Volume 29,Issue 12,2018 Table of Contents
O(1.890n) Exact Algorithm for a Class of Separable SAT ProblemsHUANG Jin-Gui and WANG Sheng-Chun2018,29(12):3595-3603 [Abstract(3747)] [View PDF(4248)1.01 M]Research on Large Integer Multiplication Schönhage-Strassen Algorithm's Multi-Core ParallelizationZHAO Yu-Wen, LIU Fang-Fang, JIANG Li-Juan and YANG Chao2018,29(12):3604-3613 [Abstract(2431)] [View PDF(5284)1.18 M]SLA-Aware Fault-Tolerant Approach for Transactional Composite ServiceZHANG Jun-Na, WANG Shang-Guang, SUN Qi-Bo and YANG Fang-Chun2018,29(12):3614-3634 [Abstract(2825)] [View PDF(4973)2.27 M]Research on Reconfigurable Security System Modeling and Configuration GenerationXIAO Wei, CHEN Xing-Yuan, DU Xue-Hui, LI Hai-Yu and CHEN Yu-Han2018,29(12):3635-3647 [Abstract(1893)] [View PDF(3038)1.36 M]Towards Crowd Worker Selection for Crowdsourced Testing TaskCUI Qiang, WANG Jun-Jie, XIE Miao and WANG Qing2018,29(12):3648-3664 [Abstract(1918)] [View PDF(3324)1.94 M]Tabu Search in Covering Array GenerationWANG Yan, NIE Chang-Hai, NIU Xin-Tao, WU Hua-Yao and XU Jia-Xi2018,29(12):3665-3691 [Abstract(1923)] [View PDF(3571)2.89 M]Method for User Interface Development with Perceptual Control Theory Based Task AnalysisLI Juan-Ni, HUA Qing-Yi, WU Hao, CHEN Rui, SU Hui and ZHOU Yun2018,29(12):3692-3715 [Abstract(1932)] [View PDF(3269)2.74 M]Time-Aware Web Service QoS Monitoring Approach Under Dynamic EnvironmentsHE Zhi-Peng, ZHANG Peng-Cheng, JIANG Yan, JI Shun-Hui and LI Wen-Rui2018,29(12):3716-3732 [Abstract(3282)] [View PDF(3987)1.99 M]Method of Minimality-Checking of Candidate Solution for Minimal Hitting Set AlgorithmLIU Si-Guang, OUYANG Dan-Tong and ZHANG Li-Ming2018,29(12):3733-3746 [Abstract(1784)] [View PDF(3331)1.73 M]User Rating Prediction Based on Trust-Driven Probabilistic Matrix FactorizationDU Dong-Fang, XU Tong, LU Ya-Nan, GUAN Chu, LIU Qi and CHEN En-Hong2018,29(12):3747-3763 [Abstract(2165)] [View PDF(3378)1.97 M]Batch Edge-Removal Clustering Based on Random kNN GraphLEI Xiao-Feng, CHEN Jiao, MAO Shan-Jun and XIE Kun-Qing2018,29(12):3764-3785 [Abstract(1857)] [View PDF(4446)3.01 M]Manifold Dimensional Reduction Algorithm Based on Tangent Space Discriminant LearningWANG Rui and WU Xiao-Jun2018,29(12):3786-3798 [Abstract(2060)] [View PDF(3726)1.45 M]Parallel Pattern Matching Algorithm with Sparse Gap ConstraintZHOU Kai-Lai, CHEN Hong, XIONG Zi-Yi, LI Cui-Ping and SUN Hui2018,29(12):3799-3819 [Abstract(1844)] [View PDF(3346)2.42 M]Direct Anonymous Authentication Protocol for Roaming Services Based on Fuzzy IdentityZHOU Yan-Wei, YANG Bo and WANG Xin2018,29(12):3820-3836 [Abstract(1815)] [View PDF(3262)1.92 M]Database Authentication Watermarking Algorithm in Order Preserving Encrypted DomainXIANG Shi-Jun and HE Jia-Yong2018,29(12):3837-3852 [Abstract(2044)] [View PDF(3878)1.74 M]Method for BGP-LDoS Attack Detection of Inter Domain Routing System Based on the Theory of Catastrophe Equilibrium StateMIAO Fu, ZHANG Lian-Cheng, GUO Yi, WANG Yu and WANG Zhen-Xing2018,29(12):3853-3867 [Abstract(1911)] [View PDF(3386)1.88 M]Energy Starvation Avoidance Mobile Charging for Wireless Rechargeable Sensor NetworksZHU Jin-Qi, FENG Yong, SUN Hua-Zhi, LIU Ming and ZHANG Zhao-Nian2018,29(12):3868-3885 [Abstract(4199)] [View PDF(5922)1.90 M]Robust Delay-Aware Routing ProtocolLAN Xuan-Yu, CHEN Xiao-Jiang, XU Dan, PENG Yao and FANG Ding-Yi2018,29(12):3886-3903 [Abstract(2080)] [View PDF(3433)1.95 M]Efficient Implementation Method for LFAGENG Hai-Jun, SHI Xin-Gang, WANG Zhi-Liang, YIN Xia and YIN Shao-Ping2018,29(12):3904-3920 [Abstract(2976)] [View PDF(4885)1.69 M]General SpMV Implementation in Many-Core Domestic Sunway 26010 ProcessorLIU Fang-Fang, YANG Chao, YUAN Xin-Hui, WU Chang-Mao and AO Yu-Long2018,29(12):3921-3932 [Abstract(2353)] [View PDF(6013)1.44 M]