


default search action
Journal of Software, Volume 8
Volume 8, Number 1, 2013
- Azmat Ullah, Richard Lai:

Requirements engineering and Business/IT alignment: Lessons Learned. 1-10 - Dongyan Jia, Fuzhi Zhang, Sai Liu:

A Robust Collaborative Filtering Recommendation Algorithm Based on Multidimensional Trust Model. 11-18 - Yingli Zhong, Jinghua Zhu, Meirui Ren, Yan Yang:

Estimation of the Number of Distinct Values over Data Stream Based on Compound Sliding Window. 19-24 - Bo Jiang, Wei Chen, Hua Zhang, Weifeng Pan

:
Supplier's Efficiency and Performance Evaluation using DEA-SVM Approach. 25-30 - Xusen Cheng, YuanYuan Yu, Zhao Li:

Facilitated Collaboration in CSCL based Undergraduate Course. 31-38 - Weisheng Li, Jiao Du, Lifang Zhou:

Translation Algorithm for Negative Literals in Conformant Planning. 39-46 - Jun Yang, Yinglong Wang:

A New Framework based on Cognitive Psychology for Knowledge Discovery. 47-54 - Jianguo Chen

, Hao Chen:
A Structured Information Extraction Algorithm for Scientific Papers based on Feature Rules Learning. 55-62 - Wenhui Li, Bo Fu, Lin-chang Xiao, Ying Wang, Peixun Liu:

A Block-based Video Smoke Detection Algorithm. 63-70 - Wenhui Li, Yifeng Lin, Bo Fu, Mingyu Sun, Wenting Wu:

Cascade Classifier Using Combination of Histograms of Oriented Gradients for Rapid Pedestrian Detection. 71-77 - Yan Zhang, Xun Zhang, Li Lin:

Effectiveness Assessment on Urban Planning Analyzed in Virtual Reality Environments. 78-84 - Wenxian Xiao, Zhen Liu, Wenlong Wan, Xiali Zhao:

Research on the Expected Synchronization of Autonomous System. 85-92 - Zhen Liu, Wenxian Xiao, Xiali Zhao, Wenlong Wan:

Research on the Expected Synchronization and Anticipating Synchronization of Time-delay Systems. 93-100 - Changfeng Zhu, Haijun Li, Qingrong Wang:

Research on Operation Arrangement for Waiting Hall in Railway Passenger Station. 101-109 - Jingben Yin, Yutang Liu, Baolin Ma, Dongwei Shi:

An Effective Computational Algorithm for a Class of Linear Multiplicative Programming. 110-117 - Baolin Ma, Lei Geng, Jingben Yin, Liping Fan:

An Effective Algorithm for Globally Solving a Class of Linear Fractional Programming Problem. 118-125 - Xinjie Li, Wenxian Xiao, Zhen Liu, Wenlong Wan, Tiesong Hu:

A New Fractional Order Chaotic System and Its Compound Structure. 126-133 - Hongfen Jiang, Junfeng Gu, Yijun Liu, Feiyue Ye, Haixu Xi, Mingfang Zhu:

Study of Clustering Algorithm based on Fuzzy C-Means and Immunological Partheno Genetic. 134-141 - Xiaobin Li, Jiansheng Qian, Zhikai Zhao:

Special Event Time Predication for Mine Belt Conveyor Based on Hidden Markov Model. 142-150 - Cuiyun Hu, XinJun Mao, Yin Chen:

Programming Dynamic and Open Multi-Agent Systems with Organization Metaphor. 151-159 - Kunlun Li, Zhe Wang, Chao Ma, Song Song:

SNS Privacy Protection based on the ELM Integration and Semi-supervised Clustering. 160-167 - Yanhui Xia, Zhengyou Wang, Wan Wang, Jin Wang, Zheng Wan, Weisi Lin:

Blind Measurement of Blocking Artifacts of Images Based on Edge and Flat-region Detection. 168-175 - Hui Li, Shu Zhang, Xia Wang:

A Personalization Recommendation Algorithm for E-Commerce. 176-183 - Xiaodong Wang, Juan Wang:

A Method of Hot Topic Detection in Blogs Using N-gram Model. 184-191 - Dongqing Wu, Fengjian Yang, Chaolong Zhang:

Statistical Methods based on Semantic Similarity of Topics Related to Microblogging. 192-199 - Dong Li, Xiuyu Lu, Xifeng Huang, Wenhao Chen:

Structural Join in the 'XSQS' Native XML Database. 200-207 - Yihua Lan, Haozheng Ren, Yong Zhang, Chih-Cheng Hung:

Multi-band Vector Wavelet Transformation based Multi-Focus Image Fusion Algorithm. 208-217 - Yihua Lan, Yong Zhang, Haozheng Ren:

A Combinatorial K-View Based algorithm for Texture Classification. 218-227 - Cunliang Liu, Yongguo Zheng, Zhenkuan Pan, Jinming Duan, Guodong Wang:

SAR Image Segmentation Based on Fuzzy Region Competition Method and Gamma Model. 228-235 - Jinzhao Liu, Dan Wang, Yu Chen, Yongqiang Lv:

Anything is Service: Using LIR-OSGi and R2-OSGi to Construct Ubiquitous Service Network. 236-242 - Zhuxiao Wang, Jing Guo, Fei Chen, Kehe Wu, Peng Wang:

An Extension of Distributed Dynamic Description Logics for the Representation of Heterogeneous Mappings. 243-250 - Lei Mao, Yongguo Yang, Hui Xu:

Design and Optimization of Cloud-Oriented Workflow System. 251-258
Volume 8, Number 2, 2013
- Lu Ren:

A Contour Representation and Retrieval Algorithm based on Polar-histogram. 259-265 - Sylvia L. Osborn, He Wang:

A Survey of Delegation from an RBAC Perspective. 266-275 - Lijun Lun, Xin Chi, Xuemei Ding:

C2-Style Architecture Testing and Metrics Using Dependency Analysis. 276-285 - Xianghua Fu

, Chao Wang, Zhiqiang Wang, Zhong Ming:
Threshold Random Walkers for Community Structure Detection in Complex Networks. 286-295 - Yuxia Lei, Jingying Tian, Baoxiang Cao:

A Faithful Translation from Entity-relationship Schemas to the Description Logic ALENI+. 296-301 - Nianmin Yao

, Jinzhong Chen, Shaobin Cai:
A Non-partitioning File Assignment Scheme with Approximating Average Waiting Time in Parallel I/O System. 302-309 - Yuran Liu, Mingliang Hou:

Fractional Order Correlation Algorithm's Accuracy Analysis. 310-315 - Lejun Gong, Yunyang Yan, Xiao Sun:

Target Identification and Target-centered Network Construction from Biomedical Literature. 316-319 - Xuan Song, Shuai Qiu, Liping Du, Xiaobing Liu, Jie Chen:

Arable Land Quality Assessment System Development and Its Application Based on ArcGIS Engine. 320-326 - Jehad Al-Dallal

:
Qualitative Analysis for the Impact of Accounting for Special Methods in Object-Oriented Class Cohesion Measurement. 327-336 - Hui Li, Hui Zhang, Hai Zhao, Wei Cai:

Research on Structural Holes and Closeness of Multi-Granularity Software Networks. 337-343 - Zhongwen Liu:

Virtual Policing in English: A Trainee-centered Pedagogy for Web-mediated Curricular Learning and Field Training. 344-350 - Bo Jiang, Zhiyuan Luo:

A New Algorithm for Semantic Web Service Matching. 351-356 - Liangmin Guo, Yonglong Luo

, Zhengzhen Zhou, Meijing Ji:
A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks. 357-360 - Xiaoyan Zhu, Qinbao Song, Zhongbin Sun:

Automated Identification of Change-Prone Classes in Open Source Software Projects. 361-366 - Jianxi Fu, Yuanlue Fu:

Analyzing the Effect of Collaborative Cost Management in Supply Chain by Case-Based Reasoning. 367-374 - Aihua Wu:

Query Rewriting Algorithms for Computing Credible Query Answers over Annotated Inconsistent Database. 375-386 - Layla Rasheed Hasan

, Emad Abuelrub:
Usability Testing for IAJIT OpenConf Journal Management System. 387-396 - Ziping Ma, Baosheng Kang, Bin Xiao, Jinlin Ma:

Three feature functions based on Radon transform for image retrieval and object recognition. 397-403 - Peng Li, Junhao Wen, Junping Dong:

S2Net: A New Service Description Model based on Heterogeneous Service Network. 404-409 - Liangli Zhen, Xi Peng

, Dezhong Peng:
Local Neighborhood Embedding for Unsupervised Nonlinear Dimension Reduction. 410-417 - Mengzhao Yang, Kuanquan Wang, Lei Zhang:

Realistic Real-time Facial Expressions Animation via 3D Morphing Target. 418-425 - Yihua Lan, Yong Zhang, Haozheng Ren:

Size-based Data Placement Strategy in SAN. 426-434 - Bing Gao, Jianpei Zhang:

Density Based Distribute Data Stream Clustering Algorithm. 435-442 - Peigang Guo, Yongquan Zhou, Qian Xiao:

Expansion Type Functional Neuron Network Model and Its Parameters to Directly Determine the Method. 443-450 - Weikang Qian, Chao Guo, Junhui Mei:

Research of the Precision Clock Synchronization Based on IEEE 1588. 451-458 - Rui Chen, Fangfang Peng, Yuanyuan Luo, Mohammad Reza Alsharif:

Smart Acoustic Room System and its Application for Car Hand-free Telephone. 459-465 - Weipeng Zhang, Suqin Zhao:

Forecasting Research on the Total Volume of Import and Export Trade of Ningbo Port by Gray Forecasting Model. 466-471 - Weitian Lin, Xingsheng Gu, Zhigang Lian, Yufa Xu, Bin Jiao:

A Self-Government Particle Swarm Optimization Algorithm and Its Application in Texaco Gasification. 472-479 - Lu Huang, Hai-shan Chen, Ting-Ting Hu:

Survey on Resource Allocation Policy and Job Scheduling Algorithms of Cloud Computing1. 480-487 - Hui Feng, Zeqi Yu:

The Correction Method for Power Noise in Digital Class D Power Amplifiers. 488-494 - Chunyan Han, Jianzhong Qiao, Yunxiao Wang, Yixian Liu, Zhiliang Zhu:

DifreEngine: Distributed Forward Reasoning Engine with General Purpose. 495-501
Volume 8, Number 3, 2013
- Hong Va Leong, Taeho Cho, Sang-Won Lee, Dong Ryeol Shin, Dongho Won, Sungyoung Lee:

Guest Editorial. 503-506
- Masayuki Terada

, Kozo Noaki, Kimihiko Sekino:
Sound Marketization of User-Generated Content based on a Fair Micro-Billing Scheme. 507-519 - Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim

:
Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea. 520-527 - Qing Li

, Wei Chen, Lijuan Yu:
Distributed Cooking Recipe Recommendation and Adaptation. 528-537 - Masato Oguchi, Reika Higa, Kosuke Matsubara, Takao Okamawari, Saneyasu Yamaguchi:

Performance Improvement of iSCSI Remote Storage Access through Optimization of Multiple Layers. 538-546 - Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:

Lossless Information Hiding in the VQ Index Table. 547-553
- Xiangguo Cheng, Shaojie Zhou, Lifeng Guo, Jia Yu, Huiran Ma:

An ID-Based Short Group Signature Scheme. 554-559 - Chuanqi Tao, Bixin Li, Jerry Gao:

A Systematic State-Based Approach to Regression Testing of Component Software. 560-571 - Chun-Mei Chi, Feng Gao:

Simulating Fractional Derivatives Using Matlab. 572-578 - Jianli Dong:

Research on the Realizing Mechanism of PL-ISEE Broker Architecture. 579-586 - Sofia Kouah

, Djamel-Eddine Saïdouni, Jean-Michel Ilié
:
Synchronized Petri Net: A Formal Specification Model for Multi Agent Systems. 587-602 - Cheng Zhang, Juyuan Yang, Dacong Yan, Shengqian Yang, Yuting Chen:

Automated Breakpoint Generation for Debugging. 603-616 - Jindan Zhang, Xu An Wang

, Xiaoyuan Yang:
DDos Attack against Proxy in PRE and PRS. 617-626 - Lizhen Liu, Zhixin Lv, Hanshi Wang:

Extract Product Features in Chinese Web for Opinion Mining. 627-632 - Zhiqiang Yao, Abhijit Sen:

The Realization of Students Ranking Assessment Management Information System. 633-638 - Tingrui Pei, Da Xie, Zhetao Li, Dengbiao Tu, Youngjune Choi:

A Heterogeneous-aware Cooperative MIMO Transmission Scheme in WSN. 639-644 - Fan Pan, Ying Hou, Zheng Hong, Lifa Wu, Haiguang Lai:

Efficient Model-based Fuzz Testing Using Higher-order Attribute Grammars. 645-651 - Yongfu Liu, Dongming Li, Yipeng Xie:

Research on Auxiliary Design System for Rural Power Grids Based on 3D GIS. 652-658 - Xiang Li, Jian Li:

LPT Optimization Algorithm in the Nuclear Environment Image Monitoring. 659-665 - Ming Li, Bo Pang, Yongfeng He, Fuzhong Nian

:
Particle Filter Improved by Genetic Algorithm and Particle Swarm Optimization Algorithm. 666-672 - Jing Bai, Lihong Yang, Xueying Zhang:

Parameter Optimization and Application of Support Vector Machine Based on Parallel Artificial Fish Swarm Algorithm. 673-679 - Lei Zhu, Dedong Liu, Chengli Zhu:

Experimental Study and Numerical Modeling of Surface/Subsurface Flow at Field Scale. 680-686 - Jinliang Wan, Yanhui Liu:

Hybrid MPI-OpenMP Parallelization of Image Reconstruction. 687-693 - Ruojuan Xue, Wenpeng Lu, Jinyong Cheng:

Design of Collection and Semantic Annotation System for Web Images. 694-700 - Yuanwei Du

, Chen Han, Hongjuan Yang, Wanchun Duan:
All-round Evaluation Method for Multi-media Teaching. 701-708 - Qiang Zhao:

The Study on Rotating Machinery Early Fault Diagnosis based on Principal Component Analysis and Fuzzy C-means Algorithm. 709-715 - Dongxiao Niu, Yanan Wei:

An Improved Short-Term Power Load Combined Forecasting With ARMA-GRACH-ANN- SVM. 716-723 - Ziqiang Wang, Xia Sun:

Enhancing Kernel Maximum Margin Projection for Face Recognition. 724-730 - Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:

Fusion of Two Typical Quantitative Steganalysis Based on SVR. 731-736 - Meijuan Yin, Xiaonan Liu, Junyong Luo, Xiangyang Luo:

A System for Extracting and Ranking Name Aliases in Emails. 737-745 - Yun Ma, Jie Liu, Zhengtao Yu:

Concept Name Similarity Calculation Based on WordNet and Ontology. 746-753 - Xinning Wang:

Equivalence between Recursive and Analytical Evidential Reasoning Algorithms. 754-759
Volume 8, Number 4, 2013
- Dongbo Liu, Peng Xiao:

PM&E-CP: Performance Monitor and Evaluator for Cloud Platforms. 761-767 - Zhiliang Liu, Xiaomin Zhao, Jianxiao Zou, Hongbing Xu:

A Semi-Supervised Approach Based on k-Nearest Neighbor. 768-775 - Mamoona Humayun

, Gang Cui:
An Empirical Study of the Complex Relationship between KMR and Trust in GSD. 776-784 - Banteng Liu, Kai Zhou, Yourong Chen, Tiaojuan Ren:

Research on the Optimal Design of Repeaters for WSNs Based on CTCSS. 785-790 - Wan D. Bae, Shayma Alkobaisi

, Sada Narayanappa, Cheng C. Liu:
A Real-time Health Monitoring System for Evaluating Environmental Exposures. 791-801 - Yongfu Liu, Jun Wang, Limei Zhang, Dehao Zou:

Research on Effect of Renewable Energy Power Generation on Available Transfer Capability. 802-808 - Xiaojie Yuan, Xiangyu Hu, Dongxing Wu, Haiwei Zhang, Xin Lian:

XML Data Storage and Query Optimization in Relational Database by XPath Processing Model. 809-816 - Lin Sun, Jiucheng Xu, Yuwen Hu, Lina Du:

Granular Space-Based Feature Selection and Its Applications. 817-826 - Hui Xu, Yongguo Yang, Lei Mao, Hongxia Xie:

Improvement on PSO with Dimension Update and Mutation. 827-833 - Hong Zhu, Shifei Ding, Han Zhao, Lina Bao:

Attribute Granulation Based on Attribute Discernibility and AP Algorithm. 834-841 - Husheng Liao, Weifeng Shan

, Hongyu Gao:
Automatic Parallelization of XQuery Programs. 842-851 - Xusen Cheng, Zhao Li, Jing Li:

Understanding Collaboration Process Design in CSCL: A Case Study in a PG Environment. 852-859 - Changda Wang, Tingting Gong, Patricia Ghann:

Personalized E-mail Filtering System Based on Usage Control. 860-867 - Chenxi Lu, Renfa Yang, Shanshan Yang, Fang Zhao:

Seasonal Factor Assignment Based on the Similarity of Hourly Traffic Patterns and Influential Variables. 868-877 - Ming Zhang, Fuzhang Wang, Ping Li, Yingjie Wang:

Supervision and Operation Decision Support Platform for Urban Rail Transit. 878-884 - Liquan Han, Shufen Liu, Zhengxuan Wang:

Tactic of Military Knowledge Interconnection Based on Semantic. 885-892 - Laiwu Yin, Deyun Chen, Changcheng Li:

Two-Dimensional Wavelet Transform De-noising Algorithm in Collecting Intelligent Agriculture Image. 893-899 - ShanLiang Pan, QinJiao Mao:

Case Study on Web Service Composition Based on Multi-Agent System. 900-907 - Hongyan Li, Dong Wang, Xiaonian Sun, Zhenzhou Yuan:

Using Bi-level Multi-Objective Programming in Passenger Structure Optimization for Comprehensive Transportation Channel. 908-915 - Dachun Wei:

Keynote-Dependent HMM Based Musical Chord Recognition Method. 916-923 - Mingheng Zhang, Longhui Gang:

A Detection Method of Driver's Face Orientation Based on Visual Cues and SVM. 924-931 - Dingcai Shen, Yuanxiang Li:

Multimodal Optimization using Crowding Differential Evolution with Spatially Neighbors Best Search. 932-938 - Songhua He, Bo Li:

Improvement for Spectral Reconstruction Accuracy of Trichromatic Digital Camera. 939-946 - Wenbo Wang, Xiaodong Zhang

, Xiangli Wang:
Speckle Suppression Method in SAR image Based on Curvelet Domain BivaShrink Model. 947-954 - Ping Ling, Xiangsheng Rong, Xiangyang You, Ming Xu:

Novel Three-Phase Clustering based on Support Vector Technique. 955-962 - Xiangjun Zhao, Mei Lu:

3D Object Retrieval Based on PSO-K-Modes Method. 963-970 - Ting-Ting Xu, Jian-Liang Peng, Fei Ding:

Linkage Relationship between Port Logistics and Regional Economy based on Eviews Software. 971-978 - Jing Shen, Yusong Du:

Improving the Password-Based Authentication against Smart Card Security Breach. 979-986 - Guang Han, Xi Cai, Jinkuan Wang:

Object Detection based on Combination of Visible and Thermal Videos using A Joint Sample Consensus Background Model. 987-994 - Aiying Lu, Wenrui Ding, Hongguang Li:

Multi-information Based Safe Area Step Selection Algorithm for UAV's Emergency Forced Landing. 995-1002 - Wei Guan:

Complex Learning System for Behavior Factor based Data Analysis. 1003-1010 - Ziqiang Wang, Xia Sun, Lijie Zhang, Xu Qian:

Document Classification based on Optimal Laprls. 1011-1018 - Zetao Jiang

, Qiang Wang, Yanru Cui:
Improvement of Target Extraction and Dense Matching. 1019-1026 - Yuanwei Du

, Wanchun Duan, Liang Xu:
An Integrated Method for DS/AHP under Ambidextrous Decision Information. 1027-1034 - Guoyuan Lin, Yuyu Bie, Guohui Wang, Min Lei:

A Novel Clustering Algorithm Based on Graph Matching. 1035-1041 - Jianwei Wang, Zhongxiao Hao:

Research on Basic Operations for Query Probabilistic XML Document Based on Path Set. 1042-1049
Volume 8, Number 5, 2013
- Ruiqiang Yu, Zhiqiu Huang, Lin Wang, Hongjie Zhang:

Analyzing Temporal Constraints for Web Services Composition. 1051-1057 - Don Libes, Antoine Gerardin, Severin Tixier, Fabian Neuhaus

:
Canonicalization in the PrIKL Reasoner. 1058-1062 - Chengxiang Zhuge

, Chunfu Shao, Changqing Zheng, Qiao Liang, Jian Gao:
Evaluation System for Evaluating the VMS Guidance Effect. 1063-1067 - Mohammed A. Alzain

, Ben Soh, Eric Pardede
:
A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds. 1068-1078 - Iyad Zayour, Imad Moukadem, Issam A. R. Moghrabi

:
Complexity is in the Brain of the Beholder: A Psychological Perspective on Software Engineering's Ultimate Challenge. 1079-1085 - Pengsen Cheng, Junxiu An:

The Key as Dictionary Compression Method of Inverted Index Table under the Hbase Database. 1086-1093 - Shen-Gang Hao, Li Zhang, Ghulam Muhammad:

A Union Authentication Protocol of Cross-domain Based on Bilinear Pairing. 1094-1100 - Hongjie Jia, Shifei Ding, Hong Zhu, Fulin Wu, Lina Bao:

A Feature Weighted Spectral Clustering Algorithm Based on Knowledge Entropy. 1101-1108 - Tongfeng Sun, Shifei Ding, Zihui Ren:

Novel Image Recognition Based on Subspace and SIFT. 1109-1116 - Yanqun Zhang, Yu Bao, Qianping Wang, Hui Xu:

Reversible Watermarking Algorithm of Grid Map Based on Prediction-Error Histogram. 1117-1123 - Lei Mao, Yongguo Yang, Hui Xu, Ying Chen:

Service Selection Algorithm Based on Constraint for Cloud Workflow System. 1124-1131 - Aijuan Zhang, Jingxiang Gao, Jiuyun Sun, Cheng Ji:

Declaration and Translation of Spatial Access Control Policy. 1132-1139 - Junying Meng, Jiaomin Liu, Juan Wang, Ming Han:

Target Tracking Based on Optimized Particle Filter Algorithm. 1140-1144 - Chao Zhang, Peng Cao, Yixiang Cao, Jianbo Li

:
Using Finite Element Software to Simulation Fracture Behavior of Three-point Bending Beam with Initial Crack. 1145-1150 - Yongxian Song, Kangde Zhao, Yuan Feng:

Research and Design of Water Pump Diagnosis System Based on Wavelet Transform and DSP. 1151-1156 - Shunyuan Sun, Jing Gao, Minfang Chen, Baoguo Xu, Zhiguo Ding:

FS-DS based Multi-sensor Data Fusion. 1157-1161 - Kuo-Hsien Hsia, Shao-Fan Lien, Juhng-Perng Su:

Fast Restoration of Warped Document Image based on Text Rectangle Area Segmentation. 1162-1167 - Qiangqiang Peng, Long Zhao:

A Modified Segmentation Approach for Synthetic Aperture Radar Images on Level Set. 1168-1173 - Yicun Hua, Yongsheng Ding, Kuangrong Hao

, Yanling Jin:
A Three-Dimensional Virtual Simulation System of Spinning Production Line. 1174-1179 - Ying Wang, Sheping Zhai, Jianyuan Liu:

Dimensionality Reduction of Multi-spectral Images for Color Reproduction. 1180-1185 - Xiaolin Yi, Yishuang Ning:

The Development of a Mobile Terminal Middleware Platform Based on HTML5. 1186-1193 - Ying Ma, Fei Feng:

On the System Dynamics of the Logistic Risk of Marketing Channels. 1194-1200 - Yu Wang, Youfang Huang, Huiqiang Zheng, Daofang Chang:

Quay Crane Allocation of Container Terminal Based on Cluster Analysis. 1201-1208 - Guojin Zhu, Yefeng Chen:

Knowledge-based Links for Automatic Interaction with Programming Online Judges. 1209-1218 - Kui Fang, Weiqiong Bu, Wu Luo, Lu-Ming Shen:

Chinese Word Segmentation for Agriculture. 1219-1226 - Xiaoqin Zhang, Zhanqi Hu, Zhe Hao:

Computer Aided Design and New Manufacturing Process of Spherical Hob. 1227-1235 - Chaogai Xue:

Adaptability Evaluation of Enterprise Information Systems Based on Object-based Knowledge Mesh. 1236-1244 - Yuanju Gan, Licheng Wang, Jianhua Yan, Yixian Yang:

CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model. 1245-1253 - Hiroki Kumamoto, Takahisa Mizuno, Kensuke Narita, Shin-ya Nishizaki:

Applying Model Checking to Destructive Testing and Analysis of Software System. 1254-1261 - Fanbin Meng, Lei Ding, Sheng Peng, Guangxue Yue:

A P2P Network Model Based on Hierarchical Interest Clustering Algorithm. 1262-1267 - Ying Wang, Shihong Chen, Yimin Qiu:

Ontology-based Semantic Similarity Transfer Algorithm. 1268-1274
Volume 8, Number 6, 2013
- Haitao Jiang, Yun Xu, Yin Liao, Guojie Jin, Guoliang Chen:

KBT: Operating System Kernel Level Binary Translation System. 1275-1280 - Abdul Azim Abdul Ghani, Reza Meimandi Parizi:

Aspect-Oriented Program Testing: An Annotated Bibliography. 1281-1300 - Nan Zhang, Gang Cui, Hongwei Liu:

Software Reliability Analysis using Queuing-based Model with Testing Effort. 1301-1307 - Yuxia Lei, Yuefei Sui, Jingying Tian:

The Maximal Relation Based on A Given Relation Schema and Its Concept Lattice. 1308-1315 - Yi-Hsin Wang, Rui-Dong Chiang, Huan-Chen Chu:

Combing Customer Profiles for Members' Repurchase Rate Predictions. 1316-1326 - Dazhi Pan, Ying Ci, Min He, Hongying He:

An Improved Quantum-behaved Particle Swarm Optimization Algorithm Based on Random Weight. 1327-1332 - Jia Wu, Zhihua Cai, Xiaolin Chen, Meng Li, Bin Guo:

Weighted Clone Selection Algorithm based on Rough Set Theory. 1333-1338 - Yuanzhi Wang:

Constraint Cellular Ant Algorithm for the Multi-Objective Vehicle Routing Problem. 1339-1345 - Luqiao Zhang, Qinxin Zhu, Aidong Chen:

Fast Message Dissemination Tree and Balanced Data Collection Tree for Wireless Sensor Network. 1346-1352 - Boumediene Belkhouche

, Khaled Hamdan, Peter Smith:
The Influence of Leadership and Work Culture on Software Cost Effort. 1353-1367 - Meng Han, Zhihai Wang, Jidong Yuan:

Closed Sequential Pattern Mining in High Dimensional Sequences. 1368-1373 - Zhongwen Guo, Yu Yu, Zhaosui Sun, Yunhong Lu:

Application Development Framework for Measurement-based Product Testing Management. 1374-1383 - Yongjun Cheng, Yulong Ren, Fei Tu:

An Improved Particle Swarm Optimization Algorithm based on Adaptive Genetic Strategy for Global Numerical Optimal. 1384-1389 - Yong Guo, Peijun Ma, Xiaohong Su:

Dynamic Collection of Reliability-Related Data and Reliability Evaluation for Internet software. 1390-1397 - Shiqiang Chen, Junfeng Wang, Yifang Qin, Xu Zhou:

Accurate and Low-cost Scheme for Network Path Delay Measurement. 1398-1404 - Bingchao Liu, Zhiquan Feng, Aili Sang:

An Observation Likelihood Model Integrating Edge Feature with Silhouette Feature. 1405-1410 - Xiaolong Wang, Ligang Dong, Lingjia Gui, Weiming Wang, Julong Lan:

Research on the Cost of Open Nested Transaction in the Open Reconfigurable Network. 1411-1418 - Guojin Zhu, Yongjiang Zhou:

Automatic Connection of Components for Dynamic Distributed Applications. 1419-1427 - Lixia Xie, Yanxin Yan, Jiyong Zhang

:
Research on Security Evaluation of XML Communication Protocol. 1428-1435 - Xiao Wang, Min Wang, Yinghan Jin:

The Design and Implementation of A Network Provenance System Framework. 1436-1442 - Yan Kang, He Lu, Jing He:

A PSO-based Genetic Algorithm for Scheduling of Tasks in a Heterogeneous Distributed System. 1443-1450 - Hongzhe Liu

, Pengfei Wang:
Assessing Sentence Similarity Using WordNet based Word Similarity. 1451-1458 - Chunxia Zhang, Baoxu Shi, Xudong Li:

MFS: A Lightweight Block-Level Local Mirror of Remote File System. 1459-1470 - Guojin Zhu, Le Liu:

Automatic Organization of Programming Resources by Neural Computing. 1471-1478 - Hui Li, Husheng Liao, Hang Su:

Optimize Twig Query Pattern Based on XML Schema. 1479-1486 - Longfei Wang, Yang Li, Song Zhang, Qing Zhang:

Urban Regional Traffic State Analysis Software System Emphasizing Pattern Transition. 1487-1494 - Lei Liu, Lu Hong Diao:

Spatial Structure Analysis and Identification of Candidate Hyponymy Relations. 1495-1502 - Jianliang Peng, Siyuan Wang, Lijuan Yang:

The Diversity of Relationship between Logistics and Agricultural Economy in the East China. 1503-1510 - Gaochao Xu, Yushuang Dong, Xiaodong Fu, Yan Ding, Jia Zhao, Xinzhong Liu:

An Approach for Domain Reduction with Data Dependence in Mutation Testing. 1511-1517 - Congwen Zeng, Tianlong Gu, Liang Chang, Fengying Li:

A Novel Multi-agent Evolutionary Algorithm for Assembly Sequence Planning. 1518-1525 - Zhaofeng Ma, Jianqing Huang, Yixian Yang, Xinxin Niu:

Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management. 1526-1535
Volume 8, Number 7, 2013
- Antonio Juarez Alencar, Rigel Procópio Fernandes

, Eber Assis Schmitz, Alexandre L. Correa:
Maximizing the Appropriation of the Intangible Benefits Yielded by IT Investments in the Public Sector. 1537-1549 - Minlun Yan:

Dual Adaptive K-SVD Algorithm Based on a Rank Symmetrical Relationship. 1550-1555 - Malik Qasaimeh, Alain Abran

:
An Audit Model for ISO 9001 Traceability Requirements in Agile-XP Environments. 1556-1567 - Haodong Yu:

A Semismooth Active-set Algorithm for Degenerate Nonlinear Complementarity Problems. 1568-1576 - Sajjad Mahmood

, Samuel A. Ajila
:
The Impact of Native Language on Use Case Modeling : A Controlled Experiment. 1577-1585 - Sen Zeng, Mingguang Yang, Yimin Shen, Yuanhua He:

A Service-Merging-Enabled SOA Framework for Inter-Enterprise Collaboration. 1586-1591 - Bo Huang, Xiang Ling, Guoqing Wu:

Field-sensitive Function Pointer Analysis Using Field Propagation for State Graph Extraction. 1592-1603 - Mahmood Ghaleb Al-Bashayreh

, Nor Laily Hashim
, Ola Taiseer Khorma:
Context-Aware Mobile Patient Monitoring Frameworks: A Systematic Review and Research Agenda. 1604-1612 - Xiaoming Hu, Huajie Xu, Jian Wang, Yinchun Yang, Xiaolin Xu:

Short Hierarchical Identity-based Encryption in the Selective-ID Model. 1613-1619 - Zi Yuan, Lili Yu, Chao Liu, Linghua Zhang:

Predicting Bugs in Source Code Changes with Incremental Learning Method. 1620-1633 - Lili Yu, Zi Yuan, Youchun Zhang, Chao Liu:

Using Evidence-Based Paradigm to Iteratively Acquire the Overall Picture of Primary Research Question. 1634-1641 - Mikhail Perepletchikov

, Caspar Ryan
, Zahir Tari
:
An Analytical Framework for Evaluating Service-Oriented Software Development Methodologies. 1642-1659 - Robert Kudelic

, Mladen Konecki
, Alen Lovrencic:
Multi-agent information system design and implementation: empirical analysis of IS subsystems execution and development order algorithm. 1660-1665 - Junxiu An, Pengsen Cheng:

The Chinese Duplicate Web Pages Detection Algorithm based on Edit Distance. 1666-1670 - Zhihui Liu, Lihua Fu, Shizhong Zhang:

Subspace Approach for Frequency Estimation of Superimposed Exponential signals in Multiplicative and Additive Noise. 1671-1677 - Haichang Gao, Wei Jia, Fei Ye, Licheng Ma:

A survey on the use of graphical passwords in security. 1678-1698 - Xin Huang, Qingsheng Zhu:

Self-Reproduction of Worms in Asynchronous Cellular Automata. 1699-1706 - Chunhong Zhang, Yaxi He, Yang Ji:

Temporal Pattern of User Behavior in Micro-blog. 1707-1717 - Sho-Huan Tung, Tsung-Te Lin, Yen-Hung Lin:

An Exercise Management System for Teaching Programming. 1718-1725 - Guojin Zhu, Zhiyue Yu, Jiyun Li:

Discovering Relationships between Data Structures and Algorithms. 1726-1735 - Liang Gao, Dongming Li, Yihua Zhang:

Research of Weeds Classification System Based on Shape Feature. 1736-1742 - Shifei Ding, Fulin Wu, Ru Nie, Junzhao Yu, Huajuan Huang:

Twin Support Vector Machines Based on Quantum Particle Swarm Optimization. 1743-1750 - Zhong Qu, Lidan Lin, Tengfei Gao, Yongkun Wang:

An Improved Keyframe Extraction Method Based on HSV Colour Space. 1751-1758 - Yan Ouyang, Nong Sang:

Robust Automatic Facial Expression Detection Method. 1759-1764 - Changlun Zhang, Kaixuan Wang, Haibing Mu:

A Priority Queue Algorithm for the Replication Task in HBase. 1765-1769 - Jianghua Li, Peng Shi, Changjun Hu:

SOSEM: A Self-recommending Ontology Search Extension Mechanism Based on User Behavior. 1770-1777 - Qing Ye, Hongfu Guo, Chunli Yang, Wenji Li:

Improved Fair Exchange Protocol Based on Signcryption-Based Concurrent Signature. 1778-1784 - Qiwen Zha, Wu Zhang, Xuewen Zeng, Xiuyan Guo:

An I/O Scheduling Algorithm for Soft Real-time Services Oriented iSCSI Storage System. 1785-1792 - Dequan Zheng:

Study on the Layout Optimization of Platform Based on Simulated Annealing Algorithm. 1793-1800 - Yong-mei Cai, Wen-qiang Guo, Hai-yang Ding:

An Audio Blind Watermarking Scheme Based on DWT-SVD. 1801-1808
Volume 8, Number 8, 2013
- Qunhui Wu, Shilong Ma, Hao Wang:

Extracting Feature Sequences in Software Vulnerabilities Based on Closed Sequential Pattern Mining. 1809-1817 - Yongtao Hao

, Peng Dai, Diming Liu:
The Complex Product Design Modeling Based on Spatial Sequence Colored Petri-nets. 1818-1826 - Fanfeng Zeng, Guofeng Zhang, Jin Jiang:

Text Image with Complex Background Filtering Method Based on Harris Corner-point Detection. 1827-1834 - Na Xue, Suling Jia, Jinxing Hao, Qiang Wang:

Scientific Ontology Construction Based on Interval Valued Fuzzy Theory Under Web 2.0. 1835-1842 - Jingyang Wang, Huiyong Wang, Dongwen Zhang, Wanzhen Zhou, Pengpeng Zhang:

Research on Frequent Itemsets Mining Algorithm based on Relational Database. 1843-1850 - Yu Zhang, Feng Liu:

Partially Known Routing for Satellite IP Networks. 1851-1858 - Bai-qing Sun, Shan Xiong, Kun Tang:

A Modification of Relational Two-Stage DEA with Variable Returns to Scale. 1859-1866 - He Du, Jian Wang:

An Anonymous but Accountable Proxy Multi-signature Scheme. 1867-1874 - Jingling Yuan, Xuyang Miao, Lin Li, Xing Jiang:

An Online Energy Saving Resource Optimization Methodology for Data Center. 1875-1880 - Rongliang Luo, Xiao Peng, Qianxi Lv, Minghui Wu

, Bin Peng, Shuoping Wang, Ming Guo:
An MDA Based Modeling and Implementation for Web App. 1881-1888 - Tao Xu, Xiaolu Ding, Jianfu Li:

Research on the Connecting Path Search Algorithm for Air-Rail Integration. 1889-1896 - Rui Chen, Yuanyuan Luo, Mohammad Reza Alsharif:

Forest Fire Detection Algorithm Based on Digital Image. 1897-1905 - Xiaoyu Li, Lei Li:

Quantum Public-Key Cryptosystem Using Non-orthogonal States. 1906-1913 - Xuedan Jia, Xiaopeng Yuan, Lixia Meng, Liangmin Wang:

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication. 1914-1922 - Yuan Zhou, Qiang Zhu, Huifang Huang:

Prediction of Acute Hypotensive Episode in ICU Using Chebyshev Neural Network. 1923-1931 - Miao Liu, Gengtong Hou, Ying Gao, Chunming Tang, Dongqing Xie:

An Internet behavior management system based on Android. 1932-1942 - Xiaoguang Zhou, Bo Lv, Mi Lu:

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process. 1943-1951 - Hui-Hua Yang, Lei Zhai, Lingqiao Li

, Zhenbing Liu, Yichen Luo, Yong Wang, Haiyan Lai, Ming Guan:
An Efficient Vehicle Model Recognition Method. 1952-1959 - Wei Hu, Li Fu, Hongmei Zhang:

BP Network for Diagnosing Rotor Broken Fault Based on a New PSO. 1960-1967 - Yaping Zhang, Xu Chen:

Constructing and Rendering of Multiresolution Representation for Massive Meshes with GPU and Mesh Layout. 1968-1975 - Hong Bao

, Yanying Xu:
Intersection between Bi-cubic Bezier Curved Surface and Plane. 1976-1983 - Zhehuang Huang, Yidong Chen:

A Prototype Patterns Selection Algorithm Based on Semi-supervised Learning. 1984-1990 - Feng Liu, Yu Zhang:

Simple Change Adaptive Routing Algorithm for Satellite IP Networks. 1991-1999 - Zhunyang Pan, Caixia Liu, Shuxin Liu, Shuming Guo:

Vulnerability Discovery Technology and Its Applications. 2000-2007 - Ming Zhang:

Energy-Balanced Distributed Clustering Algorithm in Wireless Sensor Networks. 2008-2014 - Yi Liao, Gangyi Jiang, Haibing Chen, Qiaoyan Zheng:

Novel United Buffer Rate Control Methods for Stereoscopic Video. 2015-2022 - Yunna Wu, Yisheng Yang, Zhen Wang, Jianping Yuan:

Macro Quality Chain Management and Coordination Optimization Research. 2023-2031 - Xiang Gao, Yue-Fei Zhu, Jinlong Fei, Tao Han:

Method Based on GSCPN for Network Vulnerability Analysis. 2032-2038 - Kebin Huang, Ruimin Hu, Zhen Han, Tao Lu, Junjun Jiang

, Feng Wang:
Face Image Superresolution via Locality Preserving Projection and Sparse Coding. 2039-2046 - Shuhua Xu:

Semi-supervised Tensor Graph-optimized Linear Discriminant Analysis for Two-dimensional Face Recognition. 2047-2051 - Xueyi Li, Shoubo Jiang, Qingliang Zeng:

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints. 2052-2057 - Tinggui Chen, Guanglan Zhou:

Research on Project Scheduling Problem with Resource Constraints. 2058-2063 - Dongmei Han, Yonghui Dai

, Zhiyi Zhang:
Early Warning and Monitoring System of the Economic Situation in Real Estate Market. 2064-2071 - Gongshen Liu, Xiaoyun Ding, Bo Su, Kui Meng:

A Text Information Hiding Algorithm Based on Alternatives. 2072-2079 - Zuo Chen, Kai Chen:

An improved Multi-hop Routing Protocol for Large-Scale Wireless Sensor Network Based on Merging Adjacent Clusters. 2080-2086 - Lei Ding, Fei Yu, Zhenghua Yang:

Survey of DCA for Abnormal Detection. 2087-2094 - Chien-Min Lin, Yu-Lung Hsieh, Kuo-Cheng Yin, Ming-Chuan Hung, Don-Lin Yang

:
ADMiner: An Incremental Data Mining Approach Using a Compressed FP-tree. 2095-2103
Volume 8, Number 9, 2013
- Chen-Shu Wang, Wen-Chih Chang:

Guest Editorial. 2105 - David Tawei Ku, Chia-Chi Chang:

Integration of Situated Learning and Context Awareness System for Learning Basic Chinese. 2106-2113 - Shih-Jung Wu, Jen-Chih Lin, Lin Hui:

Apply HIP to Handover Procedures in Hybrid Access Mode LTE Femtocells. 2114-2121 - Chih-Kun Ke, Shih-Fang Chang, Zheng-Hua Lin:

An Adaptive e-Service for Bridging the Cloud Services by an Optimal Selection Approach. 2122-2126 - Yunho Leu, Hsin-Chang Lin, Chi-Chung Lee:

An Energy Conserving Cooperative Caching Policy for Ad Hoc Networks. 2127-2133 - Hsiu-Hua Cheng:

Student Team Creativity in Information System Development: Social Capital Perspective. 2134-2141 - Me-Yu Wu:

Integrating Event-Driven-Based with Grey Relational Analysis for Role Engineering. 2142-2146 - Deng-Yiv Chiu, Agus Andria:

A Study of Stock Dynamism in Asian Emerging Markets after the 2008 Economic Crisis. 2147-2154 - Ming-Hsiung Ying, Kai-Ting Yang:

A Game-based Learning System using the ARCS Model and Fuzzy Logic. 2155-2162 - Pin-Rui Hwang, Chun-Hwa Chang:

Urban Mining Service Design: Roadmap for Recycling Industry Transformation. 2163-2168 - Wen-Lung Shiau

, Hsiao-Chi Wu:
Using Curiosity and Group-buying Navigation to Explore the Influence of Perceived hedonic Value, Attitude, and Group-buying Behavioral Intention. 2169-2176
- John Collins, Brian Farrimond, Mark Anderson

, Darryl Owens, Darryl Bayliss:
Automated Quality Assurance Analysis: WRF-A Case Study. 2177-2184 - Mamdouh Alenezi

, Kenneth Magel, Shadi Banitaan:
Efficient Bug Triaging Using Text Mining. 2185-2190 - Darryl Owens, Mark Anderson

:
A Generic Framework for Automated Quality Assurance of Software Models Supporting Languages of Multiple Paradigms. 2191-2196 - Chi-Yi Tsai

, An-Hung Tsao, Chuan-Wei Wang:
Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method. 2197-2201 - Mohammad Charaf Eddin:

Towards a Taxonomy of Dynamic Reconfiguration Approaches. 2202-2207 - Yanshan Bian, Lingda Wu, Chao Yang, Bo Li:

Framework of A Hybrid Image Compression Algorithm for View-dependent Visualization. 2208-2212 - Wei Deng, Lingda Wu, Chao Yang, Zhongwen Zhao:

A Structural Method for Online Sketched Symbol Recognition. 2213-2217 - Wan-Jiang Han, Tianbo Lu

, Xiao-Yan Zhang, Li-Xin Jiang:
A New Estimation Model for Small Organic Software Project. 2218-2222 - Qing Tian, Bo Zhou, Wen-hua Zhao, Yun Wei, Wei-wei Fei:

Human Detection using HOG Features of Head and Shoulder Based on Depth Map. 2223-2230 - Jiaqi Di, Nihong Wang:

Harmony Search Algorithm with Chaos for Training RBFNN. 2231-2237 - Ling Gan, Fu Chen:

Human Action Recognition Using APJ3D and Random Forests. 2238-2245 - Xiao-Dong Wang, Kai Zhou, Qing-Wei Ye, Li-Gang Wu:

The Simulation and Application Research of an Improved SSI Algorithm. 2246-2252 - Ying Lu, Peng Jing:

Production Planning with Postponement Strategy Based on Classification of Product Differentiations. 2253-2261 - ZhiXin Tie:

Mobile-C Based Agent System for Detecting Improper Computer Usage at Computer Laboratories. 2262-2271 - Zhui Lin, Lide Wang, Jieqiong Zhou, Tao Wang:

The Research on Fatigue Driving Detection Algorithm. 2272-2279 - Xiang Lin, Haijun Tao:

An Extended Contract-Net Negotiation Model Based on Task Coalition. 2280-2288 - Haitao Xu, Jing Ying, Fei Lin, Yubo Yuan:

Station Segmentation with an Improved K-Means Algorithm for Hangzhou Public Bicycle System. 2289-2296 - Chao Zeng, Hongli Lin, Weisheng Wang:

Development of a Data Integration and Visualization Software for LIDC. 2297-2304 - Cunliang Liu, Zhenkuan Pan, Jinming Duan:

New Algorithm for Level Set Evolution without Re-initialization and Its Application to Variational Image Segmentation. 2305-2312 - Gongshen Liu, Kui Meng, Jing Xie:

An Improved Topic Detection Method for Chinese Microblog Based On Incremental Clustering. 2313-2320 - Jianhui Li, Guiping Liao, Fang Wang, Jinwei Li:

Maximum Lifetime Routing Based on Fuzzy Set Theory in Wireless Sensor Networks. 2321-2328 - Sa Yang:

Research on Image Semantic Information Mining Based On Latent Dirichlet Allocation Model. 2329-2335 - Li Tu, Yan Wang, Ni Li, Saiqiu Guo:

A Novel Gray Image Encryption Algorithm Based on Modified Transcendental Equation. 2336-2343 - Linpeng Hai, Baofeng Shi

, Guorong Peng:
A Credit Risk Evaluation Index System Establishment of Petty Loans for Farmers Based on Correlation Analysis and Significant Discriminant. 2344-2351 - Lijuan Zhou, Yuyan Chen, Shuang Li:

Improved Data Mining Algorithms Based on an Early Warning System of College Students. 2352-2359 - Wenhao Shu:

A Fast Algorithm for Facility Location Problem. 2360-2366 - Jorge Rafael Aguilar Cisneros, Ricardo Valerdi:

Successful Adoption of Software Process Improvement Models: A Cultural-Methodological Proposal. 2367-2378 - Jiashun Chen, Dechang Pi, Zhipeng Liu:

An Insensitivity Fuzzy C-means Clustering Algorithm Based on Penalty Factor. 2379-2384 - Mingyue Yan:

An Exponential Power Ratio Index based Algorithm for Analysis of Alcoholic EEG Signal. 2385-2390
Volume 8, Number 10, 2013
- Zhikun Zhao, Pengfei Zhao, Wei Li:

Quantitative Analysis of Design Decisions for Dynamic Reconfiguration. 2391-2396 - Ou Ye, Jing Zhang, Junhuai Li:

A New Error Correction Algorithm for Chinese Placename. 2394-2405 - Zongyu Song, Pengfei Cai, Jie Yang:

A Group Key Agreement With Efficient Communication for Ad Hoc Networks. 2406-2411 - Natarajan Meghanathan

:
Identification and Removal of Software Security Vulnerabilities using Source Code Analysis: A Case Study on a Java File Writer Program with Password Validation Features. 2412-2424 - Iyad Zayour, Hassan Hajjdiab:

How Much Integrated Development Environments (IDEs) Improve Productivity? 2425-2431 - Xiang Huang, Zhi-gang Chen:

A Configuration Driven Modeling Approach for Resources Optimization of Multi-tenant Applications. 2432-2438 - Wei Bu, Kuanquan Wang, Xiangqian Wu, Xin Cui, Qiushi Zhao:

Hand Segmentation for Hand-based Biometrics in Complex Environments. 2439-2446 - Lijun Cao, Xiyin Liu, Torkel Hans-Georg Hans-Georg, Zhongping Zhang:

Task Scheduling Algorithm in Grid Environment Based on Duplication and Insertion. 2447-2454 - Cheng Peng, Lu-Ming Yang, Junfeng Man:

Software Behavior Modeling Based on Invariant Constraints. 2455-2461 - Nicholas Drouin, Mourad Badri, Fadel Touré:

Analyzing Software Quality Evolution using Metrics: An Empirical Study on Open Source Software. 2462-2473 - Yu Zhou, Jiang Jiang:

A Parallel Evolution based Intelligent Optimization Algorithm to Solve Large-scale Production Planning Problem in Defense Industry. 2474-2481 - Rong Liu, Jun Wen, Xin Wang, Yue Kang, Yu Zhang:

Net Radiation Estimated from the FY-2D Data over the Source Region of the Yellow River. 2482-2488 - Ling-Ling Pei, Zheng-Xin Wang:

An Optimized Grey Cluster Model for Evaluating Quality of Labor Force. 2489-2494 - Hongxing Zheng, Kai Yu

, Chuang Tu:
Multiple Yard Cranes Scheduling Model and Algorithm in the Mixture Storage Block. 2495-2502 - Xuefang Zhang, Renqun Huang, Hong Chen:

An Empirical Study of the Critical Factors Influencing Learner Satisfaction and Effectiveness: A 3D CAD System's Perspective. 2503-2510 - Yangguang Sun, Mingyue Ding:

Route Planning Based on Gradient-Field Quantum Genetic Algorithm Model. 2511-2516 - Xiao Li, Zhifeng Huang, Haotian Li:

Geometric and Kinematics Modeling of Tele-operated Virtual Construction Robot. 2517-2521 - Hongmin Xue, Zhijing Liu:

A Learning Method for Non-fixed Speed Gait Classification. 2522-2528 - Hua Yan, Yang Lu, Yifan Wang:

3D Reconstruction and Visualization of Volume Data in Electrical Capacitance Tomography. 2529-2534 - Mayire Ibrayim, Askar Hamdulla, Dilmurat Tursun:

A Dynamic Programming Method for Segmentation of Online Cursive Uyghur Handwritten Words into Basic Recognizable Units. 2535-2540 - Qiaoyan Zheng, Gangyi Jiang, Fen Chen, Zongju Peng, Feng Shao, Mei Yu:

A Just Noticeable Distortion Based Rate Control Algorithm for Multiview Video Coding. 2541-2548 - Hai-Yan Wang, Sui-chang Wang:

A Novel User-based Web Services Evaluation and Selection Model. 2549-2553 - Yuelin Gao, Xia Chang, Yingzhen Chen:

An Improved Harmony Search Algorithm for Constrained Multi-Objective Optimization. 2554-2561 - Chaogai Xue:

Factor Analysis of the Advanced Manufacturing Mode Diffusion Based on System Dynamics. 2562-2568 - Weiliang Liu, Changliang Liu, Liangyu Ma

, Yongjun Lin, Jin Ma
:
Maximum Power Point Tracking of Photovoltaic Generation Based on Forecasting Model. 2569-2574 - Zhiqiang Wen, Yongxiang Hu, Wenqiu Zhu:

Research on Feature Extraction of Halftone Image. 2575-2580 - Beibei Hu, Gang Zong:

Topology Analysis of China's Port Shipping Network. 2581-2586 - Jinbao Cai, Yalin Wu:

An Adaptive Rate Control Initialization Method for H.264 at Low Bit Rate. 2587-2593 - Shanshan Li:

Coupling Technique for Distributed High Performance Earth System Simulation Framework. 2594-2599 - Dan Liu, Jianmin Wang, Lijuan Zheng:

Automatic Test Paper Generation Based on Ant Colony Algorithm. 2600-2606 - Lili Ding, Wanglin Kang, Xinmin Liu:

An Interactive Approach for Multi-Attribute Resource Allocation in Grids. 2607-2611 - Hui Cai, ShengLin Li, Wei Wei:

C-Cell: An Efficient and Scalable Network Structure for Data Centers. 2612-2619 - Peng Wu, Hehua Ju:

Mission-Integrated Path Planning for Planetary Rover Exploration. 2620-2627 - Xianmin Yu, Rangding Wang, Diqun Yan

:
Detecting MP3Stego using calibrated side information features. 2628-2636 - Hai Yan, Zhi-Zhong Liu:

An Approach for Web Service QoS Dynamic Prediction. 2637-2643 - Kai Shuang, Kai Feng:

Research on Server Push Methods in Web Browser based Instant Messaging Applications. 2644-2651 - Hongwei Gao, Zhe Liu, Yueqiu Jiang, Bin Li:

Traffic Sign Recognition Technology Based on BOW Model. 2652-2659 - Hongwei Chen, Chunhua Zhang, Xinlu Zong, Chunzhi Wang:

LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH. 2660-2667 - Hongwei Chen, Shuping Wang, Hui Xu, Zhiwei Ye

, Chunzhi Wang:
Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information. 2668-2674
Volume 8, Number 11, 2013
- Chunhua Yang:

Detecting and Evaluating Semantic Influences of Aspect Weaving in Aspect Oriented Models. 2675-2681 - Xinhui Nie, Lizhen Liu, Hanshi Wang, Wei Song, Jingli Lu:

The Opinion Mining Based on Fuzzy Domain Sentiment Ontology Tree for Product Reviews. 2682-2687 - Xiaolin Du, Yunming Ye, Yueping Li, Xiaohui Huang:

A New Social Network Sampling Algorithm Based on Temperature Conduction Model. 2688-2696 - Jinyong Wang, Zhibo Wu, Yanjun Shu:

Analysis of the Debugging Model Based on Probabilistic State Transition. 2697-2705 - Young-Don Ko, Helen Shang:

A Modeling Toolbox and Its Applications to Statistical Process Modeling. 2706-2710 - Zhengzhen Zhou, Yonglong Luo, Liangmin Guo, Liping Sun:

Assessment of P2P Trust Model Based on Fuzzy Comprehensive Evaluation. 2711-2714 - Ran Guo, Baoming Han, Dewei Li, Peng Xu:

Research on Passenger Dedicated Line Track Maintenance Information System. 2715-2722 - Wei Bu, Xiangqian Wu, Xiang Chen, Baisheng Dai, Yalin Zheng

:
Hierarchical Detection of Hard Exudates in Color Retinal Images. 2723-2732 - Baojun Tian, Yanlin Gu:

Formal Modeling and Verification for Web Service Composition. 2733-2737 - Jinlong E, Jie Ma:

A Hybrid Transmission System Based on NFC-Enabled Mobile Phones. 2738-2748 - Lili Lin, Zhuoming Xu

, Ying Ding:
OWL Ontology Extraction from Relational Databases via Database Reverse Engineering. 2749-2760 - Yulong Wang, Nan Li:

An Efficient Method for Scheduling Massive Vulnerability Scanning Plug-ins. 2761-2769 - Meng Yang, Jinmei Lai:

Optimisation of Mixed Polarity Reed-Muller Functions. 2770-2774 - Jianli Dong, Wen Dong, Xin Chen:

Research on Component Assembly Environment and Its Implementation Mechanism Based on Software Product Line. 2775-2783 - Yi Song, Wu Zhang, Hong Ni, Xiuyan Guo:

Dynamic Scheduling of Real-time Multi-core Subtask Based on Traffic Prediction. 2784-2789 - Ya Zheng, Xiuxin Chen, Chongchong Yu, Cheng Gao:

Facial Expression Feature Extraction Based on FastLBP. 2790-2795 - Azmat Ullah, Richard Lai, Timothy Marjoribanks

:
A Proposed Model for Business Sustainability Based on Business and Information Technology. 2796-2806 - Zhen Zhang, Ji Xu, Yujing Si, Qingwei Zhao, Yonghong Yan:

Spoken Term Detection Based on Improved Index Structure. 2807-2814 - M. M. Mahbubul Syeed

, Imed Hammouda, Tarja Systä:
Evolution of Open Source Software Projects: A Systematic Literature Review. 2815-2829 - Yulong Wang, Lei Wang:

A Method for Disguising Malformed SIP Messages to Evade SIP IDS. 2830-2838 - Shan Yang, Hong Bao

, Bobo Wang, Haitao Lou:
Crowd Density Estimation Based on ELM learning algorithm. 2839-2846 - Fanxin Meng, Guangyu Du, Hong He, Shengzhong Yuan:

Performance Modeling on the Basis of Application Type in Virtualized Environments. 2847-2854 - Yipeng Li, Zheng Wan, Junhua Chen:

QoS Deployment Strategies Evaluation in PTN based Power Communication Networks. 2855-2862 - Yuan Gao, Pengyu Liu, Kebin Jia:

A Fast Motion Estimation Algorithm Based on Motion Vector Distribution Prediction. 2863-2870 - Pengyu Liu, Kebin Jia:

Research on Fast Algorithm for Video ROI Detection. 2871-2880 - Zheng Liu, Hua Chen:

Voxel Primitive Based Modeling and Simulating Method for Surface Micromachining Technology. 2881-2889 - Xiaoli Wu, Xin Huang, Ruicong Xu, Qingwei Yang:

An Experimental Method Study of User Error Classification in Human-computer Interface. 2890-2898 - Yueqiu Jiang, Xiangwen Fu, Hongwei Gao:

A New Circular Region Detection Algorithm based on the Geometric Characteristics. 2899-2907 - Xiang Chen:

Study on Cooperator Recommendation of Virtual Collaborative Community. 2908-2916 - Jian Su, Chong Zhou, Wenyong Weng:

SingleJava: A Distributed Java Virtual Machine Based on Thread Migration. 2917-2924 - Yong Hu

, Zuoyong Li:
An Improved Shape Signature for Shape Representation and Image Retrieval. 2925-2929 - Yongcheng Xu, Ling Chen, Shengrong Zou:

Ant Colony Optimization for Detecting Communities from Bipartite network. 2930-2935 - Bin Ma, Xiaofeng Liao, Xianzhong Xie:

Vertical Handoff Algorithm Based on Type-2 Fuzzy Logic in Heterogeneous Networks. 2936-2942 - Jianwei Hu, Gu Song, Juan Cao:

Mesh Editing with Feature Region Preservation. 2943-2946 - Yinsheng Zhang:

Architecture and Performance Methods of a Knowledge Support System of Ubiquitous Time Computation. 2947-2955 - Hongguang Xiao, Li-fu Chen, Song-tao Han, Wei Li, Shu-gen Xiao:

Real-time Unwrapped Phase Generating Algorithm based on Airborne Dual-antenna InSAR System. 2956-2961 - Huimin Zhao, Dong Zhang:

A Video Watermark Achievement Algorithm Based on Content of the Video Sub-Region. 2962-2966 - Wei Li, Hao Pu, Haifeng Zhao

, Wei Liu:
Approach for Optimizing 3D Highway Alignments Based on Two-stage Dynamic Programming. 2967-2973 - Guangquan Zhang, Kan Zhang, Xueyang Zhu

, Mingcai Chen, Chengkai Xu, Yuzhen Shao:
Modeling and Analyzing Method for CPS Software Architecture Energy Consumption. 2974-2981
Volume 8, Number 12, 2013
- Fei Li, Wei Gao, Yilei Wang, Xueli Wang:

Short Convertible Undeniable Signature From Pairing. 2983-2990 - Bo Xu, Ruizhe Zhang, Jianping Yu:

Improved Multi-objective Evolutionary Algorithm for Multi-agent Coalition Formation. 2991-2995 - Mahmood Ghaleb Al-Bashayreh

, Nor Laily Hashim
, Ola Taiseer Khorma:
Software Frameworks in Biomedical Informatics: A Systematic Review and Research Agenda. 2996-3006 - Cheng Wang, Xingshu Chen, Wenxian Wang

:
A Video Sharing Site Oriented Data Collection System. 3007-3015 - Hicham Elasri, Abderrahim Sekkaki:

Semantic Integration Process of Business Components through Ontology Alignment. 3016-3025 - Chunzhen Zhong:

Attribute Reduction of Set-valued Information System Based on Dominance Relation. 3026-3028 - Bin Xu, Xiaoju Shen, Feiji Ding:

A VSS Algorithm Based on Multiple Features for Object Tracking. 3029-3034 - Qinghua Su, Sidian Guo, Zhangcan Huang, Zhongbo Hu:

Color Image Quantization Algorithm Based on Differential Evolution. 3035-3041 - Yueli Cui, Caiming Chen, Shiqing Zhang, Zhigang Chen:

A New Algorithm of Fully-automatic Red-eye Removal. 3042-3047 - Wei Li, Changle Zhou:

Automatic Creation of Artistic Chinese Calligraphy. 3048-3054 - Widodo Budiharto

, Welly Dwi Putra, Yudha Pratama Putra:
Design and Analysis of Fast Driver's Fatigue Estimation and Drowsiness Detection System using Android. 3055-3059 - Yubin Guo, Zeye Cai, Zewei Lin, Ximing Li

:
Design and Implementation of a Flexible Workflow Management System. 3060-3065 - Sultan Alyahya

, Wendy K. Ivins, W. A. Gray:
Raising the Awareness of Development Progress in Distributed Agile Projects. 3066-3081 - Jiucheng Xu, Tianhe Xu, Lin Sun, Jinyu Ren:

An Improved Correlation Measure-based SOM Clustering Algorithm for Gene Selection. 3082-3087 - Zhen You, Jinyun Xue, Shi Ying, Dongming Jiang, Qimin Hu:

Formalization of Distributed and Dynamic Resources Allocation Using Category Theory. 3088-3095 - Jianmin Han, Fangwei Luo, Jianfeng Lu, Hao Peng:

SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata. 3096-3104 - Wei He, Ruilian Zhao:

Sequential Pattern Mining Based Test Case Regeneration. 3105-3113 - Guojing Fan, Erik D. Goodman

, Zhijun Liu:
AHP (Analytic Hierarchy Process) and Computer Analysis Software Used in Tourism Safety. 3114-3119 - Qian Wang, Dahai Jin, Yunzhan Gong, Hongbo Zhou:

Detecting Null-dereference Bugs via a Backward Analysis. 3120-3131 - Danling Wang, Yanfei Wang:

Identification of Protein Complexes in PPI Networks by a Fuzzy Method. 3132-3138 - Zhuokui Wu, Guixiong Liu:

TCBAC: An Access Control Model for Remote Calibration System. 3139-3145 - Yongqiang Du, Guotai Chi:

The Establishment of Green Industry Evaluation Index System Based on Dynamic Clustering - an Empirical Study from Dalian in China. 3146-3151 - Baojun Tian:

The Performance Analysis of Web Service Composition Based on Timed Colored Petri Net. 3152-3157 - Lijun Cao, Xiyin Liu, Zhiping Wang, Zhongping Zhang:

The Spatial Outlier Mining Algorithm based on the KNN Graph. 3158-3165 - Xue Guo, Gang Yang:

Animating Prairies Simulation with Shell Method in Real-time. 3166-3172 - Ziyuan Wang, Haixiao He:

Generating Variable Strength Covering Array for Combinatorial Software Testing with Greedy Strategy. 3173-3181 - Hongfa Wang, Chen Xing:

An Approach to Online Recommendation of Products with High Price-Performance Ratios Based on a Customized Price-Dominance Relationship. 3182-3187 - Shuxin Yang, Lanying Shi:

Results Clustering for Keyword Search over Relational Database. 3188-3193 - Dayan Shangguan, Xinyuan Huang:

Determining the Physiological Age of Plant Organs on Basis of Clustering Analysis. 3194-3199 - He-Bei Gao, Zhi-Yang Gu, Rui Zhong, Chang-Ji Qian, Hong Li

, Bin Gong:
A Scaling Algorithm of Self-avoiding Chain Adsorbed on the Surface. 3200-3205 - Ming Luo, Donghua Huang, Jun Hu:

An Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices. 3206-3213 - Yonghao Wang, Guangping Zeng

, Qi Wang, Qingchuan Zhang:
Research on Trustworthiness Evaluation Method of Software Resources Based on Fuzzy Sets. 3214-3221 - Ziping Zhao, Xirong Ma:

Active Learning for Prediction of Prosodic Word Boundaries in Chinese TTS Using Maximum Entropy Markov Model. 3222-3228 - Ahmad Sobri Hashim, Wan Fatimah Wan Ahmad, Azizah Jaafar, Shahrina Md. Nordin:

A Proposed MobileSchool System for Requirements of Secondary Schools in Malaysia. 3229-3237 - Prasanna Ramakrisnan, Azizah Jaafar, Noor Faezah Binti Mohd. Yatim:

Designing Online Discussion Site (ODS) User Interface for Emotional User Experiences: A Proposed Kansei Triangulation Method. 3238-3245 - Junmin Zhao, Kai Zhang, Jian Wan:

Research of Feature Selection for Text Clustering Based on Cloud Model. 3246-3252 - Xu Bao:

Energy-Hole Repair Algorithm for Wireless Sensor Network Based on Cluster. 3253-3261 - Fuping Zeng, Minyan Lu, Deming Zhong:

General Development Framework and Its Application Method for Software Safety Case. 3262-3268 - Dongmei Han, Yiyin Shi, Wen Wang, Yonghui Dai

:
Research on Multi-Level Association Rules Based on Geosciences Data. 3269-3276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














