Volume 30,Issue 12,2019 Table of Contents
Universal Circuits for Quantum TeleportationZHANG Guo-Shuai and XU Dao-Yun2019,30(12):3579-3589 [Abstract(2628)] [View PDF(3975)1.16 M]Hybrid Tractable Class for Quantified Constraint Satisfaction ProblemsGAO Jian, CHEN Rong and LI Hui2019,30(12):3590-3604 [Abstract(1557)] [View PDF(3679)1.40 M]L-valued Alternating Tree AutomataWEI Xiu-Juan and LI Yong-Ming2019,30(12):3605-3621 [Abstract(1409)] [View PDF(3173)1.56 M]Delta-stepping Synchronous Parallel ModelZHANG Wei-Dong and CUI Chang2019,30(12):3622-3636 [Abstract(1554)] [View PDF(3882)1.80 M]Fuzzy Classification Method for Small- and Medium-scale DatasetsZHOU Ta, DENG Zhao-Hong, JIANG Yi-Zhang and WANG Shi-Tong2019,30(12):3637-3650 [Abstract(2450)] [View PDF(4403)1.36 M]Multiobjective Evolutionary Algorithm Based on Hybrid Individual Selection MechanismCHEN Xiao-Ji, SHI Chuan, ZHOU Ai-Min and WU Bin2019,30(12):3651-3664 [Abstract(1547)] [View PDF(4157)3.65 M]Click-through Rate Prediction Based on Deep Belief Nets and Its OptimizationCHEN Jie-Hao, ZHANG Qin, WANG Shu-Liang, SHI Ji-Yun and ZHAO Zi-Qian2019,30(12):3665-3682 [Abstract(1754)] [View PDF(4737)2.05 M]R-calculus for Pseudo-subconcept-ninimal Change in Description Logic ALCWANG Yu-Hui and SUI Yue-Fei2019,30(12):3683-3693 [Abstract(1363)] [View PDF(3322)1.08 M]Empirical Studies on Multi-objective File-level Software Defect Prediction MethodCHEN Xiang, ZHAO Ying-Quan, GU Qing, NI Chao and WANG Zan2019,30(12):3694-3713 [Abstract(1851)] [View PDF(4780)2.55 M]Software Text Semantic Search Approach Based on Code Structure KnowledgeLIN Ze-Qi, ZOU Yan-Zhen, ZHAO Jun-Feng, CAO Ying-Kui and XIE Bing2019,30(12):3714-3729 [Abstract(1816)] [View PDF(3601)1.62 M]Trusted Connection Protocol Between NetworksLAI Ying-Xu, LIU Yan and LIU Jing2019,30(12):3730-3749 [Abstract(1559)] [View PDF(4123)1.99 M]Vulnerability Analysis of OpenVPN System Based on Model LearningSHEN Ying-Zhu, GU Chun-Xiang, CHEN Xi, ZHANG Xie-Li and LU Zheng-Yu2019,30(12):3750-3764 [Abstract(1956)] [View PDF(3980)1.75 M]Concept Drift Learning-based Caching Strategy in Information-centric NetworksCAI Ling, WANG Xing-Wei, WANG Jin-Kuan and HUANG Min2019,30(12):3765-3781 [Abstract(1513)] [View PDF(3061)2.03 M]Voronoi-R*-based Privacy-preserving k Nearest Neighbor Query over Road NetworksNI Wei-Wei, LI Ling-Qi and LIU Jia-Qiang2019,30(12):3782-3797 [Abstract(1654)] [View PDF(3282)1.62 M]Privacy Preserving Friend Discovery of Matrix Confusion Encryption in Mobile Social NetworksLUO En-Tao, WANG Guo-Jun, LIU Qin, MENG Da-Cheng and TANG Ya-Yuan2019,30(12):3798-3814 [Abstract(2415)] [View PDF(4518)2.02 M]Secure Cloud Encrypted Data Deduplication MethodZHANG Shu-Guang, XIAN He-Qun, WANG Li-Ming and LIU Hong-Yan2019,30(12):3815-3828 [Abstract(1977)] [View PDF(3795)1.66 M]Community Detection Algorithm Based on Asymmetric Transition Probability of NodesXU Ping-Hua, HU Wen-Bin, QIU Zhen-Yu, NIE Cong, TANG Chuan-Hui, GAO Kuang and LIU Zhong-Zhou2019,30(12):3829-3845 [Abstract(1643)] [View PDF(6223)1.98 M]Clustering with Joint Laplacian Regularization and Adaptive Feature LearningZHENG Jian-Wei, LI Zhuo-Rong, WANG Wan-Liang and CHEN Wan-Jun2019,30(12):3846-3861 [Abstract(1658)] [View PDF(3991)2.01 M]Efficient Mesh Merging Method with Reusable Laplacian OperatorJIN Yao, XIONG Yu-Long, ZHOU Yong-Quan, ZHANG Hua-Xiong and HE Li-Li2019,30(12):3862-3875 [Abstract(1605)] [View PDF(4244)3.06 M]Spatial-scale-information Method for Motion Blur Kernel EstimationTANG Shu, WAN Sheng-Dao, YANG Shu-Li, XIE Xian-Zhong, XIA Ming and ZHANG Xu2019,30(12):3876-3891 [Abstract(1419)] [View PDF(3238)2.36 M]Active Contour Model Based on Adaptive Sign FunctionWENG Gui-Rong and HE Zhi-Yong2019,30(12):3892-3906 [Abstract(1478)] [View PDF(3043)2.06 M]