1 | -- | 14 | Dawei Zhao, Haipeng Peng, Lixiang Li, SiLi Hui, Yixian Yang. Novel way to research nonlinear feedback shift register |
1 | -- | 14 | WanHong Zhang, Tong Zhou, BoXue Huang. Outlier deletion based improvement on the StOMP algorithm for sparse solution of large-scale underdetermined problems |
1 | -- | 14 | Xiaowu Chen, Xin Jin, Ke Wang. Lighting virtual objects in a single image via coarse scene understanding |
1 | -- | 10 | Xiwen Fang, Xuejia Lai. DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys |
1 | -- | 14 | Qian Zhao, Deyu Meng, ZongBen Xu. Robust sparse principal component analysis |
1 | -- | 15 | Salabat Khan, Abdul Rauf Baig, Armughan Ali, Bilal Haider, Farman Ali Khan, Mehr Yahya Durrani, Muhammad Ishtiaq. Unordered rule discovery using Ant Colony Optimization |
1 | -- | 11 | Xiangxiang Zeng, Linqiang Pan, Mario J. Pérez-Jiménez. Small universal simple spiking neural P systems with weights |
1 | -- | 5 | Hu Xiong, Yanan Chen, Guobin Zhu, Zhiguang Qin. Analysis and improvement of a provable secure fuzzy identity-based signature scheme |
1 | -- | 14 | Chung-Min Wu, Sheng-Chun Chou, Horng-Twu Liaw. A trend based investment decision approach using clustering and heuristic algorithm |
1 | -- | 14 | Xiaoxian Tang, Zhenghong Chen, Bican Xia. Generic regular decompositions for generic zero-dimensional systems |
1 | -- | 18 | Li Wang 0027, Jingling Xue, Xuejun Yang. Acyclic orientation graph coloring for software-managed memory allocation |
1 | -- | 10 | Xianghui Liu, Xing Fang, Zheng Wang, Xianghui Xie. A new parallel lattice reduction algorithm for BKZ reduced bases |
1 | -- | 12 | Dongbin Shen, Zhendong Sun, Weijie Sun. Leader-follower formation control without leader's velocity information |
1 | -- | 11 | Guozhen Cheng, Hongchang Chen, Dong-nian Cheng, Zhen Zhang, Julong Lan. Uncovering network traffic anomalies based on their sparse distributions |
1 | -- | 10 | Bo Zhang, Fangguo Zhang. Secure linear system computation in the presence of malicious adversaries |
1 | -- | 16 | Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun. Trust-based service composition in multi-domain environments under time constraint |
1 | -- | 12 | Shigen Gao, Hairong Dong, Bin Ning. Characteristic model-based all-coefficient adaptive control for automatic train control systems |
1 | -- | 10 | Hui Feng, Zidong Jiang, Bo Hu, Jianqiu Zhang. The incremental subgradient methods on distributed estimations in-network |
1 | -- | 15 | Heping Li, Feng Zhang, Shuwu Zhang. Multi-feature hierarchical topic models for human behavior recognition |
1 | -- | 15 | MeiYu Liang, Junping Du, Honggang Liu. Self-adaptive spatial image denoising model based on scale correlation and SURE-LET in the nonsubsampled contourlet transform domain |
1 | -- | 8 | Rui Song, Hongfei Cui, Yunsong Li, Chengke Wu. High-efficiency pipeline design of binary arithmetic encoder |