Abstract is missing.
- A New Compile-Time Obfuscation Scheme for Software ProtectionYujia Zhang, Jianmin Pang. 1-5 [doi]
- Cloud Data Security and Integrity Protection Model Based on Distributed Virtual Machine AgentsXiaolong Xu, Guangpei Liu, Jie Zhu. 6-13 [doi]
- Inferring Phylogenetic Networks of Malware Families from API SequencesJing Liu, Yuan Wang, Yongjun Wang. 14-17 [doi]
- Privacy Protection of Data Attributes in Cloud EnvironmentXiaolong Xu, Fuqiang Wan, Yanfei Sun. 18-26 [doi]
- Reviving Android Malware with DroidRide: And How Not ToMin Huang, Kai Bu, Hanlin Wang, Kaiwen Zhu. 27-34 [doi]
- A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure ClusteringXinling Kong, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai, Xin Chen. 42-45 [doi]
- Cyber Threat Detection and Application AnalysisShuangmao Yang, Ji Wang, Jing Zhang, Hao Li. 46-49 [doi]
- A Dynamic Reseeding DRBG Based on SRAM PUFsShuai Chen, Bing Li. 50-53 [doi]
- A Lattice-Based Access Control Model for Social NetworksYingjun Zhang, Kai Chen 0012, Yuling Liu, Yifeng Lian. 54-61 [doi]
- A Novel Design of Pipeline MDC-FFT Processor Based on Various Memory Access MechanismJinjiang Yang, Dongming Zhang, Yu Gong, Bo Liu. 62-65 [doi]
- Access Control Model Based on Role and Attribute and Its ImplementationHui Qi, Xiong Luo, Xiaoqiang Di, Jinqing Li, Huamin Yang, Zhengang Jiang. 66-71 [doi]
- A LEAP PLUS Key Management Scheme with Sliding Time IntervalWeifeng Lu, Siguang Chen. 72-75 [doi]
- A Dynamic Access Control Policy Based on Hierarchical DescriptionDao-Jun Han, Ling Gong, Fen Qin. 76-80 [doi]
- Network Boundary and ProtectionHaitao Yang, Jian Zhang. 81-85 [doi]
- A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service AttacksZhijun Wu, Jun Jiang, Meng Yue. 86-90 [doi]
- An Effective Hybrid Algorithm for Fast Mining Frequent ItemsetsQibing Qin, Long Tan. 91-95 [doi]
- FIM Algorithm for Multi-Source Heterogeneous Information in Power Grid Intelligent DispatchingYirong Wang, Wenwei Chen, Runze Wu, Zili Liu. 96-99 [doi]
- MS2: NAND-Flash SSD-Based Multi-Layered Storage Management SystemHyeunjee Kim, Hoonha Choi, YoungWoo Kim, Jaechun No. 100-104 [doi]
- Ontology-Based Resource Description Model for Internet of ThingsShulong Wang, Yibin Hou, Fang Gao, Songsong Ma. 105-108 [doi]
- Predicting Protest Events with Hidden Markov ModelsFengcai Qiao, Kedi Chen. 109-114 [doi]
- Mass Incidents Prediction Based on ID3-SMOTE AlgorithmTuo Shi, Xinlei Wei, Xufen Shao. 115-118 [doi]
- Distributed Air Traffic Flow Management at Terminal Control AreaXiaolei Yang, Xuejun Zhao, Xiujiu Yuan. 119-122 [doi]
- Community Division-Based SWoT Ontology Directory ServiceYing Pan, Guan-yu Li, Zhong-Jun Lu. 123-127 [doi]
- A Method of Meta-Context Ontology Modeling and Uncertainty Reasoning in SWoTZhong-Jun Lu, Guan-yu Li, Ying Pan. 128-135 [doi]
- Gateway-Based Semantic Collaboration Method in SWoTYong-An Wang, Bin Zhu, Guan-yu Li. 136-141 [doi]
- A Scalable Object Detection Framework Based on Embedded Manycore ClusterFang Gao, Zhangqin Huang, Shulong Wang, Xinrong Ji. 142-145 [doi]
- A Study of Collaborative Efforts and Proposed Visualizations in Domain-Specific Modeling EnvironmentPeng Zhang, Sandeep Neema, Ted Bapty. 146-152 [doi]
- Comparative Analysis on the Conjunctive and Disjunctive Assumptions for the Belief Rule BaseLeilei Chang, Xiaowei Ma, Liuying Wang, Xiaodong Ling. 153-156 [doi]
- Analysis of Crime Rate Distribution Based on TPML-WMAXinlei Wei, Jinyao Yan, Zheng Chen, Tuo Shi. 157-160 [doi]
- Factors Dominating Individuals' Retweeting DecisionsJuan Shi, Gang Chen, Kin Keung Lai. 161-168 [doi]
- Classification of Massive User Load Characteristics in Distribution Network Based on Agglomerative Hierarchical AlgorithmYinglong Diao, Ke-Yan Liu, Lijuan Hu, Dongli Jia, Weijie Dong. 169-172 [doi]
- Android Applications Categorization Using Bayesian ClassificationCangzhou Yuan, Shenhong Wei, Yutong Wang, Yue You, ShangGuan ZiLiang. 173-176 [doi]
- Spatial Panel Data Analysis on the Effect of Urbanization on Energy Consumption in ChinaHonglei Niu, Zhiyong Liu. 177-180 [doi]
- Prediction for Air Route Passenger Flow Based on a Grey Prediction ModelLiu Xia, Yang Jie, Chen Lei, Chen Ming-Rui. 185-190 [doi]
- Study of Personal Location-Based State Distribution InferenceTao Ma, Chunlai Ma, Juan Chen. 191-197 [doi]
- A Breast Cancer Risk Classification Model Based on the Features Selected by Novel F-Score Index for the Imbalanced Multi-Feature DatasetXiaoli Lin, Wei Huangfu, Fei Wang, Liyuan Liu, Keping Long. 198-203 [doi]
- An Improved Classification Algorithm Based on Exposure PatternKaixia Shao, Xiaofeng Zhou. 204-207 [doi]
- Deepening Prose Comprehension by Incremental Free Text Conceptual Graph Mining and KnowledgeAmal Babour, Javed I. Khan, Fatema Nafa. 208-215 [doi]
- Entity Hierarchy Construction for Repair Request RecordsJingyu Sun, Xiaomei Zhang, Quan Liu, Liang Ju, Zhengying Li. 216-219 [doi]
- Improve the Performance of Link Prediction Methods in Citation Network by Using H-IndexYifan Jia, Li Qu. 220-223 [doi]
- Discovering Bloom Taxonomic Relationships between Knowledge Units Using Semantic Graph Triangularity MiningFatema Nafa, Javed I. Khan, Salem Othman, Amal Babour. 224-233 [doi]
- A Novel Missing-Rate-Oriented Selective Algorithm for Handling Missing Data by Minimizing ImputationXing Li, Guolin Li, Rick Fishbune. 234-237 [doi]
- Multi-Source and Heterogeneous Data Integration Model for Big Data Analytics in Power DCSWengang Chen, Ruijie Wang, Run-ze Wu, Liangrui Tang, Junli Fan. 238-242 [doi]
- A Cloud Computing Platform for Data Analysis Based on R ClusterYiming Tong, Zeyu Zheng, Dianzheng Fu, Yang Fu, Shuai Li. 243-248 [doi]
- Research on Multi-Objective Bus Route Planning Model Based on Taxi GPS DataShuo Lei, Zexi Li, Binglin Wu, Haiquan Wang. 249-255 [doi]
- Research Service Discovery Mechanism Based on Route Optimization of Big Data ServiceCheng Xu, Zhang Yu-Shi. 256-261 [doi]
- A Logistic Regression Based Approach for Software Test ManagementYue Zhou, Jinyao Yan. 268-271 [doi]
- Research on Hybrid Multi-Attribute Decision-MakingGuidong Sun, Xin Guan. 272-277 [doi]
- Multi-Source Heterogeneous Data Recognition Based on Linguistic LabelsChen Guo, Yong Chai, Cong Wang. 278-285 [doi]
- Semi-Blind Channel Estimation and Symbol Detection Using Combined Superimposed TrainingXianwen He, Gaoming Huang, Gaoqi Dou, Jun Gao. 286-289 [doi]
- An Electronic Seal System Based on Cloud ComputingWei Yang, Jinzhong Li. 290-293 [doi]
- Information Splitting for Big Data AnalyticsShengxin Zhu, Tongxiang Gu, Xiaowen Xu, Zeyao Mo. 294-302 [doi]
- A Cluster-Based Resource Allocation Strategy with Energy Harvesting in Dense Small-Cell NetworksLiang Xu, Yuming Mao, Supeng Leng, Guanhua Qiao, Quanxin Zhao. 303-310 [doi]
- An Improved Ant Colony Optimization Algorithm for Improving Cloud Resource UtilizationQingbin Nie, Pinghua Li. 311-314 [doi]
- An Implementation and Optimization of Lattice Boltzmann Method Based on the Multi-Node CPU+MIC Heterogeneous ArchitecturePeng Tang, Anping Song, Zhixiang Liu, Wu Zhang. 315-320 [doi]
- Cache-Aware Spatial Indices on Chip Multi-Processors: Limitations and OpportunitiesMinhui Lv, Wei Xiong. 321-327 [doi]
- Minimizing Energy Consumption for Embedded Multicore Systems Using Cache Configuration and Task MappingZhihua Gan, Mingquan Zhang, Zhimin Gu, Jizan Zhang. 328-334 [doi]
- Implementing VoIP Voice Communication System Based on Soft-Switch TechnologyChnhui Yuan, Hongli Zhao. 335-340 [doi]
- Operational Reliability Evaluation Method Based on Big Data TechnologyLijuan Hu, Ke-Yan Liu, Yinglong Diao, Xiaoli Meng, Wanxing Sheng. 341-344 [doi]
- A Complex Shortwave Transmitting Equipment Monitoring System Based on CompletenessLuo Yong, Gao Jun. 345-349 [doi]
- Real-Time Vehicle Wireless Remote Positioning and Monitoring System Based on GPRS Network and BeidouXianlian Zhang, Minhui Wang. 350-354 [doi]
- An Intelligent Parking Management System Based on RS485 and RFIDHuayu Zhou, Zhihua Li. 355-359 [doi]
- A CUBIC-Based Explicit Congestion Control Mechanism in Named Data NetworkingYongbin Liu, Xuewei Piao, Chaojun Hou, Kai Lei. 360-363 [doi]
- Modeling POI Transition Network of Human MobilityChao Fan, Junxuan Huang, Dan Yang, Zhihai Rong. 364-367 [doi]
- A Quasi-Dynamic Video Conference Resource Backup Strategy Based on CloudXinzhi Xu, Guochun Li, Qiaomu Wang, Zhou Yuan, Mingbao Fan. 368-371 [doi]
- Research and Implementation of Resource Scheduling Mechanisms Based on Software Defined SecurityZelang Wang, Guochu Shou, Yihong Hu, Zhigang Guo. 372-376 [doi]
- Research and Implementation of Hierarchical Control of Large Scale Video Conference Based on Conference Management SystemZhou Yuan, Guochun Li, Qiaomu Wang, Xinzhi Xu, Tao Wen. 377-381 [doi]
- A Relaxation Scheme for TSP-Based 3D Printing Path OptimizerKai-Yin Fok, Chi-Tsun Cheng, Chi K. Tse, Nuwan Ganganath. 382-385 [doi]
- Rapidly Replanning ANuwan Ganganath, Chi-Tsun Cheng, Chi K. Tse. 386-389 [doi]
- Node Localization Algorithm of Wireless Sensor Networks for Large Electrical Equipment Monitoring ApplicationQinyin Chen, Yanting Hu, Zhe Chen. 390-397 [doi]
- Effects of Correlation-Based VM Allocation Criteria to Cloud Data CentersJing V. Wang, Chi-Tsun Cheng, Chi K. Tse. 398-401 [doi]
- Congestion Control Balancing Mechanism Based on Energy-Constraint in Mobile Delay Tolerant NetworkYue Zhang, Xiangyu Bai, Na Dang, Junli She, Zhichao Song. 402-408 [doi]
- Methodology of Countering Attacks for Wireless Sensor Networks Based on TrustAlexander S. Basan, Elena Basan, Oleg B. Makarevich. 409-412 [doi]
- Portable RFID Location System in Security FieldAiguo Li, Yongwei Li. 413-417 [doi]
- LEACH Protocol and Its Improved Algorithm in Wireless Sensor NetworkXingguo Li, Junfeng Wang, Linlin Bei. 418-422 [doi]
- A New Quasi Periodic Triggering Mechanism of Handover under a High Speed Mobile EnvironmentGuihua Kang, Hongbo Kang. 423-428 [doi]
- Blind Recognition of RS Codes Based on Galois Field Fourier TransformXiaokai Zhang, Gang Wu, Bangning Zhang, Daoxing Guo, Kefeng Guo. 429-433 [doi]
- Performance of Two Normalized Laplacian Spectral Features on Sampling AlgorithmsBo Jiao, Xuejun Yuan, Fei Huang, Xun-Long Pang, Yican Jin, Zhe Han. 434-437 [doi]
- Secure Transmission of Amplify-and-Forward Relay System with Hybrid Sending SignalsBin Yang, Xinyu Li. 438-445 [doi]
- Analysis of the Propagation Characteristics of Generalized Ridge Waveguides Using 2-D Finite Difference Frequency Domain Method with Sub-Regions DivisionJian-Min Liu, Yu Xiang, Jian-Bin Liu. 446-449 [doi]
- Ship Scheduling in Inland Waterway Networks Based on Cellular Automata GraphXiongfei Geng. 450-453 [doi]
- An Improvement Method of Frequency Offset Estimation Performance in Communication System Carrier SynchronizationYongbin Wang, Lihua Li, Renshen Li, Tianhui Fu, X. Fu, X. Tianhui. 454-458 [doi]
- Study on Evaluation of Voltage Sag Exposed Areas in Large Scale Complex Distribution NetworkDongli Jia. 459-464 [doi]
- Joint Behavior Detection in Wireless Sensing NetworksMin Yin, Lei Jiang, Ye Shen, Jing Feng. 465-470 [doi]
- A QoS Opportunistic Routing Based on Directional Transmission for Wireless Sensor NetworksRen Duan, Dingyi Fang, Chengui Zhao. 471-480 [doi]
- Optimal Controller Placement Problem in Internet-Oriented Software Defined NetworkBang Zhang, Xingwei Wang, Lianbo Ma, Min Huang. 481-488 [doi]
- Application of Virtualization and Software Defined Network in Satellite NetworkChunfeng Wang, Xiaosong Yu. 489-493 [doi]
- A Multi-Domain SDN Scalability Architecture Implementation Based on the Coordinate ControllerJianglong Wang, Guochu Shou, Yihong Hu, Zhigang Guo. 494-499 [doi]
- Application of Software-Defined Network with Software-Based Architecture in Enterprise Data CenterKean Yu, Cong Yu, Tingting Wang, Jiang Fan, Yan Li. 500-505 [doi]
- A SDN-Based Dynamic Traffic Scheduling AlgorithmHui Ren, Xiaoming Li, Junjie Geng, Jinyao Yan. 514-518 [doi]