Volume 28,Issue 10,2017 Table of Contents
Hybrid Search Method for Rate-Monotonic Optimal Problem with Logic OR AND ConstraintsLÜ Yin-Run, CHEN Li, WANG Chong, WU Jing-Zheng and WANG Yong-Ji2017,28(10):2525-2538 [Abstract(3128)] [View PDF(3839)1.11 M]Characterizations of Homomorphic Nuclei on NMG-AlgebrasZHOU Hong-Jun, MA Qin and LAN Shu-Min2017,28(10):2539-2547 [Abstract(2182)] [View PDF(3502)567.31 K]Multi-Objective Optimization Algorithm for Feature Selection in Software Product LinesLIAN Xiao-Li and ZHANG Li2017,28(10):2548-2563 [Abstract(3017)] [View PDF(4015)762.04 K]Test Case Generation Based on the Combination of CPN Modeling and On-the-Fly MethodZHANG Yu-Rong, LI Hua, XING Yi, WANG Xian-Rong, RUAN Hong-Wei and ZHANG Su-Mei2017,28(10):2564-2582 [Abstract(2153)] [View PDF(4323)1.78 M]Universal Availability of ROP-Based Turing-Complete ComputationYUAN Ping-Hai and ZENG Qing-Kai2017,28(10):2583-2598 [Abstract(2554)] [View PDF(4987)676.74 K]Laplacian Multi Layer Extreme Learning MachineDING Shi-Fei, ZHANG Nan and SHI Zhong-Zhi2017,28(10):2599-2610 [Abstract(3372)] [View PDF(4570)1.15 M]Multi-Dimensional Tag Recommender Model via Heterogeneous NetworksWANG Yu, WU Yan-Jun, WU Jing-Zheng and LIU Xiao-Yan2017,28(10):2611-2624 [Abstract(2351)] [View PDF(4196)774.81 K]Anomaly Detection Algorithm Based on the Local Distance of Density-Based Sampling DataFU Pei-Guo and HU Xiao-Hui2017,28(10):2625-2639 [Abstract(3071)] [View PDF(4597)1.20 M]Indels Detection Algorithm Based on Optimal Split-Read MatchingWANG Chun-Yu, PAN Jun, GUO Mao-Zu, LIU Xiao-Yan, LIU Yang and LIU Guo-Jun2017,28(10):2640-2653 [Abstract(2729)] [View PDF(4307)850.35 K]Context Based Model for Temporal Twitter SummarizationYU Guang-Chuan, HE Rui-Fang, LIU Yang and DANG Jian-Wu2017,28(10):2654-2673 [Abstract(2318)] [View PDF(4086)1.48 M]Research on Aggregation Model for Chinese Short TextsLIU Zhen, CHEN Jing, ZHENG Jian-Bin, HUA Jin-Zhi and XIAO Lin-Feng2017,28(10):2674-2692 [Abstract(2432)] [View PDF(4331)2.96 M]Event Detection Method for Social Networks Based on Node Evolution FluctuationsHU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, NIE Cong and DU Bo2017,28(10):2693-2703 [Abstract(2310)] [View PDF(4036)872.77 K]Multi-Objective Evolutionary Algorithm for Adaptive Preference Radius to Divide RegionWANG Shuai-Fa, ZHENG Jin-Hua, HU Jian-Jie, ZOU Juan and YU Guo2017,28(10):2704-2721 [Abstract(2797)] [View PDF(3800)2.52 M]New Cryptography Primitive Research: Process Based EncryptionDENG Yu-Qiao, TANG Chun-Ming, SONG Ge and WEN Ya-Min2017,28(10):2722-2736 [Abstract(2230)] [View PDF(4716)840.08 K]Efficient and Precise Approach for Single-Packet TracebackLU Ning, WANG Shang-Guang, LI Feng, SHI Wen-Bo and YANG Fang-Chun2017,28(10):2737-2756 [Abstract(2182)] [View PDF(3583)2.42 M]Secure Certificateless Signcryption Scheme without Bilinear PairingZHOU Yan-Wei, YANG Bo and WANG Qing-Long2017,28(10):2757-2768 [Abstract(2122)] [View PDF(3834)658.04 K]Cascading Failure Model of Weighted Scale-Free NetworksHAN Li, LIU Bin, DENG Yu-Jing, WANG Qian-Yue, YIN Rong-Rong and LIU Hao-Ran2017,28(10):2769-2781 [Abstract(2238)] [View PDF(4287)1.17 M]Virtual Trusted Platform Module Dynamic Trust ExtensionYU Fa-Jiang, CHEN Lie and ZHANG Huan-Guo2017,28(10):2782-2796 [Abstract(2396)] [View PDF(5038)1.08 M]Adaptive Contour Based Variational Level Set Model for Multiple Target Detection in Complex BackgroundFENG Dong-Zhu, FAN Lin-Lin, YU Hang, DAI Hao and YUAN Xiao-Guang2017,28(10):2797-2810 [Abstract(2705)] [View PDF(4126)2.10 M]