default search action
Journal of Software, Volume 9
Volume 9, Number 1, 2014
- Wenxue Tan, Chunjiang Zhao, Huarui Wu, Xiping Wang:
An Innovative Encryption Method for Agriculture Intelligent Information System based on Cloud Computing Platform. 1-10 - Jianbin Ma, Ying Li, Guifa Teng:
CWAAP: An Authorship Attribution Forensic Platform for Chinese Web Information. 11-19 - Shiliang Luo, Lianglun Cheng, Bin Ren, Quanmin Zhu:
An Improved Intelligent Ant Colony Algorithm for the Reliability Optimization Problem in Cyber-Physical Systems. 20-25 - Hong Liu, Yuanyuan Li, Hanchao Yu:
The Population-Based Optimization Algorithms for Role Modelling and Path Generation in Group Animation. 26-36 - Chaozheng Hu, Feng Shao, Gangyi Jiang, Mei Yu, Fucui Li, Zongju Peng:
Quality Assessment for Stereoscopic Images by Distortion Separation. 37-43 - Le Wang, Lin Feng, Mingfei Wu:
UDS-FIM: An Efficient Algorithm of Frequent Itemsets Mining over Uncertain Transaction Data Streams. 44-56 - Heng Li, Dan Yang, Xiaohong Zhang:
Research on Multi-Tenant Distributed Indexing for SaaS Application. 57-62 - Zhuangya Zhang, Haiguang Zhang, Yuanyuan Liu, Qingxi Hu:
Hybrid Intelligent Recommending System for Process Parameters in Differential Pressure Vacuum Casting. 63-69 - Chijun Zhang, Guanyu Mu, He Chen, Tiezheng Sun, Liyan Pang:
Distributed Service Discovery Algorithm Based on Ant Colony Algorithm. 70-75 - Marfizah Abdul Rahman, Rozilawati Razali, Dalbir Singh:
A Risk Model of Requirements Change Impact Analysis. 76-81 - Brahim Belattar, Abdelhabib Bourouis:
Yet Another Java Based Discrete-Event Simulation Library. 82-88 - Tingrui Pei, Hongzhi Zhang, Zhetao Li, Youngjune Choi:
Survey of Community Structure Segmentation in Complex Networks. 89-93 - Zuohua Ding, Hui Zhou, Hui Shen, Qi-Wei Ge:
A Public-Key Cryptosystem Based On Stochastic Petri Net. 94-103 - Shang Gao, Ling Qiu, Cungen Cao:
Estimation of Distribution Algorithms for Knapsack Problem. 104-110 - Basem Y. Alkazemi:
A Framework to Assess Legacy Software Systems. 111-115 - Ruifu Wang, Nannan Liu, Maojing Xu, Xiangchao Kong:
Research on the Open Source GIS Development Oriented to Marine Oil Spill Application. 116-120 - Chao Yun, Xiaomin Li:
Research on UAV Flight Dynamic Simulation Model Based on Multi-Agent. 121-128 - Jian Xu, Xuefeng Li, Yi Zhong, Hong Zhang:
Availability Modeling and Analysis of a Single-Server Virtualized System with Rejuvenation. 129-139 - Jin Li, Yedi Yang, Qunxin Zhao:
Study on Passenger Flow Simulation in Urban Subway Station Based on Anylogic. 140-146 - Zhiyu Zhou, Dichong Wu, Xiaolong Peng, Zefei Zhu, Kaikai Luo:
Object Tracking Based on Camshift with Multi-feature Fusion. 147-153 - Qingqi Pei, Jie Yu:
A Secure Dynamic Identity based Single Sign-On Authentication Protocol. 154-161 - Tiancheng Zhang, Yifang Yin, Dejun Yue, Xirui Wang, Ge Yu:
Research and Implementation of an RFID Simulation System Supporting Trajectory Analysis. 162-168 - Xiangyou Li, Qingxiang Zhang:
Duality of Multi-objective Programming. 169-176 - Yichun Peng, Yunpeng Wang, Yi Niu, Qiwei Hu:
Application Study on Intrusion Detection System Using IRBF. 177-183 - Jiechang Wen, Suxian Zhang, Junjie Yang:
A Fast Algorithm for Undedetermined Mixing Matrix Identification Based on Mixture of Guassian (MoG) Sources Model. 184-189 - Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong:
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. 190-194 - Jianhui Yang, Wei Dou:
A new Prediction method of Gold price: EMD-PSO-SVM. 195-202 - Minguang Song, Ping Guo:
Combining Local Binary Patterns for Scene Recognition. 203-210 - Jing Zhang:
Balanced Growth Solutions and Related Problems of Hua's Macroeconomic Model. 211-215 - Wei-Qiang Zhang, Yi-Mei Song, Jiqiang Feng:
A New Image Denoising Method Based on Wave Atoms and Cycle Spinning. 216-221 - Yuan Zhou, Hai-Lin Liu, Wenqin Chen, Jingqian Li:
A Novel Multi-objective Evolutionary Algorithm Solving Portfolio Problem. 222-229 - Xiao Zhi Gao, Jing Wang, Jarno M. A. Tanskanen, Rongfang Bie, Xiaolei Wang, Ping Guo, Kai Zenger:
Optimal Classification of Epileptic EEG Signals Using Neural Networks and Harmony Search Methods. 230-239 - Dongjiang Ji, Wenzhang He:
A Fractional Order Integral Approach for Reconstructing from Noisy Data. 240-245 - De-jin Kong, Xiao-ling Yao:
An Ad Hoc Network Load Balancing Energy-Efficient Multipath Routing Protocol. 246-250 - Yuhuang Zheng:
A Model-Based Fault Detection Framework for Vacuum Circuit Breaker by Trip Coil Analysis. 251-257 - Yanyang Guo, Gang Wang, Fengmei Hou, Qingling Mei:
Recent Frequent Item Mining Algorithm in a Data Stream Based on Flexible Counter Windows. 258-263
Volume 9, Number 2, 2014
- Lin Yan, Shuo Yan:
Researches on Rough Truth of Rough Axioms Based on Granular Computing. 265-273 - Hanshi Wang, Lizhen Liu, Wei Song, Jingli Lu:
Feature-based Sentiment Analysis Approach for Product Reviews. 274-279 - Changlei Dongye, Yongguo Zheng, Donghuan Jiang:
A Fast Global Minimization of Region-Scalable Fitting Model for Medical Image Segmentation. 280-286 - Jinyu Guo, Haibin Chen, Yuan Li:
Palmprint Recognition Based on Local Fisher Discriminant Analysis. 287-292 - Zhipeng Liu, Yefan Hong, Dechang Pi:
A Large-Scale Study of Web Password Habits of Chinese Network Users. 293-297 - Kwan Yong Sim, Chin S. Low, Fei-Ching Kuo:
Eliminating Human Visual Judgment from Testing of Financial Charting Software. 298-312 - Xinli Wang:
Least-square Support Vector Machine for Financial Crisis Forecast Based on Particle Swarm Optimization. 313-318 - Dingli Yang, Qiuchan Bai, Yulin Zhang, Rendong Ji, Huanyu Zhao:
Eye Location Based on Hough Transform and Direct Least Square Ellipse Fitting. 319-323 - Chijun Zhang, Yongjian Yang, Xiaoyu Guo, Zhanwei Du, Na Lin:
The Improved Algorithm of Semantic Similarity Based on the Multi-dictionary. 324-328 - Jianhua Wang, Lianglun Cheng, Jun Liu, Shiliang Luo:
A High Efficient Tables Look-up Algorithm for CAVLC Decoding. 329-335 - Chunguang Kuang, Chunlei Wang, Minhuan Huang:
Memory-Size-Assisted Buffer Overflow Detection. 336-342 - Alaa Mustafa El-Halees:
Software Usability Evaluation Using Opinion Mining. 343-349 - Xuewen Xia, Jingnan Liu, Yuanxiang Li:
Particle Swarm Optimization Algorithm with Reverse-Learning and Local-Learning Behavior. 350-357 - Ying Xing, Junfei Huang, Yunzhan Gong, Yawen Wang, Xuzhou Zhang:
An Intelligent Method Based on State Space Search for Automatic Test Case Generation. 358-364 - Yuanyuan Guo, Chaoyou Wang, Yuqiang Feng:
The Moderating Effect of Organizational Learning Culture on Individual Motivation and ERP System Assimilation at Individual Level. 365-373 - Yu-Li Chen:
Virtual Reality Software Usage in an EFL Scenario: An Empirical Study. 374-381 - Ema Utami:
The Advantages of Using CHECK Constraints in The Academic Database Tables. 382-388 - Jianmin Zhu, Donger Zhou, Fucai Li, Tingting Fu:
Improved Real Coded Genetic Algorithm and Its Simulation. 389-397 - Youcong Ni, Bei Chen, Peng Ye, Chunyan Wang:
A Framework for iOS Application Development. 398-403 - Zhiguang Zhang:
An Approach to Multi-attribute Group Decision Making and Its Application to Project Risk Assessment. 404-408 - Zhao Li, Shouzhi Xu, Yi Zhao, Peng Liang, Keqing He:
Using SWRL and Protégé 4.1 to Optimize and Reason with Policies of the Cooperation between Goal and Process. 409-416 - Hongyu Li, Yuxin Wang, Jiazheng Yuan:
Adding Domain Model Description for Web Services. 417-424 - Dingrong Yuan, Shenglong Fang, Yaqiong Liu:
The Design of Smart Home Monitoring System Based on WiFi Electronic Trash. 425-428 - Mingqing Zhang, Shudong Hao, Yanyan Xu, Dengfeng Ke, Hengli Peng:
Automated Essay Scoring Using Incremental Latent Semantic Analysis. 429-436 - Xiuli Sang, Song Gao, Jianxin Xu, Hua Wang, Kun Zhang:
Modeling and Prediction of Rainfall-runoff Relationship in the Yuanjiang, Red River Basin. 437-442 - Shengjun Xue, Fei Liu, Xiaolong Xu:
An Improved Algorithm Based on NSGA-II for Cloud PDTs Scheduling. 443-450 - Zhi-hang Tang, Wen-bin Tian:
A New Data Mining Approach Combined with Extension Set and Rough Set. 451-457 - Shucong Liu, Yanxing Song, Jingsong Yang:
Image Encryption Algorithm Based on Wavelet Transforms and Dual Chaotic Maps. 458-465 - Shengjun Xue, Mengying Li, Xiaolong Xu, Jingyi Chen:
An ACO-LB Algorithm for Task Scheduling in the Cloud Environment. 466-473 - Yu Zhang, Feng Liu:
ETER: Encounter Time Estimating Routing for Satellite IP Networks. 474-481 - Ting Wang, Ruihua Di, Jicheng Song:
A Novel Online Encyclopedia-Oriented Approach for Large-Scale Knowledge Base Construction. 482-489 - Hongzhe Liu, Pengfei Wang:
Assessing Text Semantic Similarity Using Ontology. 490-497 - Bing Wu, Baiwei Lei, Zhenjiang Yu:
Study on Integrated Command Platform for Emergency Rescue in Coal Mines Based on WebGIS. 498-506 - Xirong Bao, Jiahua Xie, Lingqiao Nan, Shuanglong Li:
WRECS: an Improved Cluster Heads Selection Algorithm for WSNs. 507-514 - Lun Gao, Taifu Li, Lizhong Yao, Feng Wen:
Research and Application of Data Mining Feature Selection Based on Relief Algorithm. 515-522 - Xiaoying Zhang, Zheng Jiang, Ning Ding:
Three-phase Magnitude-phase Detection Based on T/4 Time-lapse Elimination Method. 523-529
Volume 9, Number 3, 2014
- Jinyu Guo, Haibin Chen, Yuan Li:
Palmprint Recognition Using 2D-FLDA From a Single Image Per Person. 531-535 - Guang Zheng, Kai Cui, Junping Zhan, Zekun Ning, Miao Jiang, Cheng Lu, Aiping Lu:
Bisimulation-based Consistency Checking on Syndrome Feng-Shi-Re-Bi in Rheumatoid Arthritis. 536-540 - Fangjun Wu:
Comparative Analysis of Software Network and CK Metrics: Implications for Pre- and Post-release Faults. 541-552 - Zhanlin Yu, Longchang Zhang:
QoS-aware SaaS Services Selection with Interval Numbers for Group User. 553-559 - Erzhou Zhu, Feng Liu, Xianyong Fang, Xuejun Li, Yindong Yang, Alei Liang:
DYBS: A Lightweight Dynamic Slicing Framework for Diagnosing Attacks on x86 Binary Programs. 560-568 - Guofeng Yan, Yuxing Peng, Shuhong Chen, Junyi Liu:
Design and Implementation of AIRF: A Anycast-Based Integrated Routing Framework for WSNs. 569-575 - Puyu Hao, Yufen Feng, Weijun Ge, Guangfeng Zhao:
Animation Simulation of Visualization Management System in the Iron and Steel Enterprises: The Design and Its Implementation. 576-581 - Qiaoli Zhuang, Wenzhan Dai:
A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net. 582-588 - Yuying Wang, Ning Yang:
Test Case Generation of Web Service Composition based on CP-nets. 589-595 - Xiao Liang, Hongyu Yang, Yinling Qian, Yanci Zhang:
A Fast Kd-tree Construction for Ray Tracing based on Efficient Ray Distribution. 596-604 - Hsu-Chen Cheng, Wen-Wei Liao:
Blog Interface Producing Mechanism in Learning Management System. 605-612 - Jiangang Pang, Lina Jie, Fan Xu:
Study on the Group Cooperative Innovation Based on WEB2.0. 613-620 - Xin-kan Mu, Yong-hong Chen:
SMS-based Remote Computer Supervisory Control System Design. 621-626 - Qing Zhou, Chaorui Bu, Yuwen Feng:
Layout of Gas Station Based on Multi-Agent Simulation. 627-633 - Ya Xie, Zhonghua Huang:
Statistics Based Q-learning Algorithm for Multi-Agent System and Application in RoboCup. 634-640 - Yuanyuan Zhang, Qinyan Zhang, Guanfu Jiang:
A DOM-based Anchor-Hop-T Method for Web Application Information Extraction. 641-647 - Hao Zhang, Ling Huang, Xianru Liu:
Effective Scanned-Certification Image Retrieval Based on Local Object and Block Matching. 648-654 - Hongqin Shi:
DWT and SVD based Watermarking Scheme with Circulation. 655-662 - Jianing Zheng, Hao Hu, Yizhou Li, Daozheng Huang:
Fuzzy Expert System for the Competitiveness Evaluation of Shipbuilding Companies. 663-667 - Zhaoman Zhong, Cunhua Li, Hongwei Dai:
Incorporating Content and Time Features for Chinese Story Subtopic Identification. 668-675 - Lijuan Zhou, Xiang Wang:
Research of the FP-Growth Algorithm Based on Cloud Environments. 676-683 - Zhurong Zhou, Dengwu Yang:
Personalized Recommendation of Preferred Paths Based On Web Log. 684-688 - Yating Yuan, Yi Zhuang, Ying Huo:
Research and Application of Data Integration in Aircraft Designing Based on SDO. 689-696 - Renqing Li, Shihai Wang:
An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets. 697-704 - Hao Yuan, Changbing Li, Maokang Du:
Optimal Virtual Machine Resources Scheduling Based on Improved Particle Swarm Optimization in Cloud Computing. 705-708 - Kai Su, Liangli Ma, Xiaoming Guo, Yufei Sun:
An Efficient Discrete Invasive Weed Optimization Algorithm for Web Services Selection. 709-715 - Jie Xue, Xiyu Liu:
A K-nearest Based Clustering Algorithm by P Systems with Active Membranes. 716-725 - Xiaowen Liang, Wei Gong, Wenlong Fu, Jing Qi:
A Selection Algorithm of Training Set Based on Similar Classification. 726-731 - Ping Jin, Shichao Qu, Yu Zong, Xin Li:
CUDAP: A Novel Clustering Algorithm for Uncertain Data Based on Approximate Backbone. 732-737 - Haifei Zhang:
A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration. 738-742 - Derong Zhu:
A Heuristic Optimization Algorithm in System Structure Optimization. 743-747 - Xue Zhang, Jian Cheng Lv:
Sparse Affinity Propagation for Image Analysis. 748-756 - Ming Jiang, Jingcheng Huang, Xingqi Wang, Jingfan Tang, Chunming Wu:
An Approach for Crowd Density and Crowd Size Estimation. 757-762 - Yujie Zhao, Xinxing Luo:
The Multiple Attribute Group Decision Making model for Web Software Trustworthiness. 763-776 - Liping Sun, Yonglong Luo, Yalei Yu, Xintao Ding:
Voronoi Diagram Generation Algorithm based on Delaunay Triangulation. 777-784 - Yuling Tian:
The Clonal Expansion and Memory Strategy Applied to Network Detection. 785-791
Volume 9, Number 4, 2014
- Yuying Wang, Ning Yang:
Web Service Composition Verification of Safety Properties Based on Predicate Abstraction. 793-799 - Jiufu Liu, Jianyong Zhou, Chunsheng Liu, Zhong Yang, Zhisheng Wang, Yifan Zhang:
Modeling and Analyzing Flight Control Software of Unmanned Aerial Vehicle Using UML and B Method. 800-806 - Haiyang Xu, Yi Zhuang:
A Formal Transformation Approach for Embedded Software Modeling. 807-813 - Lian-Lei Lin, Yue Ma, Ling-Yu Li:
Design of Resource Repository in Virtual Test Architecture. 814-819 - Xiaoling Hao, Songqiao Han:
Measurement and Control of Operational Risk of Banking Industry based on Complex Network. 820-828 - Ardiansyah Ardiansyah, Brian Timothy, Widodo Budiharto:
A Web Framework for SMEs (Small and Medium Enterprises) using Loosely Coupled Web Services. 829-833 - Jianhua Wang, Lianglun Cheng, Jun Liu:
A Complex Event Detection Method for Multi-probability RFID Event Stream. 834-840 - Xiangyan Meng, Zhongxue Zhang, Xinying Xu:
A Novel K-Nearest Neighbor Algorithm Based on I-Divergence with Application to Soil Moisture Estimation in Maize Field. 841-846 - Anil Kumar Karna, Yuting Chen:
Multi-operative USB HD: An All-In-One Solution to IT Supports and Forensic Experts. 847-858 - Fen Xiao, Xieping Gao, Bodong Li:
A Novel Image Fusion Method based on Translation Invariant Wavelet Transforms. 859-866 - Munan Li, Junfeng Zhou, Xin Liang:
Modeling and Description of Organization-Oriented Architecture. 867-872 - Jie Huang:
The Workflow Task Scheduling Algorithm Based on the GA Model in the Cloud Computing Environment. 873-880 - Zhiyan Zhou, Zhigang Zhang, Xiwen Luo:
A Fuzzy Path Preview Algorithm for the Rice Transplanting Robot Navigation System. 881-888 - Dong Wang, Qingsheng Zhu, Yi Xia:
Real-time Multiresolution Rendering for Dynamic Terrain. 889-894 - Liang Hao, Gang Cui, Mingcheng Qu, Wende Ke:
Resource Scheduling Optimization Algorithm of Energy Consumption for Cloud Computing Based on Task Tolerance. 895-901 - Xiaoning Jing, Xiaojiu Li, Xiaojie Li:
Edge Extraction for Human Body Images based on ACAFCM Algorithm. 902-906 - Xianmin Yu, Rangding Wang, Diqun Yan, Pengfei Ma:
Detecting Fake-Quality MP3 based on Huffman Table Index. 907-912 - Xiaofei Wang, Xiaohai He, Qizhi Teng, Mingliang Gao:
Digital Image Stabilization Based on Harmony Filter. 913-920 - Ji Li, Longhua Feng, Shenglong Fang:
An Greedy-Based Job Scheduling Algorithm in Cloud Computing. 921-925 - Guangzhen Lu, WenAn Tan, Yong Sun, Zijian Zhang, Anqiong Tang:
QoS Constraint Based Workflow Scheduling for Cloud Computing Services. 926-930 - Lang Sun, Yan Tang, Hong Zhang:
An Effective Image Retrieval Method Based on Multi-features. 931-937 - Changjiang Liu, Xuling Wu, Wei Xiong:
Chinese Herbal Medicine Classification Based. 938-943 - Jiajun Lu, Zhiqiu Huang, Changbo Ke:
Verification of Behavior-aware Privacy Requirements in Web Services Composition. 944-951 - Xiaole Li, Ming Weng, Ying Wen:
Construction of Network Security Architecture Based on Formal Specification in Digital Campus. 952-957 - Jing Lu, Ting Dou:
Provable Dynamic Data Possession by Datalog Rules. 958-963 - Zetao Jiang, Le Zhou, Liwen Zhang:
A Method of Image Registration Based On Best Similarity of Local Geometric Figure. 964-969 - Lai-Xiang Shan, Zheng Qin, Shengnan Li, Renwei Zhang, Xiao Yang:
Conversion Algorithm of Linear-Time Temporal Logic to Buchi Automata. 970-976 - Yuanzi Xu, Qingzhong Li, Zhongmin Yan, Wei Wang:
Web Event Topic Analysis by Topic Feature Clustering and Extended LDA Model. 977-984 - Chuibi Huang, Jinlin Wang, Gang Wu, Jun Chen:
Mining Web User Behaviors to Detect Application Layer DDoS Attacks. 985-990 - Yueqiu Jiang, Caiyuan Jin, Hongwei Gao:
Study of Highly Efficient Algorithms for the Character Recognition System of Medicine Bottle Label. 991-998 - Li Zhang, Qin Tao, PiQiang Teng:
An Improved Collaborative Filtering Algorithm Based on User Interest. 999-1006 - Bin Wen, Ziqiang Luo, Peng Liang:
Toward Customer-centric SOA: Services Resource Active Provisioning Approach. 1007-1018 - Jing Li, Yanping Li, Yuan Wang, Huakui Wang:
QoS Bee Routing Protocol for Ad Hoc Networks. 1019-1027 - Jingling Yuan, Jing Xie, Yan Yuan, Lin Li:
The Large-scale Dynamic Data Rapid Reduction Algorithm Based on Map-Reduce. 1028-1035 - Husheng Liao, Jia Wu, Jia Liu:
Functional Dependency based on XML Node Sets. 1036-1044 - Hongwei Liu, Li Chen, Hui Zhu, Tao Lu, Fei Liang:
Uncertainty Community Detection in Social Networks. 1045-1049 - Chunyan You, Yong Liu, Bo Zhao, Shizhong Yang:
An Objective Quality Metric for Image Fusion based on Mutual Information and Muti-scale Structural Similarity. 1050-1054
Volume 9, Number 5, 2014
- Ahmed Kabiri, Dalila Chiadmi:
Architecture for Near Zero Latency in Datawarehouse. 1055-1061 - Zhen Yu, Jie Zhu, Guicheng Shen, Haiyan Liu:
Trust Management in Peer-to-Peer Networks. 1062-1070 - Mou'ath Hourani, Qusai Shambour, Ahmad Al-Zubidy, Ali Al-Smadi:
Proposed Design and Implementation for RESTful Web Server. 1071-1080 - Yang Liu, Xin-Qing Yan, Gui-ming Lu:
The Design and Implementation of a Novel Distributed Multi-Sensor Information Fusion Simulation System. 1081-1088 - K. Shantha Kumari, T. Chithralekha:
Challenges in Modeling Evolving Access Control Policies using Feature Modeling. 1089-1094 - Bens Pardamean, Hutanti Setyodewi:
Information System Model of A Work-Plan Budget. 1095-1106 - Jia Liu, Donghui Xie:
Open Software Platform for Haptic Interaction. 1107-1112 - Maosen Xia, Lingling Jiang, Yumei Wang:
Classification of High-dimensional Data Clustering Based on Rules Mining Research. 1113-1120 - Zhenhuan He, Lei Nie, Huiling Fu:
Service Planning System for Large-scale High Speed Railway Network. 1121-1128 - Zhijun Zheng, Yanbin Peng:
Tri-Training based Bilateral Multi-Issue Negotiation Framework. 1129-1134 - Xinquan Chen:
Computational Model of Association Activity Measure and Its Algorithmic Implementation. 1135-1140 - Ngarap Im. Manik, Fransisca Fortuanatadewi, Don Tasman:
Testing of Rings and Fields Using A Computer Program. 1141-1150 - Yangxin Yu, Liuyang Wang:
A Novel Similarity Calculation Method Based on Chinese Sentence Keyword Weight. 1151-1156 - Ke Zhan, Yunquan Zhang:
Function Prediction of Proteins in Yeast Networks Based on the MCL Algorithm. 1157-1162 - Lina Liu, Jihong Shen, Qianghua Zhu:
Detecting Microblogger's Attitude towards Bursty Events: A Text Chain Model. 1163-1169 - Ming Huang, Shujie Guo, Xu Liang, Xuan Jiao:
Application of Improved Harmony Search Algorithm in Test Case Selection. 1170-1176 - Keyong Hu, Zhongwen Guo, Zhaodong Che, Feifei Shen:
Composition Model of Complex Virtual Instrument for Ocean Observing. 1177-1188 - Ahmed Alahmadi, Ben Soh, Azmat Ullah:
Improving e-Health Services and System Requirements by Modelling the Health Environment. 1189-1201 - Derwin Suhartono, David Christiandy, Rolando Rolando:
Lemmatization Technique in Bahasa: Indonesian Language. 1202-1209 - Fei Peng, Xuewen Zeng, Haojiang Deng, Lei Liu:
The QoS Prediction of Web Service with Location Information Ensemble. 1210-1216 - Qiang Ge, Guohua Shen, Zhiqiu Huang, Changbo Ke:
The Application of SWRL Based Ontology Inference for Privacy Protection. 1217-1222 - Litao Han, Teng Zhang, Zhenyong Wang:
The Design and Development of Indoor 3D Routing System. 1223-1228 - Flávio Fernandes, Mark A. J. Song:
UML-Checker: An Approach for Verifying UML Behavioral Diagrams. 1229-1236 - Lin Ma, Xiangyu Zeng:
Analysis on Train Stopping Accuracy based on Regression Algorithms. 1237-1244 - Zhishang Yang, Zerui Sun, Shenluo Li:
Viewpoint Based Problem Modeling Technique and Its Application. 1245-1254 - Shengnan Li, Zheng Qin, Lai-Xiang Shan, Renwei Zhang, Xiao Yang:
A Survey on Target Tracking in Well-deployed Wireless Sensor Networks. 1255-1262 - Xiaoyan Guo, Qing Li:
Fixed Bed Reactor Design Program Development Based on Java. 1263-1269 - Qingjiang Wang, Lin Zhang, Chengguo Chang:
Syntactic Function-Based Chinese Lexical Categories and Category Grammar Parsing. 1270-1274 - Xiuli Sang, Song Gao, Jianxin Xu, Hua Wang:
A Method for Determining the Importance of Customer Demand Based on Rough Set and DEA. 1275-1280 - Canlin Li, Rijian Su:
A Novel Stratified Self-calibration Method of Camera Based on Rotation Movement. 1281-1287 - Hongyao Ju, Fei Luo:
On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network. 1288-1293 - Yun Xue, Chong Sze Tong, Jing Yun Yuan:
LDA-based Non-negative Matrix Factorization for Supervised Face Recognition. 1294-1301 - Haryani Haron, M. Hamiz:
An Ontological Model for Indigenous Knowledge of Malay Confinement Dietary. 1302-1312 - Raden Achmad Chairdino Leuveano, Fairul Azni Bin Jafar, Chairul Saleh, Mohd Razali Bin Muhamad:
Incorporating Transportation Cost into Joint Economic Lot Size For Single Vendor-Buyer. 1313-1323 - Romi Satria Wahono, Nanna Suryana, Sabrina Ahmad:
Metaheuristic Optimization based Feature Selection for Software Defect Prediction. 1324-1333 - Anongnart Srivihok, Wirot Yotsawat:
Market Segmentation of Inbound Business Tourists to Thailand by Binding of Unsupervised and Supervised Learning Techniques. 1334-1341 - Ahmad Shukri Mohd Noor, Mustafa Mat Deris, Md. Yazid Bin Mohd. Saman, Emma Ahmad Sirajudin:
Distributed Dynamic Failure Detection. 1342-1347 - Thomas Kandl, Nawaz Khan:
Information Integration of Drug Discovery and Clinical Studies to Support Complex Queries Using an Information Supply Chain Framework. 1348-1356
Volume 9, Number 6, 2014
- Hao Lan Zhang, Chaoyi Pang, Kotagiri Ramamohanarao:
Guest Editorial. 1357-1358 - Xiaohui Hu, Hao Lan Zhang, Xiaosheng Wu, Jianlin Chen, Yu Xiao, Yun Xue, TieChen Li, Hongya Zhao:
A New Customer Segmentation Framework Based on Biclustering Analysis. 1359-1366 - Yi-mu Ji, Jie Tan, Hai Liu, Yan-peng Sun, Jia-bang Kang, Zizhuo Kuang, Chuanxin Zhao:
A Privacy Protection Method Based on CP-ABE and KP-ABE for Cloud Computing. 1367-1375 - Zhiwei Yu, Xingsen Li, Fangyao Liu:
A Tri-indicator Evaluation Method on The Rural Comprehensive Information Service Stations and Its Case Study in Ningbo, China. 1376-1381 - Hao Wang, Ruey Long Cheu:
A Microscopic Simulation Modelling of Vehicle Monitoring Using Kinematic Data Based on GPS and ITS Technologies. 1382-1388
- Mohammad Ubaidullah Bokhari, Nesar Ahmad:
Incorporating Burr Type XII Testing-efforts into Software Reliability Growth Modeling and Actual Data Analysis with Applications. 1389-1400 - Ye Guo, Mingyu Wang, Yangxia Luo:
Identifying Software Theft Based on Classification of Multi-Attribute Features. 1401-1411 - Mutlaq B. Alotaibi:
Multimodal Metaphors for Edutainment in E-Learning Interfaces: A Usability Evaluation of Learnability and Experienced User Performance. 1412-1422 - Qindong Sun, Xiuwen Sun, Nan Wang, Qian Wang:
A Large-scale Trojans Control Model Based on Layered and P2P Structure. 1423-1427 - Rong Xie, Long Li:
Simulation of Optimized Evacuation Processes in Complex Buildings Using Cellular Automata Model. 1428-1434 - Eduardo Maciel da Cunha Mattos, Marcelo Vieira, Eber Assis Schmitz, Antonio Juarez Alencar:
Applying Game Theory to the Incremental Funding Method in Software Projects. 1435-1443 - Dianlong You, Limin Shen:
Determination Method of Evolution Type of Service-oriented Entity. 1444-1452 - Rajeev Kaula:
Data Modeling of Web Site Structure: An Oracle Prototype. 1453-1462 - Kai Shuang, Li Ni:
Network Behavior Analysis and Resource Consumption Evaluation for Android IM Applications in GPRS. 1463-1470 - Lijun Lun, Lin Zhang, Xin Chi, Hui Xu:
Shortest Component Path Generation of C2-Style Architecture Using Improved A* Algorithm. 1471-1478 - Xu Liang, Shujie Guo, Ming Huang, Xuan Jiao:
Combinatorial Test Case Suite Generation Based on Differential Evolution Algorithm. 1479-1484 - Maen Hammad, Mustafa Hammad, Ahmed F. Otoom, Mohammad Bsoul:
Detecting Breaks in Design Patterns from Code Changes. 1485-1493 - Ting Ke, Lujia Song, Bing Yang, Xinbin Zhao, Ling Jing:
Building a Biased Least Squares Support Vector Machine Classifier for Positive and Unlabeled Learning. 1494-1502 - Jie Yu, Xuesong Yin:
Construction Mechanism of Digital Lifelong Learning Platform. 1503-1508 - Xiaoying Gu, Yongshan Liu, Xuefang Yan:
Node Selection Algorithm for Peer-to-Peer Network in 3D Virtual Scene. 1509-1513 - Rattanan Nantiyakul, Settachai Chaisanit:
Enhancing Corporate Performance Management with Performatica Application. 1514-1524 - Dapeng Wang, Guang Jin, Jiaming He, Xianliang Jiang, Zhijun Xie:
A Grey List-Based Privacy Protection for Android. 1525-1531 - Yachao Wang, Gang Wu, Lixia Ding:
Plant Species Identification Based on Independent Component Analysis for Hyperspectral Data. 1532-1537 - He Xiao, Yunbo Rao:
An Efficient Method of Text Localization in Complicated Background Scenes. 1538-1544 - Tingan Tang, Cheng Cheng, Matti Hämäläinen:
Everyday Life Sensing by Living Lab Approach. 1545-1552 - Lei Yuan, Shiying Yang, Dewang Chen, Kaicheng Li:
Hierarchical Modeling and Verification for High-speed Train Control Center by Time Automation. 1553-1560 - Lin Ye, Guoxiang Yao:
Parallel Clone Code Detector in MapReduce. 1561-1566 - Derong Zhu:
A Novel Algorithm for Solving the Coverage Hole and the Complete Coverage Range in Wireless Sensor Networks. 1567-1573 - Tienan Zhang, Peng Xiao:
A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments. 1574-1580 - Guohui Li, Hong Yang:
A Prediction Method for Underwater Acoustic Chaotic Signal Based on RBF Neural Network. 1581-1586 - Lan Ma, Jia Xu, Zhijun Wu, Xiaoyu Zhang, Jiusheng Chen, Sarhan M. Musa:
The Security Evaluation of ATM Information System Based on Bayesian Regularization. 1587-1594 - Lijun Cao, Xiyin Liu, Jing Cao, Aiyong Liu, Zhongping Zhang:
Study on Paradigm and Its Normalization with Coexistence of XML Functional Dependence and Multivalues Dependence. 1595-1603 - Bo Li, Yu Zhang, Haoxue Wang, Haixia Xia, Yanfei Liu, Hangbo Zhou, Ming Jiang:
Combining Various Trust Factors for E-commerce Platforms Using Analytic Hierarchy Process. 1604-1611 - Changgeng Yu, Guixiong Liu:
Authentication Methods Based on Digital Fingerprint Random Encryption IBC. 1612-1618 - Ping Yin, Yinxue Ma, Zhe Chen:
Model Checking the Convergence Property of BGP Networks. 1619-1625 - Qingji Gao, Zunchao Zheng, Guochen Niu:
Path Planning Based on Dimension Reduction and Region Clipping for Aircraft Fuel Tank Inspection Robot. 1626-1633 - Zhao Liu, Ze Dong, Pu Han:
Developing a Coal Quality Detection Management System for Power Plants. 1634-1644 - Zhangang Wang, Zixing Wu, Honggang Qu, Yongbo Zhang:
A Standard-based Model for the Exchange of 3D Geological Data. 1645-1653
Volume 9, Number 7, 2014
- Sulan Zhang:
Foliage Simplification Based on Multi-viewpoints for Efficient Rendering. 1655-1665 - Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan, Khaironi Yatim Sharif:
Exploring Facilitators of Transition and Adoption to Agile Methods: A Grounded Theory Study. 1666-1678 - Chao Liang, Luokai Hu, Zhou Lei, Jushu Wang:
SyncCS: A Cloud Storage Based File Synchronization Approach. 1679-1686 - Rigel Procópio Fernandes, Antonio Juarez Alencar, Eber Assis Schmitz, Alexandre L. Correa:
Analysing IT Investments in the Public Sector: A Project Portfolio Approach. 1687-1700 - Hongbo Chen, Yila Su, Chuan Fan:
Research on Reasoning and Retrieval Methods Based on Mongolian Curriculum Areas of Semantic Web. 1701-1706 - Yangping Li, Xiaoheng Pan, Tianming Hu, Sam Yuan Sung, Huaqiang Yuan:
Specifying Complex Systems in Object-Z: A Case Study of Petrol Supply Systems. 1707-1717 - Malik M. Umar, Mohammad R. Alshayeb:
Towards A Framework for Service-Oriented Architecture Metadata Management. 1718-1736 - Rania Mzid, Chokri Mraidha, Jean-Philippe Babau, Mohamed Abid:
RTOS-Aware Refactoring for Portable Real-Time Design Models. 1737-1748 - Hongqin Shi, Fangliang Lv, Yiqin Cao:
A Blind Watermarking Technique for Color Image based on SVD with Circulation. 1749-1756 - Xiaoli Wang, Yuping Wang, Kun Meng:
Optimization Algorithm for Divisible Load Scheduling on Heterogeneous Star Networks. 1757-1766 - Xing Liu, Kun Mean Hou, Christophe de Vaulx, Chengcheng Guo, Hongling Shi, Bin Tian:
Hybrid Real-time Operating System for Resource-constraint Wireless Sensor Nodes. 1767-1780 - Zhidong Wang, Lichao Ye, Wenfa Li:
Design and Implementation of Universal Web-Tree Service Component for Large-Scale Data Maintenance. 1781-1789 - Seif Azghandi:
Cost Analysis and Tradeoffs in Regression Testing using FSMWeb. 1790-1801 - Shiliang Luo, Lianglun Cheng, Bin Ren:
Medical Monitoring and Managing Application of the Information Service Cloud System Based on Internet of Things. 1802-1809 - Zhengping Liang, Yiqun Cheng, Jianyong Chen:
A Novel Optimized Path-Based Algorithm for Model Clone Detection. 1810-1817 - Abraham Tesso Nedjo, Degen Huang, Xiaoxia Liu:
Challenges of Diacritical Marker or Hudhaa Character in Tokenization of Oromo Text. 1818-1826 - Wenjing Liao:
Contextual Patch Feature Learning for Face Recognition. 1827-1832 - Fengying He, Shangping Zhong, Kaizhi Chen:
An Effective Ensemble-based Classification Algorithm for High-Dimensional Steganalysis. 1833-1840 - Qiuping Jiang, Fenfang Duan, Feng Shao:
3D Visual Attention for Stereoscopic Image Quality Assessment. 1841-1847 - Hengliang Shi, Xiaolei Bai, Chongguang Ren, Changwei Zhao:
Development of Internet of Vehicle's Information System based on Cloud. 1848-1853 - Meng Yue, Zhijun Wu, Jin Lei:
Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance. 1854-1861 - Wei-long Chen, Li Guo, Wu He, Wei Wu, Xiaomin Yang:
Super-resolution Reconstruction Algorithm Based on Patch Similarity and Back-projection Modification. 1862-1867 - Lijun Cao, Xiyin Liu, Haiming Wang, Zhongping Zhang:
OPT-Min-Min Scheduling Algorithm of Grid Resources. 1868-1875 - Yi Sun, Zhen Hua, Lihui Zou:
A Parallel Computing Method for Community Structure Detection Based on BSP Model. 1876-1885 - Huiying Gao, Susu Wang, Bofei Yang, Hangzhou Yang:
User Preference-oriented Collaborative Recommendation Algorithm in e-commerce. 1886-1893 - Peng Jia, Qi Gao, Xue Ji, Ting Xu:
Task Decomposition Method of R&D Project Based on Product Structure Tree. 1894-1902 - Wei T. Sheu, Hieu D. Pham, Pin C. Tsai, Tuyen P. Nguyen, Hai P. Nguyen, Masatake Nagai:
Rasch GSP Toolbox for Assessing Academic Achievement. 1903-1913 - Jing Wang, Shan Wei, Qian Xu:
Research on Contradiction Problem-Oriented Description Logic ALCD-ES. 1914-1921 - Renpu Li, Tao Yu, Chunjie Zhou, Hongbo Li:
A Multi-Threshold Granulation Model for Incomplete Decision Tables. 1922-1929 - Huayou Si, Yun Zhao:
A Structured P2P-based Approach to Semantic Web Services Publication and Discovery. 1930-1940 - Yun Zhao, Huayou Si, Qing Lang:
Knowledge Sharing in Virtual Community Based on RDF Triple Publication and Retrieving To Process SPQRQL Query. 1941-1951 - Wei Jiang:
Study on Identification of Subjective Sentences in Product Reviews Based on Weekly Supervised Topic Model. 1952-1959 - Xuanhua Xu, Yue Xia, Qiufeng Wang, Haiming Zhao:
Research about Group Decision Support System for Technology Resources Allocation of Engineering Machinery Based on Information Entropy. 1960-1968 - Shuangyun Peng, Kun Yang:
Designing and Developing an AIDS Transmission Management and Spatial Decision Support System Based on GIS. 1969-1975 - Lin Sun, Jiucheng Xu, Yangyang Liu:
Concept Granule-Based Granular Lattice and Application in Knowledge Retrieval. 1976-1983
Volume 9, Number 8, 2014
- Haiyang Li, Zhaofeng Yang, Hongzhou He:
An Improved Image Segmentation Algorithm Based on GPU Parallel Computing. 1985-1990 - Genqiang Wu, Yeping He, Yi Lu, Liping Ding:
Privacy-Preserving Location Assurance Protocols for Mobile Applications. 1991-2001 - Pietro Cavallo, Giovanni Saggio:
Conversion of Sign Language to Spoken Sentences by Means of a Sensory Glove. 2002-2009 - Ning Huang:
Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection. 2010-2017 - Mei Yu, Xu Han, Tianyi Xu, Jian Yu, Ting Lei, Qing Zhang:
Design of SOAML in Social Network. 2018-2025 - Haomin Cui, Ming Zhu, Shijia Yao:
Ontology-based Top-N Recommendations on New Items with Matrix Factorization. 2026-2032 - Khair Eddin Sabri:
Algebraic Analysis of Object-Based Key Assignment Schemes. 2033-2042 - Guangxia Xu, Shuangyan Liu, Yanbing Liu:
A Secure Transmission Protocol for Wireless Body Sensor Networks. 2043-2049 - Ruifu Wang, Maojing Xu, Yi Ding, Nannan Liu, Xiangchao Kong:
The Development of Marine Oil Spill Operational System Based on GIS. 2050-2055 - Gary Yu-Hsin Chen, Pei-Qi Wang:
Test Case Prioritization in a Specification-based Testing Environment. 2056-2064 - Qingxi Peng, Ming Zhong:
Detecting Spam Review through Sentiment Analysis. 2065-2072 - Wenpeng Su, Zhonghua Yan, Chenghui Liang:
The Design and Implementation of Unified Invoking Component Based on Web Services Framework. 2073-2079 - Meng Han, Zhihai Wang, Jidong Yuan:
Efficient Method for Mining Patterns from Highly Similar and Dense Database based on Prefix-Frequent-Items. 2080-2086 - Hongxing Kan, Jili Hu, Li Jin, Luyao Zhang:
A Minimal Test Cases Calculation Method for Software Trustworthiness Test. 2087-2092 - Yuanmei Wen, Yanyu Chen:
Modified Parallel Cat Swarm Optimization in SVM Modeling for Short-term Cooling Load Forecasting. 2093-2104 - Guodong Wang, Jie Xu, Zhenkuan Pan, Jinbao Yang:
Variational Image Decomposition Model OSV With General Diffusion Regularization. 2105-2111 - Yihan Li, Chao Liu:
Effective Fault Localization Using Weighted Test Cases. 2112-2119 - Tiantian Yang, Jun Wang:
A Robust k-Means Type Algorithm for Soft Subspace Clustering and Its Application to Text Clustering. 2120-2124 - Zhengping Liang, Yiqun Cheng, Jiajia Tan, Jianyong Chen:
A Completeness Optimized Algorithm for Closed Model Clone Detection. 2125-2132 - Fanwen Min, Zhiquan Feng, Yuanyuan Su, Tingfang Zhang:
Three-Dimensional Hand Tracking Based on Microstructure of Hand Motion. 2133-2141 - Yu Guo, Jie Liu:
Model Design of Semantic Website Construction. 2142-2147 - Fan Ning, Xingxing Li, Shouguang Wang, Qiaoli Zhuang:
A Method Based on Depth-first Search to Compute All Minimal Siphons. 2148-2153 - Haijun Zhang:
Algorithm for Fast Finding High-Frequency Strings from Large-Scale Corpus. 2154-2159 - Mohammad Ibrahim Khan, Md Sarwar Kamal:
De Bruijn Graph based De novo Genome Assembly. 2160-2168 - Tülin Erçelebi Ayyildiz, Altan Koçyigit:
An Early Software Effort Estimation Method Based on Use Cases and Conceptual Classes. 2169-2173 - Nazri Kama, Sufyan Basri:
Considering Partially Developed Artifacts in Change Impact Analysis Implementation. 2174-2179 - Hoang Nam Ho, Mourad Rabah, Samuel Nowakowski, Pascal Estraillier:
Trace-Based Weighting Approach for Multiple Criteria Decision Making. 2180-2187 - Yi-Peng Lin, Kuo-Wei Hsu:
Using Color Difference with Shape Context for Logo Recognition. 2188-2193 - Mohsen Naderpour, Jie Lu:
A Situation Analysis Decision Support System Based on Dynamic Object Oriented Bayesian Networks. 2194-2199 - Mohamed Dbouk, Ihab Sbeity, Hamid Mcheick, Haytham Douaihy:
UsualSpace: A Smart Framework to Support Evolutive-Agents. 2200-2205 - Roberto Koh-Dzul, Mariano Vargas-Santiago, Codé Diop, Ernesto Exposito, Francisco Moo-Mena, Jorge R. Gomez-Montalvo:
Improving ESB Capabilities through Diagnosis Based on Bayesian Networks and Machine Learning. 2206-2211 - Kazuhiro Morita, Masao Fuketa, Jun-ichi Aoe:
A Cloud Based Communication System for Elders Using Dialogue Control. 2212-2216 - Zhen Yu, Jie Zhu, Guicheng Shen, Haiyan Liu:
A Topology Adjustment Algorithm for P2P Systems. 2217-2222 - Hong Wang, Yanshen Sun:
Applying Bi-directional Link Mining in Personalized Recommendation. 2223-2231 - Qifeng Zou, Xuezhi Tan, Mei Liu, Yonggang Chi:
Single-Carrier Space Time Transmission Diversity with Decision Feedback Equalization. 2232-2240
Volume 9, Number 9, 2014
- Yan Wang, Guoqing He:
Facial Expression Recognition Based on Local Vector Model. 2241-2245 - Ming Jiang, Wencao Yan, Xingqi Wang, Jingfan Tang, Chunming Wu:
Wikipedia Based Approach for Clustering Keyword of Reviews. 2246-2250 - Xiuhong Chen, Rong Peng, Han Lai, Keqing He:
Analysis and Design of Cloud Publishing Platform and its Social Network. 2251-2259 - Yun-Fei Jia, Hui Xu, Renbiao Wu:
A Nonlinear Dynamic Model for Software Aging in Service-Oriented Software. 2260-2266 - Jing Chen, Fei-Ching Kuo, Xiaoyuan Xie, Lu Wang:
A Cost-driven Approach for Metamorphic Testing. 2267-2275 - Lian Chen, Hongling Liu, Zilong Wan:
An Attribute Reduction Algorithm Based on Rough Set Theory and an Improved Genetic Algorithm. 2276-2282 - Yongchao Xiang, Zhen Liu, Xiaoya Qu:
CPU Frequency Scaling Algorithm for Energy-saving in Cloud Data Centers. 2283-2290 - Jixing Xu, Jianbo Li, Lei You, Chenqu Dai:
A Statistical Analysis and Temporary Cluster Based Routing Algorithm for Delay Tolerant Networks. 2291-2301 - Meihua Xiao, Zilong Wan, Hongling Liu:
The Formal Verification and Improvement of Simplified SET Protocol. 2302-2308 - Xiaofang Hou, Penghua Zhu, Yanxin Ma:
Classification of Cardiac Ultrasound Image Sequences Based on Sparse Representation. 2309-2314 - Xiaobao Li, Xiaoyan Liu, Xiaodong Fu, Feng Wang:
Practical Applications of Ontology-based multi-agent systems for PPHIIS. 2315-2321 - Li Shi, Shanlin Yang, Ke Huang:
The Mechanism of Software Trustworthiness Growth based on Evolution. 2322-2328 - Jinku Yang, Lei Guo, Shaowei Yu, Xiuhua Hu:
A New Multi-focus Image Fusion Algorithm Based on BEMD and Improved Local Energy. 2329-2334 - Bing Wang, Xiaokang Fu, Tinggui Chen, Guanglan Zhou:
Modeling Supply Chain Facility Location Problem and Its Solution Using a Genetic Algorithm. 2335-2341 - Tianjun Lu, Yang Liu, Le Wang:
An Algorithm of Top-k High Utility Itemsets Mining over Data Stream. 2342-2347 - Hua Jin, Yatao Zhu, Zhiqiang Jin, Sandhya Arora:
Sentiment Visualization on Tweet Stream. 2348-2352 - Jia Li:
Multi-features-based license Plate Detection in Nighttime Environment. 2353-2360 - Xingjian Li:
An Algorithm for Mining Frequent Itemsets from Library Big Data. 2361-2365 - Di Zhao:
High-accuracy Optimization by Parallel Iterative Discrete Approximation and GPU Cluster Computing. 2366-2377 - Zhipeng Liu, Dechang Pi:
Warehousing Massive Mobile Datasets. 2378-2383 - Bing Yang, Ling Jing:
A Novel Nonparallel Plane Proximal SVM for Imbalance Data Classification. 2384-2392 - Juan Wang, Fei Li, Luqiao Zhang, Yuanyuan Huang:
PSO based Hierarchical Task Scheduling with QoS Preference Awareness in Cloud Storage Environment. 2393-2400 - Yuanzi Xu, Qingzhong Li, Zhongmin Yan, Wei Wang:
Web Reviews and Events Matching Based on Event Feature Segments and Semi-Markov Conditional Random Fields. 2401-2408 - Chang Su, Yukun Wang, Lan Zhang:
Community Detection in Social Networks Based on Influential Nodes. 2409-2416 - Lihua Zhang, Miao Wang, Zhengjun Zhai, Guoqing Wang:
Mining Closed Strong Association Rules by Rule-growth in Resource Effectiveness Matrix. 2417-2426 - Yi Wu:
Network Big Data: A Literature Survey on Stream Data Mining. 2427-2434 - Shaoping Zhu:
Facial Expression Recognition Based on MILBoost. 2435-2442 - Hui Cai, ShengLin Li, Zhaoxia Wang, Xingchen Li, Lichuan Huang:
A Metadata Management Method Base on Directory Path Code. 2443-2453 - José M. Félix, Francisco Ortin:
Aspect-Oriented Programming to Improve Modularity of Object-Oriented Applications. 2454-2460 - Peiying Zhang, Zhanshan Zhang, Weishan Zhang, Chunlei Wu:
Semantic Similarity Computation Based on Multi-feature Combination using HowNet. 2461-2466 - Sultan Alshehri, Luigi Benedicenti:
Ranking and Rules for Selecting Two Persons in Pair Programming. 2467-2473 - Ali Tizkar Sadabad, Nazri Kama:
Action Driven Decision Modeling Framework towards Formulating Software Project Management Tacit Knowledge. 2474-2483 - I-Ching Chen, Shueh-Cheng Hu:
The Dissection of Unpleasant Customer Experience in Electronic Commerce Contexts. 2484-2490 - Chunxia Yang, Yinghui Wang:
A Digraph-Based Approach to Component Retrieving. 2491-2498
Volume 9, Number 10, 2014
- Bo Ding:
3D CAD Model Representation and Retrieval based on Hierarchical Graph. 2499-2506 - Wenchong Shi, Maohua Liu, Peter Hendler:
Computational Features of the Thinking and the Thinking Attributes of Computing: On Computational Thinking. 2507-2513 - Xiang Chen, Zhaofei Tan, Jian Xia, Pengfei He:
Optimizing Test Case Execution Schedule using Classifiers. 2514-2521 - Pengfei Ma, Rangding Wang, Diqun Yan, Chao Jin:
Detecting double-compressed MP3 with the Same Bit-rate. 2522-2527 - Xuchu Wang, Yanmin Niu, Liwen Tan, Shaoxiang Zhang:
Improved marching cubes using novel adjacent lookup table and random sampling for medical object-specific 3D visualization. 2528-2537 - Rui Deng, Zuoning Chen:
Trusted Puzzle Solvers without Clock Support against Spam and Denial-of-Service Attacks. 2538-2545 - Yoshinobu Tamura, Shigeru Yamada:
Reliability and Portability Assessment Tool Based on Hazard Rates for an Embedded Open Source Software. 2546-2556 - Jinyong Chang, Rui Xue:
General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. 2557-2563 - Damien Hanyurwimfura, Bo Liao, Emmanuel Masabo, Gaurav Bajpai:
A Two-Stage Method for Scientific Papers Analysis. 2564-2573 - Changgeng Yu, Guixiong Liu:
Mass Customization based-Method for Datacenters Computer Room Monitoring System. 2574-2578 - Mingzhe Li, Jinlin Wang, Xiao Chen, Jun Chen:
Event-Driven Extraction of HTTP Payload From Concurrent Streams. 2579-2585 - Reza Nourjou, Stephen F. Smith, Michinori Hatayama, Pedro A. Szekely:
Intelligent Algorithm for Assignment of Agents to Human Strategy in Centralized Multi-agent Coordination. 2586-2597 - Fan Zhang, Zude Zhou, Wenjun Xu:
Distributed Storage and Processing Method for Big Data Sensing Information of Machine Operation Condition. 2598-2606 - Yonghong Xie, Aziguli Wulamu, Xiaojing Hu, Xiaojie Zhu:
Design and Implementation of Privacy-preserving Recommendation System Based on MASK. 2607-2613 - Asif Qumer Gill:
Hybrid Adaptive Software Development Capability: An Empirical Study. 2614-2621 - Md Sarwar Kamal, Mohammad Ibrahim Khan:
Memory Optimization for Global Protein Network Alignment Using Pushdown Automata and De Bruijn Graph. 2622-2627 - Yanrong Jiang, Weihua Li, Jingtao Yang:
An Incremental Approach to Modeling Flexible Workflows Using Activity Decomposition and Gradual Refinement. 2628-2637 - Lihua Ruan, Yong Li, Yingjie Yu:
Simulation System for Airborne Weather Radar Control and Display Based on Virtual Instrument. 2638-2644 - Houda Kaffela, Naoufel Kraïem, Jamil Dimassi, Zuhoor Al-Khanjari:
A proposal for a method to translate MAP model into BPMN process diagram. 2645-2650 - Hong He:
Incorporating Fault Tolerance Mechanism into Grid Meta-Scheduler. 2651-2657 - Zhongping Zhang, Long He, Shanshan Shi:
Grid Resource Discovery Algorithm of the Multi-Layer Overlay Network Model Based on Distance. 2658-2664 - Qiuping Jiang, Shanshan Wang, Kemeng Li, Feng Shao:
Measuring Depth Perception for Stereoscopic Images Using a Phase-shift Model. 2665-2671 - Ting Yan, Liejun Wang, Jiaxing Wang:
Method to Enhance Degraded Image in Dust Environment. 2672-2677 - Wei Gan:
An Improving Infrared Image Resolution Method via Guided Image Filtering. 2678-2684 - Ming Huang, Shujie Guo, Xu Liang, Xudong Song:
Research on Real-time Performance Testing Methods for Robot Operating System. 2685-2692 - Lei Yuan, Lijuan Wang, Dewang Chen, Amie R. Albrecht:
Modeling and Verification for Track Circuit Encoding in Train Control Center Based on UML and TA. 2693-2698 - Ji Xu, Yeming Xiao, Jielin Pan, Yonghong Yan:
Coalescence Type based Confidence Warping for Agglutinative Language Keyword Spotting. 2699-2705 - Yeming Xiao:
Speeding up deep neural network based speech recognition systems. 2706-2712 - Bing Liu, Xiaofeng Li, He Zhao, Yang Yang, Li Zhang:
Design and Implementation of Human Body Composition Information Management System Based on Android. 2713-2720 - Peisen Yuan, Haoyun Wang, Jianghua Che, Shougang Ren, Huanliang Xu, Dechang Pi:
Approximate String Similarity Join using Hashing Techniques under Edit Distance Constraints. 2721-2731 - Xiaohong Wang, Jianping Wu:
Investigation and Study on the Present Situation of Enterprise Website Construction of Intellectual Property Agencies. 2732-2740 - Guangjun Cai, Lei Zhang, Bin Zhao, Yong Liu:
Patterns Support for Automatic Resource Management in Cloud Computing. 2741-2748 - Yuyan Jiang, Yuan Shao, Ping Li, Qing Wang:
An Improved LDA Model for Academic Document Analysis. 2749-2757 - Yong Lv:
An Energy Efficient Routing Based on Swarm Intelligence for Wireless Sensor Networks. 2758-2763 - Zhong Lv, Jinkan Du, Wen-Tsann Lin, Shen-Tsu Wang, Chia-Ching Chang, Meng-Hua Li, Zheng-Han Zhuang:
Analysis of Abnormality Diagnosis in Emergency Medicine by Integrating K-means and Decision Trees-a Case Study of Dongyang People's Hospital in China. 2764-2770
Volume 9, Number 11, 2014
- Yukun Dong:
An Approach for Identifying Detecting Objects of Null Dereference. 2771-2777 - Haokun Tang, Shitong Zhu, Jun Huang, Hong Liu:
A Defense Model of Reactive Worms Based on Dynamic Time. 2778-2788 - Yan-xia Jin, Jing Xue, Zhi-bin Shi:
An Improved Algorithm of Quantum Particle Swarm Optimization. 2789-2795 - Fenghua Guo, Caiming Zhang, Yan He:
Haptic Data Compression Based on a Linear Prediction Model and Quadratic Curve Reconstruction. 2796-2803 - Mingliang Chen, Sainan Liu:
Business Intelligence Fusion Based on Multi-agent and Complex Network. 2804-2812 - Youness Laghouaouta, Adil Anwar, Mahmoud Nassar, Bernard Coulette:
A Graph Based Approach to Trace Models Composition. 2813-2822 - Wei Liu:
Automatic Indexing for Research Papers Using References. 2823-2829 - Cheng Wang, Zhicong Liang:
P4P Network Communication Components Based on Half-Sync/Half-Async and Pipe/Filter Patterns. 2830-2836 - Zhongping Zhang, Chunzhen Fang:
Algorithms for Minimal Dependency Set and Membership Based on XML Functional Dependency and Multi-Valued Dependency. 2837-2843 - Lingling Zi, Xin Cong, Yaping Zhang:
Subject Perception Semantic Model for Information Retrieval in Tourism. 2844-2850 - Tingting Liu, Shengxiao Guan:
Factor analysis method for text-independent speaker identification. 2851-2860 - Hong He, Dongbo Liu:
An Automatic Software Requirement Analysis Approach based on Intelligent Planning Technology. 2861-2867 - Daisen Wei, Long-ye Tang, Xueqing Li, Ling Shang:
Research on Automated Software Test Case Generation. 2868-2876 - Pu Zhang, Zhongshi He, Lina Tao:
A Study of Dependency Features for Chinese Sentiment Classification. 2877-2885 - Zhenbo Bi, Huiqin Wang, Ying Lu:
A Construction Model of Ancient Architecture Protection Domain Ontology based on Software Engineering and CLT. 2886-2894 - M. M. Mahbubul Syeed, Imed Hammouda:
Socio-Technical Dependencies in Forked OSS Projects: Evidence from the BSD Family. 2895-2909 - DMonan:
Optimal Selection System of Internal Fixation Methods for Femoral Neck Fracture. 2910-2917 - Yi Sun, Zhiqiu Huang, Changbo Ke:
Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters. 2918-2924 - Xiaopeng Wang, Shengyang Wan, Tao Lei:
Brain Tumor Segmentation Based on Structuring Element Map Modification and Marker-controlled Watershed Transform. 2925-2932 - Dingguo Yu, Huxiong Li, Zhiwen Hu:
A Cloud Computing-Based Television Program Opinion Monitoring and Analysis System. 2933-2937 - Mohammad Shamsul Arefin, Geng Ma, Yasuhiko Morimoto:
A Spatial Skyline Query for a Group of Users. 2938-2947 - Xiaobing Liu, Xuan Jiao, Tao Ning, Ming Huang:
An Effective Method to Solve Flexible Job-shop Scheduling Based on Cloud Model. 2948-2954 - Yitong Liu, Hao Liu, Yuchen Li, Yun Shen, Jianwei Wu, Dacheng Yang:
A Software Platform Design for Objective Video QoE Assessment. 2955-2965 - Zhongping Zhang, Long He, Chao Zhang:
Grid Resource Discovery Algorithm Based on Distance. 2966-2973 - Haiyan Guo, Xiaoxiong Li, Lin Zhou, Zhenyang Wu:
Single-channel Speech Separation Using Orthogonal Matching Pursuit. 2974-2980 - Yang Yang, Wendai Lv, Guangming Hou, Junpeng Wang:
A Partner Selection Method for Forming Innovation Alliance. 2981-2988
Volume 9, Number 12, 2014
- Han Lai, Yuze Ni:
Evaluating a Lightweight Forum-based Tool: Empirical Studies on Requirements Elicitation Process. 2989-2997 - Jinlei Qin, Yuguang Niu, Zheng Li:
A Data Analysis Method and Its Applications in EXCEL. 2998-3004 - Maen Hammad, Mustafa Hammad, Hani Bani-Salameh, Ebaa Fayyoumi:
Measuring Developers' Design Contributions in Evolved Software Projects. 3005-3011 - Xiaoqing Dong, Hongcai Chen:
An Improved Face Recognition Technique Based on Modular Multi-directional Two-dimensional Principle Component Analysis Approach. 3012-3019 - Juntao Gu, Xiaodong Zhu:
Designing and Implementation of an Online System for Electronic Contract Negotiation Based on Electronic Signature. 3020-3027 - Jun Long, Luda Wang, Zude Li, Zuping Zhang, Huiling Li, Guihu Zhao:
Lexical-semantic SLVM for XML Document Classification. 3028-3034 - Akila Venkatesan, Zayaraz Gothandapani:
Novel Metrics for Bug Triage. 3035-3040 - Pei-Shih Chen, Chang-Hsien Hsu, Shih-Yun Hsu, Chun-Ming Yang:
Implementing Six Sigma to Reduce Online Petitions on the E-petition System in Taiwan Power Company. 3041-3047 - Yong-sheng Wang:
Energy Constrained Target K-coverage Algorithm in Heterogeneous Wireless Sensor Networks. 3048-3056 - Baohua Qiang, Rui Zhang, Yufeng Wang, Qian He, Wei Li, Sai Wang:
Research on Deep Web Query Interface Clustering Based on Hadoop. 3057-3062
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.