Abstract is missing.
- Data computations for Applied InformaticsNaohiro Ishii. 1 [doi]
- Social service innovations with information technologiesTokuro Matsuo. 3 [doi]
- A self-organizing algorithm for community structure analysis in complex networksHanlin Sun, Wei Jie, Christian Sauer, Sugang Ma, Gang Han, Wei Xing. 5-12 [doi]
- Automatic verification of non-recursive algorithm of Hanoi Tower by using Isabelle Theorem ProverHuazhen Xu, Zhen You, Jinyun Xue. 13-18 [doi]
- An efficient Uniform Integrated Advection algorithm for Finite Time Lyapunov Exponent field computation on GPU and MICFang Wang, Liang Deng, Dan Zhao, Sikun Li. 19-26 [doi]
- An improved model for PM2.5 inference based on support vector machineYuhan Dong, Hui Wang, Lin Zhang, Kai Zhang. 27-31 [doi]
- Projection search for approximate nearest neighborCheng Feng, Bo Yang. 33-38 [doi]
- Inferring gene regulatory networks based on spline regression and Bayesian group lassoYue Fan, Qinke Peng. 39-42 [doi]
- A hybrid VNS based framework for biomass transportationHiba Yahyaoui, Abdelkader Dekdouk, Saoussen Krichen. 43-48 [doi]
- Ultra High Frequency Polynomial and Cosine Artificial Higher Order Neural NetworksMing Zhang, Chenrui Hu. 49-56 [doi]
- Hierarchical Latent Semantic Mapping for automated topic generationGuorui Zhou, Guang Chen. 57-63 [doi]
- Document representation based on semantic smoothed topic modelYing Liu, Wei Song, Lizhen Liu, Hanshi Wang. 65-69 [doi]
- A novel fuzzy omni-directional gait planning algorithm for biped robotHaobin Shi, Xuesi Li, Weihao Liang, Ming'ai Dang, HuaHui Chen, Shixiong Wang. 71-76 [doi]
- The optimization of beer recipe based on an improved ant colony optimizationSong Zheng, Xiaoqing Zheng, Chunlin Wang. 77-80 [doi]
- Characteristics of analysis methods for the Impression Evaluation Method by SpaceShunsuke Akai, Teruhisa Hochin, Hiroki Nomiya. 81-86 [doi]
- Team negotiation based on solidarity behavior: A concession strategy in the teamJian Wang, Jingqiu Gong. 87-92 [doi]
- A hybrid method for bilingual text sentiment classification based on deep learningGuolong Liu, Xiaofei Xu, Bailong Deng, Siding Chen, Li Li. 93-98 [doi]
- Functional classification study for mathematical formulas retrievalSai Hong, Wei Su, He Lin, Xianchao Lv. 99-104 [doi]
- Single-trial ERP detecting for emotion recognitionJingfang Jiang, Ying Zeng, Li Tong, Chi Zhang, Bin Yan. 105-108 [doi]
- A hybrid model for Arabic document indexingSouheila Ben Guirat, Ibrahim Bounhas, Yahya Slimani. 109-114 [doi]
- Facial expression classification using Support Vector Machine based on bidirectional Local Binary Pattern Histogram feature descriptorTalele Kiran, Tuckley Kushal. 115-120 [doi]
- An empirical study on recovering requirement-to-code linksYuchen Zhang, Chengcheng Wan, Bo Jin. 121-126 [doi]
- Composite-based conflict resolution in merging versions of UML modelsHao Chong, Renwei Zhang, Zheng Qin. 127-132 [doi]
- A fuzzy-logic system for the user interface usability measurementMarwa Hentati, Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi. 133-138 [doi]
- A formal model for safety evaluation of platooning systemMohamed Garoui. 139-146 [doi]
- Position orientating path reverse ray tracing algorithm based on cluster analysisFan-Zhen Kong, Nae Zheng, Guanyi Liu, Xiukun Ren. 147-153 [doi]
- Network intrusion detection system model based on data miningYanjie Zhao. 155-160 [doi]
- Request distribution with pre-learning for distributed SSL reverse proxiesHaitao Dong, Jun Yang, Yiqiang Sheng. 161-167 [doi]
- Self-adaptive access control & delegation in cloud computingAli Ahmad Malik, Hirra Anwar, Muhammad Awais Shibli. 169-176 [doi]
- Optimal placement of charging stations for electric taxis in urban area with profit maximizationYuhan Dong, Siyuan Qian, Jinxing Liu, Lin Zhang, Kai Zhang. 177-182 [doi]
- An efficient page replacement algorithm for PCM-based mobile embedded systemsSeunghoon Yoo, Hyokyung Bahn. 183-188 [doi]
- Scheduling overload for real-time systems using SMT solverZhuo Cheng, Haitao Zhang, Yasuo Tan, Yuto Lim. 189-194 [doi]
- Study of occlusion problem in stereo matchingJianguo Liu, Xuesong Li, Qin Qin, Hao Zhang. 195-199 [doi]
- Traffic sign detection based on cascaded convolutional neural networksDi Zang, Junqi Zhang, DongDong Zhang, Maomao Bao, Jiujun Cheng, Keshuang Tang. 201-206 [doi]
- Sample reconstruction and secondary feature selection in noisy speech emotion recognitionXiaoqing Jiang. 207-211 [doi]
- Image segmentation based on local Chan-Vese model optimized by max-flow algorithmZhongguo Li, Lei Zeng, Ti Wang, Jian Chen, Bin Yan. 213-218 [doi]
- Improved accuracy of speaker verification system in noisy environmentNirmala Salam, Rekha P. Nair. 219-224 [doi]
- A fingertips detection method based on the combination of centroid and Harris corner algorithmJiajun Chen, Meng-meng Han, Shu Yang, Yuchun Chang. 225-230 [doi]
- Bilateral histogram equalization with pre-processing for contrast enhancementFeroz Mahmud Amil, Mostafijur Rahman, Shanto Rahman, Emon Kumar Dey, Mohammad Shoyaib. 231-236 [doi]
- A layered tone-mapping operator based on contrast enhanced adaptive histogram equalizationShaojun Zhang, Jianhua Pang, Hailong Chen, Sheng Zhang. 237-242 [doi]
- Ranking web service for high quality by applying improved Entropy-TOPSIS methodRuonan Sun, Bin Zhang, Tingting Liu. 249-254 [doi]
- Intelligent mailbox with centralized parallel processingMuhammad Adeel, Nabeel ur Rehman. 255-259 [doi]
- Joint multi-channel assignment and routing in wireless mesh networkChangsheng Yin, Ruopeng Yang, Dongdong Wu, Wei Zhu. 261-265 [doi]
- Percolation thresholds on tree-based communities of wireless sensor networksQiao Li, Zhendong Niu, Baihai Zhang, Lingguo Cui, Bin Wu. 267-273 [doi]
- Study on improvement of fingerprint matching algorithm in wireless LAN based indoor positioning systemHongyu Wang, Zhanhao Zhao, Jialiang Hu, Zhenxin Qu, Hao Feng. 275-280 [doi]
- A novel compact antenna design for secure eHealth wireless applicationsM. Aziz ul Haq, M. Arif Khan, Md. Rafiqul Islam 0001. 281-286 [doi]
- Visual hand gesture recognition with convolution neural networkMeng-meng Han, Jiajun Chen, Ling Li, Yuchun Chang. 287-291 [doi]
- RaceTracker: Effective and efficient detection of data racesZhen Yang, Zhen Yu, Xiaohong Su, Peijun Ma. 293-300 [doi]
- A distributed-memory parallel approach for the generation of multibillion element tetrahedral meshesXiaoqing Wang, Xianlong Jin. 301-306 [doi]
- Accelerated diffusion-based recommendation algorithm on tripartite graphs with GPU clustersMi Li, Jie Huang, Jingpeng Wang. 307-312 [doi]
- Paralleled Fast Search and Find of Density Peaks clustering algorithm on GPUs with CUDAMi Li, Jie Huang, Jingpeng Wang. 313-318 [doi]
- A deep learning approach for VM workload prediction in the cloudFeng Qiu, Bin Zhang, Jun Guo. 319-324 [doi]
- A comparative evaluation of open-source graph processing platformsXiaohui Pan. 325-330 [doi]
- On optimal electric vehicles penetration in a novel Archipelago microgridsQingyu Yang, Zhengan Tan, Dou An, Wei Yu 0002, Xinyu Yang. 331-336 [doi]
- A novel microgrid based resilient Demand Response scheme in smart gridXinyu Yang, Xiaofei He, Jie Lin, Wei Yu 0002, Qingyu Yang. 337-342 [doi]
- Optimal many-to-many personalized concurrent communication in RapidIO-based fat-treesLin Shu, Jie Hao, Yafang Song, Chengcheng Li, Donglin Wang. 343-350 [doi]
- Design patterns applied for game design patternsJunfeng Qu, Yinglei Song, Yong Wei. 351-356 [doi]
- Exploring topic models in software engineering data analysis: A surveyXiaobing Sun, Xiangyue Liu, Bin Li, Yucong Duan, Hui Yang, Jiajun Hu. 357-362 [doi]
- Automatic support for formal specification construction using pattern knowledgeXi Wang, Weikai Miao. 363-372 [doi]
- Verifying RTuinOS using VCC: From approach to practiceHongliang Liang, Daijie Zhang, Xiaodong Jia, Xiaoxiao Pei, Guangyuan Li. 373-378 [doi]
- A correct by construction approach for modeling and formalizing self-adaptive systemsMarwa Hachicha, Emna Dammak, Riadh Ben Halima, Ahmed Hadj Kacem. 379-384 [doi]
- Detecting integer overflow in Windows binary executables based on symbolic executionBin Zhang, Chao Feng, Bo Wu, Chaojing Tang. 385-390 [doi]
- A framework for test data generation of object-oriented programs based on complete testing chainGang Li, Lei Yu, Huihui Sun. 391-397 [doi]
- A method of metamorphic relations constructing for object-oriented software testingXinglong Zhang, Lei Yu, Xuemei Hou. 399-406 [doi]
- MLSA: A static bugs analysis tool based on LLVM IRHongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu. 407-412 [doi]
- Understanding and detecting performance and security bugs in IOT OSesHongliang Liang, Qian Zhao, Yuying Wang, Haifeng Liu. 413-418 [doi]
- Test case prioritization based on requirement correlationsTingting Ma, Hongwei Zeng, Xiaolin Wang. 419-424 [doi]
- Operational pattern based code generation for management information system: An industrial case studyFagui Mao, Xuyang Cai, Beijun Shen, Yong Xia, Bo Jin. 425-430 [doi]
- Service matchmaking with closed world reasoningWenli Qi, Fangfang Liu. 431-436 [doi]
- Mechanistic relationship between instruction fetch width and basic block size to architectural vulnerability factorLiu Tang, Zhangqin Huang. 437-442 [doi]
- A method for issue queue soft error vulnerability mitigationLiu Tang, Zhangqin Huang. 443-450 [doi]
- Toward hybrid method for parsing Modern Standard ArabicNabil Khoufi, Chafik Aloulou, Lamia Hadrich Belguith. 451-456 [doi]
- Enhancing spatial data warehouse exploitation: A SOLAP recommendation approachSaida Aissi, Mohamed Salah Gouider, Tarek Sboui, Lamjed Ben Said. 457-464 [doi]
- Improved image matching method based on ORBLetian Li, Lin Wu, Yongcun Gao. 465-468 [doi]
- Visual abstraction improvement of interactive dot mapDi Zhang, Ligu Zhu, Zida Xiao, Lei Zhang. 469-474 [doi]
- Design, modeling and tuning of modified PID controller for autopilot in MAVsXuhui Chen, Ejaz Ul Haq, Jiawei Lin. 475-480 [doi]
- The research of the brain default network using cascading algorithmMing Ke, Zhao Cao, Zhijing Li, Xuhui Chen. 481-486 [doi]
- Adaptive Fuzzy PID speed control of DC belt conveyor systemXuhui Chen, M. Lutfar Rahman, Yin Zhang. 487-490 [doi]
- Genetic algorithm optimization research based on simulated annealingShunan Lan, Weiguo Lin. 491-494 [doi]
- Development of puzzle game about children's etiquette based on Unity3DJiyuan Li, Wenfeng Hu. 495-500 [doi]
- Research and implementation of documented media asset management modeWang Bo, Zhang Xin. 501-506 [doi]
- A novel multidimensional professionalism evaluation modelZhenzhong Li, Wenqian Shang, Yuqi Wang. 507-510 [doi]
- SLACM: Heterogeneous multilevel service aggregation access control model based situation logicMin Wang, Yongbin Wang. 511-516 [doi]
- Network security risk assessment method based on HMM and attack graph modelSichao Liu, Yuan Liu. 517-522 [doi]
- Development of electrostatic decay time intelligent test instrument and software designHui Li, Xiaohua Shi, Kejun Li, Hongyu Yu. 523-526 [doi]
- A comparative study on black-box testing with open source applicationsShaochun Xu, Lichao Chen, Chunning Wang, Oleksandr Rud. 527-532 [doi]
- Complexity analysis and comparison of test paths based on DSEJiawen Lu, Lizhi Cai, Yang Zhang, Keyi Hong. 533-539 [doi]
- Evaluating accuracy and performance of GPU-accelerated random walk computation on heterogeneous networksJiayu Gong, Lizhi Cai, Yuxin Shen. 541-545 [doi]
- Evaluating quality-in-use of FLOSS through analyzing user reviewsZhenzheng Qian, Chengcheng Wan, Yuting Chen. 547-552 [doi]
- Research and practice on the whole life cycle test process modelJiwen Ding, XiusHuang Yi, Jun Guo. 553-556 [doi]
- Software test cases recommendation system research based on collaborative filteringJianxin Ge, Jiaomin Liu. 557-562 [doi]
- Research on non-authorized privilege escalation detection of android applicationsYaping Yang, Lizhi Cai, Yanguo Zhang. 563-568 [doi]
- Fuzzy set based data publishing for privacy preservationMengbo Xie, Quan Qian. 569-574 [doi]
- P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for cloudsLifeng Li, Xiaowan Chen, Hai Jiang, Zhongwen Li, Kuan-Ching Li. 575-580 [doi]
- Parallel image dehazing algorithm based on GPU using fuzzy system and hybird evolution algorithmChe-Lun Hung, Ren-You Yan, Hsiao-Hsi Wang. 581-583 [doi]
- An approach to improving the performance of CUDA in virtual environmentShenquan Han, Zhou Lei, Wenfeng Shen, Shengbo Chen, Huiran Zhang, Tao Zhang, Baoyu Xu. 585-590 [doi]
- Profiling and analysis of object lazy allocation in Java programsJianjun Shi, Weixing Ji, Lulu Zhang, Yujin Gao, Han Zhang, Duzheng Qing. 591-596 [doi]
- Similarity model based on CBR and FCAChongyang Shi, Linjing Lai, Jing Fan, Yu Bai. 597-603 [doi]
- Study on the evolution process of nuclear accident consequence assessment systemQiming Zhang, Qian Chen, Yunliang Tao. 605-611 [doi]
- Computing uncertain skyline of Web services via interval numberGuobing Zou, Mei Zhao, Sen Niu, Yanglan Gan, Bofeng Zhang. 613-618 [doi]
- An accelerating approach for simulating texture sharp transition mechanism of pyrocarbon on Hexagonal-Mesh SurfaceMengqi Guo, Qin Li, Wenfeng Shen, Guangren Qian, Huiran Zhang. 619-623 [doi]
- The modularity-based Hierarchical tree algorithm for multi-class classificationChengwei Gu, Bofeng Zhang, Xinyue Wan, Mingqing Huang, Guobing Zou. 625-629 [doi]
- Steganalysis of JPEG image-based steganography with support vector machineSatoshi Watanabe, Kazuki Murakami, Tomoya Furukawa, Qiangfu Zhao. 631-636 [doi]
- High resolution feature extraction from optical coherence tomography acquired internal fingerprintRethabile Khutlang, Nontokozo P. Khanyile, Sisanda Makinana, Fulufhelo Vincent Nelwamondo. 637-641 [doi]
- A novel and fast connected component count algorithm based on graph theorySihai Yang, Duansheng Chen, Xian-Hua Han, Yen-Wei Chen. 643-647 [doi]
- Motion estimation method based on efficient memory bandwidth for HEVC real-time algorithm based on graph theoryncodingKodai Miyajima, Gen Fujita. 649-653 [doi]
- An improved unsharp masking model for intensive care unit chest radiograph enhancementSikai Zhong, Sheng Chen. 655-661 [doi]
- Features extraction of prostate with graph spectral method for prostate cancer detectionWeiwei Du, Yi-Peng Liu, Shiyang Wang, Yahui Peng, Aytekin Oto. 663-668 [doi]
- STNoSQL: Creating NoSQL database on the SensibleThings platformSuna Yin, Dehua Chen, Jiajin Le. 669-674 [doi]
- On higher-order communication of ErlangNannan Liu, Xian Xu. 675-679 [doi]
- A novel approach for efficient accessing of small files in HDFS: TLB-MapFileBing Meng, Weibin Guo, Guisheng Fan, Neng-wu Qian. 681-686 [doi]
- Ensuring replication-based data integrity and availability in multicloud storageXin Pei, Jiuchuan Lin, Bo Jin, Yongjian Wang. 687-692 [doi]
- Attack-defense trees based cyber security analysis for CPSsXiang Ji, Huiqun Yu, Guisheng Fan, Wenhao Fu. 693-698 [doi]