Abstract is missing.
- U2F based secure mutual authentication protocol for mobile paymentKai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, Yintang Yang. [doi]
- Android digital forensics: data, extraction and analysisNathan Scrivens, Xiaodong Lin. [doi]
- The early fusion strategy for search result diversificationChunlin Xu, Shengli Wu. [doi]
- Computing skyline groups: an experimental evaluationHaoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu. [doi]
- Cooperative relay tracking with multiple mobile camera sensorsJiandian Zeng, Tian Wang, Md. Zakirul Alam Bhuiyan. [doi]
- Hybrid de-anonymization across real-world heterogeneous social networksHuaxin Li, Qingrong Chen, Haojin Zhu, Di Ma. [doi]
- Exploiting contention and congestion aware switch allocation in network-on-chipsCunlu Li, Dezun Dong, Xiangke Liao. [doi]
- Remote FPGA lab platform for computer system curriculumYuxiang Zhang, Yu Chen, Xiaojian Ma, Yuhan Tang, Yilin Niu, Shanshan Li, Weidong Liu. [doi]
- FNF: flow-net based fingerprintingBo Fu, Yang Xiao, Hui Chen. [doi]
- Learning word embeddings via context groupingYun Ma, Qing Li, Zhenguo Yang, Wenyin Liu, Antoni B. Chan. [doi]
- Building step-by-step practical curriculum system for computer systemic ability trainingYu Zhang, Xianglan Chen, Xin An, Jianliang Lu, Xuejun Li, Xuehai Zhou. [doi]
- Crowdsourcing-based wifi fingerprint update for indoor localizationNingjia Fu, Jianzhong Zhang, Wenping Yu, Changhai Wang. [doi]
- Collaboratively filtering malware infections: a tensor decomposition approachJieqiong Hou, Haifeng Qian. [doi]
- CLR: coupled logistic regression model for CTR predictionNing Yin, Hongyan Li, Hanchen Su. [doi]
- Using coursera clickstream data to improve online education for software engineeringYanchun Sun, Chao Xin. [doi]
- How does web-based virtual reality affect learning: evidences from a quasi-experimentRuobin Wang, Fengxia Li, Nannan Cheng, Bin Xiao, Jiandong Wang, Chuntao Du. [doi]
- Taming both predictable and unpredictable link failures for network tomographyHuikang Li, Yi Gao, Wei Dong, Chun Chen. [doi]
- Thor: a server-level hybrid switching data center network with heterogeneous topologiesXiaoshan Yu, Hong Xu, Huaxi Gu. [doi]
- NANI: an efficient community detection algorithm based on nested aggregation of node influenceChuan Li, Zhiheng Jiang, Yijie Li, Yangfan Miao, Daiyan Hu, Guangming Liu, Yijing Liu. [doi]
- Teaching evaluation for computational-thinking-oriented elementary computer coursesBo Li, Xiaobin Zhang, Ning Wu. [doi]
- NIOSIT: efficient data access for log-structured merge-tree style storage systemsBing Xiao, Jinwei Guo, Weining Qian, Huiqi Hu, Aoying Zhou. [doi]
- Hybrid small class teaching: dividing and conquering large computer systems classesYao Guo, Junlin Lu, Yifeng Chen, Ming Zhang, Wenxin Li. [doi]
- COFFEE: coexist wifi for ZigBee networks: a frequency overlay approachYubo Yan, Panlong Yang, Xiang-Yang Li, Yafei Zhang. [doi]
- Towards heterogeneous keyword searchChunbin Lin, Jianguo Wang, Chuitian Rong. [doi]
- k, R, r)-anonymity: a light-weight and personalized location protection model for LBS queryYunxia Feng, Xu Li, Bo Song. [doi]
- Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detectionLiang He, Zhixiang Li, Chao Shen. [doi]
- MOOC student dropout: pattern and preventionYunfan Chen, Ming Zhang. [doi]
- Security analysis of Bloom filter based multicast forwardingXiaohua Tian, Jiaqi Liu, Wei Liu, Yu Cheng, Lijun Ou, Zilong Zhao. [doi]
- Botzone: a competitive and interactive platform for game AI educationHaoyu Zhou, Yushan Zhou, Haifeng Zhang, Houjun Huang, Wenxin Li. [doi]
- Distributed skyline trajectory query processingAmina Belhassena, Hongzhi Wang. [doi]
- Tide and shock: the influential modern teaching methods on chinese education reformJuMin Zhao, Shimin Huo, Yanxia Li, Dengao Li, Xinyan Liu, Jie Zhou. [doi]
- Preventing "bad" content dispersal in named data networkingYi Wang, Zhuyun Qi, Kai Lei, Bin Liu, Chen Tian. [doi]
- Correlation analysis between electricity consumption and economic developmentYaoqiang Xu, Yongqing Xie, Jianhua Feng. [doi]
- MagSpider: a localization-free approach for constructing global indoor map for navigation purposeXiaolei Zhou, Deke Guo, Xiaoqiang Teng. [doi]
- A data-driven analysis of student efforts and improvements on a SPOC experimentMing Zhang, Jile Zhu. [doi]
- An APCA-enhanced compression method on large-scale time-series dataHaiquan Wang. [doi]
- From the perspective of teaching scheme: cultivating and training undergraduates driven by engineering education accreditationShuMin Shi, Heyan Huang, Jun Zheng. [doi]
- Streamline architecture of network simulator to facilitate teaching of computer networkingXiaohua Tian, Jiaqi Liu, Xinbing Wang. [doi]
- Composed sketch framework for quantiles and cardinality queries over big data streamsShuzhuang Zhang, Hao Luo, Zhi-Gang Wu, Yi Wang. [doi]
- The design of course architecture for big dataHongzhi Wang, Hong Gao, Shenjun Yin, Jie Zhu. [doi]
- GlobeSen: an open interconnection framework based on named sensory date for IoTLiang Liu, Huadong Ma, Bo Chen, Wenbo Yang. [doi]
- Research on quantitative quality evaluation method based on double cyclesMao Yang Zou, Xi Wu. [doi]
- Matrix completion for SPOC student peer-grading evaluationBin Xu, Kexin Li, Kening Gao, Changkuan Zhao, Ge Yu, Jinshuang Li. [doi]
- ShadowPWD: practical browser-based password manager with a security tokenShuang Liang, Yue Zhang, Bo Li, Xiaojie Guo, Hao Guo, Xiaoyun He, Zheli Liu, Chunfu Jia. [doi]
- MINOS: regulating router dataplane actions in dynamic runtime environmentsLei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wenlong Chen. [doi]
- Search engine drives the evolution of social networksCai Fu, Chenchen Peng, Xiao-Yang Liu. [doi]
- Evaluation of situational case-based teaching technique in engineering educationQiang Liu, Wentao Zhao, Dan Liu, Jiao Ji. [doi]
- Determining the currency of dynamic dataXiaoou Ding, Hongzhi Wang, Yitong Gao, Jianzhong Li, Hong Gao. [doi]
- FlashSkipList: indexing on flash devicesHuiying Wang, Jianhua Feng. [doi]