![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Review of the Electric Vehicle Charging Station Location Problem
In order to encourage energy conservation and emission reduction, electric vehicles (EV) have gradually become one of the most important emerging strategic industries in many countries. With the gradual maturi...
-
Chapter and Conference Paper
Emergency Analysis Based on Affective Computing in Universities Forum
Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. The me...
-
Chapter and Conference Paper
An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data
When the datasets about online public opinion are imbalanced, the classifier is prone to sacrifice the accuracy of minority class to achieve the overall best performance. In order to solve this problem, an onl...
-
Chapter and Conference Paper
Short Text Topic Recognition and Optimization Method for University Online Community
The university online community mainly records what happens in target areas and groups of people. It has the characteristics of timeliness, regional strong and clear target groups. Compared with Weibo and post...
-
Chapter and Conference Paper
A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks
In realistic vehicular communication systems, network connections suffer from dynamic mobility and random operations of independent nodes. End to end fully connected path may never exist. VDTNs (Vehicular Dela...
-
Chapter and Conference Paper
A Pervasive Technology Approach to Social Trustworthiness
Growing awareness of environmental concerns has been reflected on more and more public’s attention on low carbon lifestyles. The awareness and public participation could be further enhanced and encouraged via ...
-
Chapter and Conference Paper
Vulnerability Evaluating Based on Attack Graph
Networked hosts are facing more and more threats due to software vulnerabilities. Every year, there are an increasing number of security vulnerabilities discovered in software. It is impractical that we patch ...