Abstract is missing.
- ALE Method for a Rotating Structure Immersed in the Fluid and Its Application to the Artificial Heart Pump in HemodynamicsPengtao Sun, Wei Leng, Chen-song Zhang, Rihui Lan, Jinchao Xu. 9-23 [doi]
- Free Surface Flow Simulation of Fish Turning MotionSadanori Ishihara, Masashi Yamakawa, Takeshi Inomono, Shinichi Asao. 24-36 [doi]
- Circular Function-Based Gas-Kinetic Scheme for Simulation of Viscous Compressible FlowsZhuxuan Meng, Liming Yang, Donghui Wang, Chang Shu 0002, Weihua Zhang. 37-47 [doi]
- A New Edge Stabilization Method for the Convection-Dominated Diffusion-Convection EquationsHuoyuan Duan, Yu Wei. 48-60 [doi]
- Symmetric Sweeping Algorithms for Overlaps of Quadrilateral Meshes of the Same ConnectivityXihua Xu, Shengxin Zhu. 61-75 [doi]
- A Two-Field Finite Element Solver for Poroelasticity on Quadrilateral MeshesGraham Harper, Jiangguo Liu, Simon Tavener, Zhuoran Wang. 76-88 [doi]
- Preprocessing Parallelization for the ALT-AlgorithmGenaro Peque Jr., Junji Urata, Takamasa Iryo. 89-101 [doi]
- Efficient Linearly and Unconditionally Energy Stable Schemes for the Phase Field Model of Solid-State Dewetting ProblemsZhengkang He, Jie Chen, Zhangxin Chen. 102-112 [doi]
- A Novel Energy Stable Numerical Scheme for Navier-Stokes-Cahn-Hilliard Two-Phase Flow Model with Variable Densities and ViscositiesXiaoyu Feng, Jisheng Kou, Shuyu Sun 0001. 113-128 [doi]
- Study on Numerical Methods for Gas Flow Simulation Using Double-Porosity Double-Permeability ModelYi Wang, Shuyu Sun 0001, Liang Gong. 129-138 [doi]
- Molecular Simulation of Displacement of Methane by Injection Gases in ShaleJihong Shi, Liang Gong, Zhaoqin Huang, Jun Yao. 139-148 [doi]
- A Compact and Efficient Lattice Boltzmann Scheme to Simulate Complex Thermal Fluid FlowsTao Zhang, Shuyu Sun 0001. 149-162 [doi]
- Study on Topology-Based Identification of Sources of Vulnerability for Natural Gas Pipeline NetworksPeng Wang, Bo Yu, Dongliang Sun, Shangmin Ao, Huaxing Zhai. 163-173 [doi]
- LES Study on High Reynolds Turbulent Drag-Reducing Flow of Viscoelastic Fluids Based on Multiple Relaxation Times Constitutive Model and Mixed Subgrid-Scale ModelJingfa Li, Bo Yu, Xinyu Zhang, Shuyu Sun 0001, Dongliang Sun, Tao Zhang. 174-188 [doi]
- Statistical and Multivariate Analysis Applied to a Database of Patients with Type-2 DiabetesDiana Canales, Neil Hernández-Gress, Ram Akella, Ivan Pérez. 191-201 [doi]
- Novel Monte Carlo Algorithm for Solving Singular Linear SystemsBehrouz Fathi Vajargah, Vassil Alexandrov, Samaneh Javadi, Ali Hadian. 202-206 [doi]
- Reducing Data Uncertainty in Forest Fire Spread Prediction: A Matter of Error Function AssessmentCarlos Carrillo, Ana Cortés, Tomàs Margalef, Antonio Espinosa, Andrés Cencerrado. 207-220 [doi]
- Analysis of the Accuracy of OpenFOAM Solvers for the Problem of Supersonic Flow Around a ConeAlexander E. Bondarev, Artem E. Kuvshinnikov. 221-230 [doi]
- Modification of Interval Arithmetic for Modelling and Solving Uncertainly Defined Problems by Interval Parametric Integral Equations SystemEugeniusz Zieniuk, Marta Kapturczak, Andrzej Kuzelewski. 231-240 [doi]
- A Hybrid Heuristic for the Probabilistic Capacitated Vehicle Routing Problem with Two-Dimensional Loading ConstraintsSoumaya Sassi Mahfoudh, Monia Bellalouna. 241-253 [doi]
- A Human-Inspired Model to Represent Uncertain Knowledge in the Semantic WebSalvatore Flavio Pileggi. 254-268 [doi]
- Bayesian Based Approach Learning for Outcome Prediction of Soccer MatchesLaura Hervert-Escobar, Neil Hernández-Gress, Timothy I. Matis. 269-279 [doi]
- Fuzzy and Data-Driven Urban CrowdsLeonel Toledo, Iván Rivalcoba, Isaac Rudomín. 280-290 [doi]
- Design and Analysis of an Undergraduate Computational Engineering Degree at Federal University of Juiz de ForaMarcelo Lobosco, Flávia de Souza Bastos, Bernardo Martins Rocha, Rodrigo Weber dos Santos. 293-303 [doi]
- Extended Cognition Hypothesis Applied to Computational Thinking in Computer Science EducationMika Letonsaari. 304-317 [doi]
- Interconnected Enterprise Systems - A Call for New Teaching ApproachesBettina Schneider, Petra Maria Asprion, Frank Grimberg. 318-331 [doi]
- Efficient Characterization of Hidden Processor Memory HierarchiesKeith Cooper, Xiaoran Xu. 335-349 [doi]
- Discriminating Postural Control Behaviors from Posturography with Statistical Tests and Machine Learning Models: Does Time Series Length Matter?Luiz H. F. Giovanini, Elisangela F. Manffra, Julio C. Nievola. 350-357 [doi]
- Mathematical Modelling of Wormhole-Routed x-Folded TM Topology in the Presence of Uniform TrafficMehrnaz Moudi, Mohamed Othman, Kweh Yeah Lun, Amir Rizaan Abdul Rahiman. 358-365 [doi]
- Adaptive Time-Splitting Scheme for Nanoparticles Transport with Two-Phase Flow in Heterogeneous Porous MediaMohamed Fathy El-Amin, Jisheng Kou, Shuyu Sun 0001. 366-378 [doi]
- Identifying Central Individuals in Organised Criminal Groups and Underground MarketplacesJan William Johnsen, Katrin Franke. 379-386 [doi]
- Guiding the Optimization of Parallel Codes on Multicores Using an Analytical Cache ModelDiego Andrade, Basilio B. Fraguela, Ramón Doallo. 387-394 [doi]
- LDA-Based Scoring of Sequences Generated by RNN for Automatic Tanka CompositionTomonari Masada, Atsuhiro Takasu. 395-402 [doi]
- Computing Simulation of Interactions Between α + β Protein and Janus NanoparticleXinlu Guo, Xiaofeng Zhao, Shuguang Fang, Yunqiang Bian, Wenbin Kang. 403-415 [doi]
- A Modified Bandwidth Reduction Heuristic Based on the WBRA and George-Liu AlgorithmSanderson L. Gonzaga de Oliveira, Guilherme Oliveira Chagas, Diogo T. Robaina, Diego N. Brandão, Mauricio Kischinhevsky. 416-424 [doi]
- Improving Large-Scale Fingerprint-Based Queries in Distributed InfrastructureShupeng Wang, Guangjun Wu, Binbin Li, Xin Jin, Ge Fu, Chao Li, Jiyuan Zhang. 425-433 [doi]
- A Effective Truth Discovery Algorithm with Multi-source Sparse DataJiyuan Zhang, Shupeng Wang, Guangjun Wu, Lei Zhang. 434-442 [doi]
- Blackboard Meets Dijkstra for Resource Allocation OptimizationChristian Vorhemus, Erich Schikuta. 443-449 [doi]
- Augmented Self-paced Learning with Generative Adversarial NetworksXiao-Yu Zhang, Shupeng Wang, Yanfei Lv, Peng Li, Haiping Wang. 450-456 [doi]
- Benchmarking Parallel Chess Search in Stockfish on Intel Xeon and Intel Xeon Phi ProcessorsPawel Czarnul. 457-464 [doi]
- Leveraging Uncertainty Analysis of Data to Evaluate User Influence Algorithms of Social NetworksJianjun Wu, Ying Sha, Rui Li, Jianlong Tan, Bin Wang. 465-472 [doi]
- E-Zone: A Faster Neighbor Point Query Algorithm for Matching Spacial ObjectsXiaobin Ma, Zhihui Du, Yankui Sun, Yuan Bai, Suping Wu, Andrei Tchernykh, Yang Xu, Chao Wu, Jianyan Wei. 473-479 [doi]
- Application of Algorithmic Differentiation for Exact Jacobians to the Universal Laminar Flame SolverAlexander Hück, Sebastian Kreutzer, Danny Messig, Arne Scholtissek, Christian H. Bischof, Christian Hasse. 480-486 [doi]
- Morph Resolution Based on Autoencoders Combined with Effective Context InformationJirong You, Ying Sha, Qi Liang, Bin Wang. 487-498 [doi]
- Old Habits Die Hard: Fingerprinting Websites on the CloudXudong Zeng, Cuicui Kang, Junzheng Shi, Zhen Li, Gang Xiong. 499-511 [doi]
- Deep Streaming Graph RepresentationsMinglong Lei, Yong Shi, Peijia Li, Lingfeng Niu. 512-518 [doi]
- Adversarial Reinforcement Learning for Chinese Text SummarizationHao Xu, Yanan Cao, Yanmin Shang, Yanbing Liu, Jianlong Tan, Li Guo. 519-532 [doi]
- Column Concept Determination for Chinese Web Tables via Convolutional Neural NetworkJie Xie, Cong Cao, Yanbing Liu, Yanan Cao, Baoke Li, Jianlong Tan. 533-544 [doi]
- Service-Oriented Approach for Internet of ThingsEduardo Cardoso Moraes. 545-551 [doi]
- Adversarial Framework for General Image InpaintingWei Huang, Hongliang Yu. 552-558 [doi]
- A Stochastic Model to Simulate the Spread of Leprosy in Juiz de ForaVinícius Clemente Varella, Aline Mota Freitas Matos, Henrique Couto Teixeira, Angélica da Conceição Oliveira Coelho, Rodrigo Weber dos Santos, Marcelo Lobosco. 559-566 [doi]
- Data Fault Identification and Repair Method of Traffic DetectorXiao-lu Li, Jia-xu Chen, Xin-ming Yu, Xi Zhang, Fang-shu Lei, Peng Zhang, Guang-Yu Zhu. 567-573 [doi]
- The Valuation of CCIRS with a New DesignHuaying Guo, Jin Liang. 574-583 [doi]
- Method of Node Importance Measurement in Urban Road NetworkDan-qi Liu, Jia-lin Wang, Xiao-lu Li, Xin-ming Yu, Kang Song, Xi Zhang, Fang-shu Lei, Peng Zhang, Guang-Yu Zhu. 584-589 [doi]
- AdaBoost-LSTM Ensemble Learning for Financial Time Series ForecastingShaolong Sun, Yunjie Wei, Shouyang Wang. 590-597 [doi]
- Analysis of Bluetooth Low Energy Detection Range Improvements for Indoor EnvironmentsJay Pancham, Richard Millham, Simon James Fong. 598-609 [doi]
- Study on an N-Parallel FENE-P Constitutive Model Based on Multiple Relaxation Times for Viscoelastic FluidJingfa Li, Bo Yu, Shuyu Sun 0001, Dongliang Sun. 610-623 [doi]
- RADIC Based Fault Tolerance System with Dynamic Resource ControllerJorge Villamayor, Dolores Rexachs, Emilio Luque. 624-631 [doi]
- Effective Learning with Joint Discriminative and Representative Feature SelectionShupeng Wang, Xiao-Yu Zhang, Xianglei Dang, Binbin Li, Haiping Wang. 632-638 [doi]
- Agile Tuning Method in Successive Steps for a River Flow SimulatorMariano Trigila, Adriana Gaudiani, Emilio Luque. 639-646 [doi]
- A Parallel Quicksort Algorithm on Manycore Processors in Sunway TaihuLightSiyuan Ren, Shizhen Xu, Guangwen Yang. 647-653 [doi]
- How Is the Forged Certificates in the Wild: Practice on Large-Scale SSL Usage Measurement and AnalysisMingxin Cui, Zigang Cao, Gang Xiong. 654-667 [doi]
- Managing Cloud Data Centers with Three-State Server Model Under Job Abandonment PhenomenonBinh Minh Nguyen, Bao Hoang, Huy Tran, Viet D. Tran. 668-674 [doi]
- The Analysis of the Effectiveness of the Perspective-Based Observational Tunnels Method by the Example of the Evaluation of Possibilities to Divide the Multidimensional Space of Coal SamplesDariusz Jamróz. 675-682 [doi]
- Urban Data and Spatial Segregation: Analysis of Food Services Clusters in St. Petersburg, RussiaAleksandra Nenko, Artem Konyukhov, Sergey Mityagin. 683-690 [doi]
- Control Driven Lighting Design for Large-Scale InstallationsAdam Sedziwy, Leszek Kotulski, Sebastian Ernst, Igor Wojnicki. 691-700 [doi]
- An OpenMP Implementation of the TVD-Hopmoc Method Based on a Synchronization Mechanism Using Locks Between Adjacent Threads on Xeon Phi (TM) AcceleratorsFrederico Luís Cabral, Carla Osthoff, Gabriel P. Costa, Sanderson L. Gonzaga de Oliveira, Diego N. Brandão, Mauricio Kischinhevsky. 701-707 [doi]
- Data-Aware Scheduling of Scientific Workflows in Hybrid CloudsAmirmohammad Pasdar, Khaled Almi'ani, Young Choon Lee. 708-714 [doi]
- Large Margin Proximal Non-parallel Support Vector ClassifiersMingzeng Liu, Yuanhai Shao. 715-721 [doi]
- The Multi-core Optimization of the Unbalanced Calculation in the Clean Numerical Simulation of Rayleigh-Bénard TurbulenceLu Li, Zhiliang Lin, Yan Hao. 722-735 [doi]
- ES-GP: An Effective Evolutionary Regression Framework with Gaussian Process and Adaptive Segmentation StrategyShijia Huang, Jinghui Zhong. 736-743 [doi]
- Evaluating Dynamic Scheduling of Tasks in Mobile Architectures Using ParallelME FrameworkRodrigo Carvalho, Guilherme Andrade, Diogo Santana, Thiago Silveira, Daniel Madeira, Rafael Sachetto Oliveira, Renato Ferreira, Leonardo C. da Rocha. 744-751 [doi]
- An OAuth2.0-Based Unified Authentication System for Secure Services in the Smart Campus EnvironmentBaozhong Gao, Fangai Liu, Shouyan Du, Fansheng Meng. 752-764 [doi]
- Time Series Cluster Analysis on Electricity Consumption of North Hebei Province in ChinaLuhua Zhang, Miner Liu, Jingwen Xia, Kun Guo, Jun Wang. 765-774 [doi]
- Effective Semi-supervised Learning Based on Local CorrelationXiao-Yu Zhang, Shupeng Wang, Xin Jin, Xiaobin Zhu, Binbin Li. 775-781 [doi]
- Detection and Prediction of House Price Bubbles: Evidence from a New CityHanwool Jang, Kwangwon Ahn, Dongshin Kim 0003, Yena Song. 782-795 [doi]
- A Novel Parsing-Based Automatic Domain Terminology Extraction MethodYing Liu, Tianlin Zhang, Pei Quan, Yueran Wen, Kaichao Wu, Hongbo He. 796-802 [doi]
- Remote Procedure Calls for Improved Data Locality with the Epiphany ArchitectureJames A. Ross, David A. Richie. 803-810 [doi]
- Identifying the Propagation Sources of Stealth WormsYanwei Sun, Lihua Yin, Zhen Wang, Yunchuan Guo, Binxing Fang. 811-817 [doi]
- Machine Learning Based Text Mining in Electronic Health Records: Cardiovascular Patient CasesSergey Sikorskiy, Oleg G. Metsker, Alexey N. Yakovlev, Sergey V. Kovalchuk. 818-824 [doi]
- Evolutionary Ensemble Approach for Behavioral Credit ScoringNikolay O. Nikitin, Anna V. Kalyuzhnaya, Klavdiya Bochenina, Alexander A. Kudryashov, Amir Uteuov, Ivan Derevitskii, Alexander V. Boukhanovsky. 825-831 [doi]
- Detecting Influential Users in Customer-Oriented Online CommunitiesIvan Nuzhdenko, Amir Uteuov, Klavdiya Bochenina. 832-838 [doi]
- GeoSkelSL: A Python High-Level DSL for Parallel Computing in GeosciencesKevin Bourgeois, Sophie Robert, Sébastien Limet, Victor Essayan. 839-845 [doi]
- Precedent-Based Approach for the Identification of Deviant Behavior in Social MediaAnna V. Kalyuzhnaya, Nikolay O. Nikitin, Nikolay Butakov, Denis A. Nasonov. 846-852 [doi]
- Performance Analysis of 2D-compatible 2.5D-PDGEMM on Knights Landing ClusterDaichi Mukunoki, Toshiyuki Imamura. 853-858 [doi]