Volume ,Issue 0,0 Table of Contents

Other Issues:  
  
Contents

  • Circular features description: An effective method for leaf image retrieval and classification
  • WANG Bin, HUANG Zhu-Qin and CHEN Liang-Xiao
  • 0(0):0 [Abstract(50)]  [View PDF(57)1.07 M]
  • Contents

  • A Web Service QoS Forecasting Approach Using Multivariate Time Series
  • Zhang Peng-Cheng, Wang Li-Yan, Ji Shun-Hui and Li Wen-Rui
  • 0(0):0 [Abstract(1374)]  [View PDF(877)1.34 M]
  • Contents

  • Fast Elastic Motion Estimation Using Improved Levenberg-Marquardt Method
  • SONG Chuan-Ming, MIN Xin, YAN Xiao-Hong, WANG Xiang-Hai and YIN Bao-Cai
  • 0(0):0 [Abstract(50)]  [View PDF(55)973.52 K]
  • Herarchical Anti-Spoofing Alliance Construction Approach
  • LU Ning, LI Feng, WANG Shang-Guang, SHI Wen-Bo and YANG Fang-Chun
  • 0(0):0 [Abstract(411)]  [View PDF(256)1.27 M]
  • Hierarchical Point-set Description of Object Edge and its Application in Shape Retrieval
  • LIU Feng and WANG Bin
  • 0(0):0 [Abstract(49)]  [View PDF(49)1.59 M]
  • Restaurant Recommendation Model with Multiple Imformation Fusion
  • DAI Lin, MENG Xiang-Wu, ZHANG Yu-Jie and JI Wei-Yu
  • 0(0):0 [Abstract(56)]  [View PDF(59)631.11 K]
  • Private Social-Willing Detection
  • GONG Lin-Ming, LI Shun-Dong, DOU Jia-Wei and WANG Dao-Shun
  • 0(0):0 [Abstract(481)]  [View PDF(388)881.46 K]
  • Time-Stamp Based Simple Tabular Reduction Algorithm
  • YANG Ming-Qi, LI Zhan-Shan and ZHANG Jia-Chen
  • 0(0):0 [Abstract(526)]  [View PDF(281)440.96 K]
  • Guided Symbolic Execution Method based on Program Function Label Slice
  • GAN Shui-Tao, WANG Lin-Zhang, XIE Xiang-Hui, QIN Xiao-Jun, ZHOU Lin and CHENG Zuo-Ning
  • 0(0):0 [Abstract(713)]  [View PDF(416)2.63 M]
  • Anti-Rotation and Efficient Discriminative Feature Extraction Method for Circular Images
  • ZHANG Dong-Bo, CHEN Hong-Lei, WEN Deng-Wei, TANG Hong-Zhong and XU Hai-Xia
  • 0(0):0 [Abstract(543)]  [View PDF(524)653.13 K]
  • Detection of Ranking Functions of Polynomial Loop Programs
  • LI Yi and FENG Yong
  • 0(0):0 [Abstract(414)]  [View PDF(253)2.11 M]
  • WKNN Indoor Positioning Algorithm Based on Spatial Characteristics Partition and Former Location Restriction
  • YANG Hai-Feng, ZHANG Yong-Bo, HUANG Yu-Liang and Fu Hui-Min
  • 0(0):0 [Abstract(422)]  [View PDF(345)601.35 K]
  • Strategy of Parallel Sort-Merge Join Based on Prune in Distributed Database
  • GAO Jin-Tao, LI Zhan-Huai, DU Hong-Tao and LIU Wen-Jie
  • 0(0):0 [Abstract(580)]  [View PDF(352)612.91 K]
  • TSK Fuzzy System with the Enhanced Classification Performance and Triplely Concise Interpretability for Fuzzy Rules
  • ZHOU Ta, DENG Zhao-Hong, JIANG Yi-Zhang and WANG Shi-Tong
  • 0(0):0 [Abstract(65)]  [View PDF(70)465.78 K]
  • Privacy Preserving Friend Discovery of Matrix Confusion Encryption in Mobile Social NetWorks
  • LUO En-Tao, WANG Guo-Jun, Liu Qin and MENG Da-Cheng
  • 0(0):0 [Abstract(50)]  [View PDF(58)1.32 M]
  • Many-objective Evolutionary Algorithm based on Decomposition and Coevolution
  • XIE Cheng-Wang, YU Wei-Wei, BI Ying-zhou, Wang Shen-Wen and HU Yu-Rong
  • 0(0):0 [Abstract(48)]  [View PDF(64)594.39 K]
  • Multidimensional Reputation Calculation Method Based on Feedback Reliability in MAS Environment
  • HUO Xing, ZHANG Yang-Yang, JING Yong-Jun and SHAO Kun
  • 0(0):0 [Abstract(48)]  [View PDF(151)733.22 K]
  • Modeling and Consistency Verification of Collaborative Business Processes and Requirements
  • MO Qi, DAI Fei, DA Jian, ZHU Rui, LIN Lei-Lei, XIE Zhong-Wen and Li Tong
  • 0(0):0 [Abstract(85)]  [View PDF(81)618.41 K]
  • Image Hierarchical Classification Based on Semantic Label Generation and Formal Concept Partial Order Structure
  • GU Guang-Hua, CAO Yu-Yao, LI Gang and ZHAO Yao
  • 0(0):0 [Abstract(62)]  [View PDF(58)725.63 K]
  • Universal Circuits for Quantum Teleportation
  • ZHANG Guo-Shuai and XU Dao-Yun
  • 0(0):0 [Abstract(57)]  [View PDF(44)511.22 K]
  • Proxy Re-Encryption Based Assured Update Scheme of Authorization for Cloud Data
  • SU Mang, WU Bin, FU An-min, YU Yan and ZHANG Gong-xuan
  • 0(0):0 [Abstract(57)]  [View PDF(56)478.93 K]
  • Malicious Code Evolution and Traceability Technology
  • SONG Wen-Na, PENG Guo-Jun, FU Jian-Ming, ZHANG Huan-Guo and CHEN Shi-Lv
  • 0(0):0 [Abstract(155)]  [View PDF(161)1.25 M]
  • English Metaphor Recognition Based on Dynamic Categorization
  • SU Chang, FU Ze, ZHENG Fa-Kui and CHEN Yi-Jiang
  • 0(0):0 [Abstract(72)]  [View PDF(67)448.95 K]
  • Heterogenity-aware Scheduling Research on Performance Asymmetric Multicore Processors
  • ZHAO Shan, YANG Qiu Song and LI Ming-Shu
  • 0(0):0 [Abstract(156)]  [View PDF(93)636.73 K]