Abstract is missing.
- Sentiment Analysis of Chinese Words Using Word Embedding and Sentiment Morpheme MatchingJianwei Niu, Mingsheng Sun, Shasha Mo. 3-12 [doi]
- Collaborative and Green Resource Allocation in 5G HetNet with Renewable EnergyYi Liu, Yue Gao, Shengli Xie, Yan Zhang. 13-26 [doi]
- On Cost Efficient Dataflow Computing Program Deployment in SDN Managed Distributed Computing EnvironmentYating Zhang, Yuepeng Li, Long Zheng 0001, Deze Zeng. 27-36 [doi]
- A Short Review of Constructing Noise Map Using Crowdsensing TechnologyXuhui Zhang, Lei Shu, Zhiqiang Huo, Mithun Mukherjee 0001, Yu Zhang. 37-43 [doi]
- Research of Positioning Tracking on Dynamic Target Based on the Integral Complementing AlgorithmJianrong Xu, Guiping Lu, Jingsheng Lin, Jianfeng Huang. 44-52 [doi]
- LWTP: An Improved Automatic Image Annotation Method Based on Image SegmentationJianwei Niu, Shijie Li, Shasha Mo, Jun Ma. 53-62 [doi]
- A Comparative Analysis of Content Delivery Capability for Collaborative Dual-Architecture NetworkXuan Liu 0006, Peng Yang, Yongqiang Dong, Syed Hassan Ahmed. 63-72 [doi]
- AXE: Objects Search in Mobile Volunteered ServiceYao Wu, WenJuan Liang, Yuncheng Wu, Hong Chen, Cuiping Li. 73-87 [doi]
- Modeling the Impacts of WiFi Signals on Energy Consumption of SmartphonesYuxia Sun, Junxian Chen, Yong Tang. 88-97 [doi]
- Constrained Route Planning Based on the Regular ExpressionJing Wang, Huiping Liu, Zhao Zhang. 98-108 [doi]
- A Human-Machine Collaborative Detection Model for Identifying Web AttacksYong Hu, Bo Li, Weijing Ye, Guiqin Yuan. 109-119 [doi]
- A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud EnvironmentYi Wei, Daniel Kudenko, Shijun Liu, Li Pan, Lei Wu 0002, Xiangxu Meng. 120-131 [doi]
- p-Faster R-CNN Algorithm for Food DetectionYanchen Wan, Yu Liu, Yuan Li, Puhong Zhang. 132-142 [doi]
- PUED: A Social Spammer Detection Method Based on PU Learning and Ensemble LearningYuqi Song, Min Gao 0001, Junliang Yu, Wentao Li, Lulan Yu, Xinyu Xiao. 143-152 [doi]
- Position vs. Attitude: How Topological Factors Influence Our Difference in the Attitudes on Online Interrelationships? A Case Study with Language UseBo Wang, Yingjun Sun, Yuexian Hou, Dawei Song 0001, Ruifang He. 153-163 [doi]
- Route-Oriented Participants Recruitment in Collaborative CrowdsensingShu Yang, Jinglin Li, Quan Yuan 0004, Zhihan Liu. 164-175 [doi]
- Management Node Selection Based on Cloud Model in a Distributed NetworkHanyi Tang, Qibo Sun, Jinglin Li. 176-185 [doi]
- CNTE: A Node Centrality-Based Network Trust Evaluation MethodXiang Yuan, Qibo Sun, Jinglin Li. 186-196 [doi]
- Minimum Cost Load Migration in Distributed Software Defined NetworksKuangyu Qin, Chuanhe Huang, N. Ganesan, Kewei Liu. 197-207 [doi]
- Hybrid-Aware Collaborative Multipath Communications for Heterogeneous Vehicular NetworksYana Liu, Wei Quan, Jinjie Zeng, Gang Liu, Hongke Zhang. 208-218 [doi]
- RETaIL: A Machine Learning-Based Item-Level Localization System in Retail EnvironmentXiaoyi Xu, Xiaoming Chen, Jiang Ji, Feng Chen, Addicam V. Sanjay. 221-231 [doi]
- A Point of Interest Recommendation Approach by Fusing Geographical and Reputation Influence on Location Based Social NetworksJun Zeng, Feng Li, Junhao Wen, Wei Zhou. 232-242 [doi]
- An Electricity Power Collection Data Oriented Missing Data Imputation SolutionJiangqi Chen, Han Li, Ting Zhao, He Liu. 243-252 [doi]
- Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial EquipmentShouli Zhang, Xiaohong Li, Jianwu Wang, Shen Su. 253-263 [doi]
- Predicting Next Points of Interests Based on a Markov ModelJie Xu, Chunxiao Xing, Yong Zhang. 264-274 [doi]
- A Topology-Aware Reliable Broadcast Scheme for Multidimensional VANET ScenariosFengrui Liu, Chuanhe Huang, Xiying Fan. 275-285 [doi]
- MAC-ILoc: Multiple Antennas Cooperation Based Indoor Localization Using Cylindrical Antenna ArraysJie Wu, Minghua Zhu, Bo Xiao. 286-295 [doi]
- Easing Traffic Congestion: An Improved Clustering Method for Sharing Bike Station DeploymentJian Kang, Weipeng Jing, Chengfang Zhao. 296-308 [doi]
- Sensor Data Classification for the Indication of Lameness in SheepZainab Al-Rubaye, Ali Al-Sherbaz, Wanda McCormick, Scott J. Turner. 309-320 [doi]
- Learning Planning and Recommendation Based on an Adaptive Architecture on Data Graph, Information Graph and Knowledge GraphLixu Shao, Yucong Duan, ZhangBing Zhou, Quan Zou 0001, Honghao Gao. 323-332 [doi]
- A 3D Registration Method Based on Indoor Positioning Through NetworkingHaibo Li, Huahu Xu, Honghao Gao, Minjie Bian, Huaikou Miao. 333-343 [doi]
- A Load Balancing Method Based on Node Features in a Heterogeneous Hadoop ClusterPengcheng Yang, Honghao Gao, Huahu Xu, Minjie Bian, Danqi Chu. 344-354 [doi]
- Towards Collaborative Typed Resources Manipulation in Health-Care EnvironmentsLixu Shao, Yucong Duan, ZhangBing Zhou, Antonella Longo, Donghai Zhu, Honghao Gao. 355-364 [doi]
- Constructing Search as a Service Towards Non-deterministic and Not Validated Resource Environment with a Positive-Negative StrategyYucong Duan, Lixu Shao, Xiaobing Sun, LiZhen Cui, Donghai Zhu, Zhengyang Song. 365-373 [doi]
- A Passenger Flow Analysis Method Through Ride Behaviors on Massive Smart Card DataWeilong Ding, Zhuofeng Zhao, Han Li, Yaqi Cao, Yang Xu. 374-382 [doi]
- Ranking the Influence of Micro-blog Users Based on Activation Forwarding RelationshipYiwei Yang, Wenbin Yao, Dongbin Wang. 383-393 [doi]
- UR Rank: Micro-blog User Influence Ranking Algorithm Based on User RelationshipWenbin Yao, Yiwei Yang, Dongbin Wang. 394-404 [doi]
- Using the MapReduce Approach for the Spatio-Temporal Data Analytics in Road Traffic Crowdsensing ApplicationSandhya Armoogum, Shevam Munchetty-Chendriah. 405-415 [doi]
- An Efficient Critical Incident Propagation Model for Social Networks Based on Trust FactorXiaoming Li, Limengzi Yuan, ChaoChao Liu, Wei Yu 0016, Xue Chen, Guangquan Xu. 416-424 [doi]
- Impact of the Important Users on Social Recommendation SystemZehua Zhao, Min Gao 0001, Junliang Yu, Yuqi Song, Xinyi Wang, Min Zhang. 425-434 [doi]
- Analysis on Communication Cost and Team Performance in Team Formation ProblemWeijun Chen, Jing Yang, Yang Yu. 435-443 [doi]
- An Efficient Black-Box Vulnerability Scanning Method for Web ApplicationHaoxia Jin, Ming Xu, Xue Yang, Ting Wu, Ning Zheng 0001, Tao Yang. 444-455 [doi]
- Collaborative Shilling Detection Bridging Factorization and User EmbeddingTong Dou, Junliang Yu, Qingyu Xiong, Min Gao 0001, Yuqi Song, Qianqi Fang. 459-469 [doi]
- Integrating User Embedding and Collaborative Filtering for Social RecommendationsJunliang Yu, Min Gao 0001, Yuqi Song, Qianqi Fang, Wenge Rong, Qingyu Xiong. 470-479 [doi]
- CORB-SLAM: A Collaborative Visual SLAM System for Multiple RobotsFu Li, Shaowu Yang, Xiaodong Yi, Xuejun Yang. 480-490 [doi]
- An Efficient and Privacy Preserving CP-ABE Scheme for Internet-Based CollaborationJinmiao Wang, Bo Lang. 493-507 [doi]
- An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETsJie Cui 0004, Wenyu Xu, Kewei Sha, Hong Zhong 0001. 508-518 [doi]
- ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and EmbeddingsYafei Sang, Yongzheng Zhang 0002, Chengwei Peng. 519-529 [doi]
- Formal Verification of Authorization Policies for Enterprise Social Networks Using PlusCal-2Sabina Akhtar, Ehtesham Zahoor, Olivier Perrin 0001. 530-540 [doi]
- High Performance Regular Expression Matching on FPGAJiajia Yang, Lei Jiang, Xu Bai, Qiong Dai. 541-553 [doi]
- Adaptive Carving Method for Live FLV StreamingHaidong Ge, Ning Zheng 0001, Lin Cai, Ming Xu, Tong Qiao, Tao Yang, Jinkai Sun, Sudeng Hu. 554-566 [doi]
- Android App Classification and Permission Usage Risk AssessmentYidong Shen, Ming Xu, Ning Zheng 0001, Jian Xu, Wenjing Xia, Yiming Wu, Tong Qiao, Tao Yang. 567-577 [doi]
- A Privacy Settings Prediction Model for Textual Posts on Social NetworksLijun Chen, Ming Xu, Xue Yang, Ning Zheng 0001, Yiming Wu, Jian Xu, Tong Qiao, Hongbin Liu. 578-588 [doi]
- HSAStore: A Hierarchical Storage Architecture for Computing Systems Containing Large-Scale Intermediate DataZhoujie Zhang, Limin Xiao, Shubin Su, Li Ruan, Bing Wei, Nan Zhou, Xi Liu, Haitao Wang, Zipeng Wei. 591-601 [doi]
- Early Notification and Dynamic Routing: An Improved SDN-Based Optimization Mechanism for VM MigrationXuanlong Qin, Dagang Li, Ching-Hsuan Chen, Nen-Fu Huang. 602-612 [doi]
- Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos SequenceYijie Chen, Wenbin Yao. 613-623 [doi]
- Performance Analysis of Storm in a Real-World Big Data Stream Computing EnvironmentHongbin Yan, Dawei Sun 0001, Shang Gao 0003, ZhangBing Zhou. 624-634 [doi]
- Shortest Path Discovery in Consideration of Obstacle in Mobile Social Network EnvironmentsDawei Sun 0001, Wentian Qu, Shang Gao 0003, Li Liu. 637-646 [doi]
- Minimize Residual Energy of the 3-D Underwater Sensor Networks with Non-uniform Node Distribution to Prolong the Network LifetimeGaotao Shi, Jia Zeng, Chunfeng Liu, Keqiu Li. 647-659 [doi]
- Combinational Meta-paths Mining for Correlation Relationship Evaluation in Bibliographic NetworksQinchen Wu, Peng Wu, Li Pan. 660-669 [doi]
- Detecting Spammer Communities Using Network Structural FeaturesWen Zhou 0001, Meng Liu, Yajun Zhang. 670-679 [doi]
- Citation Based Collaborative Summarization of Scientific Publications by a New Sentence Similarity MeasureChengzhe Yuan, Dingding Li, Jia Zhu, Yong Tang, Shahbaz Wasti, Chaobo He, Hai Liu, Ronghua Lin. 680-689 [doi]
- Exploiting User Activities for Answer Ranking in Q&A ForumsChenyang Zhao, Liutong Xu, Hai Huang. 693-703 [doi]
- A Two-Level Classifier Model for Sentiment AnalysisHaidong Hao, Li Ruan, Limin Xiao, Shubin Su, Feng Yuan, Haitao Wang, Jianbin Liu. 704-717 [doi]
- An Effective Method for Self-driving Car Navigation based on LidarMeng Liu, Yu Liu, Jianwei Niu, Yu Du, Yanchen Wan. 718-727 [doi]