Advanced Search

    column
    Survey on Development of Solving Methods and State-of-the-Art Applications of Satisfiability Modulo Theories
    Wang Chong, Lü Yinrun, Chen Li, Wang Xiuli, Wang Yongji
    2017, 54(7): 1405-1425. DOI: 10.7544/issn1000-1239.2017.20160303
    Abstract PDF
    An Efficient Collaborative Filtering Algorithm Based on Graph Model and Improved KNN
    Meng Huanyu, Liu Zhen, Wang Fang, Xu Jiadong, Zhang Guoqiang
    2017, 54(7): 1426-1438. DOI: 10.7544/issn1000-1239.2017.20160302
    Abstract PDF
    A Collaborative Filtering Recommendation Method Based on Differential Privacy
    He Ming, Chang Mengmeng, Wu Xiaofei
    2017, 54(7): 1439-1451. DOI: 10.7544/issn1000-1239.2017.20160207
    Abstract PDF
    Mining Top-k Distinguishing Sequential Patterns Using Spark
    Zhang Peng, Duan Lei, Qin Pan, Zuo Jie, Tang Changjie, Yuan Chang’an, Peng Jian
    2017, 54(7): 1452-1464. DOI: 10.7544/issn1000-1239.2017.20160553
    Abstract PDF
    An Audience Targeting Algorithm Based on Neighbor Choosing Strategy
    Zhou Meng, Zhu Fuxi
    2017, 54(7): 1465-1476. DOI: 10.7544/issn1000-1239.2017.20160360
    Abstract PDF
    A Method for Monotonic Classification Based on Decision Forest
    Xu Hang, Wang Wenjian, Ren Lifang
    2017, 54(7): 1477-1487. DOI: 10.7544/issn1000-1239.2017.20160154
    Abstract PDF
    Analyzing Rating Data and Modeling Dynamic Behaviors of Users Based on the Bayesian Network
    Wang Fei, Yue Kun, Sun Zhengbao, Wu Hao, Feng Hui
    2017, 54(7): 1488-1499. DOI: 10.7544/issn1000-1239.2017.20160556
    Abstract PDF
    Local Optimal Granularity Selections in Incomplete Multi-Granular Decision Systems
    Gu Shenming, Gu Jinyan, Wu Weizhi, Li Tongjun, Chen Chaojun
    2017, 54(7): 1500-1509. DOI: 10.7544/issn1000-1239.2017.20160349
    Abstract PDF
    Lattice-Based Forward Secure and Certificateless Signature Scheme
    Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye
    2017, 54(7): 1510-1524. DOI: 10.7544/issn1000-1239.2017.20160427
    Abstract PDF
    Impossible Differential Attack on Crypton
    Cui Jingyi, Guo Jiansheng, Liu Yipeng
    2017, 54(7): 1525-1536. DOI: 10.7544/issn1000-1239.2017.20160415
    Abstract PDF
    The Malware Detection Based on Data Breach Actions
    Wang Lina, Tan Cheng, Yu Rongwei, Yin Zhengguang
    2017, 54(7): 1537-1548. DOI: 10.7544/issn1000-1239.2017.20160436
    Abstract PDF
    Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method
    Chen Zhenhua, Li Shundong, Wang Daoshun, Huang Qiong, Dong Lihong
    2017, 54(7): 1549-1556. DOI: 10.7544/issn1000-1239.2017.20160034
    Abstract PDF
    Dynamically Detecting Multiple Types of Deadlocks Using Lock Allocation Graphs
    Yu Zhen, Su Xiaohong, Qiu Jing
    2017, 54(7): 1557-1568. DOI: 10.7544/issn1000-1239.2017.20160369
    Abstract PDF
    QEMU-Based Dynamic Function Call Tracing
    Xiang Yong, Cao Ruidong, Mao Yingming
    2017, 54(7): 1569-1576. DOI: 10.7544/issn1000-1239.2017.20160094
    Abstract PDF
    Web Database top-k Diverse Keyword Query Suggestion Approach
    Meng Xiangfu, Bi Chongchun, Zhang Xiaoyan, Tang Xiaoliang, Tang Yanhuan
    2017, 54(7): 1577-1591. DOI: 10.7544/issn1000-1239.2017.20160005
    Abstract PDF
    A Multi-Way Spatial Join Querying Processing Algorithm Based on Spark
    Qiao Baiyou, Zhu Junhai, Zheng Yujie, Shen Muchuan, Wang Guoren
    2017, 54(7): 1592-1602. DOI: 10.7544/issn1000-1239.2017.20160558
    Abstract PDF
    An Access Control Method Supporting Multi-User Collaborative Edit in Cloud Storage
    Shi Jiaoli, Huang Chuanhe, He Kai, Shen Xieyang, Hua Chao
    2017, 54(7): 1603-1616. DOI: 10.7544/issn1000-1239.2017.20151135
    Abstract PDF
    A Distributed Deadline Propagation Approach to Reduce Long-Tail in Datacenters
    Ren Rui, Ma Jiuyue, Sui Xiufeng, Bao Yungang
    2017, 54(7): 1617-1628. DOI: 10.7544/issn1000-1239.2017.20160247
    Abstract PDF