Volume 28,Issue 12,2017 Table of Contents
K-Medoids Clustering Algorithm Based on Distance InequalityYU Dong-Hua, GUO Mao-Zu, LIU Yang, REN Shi-Jun, LIU Xiao-Yan and LIU Guo-Jun2017,28(12):3115-3128 [Abstract(3702)] [View PDF(6794)1.95 M]Parallel Concept Computing Based on Bottom-Up Decomposition of Attribute TopologyZHANG Tao, BAI Dong-Hui and LI Hui2017,28(12):3129-3145 [Abstract(2934)] [View PDF(4436)1.91 M]Least Squares Twin Parametric Insensitive Support Vector RegressionDING Shi-Fei and HUANG Hua-Juan2017,28(12):3146-3155 [Abstract(2957)] [View PDF(4856)2.39 M]Optimizing MDDc and STR3 for Solving Constraint Satisfaction ProblemYANG Ming-Qi, LI Zhan-Shan and LI Zhe2017,28(12):3156-3166 [Abstract(3219)] [View PDF(3813)1.26 M]Metaphor Comprehension Method Based on Relevance ConstraintsSU Chang, WANG Xiao-Mei, HUANG Shu-Man and CHEN Yi-Jiang2017,28(12):3167-3182 [Abstract(2827)] [View PDF(5149)1.92 M]Research and Implementation of Chinese Microblog Sentiment ClassificationLI Yong-Gan, ZHOU Xue-Guang, SUN Yan and ZHANG Huan-Guo2017,28(12):3183-3205 [Abstract(4303)] [View PDF(7718)4.51 M]UAV Data Collection Method Based on Data ValueXU Dan, LI Wei, WANG An-Wen, FAN Hao-Nan, GONG Xiao-Qing, CHEN Xiao-Jiang and FANG Ding-Yi2017,28(12):3206-3222 [Abstract(3588)] [View PDF(5191)2.21 M]On Generalized Bisimilarity JoinWANG Chang-Ping, WANG Chao-Kun, WANG Hao, WANG Meng and CHEN Jun2017,28(12):3223-3240 [Abstract(3119)] [View PDF(3421)1.98 M]Non-Cooperative Deep Web Data Source Selection Based on Subject and Probability ModelDENG Song and WAN Chang-Xuan2017,28(12):3241-3256 [Abstract(2045)] [View PDF(3746)1.87 M]Data Gathering Algorithm Based on Compressive Sensing Under Lossy WSNHAN Zhe, ZHANG Xia, LI Ou, ZHANG Ce and ZHANG Da-Long2017,28(12):3257-3273 [Abstract(2906)] [View PDF(4013)1.99 M]Homomorphic Encryption Scheme and A Protocol on Secure Computing a Line by Two Private PointsGONG Lin-Ming, LI Shun-Dong, DOU Jia-Wei, GUO YI-Min and WANG Dao-Shun2017,28(12):3274-3292 [Abstract(3263)] [View PDF(7621)2.07 M]λ-Transform:A Mathematical Tool for Accurate Shape DescriptionWANG Bin2017,28(12):3293-3305 [Abstract(2742)] [View PDF(3673)2.90 M]Gloise Field Self-Recovery Image Sharing Scheme with Non-Equivalent Backup and Double AuthenticationsOU-YANG Xian-Bin, SHAO Li-Ping and LE Zhi-Fang2017,28(12):3306-3346 [Abstract(2935)] [View PDF(3549)16.61 M]Weighted Low Rank Subspace Clustering Based on A2 NormFU Wen-Jin and WU Xiao-Jun2017,28(12):3347-3357 [Abstract(3124)] [View PDF(4521)1.43 M]STL Surface Mesh Reconstruction Algorithm Based on 2 Dimensional ManifoldsYANG Sheng-Yuan, CHEN Yao, YI Fei and LIU Xin2017,28(12):3358-3366 [Abstract(3112)] [View PDF(5031)1.20 M]Approach to Scheduling Network Requests in Android AppsCAI Hua-Qian, ZHANG Ying, HUANG Gang and MEI Hong2017,28(12):3367-3384 [Abstract(2023)] [View PDF(4629)3.09 M]Dependency-Driven Task Scheduling Scheme of Big Data ProcessingWANG Bin, WU Ya-Jing, YANG Xiao-Long and SUN Qi-Fu2017,28(12):3385-3398 [Abstract(3488)] [View PDF(4938)2.25 M]