Volume 23,Issue 1,2012 Table of Contents

Other Issues:  
  
Contents

  • Facial Expression Analysis Based on Synergetic Trust Model in Proactive Environment
  • XU Chao,FENG Zhi-Yong and WANG Jia-Fang
  • 2012,23(1):21-31 [Abstract(4321)]  [View PDF(3641)702.54 K]
  • Multi-Path Routing Algorithm for Video Stream in Wireless Multimedia Sensor Networks
  • CAO Xiao,WANG Ru-Chuan,HUANG Hai-Ping,SUN Li-Juan and XIAO Fu
  • 2012,23(1):108-121 [Abstract(3942)]  [View PDF(4339)875.68 K]
  • Algorithms for Joint Spectrum Allocation and Cooperation Set Partition in Cognitive Radio Networks
  • YANG Wei,BAN Dong-Song,LIANG Wei-Fa and DOU Wen-Hua
  • 2012,23(1):122-139 [Abstract(3906)]  [View PDF(3624)1005.85 K]
  • Cube Attack on Grain
  • SONG Hai-Xin,FAN Xiu-Bin,WU Chuan-Kun and FENG Deng-Guo
  • 2012,23(1):171-176 [Abstract(3632)]  [View PDF(4153)373.65 K]
  • Review Articles

  • Context-Aware Recommender Systems
  • WANG Li-Cai,MENG Xiang-Wu and ZHANG Yu-Jie
  • 2012,23(1):1-20 [Abstract(9858)]  [View PDF(17189)1017.73 K]
  • Big Data Analysis—Competition and Symbiosis of RDBMS and MapReduce
  • QIN Xiong-Pai,WANG Hui-Ju,DU Xiao-Yong and WANG Shan
  • 2012,23(1):32-45 [Abstract(12913)]  [View PDF(21222)408.86 K]
  • Research on Mobile Web Search
  • ZHANG Jin-Zeng and MENG Xiao-Feng
  • 2012,23(1):46-64 [Abstract(7972)]  [View PDF(7455)493.82 K]
  • Inter-Domain Multipath Routing Protocols
  • SU Jin-Shu,DAI Bin,LIU Yu-Jing and PENG Wei
  • 2012,23(1):65-81 [Abstract(6547)]  [View PDF(5410)348.87 K]
  • Research on Botnet Mechanisms and Defenses
  • JIANG Jian,ZHUGE Jian-Wei,DUAN Hai-Xin and WU Jian-Ping
  • 2012,23(1):82-96 [Abstract(9810)]  [View PDF(9578)394.07 K]
  • Online First

  • Dual IP Address Spaces Architecture
  • QIAN Hua-Lin,E Yue-Peng,GE Jing-Guo,REN Yong-Mao and YOU Jun-Ling
  • 2012,23(1):97-107 [Abstract(5150)]  [View PDF(4067)606.79 K]
  • Review Articles

  • Random Oracle Model
  • JIA Xiao-Ying,LI Bao and LIU Ya-Min
  • 2012,23(1):140-151 [Abstract(6303)]  [View PDF(5578)641.54 K]
  • Research on the Format-Preserving Encryption Techniques
  • LIU Zhe-Li,JIA Chun-Fu and LI Jing-Wei
  • 2012,23(1):152-170 [Abstract(6527)]  [View PDF(6699)924.40 K]