Volume 23,Issue 3,2012 Table of Contents

Other Issues:  
  
Contents

  • Handling Goal Utility Dependencies in OSP Problems with Derived Predicates and Preferences
  • JIANG Zhi-Hua,RAO Dong-Ning,JIANG Yun-Fei and WENG Jian
  • 2012,23(3):439-450 [Abstract(3139)]  [View PDF(2681)638.05 K]
  • Ant Colony Optimization Based on Random Walk for Community Detection in Complex Networks
  • JIN Di,YANG Bo,LIU Jie,LIU Da-You and HE Dong-Xiao
  • 2012,23(3):451-464 [Abstract(3662)]  [View PDF(6904)823.79 K]
  • Discrete-Event System Diagnosis upon Incomplete Model
  • WANG Xiao-Yu,OUYANG Dan-Tong and ZHAO Jian
  • 2012,23(3):465-475 [Abstract(2807)]  [View PDF(2579)630.63 K]
  • Combining Relation and Content Analysis for Social Tagging Recommendation
  • ZHANG Bin,ZHANG Yin,GAO Ke-Ning,GUO Peng-Wei and SUN Da-Ming
  • 2012,23(3):476-488 [Abstract(3618)]  [View PDF(4094)680.75 K]
  • Automatic Service Discovery Framework Based on Business Process Similarity
  • HUANG Zi-Cheng,HUAI Jin-Peng,LIU Xu-Dong,LI Xiang and ZHU Jiang-Jun
  • 2012,23(3):489-503 [Abstract(3233)]  [View PDF(3184)849.99 K]
  • Path Sensitive Defect Analysis for BPEL Under Dead Path Semantic
  • YANG Xue-Hong,HUANG Jun-Fei and GONG Yun-Zhan
  • 2012,23(3):504-516 [Abstract(3036)]  [View PDF(2915)711.44 K]
  • Modeling and Verification of Cross-Organizational Multi-Business Transactions
  • YUAN Min,HUANG Zhi-Qiu and HU Jun
  • 2012,23(3):517-538 [Abstract(3102)]  [View PDF(3034)606.92 K]
  • Data Model for Dirty Databases
  • WANG Hong-Zhi,LI Jian-Zhong and GAO Hong
  • 2012,23(3):539-549 [Abstract(2916)]  [View PDF(4671)583.12 K]
  • Efficient Probabilistic Skyline Computation Against n-of-N Data Stream Model
  • YANG Yong-Tao and WANG Yi-Jie
  • 2012,23(3):550-564 [Abstract(2652)]  [View PDF(2772)816.09 K]
  • RFID Probable k-NN Query Techniques in the Semi-Constraint Space
  • GU Yu,YU Ge and LI Chuan-Wen
  • 2012,23(3):565-581 [Abstract(2950)]  [View PDF(2928)1.01 M]
  • Dynamic Containment Labeling Scheme for XML
  • ZHUANG Can-Wei,FENG Shao-Rong,LIN Zi-Yu and ZHANG Dong-Zhan
  • 2012,23(3):582-593 [Abstract(3490)]  [View PDF(2980)632.31 K]
  • Representation and Reasoning of Fuzzy Object-Oriented Data Model with Description Logic
  • ZHANG Fu,YAN Li,MA Zong-Min and CHENG Jing-Wei
  • 2012,23(3):594-612 [Abstract(3482)]  [View PDF(2944)931.19 K]
  • Asynchronous Multi-Channel MAC Protocol for WSNs
  • ZHANG De-Sheng,LI Jin-Bao and GUO Long-Jiang
  • 2012,23(3):613-628 [Abstract(2857)]  [View PDF(3263)1.04 M]
  • Group Mobility Adaptive Event Delivery Scheme for Delay Tolerant Mobile Sensor Networks
  • WU Lei,WANG Xiao-Min,LIU Ming,CHEN Gui-Hai and GONG Hai-Gang
  • 2012,23(3):629-647 [Abstract(2758)]  [View PDF(2924)1.51 M]
  • Modeling and Algorithm for Network Coding Based P2P Streaming
  • ZHANG Zhi-Ming,ZHOU Jin,CHEN Zhen and LI Jun
  • 2012,23(3):648-661 [Abstract(3275)]  [View PDF(3166)842.68 K]
  • Network Size Estimation Method Based Semantic Attraction
  • MA Xing-Kong,WANG Yi-Jie and ZHENG Zhong
  • 2012,23(3):662-676 [Abstract(3000)]  [View PDF(2570)764.54 K]
  • Extended Chinese Wall Model for Aggressive Data Leakage Prevention
  • MA Jun,WANG Zhi-Ying,REN Jiang-Chun,WU Jiang-Jiang,CHENG Yong and MEI Song-Zhu
  • 2012,23(3):677-687 [Abstract(3068)]  [View PDF(2935)595.03 K]
  • Strict Linear Dispersion Network Code
  • SI Jing-Jing,ZHUANG Bo-Jin and CAI An-Ni
  • 2012,23(3):688-699 [Abstract(2621)]  [View PDF(2353)677.98 K]
  • Evaluation of Code Obfuscating Transformation
  • ZHAO Yu-Jie,TANG Zhan-Yong,WANG Ni,FANG Ding-Yi and GU Yuan-Xiang
  • 2012,23(3):700-711 [Abstract(3611)]  [View PDF(4216)621.95 K]
  • Performance Evaluation of Worm Attack and Defense Strategies Based on Static Bayesian Game
  • LIU Yu-Ling,FENG Deng-Guo,WU Li-Hui and LIAN Yi-Feng
  • 2012,23(3):712-723 [Abstract(2820)]  [View PDF(3183)692.67 K]
  • Dynamic Bandwidth Allocation with Adaptive Threshold in EPON
  • WANG Xue-Shun,YU Shao-Hua,LUO Ting and DAI Jin-You
  • 2012,23(3):724-734 [Abstract(2256)]  [View PDF(2693)630.01 K]