Volume 26,Issue 9,2015 Table of Contents
Clustering and Partition Based Divide and Conquer for SAT SolvingFAN Quan-Run and DUAN Zhen-Hua2015,26(9):2155-2166 [Abstract(3486)] [View PDF(4410)591.50 K]Artificial Bee Colony Algorithm Based on Orthogonal Experimental DesignZHOU Xin-Yu, WU Zhi-Jian and WANG Ming-Wen2015,26(9):2167-2190 [Abstract(4255)] [View PDF(5559)585.13 K]An Exploratory Service Composition Approach for Mobile ApplicationBAI Lin, WEI Jun, HUANG Xiang, YE Dan and HUANG Tao2015,26(9):2191-2211 [Abstract(3289)] [View PDF(5028)1.23 M]Model Checking Technique for Interrupt-Driven SystemZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua, YANG Meng-Fei and LI Xuan-Dong2015,26(9):2212-2230 [Abstract(4038)] [View PDF(4993)777.72 K]The Ontology Debugging Method Based on Concept R-MUPSOUYANG Dan-Tong, SU Jing, YE Yu-Xin and CUI Xian-Ji2015,26(9):2231-2249 [Abstract(2798)] [View PDF(4450)844.27 K]Theorem Proving Decomposition Algorithm Based on Semi-Extension RuleZHANG Li-Ming, OUYANG Dan-Tong and Zhao Yi2015,26(9):2250-2261 [Abstract(2717)] [View PDF(4324)621.33 K]Matrix Factorization for Time Series DataHUANG Xiao-Yu, PAN Rong, LI Lei, LIANG Bing, CHEN Kang and CAI Wen-Xue2015,26(9):2262-2277 [Abstract(3172)] [View PDF(5177)809.04 K]A Formal System for Propositional Extended IF LogicXU Wen-Yan2015,26(9):2278-2285 [Abstract(2532)] [View PDF(4593)492.73 K]Sound and Complete Axiomatic System with a Modality □φ=□1V□2φDENG Shao-Bo, LI Min, CAO Cun-Gen and SUI Yue-Fei2015,26(9):2286-2296 [Abstract(3232)] [View PDF(4250)577.92 K]
Randed Processing for Mutual k-Skyband QueryJIANG Tao, ZHANG Bin, YU Fa-Hong, LIU Qing and ZHOU Ao-Ying2015,26(9):2297-2310 [Abstract(4268)] [View PDF(5214)1011.45 K]
Shapelet Pruning and Shapelet Coverage for Time Series ClassificationYUAN Ji-Dong, WANG Zhi-Hai and HAN Meng2015,26(9):2311-2325 [Abstract(4002)] [View PDF(6981)720.59 K]Diversifying Tag Selection Result by Improving Both Coverage and DissimilarityWANG Mei-Ling, ZHOU Xiang, TAO Qiu-Ming and ZHAO Chen2015,26(9):2326-2338 [Abstract(2949)] [View PDF(4401)717.51 K]Event Detection Method Based on Link Prediction for Social Network EvolutionHU Wen-Bin, PENG Chao, LIANG Huan-Le and DU Bo2015,26(9):2339-2355 [Abstract(4136)] [View PDF(6155)994.66 K]Design and Formal Analysis of TCM Key Migration ProtocolsZHANG Qian-Ying, FENG Deng-Guo and ZHAO Shi-Jun2015,26(9):2396-2417 [Abstract(2795)] [View PDF(5142)860.98 K]Active Replication and Search Strategy of Scarce Resources Based on Local DemandMEI Hong-Yan, ZHANG Yu-Jie and MENG Xiang-Wu2015,26(9):2418-2435 [Abstract(2421)] [View PDF(4161)984.02 K]Provable Secure Authentication Protocol with Direct Anonymity for Mobile Nodes Roaming Service in Internet of ThingsZHOU Yan-Wei and YANG Bo2015,26(9):2436-2450 [Abstract(2813)] [View PDF(4994)922.22 K]
Survey on Network Tomography for Link Performance Parameter EvaluationPAN Sheng-Li, ZHANG Zhi-Yong, FEI Gao-Lei, QIAN Feng and HU Guang-Min2015,26(9):2356-2372 [Abstract(6214)] [View PDF(7286)1.52 M]Privacy Preservation for Location-Based Services: A SurveyZHANG Xue-Jun, GUI Xiao-Lin and WU Zhong-Dong2015,26(9):2373-2395 [Abstract(6924)] [View PDF(13107)1.16 M]