Volume 21,Issue 10,2010 Table of Contents

Other Issues:  
  
Contents

  • Mining Evolutionary Events from Multi-Streams Based on Spectral Clustering
  • YANG Ning,TANG Chang-Jie,WANG Yue,CHEN Yu and ZHENG Jiao-Ling
  • 2010,21(10):2395-2409 [Abstract(4354)]  [View PDF(4154)866.87 K]
  • Sparse Coding Model Based on Structural Similarity
  • LI Zhi-Qing,SHI Zhi-Ping,LI Zhi-Xin and SHI Zhong-Zhi
  • 2010,21(10):2410-2419 [Abstract(3799)]  [View PDF(4604)828.34 K]
  • Density Sensitive Based Multi-Agent Evolutionary Clustering Algorithm
  • PAN Xiao-Ying,LIU Fang and JIAO Li-Cheng
  • 2010,21(10):2420-2431 [Abstract(3888)]  [View PDF(3825)898.38 K]
  • Web Relationship Mining Based on Extended Concept Lattice
  • JIANG Feng and FAN Yu-Shun
  • 2010,21(10):2432-2444 [Abstract(4066)]  [View PDF(3768)557.56 K]
  • Semi-Supervised Discriminant Analysis Based on Manifold Distance
  • WEI Lai and WANG Shou-Jue
  • 2010,21(10):2445-2453 [Abstract(4559)]  [View PDF(4369)513.21 K]
  • Mining Frequent Jump Patterns from Graph Databases
  • LIU Yong,LI Jian-Zhong and GAO Hong
  • 2010,21(10):2477-2493 [Abstract(4220)]  [View PDF(3655)691.74 K]
  • What-If Query Processing Policy of Main-Memory OLAP System
  • ZHANG Yan-Song,XIAO Yan-Qin,WANG Shan and CHEN Hong
  • 2010,21(10):2494-2512 [Abstract(3498)]  [View PDF(3875)763.61 K]
  • Adaptive Algorithm for Soft Subspace Clustering
  • CHEN Li-Fei,GUO Gong-De and JIANG Qing-Shan
  • 2010,21(10):2513-2523 [Abstract(4024)]  [View PDF(5113)508.15 K]
  • Routing Protocols for Delay and Disruption Tolerant Networks
  • ZHANG Long,ZHOU Xian-Wei,WANG Jian-Ping,DENG Yu and WU Qi-Wu
  • 2010,21(10):2554-2572 [Abstract(3901)]  [View PDF(6198)974.66 K]
  • Anomaly Detection Based on Traffic Information Structure
  • ZHU Ying-Wu,YANG Jia-Hai and ZHANG Jin-Xiang
  • 2010,21(10):2573-2583 [Abstract(9525)]  [View PDF(4156)480.80 K]
  • Co-Monitor: Collaborative Monitoring Mechanism for Detecting Prefix Hijacks
  • LIU Xin,ZHU Pei-Dong and PENG Yu-Xing
  • 2010,21(10):2584-2598 [Abstract(3911)]  [View PDF(3705)884.86 K]
  • Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding
  • WANG Jie,WANG Jian-Xin and CHEN Jian-Er
  • 2010,21(10):2599-2609 [Abstract(3222)]  [View PDF(3250)437.52 K]
  • Heuristic Fault Localization Algorithm Based on Bayesian Suspected Degree
  • ZHANG Cheng,LIAO Jian-Xin and ZHU Xiao-Min
  • 2010,21(10):2610-2621 [Abstract(3622)]  [View PDF(5288)719.18 K]
  • Strategy of Content Location of P2P Based on the Social Network
  • HUANG Yong-Sheng,MENG Xiang-Wu and ZHANG Yu-Jie
  • 2010,21(10):2622-2630 [Abstract(4531)]  [View PDF(4079)437.22 K]
  • Server Protocols of Byzantine Quorum Systems Implemented Utilizing Threshold Signature Schemes
  • JING Ji-Wu,WANG Jing,LIN Jing-Qiang,XIE Yong-Quan and GU Qing
  • 2010,21(10):2631-2641 [Abstract(3265)]  [View PDF(3292)424.46 K]
  • Space-Efficient Fair Packet Sampling Algorithm
  • ZHANG Jin,WU Jiang-Xing and NIU Xiao-Na
  • 2010,21(10):2642-2655 [Abstract(3479)]  [View PDF(3644)895.92 K]
  • Greedy Approximation Algorithm of Minimum Cover Set in Wireless Sensor Networks
  • LU Ke-Zhong and SUN Hong-Yuan
  • 2010,21(10):2656-2665 [Abstract(3754)]  [View PDF(4132)444.07 K]
  • e-MAC: A High Throughput MAC Protocol for Ad Hoc Networks
  • ZHANG Ke-Wang,PAN Yu,ZHANG Qiong and ZHANG De-Yun
  • 2010,21(10):2666-2676 [Abstract(3331)]  [View PDF(3579)501.43 K]
  • Replication in Intermittently Connected Mobile Ad Hoc Networks
  • SHI Ke and DONG Yan
  • 2010,21(10):2677-2689 [Abstract(3125)]  [View PDF(3774)653.51 K]
  • ID-Based Channel Reservation Multiple Access for Mobile Ad Hoc Networks
  • XING Xiao-Qin and LIU Kai
  • 2010,21(10):2690-2700 [Abstract(3042)]  [View PDF(3725)848.32 K]
  • Review Articles

  • Keyword Search over Relational Databases
  • LIN Zi-Yu,YANG Dong-Qing,WANG Teng-Jiao and ZHANG Dong-Zhan
  • 2010,21(10):2454-2476 [Abstract(8843)]  [View PDF(7306)714.50 K]
  • Scalable Routing for the Internet
  • TANG Ming-Dong,ZHANG Guo-Qing,YANG Jing and ZHANG Guo-Qiang
  • 2010,21(10):2524-2541 [Abstract(6026)]  [View PDF(6989)743.51 K]
  • Opportunistic Routing Protocols for Wireless Multihop Networks
  • TIAN Ke,ZHANG Bao-Xian,MA Jian and YAO Zheng
  • 2010,21(10):2542-2553 [Abstract(6496)]  [View PDF(10177)516.29 K]