Volume 28,Issue 10,2017 Table of Contents
Hybrid Search Method for Rate-Monotonic Optimal Problem with Logic OR AND ConstraintsLÜ Yin-Run, CHEN Li, WANG Chong, WU Jing-Zheng and WANG Yong-Ji2017,28(10):2525-2538 [Abstract(3098)] [View PDF(3691)1.11 M]Characterizations of Homomorphic Nuclei on NMG-AlgebrasZHOU Hong-Jun, MA Qin and LAN Shu-Min2017,28(10):2539-2547 [Abstract(2157)] [View PDF(3365)567.31 K]Multi-Objective Optimization Algorithm for Feature Selection in Software Product LinesLIAN Xiao-Li and ZHANG Li2017,28(10):2548-2563 [Abstract(2981)] [View PDF(3872)762.04 K]Test Case Generation Based on the Combination of CPN Modeling and On-the-Fly MethodZHANG Yu-Rong, LI Hua, XING Yi, WANG Xian-Rong, RUAN Hong-Wei and ZHANG Su-Mei2017,28(10):2564-2582 [Abstract(2117)] [View PDF(4167)1.78 M]Universal Availability of ROP-Based Turing-Complete ComputationYUAN Ping-Hai and ZENG Qing-Kai2017,28(10):2583-2598 [Abstract(2521)] [View PDF(4693)676.74 K]Laplacian Multi Layer Extreme Learning MachineDING Shi-Fei, ZHANG Nan and SHI Zhong-Zhi2017,28(10):2599-2610 [Abstract(3353)] [View PDF(4434)1.15 M]Multi-Dimensional Tag Recommender Model via Heterogeneous NetworksWANG Yu, WU Yan-Jun, WU Jing-Zheng and LIU Xiao-Yan2017,28(10):2611-2624 [Abstract(2319)] [View PDF(4077)774.81 K]Anomaly Detection Algorithm Based on the Local Distance of Density-Based Sampling DataFU Pei-Guo and HU Xiao-Hui2017,28(10):2625-2639 [Abstract(3040)] [View PDF(4471)1.20 M]Indels Detection Algorithm Based on Optimal Split-Read MatchingWANG Chun-Yu, PAN Jun, GUO Mao-Zu, LIU Xiao-Yan, LIU Yang and LIU Guo-Jun2017,28(10):2640-2653 [Abstract(2705)] [View PDF(4146)850.35 K]Context Based Model for Temporal Twitter SummarizationYU Guang-Chuan, HE Rui-Fang, LIU Yang and DANG Jian-Wu2017,28(10):2654-2673 [Abstract(2294)] [View PDF(3977)1.48 M]Research on Aggregation Model for Chinese Short TextsLIU Zhen, CHEN Jing, ZHENG Jian-Bin, HUA Jin-Zhi and XIAO Lin-Feng2017,28(10):2674-2692 [Abstract(2407)] [View PDF(4170)2.96 M]Event Detection Method for Social Networks Based on Node Evolution FluctuationsHU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, NIE Cong and DU Bo2017,28(10):2693-2703 [Abstract(2293)] [View PDF(3841)872.77 K]Multi-Objective Evolutionary Algorithm for Adaptive Preference Radius to Divide RegionWANG Shuai-Fa, ZHENG Jin-Hua, HU Jian-Jie, ZOU Juan and YU Guo2017,28(10):2704-2721 [Abstract(2773)] [View PDF(3674)2.52 M]New Cryptography Primitive Research: Process Based EncryptionDENG Yu-Qiao, TANG Chun-Ming, SONG Ge and WEN Ya-Min2017,28(10):2722-2736 [Abstract(2205)] [View PDF(4487)840.08 K]Efficient and Precise Approach for Single-Packet TracebackLU Ning, WANG Shang-Guang, LI Feng, SHI Wen-Bo and YANG Fang-Chun2017,28(10):2737-2756 [Abstract(2150)] [View PDF(3448)2.42 M]Secure Certificateless Signcryption Scheme without Bilinear PairingZHOU Yan-Wei, YANG Bo and WANG Qing-Long2017,28(10):2757-2768 [Abstract(2096)] [View PDF(3702)658.04 K]Cascading Failure Model of Weighted Scale-Free NetworksHAN Li, LIU Bin, DENG Yu-Jing, WANG Qian-Yue, YIN Rong-Rong and LIU Hao-Ran2017,28(10):2769-2781 [Abstract(2210)] [View PDF(4096)1.17 M]Virtual Trusted Platform Module Dynamic Trust ExtensionYU Fa-Jiang, CHEN Lie and ZHANG Huan-Guo2017,28(10):2782-2796 [Abstract(2356)] [View PDF(4882)1.08 M]Adaptive Contour Based Variational Level Set Model for Multiple Target Detection in Complex BackgroundFENG Dong-Zhu, FAN Lin-Lin, YU Hang, DAI Hao and YUAN Xiao-Guang2017,28(10):2797-2810 [Abstract(2666)] [View PDF(4004)2.10 M]