Volume 26,Issue 5,2015 Table of Contents

Other Issues:  
  
Contents

  • Sparse Label Propagation: A Robust Domain Adaptation Learning Method
  • TAO Jian-Wen, Fu-Lai CHUNG, WANG Shi-Tong and YAO Qi-Fu
  • 2015,26(5):977-1000 [Abstract(2877)]  [View PDF(3111)1.77 M]
  • Membrane Clustering Algorithm with Hybrid Evolutionary Mechanisms
  • PENG Hong, JIANG Yang, WANG Jun and Mario J. PÉREZ-JIMÉNEZ
  • 2015,26(5):1001-1012 [Abstract(3069)]  [View PDF(2345)991.58 K]
  • Contents

  • Evolutionary Algorithm Based on Information Separation for Many-Objective Optimization
  • ZHENG Jin-Hua, SHEN Rui-Min, LI Mi-Qing and ZOU Juan
  • 2015,26(5):1013-1036 [Abstract(2224)]  [View PDF(2476)1.67 M]
  • Domain-Free Information Algebraic Model and Algorithm Based on Soft Set
  • XU Ge-Ni, LI Yong-Ming and GUAN Xue-Chong
  • 2015,26(5):1037-1047 [Abstract(1671)]  [View PDF(1909)724.87 K]
  • Contents

  • Trajectory Prediction Algorithm Based on Gaussian Mixture Model
  • QIAO Shao-Jie, JIN Kun, HAN Nan, TANG Chang-Jie, Gesangduoji and Louis Alberto GUTIERREZ
  • 2015,26(5):1048-1063 [Abstract(3271)]  [View PDF(5752)1.59 M]
  • Parallel and Incremental Algorithm for Knowledge Update Based on Rough Sets in Cloud Platform
  • ZHANG Jun-Bo, LI Tian-Rui, PAN Yi, LUO Chuan and TENG Fei
  • 2015,26(5):1064-1078 [Abstract(3522)]  [View PDF(2771)1.09 M]
  • Related-Subspace-Based Local Outlier Detection Algorithm Using MapReduce
  • ZHANG Ji-Fu, LI Yong-Hong, QIN Xiao and XUN Ya-Ling
  • 2015,26(5):1079-1095 [Abstract(3464)]  [View PDF(3030)1.04 M]
  • Strict Pattern Matching with General Gaps and One-Off Condition
  • CHAI Xin, JIA Xiao-Fei, WU You-Xi, JIANG He and WU Xin-Dong
  • 2015,26(5):1096-1112 [Abstract(3247)]  [View PDF(2148)1.03 M]
  • Contents

  • Density-Based Cluster Structure Mining Algorithm for High-Volume Data Streams
  • YU Yan-Wei, WANG Huan, WANG Qin and ZHAO Jin-Dong
  • 2015,26(5):1113-1128 [Abstract(2382)]  [View PDF(2435)1.65 M]
  • Secure Certificateless Aggregate Signature Scheme
  • CHEN Hu, WEI Shi-Min, ZHU Chang-Jie and YANG Yi
  • 2015,26(5):1173-1180 [Abstract(2593)]  [View PDF(2363)725.71 K]
  • Encryption Algorithm Supporting Relational Calculations in Cloud Computing
  • HUANG Ru-Wei, GUI Xiao-Lin, CHEN Ning-Jiang and YAO Jing
  • 2015,26(5):1181-1195 [Abstract(2382)]  [View PDF(2358)1.01 M]
  • Key Leakage-Resilient Secure Cryptosystem with Hierarchical Wildcard Pattern Delegation
  • ZHANG Ming-Wu, WANG Chun-Zhi, YANG Bo and Tsuyoshi TAKAGI
  • 2015,26(5):1196-1212 [Abstract(2052)]  [View PDF(2405)1.15 M]
  • Contents

  • Theoretical Analysis on the Performance of PalmPhasor Algorithm
  • LENG Lu, LI Ming, Andrew Beng Jin TEOH and Cheonshik KIM
  • 2015,26(5):1237-1250 [Abstract(2762)]  [View PDF(2133)925.52 K]
  • Contents

  • Shape Feature Matching Algorithm of Ear Point Cloud Using Path Following
  • SUN Xiao-Peng, LI Si-Hui, WANG Lu, HAN Feng and WEI Xiao-Peng
  • 2015,26(5):1251-1264 [Abstract(1833)]  [View PDF(2129)1.19 M]
  • Review Articles

  • Survey on Access Control Technologies for Cloud Computing
  • WANG Yu-Ding, YANG Jia-Hai, XU Cong, LING Xiao and YANG Yang
  • 2015,26(5):1129-1150 [Abstract(6390)]  [View PDF(5016)1.32 M]
  • Research and Development of Memory Forensics
  • ZHANG Yu, LIU Qing-Zhong, LI Tao, Wu Li-Hua and SHI Chun
  • 2015,26(5):1151-1172 [Abstract(4194)]  [View PDF(3153)1.35 M]
  • Advances in Three-Dimensional Multiscale Geometrical Analysis
  • SONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai
  • 2015,26(5):1213-1236 [Abstract(3954)]  [View PDF(2729)1.83 M]