1 | -- | 9 | Sergio Varga, Gilmar Barreto, Paulo David Battaglin. A holistic IT infrastructure management framework |
10 | -- | 18 | Kangshun Li, Hui Wang 0033, Ying Huang. An anchor node selection mechanism-based node localisation for mines using wireless sensor networks |
19 | -- | 29 | Hui Yin, Jixin Zhang, Zheng Qin. A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm |
30 | -- | 37 | Ming Zhang, Wei Chen. Optimised tags with time attenuation recommendation algorithm based on tripartite graphs network |
38 | -- | 48 | Min Li, Shaobo Deng, Lei Wang, Jun Ye. Probabilistic rough set-based band selection method for hyperspectral data classification |
49 | -- | 59 | Min Wang, Yuexin Zhang, Jinhua Ma, Wei Wu 0001. A universal designated multi verifiers content extraction signature scheme |
60 | -- | 68 | Esmaeel Nikravan, Saeed Parsa. Dynamic input domain reduction for test data generation with iterative partitioning |
69 | -- | 83 | Hardeo Kumar Thakur, Anand Gupta, Sreyashi Nag, Ritvik Shrivastava. Multi-class instance-incremental framework for classification in fully dynamic graphs |
84 | -- | 94 | Guanyu Chen, Xiang Li, Wenyin Gong, Hui Xu. Recognition of the landslide disasters with extreme learning machine |
95 | -- | 104 | Mustapha Si Tayeb, Hadria Fizazi. A new neural architecture for feature extraction of remote sensing data |
105 | -- | 115 | Tien-hsiung Weng, Chi-Ching Chiu, Meng-Yen Hsieh, Huimin Lu, Kuan-Ching Li. Parallelisation of practical shared sampling alpha matting with OpenMP |
116 | -- | 124 | Xiang Zhou, Xianyi Chen, Fasheng Zhang, Ningning Zheng. A novel coverless text information hiding method based on double-tags and twice-send |
125 | -- | 136 | J. Jayapriya, Michael Arock. Aligning molecular sequences using hybrid bioinspired algorithm in GPU |
137 | -- | 145 | Mohiuddin Ahmed, Al-Sakib Khan Pathan. Deep learning for collective anomaly detection |
146 | -- | 161 | Chunling Hu, Cuicui Liu, Bixin Li. Evaluating the trustworthiness of BPEL processes based on data dependency and XBFG |