Volume 28,Issue 2,2017 Table of Contents
Exact Algorithms and Evolutionary Algorithms for Randomized Time-Varying Knapsack ProblemHE Yi-Chao, WANG Xi-Zhao, LI Wen-Bin and ZHAO Shu-Liang2017,28(2):185-202 [Abstract(4066)] [View PDF(5358)2.83 M]Verification of File Comparison Algorithm fcomp in Isabelle/HOLSONG Li-Hua, WANG Hai-Tao, JI Xiao-Jun and ZHANG Xing-Yuan2017,28(2):203-215 [Abstract(2511)] [View PDF(4057)1.99 M]Second-Order Linear Reasoning Mechanisms for Description Logic εLWANG Ju, CHEN Guang-Xi and YU Quan2017,28(2):216-233 [Abstract(2198)] [View PDF(3750)2.21 M]Layout Analysis Algorithm of Questionnaire ImageDUAN Lu, SONG Yong-Hong and ZHANG Yuan-Lin2017,28(2):234-245 [Abstract(2122)] [View PDF(5176)5.07 M]Microblog Community Discovery Algorithm Based on Dynamic Topic Model with Multidimensional Data FusionLIU Bing-Yu, WANG Cui-Rong, WANG Cong, WANG Jun-Wei, WANG Xing-Wei and HUANG Min2017,28(2):246-261 [Abstract(3457)] [View PDF(6505)2.24 M]Unsupervised Structralization Method of Merchandise Attributes in ChineseHOU Bo-Yi, CHEN Qun, YANG Jing-Ying and LI Zhan-Huai2017,28(2):262-277 [Abstract(2199)] [View PDF(4660)1.84 M]Mining User Interests on Microblog Based on Profile and ContentZHONG Zhao-Man, GUAN Yan, HU Yun and LI Cun-Hua2017,28(2):278-291 [Abstract(3059)] [View PDF(7681)1.88 M]Automatic Image Annotation Based on Semi-Paired Probabilistic Canonical Correlation AnalysisZHANG Bo, HAO Jie, MA Gang and SHI Zhong-Zhi2017,28(2):292-309 [Abstract(2324)] [View PDF(4094)3.38 M]Efficient Processing Method for Reverse top-k Spatial Preference QueriesLI Miao, GU Yu, CHEN Mo and YU Ge2017,28(2):310-325 [Abstract(2151)] [View PDF(3953)3.61 M]Approach for Hot Spread Node Selection Based on Overlapping Community SearchSHAN Jing, SHEN De-Rong, KOU Yue, NIE Tie-Zheng and YU Ge2017,28(2):326-340 [Abstract(2662)] [View PDF(4329)2.16 M]Greedy Clustering-Anonymity Method for Privacy Preservation of Table Data-PublishingJIANG Huo-Wen, ZENG Guo-Sun and MA Hai-Ying2017,28(2):341-351 [Abstract(2985)] [View PDF(4723)1.93 M]Cut-and-Choose Bilateral Oblivious TransferZHAO Chuan, JIANG Han, WEI Xiao-Chao and XU Qiu-Liang2017,28(2):352-360 [Abstract(3083)] [View PDF(4973)1.20 M]Android Unlock Pattern Scheme Through Random Point ExclusionXIONG Si-Chun, YANG Chao, MA Jian-Feng and ZHANG Jun-Wei2017,28(2):361-371 [Abstract(2217)] [View PDF(3886)1.73 M]Randomized Coding of Plaintext Encryption SchemeGONG Lin-Ming, LI Shun-Dong, WANG Dao-Shun and DOU Jia-Wei2017,28(2):372-383 [Abstract(2251)] [View PDF(4304)1.41 M]Malware Detection Method Based on Active LearningMAO Wei-Xuan, CAI Zhong-Min and TONG Li2017,28(2):384-397 [Abstract(3723)] [View PDF(4991)3.37 M]Flexible and Efficient VCPU Scheduling AlgorithmLIU Ke-Nan, TONG Wei, FENG Dan, LIU Jing-Ning and ZHANG Ju2017,28(2):398-410 [Abstract(3166)] [View PDF(5289)3.71 M]Integer Programming Approach for Schedulability of Sporadic Real-Time SystemsSUN Jing-Hao, SUN Jing-Chang, GUAN Nan and DENG Qing-Xu2017,28(2):411-428 [Abstract(2389)] [View PDF(4532)2.89 M]Energy Saving Scheduling Strategy Based on Model Prediction Control for Data CentersZHAO Xiao-Gang, HU Qi-Ping, DING Ling and SHEN Zhi-Dong2017,28(2):429-442 [Abstract(2417)] [View PDF(4902)3.28 M]Optimization of Mixed Redundancy Strategy with Instant Switching for Series-Parallel SystemsHE Pan, ZHENG Zhi-Hao, YUAN Yue and TAN Chun2017,28(2):443-456 [Abstract(1950)] [View PDF(3678)1.90 M]On-Demand Physical Resource Allocation Method for Cloud Virtual Machine to Support Random Service RequestsCAO Jie, ZENG Guo-Sun, KUANG Gui-Juan, ZHANG Jian-Wei, MA Hai-Ying, HU Ke-Kun and NIU Jun2017,28(2):457-472 [Abstract(3092)] [View PDF(7434)2.62 M]