Volume 22,Issue 7,2011 Table of Contents
Web Service Business Protocol Mining Based on Message LogsLI Xiang,HUAI Jin-Peng,LIU Xu-Dong,SUN Hai-Long and QU Xian-Yang2011,22(7):1413-1425 [Abstract(4853)] [View PDF(5536)883.43 K]Web Service Dynamic Selection by the Decomposition of Global QoS ConstraintsWANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun2011,22(7):1426-1439 [Abstract(6417)] [View PDF(6571)773.70 K]Fault-Tolerant Scheduling for Real-Time Tasks with QoS Requirements on Heterogeneous ClustersZHU Xiao-Min,ZHU Jiang-Han and MA Man-Hao2011,22(7):1440-1456 [Abstract(5137)] [View PDF(5363)872.32 K]DFSM-Based Minimum Test Cost Transition Coverage CriterionLIU Pan,MIAO Huai-Kou,ZENG Hong-Wei and MEI Jia2011,22(7):1457-1474 [Abstract(5134)] [View PDF(5802)850.28 K]Performance Optimization of Application Algorithms for Heterogeneous Multi-Processor System-on-ChipsZHAO Peng,YAN Ming and LI Si-Kun2011,22(7):1475-1487 [Abstract(4108)] [View PDF(5547)695.64 K]Framework for Tracking the Event-Based Evolution in Social NetworksWU Bin,WANG Bai and YANG Sheng-Qi2011,22(7):1488-1502 [Abstract(6403)] [View PDF(6814)662.65 K]Decidable Temporal Dynamic Description LogicCHANG Liang,SHI Zhong-Zhi,GU Tian-Long and WANG Xiao-Feng2011,22(7):1524-1537 [Abstract(5102)] [View PDF(5437)871.49 K]Heuristic Survey Propagation Algorithm for Solving QBF ProblemYIN Ming-Hao,ZHOU Jun-Ping,SUN Ji-Gui and GU Wen-Xiang2011,22(7):1538-1550 [Abstract(5510)] [View PDF(5723)656.79 K]Theoretical Analysis for the Optimization Problem of Support Vector Data DescriptionWANG Xiao-Ming and WANG Shi-Tong2011,22(7):1551-1560 [Abstract(4665)] [View PDF(4991)603.36 K]Optimal Discriminant Analysis Based on Kernel Extension of Graph Embedding and Face RecognitionLU Gui-Fu,LIN Zhong and JIN Zhong2011,22(7):1561-1570 [Abstract(4666)] [View PDF(5751)614.91 K]Outlier Detection Approach Based on Reconstruction WeightsWANG Jing2011,22(7):1571-1579 [Abstract(5036)] [View PDF(5202)548.89 K]Mobile Distribution-Aware Data Dissemination for Vehicular Ad Hoc NetworksWU Lei,LIU Ming,WANG Xiao-Min,CHEN Gui-Hai and GONG Hai-Gang2011,22(7):1580-1596 [Abstract(5283)] [View PDF(5697)649.56 K]Performance Evaluation of Localization Algorithms for Mobile Sensor NetworksZHANG Shi-Geng,ZENG Ying-Pei,CHEN Li-Jun,CHEN Dao-Xu and XIE Li2011,22(7):1597-1611 [Abstract(4681)] [View PDF(6159)915.90 K]Localization Model in Wireless Sensor NetworksZHU Jian,ZHAO Hai,XU Jiu-Qiang and LI Da-Zhou2011,22(7):1612-1625 [Abstract(5808)] [View PDF(6477)809.85 K]Delay-Constrained and Energy-Efficient Cross-Layer Routing in Wireless Sensor NetworksWANG Xin-Guo,ZHANG Xin-Ming and CHEN Guo-Liang2011,22(7):1626-1640 [Abstract(6905)] [View PDF(6079)870.29 K]Attack Analysis Model on Ad Hoc Security Routing Protocol Based on Strand Space ModelDONG Xue-Wen,MA Jian-Feng,NIU Wen-Sheng,MAO Li-Qiang and XIE Hui2011,22(7):1641-1651 [Abstract(5264)] [View PDF(5153)635.32 K]On the XOR Branch Numbers of the Transformations About Modulo 2n Addition andModulo 2 AdditionCHANG Ya-Qin and JIN Chen-Hui2011,22(7):1652-1660 [Abstract(5587)] [View PDF(5579)505.38 K]Attribute-Based Authorization Delegation Model in Multi-Domain EnvironmentsWU Bin and FENG Deng-Guo2011,22(7):1661-1675 [Abstract(4763)] [View PDF(4926)735.04 K]Syntax and Behavior Semantics Analysis of Network Protocol of MalwareYING Ling-Yun,YANG Yi,FENG Deng-Guo and SU Pu-Rui2011,22(7):1676-1689 [Abstract(5209)] [View PDF(7891)815.00 K]Efficient Certificateless Hybrid SigncryptionSUN Yin-Xia and LI Hui2011,22(7):1690-1698 [Abstract(4825)] [View PDF(5358)583.96 K]
Automatic Age Estimation Based on Visual and Audio InformationFANG Er-Qing and GENG Xin2011,22(7):1503-1523 [Abstract(9337)] [View PDF(11217)641.44 K]