Volume 28,Issue 12,2017 Table of Contents

Other Issues:  
  
Contents

  • K-Medoids Clustering Algorithm Based on Distance Inequality
  • YU Dong-Hua, GUO Mao-Zu, LIU Yang, REN Shi-Jun, LIU Xiao-Yan and LIU Guo-Jun
  • 2017,28(12):3115-3128 [Abstract(1560)]  [View PDF(1850)1.95 M]
  • Parallel Concept Computing Based on Bottom-Up Decomposition of Attribute Topology
  • ZHANG Tao, BAI Dong-Hui and LI Hui
  • 2017,28(12):3129-3145 [Abstract(1254)]  [View PDF(816)1.91 M]
  • Least Squares Twin Parametric Insensitive Support Vector Regression
  • DING Shi-Fei and HUANG Hua-Juan
  • 2017,28(12):3146-3155 [Abstract(1187)]  [View PDF(1098)2.39 M]
  • Optimizing MDDc and STR3 for Solving Constraint Satisfaction Problem
  • YANG Ming-Qi, LI Zhan-Shan and LI Zhe
  • 2017,28(12):3156-3166 [Abstract(1354)]  [View PDF(847)1.26 M]
  • Metaphor Comprehension Method Based on Relevance Constraints
  • SU Chang, WANG Xiao-Mei, HUANG Shu-Man and CHEN Yi-Jiang
  • 2017,28(12):3167-3182 [Abstract(1184)]  [View PDF(1058)1.92 M]
  • Research and Implementation of Chinese Microblog Sentiment Classification
  • LI Yong-Gan, ZHOU Xue-Guang, SUN Yan and ZHANG Huan-Guo
  • 2017,28(12):3183-3205 [Abstract(1524)]  [View PDF(2123)4.51 M]
  • UAV Data Collection Method Based on Data Value
  • XU Dan, LI Wei, WANG An-Wen, FAN Hao-Nan, GONG Xiao-Qing, CHEN Xiao-Jiang and FANG Ding-Yi
  • 2017,28(12):3206-3222 [Abstract(1244)]  [View PDF(830)2.21 M]
  • On Generalized Bisimilarity Join
  • WANG Chang-Ping, WANG Chao-Kun, WANG Hao, WANG Meng and CHEN Jun
  • 2017,28(12):3223-3240 [Abstract(1165)]  [View PDF(628)1.98 M]
  • Non-Cooperative Deep Web Data Source Selection Based on Subject and Probability Model
  • DENG Song and WAN Chang-Xuan
  • 2017,28(12):3241-3256 [Abstract(712)]  [View PDF(624)1.87 M]
  • Data Gathering Algorithm Based on Compressive Sensing Under Lossy WSN
  • HAN Zhe, ZHANG Xia, LI Ou, ZHANG Ce and ZHANG Da-Long
  • 2017,28(12):3257-3273 [Abstract(1214)]  [View PDF(749)1.99 M]
  • Homomorphic Encryption Scheme and A Protocol on Secure Computing a Line by Two Private Points
  • GONG Lin-Ming, LI Shun-Dong, DOU Jia-Wei, GUO YI-Min and WANG Dao-Shun
  • 2017,28(12):3274-3292 [Abstract(1263)]  [View PDF(2079)2.07 M]
  • λ-Transform:A Mathematical Tool for Accurate Shape Description
  • WANG Bin
  • 2017,28(12):3293-3305 [Abstract(1114)]  [View PDF(668)2.90 M]
  • Gloise Field Self-Recovery Image Sharing Scheme with Non-Equivalent Backup and Double Authentications
  • OU-YANG Xian-Bin, SHAO Li-Ping and LE Zhi-Fang
  • 2017,28(12):3306-3346 [Abstract(1334)]  [View PDF(637)16.61 M]
  • Weighted Low Rank Subspace Clustering Based on A2 Norm
  • FU Wen-Jin and WU Xiao-Jun
  • 2017,28(12):3347-3357 [Abstract(1307)]  [View PDF(1007)1.43 M]
  • STL Surface Mesh Reconstruction Algorithm Based on 2 Dimensional Manifolds
  • YANG Sheng-Yuan, CHEN Yao, YI Fei and LIU Xin
  • 2017,28(12):3358-3366 [Abstract(1288)]  [View PDF(910)1.20 M]
  • Approach to Scheduling Network Requests in Android Apps
  • CAI Hua-Qian, ZHANG Ying, HUANG Gang and MEI Hong
  • 2017,28(12):3367-3384 [Abstract(503)]  [View PDF(760)3.09 M]
  • Dependency-Driven Task Scheduling Scheme of Big Data Processing
  • WANG Bin, WU Ya-Jing, YANG Xiao-Long and SUN Qi-Fu
  • 2017,28(12):3385-3398 [Abstract(1355)]  [View PDF(882)2.25 M]