A patent hotspot discovery method Ling FengBin LiuZhiyong Peng Computer Science 04 October 2016 Pages: 369 - 375
Attribute level lineage in uncertain data with dependencies Liang WangLiwei WangZhiyong Peng Computer Science 04 October 2016 Pages: 376 - 386
Quantitative assessment model on path assignment for SDNs Xiaomao WangChuanhe HuangHao Zhou Computer Science 04 October 2016 Pages: 387 - 393
Security analysis and improvement of a tag encoding authentication scheme for network coding Guangjun Liu Computer Science 04 October 2016 Pages: 394 - 398
Endurance awarded compiling optimization Chao XuHongmei Ge Computer Science 04 October 2016 Pages: 399 - 406
A less resource-consumed security architecture on cloud platform Jingsong CuiKun LiaoXun Wu Computer Science 04 October 2016 Pages: 407 - 414
An anonymous authentication scheme withstanding the conspiracy attack Fengmei YinGuangning Pu Computer Science 04 October 2016 Pages: 415 - 420
Software backdoor analysis based on sensitive flow tracking and concolic execution Xin XuJiajie WangFan Jiang Computer Science 04 October 2016 Pages: 421 - 427
Global existence and bounded estimate of solutions of the BBM-Burgers equation Hongmei XuBaoxiang Li Mathematics 04 October 2016 Pages: 428 - 432
Dual Orlicz affine surface area Li GaoTongyi MaYuanyuan Guo Mathematics 04 October 2016 Pages: 433 - 437
Finite-time consensus of a leader-following multi-agent network with non-identical nonlinear dynamics and time-varying topologies Le YuLilan TuYifan Huang Mathematics 04 October 2016 Pages: 438 - 444
Connectedness of invariant sets of graph-directed IFS Yanfang Zhang Mathematics 04 October 2016 Pages: 445 - 447
Binding number, minimum degree and bipancyclism in bipartite graphs Jing SunZhiquan Hu Mathematics 04 October 2016 Pages: 448 - 452
Ranks of repeated-root constacyclic code Hongju LiJian DingYongsheng Tang Mathematics 04 October 2016 Pages: 453 - 460