• Performance Analysis of Storm in a Real-World Big Data Stream Computing Environment

  • A Human-Machine Collaborative Detection Model for Identifying Web Attacks

  • Constrained Route Planning Based on the Regular Expression

  • AXE: Objects Search in Mobile Volunteered Service

  • A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud Environment