A survey of current trends in computational predictions of protein-protein interactions Yanbin WangZhuhong YouZhanheng Chen Review Article 03 January 2020 Article: 144901
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature E. ChenYan ZhuKewei Lv Research Article 03 January 2020 Article: 144806
A topology and risk-aware access control framework for cyber-physical space Yan CaoZhiqiu HuangZihao Wang Research Article 03 January 2020 Article: 144805
Practical continuous leakage-resilient CCA secure identity-based encryption Yanwei ZhouBo Yang Research Article 03 January 2020 Article: 144804
Multipath affinage stacked—hourglass networks for human pose estimation Guoguang HuaLihong LiShiguang Liu Research Article 03 January 2020 Article: 144701
A new fragments allocating method for join query in distributed database Jintao GaoZhanhuai LiYantao Yue Letter 03 January 2020 Article: 144608
Diversification on big data in query processing Meifan ZhangHongzhi WangHong Gao Research Article 03 January 2020 Article: 144607
Plover: parallel logging for replication systems Huan ZhouJinwei GuoAoying Zhou Research Article 03 January 2020 Article: 144606
Proactive eviction of flow entry for SDN based on hidden Markov model Gan HuangHee Yong Youn Research Article 03 January 2020 Article: 144502
An efficient multipath routing schema in multi-homing scenario based on protocol-oblivious forwarding Pufang MaJiali YouJinlin Wang Research Article 03 January 2020 Article: 144501
Low-rank representation based robust face recognition by two-dimensional whitening reconstruction Shuo FengChangpeng WangTingyu Zhang Letter 03 January 2020 Article: 144308
A novel classifier for multivariate instance using graph class signatures Parnika ParanjapeMeera DhabuParag Deshpande Research Article 03 January 2020 Article: 144307
Adaptive sparse and dense hybrid representation with nonconvex optimization Xuejun WangFeilong CaoWenjian Wang Research Article 03 January 2020 Article: 144306
Extracting a justification for OWL ontologies by critical axioms Yuxin YeXianji CuiDantong Ouyang Research Article 03 January 2020 Article: 144305
A revisit to MacKay algorithm and its application to deep network compression Chune LiYongyi MaoJinpeng Huai Research Article 03 January 2020 Article: 144304
Bayesian compressive principal component analysis Di MaSongcan Chen Research Article 03 January 2020 Article: 144303
Efficient FPGA-based graph processing with hybrid pull-push computational model Chengbo YangLong ZhengHai Jin Research Article 03 January 2020 Article: 144102