Volume 23,Issue 3,2012 Table of Contents
Handling Goal Utility Dependencies in OSP Problems with Derived Predicates and PreferencesJIANG Zhi-Hua,RAO Dong-Ning,JIANG Yun-Fei and WENG Jian2012,23(3):439-450 [Abstract(4383)] [View PDF(4911)638.05 K]Ant Colony Optimization Based on Random Walk for Community Detection in Complex NetworksJIN Di,YANG Bo,LIU Jie,LIU Da-You and HE Dong-Xiao2012,23(3):451-464 [Abstract(5337)] [View PDF(10541)823.79 K]Discrete-Event System Diagnosis upon Incomplete ModelWANG Xiao-Yu,OUYANG Dan-Tong and ZHAO Jian2012,23(3):465-475 [Abstract(4092)] [View PDF(4396)630.63 K]Combining Relation and Content Analysis for Social Tagging RecommendationZHANG Bin,ZHANG Yin,GAO Ke-Ning,GUO Peng-Wei and SUN Da-Ming2012,23(3):476-488 [Abstract(5109)] [View PDF(7004)680.75 K]Automatic Service Discovery Framework Based on Business Process SimilarityHUANG Zi-Cheng,HUAI Jin-Peng,LIU Xu-Dong,LI Xiang and ZHU Jiang-Jun2012,23(3):489-503 [Abstract(4528)] [View PDF(5399)849.99 K]Path Sensitive Defect Analysis for BPEL Under Dead Path SemanticYANG Xue-Hong,HUANG Jun-Fei and GONG Yun-Zhan2012,23(3):504-516 [Abstract(4247)] [View PDF(4789)711.44 K]Modeling and Verification of Cross-Organizational Multi-Business TransactionsYUAN Min,HUANG Zhi-Qiu and HU Jun2012,23(3):517-538 [Abstract(4263)] [View PDF(5036)606.92 K]Data Model for Dirty DatabasesWANG Hong-Zhi,LI Jian-Zhong and GAO Hong2012,23(3):539-549 [Abstract(4270)] [View PDF(6599)583.12 K]Efficient Probabilistic Skyline Computation Against n-of-N Data Stream ModelYANG Yong-Tao and WANG Yi-Jie2012,23(3):550-564 [Abstract(3886)] [View PDF(4781)816.09 K]RFID Probable k-NN Query Techniques in the Semi-Constraint SpaceGU Yu,YU Ge and LI Chuan-Wen2012,23(3):565-581 [Abstract(4184)] [View PDF(5015)1.01 M]Dynamic Containment Labeling Scheme for XMLZHUANG Can-Wei,FENG Shao-Rong,LIN Zi-Yu and ZHANG Dong-Zhan2012,23(3):582-593 [Abstract(4969)] [View PDF(5204)632.31 K]Representation and Reasoning of Fuzzy Object-Oriented Data Model with Description LogicZHANG Fu,YAN Li,MA Zong-Min and CHENG Jing-Wei2012,23(3):594-612 [Abstract(5006)] [View PDF(5253)931.19 K]Asynchronous Multi-Channel MAC Protocol for WSNsZHANG De-Sheng,LI Jin-Bao and GUO Long-Jiang2012,23(3):613-628 [Abstract(4123)] [View PDF(5571)1.04 M]Group Mobility Adaptive Event Delivery Scheme for Delay Tolerant Mobile Sensor NetworksWU Lei,WANG Xiao-Min,LIU Ming,CHEN Gui-Hai and GONG Hai-Gang2012,23(3):629-647 [Abstract(3932)] [View PDF(4959)1.51 M]Modeling and Algorithm for Network Coding Based P2P StreamingZHANG Zhi-Ming,ZHOU Jin,CHEN Zhen and LI Jun2012,23(3):648-661 [Abstract(4504)] [View PDF(5328)842.68 K]Network Size Estimation Method Based Semantic AttractionMA Xing-Kong,WANG Yi-Jie and ZHENG Zhong2012,23(3):662-676 [Abstract(4067)] [View PDF(4318)764.54 K]Extended Chinese Wall Model for Aggressive Data Leakage PreventionMA Jun,WANG Zhi-Ying,REN Jiang-Chun,WU Jiang-Jiang,CHENG Yong and MEI Song-Zhu2012,23(3):677-687 [Abstract(4188)] [View PDF(5169)595.03 K]Strict Linear Dispersion Network CodeSI Jing-Jing,ZHUANG Bo-Jin and CAI An-Ni2012,23(3):688-699 [Abstract(3711)] [View PDF(4044)677.98 K]Evaluation of Code Obfuscating TransformationZHAO Yu-Jie,TANG Zhan-Yong,WANG Ni,FANG Ding-Yi and GU Yuan-Xiang2012,23(3):700-711 [Abstract(5295)] [View PDF(7459)621.95 K]Performance Evaluation of Worm Attack and Defense Strategies Based on Static Bayesian GameLIU Yu-Ling,FENG Deng-Guo,WU Li-Hui and LIAN Yi-Feng2012,23(3):712-723 [Abstract(4104)] [View PDF(5607)692.67 K]Dynamic Bandwidth Allocation with Adaptive Threshold in EPONWANG Xue-Shun,YU Shao-Hua,LUO Ting and DAI Jin-You2012,23(3):724-734 [Abstract(3472)] [View PDF(4867)630.01 K]