Volume 26,Issue 9,2015 Table of Contents

Other Issues:  
  
Contents

  • Clustering and Partition Based Divide and Conquer for SAT Solving
  • FAN Quan-Run and DUAN Zhen-Hua
  • 2015,26(9):2155-2166 [Abstract(3537)]  [View PDF(4556)591.50 K]
  • Artificial Bee Colony Algorithm Based on Orthogonal Experimental Design
  • ZHOU Xin-Yu, WU Zhi-Jian and WANG Ming-Wen
  • 2015,26(9):2167-2190 [Abstract(4284)]  [View PDF(5774)585.13 K]
  • An Exploratory Service Composition Approach for Mobile Application
  • BAI Lin, WEI Jun, HUANG Xiang, YE Dan and HUANG Tao
  • 2015,26(9):2191-2211 [Abstract(3313)]  [View PDF(5196)1.23 M]
  • Model Checking Technique for Interrupt-Driven System
  • ZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua, YANG Meng-Fei and LI Xuan-Dong
  • 2015,26(9):2212-2230 [Abstract(4074)]  [View PDF(5196)777.72 K]
  • The Ontology Debugging Method Based on Concept R-MUPS
  • OUYANG Dan-Tong, SU Jing, YE Yu-Xin and CUI Xian-Ji
  • 2015,26(9):2231-2249 [Abstract(2842)]  [View PDF(4651)844.27 K]
  • Theorem Proving Decomposition Algorithm Based on Semi-Extension Rule
  • ZHANG Li-Ming, OUYANG Dan-Tong and Zhao Yi
  • 2015,26(9):2250-2261 [Abstract(2742)]  [View PDF(4487)621.33 K]
  • Matrix Factorization for Time Series Data
  • HUANG Xiao-Yu, PAN Rong, LI Lei, LIANG Bing, CHEN Kang and CAI Wen-Xue
  • 2015,26(9):2262-2277 [Abstract(3224)]  [View PDF(5355)809.04 K]
  • A Formal System for Propositional Extended IF Logic
  • XU Wen-Yan
  • 2015,26(9):2278-2285 [Abstract(2549)]  [View PDF(4788)492.73 K]
  • Sound and Complete Axiomatic System with a Modality □φ=1V2φ
  • DENG Shao-Bo, LI Min, CAO Cun-Gen and SUI Yue-Fei
  • 2015,26(9):2286-2296 [Abstract(3274)]  [View PDF(4432)577.92 K]
  • Contents

  • Randed Processing for Mutual k-Skyband Query
  • JIANG Tao, ZHANG Bin, YU Fa-Hong, LIU Qing and ZHOU Ao-Ying
  • 2015,26(9):2297-2310 [Abstract(4286)]  [View PDF(5371)1011.45 K]
  • Contents

  • Shapelet Pruning and Shapelet Coverage for Time Series Classification
  • YUAN Ji-Dong, WANG Zhi-Hai and HAN Meng
  • 2015,26(9):2311-2325 [Abstract(4043)]  [View PDF(7161)720.59 K]
  • Diversifying Tag Selection Result by Improving Both Coverage and Dissimilarity
  • WANG Mei-Ling, ZHOU Xiang, TAO Qiu-Ming and ZHAO Chen
  • 2015,26(9):2326-2338 [Abstract(2978)]  [View PDF(4598)717.51 K]
  • Event Detection Method Based on Link Prediction for Social Network Evolution
  • HU Wen-Bin, PENG Chao, LIANG Huan-Le and DU Bo
  • 2015,26(9):2339-2355 [Abstract(4159)]  [View PDF(6315)994.66 K]
  • Design and Formal Analysis of TCM Key Migration Protocols
  • ZHANG Qian-Ying, FENG Deng-Guo and ZHAO Shi-Jun
  • 2015,26(9):2396-2417 [Abstract(2836)]  [View PDF(5592)860.98 K]
  • Active Replication and Search Strategy of Scarce Resources Based on Local Demand
  • MEI Hong-Yan, ZHANG Yu-Jie and MENG Xiang-Wu
  • 2015,26(9):2418-2435 [Abstract(2453)]  [View PDF(4335)984.02 K]
  • Provable Secure Authentication Protocol with Direct Anonymity for Mobile Nodes Roaming Service in Internet of Things
  • ZHOU Yan-Wei and YANG Bo
  • 2015,26(9):2436-2450 [Abstract(2856)]  [View PDF(5167)922.22 K]
  • Review Articles

  • Survey on Network Tomography for Link Performance Parameter Evaluation
  • PAN Sheng-Li, ZHANG Zhi-Yong, FEI Gao-Lei, QIAN Feng and HU Guang-Min
  • 2015,26(9):2356-2372 [Abstract(6256)]  [View PDF(7903)1.52 M]
  • Privacy Preservation for Location-Based Services: A Survey
  • ZHANG Xue-Jun, GUI Xiao-Lin and WU Zhong-Dong
  • 2015,26(9):2373-2395 [Abstract(7033)]  [View PDF(14113)1.16 M]