Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2015 Issue 5
Sparse Label Propagation: A Robust Domain Adaptation Learning Method
TAO Jian-Wen;,WANG Shi-Tong;,YAO Qi-Fu;
..............page:977-1000
Membrane Clustering Algorithm with Hybrid Evolutionary Mechanisms
PENG Hong;,JIANG Yang;,WANG Jun;,Mario J. PéREZ-JIMéNEZ;
..............page:1001-1012
Evolutionary Algorithm Based on Information Separation for Many-Objective Optimization
ZHENG Jin-Hua;,SHEN Rui-Min;,LI Mi-Qing;,ZOU Juan;
..............page:1013-1036
Domain-Free Information Algebraic Model and Algorithm Based on Soft Set
XU Ge-Ni;,LI Yong-Ming;,GUAN Xue-Chong;
..............page:1037-1047
Trajectory Prediction Algorithm Based on Gaussian Mixture Model
QIAO Shao-Jie;,JIN Kun;,HAN Nan;,TANG Chang-Jie;,Gesangduoji;
..............page:1048-1063
Parallel and Incremental Algorithm for Knowledge Update Based on Rough Sets in Cloud Platform
ZHANG Jun-Bo;,LI Tian-Rui;,PAN Yi;,LUO Chuan;,TENG Fei;
..............page:1064-1078
Related-Subspace-Based Local Outlier Detection Algorithm Using MapReduce
ZHANG Ji-Fu;,LI Yong-Hong;,QIN Xiao;,XUN Ya-Ling;
..............page:1079-1095
Strict Pattern Matching with General Gaps and One-Off Condition
CHAI Xin;,JIA Xiao-Fei;,WU You-Xi;,JIANG He;,WU Xin-Dong;
..............page:1096-1112
Density-Based Cluster Structure Mining Algorithm for High-Volume Data Streams
YU Yan-Wei;,WANG Huan;,WANG Qin;,ZHAO Jin-Dong;
..............page:1113-1128
Survey on Access Control Technologies for Cloud Computing
WANG Yu-Ding;,YANG Jia-Hai;,XU Cong;,LING Xiao;,YANG Yang;
..............page:1129-1150
Research and Development of Memory Forensics
ZHANG Yu;,LIU Qing-Zhong;,LI Tao;,Wu Li-Hua;,SHI Chun;
..............page:1151-1172
Secure Certificateless Aggregate Signature Scheme
CHEN Hu;,WEI Shi-Min;,ZHU Chang-Jie;,YANG Yi;
..............page:1173-1180
Encryption Algorithm Supporting Relational Calculations in Cloud Computing
HUANG Ru-Wei;,GUI Xiao-Lin;,CHEN Ning-Jiang;,YAO Jing;
..............page:1181-1195
Key Leakage-Resilient Secure Cryptosystem with Hierarchical Wildcard Pattern Delegation
ZHANG Ming-Wu;,WANG Chun-Zhi;,YANG Bo;,Tsuyoshi TAKAGI;
..............page:1196-1212
Advances in Three-Dimensional Multiscale Geometrical Analysis
SONG Chuan-Ming;,ZHAO Chang-Wei;,LIU Dan;,WANG Xiang-Hai;
..............page:1213-1236
Theoretical Analysis on the Performance of PalmPhasor Algorithm
LENG Lu;,LI Ming;,Andrew Beng Jin TEOH;,Cheonshik KIM;
..............page:1237-1250
Shape Feature Matching Algorithm of Ear Point Cloud Using Path Following
SUN Xiao-Peng;,LI Si-Hui;,WANG Lu;,HAN Feng;,WEI Xiao-Peng;
..............page:1251-1264