Abstract is missing.
- Keynote speechSchahram Dustdar, Eduard H. Hovy, Xiangyang Li, Moncef Gabbouj. [doi]
- Popularity prediction based on interactions of online contentsQingchao Kong, Wenji Mao, Chunyang Liu. 1-5 [doi]
- Weighted extreme learning machine for balance and optimization learningXiaojuan Ban, Ruoyi Liu, Qing Shen, Yu Wang. 6-10 [doi]
- Summarization based on multiple feature combinationTaiwen Huang, Lei Li, Yazhao Zhang, Junqi Chi. 11-15 [doi]
- Violation vehicle automated snap and road congestion detectionXiaopeng Ji, Zhiqiang Wei, Lei Huang, Yun Gao. 16-20 [doi]
- Thinking like psychologist: Learning to predict personality by using features from portrait and social mediaJie Nie, Lei Huang, Zhen Li, Chenxi Wei, Bowei Hong, Wenwu Zhu 0001. 21-26 [doi]
- Indoor shop recognition via simple but efficient fingerprinting on smartphonesHuaiyu Xu, Dong Zhao, Jiaqi An, Liang Liu. 27-31 [doi]
- Online personalized QoS prediction approach for cloud servicesJianlong Xu, Zibin Zheng, Zhun Fan, Wenhua Liu. 32-37 [doi]
- A machine learning-based tourist path predictionSiwen Zheng, Yu Liu, Zhenchao Ouyang. 38-42 [doi]
- A popularity-aware prefetching using MDP for wireless video streaming over information-centric networksGuoshun Nan, Xiuquan Qiao, Junliang Chen. 43-47 [doi]
- Video super-resolution based on nonlinear mapping and patch similarityLinghui Li, Junping Du, MeiYu Liang, JangMyung Lee, Luoming Meng. 48-56 [doi]
- Research and implementation of load balancing algorithm for mass mobile application detection taskYanhui Guo, Yingjie He, Xiaoming Liu. 57-61 [doi]
- Combination attack of android applications analysis scheme based on privacy leakJieming Gu, Chengze Li, Dian Lei, Qi Li. 62-66 [doi]
- A risk assessment scheme of intellignet terminal based on attack treeFang Wei, Miao Zhang. 67-71 [doi]
- Defect trigger model: Analysis method of mobile application defectDian Lei, Yang Liu, Chengze Li, Jieming Gu, Qi Li. 72-76 [doi]
- ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive BayesFeng Dong, Yanhui Guo, Chengze Li, Guoai Xu, Fang Wei. 77-81 [doi]
- Research on automated testing framework for multi-platform mobile applicationsDa Zun, Tao Qi, Liping Chen. 82-87 [doi]
- Intelligent shopping cart with quick payment based on dynamic target trackingXuan Liu, Haitao Zhang, Jingxian Fang, Guan Guan, Yundi Huang. 88-93 [doi]
- A control flow obfuscation method for Android applicationsYong Peng, Jie Liang, Qi Li. 94-98 [doi]
- Research on the technology of massive Android application data processingHewei Yu, Yangyu Hu, Yang Gao, Juan Xu, Miao Zhang. 99-103 [doi]
- A method to detect Android ad plugins based on decompiled digital sequenceYanhui Guo, Jianpeng Hou, Weiping Chen, Qi Li. 104-108 [doi]
- Exploring (C)overt attention for multi-objective gaze-independent BCIs, visual angle not exceeding 1 degreeSijie Zhou, Long Chen, Yu Zhang, Jing Jin, Xingyu Wang. 109-112 [doi]
- Adaptive fuzzy control of a front-wheel drive bicycle robotJing Li, Shimin Wei, Lei Guo, Xin Feng. 113-116 [doi]
- Fast automation moisture meter based on intellient control strategyJiawei Wu, Du Zhou, Xiuquan Qiao. 117-120 [doi]
- Flexible neural network adaptive control based on the particle swarm optimization algorithmJie Zhao, Guo-xiang Chang, Long Han, Li Wang. 121-124 [doi]
- A QoE-based control system for bitrate adaption of wireless-accessed video streamHuitong Ge, Yuehui Jin, Tan Yang. 125-130 [doi]
- The estimation of weighted solution convex polyhedron in SMT problemZhenhui Xu, Yuting Yang, Nan Jiang, Chunxu Zhang, Pei Huang. 131-135 [doi]
- Fault location in distributed information systemsYuan Ge, Juan Yin, Yan Zhang, Ke Lou. 136-140 [doi]
- K-means+: A developed clustering algorithm for big dataKun Niu, Zhipeng Gao, Haizhen Jiao, Nanjie Deng. 141-144 [doi]
- Association-rules-based data imputation with sparkZhaowei Qu, Jianru Yan, Sixing Yin. 145-149 [doi]
- An intelligent drug matching method for traditional Chinese medicineKan Liu, Yi Sun, Dezheng Zhang. 150-154 [doi]
- An improved text similarity algorithm research for clinical decision support systemWen Wang, Qiaowei Jiang, Tao Lv, Wenming Guo, Cong Wang. 155-159 [doi]
- Deep feature weighting in Naive Bayes for Chinese text classificationQiaowei Jiang, Wen Wang, Xu Han, Shasha Zhang, Xinyan Wang, Cong Wang. 160-164 [doi]
- Research on user relationship networks of SNS based on the Forest Fire modelLiping Chen, Kun Lin, Junping Du, Kun Li. 165-170 [doi]
- Text summarization using Sentence-Level Semantic Graph ModelXu Han, Tao Lv, Qiaowei Jiang, Xinyan Wang, Cong Wang. 171-176 [doi]
- Cost-sensitive sparse representation based classificationZhenbing Liu, Chunyang Gao, Huihua Yang, Qijia He. 177-181 [doi]
- A study on the impact of online takeout based on the Baidu index on the management of university cafeteriaXinliang Liu, Dandan Sun. 182-185 [doi]
- A quantized kernel least mean square scheme with entropy-guided learning for intelligent data analysisXiong Luo, Jing Deng, Ji Liu, Weiping Wang, Xiaojuan Ban. 186-190 [doi]
- Group based non-sparse localized multiple kernel learning algorithm for image classificationGuangyuan Fu, Qingchao Wang, Hongqiao Wang, Dongying Bai. 191-195 [doi]
- A multi-dimension factor decision-making model framework based on Random ForestsPeng Nie. 196-199 [doi]
- Application of support vector machines in medical dataYongqiang Weng, Chunshan Wu, Qiaowei Jiang, Wenming Guo, Cong Wang. 200-204 [doi]
- Probabilistic forecasting of traffic flow using kernel based extreme learning maching and quantum-bahaved particle swarm optimizationYiming Xing, Xiaojuan Ban, Chong Guo, Yu Wang. 205-209 [doi]
- An approach for time series similarity search based on LuceneMin Chang, Yuansheng Lou, Lei Qiu. 210-214 [doi]
- Structure-based classification of web documents using Support Vector MachineKejing He, Chenyang Li. 215-219 [doi]
- Research on an anti-crawling mechanism and key algorithm based on sliding time windowYi Liu, Zhengqiu Yang, Jiapeng Xiu, Chen Liu. 220-223 [doi]
- Research on movie-box prediction model and algorithm based on neural networkZexi Di, Jiapeng Xiu, Jinze Lin, Yunzhe Qian. 224-228 [doi]
- Applied research on visual mining technology in medical dataChunshan Wu, Yongqiang Weng, Qiaowei Jiang, Wenming Guo, Cong Wang. 229-233 [doi]
- An attack pattern mining algorithm based on fuzzy logic and sequence patternYang Li, Ying Xue, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang. 234-238 [doi]
- An Android malware detection method based on AndroidManifest fileXiang Li, Jianyi Liu, Yanyu Huo, Ru Zhang, Yuangang Yao. 239-243 [doi]
- Phishing sites detection based on Url CorrelationYing Xue, Yang Li, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang. 244-248 [doi]
- Hier-UIM: A hierarchy user interest model for personalized news recommenderMeilian Lu, Jinliang Liu. 249-254 [doi]
- Malware detection method for the industrial control systemsYong Peng, Jie Liang, Guoai Xu. 255-259 [doi]
- A collaborative recommendation algorithm based on user cluster classificationZihao Chen, Zhengmin Li. 260-263 [doi]
- Implicit semantic text retrieval and distributed implementation for rural medical careYutong Gao, Feifan Song, Xiaqing Xie, Xuebin Gao. 264-267 [doi]
- Research on theme crawler based on Shark-Search and PageRank algorithmLei Qiu, Yuansheng Lou, Min Chang. 268-271 [doi]
- A supervised no-reference QOE assessment model on IPTV servicesQuangu Chen, Yuehui Jin, Tan Yang. 272-277 [doi]
- An improved item-based movie recommendation algorithmDongping Zhao, Jiapeng Xiu, Yu Bai, Zhengqiu Yang. 278-281 [doi]
- Research on a multi-objective constrained optimization evolutionary algorithmJiapeng Xiu, Qun He, Zhengqiu Yang, Chen Liu. 282-286 [doi]
- A transmission algorithm of ant colony system based large-scale data for WSN networkLiu Liu, Meng Luo Ming, Yang Yang. 287-292 [doi]
- Robust doa estimation and data detection for mobile communication in multipath environmentHassan M. Elkamchouchi, Darwish A. E. Mohamed, Osama G. Mohamed, Wael A. E. Ali. 293-297 [doi]
- Design of dynamic networking scheme among dummy Bluetooth devicesZhanzhi Du, Yonghua Li, Siye Wang. 298-302 [doi]
- Optimal workflows of AllJoyn network with centralized management gatewayBo Li, Yonghua Li, Siye Wang. 303-307 [doi]
- A suppression mechanism of cascading fault in the interdependent coupling smart gridCheng Chen, Yang Wang, Yong ZhuZhao, Huixia Ding, Hong bin Zhao. 308-313 [doi]
- Non-Newtonian fluids based on adaptive time stepXiaojun Ban, Xing Liu, Yalan Zhang. 314-318 [doi]
- A novel service provisioning mechanism in content-centric networkingJiqun Dong, Xiuquan Qiao. 319-326 [doi]
- An effective merge strategy based hierarchy for improving small file problem on HDFSZhipeng Gao, Yinghao Qin, Kun Niu. 327-331 [doi]
- A hybrid index for multi-dimensional query in HBaseXiaosheng Tang, Boda Han, Han Chen. 332-336 [doi]
- A dynamic replica strategy based on Markov model for hadoop distributed file system (HDFS)Kaiyang Qu, Luoming Meng, Yang Yang 0006. 337-342 [doi]
- Efficiently secure multiparty computation based on homomorphic encryptionYuangang Yao, Jinxia Wei, Jianyi Liu, Ru Zhang. 343-349 [doi]
- SARN: A scalable resource managing framework for YARNZhonghao Lu, Jingyu Wang, Qi Qi. 350-355 [doi]
- A hybrid web log based intrusion detection modelJing Yu, Dan Tao, Zhaowen Lin. 356-360 [doi]
- An algorithm of apriori based on medical big data and cloud computingXiaoyan Cui, Shimeng Yang, Darning Wang. 361-365 [doi]
- Dynamic virtual machine consolidation for improving energy efficiency in cloud data centersDongyan Deng, Kejing He, Yanhua Chen. 366-370 [doi]
- Cloud benchmarking in bare-metal, virtualized, and containerized execution environmentsSoheil Mazaheri, Yong Chen, Elham Hojati, Alan Sill. 371-376 [doi]
- Data privacy protection based on sensitive attributes dynamic updateJun Liao, Chaohui Jiang, Chun Guo. 377-381 [doi]
- Improve security and availability for cloud storageShenling Liu, Chunyuan Zhang, Le Bo. 382-387 [doi]
- The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computingPeidong Sha, Zhixiang Zhu. 388-392 [doi]
- Android malware detection using 3-level ensembleLinshu Ouyang, Feng Dong, Miao Zhang. 393-397 [doi]
- Privacy-preserving k-NN computation over encrypted cloud data without key sharingShao-hui Wang, Tian Liu, Fu Xiao, Ruchuan Wang. 398-403 [doi]
- Managed security service distribution modelGery Ducatel, Joshua Daniel, Theo Dimitrakos, Fadi Ali El-Moussa, Robert Rowlingson, Ali Sajjad. 404-408 [doi]
- Based on the character of cloud storage string encryption and cipher text retrieval of string researchHongliang Zhu, Wenhan Liu, Jing Wang, Yang Xin. 409-413 [doi]
- Multi adaptive hardware Trojan detection method based on power characteristics templateLei Zhang, Kewang Sun, Qi Cui, Sixiang Wang, Xiaolin Li, Jianguo Di. 414-418 [doi]
- An accelerated fully homomorphic encryption scheme over the integersPeng Zhang, Xiaoqiang Sun, Ting Wang, Sizhu Gu, Jianping Yu, Weixin Xie. 419-423 [doi]
- Efficient verification of data possession in cloud computingSongyang Wu, Yong Zhang. 424-428 [doi]
- Multi-authority trust access control for cloud storageKhaled Riad. 429-433 [doi]
- A mining algorithm for frequent closed pattern on data stream based on sub-structure compressed in prefix-treeMuhan Fan, Sujie Shao, Lanlan Rui. 434-439 [doi]
- Abnormal event detection based on social force model combined with crowd violent flowYaomin Wen, Junping Du, JangMyung Lee. 440-446 [doi]
- Tourism activity recognition and discovery based on improved LDA modelYifan Yuan, Junping Du, JangMyung Lee. 447-455 [doi]
- Recognition of blacklisted vehicle based on SIFT featureBoyuan Ma, Xiaojuan Ban, Yu Wang, Xu Liu. 456-460 [doi]
- Semi-structured document extraction based on document element block modelTao Lv, Jiang Liu, Fan Lu, Peng Zhang, Xinyan Wang, Cong Wang. 461-465 [doi]
- Research of Bayesian underground positioning technology based on SIFT featureYu Wang, Xiaojuan Ban, Boyuan Ma, Yifei Guo, Jinglu Bai. 466-470 [doi]
- Distinguishing small moving objects and noises in the barn sceneShufeng Peng, Huiyuan Fu, Guangfu Che. 471-475 [doi]
- Real time abnormal crowd behavior detection based on adjacent flow location estimationGaoya Wang, Huiyuan Fu, Yingxin Liu. 476-479 [doi]
- A discriminative null space based deep learning approach for person re-identificationShuangqun Li, Xinchen Liu, Wu Liu, Huadong Ma, Haitao Zhang. 480-484 [doi]
- Passengers' choices on airport drop-off service: A decision forecast based on social learning and machine learningZhongqiang Wang, Jian Peng 0002, Yu Chen, Limiao Ning. 485-489 [doi]
- A decision model of identifying user travel pattern based on the intelligent terminal sensor dataShuai Wang, Jiapeng Xiu, Chen Liu, Zhengqiu Yang. 490-493 [doi]
- Multi-feature indexing for image retrieval based on hypergraphZihang Xu, Junping Du, Lingfei Ye, Dan Fan. 494-500 [doi]