Abstract is missing.
- Cache Replacement Improving Based on User Group Interest DegreeShuai Zhang, Yueming Lu, Xi Zhang. 1-7 [doi]
- A Uighur Automatic Summarization Method Based on Sub-theme DivisionXiaodong Yan. 8-15 [doi]
- Accelerating DFA Construction by Parallelizing Subset ConstructionYan Shao, Yanbing Liu, Jianlong Tan. 16-24 [doi]
- A Novel Feature Selection Method Based on Category Distribution and Phrase AttributesYi Zheng, Weihong Han, Chengzhang Zhu. 25-32 [doi]
- RayDroid: A Framework for Discovering Anomaly in AndroidFan Yang, Yue Li, Lidong Zhai. 33-40 [doi]
- A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering SystemQian Li, Weiguo Wu, Liang Gao, Lei Wang, Jianhang Huang. 41-47 [doi]
- Extracting News Information Based on Webpage Segmentation and Parsing DOM Tree ReverselyJing Li, Yueming Lu, Xi Zhang. 48-55 [doi]
- Enhancing Security and Robustness of P2P Caching SystemHuailiang Peng, Majing Su, Qiong Dai, Jianlong Tan. 56-64 [doi]
- Minimizing the Negative Influence by Blocking Links in Social NetworksQipeng Yao, Chuan Zhou, Linbo Xiang, Yanan Cao, Li Guo. 65-73 [doi]
- Self-Adaptive Frequency Scaling Architecture for Intrusion Detection SystemQiuwen Lu, Zhou Zhou, Hongzhou Sha, Qingyun Liu, Hongcheng Sun. 74-82 [doi]
- Nonparametric Topic-Aware Sparsification of Influence NetworksWeiwei Feng, Peng Wang, Chuan Zhou, Yue Hu, Li Guo. 83-90 [doi]
- A Survey of Network Traffic Visualization in Detecting Network Security ThreatsXiaomei Liu, Yong Sun, Liang Fang, Junpeng Liu, Lingjing Yu. 91-98 [doi]
- Sentinel: In Case of the Untrustworthy Behaviors Inside the CloudsDong Cui, Chuanyi Liu, Meiqi Yang, Jincui Yang. 99-106 [doi]
- Web-Based Heatmap of Physical Machines in Cloud ComputingHeng Chen, Xiaoshe Dong. 107-113 [doi]
- RSA Encryption/Decryption Implementation Based on ZedboardXu Bai, Lei Jiang, Xinxing Liu, Jianlong Tan. 114-121 [doi]
- Security Risk Assessment of Rich Communication Services Over LTEXin He, Huiyun Jing. 122-128 [doi]
- CAS: Content Attribution System for Network ForensicsYan Chen, Yiguo Pu, Xiaojun Chen, Jinqiao Shi, Xiaojie Yu. 129-136 [doi]
- Tracking and Analysis of Hot Words and Posts for University CampusXuefeng Du, Xiaodong Yan. 137-143 [doi]
- Software Vulnerability Severity Evaluation Based on Economic LossesYunxue Yang, Shuyuan Jin, Xiaowei He. 144-151 [doi]
- A Tibetan Word Sense Disambiguation Method Based on HowNet and Chinese-Tibetan Parallel CorporaXinmin Jiang, Lirong Qiu, Yeqing Li. 152-159 [doi]
- SFAPCC: A Secure and Flexible Architecture for Public Cloud ComputingBaohui Li, Kefu Xu, Chuang Zhang, Yue Hu. 160-165 [doi]
- Towards Enumeration of NTFS Using USN Journals Under UEFIZilu Zhang, Jinqiao Shi, Lanlan Hu. 166-174 [doi]
- Trusted Cloud Service Certification and EvaluationWei Li, Feng Cao. 175-182 [doi]
- Enhanced AllJoyn Network with Centralized ManagementLinghan Li, Yonghua Li, Jiaru Lin, Tianle Zhang. 183-188 [doi]
- A Method of Evaluating Distributed Storage System ReliabilityHongjie Huang, Shuqiang Yang. 189-196 [doi]
- DDoS Detection Based on Second-Order Features and Machine LearningXiaowei He, Shuyuan Jin, Yunxue Yang, Huiqiang Chi. 197-205 [doi]
- Construction of Software and Hardware Resource Pool in Data Center Using VirtualizationNa Ye, Lili Dong, Genqing Bian, Jian Li. 206-212 [doi]
- Design and Performance Analysis of Utility Maximization-Based Cooperative MAC in Multi-rate WiFi NetworksJiqiang Tang, Xiaoxiang Zou, Dongbin Wang. 213-220 [doi]
- Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune SystemBin Jia, Zhaowen Lin, Yan Ma. 221-228 [doi]
- Human Mobility Simulation in Smart Energy GridTianle Zhang, Lixin Liu, Shouyou Song, Yuyu Yuan. 229-237 [doi]
- Community Detection in Complex Networks: Algorithms and AnalysisYuan Jie, Liu Zhishuai, Xiaoyu Qiu. 238-244 [doi]
- Advanced Test Modelling and Execution Based on the International Standardized Techniques TTCN-3 and UTPAxel Rennoch, Marc-Florian Wendland, Andreas Hoffmann 0001, Martin A. Schneider. 245-252 [doi]
- Understanding Human Goal Setting as a Means for Supporting Goal Oriented Requirements EngineeringJørgen Bøegh. 253-259 [doi]
- The Improvement and Implementation of iSLIP Algorithm Based on FPGAZeng Guang, Yao Lin, Zhao Ming, Ma Yilan. 260-266 [doi]
- The Optimization Design of High Q Microwave Photonic Filters Based on Cascade Fiber Bragg GratingsHuimin Gao, Zeng Guang. 267-273 [doi]
- The Implementation of GFP Protocol Based on EOS in FPGAMa Yilan, Yao Lin, Zeng Guang, Matturdi Bardi. 274-280 [doi]
- An Improving Algorithm for Combined Input-Crosspoint-Queued SwitchesLing Xu, Yueyun Chen, Zheng Gong. 281-287 [doi]
- A New Network Coding Scheme in Two-relay OFDMA NetworksHui Zhao, Yueyun Chen, Xiaopan Yuan. 288-294 [doi]
- RAMID: A Novel Risk Assessment Model of Information Dissemination on Social NetworkHongzhou Sha, Xiaoqian Li, Qingyun Liu, Zhou Zhou, Liang Zhang, Lidong Wang. 295-303 [doi]
- An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring SystemsChao Ding, Mingxia Zeng, Kui Wang, Polo Pei, Zhongzhi Luan, Depei Qian. 304-310 [doi]
- Memory Centric Hardware Prefetching in Multi-core ProcessorsDanfeng Zhu, Rui Wang, Zhongzhi Luan, Depei Qian, Han Zhang, Jihong Cai. 311-321 [doi]
- Performance-Aware Based Correlated Datasets Replication StrategyLin Ye, Zhongzhi Luan, Hailong Yang. 322-327 [doi]
- Monitoring Social Events on Sina WeiboXi Zhang, Guanhong Jiang, Yuan Su. 328-335 [doi]
- Information Integration of Heterogeneous Employment Service Information of College GraduatesYibo Xie, Zhongzhi Luan. 336-341 [doi]
- Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic MeasurementQuan Bai, Gang Xiong, Yong Zhao. 342-349 [doi]
- Research of eID Mobile Identity Authentication MethodXu Wu, Yue Fan, Xi Zhang, Jin Xu. 350-358 [doi]
- Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User RegistrationKrishna Moniz, Yuyu Yuan. 359-369 [doi]
- A Method to Build and Expand the Domain Dictionary Automatically Based on WordNetXu Wu, Weiyi Zhang, Xi Zhang, Jin Xu. 370-381 [doi]
- Research on Modeling of Software Automatic TestJincui Yang, Yuyu Yuan, Tianle Zhang. 382-388 [doi]
- The Design and Implementation of APK eBooks Online Generation System Based on FBReaderXu Wu, Jiada Shi, Xiaqing Xie. 389-400 [doi]
- Domain-Specific Semantic Retrieval of Institutional Repository Based on Query ExtensionXu Wu, Pengchong Li, Jin Xu, Xiaqing Xie. 401-411 [doi]