Abstract is missing.
- CareDedup: Cache-Aware Deduplication for Reading Performance Optimization in Primary StorageBin Lin, Shanshan Li, Xiangke Liao, Xiaodong Liu, Jing Zhang, Zhouyang Jia. 1-10 [doi]
- A Measurement Study on Mainline DHT and Magnet LinkXinxing Zhang, Zhihong Tian, Luchen Zhang. 11-19 [doi]
- The Prediction of User Topic Interest Based on Tags and Interaction of UsersLu Deng, Jiuming Huang, Yi Han, Bin Zhou, Qiang Liu. 20-26 [doi]
- Social Recommendation with Tag Side InformationXiang Hu, Wendong Wang, Xiangyang Gong, Bai Wang, Xirong Que, Hongke Xia. 27-32 [doi]
- Chinese Article Classification Oriented to Social Network Based on Convolutional Neural NetworksXiang Zhu, Jiuming Huang, Zhongcheng Zhou, Yi Han. 33-36 [doi]
- Predicate-Oriented Query of RDF Data Based on a Distributed Storage ModelXuling Luo, Bin Wu. 37-43 [doi]
- LinkSHRINK: Overlapping Community Detection with Link-GraphDingyi Yin, Bin Wu, Yunlei Zhang. 44-53 [doi]
- Finding Experts in Community Question Answering Based on Topic-Sensitive Link AnalysisJuan Yang, Shuang Peng, Lin Wang, Bin Wu. 54-60 [doi]
- Link Prediction-Based Multi-label Classification on Networked DataYinfeng Zhao, Lei Li, Xindong Wu. 61-68 [doi]
- An Experimental Study on Block DCT Coefficient Analysis for Image Splicing DetectionXiang Lin, Shi-Lin Wang, Wei-Jun Huang, Jun-Yao Lai. 69-73 [doi]
- BPPGD: Budgeted Parallel Primal Gradient Descent Kernel SVM on SparkJinchen Sai, Bai Wang, Bin Wu. 74-79 [doi]
- Parallelization of Latent Group Model for Group Recommendation AlgorithmXuelin Zeng, Bin Wu, Jing Shi, Chang Liu, Qian Guo. 80-89 [doi]
- LSTM-based Deep Learning Models for Answer RankingZhenzhen Li, Jiuming Huang, Zhongcheng Zhou, Haoyu Zhang, Shoufeng Chang, Zhijie Huang. 90-97 [doi]
- A Hybrid Document Feature Extraction Method Using Latent Dirichlet Allocation and Word2VecZhibo Wang, Long Ma, Yanqing Zhang. 98-103 [doi]
- A Dual Threshold Secret Sharing Scheme among Weighted Participants of Special RightGuozhen Shi, Yunfei Ci, Rongna Xie, Haojie Wang, Jiqiang Zeng. 104-108 [doi]
- Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone TracebackXiaoqiang Xu, Jing Zhang, Qianmu Li. 109-117 [doi]
- A Topic Model for Hierarchical DocumentsYang Yang, Feifei Wang, Fei Jiang, Shuyuan Jin, Jin Xu. 118-126 [doi]
- Integrating Relationships and Attributes: A Model of Multilayer NetworksWen Zhou, Weidong Bao, Xiaomin Zhu, Ji Wang, Chao Chen. 127-136 [doi]
- Cognitive Detection of Multiple Discrete Emotions from Chinese Online ReviewsSi Jiang, Jiayin Qi. 137-142 [doi]
- Constructions of Uniquely 3-Colorable GraphsZepeng Li, Jin Xu. 143-148 [doi]
- Structural Vulnerability Analysis in Complex Networks Based on Core TheoryKan Zhang, Fei Jiang, Yang Zuo, Yunyun Niu. 149-154 [doi]
- Exploring New Cryptographical Construction of Complex Network DataHongyu Wang, Jin Xu, Bing Yao. 155-160 [doi]
- The Similarity Analysis of Malicious SoftwareJing Liu, Yuan Wang, Yongjun Wang. 161-168 [doi]
- Uncovering and Characterizing Internet Water Army in Online ForumsGuirong Chen, Wandong Cai, Jiuming Huang, Xianlong Jiao. 169-178 [doi]
- Frequent Pattern Mining Based on Approximate Edit Distance MatrixDan Guo, Ermao Yuan, Xuegang Hu. 179-188 [doi]
- FTM: Recommending the Right Items for User Temporal Interests with Matrix Factorization through Topic ModelYanmin Shang, Ke-Fu Xu, Yi Han, Chuang Zhang. 189-198 [doi]
- Clustering Product Features of Online Reviews Based on Nonnegative Matrix Tri-factorizationsJiajia Wang, Yezheng Liu, Yuanchun Jiang, Chunhua Sun, Jianshan Sun, Yanan Du. 199-208 [doi]
- A New Scheme Based on HSSL for Solving the Stochastic Point Location ProblemJinchao Huang, Yan Yan, Ying Guo, Shenghong Li. 209-214 [doi]
- A General Strategy for Solving the Stochastic Point Location Problem by Utilizing the Correlation of Three Adjacent NodesYing Guo, Hao Ge, Jinchao Huang, Shenghong Li. 215-221 [doi]
- Fingerprinting Web Browser for Tracing Anonymous Web AttackersXiaofeng Liu, Qixu Liu, Xiaoxi Wang, Zhaopeng Jia. 222-229 [doi]
- On Adjacent Vertex-Distinguishing Total Chromatic Number of Generalized Petersen GraphsEnqiang Zhu, Fei Jiang, Zepeng Li, Zehui Shao, Jin Xu. 230-234 [doi]
- Using Structural Features to Characterize Social TiesYang Zuo, Kan Zhang. 235-242 [doi]
- A Framework of Privacy Decision Recommendation for Image Sharing in Online Social NetworksDonghui Hu, Fan Chen, Xintao Wu, Zhong-Qiu Zhao. 243-251 [doi]
- Mining Individual Mobility Patterns Based on Location HistoryXiaopeng Chen, Dianxi Shi, Banghui Zhao, Fan Liu. 252-259 [doi]
- Influence Maximization in Social Networks Based on Non-backtracking Random WalkJingzhi Pan, Fei Jiang, Jin Xu. 260-267 [doi]
- On Improving a Microblog RankingJidong Li, Xin Li, Mingming Shi, Meng Zhou, Linjing Lai. 268-274 [doi]
- Max-Flow Rate Priority Algorithm for Evacuation Route PlanningDan Guo, Chen Gao, Wu Ni, Xuegang Hu. 275-283 [doi]
- Role and Time-Based Access Control with Efficient Revocation for Cloud StorageFengHua Li, Yanchao Wang, Jinbo Xiong, Rongna Xie. 284-289 [doi]
- Design and Implementation of Scheduling Pool Scheduling Algorithm Based on Reuse of Jobs in SparkJianchao Tang, Shuqiang Yang, Chao-Qiang Huang, Zhou Yan. 290-295 [doi]
- Discovering Latent Influence in Online Social Retweet BehaviorsBo Sun, Chungjin Hu, Wenwen Xu, Huixing Fan. 296-301 [doi]
- OPSDS: A Semantic Data Integration and Service System Based on Domain OntologyXin Liu, Chungjin Hu, Jianyi Huang, Feng Liu. 302-306 [doi]
- A Bidirectional LSTM Model for Question Title and Body Analysis in Question AnsweringYuanping Nie, Chao An, Jiuming Huang, Zhou Yan, Yi Han. 307-311 [doi]
- Information Diffusion Mechanisms in Online Social NetworksShushen Fu, Chungjin Hu, Ying Hu, Bo Sun, Wenrui Ying, Peng Shi 0006. 312-317 [doi]
- Question Similarity Modeling with Bidirectional Long Short-Term Memory Neural NetworkChao An, Jiuming Huang, Shoufeng Chang, Zhijie Huang. 318-322 [doi]
- A Police Big Data Analytics Platform: Framework and ImplicationsHai Yu, Chungjin Hu. 323-328 [doi]
- Convolutional Neural Network Based on Principal Component Analysis Initialization for Image ClassificationXu-Die Ren, Hao-Nan Guo, Guan-Chen He, Xu Xu, Chong Di, Sheng-Hong Li. 329-334 [doi]
- Energy-Efficient Hadoop Green SchedulerJianhong Zhai, Hongli Zhang, Xiaorou Zhong, Wei Li, Lai Wang, Zeyu He. 335-340 [doi]
- TREST: A Hadoop Based Distributed Mobile Trajectory Retrieval SystemJianming Lv, Xingtong Wang, Fengtao Huang, Junjie Yang, Tianfeng Wu, Qifa Yan. 341-346 [doi]
- A Novel Android Malware Detection Method Based on Markov BlanketXiaotian Zhang, Donghui Hu, Yuqi Fan, Kui Yu. 347-352 [doi]
- Shrinking the Sentiment Analysis for Signed Network ConstructionShen Su, Hongli Zhang, Yue Zhang, Dongyang Zhan, Junxi Guo. 353-357 [doi]
- Attribute Credibility Based Sybil Goup Detection in Online Social NetworksYechao Xia, Li Pan, Liang Shi, Futai Zou. 358-363 [doi]
- A Simple Method for Locating Topic Sources in Uncertainty Diffusion NetworksJianyi Huang, Chungjin Hu, Mingzhe Fang, Tong Wu, Peng Shi 0006. 364-369 [doi]
- RDDShare: Reusing Results of Spark RDDChao-Qiang Huang, Shuqiang Yang, Jian-Chao Tang, Zhou Yan. 370-375 [doi]
- A New Weighted Similarity Method Based on Neighborhood User Contributions for Collaborative FilteringXuefeng Zang, Tianqi Liu, Shuyu Qiao, Wenzhu Gao, Jiatong Wang, Xiaoxin Sun, Bangzuo Zhang. 376-381 [doi]
- Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping CommunityGongshen Liu, Kui Meng, Hongyi Guo, Li Pan, Jianhua Li. 382-387 [doi]
- Remanufacturing Closed-Loop Supply Chain Model with RFID Technology Saving Recycling CostAi-Feng Yang, Si Wan, Xiao-Jian Hu. 388-393 [doi]
- A News Event Detection Algorithm Based on Key Elements RecognitionXiaoting Qu, Juan Yang, Bin Wu, Haiming Xin. 394-399 [doi]
- Online Topic Evolution Modeling Based on Hierarchical Dirichlet ProcessTao Ma, Dacheng Qu, Rui Ma, Wei Feng, Kan Li. 400-405 [doi]
- The Multiple Attribute Association Decision-Making Method to Make Online Advertisements Using Influential Users in Social NetworkJianmin He, Long Yu, Yezheng Liu. 406-411 [doi]
- Utilize Item Correlation to Improve Aggregate Diversity for Recommender SystemsYezheng Liu, Jinkun Wang, Yuanchun Jiang, Jianshan Sun, Chunhua Sun. 412-417 [doi]
- Community Detection Based on Variable Vertex InfluenceYuntao Yao, Wei Wu, Mingtao Lei, Xi Zhang. 418-423 [doi]
- Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile CloudQing-Qing Xie, Liangmin Wang. 424-429 [doi]
- Distributed Storage Optimization for Small Data with High Density in Internet of VehiclesHongbo Zhang, Huibing Zhang, Xiaoli Hu. 430-434 [doi]
- Research on Video Anti-hotlinking for OTTDongyan Zhang, Zhiwen Yang, Weihua Li. 435-439 [doi]
- A Fine-Grained Multiparty Access Control Model for Photo Sharing in OSNsChao Lee, Wei Wang, Yunchuan Guo. 440-445 [doi]
- Web Service Run-Time Monitoring and Visualization Analysis Based on ProbeLiang Chen, Dapeng Xiong, Hua Wang, Peng Zou. 446-451 [doi]
- Research on Visualization Techniques in Large Scale Virtual BattlefieldLingda Wu, Hongxing Hao, Chao Yang, Ronghuan Yu, Huaquan Hu. 452-455 [doi]
- Topology Analysis of Vector Fields and Application ProspectLi Chao, Wu Lingda, Yang Jia, Zhao Bin. 456-461 [doi]
- The Cloud Design of the Cognitive Virus Based on SaaSSun Yang, Xiong Wei. 462-465 [doi]
- Research on Network Simplification by Edge BundlingZhonghua Yao, Lingda Wu. 466-472 [doi]
- Low-Cost INS Velocity Kalman Filtering Based on Rational FittingDong Pei, Daguo Qin. 473-477 [doi]
- An Expandable Community Division Method for Network VisualizationXiangang Wang, Hanchen Song. 478-483 [doi]
- A Study on Route Planning of Helicopter in Low Altitude AreaLiyun Hao, Chao Guo, Lingda Wu. 484-488 [doi]
- A Hybrid Modeling Method for Dynamic Liquid SimulationLing Zou, Guoping Wang. 489-492 [doi]
- The Visualization Analysis and Vulnerability Repair Research for the Module Dependency Managerial of VxWorks 5.5 Operating SystemPeng Wang, Liang Chen, Peng Zou, Li Li, Junlei Bao. 493-496 [doi]
- An Empirical Study on the Performance of Enterprises and Investment in the Human CapitalHuaming Wu, Jin Hang. 497-502 [doi]
- Combination Forecast on Health Status of Residents in ChinaChunlei Han, Shuangshuang Wang, Kun Han, Xihou Hu. 503-507 [doi]
- A Personalized Microblog Search Model Considering User-Author RelationshipYuanchun Jiang, Yuxiang Xu, Liang Shao. 508-513 [doi]
- An Empirical Business Study on Service Providers' Satisfaction in Sharing EconomyMengyu Zhang, Xusen Cheng, Xuan Luo, Shixuan Fu. 514-519 [doi]
- Complementarity: A Novel Collaborator Recommendation Method for SMEsWei Xu, Ying Lu, Jing Zhao, Minghui Qian. 520-525 [doi]
- Detection and Defense of SYN Flood Attacks Based on Dual Stack Network FirewallPengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, Liang Zhang, Sanchuan Guo. 526-531 [doi]
- GEV Regression with Convex Loss Applied to Imbalanced Binary ClassificationHaolin Zhang, Gongshen Liu, Li Pan, Kui Meng, Jianhua Li. 532-537 [doi]
- Behavior Analysis Based SMS Spammer Detection in Mobile Communication NetworksBin Zhang, Gang Zhao, Yunbo Feng, Xiaolu Zhang, Weiqiang Jiang, Jing Dai, Jiafeng Gao. 538-543 [doi]
- Unknown Word Detection in Song PoetryXia Li, Bin Wu, Bailing Zhang. 544-549 [doi]
- A Real Time EEG Analysis SystemJonathan Garza, Yuezhe Li, Yuchou Chang, Hong Lin. 550-555 [doi]
- LRDM: Local Record-Driving Mechanism for Big Data Privacy Preservation in Social NetworksWeihao Li, Hui Li. 556-560 [doi]
- A Voronoi-Based Dummy Generation Algorithm for Privacy-Aware Location-Based ServicesCui Zhang, FengHua Li. 561-566 [doi]
- A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2GRong Jiang, Rongxing Lu, Chengzhe Lai, Aiping Li. 567-572 [doi]
- Real-Time Traffic Status Classification Based on Gaussian Mixture ModelXiong Liu, Li Pan, Xiaoliang Sun. 573-578 [doi]
- New Properties and Bounds of Anti-average NumbersYangyang Zhou, Jin Xu, Bing Yao. 579-583 [doi]
- A Novel APPs Recommendation Algorithm Based on APPs Popularity and User BehaviorsYezheng Liu, Fei Du, Yuanchun Jiang, Xiao Liu, Qiudan Wang. 584-589 [doi]
- Mobile Authentication System Based on National Regulation and NFC TechnologyChengjun Cai, Jian Weng, Jianan Liu. 590-595 [doi]
- Differentially Private Publication Scheme for Trajectory DataMeng Li, Liehuang Zhu, Zijian Zhang, Rixin Xu. 596-601 [doi]
- Survey on Domain Name System SecurityFutai Zou, Siyu Zhang, Bei Pei, Li Pan, Linsen Li, Jianhua Li. 602-607 [doi]
- Time-Aware First Story Detection in Twitter StreamYongqin Qiu, Sixu Li, Wenjing Yang, Rui Li, Lihong Wang, Bin Wang. 608-613 [doi]
- Ranking-Based Music Recommendation in Online Music RadiosYao Lu, Zhi Qiao, Peng Zhang, Li Guo 0001. 614-619 [doi]
- A Fast Algorithm for Competitive Recommendation Marketing StrategyWenyu Zang, Xiao Wang, Yue Hu. 620-625 [doi]
- Image Super-Resolution with Deep Convolutional Neural NetworkXiancai Ji, Yao Lu, Li Guo 0001. 626-630 [doi]
- A Survey of Game Theoretic Methods for Cyber SecurityYuan Wang, Yongjun Wang, Jing Liu, Zhijian Huang, Peidai Xie. 631-636 [doi]
- Pursuit Estimator Learning Automata Based Approach for Online Event Pattern TrackingWen Jiang, Hao Ge, Tianrong Wu, Fanming Wang, Shenghong Li. 637-641 [doi]
- Survey on Software Vulnerability Analysis Method Based on Machine LearningGong Jie, Kuang Xiao-Hui, Liu Qiang. 642-647 [doi]
- Correlation Analysis Using Global Dataset of Events, Location and ToneKedi Chen, Fengcai Qiao, Hui Wang. 648-652 [doi]
- Sentiment Classification of Chinese Microblogging Texts with Global RNNJiajun Cheng, Pei Li, Zhaoyun Ding, Sheng Zhang, Hui Wang. 653-657 [doi]
- Finding Influential Papers in Citation NetworksSheng Zhang, Danling Zhao, Ran Cheng, Jiajun Cheng, Hui Wang. 658-662 [doi]
- Probability-Weighted Extreme Learning Machine for Classification with Uncertain DataHang Gao, Yuxing Peng, Songlei Jian. 663-667 [doi]
- Link Prediction Based on Clustering Information in Scientific Coauthorship NetworksYang Ma, Guangquan Cheng, Zhong Liu, Xingxing Liang. 668-672 [doi]
- Open Relation Extraction from Chinese Microblog TextJing Xu, Liang Gan, Zhou Yan, Quanyuan Wu, Yan Jia. 673-677 [doi]
- A Topic Label Extraction Method for the University BBSWenling Tang, Xu Wu, Yuxiao Li, Jin Xu. 678-682 [doi]
- New Cumulative Distributions for Scale-Free NetworksXiaomin Wang, Bing Yao, Hongyu Wang, Jin Xu. 683-687 [doi]
- A Fast and High Quality Approach for Overlapping Community Detection through Minimizing ConductanceYang Gao, Hongli Zhang, Yue Zhang. 688-693 [doi]
- A Fingerprint Identification Algorithm Based on Local Minutiae Topological PropertyBei Sun, Wusheng Luo, Liebo Du, Qin Lu. 694-697 [doi]
- Detecting Malicious Server Based on Server-to-Server Realation GraphZihao Wang, Futai Zou, Bei Pei, Weijia He, Li Pan, Zhaochong Mao, Linsen Li. 698-702 [doi]
- Combing Semantic and Prior Polarity Features for Boosting Twitter Sentiment Analysis Using Ensemble LearningJianqiang Zhao. 709-714 [doi]