Abstract is missing.
- A Comparative Study of Data Skew in HadoopMajun He, GuoZhong Li, Chaojie Huang, Yufei Ye, Wenhong Tian. 1-6 [doi]
- A Dynamic Convergent Replication Strategy Based on Distributed Hierarchical SystemsPu Zhao, Jingtao Shang, Jianjun Lin, Bo Li, Xin Sun. 7-13 [doi]
- Association Rule Mining using Apriori for Large and Growing Datasets under HadoopAruna Govada, Abhinav Patluri, Atmika Honnalgere. 14-17 [doi]
- In-network Cache Size Allocation for Video Streaming on Named Data NetworkingYuanzun Zhang, Xiaobin Tan, Weiping Li. 18-23 [doi]
- Forecast Method of Short - term Passenger Flow on Urban Rail TransitLing Guo, Yue Yuan. 24-28 [doi]
- Research on Facial Expression Recognition based on KinectYutong Wang, Yuge Liu. 29-33 [doi]
- Identity Authentication Protection for "Spatial Watermarking + QR Code" Paper-cutting Digital ImageJun Zhao, Guangyong Gao, Jianhua Cheng. 34-37 [doi]
- Applying Binary Patch Comparison to Cisco IOSHaobin Sun, Shengli Liu, Da Xiao, Ruiqing Xiao. 38-42 [doi]
- The Synthesis of Multi-Graphic Visual Encryption TechnologyJianle Zhu, Peng Cao, Peijun Huo, Xuan Wang, Fangfang Chen. 43-47 [doi]
- CNN-based Commercial Detection in TV BroadcastingMengyue Li, Yuchun Guo, Yishuai Chen. 48-53 [doi]
- A Fuzzy Pattern Based ICCP Matching Algorithm in Gravity-Aided NavigationChunmei Liu, Lingjuan Miao, Tian Dai. 54-58 [doi]
- Multiple Bloom filtersYuanhang Yang, Shuhui Chen. 59-63 [doi]
- Weighted Hash Method based on Improved ABQ AlgorithmJiming Zheng, Wenfei Xie. 64-68 [doi]
- Computing Diagonals of Toeplitz Pentadiagonal Matrix Inverses via Matrix Möbius TransformationsChengcheng Huang, Wei Peng, Housen Li, Lizhi Cheng, Hao Jiang 0001. 69-74 [doi]
- CNN-Webshell: Malicious Web Shell Detection with Convolutional Neural NetworkYifan Tian, Jiabao Wang, Zhenji Zhou, Shengli Zhou. 75-79 [doi]
- Anomaly-Based Web Attack Detection: A Deep Learning ApproachJingxi Liang, Wen Zhao, Wei Ye. 80-85 [doi]
- An Adaptive Malicious Domain Detection Mechanism with DNS TrafficShuo Xu, Shuqin Li, Kun Meng, Lijun Wu, Meng Ding. 86-91 [doi]
- Network Behavioral Features for Detecting Remote Access Trojans in the Early StageKhin Swe Yin, May Aye Khine. 92-96 [doi]
- An Intrusion Detection Model Based on Deep Belief NetworkFeng Qu, Jitao Zhang, Zetian Shao, Shuzhuang Qi. 97-101 [doi]
- Research on WebSocket-Based Authentication SystemGuyang Wang, Shulin Yang, Xuelei Ren, Bin Wang. 102-105 [doi]
- PFESG: Permission-based Android Malware Feature Extraction AlgorithmChengcheng Wang, Yuqing Lan. 106-109 [doi]
- A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the InternetYujing Liu, Zhilin Wang, Nan Li. 110-114 [doi]
- Detecting and Predicting APT Based on the Study of Cyber Kill Chain with Hierarchical Knowledge ReasoningSenhao Wen, Nengqiang He, Hanbing Yan. 115-119 [doi]
- Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the CloudWenxia Guo, Xiaoqin Ren, Wenhong Tian, Srikumar Venugopal. 120-124 [doi]
- Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted ServersMeng Li, Yasushi Shinjo. 125-134 [doi]
- An Analysis of Wargame Rules Simulation Based on Stochastic Lanchester ModelsJisong Fan, Hui Ren, Chengxiang Tian. 135-139 [doi]
- Research on Digital Publishing Application System Based on Micro-Service ArchitectureBin Wang, Shulin Yang, Xuelei Ren, Guyang Wang. 140-144 [doi]
- Design and Implementation of Remote Service Diagnosis System for Printing MachineJieping Hu, Shulin Yang, Bin Wang, Guyang Wang. 145-149 [doi]
- Community detection in complex networks using flow simulationZheng Sun, Fuyou Miao, Yang Xu, Qiyu Shao, Weihua Wang, Xingfu Wang, Chenxi Shao. 150-155 [doi]
- Personalized Community Discovery Algorithm Based on GNXiao-Ming Yu, Wen-Jie Li. 156-160 [doi]
- Implement of TSCH Based MAC Accelerator for WIA-PA Industrial Wireless NetworkJian Wang, Chuang Xie, Gengshan Wang. 161-165 [doi]
- An Analysis of Frame Replication and Elimination for Time-Sensitive NetworkingShifei Qian, Feng Luo, Jinpeng Xu. 166-170 [doi]
- Modeling and Simulation of Time-Division Multiplexing Navigation Satellite Network based on OPNETHongcheng Yan, Rui Zhang, Lin Li, Lianlian Zeng, Xianghui Wang, Jian Guo. 171-174 [doi]
- Implementation of Time Synchronization for Energy Harvesting Wireless Sensor NetworkHajime Kawagoe, Masashi Sugano. 175-178 [doi]
- Interference Alignment for Cellular Networks with Jacobian EigenvalueChristian Ango Mbom, James Kweku Nkrumah Nyarko, Rugui Yao, Ling Wang. 179-182 [doi]
- The Impact of Target Near-Field Scattering on Missile Communication OperationsJun-Chao Yuan, Xiao-Kuan Zhang, Ming-Cai Sun, Mao Liu. 183-186 [doi]
- A Network Interconnection System and Framework Based on Semantic CommunicationMingda Li, Qingxv Xiong, Long Yuan. 187-190 [doi]
- Robust Topology Design in Time-Evolving and Predictable Spacecraft Network with Node EfficiencyDawei Yan, Cong Liu, Peng You, Shaowei Yong. 191-196 [doi]
- Beamforming with Enhanced CNN NetworkKai Shu, Yanteng Wang, Guanghui Zhao. 197-201 [doi]
- Establishment and Application of Salary Business Circular Correlation Structure Revision model for Chinese Characteristic Institution UnitsYang Xie, Hui Xie, Gongliang Li. 202-206 [doi]
- Trustworthiness in Fog: A Fuzzy ApproachFatin Hamadah Rahman, Thien-Wan Au, S. H. Shah Newaz, Wida Susanty Suhaili. 207-211 [doi]
- A New Method of Recognizing Enterprise Core Financial Indexes Based on Similarity CalculationLu Liu, Shuqing Li. 212-216 [doi]
- A New Method for Evaluating Air Traffic Control SafetyQinghao Wang, Dengkai Yao. 217-221 [doi]
- Combined Heat and Power Economic Dispatch Using Differential EvolutionYafei Ouyang, Qun Niu, Yang Zhang. 222-226 [doi]
- Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid Connected PV SystemMohammad Abu Sarhan, Min Ding, Xin Chen, Min Wu. 227-234 [doi]
- Hybrid RRT/DE Algorithm for High Performance UCAV Path PlanningFathy S. Elkazzaz, Mohammed A. H. Abozied, Chunming Hu. 235-242 [doi]
- Design Method for Ship Handling Simulator Based On CPLDShaowei Li, Shengzheng Wang. 243-247 [doi]
- Design and Implementation of Sounder Simulator Based on Cross-platformShaowei Li, Shengzheng Wang. 248-252 [doi]
- Weighted Least Squares Twin Large Margin Distribution MachineQing Wu, Shaowei Qi, Kaiyue Sun. 253-257 [doi]