Volume 26,Issue 9,2015 Table of Contents

Other Issues:  
  
Contents

  • Clustering and Partition Based Divide and Conquer for SAT Solving
  • FAN Quan-Run and DUAN Zhen-Hua
  • 2015,26(9):2155-2166 [Abstract(3486)]  [View PDF(4410)591.50 K]
  • Artificial Bee Colony Algorithm Based on Orthogonal Experimental Design
  • ZHOU Xin-Yu, WU Zhi-Jian and WANG Ming-Wen
  • 2015,26(9):2167-2190 [Abstract(4255)]  [View PDF(5559)585.13 K]
  • An Exploratory Service Composition Approach for Mobile Application
  • BAI Lin, WEI Jun, HUANG Xiang, YE Dan and HUANG Tao
  • 2015,26(9):2191-2211 [Abstract(3289)]  [View PDF(5028)1.23 M]
  • Model Checking Technique for Interrupt-Driven System
  • ZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua, YANG Meng-Fei and LI Xuan-Dong
  • 2015,26(9):2212-2230 [Abstract(4038)]  [View PDF(4993)777.72 K]
  • The Ontology Debugging Method Based on Concept R-MUPS
  • OUYANG Dan-Tong, SU Jing, YE Yu-Xin and CUI Xian-Ji
  • 2015,26(9):2231-2249 [Abstract(2798)]  [View PDF(4450)844.27 K]
  • Theorem Proving Decomposition Algorithm Based on Semi-Extension Rule
  • ZHANG Li-Ming, OUYANG Dan-Tong and Zhao Yi
  • 2015,26(9):2250-2261 [Abstract(2717)]  [View PDF(4324)621.33 K]
  • Matrix Factorization for Time Series Data
  • HUANG Xiao-Yu, PAN Rong, LI Lei, LIANG Bing, CHEN Kang and CAI Wen-Xue
  • 2015,26(9):2262-2277 [Abstract(3172)]  [View PDF(5177)809.04 K]
  • A Formal System for Propositional Extended IF Logic
  • XU Wen-Yan
  • 2015,26(9):2278-2285 [Abstract(2532)]  [View PDF(4593)492.73 K]
  • Sound and Complete Axiomatic System with a Modality □φ=1V2φ
  • DENG Shao-Bo, LI Min, CAO Cun-Gen and SUI Yue-Fei
  • 2015,26(9):2286-2296 [Abstract(3232)]  [View PDF(4250)577.92 K]
  • Contents

  • Randed Processing for Mutual k-Skyband Query
  • JIANG Tao, ZHANG Bin, YU Fa-Hong, LIU Qing and ZHOU Ao-Ying
  • 2015,26(9):2297-2310 [Abstract(4268)]  [View PDF(5214)1011.45 K]
  • Contents

  • Shapelet Pruning and Shapelet Coverage for Time Series Classification
  • YUAN Ji-Dong, WANG Zhi-Hai and HAN Meng
  • 2015,26(9):2311-2325 [Abstract(4002)]  [View PDF(6981)720.59 K]
  • Diversifying Tag Selection Result by Improving Both Coverage and Dissimilarity
  • WANG Mei-Ling, ZHOU Xiang, TAO Qiu-Ming and ZHAO Chen
  • 2015,26(9):2326-2338 [Abstract(2949)]  [View PDF(4401)717.51 K]
  • Event Detection Method Based on Link Prediction for Social Network Evolution
  • HU Wen-Bin, PENG Chao, LIANG Huan-Le and DU Bo
  • 2015,26(9):2339-2355 [Abstract(4136)]  [View PDF(6155)994.66 K]
  • Design and Formal Analysis of TCM Key Migration Protocols
  • ZHANG Qian-Ying, FENG Deng-Guo and ZHAO Shi-Jun
  • 2015,26(9):2396-2417 [Abstract(2795)]  [View PDF(5142)860.98 K]
  • Active Replication and Search Strategy of Scarce Resources Based on Local Demand
  • MEI Hong-Yan, ZHANG Yu-Jie and MENG Xiang-Wu
  • 2015,26(9):2418-2435 [Abstract(2421)]  [View PDF(4161)984.02 K]
  • Provable Secure Authentication Protocol with Direct Anonymity for Mobile Nodes Roaming Service in Internet of Things
  • ZHOU Yan-Wei and YANG Bo
  • 2015,26(9):2436-2450 [Abstract(2813)]  [View PDF(4994)922.22 K]
  • Review Articles

  • Survey on Network Tomography for Link Performance Parameter Evaluation
  • PAN Sheng-Li, ZHANG Zhi-Yong, FEI Gao-Lei, QIAN Feng and HU Guang-Min
  • 2015,26(9):2356-2372 [Abstract(6214)]  [View PDF(7286)1.52 M]
  • Privacy Preservation for Location-Based Services: A Survey
  • ZHANG Xue-Jun, GUI Xiao-Lin and WU Zhong-Dong
  • 2015,26(9):2373-2395 [Abstract(6924)]  [View PDF(13107)1.16 M]