Abstract is missing.
- Chinese Sentiment Orientation AnalysisWenbin Pan, Yanquan Zhou. 1-5 [doi]
- A Scenario-Based Architecture for Reliability Design of Artificial Intelligent SoftwareJuguo Wang, Guoqi Li, Yun Pu. 6-9 [doi]
- The Analysis of Yeast Cell Morphology Using a Robot ScientistYihui Liu, K. Martin, Andrew Sparkes, Ross D. King. 10-14 [doi]
- IMP-Filters of R0-AlgebrasYong Lin Liu, Mei Ying Ren. 15-17 [doi]
- Intelligent Digital Photo Management System Using Ontology and SWRLYanmei Chai, Tian Xia, Jianming Zhu, Haifeng Li. 18-22 [doi]
- New Results on H∞ Filter Design for Continue-Time Systems with Time-Varying DelayYating Wang, Wuneng Zhou, Jinliang Liu, Da Luo. 23-27 [doi]
- Synchronization Algorithm for Multi-hop in Wireless Sensor NetworksHong Yao, Wuneng Zhou. 28-32 [doi]
- Tool Wear Detection Based on Wavelet Packet and BP Neural NetworkYuxia Qin, Lanshen Guo, Jian Wang. 33-36 [doi]
- Neural Network Method for Solving Linear Fractional ProgrammingLi Xiao. 37-41 [doi]
- Semantic Modeling: Computational Models of the ConceptsViacheslav Wolfengagen. 42-46 [doi]
- A Fast HITON_PC AlgorithmWei Yang. 47-50 [doi]
- An Algorithm of Dynamic Associate Rule Based on Sliding WindowsZhiqing Meng, Baosheng Shao, Min Jiang. 51-54 [doi]
- Online Segmentation Algorithm for Time Series Based on BIRCH Clustering FeaturesYu Tu, Yubao Liu, Zhijie Li. 55-59 [doi]
- A New Clustering Algorithm Based on Normalized Signal for Sparse Component AnalysisJun-Jie Yang, Hai-lin Liu. 60-63 [doi]
- Dynamic Fluzzy Clustering Algorithm for Web Documents MiningQi Luo. 64-67 [doi]
- A Novel GEP-Based Multiple-Layers Association Rule Mining AlgorithmHong-guo Cai, Chang-an Yuan, Jin-Guang Luo, Jin-de Huang. 68-72 [doi]
- Credit Card Customer Segmentation and Target Marketing Based on Data MiningWei Li, Xuemei Wu, Yayun Sun, Quanju Zhang. 73-76 [doi]
- A Improved Fuzzy K-Subspace Clustering and Its Application in Multiple Dominant Sparse Component AnalysisSuxian Zhang, Hailin Liu. 77-80 [doi]
- The Study of Credit Risk Evaluation Based on DEA MethodHuaipeng Li, Sulin Pang. 81-85 [doi]
- An Efficient Semantic Similarity Search on XML DocumentsShengen Li, Ling Song, Qiang Lv, Yuejun Li. 86-90 [doi]
- Research on Feature Extraction Based on Genetic Algorithm in Text CategorizationJuan Zou, Jinhua Zheng. 91-94 [doi]
- The Comparison of Two Kinds of Reproduction in Multiobjective OptimizationXue-fei Yao, Hai-lin Liu. 95-99 [doi]
- A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic AlgorithmsHecheng Li, Yuping Wang. 100-103 [doi]
- A New Kind of Handling Constraint Method for OptimizationJiechang Wen, Xuefei Yao. 104-108 [doi]
- An Algorithm of Collision Detection Based on Hybrid ModelXiaofeng Feng, Xiong Shi, Jun Chen. 109-112 [doi]
- An Improved Genetic Algorithm for Job Shop Scheduling ProblemQing-dao-er-ji Ren, Yuping Wang, Xiaojing Si. 113-116 [doi]
- Industrial Clusters Evolution Research Based on the SGAYajuan Yang, Pingan Wang, Wenxue Niu. 117-121 [doi]
- Hybrid Genetic Algorithm for the Multi-objective Flexible Scheduling ProblemJinling Du, Dalian Liu. 122-126 [doi]
- An EOG Artifacts Correction Method Based on Subspace Independent Component AnalysisDa Li, Jin Wu, Jiacai Zhang. 127-131 [doi]
- Evolutionary Algorithm for Zero-One Constrained Optimization Problems Based on Objective Penalty FunctionZhiqing Meng, Min Jiang, Chuangyin Dang. 132-136 [doi]
- A Novel Weight Design in Multi-objective Evolutionary AlgorithmFang-Qing Gu, Hai-lin Liu. 137-141 [doi]
- A New Evolutionary Algorithm Based on Simplex Crossover and PSO Mutation for Constrained Optimization ProblemsYibo Hu. 142-146 [doi]
- A New Genetic Algorithm and Its Convergence for Constrained Optimization ProblemsDalian Liu, Chunfeng Xing, Xuehai Shang. 147-150 [doi]
- A Genetic Algorithm Based on Modularity Density for Detecting Community Structure in Complex NetworksGuoqiang Chen, Xiaofang Guo. 151-154 [doi]
- The Application of Dominant-Recessive Diploid Codes in MOGANa Li, Qing-dao-er-ji Ren. 155-159 [doi]
- A Multi-objective Genetic Algorithm Approach Based on the Uniform Design MetmodXiaoshu Ma, Jing Huo, Qun Wang. 160-164 [doi]
- Improved Electromagnetism-Like Mechanism Algorithm for Constrained Optimization ProblemYun Shang, Jian Chen, Qun Wang. 165-169 [doi]
- A New Multi-objective Differential Evolution AlgorithmYuelin Gao, Jingke Zhou, Songwei Jia. 170-173 [doi]
- A New Genetic Algorithm with Elliptical Crossover for Constrained Multi-objective Optimization ProblemsLei Fan, Yuping Wang, Meijuan Wang. 174-178 [doi]
- The Particle Swarm Optimization with Decaying ICMIC for Shortest Path Computation in Computer NetworksHuidang Zhang, Yifei Zhang. 179-183 [doi]
- A Revised Discrete Particle Swarm Optimization for Cloud Workflow SchedulingZhangjun Wu, Zhiwei Ni, Lichuan Gu, Xiao Liu. 184-188 [doi]
- A Novel Hybrid Particle Swarm Optimization for Feature Selection and Kernel Optimization in Support Vector RegressionJiansheng Wu, Enhong Chen. 189-194 [doi]
- A Swarm Intelligence Algorithm Based on Boundary MutationHongwei Lin, Yuping Wang, Cai Dai. 195-199 [doi]
- Research on Double Objective Optimization of Master Production Schedule Based on Ant Colony AlgorithmZhengjia Wu, Wen Wang, Jin Zhou, Fen-fen Ren, Cheng Zhang. 200-204 [doi]
- Airport Taxi Scheduling Optimization Based on Genetic AlgorithmChangyou Liu, Kaifeng Guo. 205-208 [doi]
- A Multi-agent Social Evolutionary Algorithm for Resource-Constrained Project SchedulingXiaoying Pan, Hao Chen. 209-213 [doi]
- Existence of the Solution for General Complementarity ProblemsXiuyu Wang, Xingwu Jiang, Xiaogang Dong, Qinghuai Liu. 214-217 [doi]
- Prediction Discrete Data Used BP Network Based on AGOXuejun Gao, Zhenyou Wang. 218-222 [doi]
- Motion Segmentation Using Central Distance Features and Low-Pass FilterShu-Juan Peng. 223-226 [doi]
- Performance Analysis Based on Transform Matrix of MLE in CICAZhenyou Wang, Xuejun Gao. 227-229 [doi]
- Privacy-Preserving Classification on Horizontally Partitioned DataTian Tian, Hua Duan, Guoping He. 230-233 [doi]
- An Improved Side Information Generation Scheme for Wyner-Ziv Video CodingJinhong Di, Hongyan Hua. 234-237 [doi]
- A Streamline Placement Method Highlighting Flow Field TopologyWenyao Zhang, Bo Sun, Yi Wang. 238-242 [doi]
- A Real-Time Pineapple Matching System Based on Speeded-Up Robust FeaturesBin Li, Maohua Wang, Li Li. 243-247 [doi]
- Unsupervised Image Change Detection Based on 2-D Fuzzy EntropyWenbang Sun, Hexin Chen, Haiyan Tang, Di Wu. 248-252 [doi]
- Motion Analysis Based on Spatial-Temporal Visual AttentionShunbin Liu, Huicheng Zheng. 253-257 [doi]
- A New Volume Rendering Algorithm of Data FieldXiaofeng Feng, Xiong Shi, Jun Chen. 258-260 [doi]
- The Research on Multi-viewpoint Navigation Based on Spherical Panoramic ImagesXiong Shi, Xiaofeng Feng, Jun Chen. 261-264 [doi]
- A Novel Image Classification Method Based on Double Manifold LearningLi-Hua Ye, Rong Zhu, Jie Xu. 265-269 [doi]
- An Improved DLDA Based Method- Nonparametric DLDAHuorong Ren, Chunxiao Li, Haizhen Wang. 270-274 [doi]
- An Adaptive Feature Extraction Method for Motor-Imagery BCI SystemsCheng Chen, Wei Song, Jiacai Zhang, Zhiping Hu, He Xu. 275-279 [doi]
- Essence of Two-Dimensional Principal Component AnalysisCaikou Chen, Jingyu Yangzhou. 280-282 [doi]
- Infrared Face Recognition Based on Blood Perfusion and Weighted Block-DCT in Wavelet DomainCuiqun He, Guodong Liu, Zhihua Xie. 283-287 [doi]
- DST Feature Based Locality Preserving Projections for Face RecognitionWei Wang, Wen-Sheng Chen. 288-292 [doi]
- Efficient Client Puzzle Schemes to Mitigate DoS AttacksQiang Tang, Arjan Jeckmans. 293-297 [doi]
- On Trust Degree-Based Usage Control in DRM SystemFen Li, Quan Liu, Qingqi Pei, Liaojun Pang. 298-301 [doi]
- A Protocol of Secure Multi-party Multiplication Based on Bilinear PairingWeimin Shi, Changgen Peng. 302-305 [doi]
- Research on Validity Evaluation of Mandatory Access Control Policy under LSM FrameworkGaozu Wang, Weihuai Li, Wenbin Li. 306-309 [doi]
- A Scheme for Confidentiality Protection of OpenID Authentication MechanismXiangwu Ding, Junyin Wei. 310-314 [doi]
- Constructions of Maiorana-McFarland's Bent Functions of Prescribed DegreeFengrong Zhang, Yupu Hu, Hua Ma, Min Xie 0003. 315-319 [doi]
- Correlation Power Analysis Against Stream Cipher MICKEY v2Junrong Liu, Dawu Gu, Zheng Guo. 320-324 [doi]
- Game-Based Analysis and Improvement of a Fair Contract Signing ProtocolXueming Wang, Lichen Weng. 325-328 [doi]
- Automated Static Code Analysis for Classifying Android Applications Using Machine LearningAsaf Shabtai, Yuval Fledel, Yuval Elovici. 329-333 [doi]
- Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing PlatformsLi Yang, Jianfeng Ma, Junwei Zhang. 334-338 [doi]
- Proxy Re-encryption from CLE to CBEPing Wei, Xu an Wang, Xiaoyuan Yang 0002. 339-342 [doi]
- A New Threshold Signature Scheme to Withstand the Conspiracy AttackJie Wang, Yongquan Cai, Jingyang He. 343-346 [doi]
- Asymmetric Group Key Agreement with Traitor TraceabilityXiufeng Zhao, DaWei Wei, Hao Wang. 347-351 [doi]
- Convertible Perfect Concurrent Signature ProtocolHan Jiang, Qiuliang Xu, Chenghui Zhang. 352-356 [doi]
- Tripartite Key Agreement Protocols Based on Digital CertificationJunbing Li, Wei Ji. 357-361 [doi]
- Differential Fault Analysis on PRESENT Key ScheduleGaoli Wang, Shaohui Wang. 362-366 [doi]
- Improved Differential Cryptanalysis of SerpentGaoli Wang, Shaohui Wang. 367-371 [doi]
- A Fully Anonymous Identity-Based Signcryption Scheme in the Standard ModelHao Wang, Qiuliang Xu, Han Jiang, Xiufeng Zhao. 372-376 [doi]
- New CCA-Secure Proxy Re-encryption Scheme without Random OraclesXu an Wang, Ping Wei, Minqing Zhang. 377-381 [doi]
- Lattice-Based Proxy SignatureYali Jiang, Fanyu Kong, Xiuling Ju. 382-385 [doi]
- A New Technique of Anti-tampering Technology Based on AVS VideoFei Ren, Zhiguang Qin, Jinfeng Yang. 386-389 [doi]
- Some New Optimal PairingsHe Shang, Mingqiang Wang. 390-393 [doi]
- Non-Adjacent Form Recursive Algorithm on Elliptic Curves CryptographJing Zhang, Pingan Wang. 394-397 [doi]
- Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor Image FusionYang Cui, Li Qian, Wu Jie, Zhang Jianqi. 398-400 [doi]
- A Neural Network Clustering Based Algorithm for Privacy Preserving Data MiningStergios G. Tsiafoulis, Vasilios Zorkadis. 401-405 [doi]
- Data Hiding in Block Truncation CodingXiaotian Wu, Wei Sun. 406-410 [doi]
- Continuous Verification Using Keystroke DynamicsTomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici. 411-415 [doi]
- A Naive Feature Selection Method and Its Application in Network Intrusion DetectionTieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang. 416-420 [doi]
- (2, n) Secret Image Sharing Scheme with Ideal ContrastLin Dong, Daoshun Wang, Min Ku, Yiqi Dai. 421-424 [doi]
- Risk Assessment Model of Ship Integrated Navigation System Based on Fuzzy Artificial Neural NetworkHong-bo Li, Yan-ling Hao. 425-428 [doi]
- A Method to Prevent CW Sharing in DTV CASFei Ren, Zhiguang Qin, Xianhong Liu. 429-432 [doi]
- Energy Based Robust Video Hash AlgorithmYuenan Li. 433-436 [doi]
- Chaotic Synchronization with Single-Ring Erbium-Doped Fiber Laser SystemsLi-wen Zhang, Ming Shao. 437-440 [doi]
- Identity Authentication Based on Fuzzy Vault and Digital CertificateFen Li, Quan Liu, Liaojun Pang, Qingqi Pei. 441-445 [doi]
- USB Key-Based Dual-Factor Dynamic Authentication SchemeLei Li, Quan Liu, Xuemei Jiang. 446-449 [doi]
- Game Analysis of Non-trusted Threshold Authentication SchemeJie Wang, Yongquan Cai. 450-453 [doi]
- The Bipanconnectivity and Hamiltonian-Connectivity of Enhanced HypercubeYingying Liu, Hongmei Liu. 454-456 [doi]
- A Reliable Service Quality Evaluation Model in the Web Services CommunityLiping Chen, Guojun Zhang, Weitao Ha. 457-460 [doi]
- An Adaptive Evaluation Model of Web Service Based on Artificial Immune NetworkWei-Tao Ha, Li-Ping Chen. 461-464 [doi]
- A Sheme of Mobile Platform Based on Trusted ComputingYingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao. 465-468 [doi]
- Securing GPRS Tunnel Protocol in 3G Core NetworkXuena Peng, Yingyou Wen, Hong Zhao. 469-473 [doi]
- Cluster Features of Bluetooth Mobile Phone Virus and Research on Strategies of Control & PreventionWenjuan Zhang, Zhaohui Li, Yonghui Hu, Wei Xia. 474-477 [doi]
- A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio NetworksHongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng. 478-482 [doi]
- Secure Communication Model of WSN Based on Secret SharingXiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li. 483-487 [doi]
- Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor NetworksJiangHong Guo, ZhiChu Zhong. 488-492 [doi]
- Research on Wireless Sensor Network SecurityYan-Xiao Li, Lian Qin, Qian Liang. 493-496 [doi]
- Computing the Scattering Number of Bicyclic GraphsBing Chen, Shenggui Zhang. 497-500 [doi]
- On the Reliability of Unicyclic Networks with Vertex FailureZhanlan Li. 501-505 [doi]
- Observer-Based Adaptive Neural Network Robust Control of Nonlinear Time-Delay Systems with Unmodeled DynamicsRuliang Wang, Huiying Jiang. 506-510 [doi]
- Robust Adaptive Neural Control for a Class of Stochastic Nonlinear SystemsRuliang Wang, Chaoyang Chen. 511-514 [doi]
- Analysis of Fuzzy Membership Function Generation with Unsupervised Learning Using Self-Organizing Feature MapRuliang Wang, Kunbo Mei. 515-518 [doi]
- Implementation and Improvement of Simulated Annealing Algorithm in Neural NetJianlan Guo, Yuqiang Chen, Xuanzi Hu. 519-522 [doi]
- Efficient and Secure Authentication Protocol for VANETHui Liu, Hui Li, Zhanxin Ma. 523-527 [doi]
- TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor NetworksTieming Chen, Liang Ge, Xiaohao Wang, Jiamei Cai. 528-532 [doi]
- Soft Information Improvement for PN Sequence Iterative AcquisitionWei Wang, Nianke Zong, Jie Tang, Sangarapillai Lambotharan. 533-536 [doi]
- Secure Signcryption Scheme Based on a Hybrid EncryptionChuanrong Zhang, Lianqing Zheng, Mingwen Xia, Yuqing Zhang. 537-540 [doi]
- P2P-Based Semantic Policy Infrastucture for Pervasive ComputingFang Pu, Linlang Liu, Yu Shen, Qiying Cao. 541-545 [doi]
- Design and Implementation of Object-Oriented Encryption Storage System Based on Trusted Computing PlatformJunjian Chen, Jingning Liu, Dan Feng. 546-550 [doi]
- AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment SchemeMona Hosseinkhani, Ebrahim Tarameshloo, Mehdi Shajari. 551-555 [doi]
- The Approach of ACARS Data Encryption and AuthenticationMeng Yue, Xiaofeng Wu. 556-560 [doi]
- Violence Detection in Movies with Auditory and Visual CuesJian Lin, Yi Sun, Weiqiang Wang. 561-565 [doi]
- Study on Commercial Bank Branches Performance Evaluation Using Self-Adaptive RBFNN and UDMXiaohua Diao, Shiying Kang. 566-569 [doi]
- An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy ContrastHuiyan Liu, Wenzhang He, Rui Liu. 570-573 [doi]
- An Automatic Evaluation Method for Chinese Name RecognitionYujian Li, Dedong Zhang, Zhen Yang. 574-576 [doi]
- Probability Based Approach for Target Detection and Pose Estimation in Infrared ImagesWeiguang Liu, Hailing Lai. 577-581 [doi]
- A Kind of Vector Space Representation Model Based on Semantic in the Field of English Standard InformationShibin Xiao, Zhu Shi, Kun Liu, Xueqiang Lv. 582-585 [doi]
- An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc NetworksDingde Jiang, Xingwei Wang, Zhengzheng Xu, Zhenhua Chen. 586-590 [doi]
- Discrete Bayesian-Based Scheme of Software Reliability Demonstration Testing with Decreasing Function for the Safety Critical SoftwareXuecheng Wang, Risheng Yang, Minyan Lu, Haifeng Li. 591-595 [doi]
- Generalized Additive Models of DEA and Generalized Non-Dominated Solution in Multi-objective ProgrammingHongye Song. 596-600 [doi]
- Ship 3D Collaborate Design Integration System ResearchShao-juan Su, Yin-dong Liu, Xiao-ming Liu. 601-605 [doi]
- An Efficient Solver for Differential Equations with Random InputsDong Qu, Ping Chen, Jing Yang 0001. 606-610 [doi]
- Capability Simulating Model for Complex Communication NetworkWang Yu, Xu Feng. 611-613 [doi]
- Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of KoreaRen Liang, Li-Bing. 614-618 [doi]
- Research on Game Algorithm for Zhang ChessZhenzhen Zhang, Defu Zhang. 619-623 [doi]
- Design Verification of BJUT Library Management System with PVSJingang Niu, Shenghui Su. 624-628 [doi]
- A Method to Find Chromatically Unique Multipartite GraphsHaixing Zhao, Zhuma Gao, Jun Yin. 629-633 [doi]
- Graph-Based Answer Passage Ranking for Question AnsweringXin Li, Enhong Chen. 634-638 [doi]
- Automatic Speech Corpus Construction from Broadcasting Speech DatabasesWei Zhang, Ranran Du, Minhui Pang, Qiuhong Wang. 639-643 [doi]
- A Reputation Calculation Model in E-Shopping WebsitesShiyu Wang, Sulin Pang. 644-648 [doi]
- Stock Index Futures Margin Level Settings by Hill Estimation and Empirical AnalysisManqi Wu, Sulin Pang. 649-653 [doi]
- A Digital Watermarking Scheme Used for Authentication of Surveillance VideoDuanquan Xu, Jiangshan Zhang, Baochuan Pang. 654-658 [doi]
- The Research of Internet of Things' Supporting Technologies Which Face the Logistics IndustryYuqiang Chen, Jianlan Guo, Xuanzi Hu. 659-663 [doi]
- A Non-Linear Model for Evaluating Professional Manager's Incentive EffectWenxue Niu, Zhenghong Wei, Quanju Zhang. 664-666 [doi]
- Computer Realization of Solving Tri-diagonal Equations by Gauss-Seidel MethodTianxiang Feng, Dingxiu He, Hongxia Liu. 667-670 [doi]
- Research of Signal Frequency Domain Resolution Based-EMDMeng Hou, Zeng-li Liu, Haiyan Quan, Yong-de Zhang. 671-675 [doi]
- A BCH Code with the Distance 11 for SensornetsGao-chang Zhao, Xiao-Lin Yang. 676-679 [doi]
- Image Denoising Using Nonseparable Wavelet and SURE-LETWu Zeng, Xiubao Jiang, ZhengQuan Xu, Long Zhou. 680-684 [doi]