Volume 24,Issue 3,2013 Table of Contents

Other Issues:  
  
Contents

  • Model Checking for Event Graphs and Event Temporal Logic
  • XIA Wei,YAO Yi-Ping and MU Xiao-Dong
  • 2013,24(3):421-432 [Abstract(2498)]  [View PDF(2945)759.59 K]
  • Normal Form of Łukasiewicz Logic Formulae and Related Counting Problems
  • WANG Qing-Ping and WANG Guo-Jun
  • 2013,24(3):433-453 [Abstract(2232)]  [View PDF(2198)1.12 M]
  • Using Unified Probabilistic Matrix Factorization for Contextual Advertisement Recommendation
  • TU Dan-Dan,SHU Cheng-Chun and YU Hai-Yan
  • 2013,24(3):454-464 [Abstract(3884)]  [View PDF(7129)585.57 K]
  • Clustering Trajectories of Entities in Computer Wargames
  • SHI Chong-Lin,GAN Wen-Yan,WU Lin,ZHANG Mao-Jun and TANG Yu-Bo
  • 2013,24(3):465-475 [Abstract(2587)]  [View PDF(2847)977.50 K]
  • Many-Objective Evolutionary Algorithm Based on Bipolar Preferences Dominance
  • QIU Fei-Yue,WU Yu-Shi,QIU Qi-Cang and WANG Li-Ping
  • 2013,24(3):476-489 [Abstract(2255)]  [View PDF(2904)953.23 K]
  • Multilevel Core-Sets Based Aggregation Clustering Algorithm
  • MA Ru-Ning,WANG Xiu-Li and DING Jun-Di
  • 2013,24(3):490-506 [Abstract(2376)]  [View PDF(2528)2.61 M]
  • Periodic Intermittently Connected-Based Data Delivery in Opportunistic Networks
  • WU Lei,WU De-An,LIU Ming,WANG Xiao-Min and GONG Hai-Gang
  • 2013,24(3):507-525 [Abstract(2594)]  [View PDF(3743)2.26 M]
  • Evolutionary Game Theoretical Resource Deployment Model for P2P Networks
  • ZHOU Jing-Ya,SONG Ai-Bo and LUO Jun-Zhou
  • 2013,24(3):526-539 [Abstract(2792)]  [View PDF(2945)941.69 K]
  • Online Identification of Tor Anonymous Communication Traffic
  • HE Gao-Feng,YANG Ming,LUO Jun-Zhou and ZHANG Lu
  • 2013,24(3):540-556 [Abstract(2569)]  [View PDF(5890)2.40 M]
  • Virtual Nodes-Based Wavelet Compression Algorithm for Wireless Sensor Networks
  • YANG Sheng-Hong,JIA Yan and ZHOU Si-Wang
  • 2013,24(3):557-563 [Abstract(1906)]  [View PDF(2777)589.65 K]
  • Delegation Based Cross-Domain Access Control Model Under Cloud Computing for Mobile Terminal
  • YUAN Jia-Bin,WEI Li-Li and ZENG Qing-Hua
  • 2013,24(3):564-574 [Abstract(2424)]  [View PDF(2672)750.06 K]
  • Centralized Intra-Domain Protection Routing Mechanism for Low-Connectivity Topology
  • TAN Jing,LUO Jun-Zhou and LI Wei
  • 2013,24(3):575-592 [Abstract(1776)]  [View PDF(2063)1.10 M]
  • Contents

  • Control Algorithm and Performance Analysis Model of Multi-log2N Switching Networks
  • LIU Xiao-Feng,ZHAO You-Jian and WU Ya-Juan
  • 2013,24(3):593-603 [Abstract(3021)]  [View PDF(2877)753.04 K]
  • Contents

  • Noise-Tolerant and Optimal Segmentation of Message Formats for Unknown Application- Layer Protocols
  • LI Min and YU Shun-Zheng
  • 2013,24(3):604-617 [Abstract(2191)]  [View PDF(2562)857.35 K]
  • Security Analysis of a Certificateless Signcryption Scheme
  • HE De-Biao
  • 2013,24(3):618-622 [Abstract(2215)]  [View PDF(2881)427.56 K]
  • Face Segmentation Based on a Hybrid Energy Based Active Contour Model
  • GONG Xun,WANG Guo-Yin,LI Tian-Rui,LI Xin-Xin,XIA Ran and FENG Lin
  • 2013,24(3):623-638 [Abstract(2275)]  [View PDF(3039)1.15 M]
  • Maximum Intensity Projection Based on Visual Perception Enhancement
  • ZHOU Zhi-Guang,TAO Yu-Bo and LIN Hai
  • 2013,24(3):639-650 [Abstract(2185)]  [View PDF(3123)1.40 M]
  • From Point Cloud to Triangular Mesh by Growing Neural Gas
  • ZENG Feng,YANG Tong and YAO Shan
  • 2013,24(3):651-662 [Abstract(1942)]  [View PDF(2916)1.80 M]