Abstract is missing.
- The PTAS of Prediction for RNA Pseudoknotted StructureZhendong Liu, Shimin Zhao, Hongchao Ye, Jiwei Wang, Dehui Kong, Hui Wang. 1-4 [doi]
- Hadoop-Based Dynamic Load Balance Scheduling Algorithm of Logistics InventoryWenjing Li, Jie Zhou, Zhongming Lin, Xiang-bo Zhang. 5-8 [doi]
- Divisible-Load Scheduling for Network-Based Computing Systems with Processor Startup Overheads and Release TimesXiaoli Wang, Yuping Wang, Junfan Lai. 9-13 [doi]
- Bayesian Quantile Regression and Variable Selection for Count Data with an Application to Youth Fitness SurveyJing Lv, Yingzi Fu. 14-18 [doi]
- Exact Solutions of the Higher Order Nonlinear Schrödinger EquationTianqi Luo, Xin Huang. 19-22 [doi]
- H-DAT: An Improved Buffer Scheduling Algorithm for Multi-Channel SSDMingWei Yang, YaHui Li, Yadi Zhang, WanRen Wang. 23-27 [doi]
- An Improved Differential Evolution with a Novel Restart MechanismMengnan Tian, Xingbao Gao, Xueqing Yan. 28-32 [doi]
- A New Evolutionary Algorithm Based on Decomposition for Multi-Objective Optimization ProblemsCai Dai, Xiujuan Lei. 33-38 [doi]
- Properly Pareto Optimality Based Multiobjective Evolutionary Algorithm for Constrained OptimizationNing Dong. 39-43 [doi]
- A Novel Spectrum Profile Fitting Method of Non-Gaussian ModelHai Jing Zhu, Bo Qiu, Bo Chong Han, Yuanyuan Liu, Xiaodong Fan. 44-47 [doi]
- Mixed Duality of Multi-Objective Programming Involving a Kind of Generalized ConvexityXiangyou Li. 48-51 [doi]
- An Ameliorated Teaching-Learning Based Optimization Algorithm for Nonlinear Bilevel ProgrammingLiping Jia, Zhonghua Li. 52-56 [doi]
- A Device-Free Number Gesture Recognition Approach Based on Deep LearningQizhen Zhou, Jianchun Xing, Juelong Li, Qiliang Yang. 57-63 [doi]
- The Assessment Study of Airport Staff Work Performance Based on Fuzzy Comprehensive EvaluationRong Huang, Xinhong Hei, Xiao Fan Wang, Jing Zhao. 64-68 [doi]
- A Framework for Compressive-Sensing of 3D Point CloudsVahid Behravan, Gurjeet Singh, Patrick Yin Chiang. 69-72 [doi]
- Research on Distributed Logistics Inventory Model Based on Cloud ComputingWenjing Li, Zhongming Lin, Xiang-bo Zhang, Jie Zhou. 73-77 [doi]
- A Solution Approach to Bilevel Linear Programming with Fuzzy CoefficientsAihong Ren, Xingsi Xue. 78-81 [doi]
- Dynamic Ternary Logic Gate Using Neuron-MOS Literal Circuit and Double Pass-Transistor LogicGuoqiang Hang, Yang Yang 0013, Danyan Zhang, Xiaohui Hu. 82-86 [doi]
- A Novel Approach to Automatic Rating of Subjective Answers Based on Semantic Matching of KeywordsShun Long, Qunhao Feng, Wenwei Chen. 87-90 [doi]
- A Novel OCR Approach Based on Document Layout Analysis and Text Block ClassificationWeiheng Zhu, Yuanfeng Liu, Liang Hao. 91-94 [doi]
- Analysis of Projection Accuracy of Synthetic Image in Combined Vision SystemLei Zhang, Zhengjun Zhai, Yue Cheng, Wensheng Niu. 95-99 [doi]
- A Novel System Architecture for Ontology MatchingXingsi Xue, Jinshui Wang, Aihong Ren. 100-102 [doi]
- Curvelet Shrinkage Based Iterative Regularization Method for Image DenoisingMin Li, Xiaoli Sun. 103-106 [doi]
- Local and Non-Local Feature-Based Kernel Nonnegative Matrix Factorization Method for Face RecognitionWensheng Chen, Qian Wang, Binbin Pan, Yugao Li. 107-110 [doi]
- A Prototype Selection Algorithm Based on Extended Near Neighbor and Affinity ChangeJuan Li, Xiaofang Guo. 111-115 [doi]
- Semi-Supervised Recursive Autoencoders for Social Review Spam DetectionBaohua Wang, Junlian Huang, Haihong Zheng, Hui Wu. 116-119 [doi]
- Pulsar Candidate Selection by Assembling Positive Sample Emphasized ClassifiersYao Yao, Xin Xin, Ping Guo. 120-124 [doi]
- Comparison of Two Cosmic Rays Positioning AlgorithmsBo Chong Han, Bo Qiu, Haijing Zhu, Yuanyuan Liu, Xiaodong Fan. 125-128 [doi]
- Data Dynamic Mining and Its Attribute Logic RelationHaiyan Fu, Dong Xu. 129-133 [doi]
- Multi-Level Clustering Algorithm for Star/Galaxy SeparationHui Du, Yuping Wang, Chuchu Ren, Junkun Zhong, Xiaozhi Gao. 134-137 [doi]
- A Multi-Subgroup Hierarchical Hybrid of Central Force Optimization and Gravity Search AlgorithmFei Qin, Jie Liu, Jing Li, Bin Zhou. 138-141 [doi]
- An Adaptively Disperse Centroids K-Means Algorithm Based on MapReduce ModelBin Wang, Zheng Lv, Jinwei Zhao, Xiaofan Wang, Tong Zhang. 142-146 [doi]
- Image Denoising Algorithm Based on Structure and Texture PartYifeng Cheng, Zengli Liu. 147-151 [doi]
- A New Image Inpainting Algorithm Based on DCT Similar Patches FeaturesJingsi Ou, Wensheng Chen, Binbin Pan, Yugao Li. 152-155 [doi]
- Face Recognition Based on Discriminative Low-Rank Matrix Recovery with Sparse ConstraintXue Zhou, Zhengqun Wang, Zhibo Guo, Dongling Zhai. 156-160 [doi]
- Semantic Word Rank Algorithm Based on the Relation Degree of the WordsHuijian Han, Kai Fu, Xiusheng Sun, Zhenxian Li. 161-164 [doi]
- Sentiment Classification with Convolutional Neural Networks: An Experimental Study on a Large-Scale Chinese Conversation CorpusLei Zhang, Chengcai Chen. 165-169 [doi]
- A Two Phase Approach Based on Dynamic Variable Grouping and Self-Adaptive Group Search for Large Scale OptimizationHaiyan Liu, Yuping Wang, Liwen Liu, Xiaodong Li, Xiaozhi Gao. 170-174 [doi]
- A New Dominance Relation Based on Simplex for Many Objective Optimization ProblemsJiawei Yuan, Hailin Liu. 175-178 [doi]
- An Improved Differential Evolution Algorithm for Unconstrained Optimization ProblemsJie Liu, Xiaofang Guo. 179-181 [doi]
- A New Cooperative Coevolution with a New Auxiliary Function for Large Scale Global OptimizationFei Wei, Shugang Li, Jing Li. 182-185 [doi]
- Double Heuristic Optimization Based on Hierarchical Partitioning for Coverage Path Planning of Robot MowersJingyu Wang, Junfeng Chen, Shi Cheng, Yingjuan Xie. 186-189 [doi]
- Brain Storm Optimization with Discrete Particle Swarm Optimization for TSPZhoudong Hua, Junfeng Chen, Yingjuan Xie. 190-193 [doi]
- A Renewable Energy Cooperation Scheme for OFDM Systems Using Evolutionary Many-Objective Optimization AlgorithmQiang Wang, Hailin Liu, Yiu-ming Cheung. 194-197 [doi]
- Hybridizing Differential Evolution and Nelder-Mead Simplex Algorithm for Global OptimizationHongwei Lin. 198-202 [doi]
- A Novel Method of Correlation Power Analysis on SM4 Hardware ImplementationSulong Tang, Liji Wu, Xiangmin Zhang, Xingjun Wu, Beibei Wang. 203-207 [doi]
- Perturbation Correction Calculation Method for Remote Rendezvous between Non-Coplanar Elliptic OrbitsYan Chang, Yong-xian, Jie Li, Daqiao Zhang, Jing Gao. 208-212 [doi]
- Toward Automatic Review of Building Energy Efficiency Based on Building Information ModelingQin Zhao, Zeyu Chen, Yiyun Zhu, Zhe Li, Xinhong Hei. 213-217 [doi]
- Salient Object Detection via Video Spatio-Temporal Difference and CoherenceLei Huang, Bin Luo. 218-222 [doi]
- Multi-User and Keyword-Based Searchable Encryption SchemeYaling Zhang, Lijun Liu, Shangping Wang. 223-227 [doi]
- An Efficient Ring Signature Scheme Based on Syndrome Decoding ProblemSiyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Qin Wang. 228-232 [doi]
- Profiling Attack on Modular Multiplication of Elliptic Curve CryptographyKun Jiang, Bing Zhao, Weijun Shan, Lihui Wang, Jing Liu. 233-236 [doi]
- A Dynamic Trust Management Mechanism in Distributed CRNsZhenyue Long, Linbin Zhan, Guiteng Chen. 237-242 [doi]
- Analysis of Information Security of Electric Power Big Data and Its CountermeasuresJunfeng Zhao, Yongmei Wang, Yuanyi Xia. 243-248 [doi]
- A Security Evaluation and Certification Management Database Based on ISO/IEC StandardsHuilin Chen, Da Bao, Hongbiao Gao, Jingde Cheng. 249-253 [doi]
- A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution EnvironmentRui Chang, Liehui Jiang, Qing Yin, Wei Liu, Shengqiao Zhang. 254-258 [doi]
- Research on the Reasoning Mechanism of Copyright Protection of Digital Content Based on the Petri NetYingjiu Guo, Xuemei Liu. 259-262 [doi]
- Discussion on the Intension and Value of Design Techniques of Chinese Character in Word StockJiujun Cheng. 263-266 [doi]
- A Security Threats Taxonomy for Routing System Intrusion DetectionFu Miao, Zhenxing Wang, Yi Guo, Liancheng Zhang. 267-270 [doi]
- Secure Identity-Based Authentication Scheme Suitable for Limited-Resource DevicesToan-Thinh Truong, Vi-Minh Luong, Minh-Triet Tran, Anh Duc Duong. 271-276 [doi]
- Scalable Group Audio-Based Authentication Scheme for IoT DevicesZhonglei Gu, Yang Liu. 277-281 [doi]
- Design and Application of IBE Email Encryption Based on Pseudo RSA CertificateJinglin Wu, Yihong Long, Qiang Huang, Wei Wang. 282-286 [doi]
- The Distributed Dissimilar Redundancy Architecture of Fly-by-Wire Flight Control SystemYing Xue, Zhenqiang Yao, Wei Niu. 287-293 [doi]
- Security-Aware Routing and Core Allocation in Elastic Optical Network with Multi-coreHejun Xuan, Yuping Wang, Shanshan Hao, Zhanqi Xu, Xiaodong Li, Xiaozhi Gao. 294-298 [doi]
- Multiple Object Tracking Based on Robust Network Flow ModelShuangyan Yi, Hongpeng Wang, Zhenyu He, Yi Li, Wensheng Chen. 299-303 [doi]
- A Novel Storage and Search Scheme in Cloud ComputingJing Fang, Jingsha He, Muhammad Salman Pathan, Mengchen Gao. 304-308 [doi]
- Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules LearningRan Ji, Haifeng Li, Chaojing Tang. 309-313 [doi]
- A Port Hopping Based DoS Mitigation Scheme in SDN NetworkLiancheng Zhang, Yi Guo, Huiqiang Yuwen, Yu Wang. 314-317 [doi]
- Testing Network Protocol Binary Software with Selective Symbolic ExecutionShameng Wen, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, Chaojing Tang. 318-322 [doi]
- A Scheme of MIDI Music Emotion Classification Based on Fuzzy Theme Extraction and Neural NetworkPeilin Chen, Lei Zhao, Zongyu Xin, Yumeng Qiang, Ming Zhang, Tiemeng Li. 323-326 [doi]
- Predicting User Retweet Behaviors Based on Energy OptimizationHai Zhu, Guoheng Ren, Dongxia Qin, Wei Wang, Fei Wei, Ying Cao. 327-330 [doi]
- An Outlier Detection Method Based on PageRank AlgorithmZhan Huang, Shun Long, Yuying Jiang, Qian Chen. 331-335 [doi]
- The Threat Assessments of the Cracks to the Soil Sites via Image AnalysisPengfei Xu, Nana Ding, Feng Chen. 336-339 [doi]
- Research on Performance of Motion Platform of 3-RPS Flight SimulatorHongwei Han, Shuwen Dang. 340-344 [doi]
- Research on Surface Movement Parameters of Shallow Buried Coal Seam with Central Force OptimizationJinhua Li, Shuancheng Gu, Huaqiang Fang, Xing Hong. 345-348 [doi]
- Data-Based Axle Temperature Prediction of High Speed Train by Multiple Regression AnalysisGuo Xie, Zhuxin Wang, Xinhong Hei 0001, Sei Takahashi, Hideo Nakamura. 349-353 [doi]
- An Optimized Algorithm in Risk CalculatingYubin Wang, Wei Wu, Gaofeng Zhan. 354-357 [doi]
- Ensemble Model for Stock Price Movement Trend Prediction on Different Investing PeriodsJian Yang, Ruonan Rao, Pei Hong, Peng Ding. 358-361 [doi]
- A Comprehensive Research on Evaluation of Port Competitiveness FactorsXing Wang, Mingyun Chen. 362-365 [doi]
- Research on the Urbanization Strategy of Rural PopulationCongmou Yuan, Wenxue Niu, Dansong Zhang. 366-369 [doi]
- Study on Logistics Outsourcing Strategy of E-Commerce Based on Revenue Sharing ContractFangfang Guo, Yaoguang Zhong, Quanju Zhang. 370-373 [doi]
- One Algorithm of Gesture Animation SynthesisHuijian Han, Rongjun Song, Yanqiang Fu. 374-377 [doi]
- Research on Cloud Computing Resource Management Model Based on Multi-Agent SystemQiang Chen. 378-381 [doi]
- Research on the Multi-Tenant Placement Genetic Algorithm Based on Eucalyptus PlatformFeng Wang, Junhuai Li, Jing Zhang, Qiang Huang. 382-385 [doi]
- A Prediction Method Based on Stepwise Regression Analysis for Train Axle TemperatureWeigang Ma, Siyu Tan, Xinhong Hei 0001, Jinwei Zhao, Guo Xie. 386-390 [doi]
- Study on the Relation between Virus and Host Cell by Alignment-Free Sequence ComparisonXuemei Liu, Xiang Zhang, Tianlai Huang, Zhe Yang, Wen Li, Yuzhong Ye, Shan Hu, Jing Li. 391-394 [doi]
- Evaluation of Regional Logistics Industry Development Level Based on Grey EntropyChaoling Li, Lin Lu. 395-398 [doi]
- A Hybrid LWNN-Based Stochastic Noise Eliminating Method for Fiber Optic GyroShuwen Dang, Kangle Wang, Hongwei Han, Pengzhan Cheng. 399-402 [doi]
- License Plate Segmentation and Recognition of Chinese Vehicle Based on BPNNNaiguo Wang, Xiangwei Zhu, Jian Zhang. 403-406 [doi]
- Research Status of Artificial Neural Network and Its Application Assumption in AviationTaoran Cheng, Pengcheng Wen, Yang Li. 407-410 [doi]
- A Job Shop Scheduling Algorithm Using Big Bang-Big Crunch StrategyYan Kang, Hao Li, Chunhui Wang, Li Dai. 411-414 [doi]
- Energy-Aware Scheduling of Workflow in Cloud Center with Deadline ConstraintHao Li, Hai Zhu, Guoheng Ren, Hongfeng Wang, Hong Zhang, Liyong Chen. 415-418 [doi]
- Prosodic Head Motion Generation from Text for a Chinese Talking AvatarYang Sun, Yiwen Wang. 419-422 [doi]
- Parallel Acceleration of IBM Alignment Model based on Lock-Free Hash TableSi-Yuan Jing, Gaorong Yan, Xingyuan Chen, Peng Jin, Zhaoyi Guo. 423-427 [doi]
- Comparisons of Central Force Optimization and Gravitational Search AlgorithmJunbing Li. 428-430 [doi]
- Ontology Learning Algorithm via WMW Optimization ModelShu Gong, Wei Gao. 431-434 [doi]
- An Architecture Modeling and Simulation Methods of Integrated Electromechanical Management SystemPeng Guo, Yunming Sun, Wei Niu, Chong Qin. 435-439 [doi]
- The Research of Multi-Source Information Fusion Based on Cloud ComputingRongrong Li, Kangshun Li. 440-443 [doi]
- Methods to Capability Improvement for Multiple UAVs' ControlPengcheng Wen, YaHui Li, Yadi Zhang. 444-447 [doi]
- Stability Analysis for a Class of Uncertain Time Varying Delay SystemsShiyu Zhang, Ruliang Wang. 448-451 [doi]
- The Research of Dynamic Shortest Path Based on Cloud ComputingDongbo Zhang, Lu Xiong. 452-455 [doi]
- Parameter Establishment of Differential Evolution Algorithm Based on Uniform Design and the Effect of Different Number of LevelsTianjun Zhang, Yun Bai, Gaochang Zhao, Jie Liu. 456-460 [doi]
- Autonomous Evolution in Evolutionary Personal Information Partners: Mechanism and a Case StudyYifeng Han, Hongbiao Gao, Jingde Cheng. 461-465 [doi]
- The Detecting Method of Building Deformation Based on Terrestrial Laser Point CloudXu Zhao, Xuefei Li, Hua Liang, Fei Deng, Long Zhou, Weizhen Chen. 466-469 [doi]
- An Adaptive Algorithm for Grey Image Edge Detection Based on Grey Correlation AnalysisBaoming Qiao, Liu Jin, Yufan Yang. 470-474 [doi]
- Sensors Validation Based on TAN ClassifiersPeng Sun, Ziyan Wu, Haifeng Yang, Xin Guo. 475-478 [doi]
- Improved BOF Method for Person Re-IdentificationLixia Zhang 0005, Kangshun Li. 479-482 [doi]
- One Method of Cloth Simulation Based on Adaptive MeshesHuijian Han, Luyu Wang, Kai Liu. 483-486 [doi]
- The Methods for Two-Dimensional Fiber Spectra ExtractionJianjun Xie, Junhong Li, Hong Wang, Wenyi Zeng, Ping Guo. 487-490 [doi]
- Spectra Stacking for LAMOST Low SNR SpectraYuanyuan Liu, Bo Qiu, Xiaodong Fan, Hai Jing Zhu, Bo Chong Han. 491-493 [doi]
- Clustering the Families Successfully Applying for Minimum Living Standard Security System Based on K-Means AlgorithmHuali Deng, Liangjun Zhang, Weikang Su. 494-498 [doi]
- Clustering by Creating a GraphYiwen Wang, Haolan Zhang, Ke Huang, Changbin Yu, Honglei Cui. 499-502 [doi]
- Automated Data Mining Platform for Large Volume Data ProcessingJianping Chen, Xingsen Li. 503-506 [doi]
- A Shape Representation Based on Polar Vector Fourier DescriptorsJianwei Yang, Zhengda Lu. 507-510 [doi]
- A Modified Adaptive Particle Swarm Optimization AlgorithmRui Sun. 511-513 [doi]
- A New Improved Gravitational Search Algorithm Based on ChaosWang Ding. 514-517 [doi]
- Shape Formation in Games: A Probability-Based Evolutionary ApproachCaitao Zhan, Changhe Li. 518-521 [doi]
- A Novel Adaptive Beamforming Algorithm for Smart Antenna SystemYuanjian Zhou, Xiaohui Yang. 522-525 [doi]
- A Hybrid Evolutionary Algorithm for Solving Function Optimization ProblemsFahui Gu, Kangshun Li, Yue Liu. 526-529 [doi]
- Symbiosis Co-Evolutionary Population Topology Differential EvolutionYu Sun. 530-533 [doi]
- Fruit Fly Algorithm Based on Extremal OptimizationShuiping Zhang, Yang Chen, Yangdan Geng. 534-537 [doi]
- Cuckoo Search Algorithm Based on Hybrid-MutationMeng Zhang, Dengxu He, Chonglong Zhu. 538-542 [doi]
- A Hybrid Evolutionary Algorithm Based on Dominated Clustering for Constrained Bi-Objective Optimization ProblemsLei Fan, Yanfang Liang, Xiyang Liu, Xin Gu. 543-546 [doi]
- A Dynamic Access Control Model for Spatial DataFengli Zhang, Junxin Chen, Hongchuan Zhou, Zhengwei Geng. 547-550 [doi]
- A Note on the Impossible Differential Attacks on Block Cipher SM4Jiazhe Chen. 551-554 [doi]
- A New Iterative Method for Solving Absolute Value EquationsJing Li, Fei Qin, Jie Liu, Bin Zhou. 555-556 [doi]
- Crafting Intents to Detect ICC Vulnerabilities of Android AppsTianjun Wu, Yuexiang Yang. 557-560 [doi]
- The Intelligent Control Model and Application for Commercial Bank Systems Emergence under Risk Status Based on Big DataSulin Pang, Yizhou He, Li Wang. 561-565 [doi]
- A Formal Analysis Method with Reasoning for Cryptographic ProtocolsJingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng. 566-570 [doi]
- The Research of S-Box Based on Reconstruction Design MethodZhouquan Du, Jie Zhang, Qiong Zhang, Zhibo Liu, Bo Zhu. 571-577 [doi]
- An Improved Power Attack on Small RSA Public ExponentBing Zhao, Lihui Wang, Kun Jiang, Xiaobing Liang, Weijun Shan, Jing Liu. 578-581 [doi]
- On the Information Security Issue in the Information Construction Process of Colleges and UniversitiesJing Nie, Xueling Dai. 582-585 [doi]
- Protection of Personal Information Security in the Age of Big DataHui Zou. 586-589 [doi]
- Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart CardHsieh-Tsen Pan, Cchiu-Shu Pan, Shyh-Chang Tsaur, Min-Shiang Hwang. 590-593 [doi]
- Research on Side Channel Attack for USB KeyQingshuang Han, Liji Wu, Xiangmin Zhang. 594-597 [doi]
- Mmda: Metadata Based Malware Detection on AndroidKun Wang, Tao Song, Alei Liang. 598-602 [doi]
- Development of a General-Purpose Offline E-Testing EnvironmentHongbiao Gao, Zhe Wang, Yuan Zhou, Jingde Cheng. 603-607 [doi]
- Security Operation and Maintenance of Information Infrastructure Based on Minicomputer Typical TroubleshootingZhengyang Ding, Binbin Zhang, Gaopan Huang. 608-611 [doi]
- Research on Environmental Impact Assessment of E-Waste Reverse LogisticsYuxiang Yang, Dan Wu. 612-615 [doi]
- Research on Decomposition and Correlation Design of Micro-Video Course ContentMi Wang, Dong Kang. 616-619 [doi]
- Research on the Object Recognition of Minimum Living Standard Security System Based on Neural NetworkHuali Deng, Liangjun Zhang, Zhenwei He. 620-623 [doi]
- Detection and Control against Replay Attacks in Smart GridJunfeng Zhao, Jing Wang, Lei Yin. 624-627 [doi]
- The Research and Discussion on Effectiveness Evaluation of Software ProtectionHuaijun Wang, Dingyi Fang, Junhuai Li, Yong Chang, Lei Yu. 628-632 [doi]
- Reversible Data Hiding in Medical Image for Contrast Enhancement of ROIYinghui Xia, Haotian Wu. 633-637 [doi]
- A New Parallel Instruction Model Based on Multi-Tasking Bluetooth CommunicationHaiyan Jin, Shaopeng Zhao. 638-641 [doi]
- A Transparent File Encryption Scheme Based on FUSEXiang He, Yihong Long, Liheng Zheng. 642-645 [doi]
- Research on Liver Disease Diagnosis Based on RS_LMBP Neural NetworkDong Xu, Haiyan Fu, Wenjuan Jiang. 646-649 [doi]
- Research on Identifying Emotion Sentence Based on Emotional Feature DensityBin Gui, Fubin Chen. 650-653 [doi]
- Hierarchical MAC Protocol Greedy Behavior Detection in Wireless Sensor NetworksShuai Jiang, Jian Wang. 654-659 [doi]
- A Divide and Conquer Method for Automatic Image AnnotationYanjun Li, Ping Guo, Xin Xin. 660-664 [doi]
- On the Recoverability of Data in Android YAFFS2Yameng Li, Jingsha He, Na Huang, Chengyue Chang. 665-668 [doi]
- Heterogeneous Computing Platform Based on CPU+FPGA and Working ModesYang Li, Xiaodong Zhao, Taoran Cheng. 669-672 [doi]
- A Study on Sports Tourism Competitiveness Based on Factor Analysis MethodXinhua Li, Juntao Chen, Jinmei Zhan, Lin Liu. 673-676 [doi]
- Research on Knowledge Demand Information Acquisition for Product DesignLeen Zhang, Weiwei Qian, Zhenhua Zhang, Youyuan Wang. 677-680 [doi]
- Fast Password Authentication Protocol in Auto-Guard of Car Based on CellphoneJiandong Meng. 681-684 [doi]
- Preliminary Research of Secure Integrated Computing in Future AvionicsLe Wang, Taoran Cheng, Yang Li. 685-688 [doi]
- Particle Sorting Algorithm Based on Stretching TensorHuijian Han, Jingchao Wang, Kai Liu, Lingli Zhou. 689-692 [doi]
- The Research of Intelligent Agent System Architecture Based on Cloud ComputingLinrun Qiu, Kangshun Li. 693-696 [doi]
- The Effect of Shared L2 Cache on Determinism in Airborne Embedded SystemLu Bai, Jiansheng Wang, Baolei Huang. 697-700 [doi]