[1] KARIMI-MAJD A M,FATHIAN M,AMIRI B.A hybrid artificial immune network for detecting commu-nities in complex networks[J].Computing,2015,97(5):483-507. [2] YONGSIRIWIT K,ASSY N,GAALOUL W.A semantic framework for configurable business process as a service in the cloud[J].Journal of Network and Computer Applications,2015,59:168-184. [3] ARCHANA V,DANIEL Y J Y,KEVIN A P,et al.Bayesian community detection in the space of group-level functional differences[J].IEEE Transactions on Medical Imaging,2016,35(8):1862-1866. [4] ZHAO Guofeng,YE Fei,YAO Yong’an,et al.Design and implementation of a multi-pattern string matching algorithm in cloud center network intrusion detection system[J].Netinfo Security,2018,18(1):52-57.(in Chinese) 赵国锋,叶飞,姚永安,等.一种面向云中心网络入侵检测的多模式匹配算法[J].信息网络安全,2018,18(1):52-57. [5] SHI Lei,ZHANG Lefei,ZHAO Lingli,et al.Adaptive laplacian eigenmap-based dimension reduction for ocean target discrimination[J].IEEE Geoscience and Remote Sensing Letters,2016,13(7):902-906. [6] AALST W M P,VERBEEKH M W.Process discovery and conformance checking using passages[J].Fundamenta Informaticae,2014,131(1):103-138. [7] GUPTA M,SUREKA A,PADMANABHUNI S.Process mining multiple repositories for software defect resolution from control and organizational perspective[C]//Proceedings of the 11th Working Conference on Mining Software Repositories.New York,USA:ACM Press,2012:122-131. [8] AHMET E S,BUĞRA G,GABRIELA J S,et al.SONIC:streaming overlapping community detection[J].Data Mining and Knowledge Discovery,2016,30(4):819-847. [9] YUICHI Y,MARC K,ANDREW R.Study of biological communities subject to imperfect detection:bias and precision of community N-mixture abundance models in small-sample situations[J].Ecological Research,2016,31(3):289-305. [10] LUO Huilan,WAN Chengtao,KONG Fansheng.Salient region detection algorithm via KL divergence and multi-scale merging[J].Journal of Electronics and Information Technology,2016,38(7):1594-1601.(in Chinese) 罗会兰,万成涛,孔繁胜.基于KL散度及多尺度融合的显著性区域检测算法[J].电子与信息学报,2016,38(7):1594-1601. [11] LIU Jiajia,YU Yan,HU Hengwei,et al.Research on a protection mechanism based on virtual machine customization[J].Netinfo Security,2017,17(1):63-67.(in Chinese) 刘佳佳,俞研,胡恒伟,等.一种基于虚拟机定制的应用保护方法研究[J].信息网络安全,2017,17(1):63-67. [12] LI Zhaoxing,HE Lile,LI Yunrui.A novel multiobjective particle swarm optimization algorithm for signed network community detection[J].Applied Intelligence,2016,44(3):621-633. [13] CHEN M,SZYMANSKI B K.Fuzzy overlapping community quality metrics[J].Social Network Analysis and Mining,2015,5(1):1-14. [14] SONG Shasha,ZHOU Jinhe.Energy efficiency optimization routing algorithm based on complex gradient network[J].Computer Engineering,2018,44(2):88-91.(in Chinese) 宋莎莎,周金和.基于复杂梯度网络的能效优化路由算法[J].计算机工程,2018,44(2):88-91. [15] BAO Guohua,WANG Shengyu,LI Yunfa.Research on data security protection methods based on privacy awareness in cloud computing[J].Netinfo Security,2017,17(1):84-89.(in Chinese) 包国华,王生玉,李运发.云计算中基于隐私感知的数据安全保护方法研究[J].信息网络安全,2017,17(1):84-89. [16] WANG S S,CHERN A,TSAO Y,et al.Wavelet speech enhancement based on nonnegative matrix factorization[J].IEEE Signal Processing Letters,2016,23(8):1101-1105. [17] SU Wuge,TAO Zhongxiang,DONG Bo.The quality measure for infrared and visible image fusion based on the verge information[J].Fire Control and Command Control,2012,37(1):194-197.(in Chinese) 苏伍各,陶忠祥,董博.边缘信息的红外与可见光图像融合评价[J].火力与指挥控制,2012,37(1):194-197. [18] ARCHANA V,DANIEL Y J Y,KEVIN A P,et al.Bayesian community detection in the space of group-level functional differences[J].IEEE Transactions on Medical Imaging,2016,35(8):1862-1866. [19] CHEN M,NGUYEN T,SZYMANSKI B.On measuring the quality of a network community structure[J].Social Computing,2013,52(3):122-127. [20] CHEN W H,INCHEON P,HUNG P C.Constructing a global social service network for better quality of Web service discovery[J].IEEE Transactions on Services Computing,2015,8(2):284-298. |