Volume 23,Issue 1,2012 Table of Contents

Other Issues:  
  
Contents

  • Facial Expression Analysis Based on Synergetic Trust Model in Proactive Environment
  • XU Chao,FENG Zhi-Yong and WANG Jia-Fang
  • 2012,23(1):21-31 [Abstract(4258)]  [View PDF(3609)702.54 K]
  • Multi-Path Routing Algorithm for Video Stream in Wireless Multimedia Sensor Networks
  • CAO Xiao,WANG Ru-Chuan,HUANG Hai-Ping,SUN Li-Juan and XIAO Fu
  • 2012,23(1):108-121 [Abstract(3879)]  [View PDF(4291)875.68 K]
  • Algorithms for Joint Spectrum Allocation and Cooperation Set Partition in Cognitive Radio Networks
  • YANG Wei,BAN Dong-Song,LIANG Wei-Fa and DOU Wen-Hua
  • 2012,23(1):122-139 [Abstract(3845)]  [View PDF(3578)1005.85 K]
  • Cube Attack on Grain
  • SONG Hai-Xin,FAN Xiu-Bin,WU Chuan-Kun and FENG Deng-Guo
  • 2012,23(1):171-176 [Abstract(3570)]  [View PDF(4122)373.65 K]
  • Review Articles

  • Context-Aware Recommender Systems
  • WANG Li-Cai,MENG Xiang-Wu and ZHANG Yu-Jie
  • 2012,23(1):1-20 [Abstract(9652)]  [View PDF(16574)1017.73 K]
  • Big Data Analysis—Competition and Symbiosis of RDBMS and MapReduce
  • QIN Xiong-Pai,WANG Hui-Ju,DU Xiao-Yong and WANG Shan
  • 2012,23(1):32-45 [Abstract(12590)]  [View PDF(20896)408.86 K]
  • Research on Mobile Web Search
  • ZHANG Jin-Zeng and MENG Xiao-Feng
  • 2012,23(1):46-64 [Abstract(7866)]  [View PDF(7412)493.82 K]
  • Inter-Domain Multipath Routing Protocols
  • SU Jin-Shu,DAI Bin,LIU Yu-Jing and PENG Wei
  • 2012,23(1):65-81 [Abstract(6457)]  [View PDF(5364)348.87 K]
  • Research on Botnet Mechanisms and Defenses
  • JIANG Jian,ZHUGE Jian-Wei,DUAN Hai-Xin and WU Jian-Ping
  • 2012,23(1):82-96 [Abstract(9647)]  [View PDF(9512)394.07 K]
  • Online First

  • Dual IP Address Spaces Architecture
  • QIAN Hua-Lin,E Yue-Peng,GE Jing-Guo,REN Yong-Mao and YOU Jun-Ling
  • 2012,23(1):97-107 [Abstract(5071)]  [View PDF(4024)606.79 K]
  • Review Articles

  • Random Oracle Model
  • JIA Xiao-Ying,LI Bao and LIU Ya-Min
  • 2012,23(1):140-151 [Abstract(6204)]  [View PDF(5472)641.54 K]
  • Research on the Format-Preserving Encryption Techniques
  • LIU Zhe-Li,JIA Chun-Fu and LI Jing-Wei
  • 2012,23(1):152-170 [Abstract(6422)]  [View PDF(6579)924.40 K]