Volume 21,Issue 10,2010 Table of Contents
Mining Evolutionary Events from Multi-Streams Based on Spectral ClusteringYANG Ning,TANG Chang-Jie,WANG Yue,CHEN Yu and ZHENG Jiao-Ling2010,21(10):2395-2409 [Abstract(5202)] [View PDF(5867)866.87 K]Sparse Coding Model Based on Structural SimilarityLI Zhi-Qing,SHI Zhi-Ping,LI Zhi-Xin and SHI Zhong-Zhi2010,21(10):2410-2419 [Abstract(4679)] [View PDF(6446)828.34 K]Density Sensitive Based Multi-Agent Evolutionary Clustering AlgorithmPAN Xiao-Ying,LIU Fang and JIAO Li-Cheng2010,21(10):2420-2431 [Abstract(4853)] [View PDF(5795)898.38 K]Web Relationship Mining Based on Extended Concept LatticeJIANG Feng and FAN Yu-Shun2010,21(10):2432-2444 [Abstract(4960)] [View PDF(5482)557.56 K]Semi-Supervised Discriminant Analysis Based on Manifold DistanceWEI Lai and WANG Shou-Jue2010,21(10):2445-2453 [Abstract(5541)] [View PDF(6167)513.21 K]Mining Frequent Jump Patterns from Graph DatabasesLIU Yong,LI Jian-Zhong and GAO Hong2010,21(10):2477-2493 [Abstract(5105)] [View PDF(5850)691.74 K]What-If Query Processing Policy of Main-Memory OLAP SystemZHANG Yan-Song,XIAO Yan-Qin,WANG Shan and CHEN Hong2010,21(10):2494-2512 [Abstract(4412)] [View PDF(5696)763.61 K]Adaptive Algorithm for Soft Subspace ClusteringCHEN Li-Fei,GUO Gong-De and JIANG Qing-Shan2010,21(10):2513-2523 [Abstract(5104)] [View PDF(7556)508.15 K]Routing Protocols for Delay and Disruption Tolerant NetworksZHANG Long,ZHOU Xian-Wei,WANG Jian-Ping,DENG Yu and WU Qi-Wu2010,21(10):2554-2572 [Abstract(4869)] [View PDF(8811)974.66 K]Anomaly Detection Based on Traffic Information StructureZHU Ying-Wu,YANG Jia-Hai and ZHANG Jin-Xiang2010,21(10):2573-2583 [Abstract(10716)] [View PDF(6428)480.80 K]Co-Monitor: Collaborative Monitoring Mechanism for Detecting Prefix HijacksLIU Xin,ZHU Pei-Dong and PENG Yu-Xing2010,21(10):2584-2598 [Abstract(5002)] [View PDF(5803)884.86 K]Automated Signature Generation Approach for Polymorphic Worm Based on Color CodingWANG Jie,WANG Jian-Xin and CHEN Jian-Er2010,21(10):2599-2609 [Abstract(4133)] [View PDF(5047)437.52 K]Heuristic Fault Localization Algorithm Based on Bayesian Suspected DegreeZHANG Cheng,LIAO Jian-Xin and ZHU Xiao-Min2010,21(10):2610-2621 [Abstract(4757)] [View PDF(7415)719.18 K]Strategy of Content Location of P2P Based on the Social NetworkHUANG Yong-Sheng,MENG Xiang-Wu and ZHANG Yu-Jie2010,21(10):2622-2630 [Abstract(5548)] [View PDF(5702)437.22 K]Server Protocols of Byzantine Quorum Systems Implemented Utilizing Threshold Signature SchemesJING Ji-Wu,WANG Jing,LIN Jing-Qiang,XIE Yong-Quan and GU Qing2010,21(10):2631-2641 [Abstract(4125)] [View PDF(5122)424.46 K]Space-Efficient Fair Packet Sampling AlgorithmZHANG Jin,WU Jiang-Xing and NIU Xiao-Na2010,21(10):2642-2655 [Abstract(4435)] [View PDF(5425)895.92 K]Greedy Approximation Algorithm of Minimum Cover Set in Wireless Sensor NetworksLU Ke-Zhong and SUN Hong-Yuan2010,21(10):2656-2665 [Abstract(4728)] [View PDF(5763)444.07 K]e-MAC: A High Throughput MAC Protocol for Ad Hoc NetworksZHANG Ke-Wang,PAN Yu,ZHANG Qiong and ZHANG De-Yun2010,21(10):2666-2676 [Abstract(4321)] [View PDF(5272)501.43 K]Replication in Intermittently Connected Mobile Ad Hoc NetworksSHI Ke and DONG Yan2010,21(10):2677-2689 [Abstract(3861)] [View PDF(5373)653.51 K]ID-Based Channel Reservation Multiple Access for Mobile Ad Hoc NetworksXING Xiao-Qin and LIU Kai2010,21(10):2690-2700 [Abstract(3900)] [View PDF(5559)848.32 K]
Keyword Search over Relational DatabasesLIN Zi-Yu,YANG Dong-Qing,WANG Teng-Jiao and ZHANG Dong-Zhan2010,21(10):2454-2476 [Abstract(10648)] [View PDF(10378)714.50 K]Scalable Routing for the InternetTANG Ming-Dong,ZHANG Guo-Qing,YANG Jing and ZHANG Guo-Qiang2010,21(10):2524-2541 [Abstract(7477)] [View PDF(9986)743.51 K]Opportunistic Routing Protocols for Wireless Multihop NetworksTIAN Ke,ZHANG Bao-Xian,MA Jian and YAO Zheng2010,21(10):2542-2553 [Abstract(8448)] [View PDF(13872)516.29 K]