Volume 23,Issue 8,2012 Table of Contents

Other Issues:  
  
Contents

  • List Abstraction Method Based on Variable Reachability Vector
  • LI Ren-Jian,LIU Wan-Wei,CHEN Li-Qian and WANG Ji
  • 2012,23(8):1935-1949 [Abstract(2895)]  [View PDF(2541)885.16 K]
  • Thread Partitioning Algorithm for Speculative Multithreading Based on Path Optimization
  • LI Yuan-Cheng,ZHAO Yin-Liang,LI Mei-Rong and DU Yan-Ning
  • 2012,23(8):1950-1964 [Abstract(2977)]  [View PDF(4450)735.51 K]
  • Resolution Sequence of Bad Smells
  • GAO Yuan,LIU Hui,FAN Xiao-Zhong,NIU Zhen-Dong and SHAO Wei-Zhong
  • 2012,23(8):1965-1977 [Abstract(3596)]  [View PDF(3163)666.51 K]
  • Wright-Fisher Multi-Strategy Trust Evolution Model of Internetware
  • YIN Gui-Sheng,WANG Ying-Jie,DONG Yu-Xin and CUI Xiao-Hui
  • 2012,23(8):1978-1991 [Abstract(3533)]  [View PDF(3247)894.85 K]
  • Fault Tolerant Network Declarative Programs
  • WANG Fang and Stéphane GRUMBACH
  • 2012,23(8):1992-2001 [Abstract(2634)]  [View PDF(2494)556.04 K]
  • Query Understanding for XML Keyword Search
  • LI Qiu-Shi,WANG Qiu-Yue and WANG Shan
  • 2012,23(8):2002-2017 [Abstract(2894)]  [View PDF(3485)766.66 K]
  • c-Approximate Nearest Neighbor Query Algorithm Based on Learning for High-Dimensional Data
  • YUAN Pei-Sen,SHA Chao-Feng,WANG Xiao-Ling and ZHOU Ao-Ying
  • 2012,23(8):2018-2031 [Abstract(3164)]  [View PDF(4398)711.58 K]
  • Efficient Join Query Processing Algorithm CHMJ Based on Hadoop
  • ZHAO Yan-Rong,WANG Wei-Ping,MENG Dan,ZHANG Shu-Bin and LI Jun
  • 2012,23(8):2032-2041 [Abstract(3806)]  [View PDF(4756)930.96 K]
  • Temporal XML Index Based on Temporal Encoding and Linear Order Partition
  • GUO Huan,YE Xiao-Ping,TANG Yong and CHEN Luo-Wu
  • 2012,23(8):2042-2057 [Abstract(2835)]  [View PDF(3669)904.56 K]
  • Towards a Global and Declarative Development Model for Sensor Networking
  • WANG Fang and ZHANG Yun-Yong
  • 2012,23(8):2073-2083 [Abstract(2485)]  [View PDF(2667)603.28 K]
  • Trusted Agent for Collecting Trustworthiness Evidence in Terminal Dynamical Running Environment
  • TAN Liang and CHEN Ju
  • 2012,23(8):2084-2103 [Abstract(2637)]  [View PDF(3810)1.19 M]
  • Sense Model and Number Estimation of Wireless Multimedia Sensor Networks
  • ZHAO Jing and ZENG Jian-Chao
  • 2012,23(8):2104-2114 [Abstract(2800)]  [View PDF(3146)699.21 K]
  • Min-Cut Multi-Path Routing Algorithm
  • YANG Hua-Wei,WANG Hong-Bo,CHENG Shi-Duan,CHEN Shan-Zhi and CUI Yi-Dong
  • 2012,23(8):2115-2129 [Abstract(2804)]  [View PDF(4162)788.49 K]
  • Research on the Effectiveness of Distributed Packet Filtering Based on Inter-Domain Routing
  • WANG Li-Jun
  • 2012,23(8):2130-2137 [Abstract(2690)]  [View PDF(2499)510.48 K]
  • Algorithm for k-Anonymity Based on Rounded Partition Function
  • WU Ying-Jie,TANG Qing-Ming,NI Wei-Wei and SUN Zhi-Hui
  • 2012,23(8):2138-2148 [Abstract(2993)]  [View PDF(4043)592.91 K]
  • Declassification Enforcement on Program with Reachability Analysis of Pushdown System
  • SUN Cong,TANG Li-Yong and CHEN Zhong
  • 2012,23(8):2149-2162 [Abstract(2712)]  [View PDF(2782)855.20 K]
  • Certificate-Based Key Encapsulation Mechanism with Tags
  • LI Ji-Guo,YANG Hai-Shan and ZHANG Yi-Chen
  • 2012,23(8):2163-2172 [Abstract(3215)]  [View PDF(2874)580.18 K]
  • Parallel Framework for HLA Federate Oriented to Simulation Component on Multicore Platform
  • PENG Yong,CAI Ying,ZHONG Rong-Hua and HUANG Ke-Di
  • 2012,23(8):2188-2206 [Abstract(2446)]  [View PDF(2855)940.84 K]
  • One-Way Isolation Execution Model Based on Hardware Virtualization
  • LI Xiao-Qing,ZHAO Xiao-Dong and ZENG Qing-Kai
  • 2012,23(8):2207-2222 [Abstract(2483)]  [View PDF(3039)770.65 K]
  • Schedulability Test for Multiprocessor Scheduling Based on Hyperbolic Bound
  • WANG Hong-Ya,YIN Wei,SONG Hui,SHU Lih-Chyun and WANG Mei
  • 2012,23(8):2223-2234 [Abstract(2495)]  [View PDF(2600)632.63 K]
  • Review Articles

  • DDoS Attacks Detection and Control Mechanisms
  • ZHANG Yong-Zheng,XIAO Jun,YUN Xiao-Chun and WANG Feng-Yu
  • 2012,23(8):2058-2072 [Abstract(8150)]  [View PDF(14394)800.05 K]
  • Virtualization-Based Security Monitoring
  • XIANG Guo-Fu,JIN Hai,ZOU De-Qing and CHEN Xue-Guang
  • 2012,23(8):2173-2187 [Abstract(7398)]  [View PDF(9409)771.06 K]