We use cookies to improve your experience with our site.

An Efficient Message Dissemination Scheme for Minimizing Delivery Delay in Delay Tolerant Networks
En Wang, Wei-Shih Yang, Yong-Jian Yang, Jie Wu, Wen-Bin Liu
2018, 33(6): 1101-1124. doi: 10.1007/s11390-018-1875-7
A Task Allocation Method for Stream Processing with Recovery Latency Constraint
Hong-Liang Li, Jie Wu, Zhen Jiang, Xiang Li, Xiao-Hui Wei
2018, 33(6): 1125-1139. doi: 10.1007/s11390-018-1876-6
CRL: Efficient Concurrent Regeneration Codes with Local Reconstruction in Geo-Distributed Storage Systems
Quan-Qing Xu, Wei-Ya Xi, Khai Leong Yong, Chao Jin
2018, 33(6): 1140-1151. doi: 10.1007/s11390-018-1877-5
More Requests, Less Cost: Uncertain Inter-Datacenter Traffic Transmission with Multi-Tier Pricing
Xiao-Dong Dong, Sheng Chen, Lai-Ping Zhao, Xiao-Bo Zhou, Heng Qi, Ke-Qiu Li
2018, 33(6): 1152-1163. doi: 10.1007/s11390-018-1878-4
A Geometry-Based Point Cloud Reduction Method for Mobile Augmented Reality System
Hao-Ren Wang, Juan Lei, Ao Li, Yi-Hong Wu
2018, 33(6): 1164-1177. doi: 10.1007/s11390-018-1879-3
Isometric 3D Shape Partial Matching Using GD-DNA
Guo-Guang Du, Cong-Li Yin, Ming-Quan Zhou, Zhong-Ke Wu, Ya-Chun Fan, Fu-Qing Duan, Peng-Bo Zhou
2018, 33(6): 1178-1191. doi: 10.1007/s11390-018-1880-x
Back-to-Front Ordering of Triangles in Digital Terrain Models over Regular Grids
Jesús Alonso, Robert Joan-Arinyo
2018, 33(6): 1192-1203. doi: 10.1007/s11390-018-1881-9
Modeling Topic-Based Human Expertise for Crowd Entity Resolution
Sai-Sai Gong, Wei Hu, Wei-Yi Ge, Yu-Zhong Qu
2018, 33(6): 1204-1218. doi: 10.1007/s11390-018-1882-8
Time and Location Aware Points of Interest Recommendation in Location-Based Social Networks
Tie-Yun Qian, Bei Liu, Liang Hong, Zhen-Ni You
2018, 33(6): 1219-1230. doi: 10.1007/s11390-018-1883-7
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness
Rong Wang, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang
2018, 33(6): 1231-1242. doi: 10.1007/s11390-018-1884-6
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
Qi-Qi Lai, Bo Yang, Yong Yu, Zhe Xia, Yan-Wei Zhou, Yuan Chen
2018, 33(6): 1243-1260. doi: 10.1007/s11390-018-1885-5
Generalized Tweakable Even-Mansour Cipher and Its Applications
Ping Zhang, Hong-Gang Hu
2018, 33(6): 1261-1277. doi: 10.1007/s11390-018-1886-4
Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures
Aakash Ahmad, Claus Pahl, Ahmed B. Altamimi, Abdulrahman Alreshidi
2018, 33(6): 1278-1306. doi: 10.1007/s11390-018-1887-3
A New Method for Sentiment Analysis Using Contextual Auto-Encoders
Hanen Ameur, Salma Jamoussi, Abdelmajid Ben Hamadou
2018, 33(6): 1307-1319. doi: 10.1007/s11390-018-1889-1
Search-Based Cost-Effective Software Remodularization
Rim Mahouachi
2018, 33(6): 1320-1336. doi: 10.1007/s11390-018-1892-6
Current Issue Cover