Volume 24,Issue 3,2013 Table of Contents

Other Issues:  
  
Contents

  • Model Checking for Event Graphs and Event Temporal Logic
  • XIA Wei,YAO Yi-Ping and MU Xiao-Dong
  • 2013,24(3):421-432 [Abstract(2715)]  [View PDF(3035)759.59 K]
  • Normal Form of Łukasiewicz Logic Formulae and Related Counting Problems
  • WANG Qing-Ping and WANG Guo-Jun
  • 2013,24(3):433-453 [Abstract(2506)]  [View PDF(2263)1.12 M]
  • Using Unified Probabilistic Matrix Factorization for Contextual Advertisement Recommendation
  • TU Dan-Dan,SHU Cheng-Chun and YU Hai-Yan
  • 2013,24(3):454-464 [Abstract(4163)]  [View PDF(7373)585.57 K]
  • Clustering Trajectories of Entities in Computer Wargames
  • SHI Chong-Lin,GAN Wen-Yan,WU Lin,ZHANG Mao-Jun and TANG Yu-Bo
  • 2013,24(3):465-475 [Abstract(2848)]  [View PDF(2977)977.50 K]
  • Many-Objective Evolutionary Algorithm Based on Bipolar Preferences Dominance
  • QIU Fei-Yue,WU Yu-Shi,QIU Qi-Cang and WANG Li-Ping
  • 2013,24(3):476-489 [Abstract(2502)]  [View PDF(3006)953.23 K]
  • Multilevel Core-Sets Based Aggregation Clustering Algorithm
  • MA Ru-Ning,WANG Xiu-Li and DING Jun-Di
  • 2013,24(3):490-506 [Abstract(2536)]  [View PDF(2581)2.61 M]
  • Periodic Intermittently Connected-Based Data Delivery in Opportunistic Networks
  • WU Lei,WU De-An,LIU Ming,WANG Xiao-Min and GONG Hai-Gang
  • 2013,24(3):507-525 [Abstract(2760)]  [View PDF(3845)2.26 M]
  • Evolutionary Game Theoretical Resource Deployment Model for P2P Networks
  • ZHOU Jing-Ya,SONG Ai-Bo and LUO Jun-Zhou
  • 2013,24(3):526-539 [Abstract(3001)]  [View PDF(3020)941.69 K]
  • Online Identification of Tor Anonymous Communication Traffic
  • HE Gao-Feng,YANG Ming,LUO Jun-Zhou and ZHANG Lu
  • 2013,24(3):540-556 [Abstract(2771)]  [View PDF(6468)2.40 M]
  • Virtual Nodes-Based Wavelet Compression Algorithm for Wireless Sensor Networks
  • YANG Sheng-Hong,JIA Yan and ZHOU Si-Wang
  • 2013,24(3):557-563 [Abstract(2061)]  [View PDF(2857)589.65 K]
  • Delegation Based Cross-Domain Access Control Model Under Cloud Computing for Mobile Terminal
  • YUAN Jia-Bin,WEI Li-Li and ZENG Qing-Hua
  • 2013,24(3):564-574 [Abstract(2558)]  [View PDF(2786)750.06 K]
  • Centralized Intra-Domain Protection Routing Mechanism for Low-Connectivity Topology
  • TAN Jing,LUO Jun-Zhou and LI Wei
  • 2013,24(3):575-592 [Abstract(1911)]  [View PDF(2177)1.10 M]
  • Contents

  • Control Algorithm and Performance Analysis Model of Multi-log2N Switching Networks
  • LIU Xiao-Feng,ZHAO You-Jian and WU Ya-Juan
  • 2013,24(3):593-603 [Abstract(3196)]  [View PDF(2990)753.04 K]
  • Contents

  • Noise-Tolerant and Optimal Segmentation of Message Formats for Unknown Application- Layer Protocols
  • LI Min and YU Shun-Zheng
  • 2013,24(3):604-617 [Abstract(2386)]  [View PDF(2711)857.35 K]
  • Security Analysis of a Certificateless Signcryption Scheme
  • HE De-Biao
  • 2013,24(3):618-622 [Abstract(2410)]  [View PDF(3003)427.56 K]
  • Face Segmentation Based on a Hybrid Energy Based Active Contour Model
  • GONG Xun,WANG Guo-Yin,LI Tian-Rui,LI Xin-Xin,XIA Ran and FENG Lin
  • 2013,24(3):623-638 [Abstract(2422)]  [View PDF(3196)1.15 M]
  • Maximum Intensity Projection Based on Visual Perception Enhancement
  • ZHOU Zhi-Guang,TAO Yu-Bo and LIN Hai
  • 2013,24(3):639-650 [Abstract(2345)]  [View PDF(3295)1.40 M]
  • From Point Cloud to Triangular Mesh by Growing Neural Gas
  • ZENG Feng,YANG Tong and YAO Shan
  • 2013,24(3):651-662 [Abstract(2084)]  [View PDF(3038)1.80 M]