Abstract is missing.
- Detecting Anomalous Ratings Using Matrix Factorization for Recommender SystemsZhihai Yang, Zhongmin Cai, Xinyuan Chen. 3-14 [doi]
- A Novel Spatial Cloaking Scheme Using Hierarchical Hilbert Curve for Location-Based ServicesNingning Cui, Xiaochun Yang, Bin Wang. 15-27 [doi]
- Efficient Privacy-Preserving Content-Based Image Retrieval in the CloudKai Huang, Ming Xu, Shaojing Fu, Dongsheng Wang. 28-39 [doi]
- Preserving the d-Reachability When Anonymizing Social NetworksXiangyu Liu, Jiajia Li, Dahai Zhou, Yunzhe An, Xiufeng Xia. 40-51 [doi]
- Personalized Location Anonymity - A Kernel Density Estimation ApproachDapeng Zhao, Jiansong Ma, Xiaoling Wang, Xiuxia Tian. 52-64 [doi]
- Detecting Data-model-oriented Anomalies in Parallel Business ProcessNing Yin, Shanshan Wang, Hongyan Li, Lilue Fan. 65-77 [doi]
- Learning User Credibility on Aspects from Review TextsYiFan Gao, Yuming Li, Yanhong Pan, Jiali Mao, Rong Zhang. 78-91 [doi]
- Detecting Anomaly in Traffic Flow from Road Similarity AnalysisXinran Liu, Xingwu Liu, Yuanhong Wang, Juhua Pu, Xiangliang Zhang. 92-104 [doi]
- PACOKS: Progressive Ant-Colony-Optimization-Based Keyword Search over Relational DatabasesZiyu Lin, Qian Xue, Yongxuan Lai. 107-119 [doi]
- Enhanced Query Classification with Millions of Fine-Grained TopicsQi Ye, Feng Wang, Bo Li, Zhimin Liu. 120-131 [doi]
- A Hybrid Machine-Crowdsourcing Approach for Web Table Matching and CleaningChunhua Li, Pengpeng Zhao, Victor S. Sheng, Zhixu Li, Guanfeng Liu, Jian Wu, Zhiming Cui. 132-144 [doi]
- An Update Method for Shortest Path Caching with Burst Paths Based on Sliding WindowsXiaohua Li, Ning Wang, Kanggui Peng, Xiaochun Yang, Ge Yu. 145-158 [doi]
- Low Overhead Log Replication for Main Memory Database SystemJinwei Guo, Chendong Zhang, Peng Cai, Minqi Zhou, Aoying Zhou. 159-170 [doi]
- Diversification of Keyword Query Result PatternsCem Aksoy, Ananya Dass, Dimitri Theodoratos, Xiaoying Wu. 171-183 [doi]
- Efficient Approximate Substring Matching in Compressed StringYutong Han, Bin Wang, Xiaochun Yang. 184-197 [doi]
- Top-K Similarity Search for Query-By-HummingPei-Pei Wang, Bin Wang, Shiying Luo. 198-210 [doi]
- Restricted Boltzmann Machines for Retweeting Behaviours PredictionXiang Li, Lijuan Xie, Yong Tan, Qiuli Tong. 213-224 [doi]
- Cross-Collection Emotion Tagging for Online NewsLi Yu, Xue Zhao, Chao Wang, Haiwei Zhang, Ying Zhang. 225-237 [doi]
- Online News Emotion Prediction with Bidirectional LSTMXue Zhao, Chao Wang, Zhifan Yang, Ying Zhang, Xiaojie Yuan. 238-250 [doi]
- Learning for Search Results Diversification in TwitterYing Wang, Zhunchen Luo, Yang Yu. 251-264 [doi]
- Adjustable Time-Window-Based Event Detection on TwitterQinyi Wang, Jieying She, Tianshu Song, Yongxin Tong, Lei Chen, Ke Xu. 265-278 [doi]
- User-IBTM: An Online Framework for Hashtag Suggestion in TwitterJia Li, Hua Xu. 279-290 [doi]
- Unifying User and Message Clustering Information for Retweeting Behavior PredictionBo Jiang, Jiguang Liang, Ying Sha, Lihong Wang, Zhixin Kuang, Rui Li, Peng Li. 291-303 [doi]
- KPCA-WT: An Efficient Framework for High Quality Microblog Extraction in Time-Frequency DomainMin Peng, Xinyuan Dai, Kai Zhang, Guanyin Zeng, Jiahui Zhu, Shuang Ouyang, Qianqian Xie, Gang Tian. 304-315 [doi]
- Active Learning Method for Constraint-Based Clustering AlgorithmsLijun Cai, Tinghao Yu, Tingqin He, Lei Chen, Meiqi Lin. 319-329 [doi]
- An Effective Cluster Assignment Strategy for Large Time Series DataDamir Mirzanurov, Waqas Nawaz, Jooyoung Lee, Qiang Qu. 330-341 [doi]
- AdaWIRL: A Novel Bayesian Ranking Approach for Personal Big-Hit Paper PredictionChuxu Zhang, Lu Yu, Jie Lu, Tao Zhou, Zi-Ke Zhang. 342-355 [doi]
- Detecting Live Events by Mining Textual and Spatial-Temporal Features from MicroblogsZhejun Zheng, Beihong Jin, Yanling Cui, Qiang Ji. 356-368 [doi]
- A Label Correlation Based Weighting Feature Selection Approach for Multi-label DataLu Liu, Jing Zhang, Pei-Pei Li, Yuhong Zhang, Xuegang Hu. 369-379 [doi]
- Valuable Group Trajectory Pattern Mining Directed by Adaptable Value Measuring ModelXinyu Huang, Tengjiao Wang, Shun Li, Wei Chen. 380-391 [doi]
- DualPOS: A Semi-supervised Attribute Selection Approach for Symbolic Data Based on Rough Set TheoryJianhua Dai, Huifeng Han, Hu Hu, Qinghua Hu, Jinghong Zhang, Wentao Wang. 392-402 [doi]
- Semi-supervised Clustering Based on Artificial Bee Colony Algorithm with Kernel StrategyJianhua Dai, Huifeng Han, Hu Hu, Qinghua Hu, Bingjie Wei, Yuejun Yan. 403-414 [doi]
- HMNRS: A Hierarchical Multi-source Name Resolution Service for the Industrial InternetYang Liu, Guoqiang Fu, Xinchi Li. 417-429 [doi]
- Optimizing Replica Exchange Strategy for Load Balancing in Multienant DatabasesTeng Liu, Qingzhong Li, Lanju Kong, Lei Liu, Li-zhen Cui. 430-443 [doi]
- ERPC: An Edge-Resources Based Framework to Reduce Bandwidth Cost in the Personal CloudShaoduo Gan, Jie Yu, Xiaoling Li, Jun Ma, Lei Luo, Qingbo Wu, Shasha Li. 444-456 [doi]
- Multidimensional Similarity Join Using MapReduceYe Li, Jian Wang, Leong Hou U. 457-468 [doi]
- Real-Time Logo Recognition from Live Video Streams Using an Elastic Cloud PlatformJianbing Ding, Hongyang Chao, Mansheng Yang. 469-480 [doi]
- Profit Based Two-Step Job Scheduling in CloudsShuo Zhang, Li Pan, Shijun Liu, Lei Wu, Xiangxu Meng. 481-492 [doi]
- A Join Optimization Method for CPU/MIC Heterogeneous SystemsKailai Zhou, Hong Chen, Hui Sun, Cuiping Li, Tianzhen Wu. 493-505 [doi]
- GFSF: A Novel Similarity Join Method Based on Frequency VectorZiyu Lin, Daowen Luo, Yongxuan Lai. 506-518 [doi]