Abstract is missing.
- A Chaos-Based Hash FunctionQi Wu. 1-4 [doi]
- A Novel Implementation of a Hash Function Based on XML DOM ParserDandan Yang, Zhiqiang Wei, Yongquan Yang. 5-8 [doi]
- Kernel Malware Core Implementation: A SurveyXiangyu Li, Yi Zhang, Yong Tang. 9-15 [doi]
- Simulation of the Users' Email Behavior Based on BP-BDI ModelYu Sheng, Jiang Rong, Wang Xiang. 16-22 [doi]
- A Hierarchical Framework of Security Situation Assessment for Information SystemYiyang Jia, Hanyan Wu, Dongxing Jiang. 23-28 [doi]
- XSS Vulnerability Detection Using Optimized Attack Vector RepertoryXiaobing Guo, Shuyuan Jin, Yaxing Zhang. 29-36 [doi]
- A 4-Dimensional Discrete Chaotic System and Application in Image Encryption with Avalanche EffectsShujie Yang, Lequan Min, E. Chen. 37-43 [doi]
- Advanced Classification Lists (Dirty Word Lists) for Automatic Security ClassificationPaal E. Engelstad, Hugo Hammer, Anis Yazidi, Aleksander Bai. 44-53 [doi]
- Analysis of Time-Dependencies in Automatic Security ClassificationPaal E. Engelstad, Hugo Hammer, Anis Yazidi, Aleksander Bai. 54-61 [doi]
- A Mixed Encryption Algorithm Used in Internet of Things Security Transmission SystemMingyuan Xin. 62-65 [doi]
- Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFATGuofu Ma, Zixian Wang, Yusi Cheng. 66-71 [doi]
- A CIM System for Use in the UCWWIvan Ganchev, Zhanlin Ji, Mairtin O'Droma, Chenxu Dai. 72-75 [doi]
- Application and Management of Cybersecurity Measures for Protection and ControlDennis K. Holstein, T. W. Cease, Maik G. Seewald. 76-83 [doi]
- Android Malware Detection Based on Static Analysis of Characteristic TreeQi Li, Xiaoyu Li. 84-91 [doi]
- The Multilinear Maps Based Certificateless Aggregate Signcryption SchemeYiliang Han, Fei Chen. 92-99 [doi]
- Randomized Ring-Partition Fingerprinting with Dithered Lattice Vector QuantizationCheolkon Jung, Lihui Cao. 100-103 [doi]
- A "Dynamic Tunnel" Defense Mechanism Based on GTP ProtocolQing Zhang, Caixia Liu. 104-109 [doi]
- An Application of Horizontal and Vertical Integration in Cyber-Physical Production SystemsQiong Liu, Junming Chen, Yuanquan Liao, Egon Müller, David Jentsch, Frank Boerner, Mingliang She. 110-113 [doi]
- A Decentralized Load Balancing Architecture for Cache SystemMengjing Song, Hui Li, Hao Wu. 114-119 [doi]
- Probabilistic Event Processing with Negation Operators in Cyber Physical SystemsNa Mao, Jie Tan. 120-126 [doi]
- Transformer Fault Diagnosis Algorithm Based on Entropy-Weighting Information Bottleneck MethodHongxing Lu, Yangdong Ye, Gang Chen. 127-130 [doi]
- Data Driven Condition Monitoring of Wind Power Plants Using Cluster AnalysisPeng Li, Jens Eickmeyer, Oliver Niggemann. 131-136 [doi]
- A New Method for Processing and Application of Wide Area Measurement Big Data in a Power SystemDunwen Song, Boying Wen, Xuetao Yang, Yubao Gu, Shiquan Wei, Shiying Ma. 137-140 [doi]
- Resource Optimization Strategy in Optical Grid Supporting Multi-channel TransmissionHuimin Gao, Yongzhou Wang, Liang Wang, Guomin Wang. 141-144 [doi]
- A Fast Parallel Genetic Algorithm for Graph Coloring Problem Based on CUDABuhua Chen, Bo Chen, Hongwei Liu, Xuefeng Zhang. 145-148 [doi]
- A Collocation Method for Weakly Singular Fredholm Integral EquationXiao-Ya Lv, Wei-Hua Luo. 149-151 [doi]
- Asymmetric Slepian-Wolf Coding Design with Spatially Coupled LDPC Convolutional CodesShumin Tu. 152-155 [doi]
- Generalized Stability Theorem for Non-autonomous Differential Equation with ApplicationMei Zhang, Lequan Min, Xiuping Yang. 156-163 [doi]
- Graph-Based Method for Detecting Occupy Protest Events Using GDELT DatasetFengcai Qiao, Pei Li, Jingsheng Deng, Zhaoyun Ding, Hui Wang. 164-168 [doi]
- The Relation of Energy-Consumption and the Population of PeopleHongliang Liang, Hongyan Cui. 169-175 [doi]
- A Hybrid Model for Experts Finding in Community Question AnsweringHai Li, Songchang Jin, Shudong Li. 176-185 [doi]
- Distributed Self-Diagnosis Algorithm for VoIP Service over IMS NetworkJingxian Lu, Christophe Dousson, Francine Krief. 186-191 [doi]
- Voting Based Seeding Algorithm for Overlapping Community DetectionYanmei Hu, Kaiyang Hu, Bo Yang, Nan Zhang, Xiaohui Gu. 192-199 [doi]
- Network User Interest Pattern Mining Based on Entropy Clustering AlgorithmChangda Xu, Shuoying Chen, Jing Cheng. 200-204 [doi]
- Aggregation Encoding: Reducing Network Traffic for Big Data Erasure-Coded StoragesJing Zhang, Shanshan Li, Xiangke Liao, Xiaodong Liu. 205-208 [doi]
- A Topic Detection Method Based on Microblog WeightKaijie Guo, Liang Shi. 209-212 [doi]
- TSM: Efficient Thermal and Server Management for Greening Data CentersJianxiong Wan, Gefei Zhang, Limin Liu, Ran Zhang. 213-216 [doi]
- Feature Extraction Algorithm and Optimization for Mass TV AudienceFan Zhang, Zheng Chen, Jinyao Yan. 217-220 [doi]
- An Improved Parallel Algorithm of Genetic Programming Based on the Framework of MapReduceSong Zhang, Jun Ma, Yang Yang Zhao, Qiong Liu. 221-225 [doi]
- Hadoop Job Scheduling Based on Mixed Ant-Genetic AlgorithmXiaofei Huang, Hui Zhou, Wei Wu. 226-229 [doi]
- A Big Data Online Cleaning Algorithm Based on Dynamic Outlier DetectionYinglong Diao, Ke-Yan Liu, Xiaoli Meng, Xueshun Ye, Kaiyuan He. 230-234 [doi]
- Mining High Utility Itemsets over Uncertain DatabasesYuqing Lan, Yang Wang, Yanni Wang, Shengwei Yi, Dan Yu. 235-238 [doi]
- Semi-supervised Bi-dictionary Learning Using Smooth Representation-Based Label PropagationMeng Jian, Cheolkon Jung. 239-242 [doi]
- A Semi-Supervised Machine Learning Method for Chinese Patent Effect AnnotationXu Chen, Na Deng. 243-250 [doi]
- An Overview of Event Extraction from TwitterJingsheng Deng, Fengcai Qiao, Hongying Li, Xin Zhang, Hui Wang. 251-256 [doi]
- A Deep Learning Method Combined Sparse Autoencoder with SVMYao Ju, Jun Guo, Shuchun Liu. 257-260 [doi]
- Understanding User Behavior in Large Scale Internet Video ServiceYawei He, Anming Wei, Wenhui Zhang, Hui Xiao. 261-267 [doi]
- Empirical Study on Alignment of Cloud Computing in EnterprisesMingxing Shao, Long Peng, Yanan Fan. 268-272 [doi]
- An Improved Information Gain Feature Selection Algorithm for SVM Text ClassifierJiamin Xu, Hong Jiang. 273-276 [doi]
- Modeling and Analysis the Evolution of Herding Behavior in Public Opinion PropagationLi Yong, Li Li, Zou Kai. 277-281 [doi]
- Research on Spreading Mechanism of Network Rumors Based on Potential EnergyLi Wang, Fengming Liu, Rongrong Yang, Wenxing Sun. 282-285 [doi]
- Data Deduplication Mechanism for Cloud Storage SystemsXiaolong Xu, Qun Tu. 286-294 [doi]
- Analysis of Energy Consumption of Deduplication in Storage SystemsYizhou Yan, Wenjun Wu 0001. 295-301 [doi]
- The Status Prediction of Physical Machine in IaaS Cloud EnvironmentQingxin Xia, Yuqing Lan, Limin Xiao. 302-305 [doi]
- Bayesian Analysis of Mixture Normal Model via Equi-Energy Sampler and Improved Metropolis-Hastings AlgorithmWei Shao, Guoqing Zhao, Feifei Shao. 306-309 [doi]
- Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly AlgorithmHuailin Dong, Mingyuan He, Ming Qiu. 310-313 [doi]
- Concurrency Analysis and Implementation of SAR Imaging Algorithm Oriented to Hybrid Storage SystemJing Du, Fujiang Ao, Sai Sui, Huabing Wang. 314-319 [doi]
- Combining Visual Saliency and Pattern Masking for Image SteganographyLihui Cao, Cheolkon Jung. 320-323 [doi]
- Real-Time Depth-Image-Based Rendering on GPUZengzeng Sun, Cheolkon Jung. 324-328 [doi]
- Survey on Image Saliency Detection MethodsRunxin Ma, Yang Yu, Xiaomin Yue. 329-338 [doi]
- Performance Evaluations of Graph Spectra on Evolving SystemsBo Jiao, Yuan-Ping Nie, Jing Du, Ying Zhou, Chengdong Huang, Xun-Long Pang. 339-342 [doi]
- Comparison Between Controllers of Polynomial Fuzzy Control SystemXiaodong Zhang, Hugang Han, Yuki Higaki. 343-349 [doi]
- Video Minor Motion Magnification System for TelemedicineYi Zhang, Tao Yang. 350-353 [doi]
- Performance-Conscious Reconfiguration Structure for Large-Scale Coarse-Grained Reconfigurable SystemBo Liu, Yu Gong, Rui-he Wang, Yang Liu. 354-359 [doi]
- Impacts of Road Grade on Fuel Consumption of Light Vehicles by Use of Google Earth DEMYanni Wang, Xiaoping Du, Haitao Yu, Jian Huang, Yonghao Li. 360-363 [doi]
- RESTful Web Service Matching Based on WADLYang Xue, Chunhong Zhang, Yang Ji. 364-371 [doi]
- Wireless Sensors in Farmland Environmental MonitoringJuan Xu, Jianjun Zhang, Xuehui Zheng, Xing Wei, Jianghong Han. 372-379 [doi]
- An Algorithm to Generate Data Linkages of Linked Sensor DataLin-Na Cuan, Yi-Min Shi, Guan-yu Li, Xue-Hua Wu, Ning Liu. 380-383 [doi]
- Design of Sense Amplifier in the High Speed SRAMYong-Peng Tao, Wei-ping Hu. 384-387 [doi]
- A Novel Energy Efficient Coding-Aware Scheme in Wireless Sensor NetworksHanxu Zheng, Caihong Kai, Mengqi Yan, Qinglin Zhao. 388-394 [doi]
- An Improved Dynamic Z* Algorithm for Rapid Replanning of Energy-Efficient PathsNuwan Ganganath, Chi-Tsun Cheng, Chi K. Tse. 395-398 [doi]
- Doppler Shift and Height Detection of Obstacle Based on FMCW Radar SensorHongping Zhou, Quanbo Liu, Dapeng Chen, Wenliang Chen, Fei Shen. 399-402 [doi]
- An Energy-Efficient System of Counteraction Against Attacks in the Mobile Wireless Sensor NetworksElena Basan, Oleg B. Makarevich. 403-410 [doi]
- A Real-Time ASL Recognition System Using Leap Motion SensorsKai-Yin Fok, Nuwan Ganganath, Chi-Tsun Cheng, Chi K. Tse. 411-414 [doi]
- Research on the Architecture of Wildlife Observation and Communication SystemXiaohan Liu, Tao Yang, Baoping Yan. 415-418 [doi]
- Reconfigurable Antenna Based Blind Interference Alignment over Heterogenous Block Fading ChannelsYubo Li, Min Peng, Qing Feng Zhou. 419-422 [doi]
- A Generalized Robust Chinese Remainder Theorem of Dual-Band Integers for Phase UnwrappingBin Yang, Xinyu Li. 423-429 [doi]
- An Algorithm to Generate Data Linkages of Linked Sensor DataLin-Na Cuan, Yi-Min Shi, Guan-yu Li, Xue-Hua Wu, Ning Liu. 430-433 [doi]
- A Dynamic Allocation Algorithm for Physical Carrier Resource in BBU Pool of Virtualized Wireless NetworkGanqiang Lu, Caixia Liu, Lingshu Li, Quan Yuan. 434-441 [doi]
- Shaping Filter Design for Faster-than-Nyquist Signaling with Second Order Polynomial FunctionQimei Chen, Han Zhang. 442-445 [doi]
- Joint Resource Allocation for Uplink Virtual MIMO Systems under Elastic MSE ConstraintXiaofeng Lu, Shaojun Qiu, Wenna Li, Ya Gao, Hailin Zhang. 446-452 [doi]
- Precoding Schemes for the Gaussian Wire-Tap ChannelsJun Cheng. 453-457 [doi]
- Waveform Design for Tracking SystemsXinxi Le. 458-462 [doi]
- Channel Adjustment for Performance Enhancement in Wireless NetworksYuanyuan Wu, Yu Zhao, Yunhuai Liu. 463-472 [doi]
- A Signal Analysis Design Based on LabVIEWXiangwen Zhai, Minglun Zhang, Xiaonan Bai, Zhidan Zhang. 473-476 [doi]
- An Off-Line Implementation of OFDM in a Visible Light Communication SystemXiaonan Bai, Minglun Zhang, Xiangwen Zhai. 477-480 [doi]
- A Sleep Scheduling Mechanism Based on Power Law Distribution for Mobile Delay Tolerate NetworksYankun Feng, Xiangyu Bai, Na Dang, Shufang Wang. 481-490 [doi]
- Performance of SDN Routing in Comparison with Legacy Routing ProtocolsHailong Zhang, Jinyao Yan. 491-494 [doi]
- High Reliable Routing Protocol Based on the Cross-Layer Constraints of Channel State Association Information for MHWNsLi Lou, Jian-Hua Fan, Xiao-Xie Xu, Yong-Yang Hu. 495-498 [doi]
- k -Maximally Disjoint Path Routing Algorithms for SDNJohn Olorunfemi Abe, Haci Ali Mantar, Aysegül Gençata Yayimli. 499-508 [doi]
- Community Detection Analysis of Heterogeneous NetworkShuai Du, Kai Niu, Zhiqiang He, Yuqian Qiao. 509-512 [doi]
- QoS Performance Analysis for the Second User in the Overlay Cognitive Radio NetworksJunbo Hua, Ningning Jiang. 513-516 [doi]
- Optimization Algorithm Based on SPSA in Multi-channel Multi-radio Wireless Monitoring NetworkSheng Ding, Na Xia, Peipei Wang, Shaojie Li, Yuanxiao Ou. 517-524 [doi]
- Wireless Campus Network Design and Optimization Based on OPNETJuanjuan Wang, Xiangyu Bai, Junli She. 525-528 [doi]
- Queuing-Theoretical Multi-user Spectrum Sensing and Access in Multi-channel Cognitive Radio NetworksLong Zhang, Liusheng Huang, Hongli Xu. 529-537 [doi]
- A RCP-Based Congestion Control Protocol in Named Data NetworkingKai Lei, Chaojun Hou, Lihua Li, Kuai Xu. 538-541 [doi]
- An Inverse Problem in Wireless Mesh NetworkMohammad S. Khan, Anup Kumar, Bin Xie 0001. 542-545 [doi]
- MR-Verifier: Verifying Open Flow Network Properties Based on MapReduceYi Liu, Cheng Lei, Hongqi Zhang. 546-553 [doi]