Volume 26,Issue 7,2015 Table of Contents
Clustering Search AlgorithmCHEN Hao and PAN Xiao-Ying2015,26(7):1557-1573 [Abstract(3702)] [View PDF(4673)1.33 M]Research of Global Ranking Based Many-Objective OptimizationXIAO Jing, BI Xiao-Jun and WANG Ke-Jun2015,26(7):1574-1583 [Abstract(3424)] [View PDF(4845)732.13 K]Research on 3D Hexagonal Torus Based on Cayley GraphZHANG Zhen, XIAO Wen-Jun and HUANG Shu-Qiang2015,26(7):1584-1600 [Abstract(3766)] [View PDF(3949)1.13 M]Co-Evolutionary Algorithm for Web Service MatchingCUI Xiao-Hui, YIN Gui-Sheng and DONG Hong-Bin2015,26(7):1601-1614 [Abstract(3348)] [View PDF(4186)1.24 M]Title Recognition of Maximal-Length Noun Phrase Based on Bilingual Co-TrainingLI Ye-Gang, HUANG He-Yan, SHI Shu-Min, JIAN Ping and SU Chao2015,26(7):1615-1625 [Abstract(3296)] [View PDF(3934)796.54 K]Study on User Tags in WeiboXING Qian-Li, LIU Lie, LIU Yi-Qun, ZHANG Min and MA Shao-Ping2015,26(7):1626-1637 [Abstract(4354)] [View PDF(7456)872.85 K]Quantitative Threat Situational Assessment Based on Contextual InformationXI Rong-Rong, YUN Xiao-Chun and ZHANG Yong-Zheng2015,26(7):1638-1649 [Abstract(3409)] [View PDF(4611)858.06 K]Automatic Term Alignment Based on Advanced Multi-Strategy and Giza++ IntegrationLIU Sheng-Qi and ZHU Dong-Hua2015,26(7):1650-1661 [Abstract(3430)] [View PDF(4138)796.84 K]
Logarithmic and Exponential Morphological Associative MemoriesFENG Nai-Qin, TIAN Yong, WANG Xian-Fang, SONG Li-Ming, FAN Hai-Ju and WANG Shuang-Xi2015,26(7):1662-1674 [Abstract(4919)] [View PDF(5433)895.88 K]
Ontology-Based Intelligent Information Retrieval SystemYANG Yue-Hua, DU Jun-Ping and PING Yuan2015,26(7):1675-1687 [Abstract(4119)] [View PDF(6604)830.07 K]Interior Penalty Rule Based Evolutionary Algorithm for Constrained OptimizationCUI Cheng-Gang and YANG Xiao-Fei2015,26(7):1688-1699 [Abstract(3574)] [View PDF(4438)853.84 K]Study on the Downlink Performance of Roadside Unit in Vehicular Ad-Hoc NetworksLIU Ye, LIU Lin-Feng, ZHENG Long and WANG Hua-Feng2015,26(7):1700-1710 [Abstract(3272)] [View PDF(6094)865.58 K]Effective Algorithm for Placement of Directional Wireless ChargersDAI Hai-Peng, CHEN Gui-Hai, XU Li-Jie, LIU Yun-Huai, WU Xiao-Bing and HE Tian2015,26(7):1711-1729 [Abstract(3671)] [View PDF(5164)1.42 M]Prediction Based Relay Selection Method in Opportunistic Vehicular NetworksJIA Jian-Bin, CHEN Ying-Wen and XU Ming2015,26(7):1730-1741 [Abstract(3418)] [View PDF(3607)867.60 K]Method of DDoS Countermeasure Selection Based on Multi-Attribute Decision MakingHUANG Liang, FENG Deng-Guo, LIAN Yi-Feng, CHEN Kai, ZHANG Ying-Jun and LIU Yu-Ling2015,26(7):1742-1756 [Abstract(3593)] [View PDF(4937)1.45 M]Threshold Multi-Secret Visual Cryptography Scheme with Perfect RecoveryFU Zheng-Xin, SHEN Gang, LI Bin and YU Bin2015,26(7):1757-1771 [Abstract(3521)] [View PDF(3819)2.30 M]Development Approach Based on Extensible User Interface Description LanguageDU Yi, TIAN Feng and DAI Guo-Zhong2015,26(7):1772-1784 [Abstract(3325)] [View PDF(4258)1.46 M]Realistic Cloth Simulation Based on Geometrical Measurement and DeformationLIU Li, WANG Ruo-Mei and LUO Xiao-Nan2015,26(7):1785-1799 [Abstract(3420)] [View PDF(3634)8.09 M]Feature Selection with Enhanced Sparsity for Web Image AnnotationSHI Cai-Juan and RUAN Qiu-Qi2015,26(7):1800-1811 [Abstract(3719)] [View PDF(4594)866.04 K]Local Linear Coding Based on Riemannian KernelJIANG Wei, BI Ting-Ting, LI Ke-Qiu and YANG Bing-Ru2015,26(7):1812-1823 [Abstract(3280)] [View PDF(4526)1017.22 K]Ripple-RAID: A High-Performance and Energy-Efficient RAID for Continuous Data StorageSUN Zhi-Zhuo, ZHANG Quan-Xin, TAN Yu-An and LI Yuan-Zhang2015,26(7):1824-1839 [Abstract(3299)] [View PDF(4551)1.09 M]Power Estimation Model on Multi-Core PlatformsLIU Xin, SHEN Li, SU Bo and WANG Zhi-Ying2015,26(7):1840-1852 [Abstract(3084)] [View PDF(6278)904.72 K]