


default search action
Journal of Software, Volume 9
Volume 9, Number 1, 2014
- Wenxue Tan, Chunjiang Zhao, Huarui Wu, Xiping Wang:

An Innovative Encryption Method for Agriculture Intelligent Information System based on Cloud Computing Platform. 1-10 - Jianbin Ma

, Ying Li, Guifa Teng:
CWAAP: An Authorship Attribution Forensic Platform for Chinese Web Information. 11-19 - Shiliang Luo, Lianglun Cheng, Bin Ren, Quanmin Zhu:

An Improved Intelligent Ant Colony Algorithm for the Reliability Optimization Problem in Cyber-Physical Systems. 20-25 - Hong Liu, Yuanyuan Li, Hanchao Yu:

The Population-Based Optimization Algorithms for Role Modelling and Path Generation in Group Animation. 26-36 - Chaozheng Hu, Feng Shao, Gangyi Jiang, Mei Yu, Fucui Li, Zongju Peng:

Quality Assessment for Stereoscopic Images by Distortion Separation. 37-43 - Le Wang, Lin Feng, Mingfei Wu:

UDS-FIM: An Efficient Algorithm of Frequent Itemsets Mining over Uncertain Transaction Data Streams. 44-56 - Heng Li, Dan Yang, Xiaohong Zhang:

Research on Multi-Tenant Distributed Indexing for SaaS Application. 57-62 - Zhuangya Zhang, Haiguang Zhang, Yuanyuan Liu, Qingxi Hu:

Hybrid Intelligent Recommending System for Process Parameters in Differential Pressure Vacuum Casting. 63-69 - Chijun Zhang, Guanyu Mu, He Chen, Tiezheng Sun, Liyan Pang:

Distributed Service Discovery Algorithm Based on Ant Colony Algorithm. 70-75 - Marfizah Abdul Rahman, Rozilawati Razali, Dalbir Singh:

A Risk Model of Requirements Change Impact Analysis. 76-81 - Brahim Belattar, Abdelhabib Bourouis

:
Yet Another Java Based Discrete-Event Simulation Library. 82-88 - Tingrui Pei, Hongzhi Zhang, Zhetao Li, Youngjune Choi:

Survey of Community Structure Segmentation in Complex Networks. 89-93 - Zuohua Ding, Hui Zhou, Hui Shen, Qi-Wei Ge:

A Public-Key Cryptosystem Based On Stochastic Petri Net. 94-103 - Shang Gao, Ling Qiu, Cungen Cao:

Estimation of Distribution Algorithms for Knapsack Problem. 104-110 - Basem Y. Alkazemi

:
A Framework to Assess Legacy Software Systems. 111-115 - Ruifu Wang, Nannan Liu, Maojing Xu, Xiangchao Kong:

Research on the Open Source GIS Development Oriented to Marine Oil Spill Application. 116-120 - Chao Yun, Xiaomin Li:

Research on UAV Flight Dynamic Simulation Model Based on Multi-Agent. 121-128 - Jian Xu, Xuefeng Li, Yi Zhong, Hong Zhang:

Availability Modeling and Analysis of a Single-Server Virtualized System with Rejuvenation. 129-139 - Jin Li, Yedi Yang, Qunxin Zhao:

Study on Passenger Flow Simulation in Urban Subway Station Based on Anylogic. 140-146 - Zhiyu Zhou, Dichong Wu, Xiaolong Peng, Zefei Zhu, Kaikai Luo:

Object Tracking Based on Camshift with Multi-feature Fusion. 147-153 - Qingqi Pei, Jie Yu:

A Secure Dynamic Identity based Single Sign-On Authentication Protocol. 154-161 - Tiancheng Zhang, Yifang Yin

, Dejun Yue, Xirui Wang, Ge Yu:
Research and Implementation of an RFID Simulation System Supporting Trajectory Analysis. 162-168 - Xiangyou Li, Qingxiang Zhang:

Duality of Multi-objective Programming. 169-176 - Yichun Peng, Yunpeng Wang, Yi Niu, Qiwei Hu:

Application Study on Intrusion Detection System Using IRBF. 177-183 - Jiechang Wen, Suxian Zhang, Junjie Yang:

A Fast Algorithm for Undedetermined Mixing Matrix Identification Based on Mixture of Guassian (MoG) Sources Model. 184-189 - Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong:

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. 190-194 - Jianhui Yang, Wei Dou:

A new Prediction method of Gold price: EMD-PSO-SVM. 195-202 - Minguang Song, Ping Guo

:
Combining Local Binary Patterns for Scene Recognition. 203-210 - Jing Zhang:

Balanced Growth Solutions and Related Problems of Hua's Macroeconomic Model. 211-215 - Wei-Qiang Zhang, Yi-Mei Song, Jiqiang Feng:

A New Image Denoising Method Based on Wave Atoms and Cycle Spinning. 216-221 - Yuan Zhou, Hai-Lin Liu, Wenqin Chen, Jingqian Li:

A Novel Multi-objective Evolutionary Algorithm Solving Portfolio Problem. 222-229 - Xiao Zhi Gao, Jing Wang, Jarno M. A. Tanskanen

, Rongfang Bie, Xiaolei Wang, Ping Guo
, Kai Zenger:
Optimal Classification of Epileptic EEG Signals Using Neural Networks and Harmony Search Methods. 230-239 - Dongjiang Ji, Wenzhang He:

A Fractional Order Integral Approach for Reconstructing from Noisy Data. 240-245 - De-jin Kong, Xiao-ling Yao:

An Ad Hoc Network Load Balancing Energy-Efficient Multipath Routing Protocol. 246-250 - Yuhuang Zheng:

A Model-Based Fault Detection Framework for Vacuum Circuit Breaker by Trip Coil Analysis. 251-257 - Yanyang Guo, Gang Wang, Fengmei Hou, Qingling Mei:

Recent Frequent Item Mining Algorithm in a Data Stream Based on Flexible Counter Windows. 258-263
Volume 9, Number 2, 2014
- Lin Yan, Shuo Yan:

Researches on Rough Truth of Rough Axioms Based on Granular Computing. 265-273 - Hanshi Wang, Lizhen Liu, Wei Song, Jingli Lu:

Feature-based Sentiment Analysis Approach for Product Reviews. 274-279 - Changlei Dongye, Yongguo Zheng, Donghuan Jiang:

A Fast Global Minimization of Region-Scalable Fitting Model for Medical Image Segmentation. 280-286 - Jinyu Guo, Haibin Chen, Yuan Li:

Palmprint Recognition Based on Local Fisher Discriminant Analysis. 287-292 - Zhipeng Liu, Yefan Hong, Dechang Pi:

A Large-Scale Study of Web Password Habits of Chinese Network Users. 293-297 - Kwan Yong Sim

, Chin S. Low, Fei-Ching Kuo:
Eliminating Human Visual Judgment from Testing of Financial Charting Software. 298-312 - Xinli Wang:

Least-square Support Vector Machine for Financial Crisis Forecast Based on Particle Swarm Optimization. 313-318 - Dingli Yang, Qiuchan Bai, Yulin Zhang, Rendong Ji, Huanyu Zhao:

Eye Location Based on Hough Transform and Direct Least Square Ellipse Fitting. 319-323 - Chijun Zhang, Yongjian Yang, Xiaoyu Guo, Zhanwei Du, Na Lin:

The Improved Algorithm of Semantic Similarity Based on the Multi-dictionary. 324-328 - Jianhua Wang, Lianglun Cheng, Jun Liu, Shiliang Luo:

A High Efficient Tables Look-up Algorithm for CAVLC Decoding. 329-335 - Chunguang Kuang, Chunlei Wang, Minhuan Huang:

Memory-Size-Assisted Buffer Overflow Detection. 336-342 - Alaa Mustafa El-Halees:

Software Usability Evaluation Using Opinion Mining. 343-349 - Xuewen Xia, Jingnan Liu, Yuanxiang Li:

Particle Swarm Optimization Algorithm with Reverse-Learning and Local-Learning Behavior. 350-357 - Ying Xing, Junfei Huang, Yunzhan Gong, Yawen Wang, Xuzhou Zhang:

An Intelligent Method Based on State Space Search for Automatic Test Case Generation. 358-364 - Yuanyuan Guo, Chaoyou Wang, Yuqiang Feng:

The Moderating Effect of Organizational Learning Culture on Individual Motivation and ERP System Assimilation at Individual Level. 365-373 - Yu-Li Chen:

Virtual Reality Software Usage in an EFL Scenario: An Empirical Study. 374-381 - Ema Utami

:
The Advantages of Using CHECK Constraints in The Academic Database Tables. 382-388 - Jianmin Zhu, Donger Zhou, Fucai Li, Tingting Fu:

Improved Real Coded Genetic Algorithm and Its Simulation. 389-397 - Youcong Ni, Bei Chen, Peng Ye, Chunyan Wang:

A Framework for iOS Application Development. 398-403 - Zhiguang Zhang:

An Approach to Multi-attribute Group Decision Making and Its Application to Project Risk Assessment. 404-408 - Zhao Li, Shouzhi Xu, Yi Zhao, Peng Liang

, Keqing He:
Using SWRL and Protégé 4.1 to Optimize and Reason with Policies of the Cooperation between Goal and Process. 409-416 - Hongyu Li, Yuxin Wang, Jiazheng Yuan:

Adding Domain Model Description for Web Services. 417-424 - Dingrong Yuan, Shenglong Fang, Yaqiong Liu:

The Design of Smart Home Monitoring System Based on WiFi Electronic Trash. 425-428 - Mingqing Zhang, Shudong Hao, Yanyan Xu, Dengfeng Ke, Hengli Peng:

Automated Essay Scoring Using Incremental Latent Semantic Analysis. 429-436 - Xiuli Sang, Song Gao, Jianxin Xu, Hua Wang

, Kun Zhang:
Modeling and Prediction of Rainfall-runoff Relationship in the Yuanjiang, Red River Basin. 437-442 - Shengjun Xue, Fei Liu, Xiaolong Xu

:
An Improved Algorithm Based on NSGA-II for Cloud PDTs Scheduling. 443-450 - Zhi-hang Tang, Wen-bin Tian:

A New Data Mining Approach Combined with Extension Set and Rough Set. 451-457 - Shucong Liu, Yanxing Song, Jingsong Yang:

Image Encryption Algorithm Based on Wavelet Transforms and Dual Chaotic Maps. 458-465 - Shengjun Xue, Mengying Li, Xiaolong Xu

, Jingyi Chen:
An ACO-LB Algorithm for Task Scheduling in the Cloud Environment. 466-473 - Yu Zhang, Feng Liu:

ETER: Encounter Time Estimating Routing for Satellite IP Networks. 474-481 - Ting Wang, Ruihua Di, Jicheng Song:

A Novel Online Encyclopedia-Oriented Approach for Large-Scale Knowledge Base Construction. 482-489 - Hongzhe Liu

, Pengfei Wang:
Assessing Text Semantic Similarity Using Ontology. 490-497 - Bing Wu, Baiwei Lei, Zhenjiang Yu:

Study on Integrated Command Platform for Emergency Rescue in Coal Mines Based on WebGIS. 498-506 - Xirong Bao, Jiahua Xie, Lingqiao Nan, Shuanglong Li:

WRECS: an Improved Cluster Heads Selection Algorithm for WSNs. 507-514 - Lun Gao, Taifu Li, Lizhong Yao, Feng Wen:

Research and Application of Data Mining Feature Selection Based on Relief Algorithm. 515-522 - Xiaoying Zhang, Zheng Jiang, Ning Ding:

Three-phase Magnitude-phase Detection Based on T/4 Time-lapse Elimination Method. 523-529
Volume 9, Number 3, 2014
- Jinyu Guo, Haibin Chen, Yuan Li:

Palmprint Recognition Using 2D-FLDA From a Single Image Per Person. 531-535 - Guang Zheng, Kai Cui, Junping Zhan, Zekun Ning, Miao Jiang, Cheng Lu, Aiping Lu:

Bisimulation-based Consistency Checking on Syndrome Feng-Shi-Re-Bi in Rheumatoid Arthritis. 536-540 - Fangjun Wu:

Comparative Analysis of Software Network and CK Metrics: Implications for Pre- and Post-release Faults. 541-552 - Zhanlin Yu, Longchang Zhang:

QoS-aware SaaS Services Selection with Interval Numbers for Group User. 553-559 - Erzhou Zhu, Feng Liu, Xianyong Fang, Xuejun Li, Yindong Yang, Alei Liang:

DYBS: A Lightweight Dynamic Slicing Framework for Diagnosing Attacks on x86 Binary Programs. 560-568 - Guofeng Yan, Yuxing Peng, Shuhong Chen

, Junyi Liu:
Design and Implementation of AIRF: A Anycast-Based Integrated Routing Framework for WSNs. 569-575 - Puyu Hao, Yufen Feng, Weijun Ge, Guangfeng Zhao:

Animation Simulation of Visualization Management System in the Iron and Steel Enterprises: The Design and Its Implementation. 576-581 - Qiaoli Zhuang, Wenzhan Dai:

A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net. 582-588 - Yuying Wang, Ning Yang:

Test Case Generation of Web Service Composition based on CP-nets. 589-595 - Xiao Liang, Hongyu Yang, Yinling Qian, Yanci Zhang:

A Fast Kd-tree Construction for Ray Tracing based on Efficient Ray Distribution. 596-604 - Hsu-Chen Cheng, Wen-Wei Liao:

Blog Interface Producing Mechanism in Learning Management System. 605-612 - Jiangang Pang, Lina Jie, Fan Xu:

Study on the Group Cooperative Innovation Based on WEB2.0. 613-620 - Xin-kan Mu, Yong-hong Chen:

SMS-based Remote Computer Supervisory Control System Design. 621-626 - Qing Zhou, Chaorui Bu, Yuwen Feng:

Layout of Gas Station Based on Multi-Agent Simulation. 627-633 - Ya Xie, Zhonghua Huang:

Statistics Based Q-learning Algorithm for Multi-Agent System and Application in RoboCup. 634-640 - Yuanyuan Zhang, Qinyan Zhang, Guanfu Jiang:

A DOM-based Anchor-Hop-T Method for Web Application Information Extraction. 641-647 - Hao Zhang, Ling Huang, Xianru Liu:

Effective Scanned-Certification Image Retrieval Based on Local Object and Block Matching. 648-654 - Hongqin Shi:

DWT and SVD based Watermarking Scheme with Circulation. 655-662 - Jianing Zheng, Hao Hu, Yizhou Li, Daozheng Huang:

Fuzzy Expert System for the Competitiveness Evaluation of Shipbuilding Companies. 663-667 - Zhaoman Zhong, Cunhua Li, Hongwei Dai:

Incorporating Content and Time Features for Chinese Story Subtopic Identification. 668-675 - Lijuan Zhou, Xiang Wang:

Research of the FP-Growth Algorithm Based on Cloud Environments. 676-683 - Zhurong Zhou, Dengwu Yang:

Personalized Recommendation of Preferred Paths Based On Web Log. 684-688 - Yating Yuan, Yi Zhuang, Ying Huo:

Research and Application of Data Integration in Aircraft Designing Based on SDO. 689-696 - Renqing Li, Shihai Wang:

An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets. 697-704 - Hao Yuan, Changbing Li, Maokang Du:

Optimal Virtual Machine Resources Scheduling Based on Improved Particle Swarm Optimization in Cloud Computing. 705-708 - Kai Su, Liangli Ma, Xiaoming Guo, Yufei Sun:

An Efficient Discrete Invasive Weed Optimization Algorithm for Web Services Selection. 709-715 - Jie Xue, Xiyu Liu:

A K-nearest Based Clustering Algorithm by P Systems with Active Membranes. 716-725 - Xiaowen Liang, Wei Gong, Wenlong Fu, Jing Qi:

A Selection Algorithm of Training Set Based on Similar Classification. 726-731 - Ping Jin, Shichao Qu, Yu Zong, Xin Li:

CUDAP: A Novel Clustering Algorithm for Uncertain Data Based on Approximate Backbone. 732-737 - Haifei Zhang:

A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration. 738-742 - Derong Zhu:

A Heuristic Optimization Algorithm in System Structure Optimization. 743-747 - Xue Zhang, Jian Cheng Lv:

Sparse Affinity Propagation for Image Analysis. 748-756 - Ming Jiang, Jingcheng Huang, Xingqi Wang, Jingfan Tang, Chunming Wu:

An Approach for Crowd Density and Crowd Size Estimation. 757-762 - Yujie Zhao, Xinxing Luo:

The Multiple Attribute Group Decision Making model for Web Software Trustworthiness. 763-776 - Liping Sun, Yonglong Luo, Yalei Yu, Xintao Ding:

Voronoi Diagram Generation Algorithm based on Delaunay Triangulation. 777-784 - Yuling Tian:

The Clonal Expansion and Memory Strategy Applied to Network Detection. 785-791
Volume 9, Number 4, 2014
- Yuying Wang, Ning Yang:

Web Service Composition Verification of Safety Properties Based on Predicate Abstraction. 793-799 - Jiufu Liu, Jianyong Zhou, Chunsheng Liu, Zhong Yang, Zhisheng Wang, Yifan Zhang:

Modeling and Analyzing Flight Control Software of Unmanned Aerial Vehicle Using UML and B Method. 800-806 - Haiyang Xu, Yi Zhuang:

A Formal Transformation Approach for Embedded Software Modeling. 807-813 - Lian-Lei Lin, Yue Ma, Ling-Yu Li:

Design of Resource Repository in Virtual Test Architecture. 814-819 - Xiaoling Hao, Songqiao Han:

Measurement and Control of Operational Risk of Banking Industry based on Complex Network. 820-828 - Ardiansyah Ardiansyah, Brian Timothy, Widodo Budiharto:

A Web Framework for SMEs (Small and Medium Enterprises) using Loosely Coupled Web Services. 829-833 - Jianhua Wang, Lianglun Cheng, Jun Liu:

A Complex Event Detection Method for Multi-probability RFID Event Stream. 834-840 - Xiangyan Meng, Zhongxue Zhang, Xinying Xu:

A Novel K-Nearest Neighbor Algorithm Based on I-Divergence with Application to Soil Moisture Estimation in Maize Field. 841-846 - Anil Kumar Karna, Yuting Chen:

Multi-operative USB HD: An All-In-One Solution to IT Supports and Forensic Experts. 847-858 - Fen Xiao, Xieping Gao, Bodong Li:

A Novel Image Fusion Method based on Translation Invariant Wavelet Transforms. 859-866 - Munan Li, Junfeng Zhou, Xin Liang:

Modeling and Description of Organization-Oriented Architecture. 867-872 - Jie Huang:

The Workflow Task Scheduling Algorithm Based on the GA Model in the Cloud Computing Environment. 873-880 - Zhiyan Zhou, Zhigang Zhang, Xiwen Luo:

A Fuzzy Path Preview Algorithm for the Rice Transplanting Robot Navigation System. 881-888 - Dong Wang, Qingsheng Zhu, Yi Xia:

Real-time Multiresolution Rendering for Dynamic Terrain. 889-894 - Liang Hao, Gang Cui, Mingcheng Qu, Wende Ke:

Resource Scheduling Optimization Algorithm of Energy Consumption for Cloud Computing Based on Task Tolerance. 895-901 - Xiaoning Jing, Xiaojiu Li, Xiaojie Li:

Edge Extraction for Human Body Images based on ACAFCM Algorithm. 902-906 - Xianmin Yu, Rangding Wang, Diqun Yan

, Pengfei Ma:
Detecting Fake-Quality MP3 based on Huffman Table Index. 907-912 - Xiaofei Wang, Xiaohai He, Qizhi Teng, Mingliang Gao:

Digital Image Stabilization Based on Harmony Filter. 913-920 - Ji Li, Longhua Feng, Shenglong Fang:

An Greedy-Based Job Scheduling Algorithm in Cloud Computing. 921-925 - Guangzhen Lu, WenAn Tan, Yong Sun, Zijian Zhang, Anqiong Tang:

QoS Constraint Based Workflow Scheduling for Cloud Computing Services. 926-930 - Lang Sun, Yan Tang, Hong Zhang:

An Effective Image Retrieval Method Based on Multi-features. 931-937 - Changjiang Liu, Xuling Wu, Wei Xiong:

Chinese Herbal Medicine Classification Based. 938-943 - Jiajun Lu, Zhiqiu Huang, Changbo Ke:

Verification of Behavior-aware Privacy Requirements in Web Services Composition. 944-951 - Xiaole Li, Ming Weng, Ying Wen:

Construction of Network Security Architecture Based on Formal Specification in Digital Campus. 952-957 - Jing Lu, Ting Dou:

Provable Dynamic Data Possession by Datalog Rules. 958-963 - Zetao Jiang, Le Zhou, Liwen Zhang:

A Method of Image Registration Based On Best Similarity of Local Geometric Figure. 964-969 - Lai-Xiang Shan, Zheng Qin, Shengnan Li, Renwei Zhang, Xiao Yang:

Conversion Algorithm of Linear-Time Temporal Logic to Buchi Automata. 970-976 - Yuanzi Xu, Qingzhong Li, Zhongmin Yan, Wei Wang:

Web Event Topic Analysis by Topic Feature Clustering and Extended LDA Model. 977-984 - Chuibi Huang, Jinlin Wang, Gang Wu, Jun Chen:

Mining Web User Behaviors to Detect Application Layer DDoS Attacks. 985-990 - Yueqiu Jiang, Caiyuan Jin, Hongwei Gao:

Study of Highly Efficient Algorithms for the Character Recognition System of Medicine Bottle Label. 991-998 - Li Zhang, Qin Tao, PiQiang Teng:

An Improved Collaborative Filtering Algorithm Based on User Interest. 999-1006 - Bin Wen, Ziqiang Luo, Peng Liang:

Toward Customer-centric SOA: Services Resource Active Provisioning Approach. 1007-1018 - Jing Li, Yanping Li, Yuan Wang, Huakui Wang:

QoS Bee Routing Protocol for Ad Hoc Networks. 1019-1027 - Jingling Yuan, Jing Xie, Yan Yuan, Lin Li:

The Large-scale Dynamic Data Rapid Reduction Algorithm Based on Map-Reduce. 1028-1035 - Husheng Liao, Jia Wu, Jia Liu:

Functional Dependency based on XML Node Sets. 1036-1044 - Hongwei Liu, Li Chen, Hui Zhu, Tao Lu, Fei Liang:

Uncertainty Community Detection in Social Networks. 1045-1049 - Chunyan You, Yong Liu, Bo Zhao, Shizhong Yang:

An Objective Quality Metric for Image Fusion based on Mutual Information and Muti-scale Structural Similarity. 1050-1054
Volume 9, Number 5, 2014
- Ahmed Kabiri, Dalila Chiadmi:

Architecture for Near Zero Latency in Datawarehouse. 1055-1061 - Zhen Yu, Jie Zhu, Guicheng Shen, Haiyan Liu:

Trust Management in Peer-to-Peer Networks. 1062-1070 - Mou'ath Hourani, Qusai Shambour, Ahmad Al-Zubidy, Ali Al-Smadi:

Proposed Design and Implementation for RESTful Web Server. 1071-1080 - Yang Liu, Xin-Qing Yan, Gui-ming Lu:

The Design and Implementation of a Novel Distributed Multi-Sensor Information Fusion Simulation System. 1081-1088 - K. Shantha Kumari, T. Chithralekha:

Challenges in Modeling Evolving Access Control Policies using Feature Modeling. 1089-1094 - Bens Pardamean

, Hutanti Setyodewi
:
Information System Model of A Work-Plan Budget. 1095-1106 - Jia Liu, Donghui Xie:

Open Software Platform for Haptic Interaction. 1107-1112 - Maosen Xia, Lingling Jiang, Yumei Wang:

Classification of High-dimensional Data Clustering Based on Rules Mining Research. 1113-1120 - Zhenhuan He, Lei Nie, Huiling Fu:

Service Planning System for Large-scale High Speed Railway Network. 1121-1128 - Zhijun Zheng, Yanbin Peng:

Tri-Training based Bilateral Multi-Issue Negotiation Framework. 1129-1134 - Xinquan Chen:

Computational Model of Association Activity Measure and Its Algorithmic Implementation. 1135-1140 - Ngarap Im. Manik, Fransisca Fortuanatadewi, Don Tasman:

Testing of Rings and Fields Using A Computer Program. 1141-1150 - Yangxin Yu, Liuyang Wang:

A Novel Similarity Calculation Method Based on Chinese Sentence Keyword Weight. 1151-1156 - Ke Zhan, Yunquan Zhang:

Function Prediction of Proteins in Yeast Networks Based on the MCL Algorithm. 1157-1162 - Lina Liu, Jihong Shen, Qianghua Zhu:

Detecting Microblogger's Attitude towards Bursty Events: A Text Chain Model. 1163-1169 - Ming Huang, Shujie Guo, Xu Liang, Xuan Jiao:

Application of Improved Harmony Search Algorithm in Test Case Selection. 1170-1176 - Keyong Hu, Zhongwen Guo, Zhaodong Che, Feifei Shen:

Composition Model of Complex Virtual Instrument for Ocean Observing. 1177-1188 - Ahmed Alahmadi, Ben Soh, Azmat Ullah:

Improving e-Health Services and System Requirements by Modelling the Health Environment. 1189-1201 - Derwin Suhartono, David Christiandy, Rolando Rolando:

Lemmatization Technique in Bahasa: Indonesian Language. 1202-1209 - Fei Peng, Xuewen Zeng, Haojiang Deng, Lei Liu:

The QoS Prediction of Web Service with Location Information Ensemble. 1210-1216 - Qiang Ge, Guohua Shen, Zhiqiu Huang, Changbo Ke:

The Application of SWRL Based Ontology Inference for Privacy Protection. 1217-1222 - Litao Han, Teng Zhang, Zhenyong Wang:

The Design and Development of Indoor 3D Routing System. 1223-1228 - Flávio Fernandes, Mark A. J. Song:

UML-Checker: An Approach for Verifying UML Behavioral Diagrams. 1229-1236 - Lin Ma, Xiangyu Zeng:

Analysis on Train Stopping Accuracy based on Regression Algorithms. 1237-1244 - Zhishang Yang, Zerui Sun, Shenluo Li:

Viewpoint Based Problem Modeling Technique and Its Application. 1245-1254 - Shengnan Li, Zheng Qin, Lai-Xiang Shan, Renwei Zhang, Xiao Yang:

A Survey on Target Tracking in Well-deployed Wireless Sensor Networks. 1255-1262 - Xiaoyan Guo, Qing Li:

Fixed Bed Reactor Design Program Development Based on Java. 1263-1269 - Qingjiang Wang, Lin Zhang, Chengguo Chang:

Syntactic Function-Based Chinese Lexical Categories and Category Grammar Parsing. 1270-1274 - Xiuli Sang, Song Gao, Jianxin Xu, Hua Wang:

A Method for Determining the Importance of Customer Demand Based on Rough Set and DEA. 1275-1280 - Canlin Li, Rijian Su:

A Novel Stratified Self-calibration Method of Camera Based on Rotation Movement. 1281-1287 - Hongyao Ju, Fei Luo:

On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network. 1288-1293 - Yun Xue, Chong Sze Tong, Jing Yun Yuan:

LDA-based Non-negative Matrix Factorization for Supervised Face Recognition. 1294-1301 - Haryani Haron, M. Hamiz:

An Ontological Model for Indigenous Knowledge of Malay Confinement Dietary. 1302-1312 - Raden Achmad Chairdino Leuveano, Fairul Azni Bin Jafar, Chairul Saleh, Mohd Razali Bin Muhamad:

Incorporating Transportation Cost into Joint Economic Lot Size For Single Vendor-Buyer. 1313-1323 - Romi Satria Wahono

, Nanna Suryana, Sabrina Ahmad:
Metaheuristic Optimization based Feature Selection for Software Defect Prediction. 1324-1333 - Anongnart Srivihok, Wirot Yotsawat:

Market Segmentation of Inbound Business Tourists to Thailand by Binding of Unsupervised and Supervised Learning Techniques. 1334-1341 - Ahmad Shukri Mohd Noor, Mustafa Mat Deris, Md. Yazid Bin Mohd. Saman, Emma Ahmad Sirajudin:

Distributed Dynamic Failure Detection. 1342-1347 - Thomas Kandl, Nawaz Khan:

Information Integration of Drug Discovery and Clinical Studies to Support Complex Queries Using an Information Supply Chain Framework. 1348-1356
Volume 9, Number 6, 2014
- Hao Lan Zhang

, Chaoyi Pang, Kotagiri Ramamohanarao:
Guest Editorial. 1357-1358 - Xiaohui Hu, Hao Lan Zhang, Xiaosheng Wu, Jianlin Chen, Yu Xiao, Yun Xue, TieChen Li, Hongya Zhao:

A New Customer Segmentation Framework Based on Biclustering Analysis. 1359-1366 - Yi-mu Ji, Jie Tan, Hai Liu, Yan-peng Sun, Jia-bang Kang, Zizhuo Kuang, Chuanxin Zhao:

A Privacy Protection Method Based on CP-ABE and KP-ABE for Cloud Computing. 1367-1375 - Zhiwei Yu, Xingsen Li, Fangyao Liu:

A Tri-indicator Evaluation Method on The Rural Comprehensive Information Service Stations and Its Case Study in Ningbo, China. 1376-1381 - Hao Wang, Ruey Long Cheu:

A Microscopic Simulation Modelling of Vehicle Monitoring Using Kinematic Data Based on GPS and ITS Technologies. 1382-1388
- Mohammad Ubaidullah Bokhari, Nesar Ahmad:

Incorporating Burr Type XII Testing-efforts into Software Reliability Growth Modeling and Actual Data Analysis with Applications. 1389-1400 - Ye Guo, Mingyu Wang, Yangxia Luo:

Identifying Software Theft Based on Classification of Multi-Attribute Features. 1401-1411 - Mutlaq B. Alotaibi:

Multimodal Metaphors for Edutainment in E-Learning Interfaces: A Usability Evaluation of Learnability and Experienced User Performance. 1412-1422 - Qindong Sun, Xiuwen Sun, Nan Wang, Qian Wang:

A Large-scale Trojans Control Model Based on Layered and P2P Structure. 1423-1427 - Rong Xie, Long Li:

Simulation of Optimized Evacuation Processes in Complex Buildings Using Cellular Automata Model. 1428-1434 - Eduardo Maciel da Cunha Mattos, Marcelo Vieira, Eber Assis Schmitz, Antonio Juarez Alencar:

Applying Game Theory to the Incremental Funding Method in Software Projects. 1435-1443 - Dianlong You, Limin Shen:

Determination Method of Evolution Type of Service-oriented Entity. 1444-1452 - Rajeev Kaula:

Data Modeling of Web Site Structure: An Oracle Prototype. 1453-1462 - Kai Shuang, Li Ni:

Network Behavior Analysis and Resource Consumption Evaluation for Android IM Applications in GPRS. 1463-1470 - Lijun Lun, Lin Zhang, Xin Chi, Hui Xu:

Shortest Component Path Generation of C2-Style Architecture Using Improved A* Algorithm. 1471-1478 - Xu Liang, Shujie Guo, Ming Huang, Xuan Jiao:

Combinatorial Test Case Suite Generation Based on Differential Evolution Algorithm. 1479-1484 - Maen Hammad, Mustafa Hammad, Ahmed F. Otoom, Mohammad Bsoul:

Detecting Breaks in Design Patterns from Code Changes. 1485-1493 - Ting Ke, Lujia Song, Bing Yang, Xinbin Zhao, Ling Jing:

Building a Biased Least Squares Support Vector Machine Classifier for Positive and Unlabeled Learning. 1494-1502 - Jie Yu, Xuesong Yin:

Construction Mechanism of Digital Lifelong Learning Platform. 1503-1508 - Xiaoying Gu, Yongshan Liu, Xuefang Yan:

Node Selection Algorithm for Peer-to-Peer Network in 3D Virtual Scene. 1509-1513 - Rattanan Nantiyakul, Settachai Chaisanit:

Enhancing Corporate Performance Management with Performatica Application. 1514-1524 - Dapeng Wang, Guang Jin, Jiaming He, Xianliang Jiang, Zhijun Xie:

A Grey List-Based Privacy Protection for Android. 1525-1531 - Yachao Wang, Gang Wu, Lixia Ding:

Plant Species Identification Based on Independent Component Analysis for Hyperspectral Data. 1532-1537 - He Xiao, Yunbo Rao:

An Efficient Method of Text Localization in Complicated Background Scenes. 1538-1544 - Tingan Tang, Cheng Cheng, Matti Hämäläinen:

Everyday Life Sensing by Living Lab Approach. 1545-1552 - Lei Yuan, Shiying Yang, Dewang Chen, Kaicheng Li:

Hierarchical Modeling and Verification for High-speed Train Control Center by Time Automation. 1553-1560 - Lin Ye, Guoxiang Yao:

Parallel Clone Code Detector in MapReduce. 1561-1566 - Derong Zhu:

A Novel Algorithm for Solving the Coverage Hole and the Complete Coverage Range in Wireless Sensor Networks. 1567-1573 - Tienan Zhang, Peng Xiao:

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments. 1574-1580 - Guohui Li, Hong Yang:

A Prediction Method for Underwater Acoustic Chaotic Signal Based on RBF Neural Network. 1581-1586 - Lan Ma, Jia Xu, Zhijun Wu, Xiaoyu Zhang, Jiusheng Chen, Sarhan M. Musa:

The Security Evaluation of ATM Information System Based on Bayesian Regularization. 1587-1594 - Lijun Cao, Xiyin Liu, Jing Cao, Aiyong Liu, Zhongping Zhang:

Study on Paradigm and Its Normalization with Coexistence of XML Functional Dependence and Multivalues Dependence. 1595-1603 - Bo Li, Yu Zhang, Haoxue Wang, Haixia Xia, Yanfei Liu, Hangbo Zhou, Ming Jiang:

Combining Various Trust Factors for E-commerce Platforms Using Analytic Hierarchy Process. 1604-1611 - Changgeng Yu, Guixiong Liu:

Authentication Methods Based on Digital Fingerprint Random Encryption IBC. 1612-1618 - Ping Yin, Yinxue Ma, Zhe Chen:

Model Checking the Convergence Property of BGP Networks. 1619-1625 - Qingji Gao, Zunchao Zheng, Guochen Niu:

Path Planning Based on Dimension Reduction and Region Clipping for Aircraft Fuel Tank Inspection Robot. 1626-1633 - Zhao Liu, Ze Dong, Pu Han:

Developing a Coal Quality Detection Management System for Power Plants. 1634-1644 - Zhangang Wang, Zixing Wu, Honggang Qu, Yongbo Zhang:

A Standard-based Model for the Exchange of 3D Geological Data. 1645-1653
Volume 9, Number 7, 2014
- Sulan Zhang:

Foliage Simplification Based on Multi-viewpoints for Efficient Rendering. 1655-1665 - Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan, Khaironi Yatim Sharif:

Exploring Facilitators of Transition and Adoption to Agile Methods: A Grounded Theory Study. 1666-1678 - Chao Liang, Luokai Hu, Zhou Lei, Jushu Wang:

SyncCS: A Cloud Storage Based File Synchronization Approach. 1679-1686 - Rigel Procópio Fernandes

, Antonio Juarez Alencar, Eber Assis Schmitz, Alexandre L. Correa:
Analysing IT Investments in the Public Sector: A Project Portfolio Approach. 1687-1700 - Hongbo Chen, Yila Su, Chuan Fan:

Research on Reasoning and Retrieval Methods Based on Mongolian Curriculum Areas of Semantic Web. 1701-1706 - Yangping Li, Xiaoheng Pan, Tianming Hu, Sam Yuan Sung, Huaqiang Yuan:

Specifying Complex Systems in Object-Z: A Case Study of Petrol Supply Systems. 1707-1717 - Malik M. Umar, Mohammad R. Alshayeb:

Towards A Framework for Service-Oriented Architecture Metadata Management. 1718-1736 - Rania Mzid

, Chokri Mraidha
, Jean-Philippe Babau, Mohamed Abid:
RTOS-Aware Refactoring for Portable Real-Time Design Models. 1737-1748 - Hongqin Shi, Fangliang Lv, Yiqin Cao:

A Blind Watermarking Technique for Color Image based on SVD with Circulation. 1749-1756 - Xiaoli Wang, Yuping Wang, Kun Meng:

Optimization Algorithm for Divisible Load Scheduling on Heterogeneous Star Networks. 1757-1766 - Xing Liu, Kun Mean Hou, Christophe de Vaulx

, Chengcheng Guo, Hongling Shi, Bin Tian:
Hybrid Real-time Operating System for Resource-constraint Wireless Sensor Nodes. 1767-1780 - Zhidong Wang, Lichao Ye, Wenfa Li:

Design and Implementation of Universal Web-Tree Service Component for Large-Scale Data Maintenance. 1781-1789 - Seif Azghandi:

Cost Analysis and Tradeoffs in Regression Testing using FSMWeb. 1790-1801 - Shiliang Luo, Lianglun Cheng, Bin Ren:

Medical Monitoring and Managing Application of the Information Service Cloud System Based on Internet of Things. 1802-1809 - Zhengping Liang, Yiqun Cheng, Jianyong Chen:

A Novel Optimized Path-Based Algorithm for Model Clone Detection. 1810-1817 - Abraham Tesso Nedjo, Degen Huang, Xiaoxia Liu:

Challenges of Diacritical Marker or Hudhaa Character in Tokenization of Oromo Text. 1818-1826 - Wenjing Liao:

Contextual Patch Feature Learning for Face Recognition. 1827-1832 - Fengying He, Shangping Zhong, Kaizhi Chen:

An Effective Ensemble-based Classification Algorithm for High-Dimensional Steganalysis. 1833-1840 - Qiuping Jiang, Fenfang Duan, Feng Shao:

3D Visual Attention for Stereoscopic Image Quality Assessment. 1841-1847 - Hengliang Shi, Xiaolei Bai, Chongguang Ren, Changwei Zhao:

Development of Internet of Vehicle's Information System based on Cloud. 1848-1853 - Meng Yue, Zhijun Wu, Jin Lei:

Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance. 1854-1861 - Wei-long Chen, Li Guo, Wu He, Wei Wu, Xiaomin Yang:

Super-resolution Reconstruction Algorithm Based on Patch Similarity and Back-projection Modification. 1862-1867 - Lijun Cao, Xiyin Liu, Haiming Wang, Zhongping Zhang:

OPT-Min-Min Scheduling Algorithm of Grid Resources. 1868-1875 - Yi Sun, Zhen Hua, Lihui Zou:

A Parallel Computing Method for Community Structure Detection Based on BSP Model. 1876-1885 - Huiying Gao, Susu Wang, Bofei Yang, Hangzhou Yang:

User Preference-oriented Collaborative Recommendation Algorithm in e-commerce. 1886-1893 - Peng Jia, Qi Gao, Xue Ji, Ting Xu:

Task Decomposition Method of R&D Project Based on Product Structure Tree. 1894-1902 - Wei T. Sheu, Hieu D. Pham, Pin C. Tsai, Tuyen P. Nguyen, Hai P. Nguyen, Masatake Nagai:

Rasch GSP Toolbox for Assessing Academic Achievement. 1903-1913 - Jing Wang, Shan Wei, Qian Xu:

Research on Contradiction Problem-Oriented Description Logic ALCD-ES. 1914-1921 - Renpu Li, Tao Yu, Chunjie Zhou, Hongbo Li:

A Multi-Threshold Granulation Model for Incomplete Decision Tables. 1922-1929 - Huayou Si, Yun Zhao:

A Structured P2P-based Approach to Semantic Web Services Publication and Discovery. 1930-1940 - Yun Zhao, Huayou Si, Qing Lang:

Knowledge Sharing in Virtual Community Based on RDF Triple Publication and Retrieving To Process SPQRQL Query. 1941-1951 - Wei Jiang:

Study on Identification of Subjective Sentences in Product Reviews Based on Weekly Supervised Topic Model. 1952-1959 - Xuanhua Xu, Yue Xia, Qiufeng Wang, Haiming Zhao:

Research about Group Decision Support System for Technology Resources Allocation of Engineering Machinery Based on Information Entropy. 1960-1968 - Shuangyun Peng, Kun Yang:

Designing and Developing an AIDS Transmission Management and Spatial Decision Support System Based on GIS. 1969-1975 - Lin Sun, Jiucheng Xu, Yangyang Liu:

Concept Granule-Based Granular Lattice and Application in Knowledge Retrieval. 1976-1983
Volume 9, Number 8, 2014
- Haiyang Li, Zhaofeng Yang, Hongzhou He:

An Improved Image Segmentation Algorithm Based on GPU Parallel Computing. 1985-1990 - Genqiang Wu, Yeping He, Yi Lu, Liping Ding:

Privacy-Preserving Location Assurance Protocols for Mobile Applications. 1991-2001 - Pietro Cavallo, Giovanni Saggio:

Conversion of Sign Language to Spoken Sentences by Means of a Sensory Glove. 2002-2009 - Ning Huang:

Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection. 2010-2017 - Mei Yu, Xu Han, Tianyi Xu, Jian Yu, Ting Lei, Qing Zhang:

Design of SOAML in Social Network. 2018-2025 - Haomin Cui, Ming Zhu, Shijia Yao:

Ontology-based Top-N Recommendations on New Items with Matrix Factorization. 2026-2032 - Khair Eddin Sabri:

Algebraic Analysis of Object-Based Key Assignment Schemes. 2033-2042 - Guangxia Xu, Shuangyan Liu, Yanbing Liu:

A Secure Transmission Protocol for Wireless Body Sensor Networks. 2043-2049 - Ruifu Wang, Maojing Xu, Yi Ding, Nannan Liu, Xiangchao Kong:

The Development of Marine Oil Spill Operational System Based on GIS. 2050-2055 - Gary Yu-Hsin Chen, Pei-Qi Wang:

Test Case Prioritization in a Specification-based Testing Environment. 2056-2064 - Qingxi Peng, Ming Zhong:

Detecting Spam Review through Sentiment Analysis. 2065-2072 - Wenpeng Su, Zhonghua Yan, Chenghui Liang:

The Design and Implementation of Unified Invoking Component Based on Web Services Framework. 2073-2079 - Meng Han, Zhihai Wang, Jidong Yuan:

Efficient Method for Mining Patterns from Highly Similar and Dense Database based on Prefix-Frequent-Items. 2080-2086 - Hongxing Kan, Jili Hu, Li Jin, Luyao Zhang:

A Minimal Test Cases Calculation Method for Software Trustworthiness Test. 2087-2092 - Yuanmei Wen, Yanyu Chen:

Modified Parallel Cat Swarm Optimization in SVM Modeling for Short-term Cooling Load Forecasting. 2093-2104 - Guodong Wang, Jie Xu, Zhenkuan Pan, Jinbao Yang:

Variational Image Decomposition Model OSV With General Diffusion Regularization. 2105-2111 - Yihan Li, Chao Liu:

Effective Fault Localization Using Weighted Test Cases. 2112-2119 - Tiantian Yang, Jun Wang:

A Robust k-Means Type Algorithm for Soft Subspace Clustering and Its Application to Text Clustering. 2120-2124 - Zhengping Liang, Yiqun Cheng, Jiajia Tan, Jianyong Chen:

A Completeness Optimized Algorithm for Closed Model Clone Detection. 2125-2132 - Fanwen Min, Zhiquan Feng, Yuanyuan Su, Tingfang Zhang:

Three-Dimensional Hand Tracking Based on Microstructure of Hand Motion. 2133-2141 - Yu Guo, Jie Liu:

Model Design of Semantic Website Construction. 2142-2147 - Fan Ning, Xingxing Li, Shouguang Wang, Qiaoli Zhuang:

A Method Based on Depth-first Search to Compute All Minimal Siphons. 2148-2153 - Haijun Zhang:

Algorithm for Fast Finding High-Frequency Strings from Large-Scale Corpus. 2154-2159 - Mohammad Ibrahim Khan, Md Sarwar Kamal:

De Bruijn Graph based De novo Genome Assembly. 2160-2168 - Tülin Erçelebi Ayyildiz

, Altan Koçyigit:
An Early Software Effort Estimation Method Based on Use Cases and Conceptual Classes. 2169-2173 - Nazri Kama, Sufyan Basri:

Considering Partially Developed Artifacts in Change Impact Analysis Implementation. 2174-2179 - Hoang Nam Ho, Mourad Rabah, Samuel Nowakowski, Pascal Estraillier:

Trace-Based Weighting Approach for Multiple Criteria Decision Making. 2180-2187 - Yi-Peng Lin, Kuo-Wei Hsu:

Using Color Difference with Shape Context for Logo Recognition. 2188-2193 - Mohsen Naderpour, Jie Lu

:
A Situation Analysis Decision Support System Based on Dynamic Object Oriented Bayesian Networks. 2194-2199 - Mohamed Dbouk, Ihab Sbeity, Hamid Mcheick, Haytham Douaihy:

UsualSpace: A Smart Framework to Support Evolutive-Agents. 2200-2205 - Roberto Koh-Dzul, Mariano Vargas-Santiago, Codé Diop, Ernesto Exposito, Francisco Moo-Mena, Jorge R. Gomez-Montalvo:

Improving ESB Capabilities through Diagnosis Based on Bayesian Networks and Machine Learning. 2206-2211 - Kazuhiro Morita, Masao Fuketa, Jun-ichi Aoe:

A Cloud Based Communication System for Elders Using Dialogue Control. 2212-2216 - Zhen Yu, Jie Zhu, Guicheng Shen, Haiyan Liu:

A Topology Adjustment Algorithm for P2P Systems. 2217-2222 - Hong Wang, Yanshen Sun:

Applying Bi-directional Link Mining in Personalized Recommendation. 2223-2231 - Qifeng Zou, Xuezhi Tan, Mei Liu, Yonggang Chi:

Single-Carrier Space Time Transmission Diversity with Decision Feedback Equalization. 2232-2240
Volume 9, Number 9, 2014
- Yan Wang, Guoqing He:

Facial Expression Recognition Based on Local Vector Model. 2241-2245 - Ming Jiang, Wencao Yan, Xingqi Wang, Jingfan Tang, Chunming Wu:

Wikipedia Based Approach for Clustering Keyword of Reviews. 2246-2250 - Xiuhong Chen, Rong Peng, Han Lai, Keqing He:

Analysis and Design of Cloud Publishing Platform and its Social Network. 2251-2259 - Yun-Fei Jia, Hui Xu, Renbiao Wu:

A Nonlinear Dynamic Model for Software Aging in Service-Oriented Software. 2260-2266 - Jing Chen, Fei-Ching Kuo, Xiaoyuan Xie, Lu Wang:

A Cost-driven Approach for Metamorphic Testing. 2267-2275 - Lian Chen, Hongling Liu, Zilong Wan:

An Attribute Reduction Algorithm Based on Rough Set Theory and an Improved Genetic Algorithm. 2276-2282 - Yongchao Xiang, Zhen Liu, Xiaoya Qu:

CPU Frequency Scaling Algorithm for Energy-saving in Cloud Data Centers. 2283-2290 - Jixing Xu, Jianbo Li, Lei You, Chenqu Dai:

A Statistical Analysis and Temporary Cluster Based Routing Algorithm for Delay Tolerant Networks. 2291-2301 - Meihua Xiao, Zilong Wan, Hongling Liu:

The Formal Verification and Improvement of Simplified SET Protocol. 2302-2308 - Xiaofang Hou, Penghua Zhu, Yanxin Ma:

Classification of Cardiac Ultrasound Image Sequences Based on Sparse Representation. 2309-2314 - Xiaobao Li, Xiaoyan Liu, Xiaodong Fu, Feng Wang:

Practical Applications of Ontology-based multi-agent systems for PPHIIS. 2315-2321 - Li Shi, Shanlin Yang, Ke Huang:

The Mechanism of Software Trustworthiness Growth based on Evolution. 2322-2328 - Jinku Yang, Lei Guo, Shaowei Yu, Xiuhua Hu:

A New Multi-focus Image Fusion Algorithm Based on BEMD and Improved Local Energy. 2329-2334 - Bing Wang, Xiaokang Fu, Tinggui Chen, Guanglan Zhou:

Modeling Supply Chain Facility Location Problem and Its Solution Using a Genetic Algorithm. 2335-2341 - Tianjun Lu, Yang Liu, Le Wang:

An Algorithm of Top-k High Utility Itemsets Mining over Data Stream. 2342-2347 - Hua Jin, Yatao Zhu, Zhiqiang Jin, Sandhya Arora:

Sentiment Visualization on Tweet Stream. 2348-2352 - Jia Li:

Multi-features-based license Plate Detection in Nighttime Environment. 2353-2360 - Xingjian Li:

An Algorithm for Mining Frequent Itemsets from Library Big Data. 2361-2365 - Di Zhao:

High-accuracy Optimization by Parallel Iterative Discrete Approximation and GPU Cluster Computing. 2366-2377 - Zhipeng Liu, Dechang Pi:

Warehousing Massive Mobile Datasets. 2378-2383 - Bing Yang, Ling Jing:

A Novel Nonparallel Plane Proximal SVM for Imbalance Data Classification. 2384-2392 - Juan Wang, Fei Li, Luqiao Zhang, Yuanyuan Huang:

PSO based Hierarchical Task Scheduling with QoS Preference Awareness in Cloud Storage Environment. 2393-2400 - Yuanzi Xu, Qingzhong Li, Zhongmin Yan, Wei Wang:

Web Reviews and Events Matching Based on Event Feature Segments and Semi-Markov Conditional Random Fields. 2401-2408 - Chang Su, Yukun Wang, Lan Zhang:

Community Detection in Social Networks Based on Influential Nodes. 2409-2416 - Lihua Zhang, Miao Wang, Zhengjun Zhai, Guoqing Wang:

Mining Closed Strong Association Rules by Rule-growth in Resource Effectiveness Matrix. 2417-2426 - Yi Wu:

Network Big Data: A Literature Survey on Stream Data Mining. 2427-2434 - Shaoping Zhu:

Facial Expression Recognition Based on MILBoost. 2435-2442 - Hui Cai, ShengLin Li, Zhaoxia Wang, Xingchen Li, Lichuan Huang:

A Metadata Management Method Base on Directory Path Code. 2443-2453 - José M. Félix, Francisco Ortin:

Aspect-Oriented Programming to Improve Modularity of Object-Oriented Applications. 2454-2460 - Peiying Zhang, Zhanshan Zhang, Weishan Zhang

, Chunlei Wu:
Semantic Similarity Computation Based on Multi-feature Combination using HowNet. 2461-2466 - Sultan Alshehri, Luigi Benedicenti:

Ranking and Rules for Selecting Two Persons in Pair Programming. 2467-2473 - Ali Tizkar Sadabad, Nazri Kama:

Action Driven Decision Modeling Framework towards Formulating Software Project Management Tacit Knowledge. 2474-2483 - I-Ching Chen, Shueh-Cheng Hu:

The Dissection of Unpleasant Customer Experience in Electronic Commerce Contexts. 2484-2490 - Chunxia Yang, Yinghui Wang:

A Digraph-Based Approach to Component Retrieving. 2491-2498
Volume 9, Number 10, 2014
- Bo Ding:

3D CAD Model Representation and Retrieval based on Hierarchical Graph. 2499-2506 - Wenchong Shi

, Maohua Liu, Peter Hendler:
Computational Features of the Thinking and the Thinking Attributes of Computing: On Computational Thinking. 2507-2513 - Xiang Chen, Zhaofei Tan, Jian Xia, Pengfei He:

Optimizing Test Case Execution Schedule using Classifiers. 2514-2521 - Pengfei Ma, Rangding Wang, Diqun Yan

, Chao Jin:
Detecting double-compressed MP3 with the Same Bit-rate. 2522-2527 - Xuchu Wang, Yanmin Niu, Liwen Tan, Shaoxiang Zhang:

Improved marching cubes using novel adjacent lookup table and random sampling for medical object-specific 3D visualization. 2528-2537 - Rui Deng, Zuoning Chen:

Trusted Puzzle Solvers without Clock Support against Spam and Denial-of-Service Attacks. 2538-2545 - Yoshinobu Tamura, Shigeru Yamada:

Reliability and Portability Assessment Tool Based on Hazard Rates for an Embedded Open Source Software. 2546-2556 - Jinyong Chang, Rui Xue:

General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. 2557-2563 - Damien Hanyurwimfura, Bo Liao, Emmanuel Masabo, Gaurav Bajpai

:
A Two-Stage Method for Scientific Papers Analysis. 2564-2573 - Changgeng Yu, Guixiong Liu

:
Mass Customization based-Method for Datacenters Computer Room Monitoring System. 2574-2578 - Mingzhe Li, Jinlin Wang, Xiao Chen, Jun Chen:

Event-Driven Extraction of HTTP Payload From Concurrent Streams. 2579-2585 - Reza Nourjou, Stephen F. Smith, Michinori Hatayama, Pedro A. Szekely:

Intelligent Algorithm for Assignment of Agents to Human Strategy in Centralized Multi-agent Coordination. 2586-2597 - Fan Zhang, Zude Zhou, Wenjun Xu:

Distributed Storage and Processing Method for Big Data Sensing Information of Machine Operation Condition. 2598-2606 - Yonghong Xie, Aziguli Wulamu, Xiaojing Hu, Xiaojie Zhu:

Design and Implementation of Privacy-preserving Recommendation System Based on MASK. 2607-2613 - Asif Qumer Gill

:
Hybrid Adaptive Software Development Capability: An Empirical Study. 2614-2621 - Md Sarwar Kamal

, Mohammad Ibrahim Khan:
Memory Optimization for Global Protein Network Alignment Using Pushdown Automata and De Bruijn Graph. 2622-2627 - Yanrong Jiang, Weihua Li, Jingtao Yang:

An Incremental Approach to Modeling Flexible Workflows Using Activity Decomposition and Gradual Refinement. 2628-2637 - Lihua Ruan, Yong Li, Yingjie Yu:

Simulation System for Airborne Weather Radar Control and Display Based on Virtual Instrument. 2638-2644 - Houda Kaffela, Naoufel Kraïem, Jamil Dimassi, Zuhoor Al-Khanjari:

A proposal for a method to translate MAP model into BPMN process diagram. 2645-2650 - Hong He:

Incorporating Fault Tolerance Mechanism into Grid Meta-Scheduler. 2651-2657 - Zhongping Zhang, Long He, Shanshan Shi:

Grid Resource Discovery Algorithm of the Multi-Layer Overlay Network Model Based on Distance. 2658-2664 - Qiuping Jiang, Shanshan Wang, Kemeng Li, Feng Shao:

Measuring Depth Perception for Stereoscopic Images Using a Phase-shift Model. 2665-2671 - Ting Yan, Liejun Wang, Jiaxing Wang:

Method to Enhance Degraded Image in Dust Environment. 2672-2677 - Wei Gan:

An Improving Infrared Image Resolution Method via Guided Image Filtering. 2678-2684 - Ming Huang, Shujie Guo, Xu Liang, Xudong Song:

Research on Real-time Performance Testing Methods for Robot Operating System. 2685-2692 - Lei Yuan, Lijuan Wang, Dewang Chen, Amie R. Albrecht:

Modeling and Verification for Track Circuit Encoding in Train Control Center Based on UML and TA. 2693-2698 - Ji Xu, Yeming Xiao, Jielin Pan, Yonghong Yan:

Coalescence Type based Confidence Warping for Agglutinative Language Keyword Spotting. 2699-2705 - Yeming Xiao:

Speeding up deep neural network based speech recognition systems. 2706-2712 - Bing Liu, Xiaofeng Li, He Zhao, Yang Yang, Li Zhang:

Design and Implementation of Human Body Composition Information Management System Based on Android. 2713-2720 - Peisen Yuan, Haoyun Wang, Jianghua Che, Shougang Ren, Huanliang Xu, Dechang Pi:

Approximate String Similarity Join using Hashing Techniques under Edit Distance Constraints. 2721-2731 - Xiaohong Wang, Jianping Wu:

Investigation and Study on the Present Situation of Enterprise Website Construction of Intellectual Property Agencies. 2732-2740 - Guangjun Cai, Lei Zhang, Bin Zhao, Yong Liu:

Patterns Support for Automatic Resource Management in Cloud Computing. 2741-2748 - Yuyan Jiang, Yuan Shao, Ping Li, Qing Wang:

An Improved LDA Model for Academic Document Analysis. 2749-2757 - Yong Lv:

An Energy Efficient Routing Based on Swarm Intelligence for Wireless Sensor Networks. 2758-2763 - Zhong Lv, Jinkan Du, Wen-Tsann Lin, Shen-Tsu Wang, Chia-Ching Chang, Meng-Hua Li, Zheng-Han Zhuang:

Analysis of Abnormality Diagnosis in Emergency Medicine by Integrating K-means and Decision Trees-a Case Study of Dongyang People's Hospital in China. 2764-2770
Volume 9, Number 11, 2014
- Yukun Dong:

An Approach for Identifying Detecting Objects of Null Dereference. 2771-2777 - Haokun Tang, Shitong Zhu, Jun Huang, Hong Liu:

A Defense Model of Reactive Worms Based on Dynamic Time. 2778-2788 - Yan-xia Jin, Jing Xue, Zhi-bin Shi:

An Improved Algorithm of Quantum Particle Swarm Optimization. 2789-2795 - Fenghua Guo, Caiming Zhang, Yan He:

Haptic Data Compression Based on a Linear Prediction Model and Quadratic Curve Reconstruction. 2796-2803 - Mingliang Chen, Sainan Liu:

Business Intelligence Fusion Based on Multi-agent and Complex Network. 2804-2812 - Youness Laghouaouta, Adil Anwar, Mahmoud Nassar, Bernard Coulette:

A Graph Based Approach to Trace Models Composition. 2813-2822 - Wei Liu:

Automatic Indexing for Research Papers Using References. 2823-2829 - Cheng Wang, Zhicong Liang:

P4P Network Communication Components Based on Half-Sync/Half-Async and Pipe/Filter Patterns. 2830-2836 - Zhongping Zhang, Chunzhen Fang:

Algorithms for Minimal Dependency Set and Membership Based on XML Functional Dependency and Multi-Valued Dependency. 2837-2843 - Lingling Zi, Xin Cong, Yaping Zhang:

Subject Perception Semantic Model for Information Retrieval in Tourism. 2844-2850 - Tingting Liu, Shengxiao Guan:

Factor analysis method for text-independent speaker identification. 2851-2860 - Hong He, Dongbo Liu:

An Automatic Software Requirement Analysis Approach based on Intelligent Planning Technology. 2861-2867 - Daisen Wei, Long-ye Tang, Xueqing Li, Ling Shang:

Research on Automated Software Test Case Generation. 2868-2876 - Pu Zhang, Zhongshi He, Lina Tao:

A Study of Dependency Features for Chinese Sentiment Classification. 2877-2885 - Zhenbo Bi, Huiqin Wang, Ying Lu:

A Construction Model of Ancient Architecture Protection Domain Ontology based on Software Engineering and CLT. 2886-2894 - M. M. Mahbubul Syeed, Imed Hammouda:

Socio-Technical Dependencies in Forked OSS Projects: Evidence from the BSD Family. 2895-2909 - DMonan:

Optimal Selection System of Internal Fixation Methods for Femoral Neck Fracture. 2910-2917 - Yi Sun, Zhiqiu Huang, Changbo Ke:

Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters. 2918-2924 - Xiaopeng Wang, Shengyang Wan, Tao Lei:

Brain Tumor Segmentation Based on Structuring Element Map Modification and Marker-controlled Watershed Transform. 2925-2932 - Dingguo Yu, Huxiong Li, Zhiwen Hu

:
A Cloud Computing-Based Television Program Opinion Monitoring and Analysis System. 2933-2937 - Mohammad Shamsul Arefin, Geng Ma, Yasuhiko Morimoto:

A Spatial Skyline Query for a Group of Users. 2938-2947 - Xiaobing Liu, Xuan Jiao, Tao Ning, Ming Huang:

An Effective Method to Solve Flexible Job-shop Scheduling Based on Cloud Model. 2948-2954 - Yitong Liu, Hao Liu, Yuchen Li, Yun Shen, Jianwei Wu, Dacheng Yang:

A Software Platform Design for Objective Video QoE Assessment. 2955-2965 - Zhongping Zhang, Long He, Chao Zhang:

Grid Resource Discovery Algorithm Based on Distance. 2966-2973 - Haiyan Guo, Xiaoxiong Li, Lin Zhou, Zhenyang Wu:

Single-channel Speech Separation Using Orthogonal Matching Pursuit. 2974-2980 - Yang Yang, Wendai Lv, Guangming Hou, Junpeng Wang:

A Partner Selection Method for Forming Innovation Alliance. 2981-2988
Volume 9, Number 12, 2014
- Han Lai, Yuze Ni:

Evaluating a Lightweight Forum-based Tool: Empirical Studies on Requirements Elicitation Process. 2989-2997 - Jinlei Qin, Yuguang Niu, Zheng Li:

A Data Analysis Method and Its Applications in EXCEL. 2998-3004 - Maen Hammad, Mustafa Hammad, Hani Bani-Salameh, Ebaa Fayyoumi:

Measuring Developers' Design Contributions in Evolved Software Projects. 3005-3011 - Xiaoqing Dong, Hongcai Chen:

An Improved Face Recognition Technique Based on Modular Multi-directional Two-dimensional Principle Component Analysis Approach. 3012-3019 - Juntao Gu, Xiaodong Zhu:

Designing and Implementation of an Online System for Electronic Contract Negotiation Based on Electronic Signature. 3020-3027 - Jun Long, Luda Wang, Zude Li, Zuping Zhang, Huiling Li, Guihu Zhao:

Lexical-semantic SLVM for XML Document Classification. 3028-3034 - Akila Venkatesan, Zayaraz Gothandapani:

Novel Metrics for Bug Triage. 3035-3040 - Pei-Shih Chen, Chang-Hsien Hsu, Shih-Yun Hsu, Chun-Ming Yang:

Implementing Six Sigma to Reduce Online Petitions on the E-petition System in Taiwan Power Company. 3041-3047 - Yong-sheng Wang:

Energy Constrained Target K-coverage Algorithm in Heterogeneous Wireless Sensor Networks. 3048-3056 - Baohua Qiang, Rui Zhang, Yufeng Wang, Qian He, Wei Li, Sai Wang:

Research on Deep Web Query Interface Clustering Based on Hadoop. 3057-3062

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














