Volume 28,Issue 2,2017 Table of Contents

Other Issues:  
  
Contents

  • Exact Algorithms and Evolutionary Algorithms for Randomized Time-Varying Knapsack Problem
  • HE Yi-Chao, WANG Xi-Zhao, LI Wen-Bin and ZHAO Shu-Liang
  • 2017,28(2):185-202 [Abstract(2631)]  [View PDF(1628)2.83 M]
  • Verification of File Comparison Algorithm fcomp in Isabelle/HOL
  • SONG Li-Hua, WANG Hai-Tao, JI Xiao-Jun and ZHANG Xing-Yuan
  • 2017,28(2):203-215 [Abstract(1499)]  [View PDF(1239)1.99 M]
  • Second-Order Linear Reasoning Mechanisms for Description Logic εL
  • WANG Ju, CHEN Guang-Xi and YU Quan
  • 2017,28(2):216-233 [Abstract(1324)]  [View PDF(977)2.21 M]
  • Layout Analysis Algorithm of Questionnaire Image
  • DUAN Lu, SONG Yong-Hong and ZHANG Yuan-Lin
  • 2017,28(2):234-245 [Abstract(1222)]  [View PDF(2354)5.07 M]
  • Microblog Community Discovery Algorithm Based on Dynamic Topic Model with Multidimensional Data Fusion
  • LIU Bing-Yu, WANG Cui-Rong, WANG Cong, WANG Jun-Wei, WANG Xing-Wei and HUANG Min
  • 2017,28(2):246-261 [Abstract(2053)]  [View PDF(2391)2.24 M]
  • Unsupervised Structralization Method of Merchandise Attributes in Chinese
  • HOU Bo-Yi, CHEN Qun, YANG Jing-Ying and LI Zhan-Huai
  • 2017,28(2):262-277 [Abstract(1401)]  [View PDF(1692)1.84 M]
  • Mining User Interests on Microblog Based on Profile and Content
  • ZHONG Zhao-Man, GUAN Yan, HU Yun and LI Cun-Hua
  • 2017,28(2):278-291 [Abstract(1607)]  [View PDF(3561)1.88 M]
  • Automatic Image Annotation Based on Semi-Paired Probabilistic Canonical Correlation Analysis
  • ZHANG Bo, HAO Jie, MA Gang and SHI Zhong-Zhi
  • 2017,28(2):292-309 [Abstract(1285)]  [View PDF(1100)3.38 M]
  • Efficient Processing Method for Reverse top-k Spatial Preference Queries
  • LI Miao, GU Yu, CHEN Mo and YU Ge
  • 2017,28(2):310-325 [Abstract(1283)]  [View PDF(1093)3.61 M]
  • Approach for Hot Spread Node Selection Based on Overlapping Community Search
  • SHAN Jing, SHEN De-Rong, KOU Yue, NIE Tie-Zheng and YU Ge
  • 2017,28(2):326-340 [Abstract(1596)]  [View PDF(1510)2.16 M]
  • Greedy Clustering-Anonymity Method for Privacy Preservation of Table Data-Publishing
  • JIANG Huo-Wen, ZENG Guo-Sun and MA Hai-Ying
  • 2017,28(2):341-351 [Abstract(1459)]  [View PDF(1581)1.93 M]
  • Cut-and-Choose Bilateral Oblivious Transfer
  • ZHAO Chuan, JIANG Han, WEI Xiao-Chao and XU Qiu-Liang
  • 2017,28(2):352-360 [Abstract(1687)]  [View PDF(1622)1.20 M]
  • Android Unlock Pattern Scheme Through Random Point Exclusion
  • XIONG Si-Chun, YANG Chao, MA Jian-Feng and ZHANG Jun-Wei
  • 2017,28(2):361-371 [Abstract(1387)]  [View PDF(1276)1.73 M]
  • Randomized Coding of Plaintext Encryption Scheme
  • GONG Lin-Ming, LI Shun-Dong, WANG Dao-Shun and DOU Jia-Wei
  • 2017,28(2):372-383 [Abstract(1401)]  [View PDF(1211)1.41 M]
  • Malware Detection Method Based on Active Learning
  • MAO Wei-Xuan, CAI Zhong-Min and TONG Li
  • 2017,28(2):384-397 [Abstract(2162)]  [View PDF(1793)3.37 M]
  • Flexible and Efficient VCPU Scheduling Algorithm
  • LIU Ke-Nan, TONG Wei, FENG Dan, LIU Jing-Ning and ZHANG Ju
  • 2017,28(2):398-410 [Abstract(1988)]  [View PDF(2085)3.71 M]
  • Integer Programming Approach for Schedulability of Sporadic Real-Time Systems
  • SUN Jing-Hao, SUN Jing-Chang, GUAN Nan and DENG Qing-Xu
  • 2017,28(2):411-428 [Abstract(1206)]  [View PDF(1419)2.89 M]
  • Energy Saving Scheduling Strategy Based on Model Prediction Control for Data Centers
  • ZHAO Xiao-Gang, HU Qi-Ping, DING Ling and SHEN Zhi-Dong
  • 2017,28(2):429-442 [Abstract(1410)]  [View PDF(1613)3.28 M]
  • Optimization of Mixed Redundancy Strategy with Instant Switching for Series-Parallel Systems
  • HE Pan, ZHENG Zhi-Hao, YUAN Yue and TAN Chun
  • 2017,28(2):443-456 [Abstract(1141)]  [View PDF(942)1.90 M]
  • On-Demand Physical Resource Allocation Method for Cloud Virtual Machine to Support Random Service Requests
  • CAO Jie, ZENG Guo-Sun, KUANG Gui-Juan, ZHANG Jian-Wei, MA Hai-Ying, HU Ke-Kun and NIU Jun
  • 2017,28(2):457-472 [Abstract(2106)]  [View PDF(4126)2.62 M]