default search action
DSC 2016: Changsha, China
- IEEE First International Conference on Data Science in Cyberspace, DSC 2016, Changsha, China, June 13-16, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-1192-6
- Bin Lin, Shanshan Li, Xiangke Liao, Xiaodong Liu, Jing Zhang, Zhouyang Jia:
CareDedup: Cache-Aware Deduplication for Reading Performance Optimization in Primary Storage. 1-10 - Xinxing Zhang, Zhihong Tian, Luchen Zhang:
A Measurement Study on Mainline DHT and Magnet Link. 11-19 - Lu Deng, Jiuming Huang, Yi Han, Bin Zhou, Qiang Liu:
The Prediction of User Topic Interest Based on Tags and Interaction of Users. 20-26 - Xiang Hu, Wendong Wang, Xiangyang Gong, Bai Wang, Xirong Que, Hongke Xia:
Social Recommendation with Tag Side Information. 27-32 - Xiang Zhu, Jiuming Huang, Zhongcheng Zhou, Yi Han:
Chinese Article Classification Oriented to Social Network Based on Convolutional Neural Networks. 33-36 - Xuling Luo, Bin Wu:
Predicate-Oriented Query of RDF Data Based on a Distributed Storage Model. 37-43 - Dingyi Yin, Bin Wu, Yunlei Zhang:
LinkSHRINK: Overlapping Community Detection with Link-Graph. 44-53 - Juan Yang, Shuang Peng, Lin Wang, Bin Wu:
Finding Experts in Community Question Answering Based on Topic-Sensitive Link Analysis. 54-60 - Yinfeng Zhao, Lei Li, Xindong Wu:
Link Prediction-Based Multi-label Classification on Networked Data. 61-68 - Xiang Lin, Shi-Lin Wang, Wei-Jun Huang, Jun-Yao Lai:
An Experimental Study on Block DCT Coefficient Analysis for Image Splicing Detection. 69-73 - Jinchen Sai, Bai Wang, Bin Wu:
BPPGD: Budgeted Parallel Primal Gradient Descent Kernel SVM on Spark. 74-79 - Xuelin Zeng, Bin Wu, Jing Shi, Chang Liu, Qian Guo:
Parallelization of Latent Group Model for Group Recommendation Algorithm. 80-89 - Zhenzhen Li, Jiuming Huang, Zhongcheng Zhou, Haoyu Zhang, Shoufeng Chang, Zhijie Huang:
LSTM-based Deep Learning Models for Answer Ranking. 90-97 - Zhibo Wang, Long Ma, Yanqing Zhang:
A Hybrid Document Feature Extraction Method Using Latent Dirichlet Allocation and Word2Vec. 98-103 - Guozhen Shi, Yunfei Ci, Rongna Xie, Haojie Wang, Jiqiang Zeng:
A Dual Threshold Secret Sharing Scheme among Weighted Participants of Special Right. 104-108 - Xiaoqiang Xu, Jing Zhang, Qianmu Li:
Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone Traceback. 109-117 - Yang Yang, Feifei Wang, Fei Jiang, Shuyuan Jin, Jin Xu:
A Topic Model for Hierarchical Documents. 118-126 - Wen Zhou, Weidong Bao, Xiaomin Zhu, Ji Wang, Chao Chen:
Integrating Relationships and Attributes: A Model of Multilayer Networks. 127-136 - Si Jiang, Jiayin Qi:
Cognitive Detection of Multiple Discrete Emotions from Chinese Online Reviews. 137-142 - Zepeng Li, Jin Xu:
Constructions of Uniquely 3-Colorable Graphs. 143-148 - Kan Zhang, Fei Jiang, Yang Zuo, Yunyun Niu:
Structural Vulnerability Analysis in Complex Networks Based on Core Theory. 149-154 - Hongyu Wang, Jin Xu, Bing Yao:
Exploring New Cryptographical Construction of Complex Network Data. 155-160 - Jing Liu, Yuan Wang, Yongjun Wang:
The Similarity Analysis of Malicious Software. 161-168 - Guirong Chen, Wandong Cai, Jiuming Huang, Xianlong Jiao:
Uncovering and Characterizing Internet Water Army in Online Forums. 169-178 - Dan Guo, Ermao Yuan, Xuegang Hu:
Frequent Pattern Mining Based on Approximate Edit Distance Matrix. 179-188 - Yanmin Shang, Ke-Fu Xu, Yi Han, Chuang Zhang:
FTM: Recommending the Right Items for User Temporal Interests with Matrix Factorization through Topic Model. 189-198 - Jiajia Wang, Yezheng Liu, Yuanchun Jiang, Chunhua Sun, Jianshan Sun, Yanan Du:
Clustering Product Features of Online Reviews Based on Nonnegative Matrix Tri-factorizations. 199-208 - Jinchao Huang, Yan Yan, Ying Guo, Shenghong Li:
A New Scheme Based on HSSL for Solving the Stochastic Point Location Problem. 209-214 - Ying Guo, Hao Ge, Jinchao Huang, Shenghong Li:
A General Strategy for Solving the Stochastic Point Location Problem by Utilizing the Correlation of Three Adjacent Nodes. 215-221 - Xiaofeng Liu, Qixu Liu, Xiaoxi Wang, Zhaopeng Jia:
Fingerprinting Web Browser for Tracing Anonymous Web Attackers. 222-229 - Enqiang Zhu, Fei Jiang, Zepeng Li, Zehui Shao, Jin Xu:
On Adjacent Vertex-Distinguishing Total Chromatic Number of Generalized Petersen Graphs. 230-234 - Yang Zuo, Kan Zhang:
Using Structural Features to Characterize Social Ties. 235-242 - Donghui Hu, Fan Chen, Xintao Wu, Zhong-Qiu Zhao:
A Framework of Privacy Decision Recommendation for Image Sharing in Online Social Networks. 243-251 - Xiaopeng Chen, Dianxi Shi, Banghui Zhao, Fan Liu:
Mining Individual Mobility Patterns Based on Location History. 252-259 - Jingzhi Pan, Fei Jiang, Jin Xu:
Influence Maximization in Social Networks Based on Non-backtracking Random Walk. 260-267 - Jidong Li, Xin Li, Mingming Shi, Meng Zhou, Linjing Lai:
On Improving a Microblog Ranking. 268-274 - Dan Guo, Chen Gao, Wu Ni, Xuegang Hu:
Max-Flow Rate Priority Algorithm for Evacuation Route Planning. 275-283 - Fenghua Li, Yanchao Wang, Jinbo Xiong, Rongna Xie:
Role and Time-Based Access Control with Efficient Revocation for Cloud Storage. 284-289 - Jianchao Tang, Shuqiang Yang, Chao-Qiang Huang, Zhou Yan:
Design and Implementation of Scheduling Pool Scheduling Algorithm Based on Reuse of Jobs in Spark. 290-295 - Bo Sun, Chungjin Hu, Wenwen Xu, Huixing Fan:
Discovering Latent Influence in Online Social Retweet Behaviors. 296-301 - Xin Liu, Chungjin Hu, Jianyi Huang, Feng Liu:
OPSDS: A Semantic Data Integration and Service System Based on Domain Ontology. 302-306 - Yuanping Nie, Chao An, Jiuming Huang, Zhou Yan, Yi Han:
A Bidirectional LSTM Model for Question Title and Body Analysis in Question Answering. 307-311 - Shushen Fu, Chungjin Hu, Ying Hu, Bo Sun, Wenrui Ying, Peng Shi:
Information Diffusion Mechanisms in Online Social Networks. 312-317 - Chao An, Jiuming Huang, Shoufeng Chang, Zhijie Huang:
Question Similarity Modeling with Bidirectional Long Short-Term Memory Neural Network. 318-322 - Hai Yu, Chungjin Hu:
A Police Big Data Analytics Platform: Framework and Implications. 323-328 - Xu-Die Ren, Hao-Nan Guo, Guan-Chen He, Xu Xu, Chong Di, Sheng-Hong Li:
Convolutional Neural Network Based on Principal Component Analysis Initialization for Image Classification. 329-334 - Jianhong Zhai, Hongli Zhang, Xiaorou Zhong, Wei Li, Lai Wang, Zeyu He:
Energy-Efficient Hadoop Green Scheduler. 335-340 - Jianming Lv, Xingtong Wang, Fengtao Huang, Junjie Yang, Tianfeng Wu, Qifa Yan:
TREST: A Hadoop Based Distributed Mobile Trajectory Retrieval System. 341-346 - Xiaotian Zhang, Donghui Hu, Yuqi Fan, Kui Yu:
A Novel Android Malware Detection Method Based on Markov Blanket. 347-352 - Shen Su, Hongli Zhang, Yue Zhang, Dongyang Zhan, Junxi Guo:
Shrinking the Sentiment Analysis for Signed Network Construction. 353-357 - Yechao Xia, Li Pan, Liang Shi, Futai Zou:
Attribute Credibility Based Sybil Goup Detection in Online Social Networks. 358-363 - Jianyi Huang, Chungjin Hu, Mingzhe Fang, Tong Wu, Peng Shi:
A Simple Method for Locating Topic Sources in Uncertainty Diffusion Networks. 364-369 - Chao-Qiang Huang, Shuqiang Yang, Jianchao Tang, Zhou Yan:
RDDShare: Reusing Results of Spark RDD. 370-375 - Xuefeng Zang, Tianqi Liu, Shuyu Qiao, Wenzhu Gao, Jiatong Wang, Xiaoxin Sun, Bangzuo Zhang:
A New Weighted Similarity Method Based on Neighborhood User Contributions for Collaborative Filtering. 376-381 - Gongshen Liu, Kui Meng, Hongyi Guo, Li Pan, Jianhua Li:
Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community. 382-387 - Ai-Feng Yang, Si Wan, Xiao-Jian Hu:
Remanufacturing Closed-Loop Supply Chain Model with RFID Technology Saving Recycling Cost. 388-393 - Xiaoting Qu, Juan Yang, Bin Wu, Haiming Xin:
A News Event Detection Algorithm Based on Key Elements Recognition. 394-399 - Tao Ma, Dacheng Qu, Rui Ma, Wei Feng, Kan Li:
Online Topic Evolution Modeling Based on Hierarchical Dirichlet Process. 400-405 - Jianmin He, Long Yu, Yezheng Liu:
The Multiple Attribute Association Decision-Making Method to Make Online Advertisements Using Influential Users in Social Network. 406-411 - Yezheng Liu, Jinkun Wang, Yuanchun Jiang, Jianshan Sun, Chunhua Sun:
Utilize Item Correlation to Improve Aggregate Diversity for Recommender Systems. 412-417 - Yuntao Yao, Wei Wu, Mingtao Lei, Xi Zhang:
Community Detection Based on Variable Vertex Influence. 418-423 - Qing-Qing Xie, Liangmin Wang:
Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile Cloud. 424-429 - Hongbo Zhang, Huibing Zhang, Xiaoli Hu:
Distributed Storage Optimization for Small Data with High Density in Internet of Vehicles. 430-434 - Dongyan Zhang, Zhiwen Yang, Weihua Li:
Research on Video Anti-hotlinking for OTT. 435-439 - Chao Lee, Wei Wang, Yunchuan Guo:
A Fine-Grained Multiparty Access Control Model for Photo Sharing in OSNs. 440-445 - Liang Chen, Dapeng Xiong, Hua Wang, Peng Zou:
Web Service Run-Time Monitoring and Visualization Analysis Based on Probe. 446-451 - Lingda Wu, Hongxing Hao, Chao Yang, Ronghuan Yu, Huaquan Hu:
Research on Visualization Techniques in Large Scale Virtual Battlefield. 452-455 - Li Chao, Wu Lingda, Yang Jia, Zhao Bin:
Topology Analysis of Vector Fields and Application Prospect. 456-461 - Yang Sun, Wei Xiong:
The Cloud Design of the Cognitive Virus Based on SaaS. 462-465 - Zhonghua Yao, Lingda Wu:
Research on Network Simplification by Edge Bundling. 466-472 - Dong Pei, Daguo Qin:
Low-Cost INS Velocity Kalman Filtering Based on Rational Fitting. 473-477 - Xiangang Wang, Hanchen Song:
An Expandable Community Division Method for Network Visualization. 478-483 - Liyun Hao, Chao Guo, Lingda Wu:
A Study on Route Planning of Helicopter in Low Altitude Area. 484-488 - Ling Zou, Guoping Wang:
A Hybrid Modeling Method for Dynamic Liquid Simulation. 489-492 - Peng Wang, Liang Chen, Peng Zou, Li Li, Junlei Bao:
The Visualization Analysis and Vulnerability Repair Research for the Module Dependency Managerial of VxWorks 5.5 Operating System. 493-496 - Huaming Wu, Jin Hang:
An Empirical Study on the Performance of Enterprises and Investment in the Human Capital. 497-502 - Chunlei Han, Shuangshuang Wang, Kun Han, Xihou Hu:
Combination Forecast on Health Status of Residents in China. 503-507 - Yuanchun Jiang, Yuxiang Xu, Liang Shao:
A Personalized Microblog Search Model Considering User-Author Relationship. 508-513 - Mengyu Zhang, Xusen Cheng, Xuan Luo, Shixuan Fu:
An Empirical Business Study on Service Providers' Satisfaction in Sharing Economy. 514-519 - Wei Xu, Ying Lu, Jing Zhao, Minghui Qian:
Complementarity: A Novel Collaborator Recommendation Method for SMEs. 520-525 - Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, Liang Zhang, Sanchuan Guo:
Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall. 526-531 - Haolin Zhang, Gongshen Liu, Li Pan, Kui Meng, Jianhua Li:
GEV Regression with Convex Loss Applied to Imbalanced Binary Classification. 532-537 - Bin Zhang, Gang Zhao, Yunbo Feng, Xiaolu Zhang, Weiqiang Jiang, Jing Dai, Jiafeng Gao:
Behavior Analysis Based SMS Spammer Detection in Mobile Communication Networks. 538-543 - Xia Li, Bin Wu, Bailing Zhang:
Unknown Word Detection in Song Poetry. 544-549 - Jonathan Garza, Yuezhe Li, Yuchou Chang, Hong Lin:
A Real Time EEG Analysis System. 550-555 - Weihao Li, Hui Li:
LRDM: Local Record-Driving Mechanism for Big Data Privacy Preservation in Social Networks. 556-560 - Cui Zhang, Fenghua Li:
A Voronoi-Based Dummy Generation Algorithm for Privacy-Aware Location-Based Services. 561-566 - Rong Jiang, Rongxing Lu, Chengzhe Lai, Aiping Li:
A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G. 567-572 - Xiong Liu, Li Pan, Xiaoliang Sun:
Real-Time Traffic Status Classification Based on Gaussian Mixture Model. 573-578 - Yangyang Zhou, Jin Xu, Bing Yao:
New Properties and Bounds of Anti-average Numbers. 579-583 - Yezheng Liu, Fei Du, Yuanchun Jiang, Xiao Liu, Qiudan Wang:
A Novel APPs Recommendation Algorithm Based on APPs Popularity and User Behaviors. 584-589 - Chengjun Cai, Jian Weng, Jia-Nan Liu:
Mobile Authentication System Based on National Regulation and NFC Technology. 590-595 - Meng Li, Liehuang Zhu, Zijian Zhang, Rixin Xu:
Differentially Private Publication Scheme for Trajectory Data. 596-601 - Futai Zou, Siyu Zhang, Bei Pei, Li Pan, Linsen Li, Jianhua Li:
Survey on Domain Name System Security. 602-607 - Yongqin Qiu, Sixu Li, Wenjing Yang, Rui Li, Lihong Wang, Bin Wang:
Time-Aware First Story Detection in Twitter Stream. 608-613 - Yao Lu, Zhi Qiao, Peng Zhang, Li Guo:
Ranking-Based Music Recommendation in Online Music Radios. 614-619 - Wenyu Zang, Xiao Wang, Yue Hu:
A Fast Algorithm for Competitive Recommendation Marketing Strategy. 620-625 - Xiancai Ji, Yao Lu, Li Guo:
Image Super-Resolution with Deep Convolutional Neural Network. 626-630 - Yuan Wang, Yongjun Wang, Jing Liu, Zhijian Huang, Peidai Xie:
A Survey of Game Theoretic Methods for Cyber Security. 631-636 - Wen Jiang, Hao Ge, Tianrong Wu, Fanming Wang, Shenghong Li:
Pursuit Estimator Learning Automata Based Approach for Online Event Pattern Tracking. 637-641 - Jie Gong, Xiaohui Kuang, Qiang Liu:
Survey on Software Vulnerability Analysis Method Based on Machine Learning. 642-647 - Kedi Chen, Fengcai Qiao, Hui Wang:
Correlation Analysis Using Global Dataset of Events, Location and Tone. 648-652 - Jiajun Cheng, Pei Li, Zhaoyun Ding, Sheng Zhang, Hui Wang:
Sentiment Classification of Chinese Microblogging Texts with Global RNN. 653-657 - Sheng Zhang, Danling Zhao, Ran Cheng, Jiajun Cheng, Hui Wang:
Finding Influential Papers in Citation Networks. 658-662 - Hang Gao, Yuxing Peng, Songlei Jian:
Probability-Weighted Extreme Learning Machine for Classification with Uncertain Data. 663-667 - Yang Ma, Guangquan Cheng, Zhong Liu, Xingxing Liang:
Link Prediction Based on Clustering Information in Scientific Coauthorship Networks. 668-672 - Jing Xu, Liang Gan, Zhou Yan, Quanyuan Wu, Yan Jia:
Open Relation Extraction from Chinese Microblog Text. 673-677 - Wenling Tang, Xu Wu, Yuxiao Li, Jin Xu:
A Topic Label Extraction Method for the University BBS. 678-682 - Xiaomin Wang, Bing Yao, Hongyu Wang, Jin Xu:
New Cumulative Distributions for Scale-Free Networks. 683-687 - Yang Gao, Hongli Zhang, Yue Zhang:
A Fast and High Quality Approach for Overlapping Community Detection through Minimizing Conductance. 688-693 - Bei Sun, Wusheng Luo, Liebo Du, Qin Lu:
A Fingerprint Identification Algorithm Based on Local Minutiae Topological Property. 694-697 - Zihao Wang, Futai Zou, Bei Pei, Weijia He, Li Pan, Zhaochong Mao, Linsen Li:
Detecting Malicious Server Based on Server-to-Server Realation Graph. 698-702 - Jianqiang Zhao:
Combing Semantic and Prior Polarity Features for Boosting Twitter Sentiment Analysis Using Ensemble Learning. 709-714
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.