Volume 26,Issue 9,2015 Table of Contents
Clustering and Partition Based Divide and Conquer for SAT SolvingFAN Quan-Run and DUAN Zhen-Hua2015,26(9):2155-2166 [Abstract(3537)] [View PDF(4556)591.50 K]Artificial Bee Colony Algorithm Based on Orthogonal Experimental DesignZHOU Xin-Yu, WU Zhi-Jian and WANG Ming-Wen2015,26(9):2167-2190 [Abstract(4284)] [View PDF(5774)585.13 K]An Exploratory Service Composition Approach for Mobile ApplicationBAI Lin, WEI Jun, HUANG Xiang, YE Dan and HUANG Tao2015,26(9):2191-2211 [Abstract(3313)] [View PDF(5196)1.23 M]Model Checking Technique for Interrupt-Driven SystemZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua, YANG Meng-Fei and LI Xuan-Dong2015,26(9):2212-2230 [Abstract(4074)] [View PDF(5196)777.72 K]The Ontology Debugging Method Based on Concept R-MUPSOUYANG Dan-Tong, SU Jing, YE Yu-Xin and CUI Xian-Ji2015,26(9):2231-2249 [Abstract(2842)] [View PDF(4651)844.27 K]Theorem Proving Decomposition Algorithm Based on Semi-Extension RuleZHANG Li-Ming, OUYANG Dan-Tong and Zhao Yi2015,26(9):2250-2261 [Abstract(2742)] [View PDF(4487)621.33 K]Matrix Factorization for Time Series DataHUANG Xiao-Yu, PAN Rong, LI Lei, LIANG Bing, CHEN Kang and CAI Wen-Xue2015,26(9):2262-2277 [Abstract(3224)] [View PDF(5355)809.04 K]A Formal System for Propositional Extended IF LogicXU Wen-Yan2015,26(9):2278-2285 [Abstract(2549)] [View PDF(4788)492.73 K]Sound and Complete Axiomatic System with a Modality □φ=□1V□2φDENG Shao-Bo, LI Min, CAO Cun-Gen and SUI Yue-Fei2015,26(9):2286-2296 [Abstract(3274)] [View PDF(4432)577.92 K]
Randed Processing for Mutual k-Skyband QueryJIANG Tao, ZHANG Bin, YU Fa-Hong, LIU Qing and ZHOU Ao-Ying2015,26(9):2297-2310 [Abstract(4286)] [View PDF(5371)1011.45 K]
Shapelet Pruning and Shapelet Coverage for Time Series ClassificationYUAN Ji-Dong, WANG Zhi-Hai and HAN Meng2015,26(9):2311-2325 [Abstract(4043)] [View PDF(7161)720.59 K]Diversifying Tag Selection Result by Improving Both Coverage and DissimilarityWANG Mei-Ling, ZHOU Xiang, TAO Qiu-Ming and ZHAO Chen2015,26(9):2326-2338 [Abstract(2978)] [View PDF(4598)717.51 K]Event Detection Method Based on Link Prediction for Social Network EvolutionHU Wen-Bin, PENG Chao, LIANG Huan-Le and DU Bo2015,26(9):2339-2355 [Abstract(4159)] [View PDF(6315)994.66 K]Design and Formal Analysis of TCM Key Migration ProtocolsZHANG Qian-Ying, FENG Deng-Guo and ZHAO Shi-Jun2015,26(9):2396-2417 [Abstract(2836)] [View PDF(5592)860.98 K]Active Replication and Search Strategy of Scarce Resources Based on Local DemandMEI Hong-Yan, ZHANG Yu-Jie and MENG Xiang-Wu2015,26(9):2418-2435 [Abstract(2453)] [View PDF(4335)984.02 K]Provable Secure Authentication Protocol with Direct Anonymity for Mobile Nodes Roaming Service in Internet of ThingsZHOU Yan-Wei and YANG Bo2015,26(9):2436-2450 [Abstract(2856)] [View PDF(5167)922.22 K]
Survey on Network Tomography for Link Performance Parameter EvaluationPAN Sheng-Li, ZHANG Zhi-Yong, FEI Gao-Lei, QIAN Feng and HU Guang-Min2015,26(9):2356-2372 [Abstract(6256)] [View PDF(7903)1.52 M]Privacy Preservation for Location-Based Services: A SurveyZHANG Xue-Jun, GUI Xiao-Lin and WU Zhong-Dong2015,26(9):2373-2395 [Abstract(7033)] [View PDF(14113)1.16 M]