Abstract is missing.
- Meta-Path and Matrix Factorization Based Shilling Detection for Collaborate FilteringXin Zhang, Hong Xiang, Yuqi Song. 3-16 [doi]
- Collaborative Thompson SamplingZhenyu Zhu, Liusheng Huang, Hongli Xu. 17-32 [doi]
- Collaborative Workflow Scheduling over MANET, a User Position Prediction-Based ApproachQinglan Peng, Qiang He, Yunni Xia, Chunrong Wu, Shu Wang. 33-52 [doi]
- Worker Recommendation with High Acceptance Rates in Collaborative Crowdsourcing SystemsMingChu Li, Xiaomei Sun, Xing Jin, Linlin Tian. 53-74 [doi]
- Cost-Aware Targeted Viral Marketing with Time Constraints in Social NetworksKe Xu, Kai Han. 75-91 [doi]
- Exploring Influence Maximization in Location-Based Social NetworksShasha Li, Kai Han, Jiahao Zhang. 92-111 [doi]
- Measuring Bidirectional Subjective Strength of Online Social Relationship by Synthetizing the Interactive Language Features and Social Balance (Short Paper)Baixiang Xue, Bo Wang 0011, Yanshu Yu, Ruifang He, Yuexian Hou, Dawei Song 0001. 112-123 [doi]
- Recommending More Suitable Music Based on Users' Real ContextQing Yang, Le Zhan, Li Han, Jingwei Zhang, Zhongqin Bi. 124-137 [doi]
- A Location Spoofing Detection Method for Social Networks (Short Paper)Chaoping Ding, Ting Wu, Tong Qiao, Ning Zheng 0001, Ming Xu 0001, Yiming Wu, Wenjing Xia. 138-150 [doi]
- The Three-Degree Calculation Model of Microblog Users' Influence (Short Paper)Xueying Sun, Fu Xie. 151-160 [doi]
- Identifying Local Clustering Structures of Evolving Social Networks Using Graph Spectra (Short Paper)Bo Jiao, Yiping Bao, Jin Wang. 161-169 [doi]
- The Parallel and Precision Adaptive Method of Marine Lane Extraction Based on QuadTreeZhuoran Li, Guiling Wang, Jinlong Meng, Yao Xu. 170-188 [doi]
- GPU-accelerated Large-Scale Non-negative Matrix Factorization Using SparkBing Tang, Linyao Kang, Yanmin Xia, Li Zhang. 189-201 [doi]
- Adaptive Data Sharing Algorithm for Aerial Swarm Coordination in Heterogeneous Network Environments (Short Paper)Yanqi Zhang, Bo Zhang 0007, Xiaodong Yi. 202-210 [doi]
- Reverse Collective Spatial Keyword Querying (Short Paper)Yang Wu 0006, Jian Xu 0001, Liming Tu, Ming Luo 0007, Zhi Chen, Ning Zheng 0001. 211-221 [doi]
- Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)Jian Xu 0010, Xiaochun Yun, Yongzheng Zhang 0002, Zhenyu Cheng. 222-232 [doi]
- Safety Message Propagation Using Vehicle-Infrastructure Cooperation in Urban Vehicular NetworksXiaolan Tang, Zhi Geng, Wenlong Chen. 235-251 [doi]
- Predicting Duration of Traffic Accidents Based on Ensemble LearningLina Shan, Zikun Yang, Huan Zhang, Ruyi Shi, Li Kuang. 252-266 [doi]
- A Single-Hop Selection Strategy of VNFs Based on Traffic Classification in NFVBo He, Jingyu Wang, Qi Qi 0001, Haifeng Sun. 267-283 [doi]
- A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper)Chen Zhao, Yongzheng Zhang 0002, Tianning Zang, Zhizhou Liang, Yipeng Wang. 284-294 [doi]
- Grid Clustering and Routing Protocol in Heterogeneous Wireless Sensor Networks (Short Paper)Zheng Zhang, Pei Hu. 295-309 [doi]
- GeoBLR: Dynamic IP Geolocation Method Based on Bayesian Linear RegressionFei Du, Xiuguo Bao, Yongzheng Zhang 0002, Yu Wang. 310-328 [doi]
- MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile UsersZhenyu Cheng, Xunxun Chen, Yongzheng Zhang 0002, Shuhao Li, Jian Xu 0010. 329-345 [doi]
- Delayed Wake-Up Mechanism Under Suspend Mode of SmartphoneBo Chen 0010, Xi Li 0003, Xuehai Zhou, Zongwei Zhu. 346-355 [doi]
- Mobile Data Sharing with Multiple User Collaboration in Mobile Crowdsensing (Short Paper)Changjia Yang, Peng Li, Tao Zhang, Yu Jin, Heng He, Lei Nie, Qin Liu 0003. 356-365 [doi]
- Exploiting Sociality for Collaborative Message Dissemination in VANETsWeiyi Huang, Peng Li, Tao Zhang, Yu Jin, Heng He, Lei Nie, Qin Liu 0003. 366-385 [doi]
- An Efficient Traffic Prediction Model Using Deep Spatial-Temporal NetworkJie Xu 0009, Yong Zhang 0002, Yongzheng Jia, Chunxiao Xing. 386-399 [doi]
- Assessing Data Anomaly Detection Algorithms in Power Internet of ThingsZixiang Wang, Zhoubin Liu, Xiaolu Yuan, Yueshen Xu, Rui Li. 403-416 [doi]
- PARDA: A Dataset for Scholarly PDF Document Metadata Extraction EvaluationTiantian Fan, Junming Liu, Yeliang Qiu, Congfeng Jiang, Jilin Zhang, Wei Zhang, Jian Wan. 417-431 [doi]
- New Cross-Domain QoE Guarantee Method Based on Isomorphism FlowZaijian Wang, Chen Chen, Xinheng Wang, Lingyun Yang, Pingping Tang. 432-447 [doi]
- Extracting Business Execution Processes of API Services for Mashup CreationGuobing Zou, Yang Xiang, Pengwei Wang, Shengye Pang, Honghao Gao, Sen Niu, Yanglan Gan. 448-466 [doi]
- An Efficient Quantum Circuits Optimizing Scheme Compared with QISKit (Short Paper)Xin Zhang, Hong Xiang, Tao Xiang. 467-476 [doi]
- Feature-based Online Segmentation Algorithm for Streaming Time Series (Short Paper)Peng Zhan, Yupeng Hu, Wei Luo, Yang Xu, Qi Zhang, Xueqing Li. 477-487 [doi]
- MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS DataChengwei Peng, Xiaochun Yun, Yongzheng Zhang 0002, Shuhao Li. 488-503 [doi]
- Learning from High-Degree Entities for Knowledge Graph ModelingTienan Zhang, Fangfang Liu, Yan Shen, Honghao Gao, Jing Duan. 504-517 [doi]
- Target Gene Mining Algorithm Based on gSpanLiangfu Lu, Xiaoxu Ren, Lianyong Qi, Chenming Cui, Yichen Jiao. 518-528 [doi]
- Booter Blacklist Generation Based on Content CharacteristicsWang Zhang, Xu Bai, Chanjuan Chen, Zhaolin Chen. 529-542 [doi]
- A 2D Transform Based Distance Function for Time Series ClassificationCun Ji, Xiunan Zou, Yupeng Hu, Shijun Liu. 543-559 [doi]
- Research on Access Control of Smart Home in NDN (Short Paper)Rina Wu, Bo Cui, Ru Li. 560-570 [doi]
- The Realization of Face Recognition Algorithm Based on Compressed Sensing (Short Paper)Huimin Zhang, Yan Sun, Haiwei Sun, Xin Yuan. 571-580 [doi]
- An On-line Monitoring Method for Monitoring Earth Grounding Resistance Based on a Hybrid Genetic Algorithm (Short Paper)Guangxin Zhang, Minzhen Wang, Xinheng Wang, Liying Zhao, Jinyang Zhao. 581-591 [doi]
- How Good is Query Optimizer in Spark?Zujie Ren, Na Yun, Youhuizi Li, Jian Wan, Yuan Wang, Lihua Yu, Xinxin Fan. 595-609 [doi]
- An Optimized Multi-Paxos Protocol with Centralized Failover Mechanism for Cloud Storage ApplicationsWenmin Lin, Hao Jiang, Nailiang Zhao, Jilin Zhang. 610-625 [doi]
- A Resource Usage Prediction-Based Energy-Aware Scheduling Algorithm for Instance-Intensive Cloud WorkflowsZhibin Wang, Yiping Wen, Yu Zhang, Jinjun Chen, Buqing Cao. 626-642 [doi]
- Web Service Discovery Based on Information Gain Theory and BiLSTM with Attention MechanismXiangping Zhang, Jianxun Liu, Buqing Cao, Qiaoxiang Xiao, Yiping Wen. 643-658 [doi]
- Neighborhood-Based Uncertain QoS Prediction of Web Services via Matrix FactorizationGuobing Zou, Shengye Pang, Pengwei Wang, Huaikou Miao, Sen Niu, Yanglan Gan, Bofeng Zhang. 659-675 [doi]
- Runtime Resource Management for Microservices-Based Applications: A Congestion Game Approach (Short Paper)Ruici Luo, Wei Ye, Jinan Sun, Xueyang Liu, Shikun Zhang. 676-687 [doi]
- CPN Model Based Standard Feature Verification Method for REST Service ArchitectureJing Liu 0003, Zhen-Tian Liu, Yu-Qiang Zhao. 688-707 [doi]
- Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper)Lei Yu, Shanshan Liang, Shiping Chen, Yaoyao Wen. 708-716 [doi]
- A Hardware/Software Co-design Approach for Real-Time Binocular Stereo Vision Based on ZYNQ (Short Paper)Yukun Pan, Minghua Zhu, Jufeng Luo, Yunzhou Qiu. 719-733 [doi]
- The Cuckoo Search and Integer Linear Programming Based Approach to Time-Aware Test Case Prioritization Considering Execution EnvironmentYu Wong, Hongwei Zeng, Huaikou Miao, Honghao Gao, Xiaoxian Yang. 734-754 [doi]
- Using Hybrid Model for Android Malicious Application Detection Based on Population (Short Paper)Zhijie Xiao, Tao Li 0018, Yuqiao Wang. 755-766 [doi]