A decomposition based algorithm for maximal contractions Dongchen JiangWei LiZhengzhong Liao Research Article 05 November 2013 Pages: 801 - 811
Integrity constraints in OWL ontologies based on grounded circumscription Dantong OuyangXianji CuiYuxin Ye Research Article 21 October 2013 Pages: 812 - 821
Generating test data for both path coverage and fault detection using genetic algorithms Dunwei GongYan Zhang Research Article 28 September 2013 Pages: 822 - 837
Image categorization using a semantic hierarchy model with sparse set of salient regions Chunping LiuYang ZhengShengrong Gong Research Article 05 November 2013 Pages: 838 - 851
Hybrid Bayesian estimation tree learning with discrete and fuzzy labels Zengchang QinTao Wan Research Article 19 September 2013 Pages: 852 - 863
Classifying and clustering in negative databases Ran LiuWenjian LuoLihua Yue Research Article 25 September 2013 Pages: 864 - 874
Context-sensitive Web service discovery over the bipartite graph model Rong ZhangKoji ZettsuAoying Zhou Research Article 25 September 2013 Pages: 875 - 893
An automatic subdigraph renovation plan for failure recovery of composite semantic Web services Hadi SaboohiSameem Abdul Kareem Research Article 05 November 2013 Pages: 894 - 913
A novel architecture for ahead branch prediction Wenbing JinFeng ShiYang Zhang Research Article 20 September 2013 Pages: 914 - 923
On applying stochastic network calculus Chuang LinYiping DengYuming Jiang Review Article 23 November 2013 Pages: 924 - 942
Towards estimating computer users’ mood from interaction behaviour with keyboard and mouse Iftikhar Ahmed KhanWillem-Paul BrinkmanRobert Hierons Research Article 25 October 2013 Pages: 943 - 954
Threshold public key encryption scheme resilient against continual leakage without random oracles Xiujie ZhangChunxiang XuWanpeng Li Research Article 05 November 2013 Pages: 955 - 968