• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

A Ranking Based Poisson Matrix Factorization Model for Point-of-Interest Recommendation
Yu Yonghong, Gao Yang, Wang Hao
2016, 53(8): 1651-1663. DOI: 10.7544/issn1000-1239.2016.20160202
Abstract PDF
Collaborative Filtering Recommendation Algorithm Combining Community Structure and Interest Clusters
Guo Hongyi, Liu Gongshen, Su Bo, Meng Kui
2016, 53(8): 1664-1672. DOI: 10.7544/issn1000-1239.2016.20160175
Abstract PDF
Online Consumptions Prediction via Modeling User Behaviors and Choices
Zeng Xianyu, Liu Qi, Zhao Hongke, Xu Tong, Wang Yijun, Chen Enhong
2016, 53(8): 1673-1683. DOI: 10.7544/issn1000-1239.2016.20160103
Abstract PDF
Feature Selection Based on the Measurement of Correlation Information Entropy
Dong Hongbin, Teng Xuyang, Yang Xue
2016, 53(8): 1684-1695. DOI: 10.7544/issn1000-1239.2016.20160172
Abstract PDF
Consistent Collective Entity Linking Algorithm
Liu Qiao, Zhong Yun, Liu Yao, Wu Zufeng, Qin Zhiguang
2016, 53(8): 1696-1708. DOI: 10.7544/issn1000-1239.2016.20160192
Abstract PDF
Influence Maximization Across Multi-Channels in Social Network
Li Xiaokang, Zhang Xi, Sun Hao, Sun Guangzhong
2016, 53(8): 1709-1718. DOI: 10.7544/issn1000-1239.2016.20160211
Abstract PDF
Self-Adaptive Clustering Based on Local Density by Descending Search
Xu Zhengguo, Zheng Hui, He Liang, Yao Jiaqi
2016, 53(8): 1719-1728. DOI: 10.7544/issn1000-1239.2016.20160136
Abstract PDF
Tensor Representation Based Dynamic Outlier Detection Method in Heterogeneous Network
Liu Lu, Zuo Wanli, Peng Tao
2016, 53(8): 1729-1739. DOI: 10.7544/issn1000-1239.2016.20160178
Abstract PDF
Mining Patent Knowledge for Automatic Keyword Extraction
Chen Yiqun, Zhou Ruqi, Zhu Weiheng, Li Mengting, Yin Jian
2016, 53(8): 1740-1752. DOI: 10.7544/issn1000-1239.2016.20160195
Abstract PDF
Protein Function Prediction Using Positive and Negative Examples
Fu Guangyuan, Yu Guoxian, Wang Jun, Guo Maozu
2016, 53(8): 1753-1765. DOI: 10.7544/issn1000-1239.2016.20160196
Abstract PDF
Petri Nets Based Recognition of Model Deviation Domains and Model Repair
Du Yuyue, Sun Ya’nan, Liu Wei
2016, 53(8): 1766-1780. DOI: 10.7544/issn1000-1239.2016.20160099
Abstract PDF
Online Transfer Learning for Mining Recurring Concept in Data Stream Classification
Wen Yimin, Tang Shiqi, Feng Chao, Gao Kai
2016, 53(8): 1781-1791. DOI: 10.7544/issn1000-1239.2016.20160223
Abstract PDF
HSSM: A Hierarchical Method for Streaming Submodular Maximization
Zhang Fenxiang, Chen Huahui, Qian Jiangbo, Dong Yihong
2016, 53(8): 1792-1805. DOI: 10.7544/issn1000-1239.2016.20160140
Abstract PDF
IncPR: An Incremental Parallel PageRank Algorithm
Jiang Shuangshuang, Liao Qun, Yang Yulu, Li Tao
2016, 53(8): 1806-1818. DOI: 10.7544/issn1000-1239.2016.20160210
Abstract PDF
SparkCRF: A Parallel Implementation of CRFs Algorithm with Spark
Zhu Jizhao, Jia Yantao, Xu Jun, Qiao Jianzhong, Wang Yuanzhuo, Cheng Xueqi
2016, 53(8): 1819-1828. DOI: 10.7544/issn1000-1239.2016.20160197
Abstract PDF
Survey of Memory Address Leakage and Its Defense
Fu Jianming, Liu Xiuwen, Tang Yi, Li Pengwei
2016, 53(8): 1829-1849. DOI: 10.7544/issn1000-1239.2016.20150526
Abstract PDF
Atomic Algorithm Against Simple Power Attack of SM2
Han Xiaowei, Wu Liji, Wang Beibei, Wang An
2016, 53(8): 1850-1856. DOI: 10.7544/issn1000-1239.2016.20150052
Abstract PDF
XOR-Based Region Incrementing Visual Cryptography Scheme by Random Grids
Hu Hao, Shen Gang, Yu Bin, Mahao Junfu
2016, 53(8): 1857-1866. DOI: 10.7544/issn1000-1239.2016.20150058
Abstract PDF
Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage
Ma Haiying, Zeng Guosun, Bao Zhihua, Chen Jianping, Wang Jinhua, Wang Zhanjun
2016, 53(8): 1867-1878. DOI: 10.7544/issn1000-1239.2016.20140787
Abstract PDF
Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model
Chen Ming, Yuan Shaoliang
2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
Abstract PDF