Abstract is missing.
- A Filled Function Method with One Parameter for Box ConstraintShuqing Jiao. 1-4 [doi]
- A Modified PSO Method Based on Cultural Algorithm and Quantum ComputingXiao Zhi Gao, Ying Wu, Xiaolei Wang, Xianlin Huang, Kai Zenger, Xiaofeng Wang. 5-10 [doi]
- A New Objective Reduction Algorithm for Many-Objective Problems: Employing Mutual Information and Clustering AlgorithmXiaofang Guo, Xiaoli Wang, Mingzhao Wang, Yuping Wang. 11-16 [doi]
- A New TOPSIS with Triangular Fuzzy Number and Uncertain Weight Based on Cosines Similar DegreeZhenghai Ai. 17-21 [doi]
- A Niching Harmony Search Method for Multi-modal OptimizationXiao Zhi Gao, Xiaolei Wang, Kai Zenger, Xiaofeng Wang. 22-27 [doi]
- A Study on Magnetic Force of the Large Displacement Hybrid Suspension System Based on Finite Element MethodTao Wen, Zhengfeng Ming, Youqing Liu, Jinxin Gu. 28-30 [doi]
- A Weak Filled Function Algorithm for Unconstrained Searching OptimizationGuiyu Li, JiongCheng Li, Henghui Xiao, Shengpei Ding. 31-34 [doi]
- Ant Colony Algorithm for Waste Collection Vehicle Arc Routing Problem with Turn ConstraintsJie Liu, Yanfeng He. 35-39 [doi]
- A Filled Function with Two Parameters for Unconstrained Global OptimizationShuqing Jiao. 40-43 [doi]
- An Optimization Design Method of Integrated Radar and Jammer Signal Modulated by Bi-phase Sequences of ChaosGuoxi Han, Jun He, Jianqing Qi. 44-47 [doi]
- Differential Evolution Algorithm for the Optimization of the Vehicle Routing Problem in LogisticsHuan Xu, Jiechang Wen. 48-51 [doi]
- Extracting Main Content of a Topic on Online Social Network by Multi-document SummarizationChunyan Liu, Conghui Zhu, Tiejun Zhao, Dequan Zheng. 52-55 [doi]
- Hybrid Artificial Bee Colony Algorithm for Solving Nonlinear System of EquationsRuimin Jia, Dengxu He. 56-60 [doi]
- Oil Well Placement Optimization Using Niche Particle Swarm OptimizationGuojian Cheng, Yao An, Zhe Wang, Kai Zhu. 61-64 [doi]
- Preference Based Multiobjective Evolutionary Algorithm for Constrained Optimization ProblemsNing Dong, Fei Wei, Yuping Wang. 65-70 [doi]
- Preference-Based Evolutionary Multi-objective OptimizationZhenhua Li, Hai-lin Liu. 71-76 [doi]
- Resource Allocation for OFDM System Based on Evolutionary AlgorithmQiang Wang, Hai-lin Liu, Jiong-Cheng Li. 77-81 [doi]
- Saddle-point Condition for Fractional ProgrammingXiangyou Li. 82-85 [doi]
- The Effects of Different Representations on Malware Motif IdentificationAjit Narayanan, Yi Chen, Shaoning Pang, Ban Tao. 86-90 [doi]
- A Method for Judging Web-page TypeXue Hong-Jun, Chen Tao, Xue Li-Min. 91-93 [doi]
- Analyzing Sequence Data Based on Conditional Random Fields with Co-trainingLeilei Yang, Guiquan Liu, Qi Liu, Lei Zhang, Enhong Chen. 94-98 [doi]
- Application of Improved Logarithm Logistic Models in Population PredictionBin Li, Tianfei Wang, Liping Jia. 99-102 [doi]
- Class Assignment Algorithms for Performance Measure of Clustering AlgorithmsJie Zhang, Xingsi Xue, Yuping Wang. 103-106 [doi]
- Energy Efficient and Cluster Based Routing Protocol for WSNHairong Zhao, Wuneng Zhou, Yan Gao. 107-111 [doi]
- Experimental Comparison of Geometric, Arithmetic and Harmonic Means for EEG Event Related Potential DetectionJarno M. A. Tanskanen, X. Z. Gao, Jing Wang, Ping Guo, Jari Hyttinen, Vassil S. Dimitrov. 112-116 [doi]
- Finding the Provenance of k-anonymous Data and Adding It to Association-rule MiningYilong Liu, Guohua Liu. 117-122 [doi]
- Multi-Agent Evolutionary Clustering Algorithm Based on Manifold DistanceXiaoying Pan, Hao Chen. 123-127 [doi]
- The Hilbert Boundary Value Problem in the Unit Ball in Clifford AnalysisZhongwei Si, Lina Liang, Jinyuan Du. 128-131 [doi]
- TV OS-SART with Fractional Order Integral FilteringDong-jiang Ji, Wen-Zhang He, Xiao-Bing Zou. 132-135 [doi]
- TVPDc: A Model for Secure Managing Virtual Infrastructure in IaaS CloudXin Wan, Xinfang Zhang, Liang Chen, Hao Jin. 136-141 [doi]
- Using Information Content to Evaluate Semantic Similarity on HowNetBin You, Xiao-Ran Liu, Ning Li, Yue-Song Yan. 142-145 [doi]
- A Data Placement Strategy Based on Genetic Algorithm for Scientific WorkflowsEr-Dun Zhao, Yong-Qiang Qi, Xing-Xing Xiang, Yi Chen. 146-149 [doi]
- A Fuzzy Decision Based Intelligent QoS Multicast Routing AlgorithmJunwei Wang, Haifeng Wang. 150-153 [doi]
- A Kind of Nonlinear and Non-convex Optimization Problems under Mixed Fuzzy Relational Equations Constraints with Max-min and Max-average CompositionShuang Feng, Yingqiu Ma, Jinquan Li. 154-158 [doi]
- A New Plan Recognition Algorithm and its ImplementationDan Zhang, LongMei Jie, GuoQiang Shao. 159-162 [doi]
- A Robust Instance-based Video Search Method by Re-ranking for Multiple Visual CodebooksWen Wang, Zhicheng Zhao. 163-167 [doi]
- Cluster Synchronization of Complex Networks with Non-delayed and Delayed Coupling under Pinning ControlZe Tang, Jianwen Feng, Yi Zhao. 168-172 [doi]
- Computer Realization of Solving n-order Incomplete Four Angles ProblemTianxiang Feng. 173-176 [doi]
- Design of Computer Measurement and Control System of Test Device for Grain Drying Based on Virtual InstrumentLiu Yang, Junwen Deng, Yuyao Song. 177-182 [doi]
- Design the Desktop Backup System Based on Cloud ComputingJing Nie. 183-185 [doi]
- DTMS: A Driving Training Management System Based on the Internet of ThingsLingling Hu, Dazhou Wu, Xu Xu, Jie Yao. 186-189 [doi]
- Further Research on Group Consensus of Multi-agent SystemsXin-Lei Feng, Liping Jia. 190-194 [doi]
- Improving the Recommendation of Collaborative Filtering by Fusing Trust NetworkBo Yang 0002, Pengfei Zhao, Shuqiu Ping, Jing Huang. 195-199 [doi]
- Neuron-MOS Based Schmitt Trigger with Controllable HysteresisGuoqiang Hang, Yonghui Liao, Yang Yang, Danyan Zhang, Xiaohui Hu. 200-203 [doi]
- On Synchronizability of Kleinberg Small World NetworksYi Zhao, Jianwen Feng, Jingyi Wang. 204-208 [doi]
- Parallelization and Optimization of Molecular Dynamics Simulation on Many Integrated CoreQian Yin, Ruiyi Luo, Ping Guo. 209-213 [doi]
- Research on Data Recording in Seismic PSD ExperimentPeng Sun, Xin Guo, Kang Chen, Ziyan Wu. 214-218 [doi]
- Research on Vision-based Intelligent Vehicle Safety Inspection and Visual SurveillanceWeijun Dai, Ji Ge. 219-222 [doi]
- Study on Numerical Integration Algorithm for PSD TestPeng Sun, Xin Guo. 223-227 [doi]
- The AIS-SoL Optimization: An Artificial Immune System with Social LearningZhonghua Li, Chunhui He. 228-232 [doi]
- Urban Water Consumption Forecast Based on QPSO-RBF Neural NetworkXingtong Zhu, Bo Xu. 233-236 [doi]
- A High-Speed SHA-1 IP Core for 10 Gbps Ethernet Security ProcessorYang Liu, Liji Wu, Yun Niu, Xiangmin Zhang, Zhiqiang Gao. 237-241 [doi]
- An Improved Mandarin Voice Input System Using Recurrent Neural Network Language ModelYujing Si, Ji Xu, Zhen Zhang, Jielin Pan, YongHong Yan. 242-246 [doi]
- Analysis and Forecasting on the Relationship between Port Logistics Capacity and Coastal Marine Economic Growth Based on PKNN in Case of Zhejiang ProvinceZhibin Li, Lingling Wang, Haichuan Lou. 247-251 [doi]
- BP Neural Networks with Harmony Search Method-based Training for Epileptic EEG Signal ClassificationXiao Zhi Gao, Jing Wang, Jarno M. A. Tanskanen, Rongfang Bie, Ping Guo. 252-257 [doi]
- Prediction of Prosodic Word Boundaries in Chinese TTS Based on Maximum Entropy Markov Model and Transformation Based LearningZiping Zhao, Xirong Ma. 258-261 [doi]
- Projective Synchronization Control of Delayed Recurrent Neural Networks with Markovian Jumping ParametersSiming Ma, Wuneng Zhou, Shicao Luo, Rui Chen. 262-266 [doi]
- Robust Stability of Uncertain Neutral Systems with Time-varying and Distributed DelaysRuliang Wang, Dongmei Gao. 267-270 [doi]
- Ultrasonic Target Recognition Based on Wavelet Packet and Neural NetworkXueqin Kou, Lichen Gu. 271-274 [doi]
- 3D Model Retrieval Method Based on Single ViewZhi Liu, Qi Hua Chen, Xiang Pan, Yipan Feng. 275-279 [doi]
- A Multi Modal Content-Based Copy Detection ApproachSiyuan Wu, Zhicheng Zhao. 280-283 [doi]
- An Adaptive Image Denoising Model Based on Nonlocal Diffusion TensorSun Xiao-li, Xu Chen, Li Min. 284-287 [doi]
- An Improved Community Detection Algorithm Based on Local Information in Social NetworksLei Xia, Lejun Zhang, Jianpei Zhang, Jing Yang 0001, Lin Guo. 288-292 [doi]
- Based on Image Salient Features Network Image Retrieval MethodKai Yan, Kefeng Feng, Ying Wang, Bo Pan. 293-297 [doi]
- Design of University Teacher's Files Management SystemDong Kang, Haihua Xing, Shulei Wu, Juntao Chen, Jinmei Zhan. 298-300 [doi]
- Fault Model Libraries for Safety Analysis and their Ontology-based ReuseJuguo Wang, Yun Pu, Guoqi Li. 301-304 [doi]
- Image Completion with Automatic Structure PropagationPeipei Pan, Xin Zheng, Qingqing Xu, Ping Guo. 305-309 [doi]
- Image Denoising Based on Wave Atoms and Cycle SpinningWei-Qiang Zhang, Yi-Mei Song, Ji-qiang Feng. 310-313 [doi]
- Image Fusion Based on NSCT and Bandelet TransformQiguang Miao, Jingjing Lou, Pengfei Xu. 314-317 [doi]
- Image Haze Removal of Wiener Filtering Based on Dark Channel PriorYanjuan Shuai, Rui Liu, Wenzhang He. 318-322 [doi]
- Multilayer-Pseudopolar Fractional Fourier Transform Approach for Image RegistrationZhenhong Li, Jianwei Yang, Rushi Lan, Xiaoxia Feng. 323-327 [doi]
- Optimization for Fire Station Location Planning Based on Travel Time of Fire VehiclesYan-Fei Yu. 328-331 [doi]
- Real-Time Auto-Focus System Design Based on Climbing Algorithm and its FPGA ImplementationHaifeng Zhang, Zhaohui Zhang, Hongtao Yang, Li Wu, Linao Tang, Qing Zhu, Sen Dong, Maoyuan Qin, Yangjie Lei. 332-335 [doi]
- Research of Web Portable Technology ApplicationHaihua Xing, Shulei Wu, Dong Kang, Juntao Chen, Jinmei Zhan. 336-338 [doi]
- Research on Evaluation Method Used to Quality Performance of Missile Weapon Based on Rough Set Rule ExtractionJun Li, Tao Meng, Li-Xin Zhang, Shao-Ping Zhao. 339-344 [doi]
- Scene Recognition via Combining Information of NeighborsMinguang Song, Ping Guo. 345-349 [doi]
- Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune SystemDongmei Fu, Xiao Yu, Tingting Wang. 350-353 [doi]
- Statistical Image Upsampling Method Based on CUDAXin Zheng, Qingqing Xu, Peipei Pan, Ping Guo. 354-358 [doi]
- Study of an RFID Based Object-Relationship Recognition SystemTiancheng Zhang, Xiaonan Yu, Dejun Yue, Yu Gu 0002, Ge Yu. 359-363 [doi]
- Unsupervised Segmentation in 3D Planar Object Maps Based on Fuzzy ClusteringXin Liu, S.-Y. Cheng, X. W. Zhang, X. R. Yang, Ba Thach Nguyen, Sukhan Lee. 364-368 [doi]
- Vehicle Segmentation and Speed Detection Based on Binocular Stereo VisionXin Li, Zenggang Zhou, Xiaoyuan Li, Yan Wan. 369-373 [doi]
- A New Algorithm to Estimate Mixing-Matrix of Underdetermined Blind Signal SeparationZhi-Tao Cui, Ke Jian. 374-377 [doi]
- A Product Integration Method for Eigenvalue Problems of a Class of Non-compact OperatorsGuangqing Long, Xiaoyuan Huang, Aimei Tan. 378-381 [doi]
- A Special XQuery Program Dealing with Nested Loop StructureJianqiao Shen, Huabei Lie. 382-386 [doi]
- Analyses the Financial Data of Stocks Based Rough Set TheoryRuizhong Wang. 387-390 [doi]
- Canonical Polyadic Decomposition: From 3-way to N-WayGuoXu Zhou, Zhaoshui He, Yu Zhang, Qibin Zhao, Andrzej Cichocki. 391-395 [doi]
- Fast Multiple Scattering in Participating Media with Beamlet DecompositionYuanlong Wang, Ping Guo. 396-400 [doi]
- Fast Static Particle Swarm Optimization Based Feature Selection for Face DetectionFan Lei, Yao Lu, Wei Huang, Lujun Yu, Lin Jia. 401-405 [doi]
- Key-Phrase Extraction Based on a Combination of CRF Model with Document StructureFeng Yu, Hong-wei Xuan, Dequan Zheng. 406-410 [doi]
- New Bounds of the Nordhaus-Gaddum Type of the Laplacian Matrix of GraphsTianfei Wang, Bin Li, Jin Zou, Feng Sun, Zhihe Zhang. 411-414 [doi]
- Prediction of Gold Price Based on WT-SVR and EMD-SVR ModelYang Jian-Hui, Dou Wei. 415-419 [doi]
- Robust Image Hash Function Based on Polar Harmonic Transforms and Feature SelectionY. N. Li. 420-424 [doi]
- Ship CAE Modeling Based on Tribon XML FilePei-lin Liu, Jian-Hai Jin. 425-428 [doi]
- Study on Portfolio La-VaR Analysis Based on Copula-Kernel ModelJianhui Yang, Bin Yang. 429-434 [doi]
- Text-independent Speaker Identification Using Fisher Discrimination Dictionary Learning MethodXia Wang, Qian Yin, Ping Guo. 435-438 [doi]
- The Algebraic Method with Computerized Symbolic Computation for Travelling Wave Solutions of the Generalized KP-BBM EquationShuangyan Quan, Jing Zhang. 439-441 [doi]
- A Highly Efficient Correlation Power Analysis on PRINT CipherKan Yuan, Dawu Gu, Zheng Guo, Sigang Bao. 442-446 [doi]
- A Key-policy Attribute-based Encryption Scheme with Constant Size CiphertextChang-ji Wang, Jian-Fa Luo. 447-451 [doi]
- A Novel Biometric Authentication Scheme with Privacy PreservingDexin Yang, Baolin Xu, Bo Yang, Jianping Wang. 452-456 [doi]
- A Permanent Secure QKD Protocol Realized with Asymmetric Key AuthenticationHeyu Yin, Qiuliang Xu. 457-460 [doi]
- A Rotation Resistant Image Watermarking Algorithm via CircleYuxi Tan, Lei Tang, Zhinian Gao, Peng Sun, Xiaoyuan Yang, Yu Li. 461-463 [doi]
- A Secure Public Key Encryption from Computational Linear Diffe-Hellman ProblemFengqing Tian, Haili Xue, Xue Haiyang. 464-468 [doi]
- Cryptanalysis and Improvement of an Efficient CCA Secure PKE SchemeXu an Wang, Liqiang Wu, Jinting Nie, Wei Wang. 469-472 [doi]
- Cryptanalysis and Improvement of HIBS without Random OracleXiaoming Hu, WenAn Tan, Cunli Jiang. 473-476 [doi]
- Efficient Revocable Key-Policy Attribute Based Encryption with Full SecurityFengli Zhang, Qinyi Li, Hu Xiong. 477-481 [doi]
- Fault Analysis of the Piccolo Block CipherSheng Li, Dawu Gu, Zhouqian Ma, Zhiqiang Liu. 482-486 [doi]
- Improved Differential Fault Analysis of SOSEMANUKZhouqian Ma, Dawu Gu. 487-491 [doi]
- Improved Impossible Differential Cryptanalysis of SMS4Tao Shi, Wei Wang, Qiuliang Xu. 492-496 [doi]
- On Generic Construction for Private Designated Verifier SignaturesWei Gao, Zhenyou Wang, Fei Li. 497-499 [doi]
- One-round Tripartite Authenticated Batch-Keys Agreement Protocol from ParingWei Gao, Zhenyou Wang. 500-502 [doi]
- Research on the First Class M SubsequenceYingni Duan, Haifeng Zhang, Hong Lv, Junchu Fang. 503-506 [doi]
- Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption SchemesXu an Wang, Jinting Nie, Wei Wang. 507-510 [doi]
- A Multi-server Architecture Authentication Protocol Using Smart CardJie Yu, Qingqi Pei. 511-515 [doi]
- A Simple and Effective Scheme of Ciphertext-Policy ABEMinda Yu, Qiuliang Xu. 516-519 [doi]
- An Improved File System Synchronous AlgorithmQiang Li, Ligu Zhu, Saifeng Zeng, Wen Qian Shang. 520-524 [doi]
- Constitution of Linear Combinations of Idempotent Matrices and its PropertiesXingxiang Liu. 525-529 [doi]
- Design of Monitor and Protect Circuits against FIB Attack on Chip SecurityMengmeng Ling, Liji Wu, Xiangyu Li, Xiangmin Zhang, Jinsong Hou, Yong Wang. 530-533 [doi]
- Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor LayerYing Cao, Jiachen Liu, Qiguang Miao, Weisheng Li. 534-538 [doi]
- Probabilistic Authentication with Very Lightweight Short HashPekka Jäppinen. 539-543 [doi]
- Research on Intrusion Detection System Based on IRBFYichun Peng, Yi Niu, Qiwei Hu. 544-548 [doi]
- A Digital Watermarking Algorithm Based on Region of Interest for 3D ImageFan Sheng-Li, Yu Mei, Jiang Gang-Yi, Shao Feng, Peng Zong-Ju, Fan Sheng-Li. 549-552 [doi]
- A DWT Ordering Scheme for Hiding Data in Images Using Pixel Value DifferenceAwad Kh. Al-Asmari, Ahmed Salama, Abdullah M. Iliyasu, Mohammed A. Al-Qodah. 553-557 [doi]
- A Print-Scan Modeling Scheme Based on BP Neural NetworkNan Luo, Quan Wang, Kefeng Zhang. 558-562 [doi]
- A Simulation Platform for RFID Application Deployment Supporting Multiple ScenariosTiancheng Zhang, Yifang Yin, Dejun Yue, Qian Ma, Ge Yu. 563-567 [doi]
- Constructing the On/Off Covert Channel on XenYetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li. 568-572 [doi]
- Customers E-trust for Online Retailers: A Case in ChinaRuimei Wang, Shengxiong Wang, Tianzhen Wu, Xiling Zhang. 573-577 [doi]
- Detecting Spam in Chinese Microblogs - A Study on Sina WeiboLin Liu, Kun Jia. 578-581 [doi]
- Digital Copyright Protection Scheme Based on JUNA Lightweight Digital SignaturesHailin Hao, Shenghui Su. 582-586 [doi]
- Innovative Teaching and Learning Experiences in Network Attacks and DefenseWeimin Wei, Liping Sun. 587-590 [doi]
- Security Information Flow Control Model and Method in MILSYinping Zhou, Yulong Shen, Qingqi Pei, Xining Cui, YaHui Li. 591-595 [doi]
- Security System for Internal Network PrintingXiaodong Ding, Quan Wang, Pengfei Yang, Haijing Zhou, Yuyan Huang, Haitao Weng, Zhongbin Pan. 596-600 [doi]
- Services Selection of QoS-based Skyline Computation for Web Service CompositionLiping Chen. 601-604 [doi]
- Services Selection of Transactional Property for Web Service CompositionGuojun Zhang. 605-608 [doi]
- The Analysis of University Network Information Security System Based on Level Protection ModelWeiquan Xian, Houkui Wang, Haoyi He, Donghong Zheng. 609-614 [doi]
- The Design Principles for User-centered Remote Data Possession CheckingLanxiang Chen, Zhen Peng. 615-618 [doi]
- The development and implementation of a network-faxing service systemJianlan Guo, Yuqiang Chen, Chongjie Dong. 619-622 [doi]
- TrustVP: Construction and Evolution of Trusted Chain on Virtualization Computing PlatformDongliang Xue, Xiaolong Wu, Yunwei Gao, Ying Song, Xinhui Tian, Zhaopeng Li. 623-630 [doi]
- A Novel Blind Evaluation Method on Image Scrambling DegreeCongli Wang, Zhibin Chen, Mingxi Xue, Chao Zhang. 631-635 [doi]
- A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation SchemeYang Cai, Qiuliang Xu, Zhihua Zheng. 636-640 [doi]
- An Indexed Bottom-up Approach for Publishing Anonymized DataAnh-Tu Hoang, Minh-Triet Tran, Anh Duc Duong, Isao Echizen. 641-645 [doi]
- Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC EcosystemRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 646-652 [doi]
- Design and Implementation of a Fault Attack Platform for Smart IC CardJun Guo, Liji Wu, Xiangming Zhang, Xiangyu Li. 653-656 [doi]
- Laboratory Test and Mechanism Analysis on Electromagnetic Compromising Emanations of PS/2 KeyboardLitao Wang, Changlin Zhou, Bin Yu. 657-660 [doi]
- The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic ExecutionYan Cao, Qiang Wei, QingXian Wang. 661-665 [doi]
- Analysis on Operating Mechanism of SecurityKISSJie Cui, Qiaoyan Wen. 666-669 [doi]
- Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio NetworkLu Zhang, Qingqi Pei, Hongning Li. 670-673 [doi]
- Length Identification of Unknown Data FrameFen Li, Tong Li, Chun-Rui Zhang, Yong Wang, Jiang Song. 674-677 [doi]
- Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 StandardHuixian Li, Jinshun Hu, Liwei He, Liaojun Pang. 678-682 [doi]
- Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor NetworksYong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, Zhihong Liu. 683-686 [doi]
- Adaptive Finite Element Analysis in the Application of Electromagnetic MechanicsTao Wen, Zhengfeng Ming, MengChu Zhou. 687-689 [doi]
- Epileptic EEG Signal Classification with ANFIS Based on Harmony Search MethodJing Wang, X. Z. Gao, Jarno M. A. Tanskanen, Ping Guo. 690-694 [doi]
- Research on reliable on-chip network using asynchronous logicJianlan Guo, Yijun Liu, Yuqiang Chen. 695-698 [doi]
- The Comparison of Individual Differences in Occupational Differentiation of Peasants in China - The Perspective Based on Differences in Degree of SpecializationYi-Bo Li, Jian-Qiang Peng, Rui Wang, Bang-Hong Zhao. 699-703 [doi]