0 | -- | 0 | Shaopeng Guan, Yongyu Wang, Jian Shen. Fingerprint-based access to personally controlled health records in emergency situations |
0 | -- | 0 | Xiaobing Sun, Wenyuan Xu, Xin Xia, Xiang Chen, Bin Li. Personalized project recommendation on GitHub |
0 | -- | 0 | Rizhen Qin, Wei Gao, Huarong Xu, Zhanyi Hu. Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face |
0 | -- | 0 | Hong Mei, Lu Zhang. Can big data bring a breakthrough for software automation? |
0 | -- | 0 | Xin Zhou, Kaidong Wu, Huaqian Cai, Shuai Lou, Ying Zhang 0012, Gang Huang 0001. LogPruner: detect, analyze and prune logging calls in Android apps |
0 | -- | 0 | Yingkui Cao, Yanzhen Zou, Yuxiang Luo, Bing Xie, Junfeng Zhao. Toward accurate link between code and software documentation |
0 | -- | 0 | Huige Wang, Kefei Chen, Baodong Qin, Ziyuan Hu. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF |
0 | -- | 0 | Yi Liu, Jue Wang, Chang Xu 0001, Xiaoxing Ma, Jian Lü. NavyDroid: an efficient tool of energy inefficiency problem diagnosis for Android applications |
0 | -- | 0 | Zhen Tang, Wei Wang 0049, Lei Sun, Yu Huang, Heng Wu, Jun Wei 0001, Tao Huang 0001. IO dependent SSD cache allocation for elastic Hadoop applications |
0 | -- | 0 | Liyuan Yin, Kan Guo, Bin Zhou, Qinping Zhao. 3D shape co-segmentation via sparse and low rank representations |
0 | -- | 0 | Qian Wang, Chenhui Jin. A non-alternate 3D structure and its practical security evaluation against differential and linear cryptanalysis |
0 | -- | 0 | Xiangyu Luo, Lijun Wu, Qingliang Chen, Haibo Li, Lixiao Zheng, Zuxi Chen. Symbolic model checking for discrete real-time systems |
0 | -- | 0 | Chengdong Yang, Jinde Cao, Tingwen Huang, Jianbao Zhang, Jianlong Qiu. Guaranteed cost boundary control for cluster synchronization of complex spatio-temporal dynamical networks with community structure |
0 | -- | 0 | Zhichao Yang, Shaojing Fu, Longjiang Qu, Chao Li 0002. A lower dimension lattice attack on NTRU |
0 | -- | 0 | Yiying Li, Huaimin Wang, Bo Ding, Wei Zhou. RoboCloud: augmenting robotic visions for open environment modeling using Internet knowledge |
0 | -- | 0 | Guangsheng Li, Wusheng Chou. Path planning for mobile robot using self-adaptive learning particle swarm optimization |
0 | -- | 0 | Qichuan Geng, Zhong Zhou, Xiaochun Cao. Survey of recent progress in semantic image segmentation with CNNs |
0 | -- | 0 | Haitao Zhang, Zhuo Cheng, Guoqiang Li 0001, Shaoying Liu. autoC: an efficient translator for model checking deterministic scheduler based OSEK/VDX applications |
0 | -- | 0 | Zheng Yang, Junyu Lai. New constructions for (multiparty) one-round key exchange with strong security |
0 | -- | 0 | Xianjing Meng, Xiaoming Xi, Gongping Yang, Yilong Yin. Finger vein recognition based on deformation information |
0 | -- | 0 | Bingbing Jiang, Yuan Zhang. k-th min computations with fully homomorphic encryption |
0 | -- | 0 | Jianbin Mu, Shaoyuan Li, Jing Wu. On the structural controllability of distributed systems with local structure changes |
0 | -- | 0 | Bin Zhao, Yongqiang Guan, Long Wang 0001. Non-fragility of multi-agent controllability |
0 | -- | 0 | Sizhen Du, Guojie Song, Haikun Hong, Dong Liu. Learning dynamic dependency network structure with time lag |
0 | -- | 0 | Ting Wang, Tieming Chen, Yang Liu, Ye Wang. Anti-chain based algorithms for timed/probabilistic refinement checking |
0 | -- | 0 | Carl K. Chang. Situation analytics - at the dawn of a new software engineering paradigm |
0 | -- | 0 | Ping Yu 0002, Fei Yang, Chun Cao, Hao Hu 0001, Xiaoxing Ma. Mining API usage change rules for software framework evolution |
0 | -- | 0 | Guodong Ye, Xiaoling Huang. Spatial image encryption algorithm based on chaotic map and pixel frequency |
0 | -- | 0 | Xuemei Li, Fan Zhang, Guoning Chen, Caiming Zhang. Formula for computing knots with minimum stress and stretching energies |