Abstract is missing.
- An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing EnvironmentBhavesh N. Gohil, Dhiren R. Patel. 3-9 [doi]
- Indexed Coinduction in a Fibrational SettingDecheng Miao, Jianqing Xi. 10-16 [doi]
- Porting and Optimizing VASP on the SW26010Leisheng Li, Qiao Sun, Xin Liu, Changmao Wu, Haitao Zhao, Changyou Zhang. 17-26 [doi]
- A Data Reuse Method for Fast Search Motion EstimationHongjie Li, Yanhui Ding, Weizhi Xu, Hui Yu, Li Sun. 27-33 [doi]
- I-Center Loss for Deep Neural NetworksSenlin Cheng, Liutong Xu. 34-44 [doi]
- Nodes Deployment Optimization Algorithm of Underwater Wireless Sensor NetworksMin Cui, Fengtong Mei, Qiangyi Li, Qiangnan Li. 45-50 [doi]
- A Novel Kernel Clustering Method for SVM Training Sample ReductionTong-Bo Wang. 51-58 [doi]
- Implementation of Beamforming for Large-Scale Circular Array Sonar Based on Parallel FIR Filter Structure in FPGAJun Wang, Junsheng Jiao. 59-65 [doi]
- A Practical and Aggressive Loop Fission TechniqueBo Zhao 0010, Yingying Li, Lin Han, Jie Zhao, Wei Gao 0011, Rongcai Zhao, Ramin Yahyapour. 66-75 [doi]
- Super-Sampling by Learning-Based Super-ResolutionPing Du, Jinhuan Zhang, Jun Long. 76-83 [doi]
- Nodes Deployment Optimization Algorithm Based on Improved Evidence TheoryXiaoli Song, Yunzhan Gong, Dahai Jin, Qiangyi Li, Hengchang Jing. 84-89 [doi]
- The Research and Implementation of a Distributed Crawler System Based on Apache FlinkFeng Ye, Zongfei Jing, Qian Huang, Cheng Hu, Yong Chen 0009. 90-98 [doi]
- A Security Reinforcement Technology of Telematics Box Based on Secure ElementSun Yanan, Shen Jie, Yang Zhou. 101-116 [doi]
- Detecting Fake Reviews Based on Review-Rating Consistency and Multi-dimensional Time SeriesYouli Fang, Hong Wang 0015, Ruitong Di, Lutong Wang, Jin Li. 117-123 [doi]
- Fake Comment Detection Based on Time Series and Density Peaks ClusteringRuitong Di, Hong Wang 0015, Youli Fang, Ying Zhou. 124-130 [doi]
- Towards Android Application Protection via Kernel ExtensionTuo Wang, Lu Liu, Chongzhi Gao, Jingjing Hu, Jingyu Liu. 131-137 [doi]
- Threats and Coping Strategies Under the IOTZeping Li, Huwei Liu, Ning Cao. 138-144 [doi]
- Framework Design of Financial Service Platform for Tobacco Supply Chain Based on BlockchainHuwei Liu, Zeping Li, Ning Cao 0002. 145-150 [doi]
- Research on Application of Logistics Service Quality Management Based on BlockchainLili Sun, Zhaochan Li, Ning Cao 0002, Li Zhou. 151-157 [doi]
- Research on the Application of RFID Technology in Logistics Warehousing Management SystemJing Liu, Zhaochan Li, Lili Sun, JinLong Wang, Ning Cao 0002. 158-164 [doi]
- A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data EnvironmentRuomeng Xu, Jieren Cheng, Fengkai Wang, Xiangyan Tang, Jinying Xu. 165-176 [doi]
- An Improved Authentication Protocol in Telemedicine SystemLijuan Zheng, Yunjia Zhang, Rui Zhang, Jianyou Chen, Meng Cui, Chunlei Song. 177-184 [doi]
- Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic DataJing Lu, Yuxiang Chen, Hui Tian 0002, Yonghong Chen, Tian Wang 0001, Yiqiao Cai. 185-191 [doi]
- Feature Extraction of Dichotomous Equipment Based on Non-intrusive Load Monitoring and DecompositionFangping Li, Wei Zhang, Heng Liu, Maosheng Zhang. 192-200 [doi]