default search action
Mathematical Foundations of Computing, Volume 1
Volume 1, Number 1, February 2018
- Liu Hui, Lin Zhi, Waqas Ahmad:
Network(graph) data research in the coordinate system. 1-10 - Yi Xu, Qing Yang, Dianhui Chu:
Exploring timeliness for accurate recommendation in location-based social networks. 11-48 - Zehui Shao, Huiqin Jiang, Aleksander Vesel:
L(2, 1)-labeling of the Cartesian and strong product of two directed cycles. 49-61 - Jian Mao, Qixiao Lin, Jingdong Bian:
Application of learning algorithms in smart home IoT system security. 63-76 - Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya, Limin Sun:
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids. 77-100
Volume 1, Number 2, May 2018
- Boran Hu, Zehui Cheng, Zhangbing Zhou:
Web services recommendation leveraging semantic similarity computing. 101-119 - Archana Prashanth Joshi, Meng Han, Yan Wang:
A survey on security and privacy issues of blockchain technology. 121-147 - Zhuwei Qin, Fuxun Yu, Chenchen Liu, Xiang Chen:
How convolutional neural networks see the world - A survey of convolutional neural network visualization methods. 149-180 - Mohamed A. Tawhid, Kevin B. Dsouza:
Hybrid binary dragonfly enhanced particle swarm optimization algorithm for solving feature selection problems. 181-200
Volume 1, Number 3, August 2018
- Meng Han, Yingshu Li:
Influence analysis: A survey of the state-of-the-art. 201-253 - Haisheng Tan, Liuyan Liu, Hongyu Liang:
Total k-domination in special graphs. 255-263 - Poonam Savsani, Mohamed A. Tawhid:
Discrete heat transfer search for solving travelling salesman problem. 265-280 - Yang Xu, Huansheng Ning, Lingfeng Mao, Youzhong Li, Lijun Zhang:
Improve symmetry of arbiter in APUF. 281-294 - Chengtao Yong, Yan Huo, Chunqiang Hu, Yanfei Lu, Guanlin Jing:
A real-time aggregate data publishing scheme with adaptive ω-event differential privacy. 295-309
Volume 1, Number 4, November 2018
- Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song, Chunqiang Hu:
Cryptographic algorithms for privacy-preserving online applications. 311-330 - Yunmei Lu, Mingyuan Yan, Meng Han, Qingliang Yang, Yanqing Zhang:
Privacy preserving feature selection and Multiclass Classification for horizontally distributed data. 331-348 - Mohamed A. Tawhid, Ahmed Fouad Ali:
An effective hybrid firefly algorithm with the cuckoo search for engineering optimization problems. 349-368 - Xiaoshuang Xing, Gaofei Sun, Yong Jin, Wenyi Tang, Xiuzhen Cheng:
Relay selection based on social relationship prediction and information leakage reduction for mobile social networks. 369-382 - Yong Zhang, Francis Y. L. Chin, Francis C. M. Lau, Haisheng Tan, Hing-Fung Ting:
Constant competitive algorithms for unbounded one-Way trading under monotone hazard rate. 383-392 - Saide Zhu, Wei Li, Hong Li, Chunqiang Hu, Zhipeng Cai:
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining. 393-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.