• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Survey on Development of Solving Methods and State-of-the-Art Applications of Satisfiability Modulo Theories
Wang Chong, Lü Yinrun, Chen Li, Wang Xiuli, Wang Yongji
2017, 54(7): 1405-1425. DOI: 10.7544/issn1000-1239.2017.20160303
Abstract PDF
An Efficient Collaborative Filtering Algorithm Based on Graph Model and Improved KNN
Meng Huanyu, Liu Zhen, Wang Fang, Xu Jiadong, Zhang Guoqiang
2017, 54(7): 1426-1438. DOI: 10.7544/issn1000-1239.2017.20160302
Abstract PDF
A Collaborative Filtering Recommendation Method Based on Differential Privacy
He Ming, Chang Mengmeng, Wu Xiaofei
2017, 54(7): 1439-1451. DOI: 10.7544/issn1000-1239.2017.20160207
Abstract PDF
Mining Top-k Distinguishing Sequential Patterns Using Spark
Zhang Peng, Duan Lei, Qin Pan, Zuo Jie, Tang Changjie, Yuan Chang’an, Peng Jian
2017, 54(7): 1452-1464. DOI: 10.7544/issn1000-1239.2017.20160553
Abstract PDF
An Audience Targeting Algorithm Based on Neighbor Choosing Strategy
Zhou Meng, Zhu Fuxi
2017, 54(7): 1465-1476. DOI: 10.7544/issn1000-1239.2017.20160360
Abstract PDF
A Method for Monotonic Classification Based on Decision Forest
Xu Hang, Wang Wenjian, Ren Lifang
2017, 54(7): 1477-1487. DOI: 10.7544/issn1000-1239.2017.20160154
Abstract PDF
Analyzing Rating Data and Modeling Dynamic Behaviors of Users Based on the Bayesian Network
Wang Fei, Yue Kun, Sun Zhengbao, Wu Hao, Feng Hui
2017, 54(7): 1488-1499. DOI: 10.7544/issn1000-1239.2017.20160556
Abstract PDF
Local Optimal Granularity Selections in Incomplete Multi-Granular Decision Systems
Gu Shenming, Gu Jinyan, Wu Weizhi, Li Tongjun, Chen Chaojun
2017, 54(7): 1500-1509. DOI: 10.7544/issn1000-1239.2017.20160349
Abstract PDF
Lattice-Based Forward Secure and Certificateless Signature Scheme
Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye
2017, 54(7): 1510-1524. DOI: 10.7544/issn1000-1239.2017.20160427
Abstract PDF
Impossible Differential Attack on Crypton
Cui Jingyi, Guo Jiansheng, Liu Yipeng
2017, 54(7): 1525-1536. DOI: 10.7544/issn1000-1239.2017.20160415
Abstract PDF
The Malware Detection Based on Data Breach Actions
Wang Lina, Tan Cheng, Yu Rongwei, Yin Zhengguang
2017, 54(7): 1537-1548. DOI: 10.7544/issn1000-1239.2017.20160436
Abstract PDF
Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method
Chen Zhenhua, Li Shundong, Wang Daoshun, Huang Qiong, Dong Lihong
2017, 54(7): 1549-1556. DOI: 10.7544/issn1000-1239.2017.20160034
Abstract PDF
Dynamically Detecting Multiple Types of Deadlocks Using Lock Allocation Graphs
Yu Zhen, Su Xiaohong, Qiu Jing
2017, 54(7): 1557-1568. DOI: 10.7544/issn1000-1239.2017.20160369
Abstract PDF
QEMU-Based Dynamic Function Call Tracing
Xiang Yong, Cao Ruidong, Mao Yingming
2017, 54(7): 1569-1576. DOI: 10.7544/issn1000-1239.2017.20160094
Abstract PDF
Web Database top-k Diverse Keyword Query Suggestion Approach
Meng Xiangfu, Bi Chongchun, Zhang Xiaoyan, Tang Xiaoliang, Tang Yanhuan
2017, 54(7): 1577-1591. DOI: 10.7544/issn1000-1239.2017.20160005
Abstract PDF
A Multi-Way Spatial Join Querying Processing Algorithm Based on Spark
Qiao Baiyou, Zhu Junhai, Zheng Yujie, Shen Muchuan, Wang Guoren
2017, 54(7): 1592-1602. DOI: 10.7544/issn1000-1239.2017.20160558
Abstract PDF
An Access Control Method Supporting Multi-User Collaborative Edit in Cloud Storage
Shi Jiaoli, Huang Chuanhe, He Kai, Shen Xieyang, Hua Chao
2017, 54(7): 1603-1616. DOI: 10.7544/issn1000-1239.2017.20151135
Abstract PDF
A Distributed Deadline Propagation Approach to Reduce Long-Tail in Datacenters
Ren Rui, Ma Jiuyue, Sui Xiufeng, Bao Yungang
2017, 54(7): 1617-1628. DOI: 10.7544/issn1000-1239.2017.20160247
Abstract PDF