![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ignored or added at or after implementati...
-
Chapter and Conference Paper
On Dynamic Subset Difference Revocation Scheme
Subset Difference Revocation (SDR) [8] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of storage and message overhead when the number of curr...
-
Chapter and Conference Paper
Color 3D Digital Human Modeling and Its Applications to Animation and Anthropometry
With the rapid advancement in laser technology, computer vision, and embedded computing, the application of laser scanning to the digitization of three dimensional physical realities has become increasingly wi...
-
Chapter and Conference Paper
Exact Schedulability Analysis for Static-Priority Global Multiprocessor Scheduling Using Model-Checking
To determine schedulability of priority-driven periodic tasksets on multi-processor systems, it is necessary to rely on utilization bound tests that are safe but pessimistic, since there is no known method for...
-
Chapter and Conference Paper
Chinese Color Preference in Software Design
Three experiments were designed to investigate the color preference of User Interface of Chinese youth. Background color and foreground color, as well as their combinations were examined. The results showed th...
-
Chapter and Conference Paper
Throughput Analysis Considering Capture Effect in IEEE 802.11 Networks
The impact of capture effect on the IEEE 802.11 networks with different transmission speeds is investigated in this paper. A new Markov chain model considering capture effect for the binary exponential back-of...
-
Chapter and Conference Paper
Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites
Web services selection aims to choose an appropriate web service among a number of service candidates. The trustworthiness of web services is an important metric for web services selection. Many trustworthines...
-
Chapter and Conference Paper
Object Link Structure in the Semantic Web
Lots of RDF data have been published in the Semantic Web. The RDF data model, together with the decentralized linkage nature of the Semantic Web, brings object link structure to the worldwide scope. Object lin...
-
Chapter and Conference Paper
An Analysis for Anonymity and Unlinkability for a VoIP Conversation
With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...
-
Chapter and Conference Paper
Application of Natural Language in Fire Spread Display
How to express fire spread efficiently and effectively to firefighters was an important issue. The present study aimed to investigate how to present the fire alarm information, focusing on whether natural lang...
-
Chapter and Conference Paper
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
-
Chapter and Conference Paper
Development of the Information Management System for Monitoring Alien Invasive Species
One of the effective methods to prevent the excessive extending of alien invasive species is to really master their epidemic trends and to take appropriate measures to control them. So, the information managem...
-
Chapter and Conference Paper
Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies
According to the outbreak of H1N1 influenza on campus in Langfang city, Hebei province, at north of China in 2009, this paper constructed an artificial society model of the school, and simulated the spread of ...
-
Chapter and Conference Paper
The User’s Emotional Elements Research of Mobile Network Products Development Guided by User Experience
In the whole products process of enterprise-class, the product definition decides the product’s “gene”. By way of in-depth research on user experience and behavior, our brand strategy, product planning and pro...
-
Chapter and Conference Paper
Research and Application of Cultivation-Simulation-Optimization Decision Making System for Rapeseed (Brassica Napus L.)
The objectives of this study were to develop Rapeseed Cultivation Simulation-Optimization-Decision Making System (Rape-CSODS), and validate it in order to design rapeseed planting, regulate and control its gro...
-
Chapter and Conference Paper
Simulated Analysis of a Wheeled Tractor on Soft Soil Based on RecurDyn
A simulation model of a wheeled tractor was built using the multi-body dynamics software RecurDyn. The model consisted of four wheels, front and rear axles, and a body frame. An interaction model between tires...
-
Chapter and Conference Paper
Rice Kernel Shape Description Using an Improved Fourier Descriptor
A Fourier descriptor is one of the best methods for describing object boundaries, but there are limitations in describing the boundary of rice kernels using traditional Fourier descriptors. An innovative appro...
-
Chapter and Conference Paper
Image Segmentation of Pseudo-foreign Fibers in Cotton on the Basis of Improved Genetic Algorithm
In the foreign fibers cleaning process, pseudo-foreign fibers are often mistaken for foreign fibers, this result not only seriously affects the detecting precision of foreign fibers cleaning machine, but also ...
-
Article
Special issue: best papers of APWeb 2010
-
Chapter and Conference Paper
Affective Priming with Subliminal Auditory Stimulus Exposure
The primacy hypothesis about affection (Zajonc, 1980) holds that positive and negative affective reactions can be elicited with minimal stimulus input and virtually no cognitive processing. This hypothesis cha...