


default search action
Mathematical Foundations of Computing, Volume 1
Volume 1, Number 1, February 2018
- Liu Hui, Lin Zhi, Waqas Ahmad:

Network(graph) data research in the coordinate system. 1-10 - Yi Xu, Qing Yang, Dianhui Chu:

Exploring timeliness for accurate recommendation in location-based social networks. 11-48 - Zehui Shao, Huiqin Jiang

, Aleksander Vesel:
L(2, 1)-labeling of the Cartesian and strong product of two directed cycles. 49-61 - Jian Mao, Qixiao Lin, Jingdong Bian:

Application of learning algorithms in smart home IoT system security. 63-76 - Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya, Limin Sun:

CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids. 77-100
Volume 1, Number 2, May 2018
- Boran Hu, Zehui Cheng, Zhangbing Zhou:

Web services recommendation leveraging semantic similarity computing. 101-119 - Archana Prashanth Joshi, Meng Han, Yan Wang:

A survey on security and privacy issues of blockchain technology. 121-147 - Zhuwei Qin, Fuxun Yu, Chenchen Liu, Xiang Chen:

How convolutional neural networks see the world - A survey of convolutional neural network visualization methods. 149-180 - Mohamed A. Tawhid, Kevin B. Dsouza:

Hybrid binary dragonfly enhanced particle swarm optimization algorithm for solving feature selection problems. 181-200
Volume 1, Number 3, August 2018
- Meng Han, Yingshu Li:

Influence analysis: A survey of the state-of-the-art. 201-253 - Haisheng Tan, Liuyan Liu, Hongyu Liang:

Total k-domination in special graphs. 255-263 - Poonam Savsani, Mohamed A. Tawhid:

Discrete heat transfer search for solving travelling salesman problem. 265-280 - Yang Xu, Huansheng Ning, Lingfeng Mao, Youzhong Li, Lijun Zhang:

Improve symmetry of arbiter in APUF. 281-294 - Chengtao Yong, Yan Huo, Chunqiang Hu, Yanfei Lu, Guanlin Jing:

A real-time aggregate data publishing scheme with adaptive ω-event differential privacy. 295-309
Volume 1, Number 4, November 2018
- Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song, Chunqiang Hu:

Cryptographic algorithms for privacy-preserving online applications. 311-330 - Yunmei Lu, Mingyuan Yan, Meng Han, Qingliang Yang, Yanqing Zhang:

Privacy preserving feature selection and Multiclass Classification for horizontally distributed data. 331-348 - Mohamed A. Tawhid, Ahmed Fouad Ali

:
An effective hybrid firefly algorithm with the cuckoo search for engineering optimization problems. 349-368 - Xiaoshuang Xing, Gaofei Sun, Yong Jin, Wenyi Tang, Xiuzhen Cheng:

Relay selection based on social relationship prediction and information leakage reduction for mobile social networks. 369-382 - Yong Zhang, Francis Y. L. Chin, Francis C. M. Lau, Haisheng Tan, Hing-Fung Ting:

Constant competitive algorithms for unbounded one-Way trading under monotone hazard rate. 383-392 - Saide Zhu, Wei Li, Hong Li, Chunqiang Hu, Zhipeng Cai:

A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining. 393-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














