Volume 21,Issue 10,2010 Table of Contents

Other Issues:  
  
Contents

  • Mining Evolutionary Events from Multi-Streams Based on Spectral Clustering
  • YANG Ning,TANG Chang-Jie,WANG Yue,CHEN Yu and ZHENG Jiao-Ling
  • 2010,21(10):2395-2409 [Abstract(5202)]  [View PDF(5867)866.87 K]
  • Sparse Coding Model Based on Structural Similarity
  • LI Zhi-Qing,SHI Zhi-Ping,LI Zhi-Xin and SHI Zhong-Zhi
  • 2010,21(10):2410-2419 [Abstract(4679)]  [View PDF(6446)828.34 K]
  • Density Sensitive Based Multi-Agent Evolutionary Clustering Algorithm
  • PAN Xiao-Ying,LIU Fang and JIAO Li-Cheng
  • 2010,21(10):2420-2431 [Abstract(4853)]  [View PDF(5795)898.38 K]
  • Web Relationship Mining Based on Extended Concept Lattice
  • JIANG Feng and FAN Yu-Shun
  • 2010,21(10):2432-2444 [Abstract(4960)]  [View PDF(5482)557.56 K]
  • Semi-Supervised Discriminant Analysis Based on Manifold Distance
  • WEI Lai and WANG Shou-Jue
  • 2010,21(10):2445-2453 [Abstract(5541)]  [View PDF(6167)513.21 K]
  • Mining Frequent Jump Patterns from Graph Databases
  • LIU Yong,LI Jian-Zhong and GAO Hong
  • 2010,21(10):2477-2493 [Abstract(5105)]  [View PDF(5850)691.74 K]
  • What-If Query Processing Policy of Main-Memory OLAP System
  • ZHANG Yan-Song,XIAO Yan-Qin,WANG Shan and CHEN Hong
  • 2010,21(10):2494-2512 [Abstract(4412)]  [View PDF(5696)763.61 K]
  • Adaptive Algorithm for Soft Subspace Clustering
  • CHEN Li-Fei,GUO Gong-De and JIANG Qing-Shan
  • 2010,21(10):2513-2523 [Abstract(5104)]  [View PDF(7556)508.15 K]
  • Routing Protocols for Delay and Disruption Tolerant Networks
  • ZHANG Long,ZHOU Xian-Wei,WANG Jian-Ping,DENG Yu and WU Qi-Wu
  • 2010,21(10):2554-2572 [Abstract(4869)]  [View PDF(8811)974.66 K]
  • Anomaly Detection Based on Traffic Information Structure
  • ZHU Ying-Wu,YANG Jia-Hai and ZHANG Jin-Xiang
  • 2010,21(10):2573-2583 [Abstract(10716)]  [View PDF(6428)480.80 K]
  • Co-Monitor: Collaborative Monitoring Mechanism for Detecting Prefix Hijacks
  • LIU Xin,ZHU Pei-Dong and PENG Yu-Xing
  • 2010,21(10):2584-2598 [Abstract(5002)]  [View PDF(5803)884.86 K]
  • Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding
  • WANG Jie,WANG Jian-Xin and CHEN Jian-Er
  • 2010,21(10):2599-2609 [Abstract(4133)]  [View PDF(5047)437.52 K]
  • Heuristic Fault Localization Algorithm Based on Bayesian Suspected Degree
  • ZHANG Cheng,LIAO Jian-Xin and ZHU Xiao-Min
  • 2010,21(10):2610-2621 [Abstract(4757)]  [View PDF(7415)719.18 K]
  • Strategy of Content Location of P2P Based on the Social Network
  • HUANG Yong-Sheng,MENG Xiang-Wu and ZHANG Yu-Jie
  • 2010,21(10):2622-2630 [Abstract(5548)]  [View PDF(5702)437.22 K]
  • Server Protocols of Byzantine Quorum Systems Implemented Utilizing Threshold Signature Schemes
  • JING Ji-Wu,WANG Jing,LIN Jing-Qiang,XIE Yong-Quan and GU Qing
  • 2010,21(10):2631-2641 [Abstract(4125)]  [View PDF(5122)424.46 K]
  • Space-Efficient Fair Packet Sampling Algorithm
  • ZHANG Jin,WU Jiang-Xing and NIU Xiao-Na
  • 2010,21(10):2642-2655 [Abstract(4435)]  [View PDF(5425)895.92 K]
  • Greedy Approximation Algorithm of Minimum Cover Set in Wireless Sensor Networks
  • LU Ke-Zhong and SUN Hong-Yuan
  • 2010,21(10):2656-2665 [Abstract(4728)]  [View PDF(5763)444.07 K]
  • e-MAC: A High Throughput MAC Protocol for Ad Hoc Networks
  • ZHANG Ke-Wang,PAN Yu,ZHANG Qiong and ZHANG De-Yun
  • 2010,21(10):2666-2676 [Abstract(4321)]  [View PDF(5272)501.43 K]
  • Replication in Intermittently Connected Mobile Ad Hoc Networks
  • SHI Ke and DONG Yan
  • 2010,21(10):2677-2689 [Abstract(3861)]  [View PDF(5373)653.51 K]
  • ID-Based Channel Reservation Multiple Access for Mobile Ad Hoc Networks
  • XING Xiao-Qin and LIU Kai
  • 2010,21(10):2690-2700 [Abstract(3900)]  [View PDF(5559)848.32 K]
  • Review Articles

  • Keyword Search over Relational Databases
  • LIN Zi-Yu,YANG Dong-Qing,WANG Teng-Jiao and ZHANG Dong-Zhan
  • 2010,21(10):2454-2476 [Abstract(10648)]  [View PDF(10378)714.50 K]
  • Scalable Routing for the Internet
  • TANG Ming-Dong,ZHANG Guo-Qing,YANG Jing and ZHANG Guo-Qiang
  • 2010,21(10):2524-2541 [Abstract(7477)]  [View PDF(9986)743.51 K]
  • Opportunistic Routing Protocols for Wireless Multihop Networks
  • TIAN Ke,ZHANG Bao-Xian,MA Jian and YAO Zheng
  • 2010,21(10):2542-2553 [Abstract(8448)]  [View PDF(13872)516.29 K]