Volume 26,Issue 9,2015 Table of Contents

Other Issues:  
  
Contents

  • Clustering and Partition Based Divide and Conquer for SAT Solving
  • FAN Quan-Run and DUAN Zhen-Hua
  • 2015,26(9):2155-2166 [Abstract(1746)]  [View PDF(1606)591.50 K]
  • Artificial Bee Colony Algorithm Based on Orthogonal Experimental Design
  • ZHOU Xin-Yu, WU Zhi-Jian and WANG Ming-Wen
  • 2015,26(9):2167-2190 [Abstract(2218)]  [View PDF(2103)585.13 K]
  • An Exploratory Service Composition Approach for Mobile Application
  • BAI Lin, WEI Jun, HUANG Xiang, YE Dan and HUANG Tao
  • 2015,26(9):2191-2211 [Abstract(1590)]  [View PDF(1780)1.23 M]
  • Model Checking Technique for Interrupt-Driven System
  • ZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua, YANG Meng-Fei and LI Xuan-Dong
  • 2015,26(9):2212-2230 [Abstract(1795)]  [View PDF(1671)777.72 K]
  • The Ontology Debugging Method Based on Concept R-MUPS
  • OUYANG Dan-Tong, SU Jing, YE Yu-Xin and CUI Xian-Ji
  • 2015,26(9):2231-2249 [Abstract(1278)]  [View PDF(1502)844.27 K]
  • Theorem Proving Decomposition Algorithm Based on Semi-Extension Rule
  • ZHANG Li-Ming, OUYANG Dan-Tong and Zhao Yi
  • 2015,26(9):2250-2261 [Abstract(1215)]  [View PDF(1398)621.33 K]
  • Matrix Factorization for Time Series Data
  • HUANG Xiao-Yu, PAN Rong, LI Lei, LIANG Bing, CHEN Kang and CAI Wen-Xue
  • 2015,26(9):2262-2277 [Abstract(1507)]  [View PDF(2213)809.04 K]
  • A Formal System for Propositional Extended IF Logic
  • XU Wen-Yan
  • 2015,26(9):2278-2285 [Abstract(1212)]  [View PDF(1512)492.73 K]
  • Sound and Complete Axiomatic System with a Modality □φ=1V2φ
  • DENG Shao-Bo, LI Min, CAO Cun-Gen and SUI Yue-Fei
  • 2015,26(9):2286-2296 [Abstract(1321)]  [View PDF(1265)577.92 K]
  • Contents

  • Randed Processing for Mutual k-Skyband Query
  • JIANG Tao, ZHANG Bin, YU Fa-Hong, LIU Qing and ZHOU Ao-Ying
  • 2015,26(9):2297-2310 [Abstract(2382)]  [View PDF(2005)1011.45 K]
  • Contents

  • Shapelet Pruning and Shapelet Coverage for Time Series Classification
  • YUAN Ji-Dong, WANG Zhi-Hai and HAN Meng
  • 2015,26(9):2311-2325 [Abstract(1627)]  [View PDF(2615)720.59 K]
  • Diversifying Tag Selection Result by Improving Both Coverage and Dissimilarity
  • WANG Mei-Ling, ZHOU Xiang, TAO Qiu-Ming and ZHAO Chen
  • 2015,26(9):2326-2338 [Abstract(1268)]  [View PDF(1547)717.51 K]
  • Event Detection Method Based on Link Prediction for Social Network Evolution
  • HU Wen-Bin, PENG Chao, LIANG Huan-Le and DU Bo
  • 2015,26(9):2339-2355 [Abstract(1798)]  [View PDF(2262)994.66 K]
  • Design and Formal Analysis of TCM Key Migration Protocols
  • ZHANG Qian-Ying, FENG Deng-Guo and ZHAO Shi-Jun
  • 2015,26(9):2396-2417 [Abstract(1320)]  [View PDF(1762)860.98 K]
  • Active Replication and Search Strategy of Scarce Resources Based on Local Demand
  • MEI Hong-Yan, ZHANG Yu-Jie and MENG Xiang-Wu
  • 2015,26(9):2418-2435 [Abstract(1164)]  [View PDF(1464)984.02 K]
  • Provable Secure Authentication Protocol with Direct Anonymity for Mobile Nodes Roaming Service in Internet of Things
  • ZHOU Yan-Wei and YANG Bo
  • 2015,26(9):2436-2450 [Abstract(1263)]  [View PDF(1675)922.22 K]
  • Review Articles

  • Survey on Network Tomography for Link Performance Parameter Evaluation
  • PAN Sheng-Li, ZHANG Zhi-Yong, FEI Gao-Lei, QIAN Feng and HU Guang-Min
  • 2015,26(9):2356-2372 [Abstract(3488)]  [View PDF(2236)1.52 M]
  • Privacy Preservation for Location-Based Services: A Survey
  • ZHANG Xue-Jun, GUI Xiao-Lin and WU Zhong-Dong
  • 2015,26(9):2373-2395 [Abstract(3734)]  [View PDF(3781)1.16 M]