Volume 26,Issue 5,2015 Table of Contents
Sparse Label Propagation: A Robust Domain Adaptation Learning MethodTAO Jian-Wen, Fu-Lai CHUNG, WANG Shi-Tong and YAO Qi-Fu2015,26(5):977-1000 [Abstract(4433)] [View PDF(7009)1.77 M]Membrane Clustering Algorithm with Hybrid Evolutionary MechanismsPENG Hong, JIANG Yang, WANG Jun and Mario J. PÉREZ-JIMÉNEZ2015,26(5):1001-1012 [Abstract(4702)] [View PDF(5027)991.58 K]
Evolutionary Algorithm Based on Information Separation for Many-Objective OptimizationZHENG Jin-Hua, SHEN Rui-Min, LI Mi-Qing and ZOU Juan2015,26(5):1013-1036 [Abstract(3757)] [View PDF(5762)1.67 M]Domain-Free Information Algebraic Model and Algorithm Based on Soft SetXU Ge-Ni, LI Yong-Ming and GUAN Xue-Chong2015,26(5):1037-1047 [Abstract(2928)] [View PDF(4635)724.87 K]
Trajectory Prediction Algorithm Based on Gaussian Mixture ModelQIAO Shao-Jie, JIN Kun, HAN Nan, TANG Chang-Jie, Gesangduoji and Louis Alberto GUTIERREZ2015,26(5):1048-1063 [Abstract(6163)] [View PDF(13816)1.59 M]Parallel and Incremental Algorithm for Knowledge Update Based on Rough Sets in Cloud PlatformZHANG Jun-Bo, LI Tian-Rui, PAN Yi, LUO Chuan and TENG Fei2015,26(5):1064-1078 [Abstract(5212)] [View PDF(5605)1.09 M]Related-Subspace-Based Local Outlier Detection Algorithm Using MapReduceZHANG Ji-Fu, LI Yong-Hong, QIN Xiao and XUN Ya-Ling2015,26(5):1079-1095 [Abstract(5304)] [View PDF(6427)1.04 M]Strict Pattern Matching with General Gaps and One-Off ConditionCHAI Xin, JIA Xiao-Fei, WU You-Xi, JIANG He and WU Xin-Dong2015,26(5):1096-1112 [Abstract(5085)] [View PDF(5427)1.03 M]
Density-Based Cluster Structure Mining Algorithm for High-Volume Data StreamsYU Yan-Wei, WANG Huan, WANG Qin and ZHAO Jin-Dong2015,26(5):1113-1128 [Abstract(3972)] [View PDF(5410)1.65 M]Secure Certificateless Aggregate Signature SchemeCHEN Hu, WEI Shi-Min, ZHU Chang-Jie and YANG Yi2015,26(5):1173-1180 [Abstract(4792)] [View PDF(7257)725.71 K]Encryption Algorithm Supporting Relational Calculations in Cloud ComputingHUANG Ru-Wei, GUI Xiao-Lin, CHEN Ning-Jiang and YAO Jing2015,26(5):1181-1195 [Abstract(4198)] [View PDF(5560)1.01 M]Key Leakage-Resilient Secure Cryptosystem with Hierarchical Wildcard Pattern DelegationZHANG Ming-Wu, WANG Chun-Zhi, YANG Bo and Tsuyoshi TAKAGI2015,26(5):1196-1212 [Abstract(3321)] [View PDF(5884)1.15 M]
Theoretical Analysis on the Performance of PalmPhasor AlgorithmLENG Lu, LI Ming, Andrew Beng Jin TEOH and Cheonshik KIM2015,26(5):1237-1250 [Abstract(4378)] [View PDF(4872)925.52 K]
Shape Feature Matching Algorithm of Ear Point Cloud Using Path FollowingSUN Xiao-Peng, LI Si-Hui, WANG Lu, HAN Feng and WEI Xiao-Peng2015,26(5):1251-1264 [Abstract(3249)] [View PDF(5113)1.19 M]
Survey on Access Control Technologies for Cloud ComputingWANG Yu-Ding, YANG Jia-Hai, XU Cong, LING Xiao and YANG Yang2015,26(5):1129-1150 [Abstract(9737)] [View PDF(12855)1.32 M]Research and Development of Memory ForensicsZHANG Yu, LIU Qing-Zhong, LI Tao, Wu Li-Hua and SHI Chun2015,26(5):1151-1172 [Abstract(6491)] [View PDF(9902)1.35 M]Advances in Three-Dimensional Multiscale Geometrical AnalysisSONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai2015,26(5):1213-1236 [Abstract(6142)] [View PDF(8421)1.83 M]