Volume 28,Issue 2,2017 Table of Contents

Other Issues:  
  
Contents

  • Exact Algorithms and Evolutionary Algorithms for Randomized Time-Varying Knapsack Problem
  • HE Yi-Chao, WANG Xi-Zhao, LI Wen-Bin and ZHAO Shu-Liang
  • 2017,28(2):185-202 [Abstract(3929)]  [View PDF(4562)2.83 M]
  • Verification of File Comparison Algorithm fcomp in Isabelle/HOL
  • SONG Li-Hua, WANG Hai-Tao, JI Xiao-Jun and ZHANG Xing-Yuan
  • 2017,28(2):203-215 [Abstract(2451)]  [View PDF(3352)1.99 M]
  • Second-Order Linear Reasoning Mechanisms for Description Logic εL
  • WANG Ju, CHEN Guang-Xi and YU Quan
  • 2017,28(2):216-233 [Abstract(2152)]  [View PDF(3047)2.21 M]
  • Layout Analysis Algorithm of Questionnaire Image
  • DUAN Lu, SONG Yong-Hong and ZHANG Yuan-Lin
  • 2017,28(2):234-245 [Abstract(2064)]  [View PDF(4378)5.07 M]
  • Microblog Community Discovery Algorithm Based on Dynamic Topic Model with Multidimensional Data Fusion
  • LIU Bing-Yu, WANG Cui-Rong, WANG Cong, WANG Jun-Wei, WANG Xing-Wei and HUANG Min
  • 2017,28(2):246-261 [Abstract(3337)]  [View PDF(5506)2.24 M]
  • Unsupervised Structralization Method of Merchandise Attributes in Chinese
  • HOU Bo-Yi, CHEN Qun, YANG Jing-Ying and LI Zhan-Huai
  • 2017,28(2):262-277 [Abstract(2146)]  [View PDF(3894)1.84 M]
  • Mining User Interests on Microblog Based on Profile and Content
  • ZHONG Zhao-Man, GUAN Yan, HU Yun and LI Cun-Hua
  • 2017,28(2):278-291 [Abstract(2933)]  [View PDF(6534)1.88 M]
  • Automatic Image Annotation Based on Semi-Paired Probabilistic Canonical Correlation Analysis
  • ZHANG Bo, HAO Jie, MA Gang and SHI Zhong-Zhi
  • 2017,28(2):292-309 [Abstract(2245)]  [View PDF(3388)3.38 M]
  • Efficient Processing Method for Reverse top-k Spatial Preference Queries
  • LI Miao, GU Yu, CHEN Mo and YU Ge
  • 2017,28(2):310-325 [Abstract(2088)]  [View PDF(3203)3.61 M]
  • Approach for Hot Spread Node Selection Based on Overlapping Community Search
  • SHAN Jing, SHEN De-Rong, KOU Yue, NIE Tie-Zheng and YU Ge
  • 2017,28(2):326-340 [Abstract(2600)]  [View PDF(3628)2.16 M]
  • Greedy Clustering-Anonymity Method for Privacy Preservation of Table Data-Publishing
  • JIANG Huo-Wen, ZENG Guo-Sun and MA Hai-Ying
  • 2017,28(2):341-351 [Abstract(2877)]  [View PDF(3960)1.93 M]
  • Cut-and-Choose Bilateral Oblivious Transfer
  • ZHAO Chuan, JIANG Han, WEI Xiao-Chao and XU Qiu-Liang
  • 2017,28(2):352-360 [Abstract(2967)]  [View PDF(4111)1.20 M]
  • Android Unlock Pattern Scheme Through Random Point Exclusion
  • XIONG Si-Chun, YANG Chao, MA Jian-Feng and ZHANG Jun-Wei
  • 2017,28(2):361-371 [Abstract(2133)]  [View PDF(3210)1.73 M]
  • Randomized Coding of Plaintext Encryption Scheme
  • GONG Lin-Ming, LI Shun-Dong, WANG Dao-Shun and DOU Jia-Wei
  • 2017,28(2):372-383 [Abstract(2191)]  [View PDF(3567)1.41 M]
  • Malware Detection Method Based on Active Learning
  • MAO Wei-Xuan, CAI Zhong-Min and TONG Li
  • 2017,28(2):384-397 [Abstract(3536)]  [View PDF(4205)3.37 M]
  • Flexible and Efficient VCPU Scheduling Algorithm
  • LIU Ke-Nan, TONG Wei, FENG Dan, LIU Jing-Ning and ZHANG Ju
  • 2017,28(2):398-410 [Abstract(3075)]  [View PDF(4524)3.71 M]
  • Integer Programming Approach for Schedulability of Sporadic Real-Time Systems
  • SUN Jing-Hao, SUN Jing-Chang, GUAN Nan and DENG Qing-Xu
  • 2017,28(2):411-428 [Abstract(2303)]  [View PDF(3709)2.89 M]
  • Energy Saving Scheduling Strategy Based on Model Prediction Control for Data Centers
  • ZHAO Xiao-Gang, HU Qi-Ping, DING Ling and SHEN Zhi-Dong
  • 2017,28(2):429-442 [Abstract(2336)]  [View PDF(4104)3.28 M]
  • Optimization of Mixed Redundancy Strategy with Instant Switching for Series-Parallel Systems
  • HE Pan, ZHENG Zhi-Hao, YUAN Yue and TAN Chun
  • 2017,28(2):443-456 [Abstract(1913)]  [View PDF(2828)1.90 M]
  • On-Demand Physical Resource Allocation Method for Cloud Virtual Machine to Support Random Service Requests
  • CAO Jie, ZENG Guo-Sun, KUANG Gui-Juan, ZHANG Jian-Wei, MA Hai-Ying, HU Ke-Kun and NIU Jun
  • 2017,28(2):457-472 [Abstract(3023)]  [View PDF(6576)2.62 M]