Volume 28,Issue 2,2017 Table of Contents

Other Issues:  
  
Contents

  • Exact Algorithms and Evolutionary Algorithms for Randomized Time-Varying Knapsack Problem
  • HE Yi-Chao, WANG Xi-Zhao, LI Wen-Bin and ZHAO Shu-Liang
  • 2017,28(2):185-202 [Abstract(4066)]  [View PDF(5358)2.83 M]
  • Verification of File Comparison Algorithm fcomp in Isabelle/HOL
  • SONG Li-Hua, WANG Hai-Tao, JI Xiao-Jun and ZHANG Xing-Yuan
  • 2017,28(2):203-215 [Abstract(2511)]  [View PDF(4057)1.99 M]
  • Second-Order Linear Reasoning Mechanisms for Description Logic εL
  • WANG Ju, CHEN Guang-Xi and YU Quan
  • 2017,28(2):216-233 [Abstract(2198)]  [View PDF(3750)2.21 M]
  • Layout Analysis Algorithm of Questionnaire Image
  • DUAN Lu, SONG Yong-Hong and ZHANG Yuan-Lin
  • 2017,28(2):234-245 [Abstract(2122)]  [View PDF(5176)5.07 M]
  • Microblog Community Discovery Algorithm Based on Dynamic Topic Model with Multidimensional Data Fusion
  • LIU Bing-Yu, WANG Cui-Rong, WANG Cong, WANG Jun-Wei, WANG Xing-Wei and HUANG Min
  • 2017,28(2):246-261 [Abstract(3457)]  [View PDF(6505)2.24 M]
  • Unsupervised Structralization Method of Merchandise Attributes in Chinese
  • HOU Bo-Yi, CHEN Qun, YANG Jing-Ying and LI Zhan-Huai
  • 2017,28(2):262-277 [Abstract(2199)]  [View PDF(4660)1.84 M]
  • Mining User Interests on Microblog Based on Profile and Content
  • ZHONG Zhao-Man, GUAN Yan, HU Yun and LI Cun-Hua
  • 2017,28(2):278-291 [Abstract(3059)]  [View PDF(7681)1.88 M]
  • Automatic Image Annotation Based on Semi-Paired Probabilistic Canonical Correlation Analysis
  • ZHANG Bo, HAO Jie, MA Gang and SHI Zhong-Zhi
  • 2017,28(2):292-309 [Abstract(2324)]  [View PDF(4094)3.38 M]
  • Efficient Processing Method for Reverse top-k Spatial Preference Queries
  • LI Miao, GU Yu, CHEN Mo and YU Ge
  • 2017,28(2):310-325 [Abstract(2151)]  [View PDF(3953)3.61 M]
  • Approach for Hot Spread Node Selection Based on Overlapping Community Search
  • SHAN Jing, SHEN De-Rong, KOU Yue, NIE Tie-Zheng and YU Ge
  • 2017,28(2):326-340 [Abstract(2662)]  [View PDF(4329)2.16 M]
  • Greedy Clustering-Anonymity Method for Privacy Preservation of Table Data-Publishing
  • JIANG Huo-Wen, ZENG Guo-Sun and MA Hai-Ying
  • 2017,28(2):341-351 [Abstract(2985)]  [View PDF(4723)1.93 M]
  • Cut-and-Choose Bilateral Oblivious Transfer
  • ZHAO Chuan, JIANG Han, WEI Xiao-Chao and XU Qiu-Liang
  • 2017,28(2):352-360 [Abstract(3083)]  [View PDF(4973)1.20 M]
  • Android Unlock Pattern Scheme Through Random Point Exclusion
  • XIONG Si-Chun, YANG Chao, MA Jian-Feng and ZHANG Jun-Wei
  • 2017,28(2):361-371 [Abstract(2217)]  [View PDF(3886)1.73 M]
  • Randomized Coding of Plaintext Encryption Scheme
  • GONG Lin-Ming, LI Shun-Dong, WANG Dao-Shun and DOU Jia-Wei
  • 2017,28(2):372-383 [Abstract(2251)]  [View PDF(4304)1.41 M]
  • Malware Detection Method Based on Active Learning
  • MAO Wei-Xuan, CAI Zhong-Min and TONG Li
  • 2017,28(2):384-397 [Abstract(3723)]  [View PDF(4991)3.37 M]
  • Flexible and Efficient VCPU Scheduling Algorithm
  • LIU Ke-Nan, TONG Wei, FENG Dan, LIU Jing-Ning and ZHANG Ju
  • 2017,28(2):398-410 [Abstract(3166)]  [View PDF(5289)3.71 M]
  • Integer Programming Approach for Schedulability of Sporadic Real-Time Systems
  • SUN Jing-Hao, SUN Jing-Chang, GUAN Nan and DENG Qing-Xu
  • 2017,28(2):411-428 [Abstract(2389)]  [View PDF(4532)2.89 M]
  • Energy Saving Scheduling Strategy Based on Model Prediction Control for Data Centers
  • ZHAO Xiao-Gang, HU Qi-Ping, DING Ling and SHEN Zhi-Dong
  • 2017,28(2):429-442 [Abstract(2417)]  [View PDF(4902)3.28 M]
  • Optimization of Mixed Redundancy Strategy with Instant Switching for Series-Parallel Systems
  • HE Pan, ZHENG Zhi-Hao, YUAN Yue and TAN Chun
  • 2017,28(2):443-456 [Abstract(1950)]  [View PDF(3678)1.90 M]
  • On-Demand Physical Resource Allocation Method for Cloud Virtual Machine to Support Random Service Requests
  • CAO Jie, ZENG Guo-Sun, KUANG Gui-Juan, ZHANG Jian-Wei, MA Hai-Ying, HU Ke-Kun and NIU Jun
  • 2017,28(2):457-472 [Abstract(3092)]  [View PDF(7434)2.62 M]