :
بازگشت