Volume 24,Issue 3,2013 Table of Contents

Other Issues:  
  
Contents

  • Model Checking for Event Graphs and Event Temporal Logic
  • XIA Wei,YAO Yi-Ping and MU Xiao-Dong
  • 2013,24(3):421-432 [Abstract(2579)]  [View PDF(2970)759.59 K]
  • Normal Form of Łukasiewicz Logic Formulae and Related Counting Problems
  • WANG Qing-Ping and WANG Guo-Jun
  • 2013,24(3):433-453 [Abstract(2314)]  [View PDF(2219)1.12 M]
  • Using Unified Probabilistic Matrix Factorization for Contextual Advertisement Recommendation
  • TU Dan-Dan,SHU Cheng-Chun and YU Hai-Yan
  • 2013,24(3):454-464 [Abstract(3993)]  [View PDF(7224)585.57 K]
  • Clustering Trajectories of Entities in Computer Wargames
  • SHI Chong-Lin,GAN Wen-Yan,WU Lin,ZHANG Mao-Jun and TANG Yu-Bo
  • 2013,24(3):465-475 [Abstract(2681)]  [View PDF(2878)977.50 K]
  • Many-Objective Evolutionary Algorithm Based on Bipolar Preferences Dominance
  • QIU Fei-Yue,WU Yu-Shi,QIU Qi-Cang and WANG Li-Ping
  • 2013,24(3):476-489 [Abstract(2337)]  [View PDF(2933)953.23 K]
  • Multilevel Core-Sets Based Aggregation Clustering Algorithm
  • MA Ru-Ning,WANG Xiu-Li and DING Jun-Di
  • 2013,24(3):490-506 [Abstract(2432)]  [View PDF(2541)2.61 M]
  • Periodic Intermittently Connected-Based Data Delivery in Opportunistic Networks
  • WU Lei,WU De-An,LIU Ming,WANG Xiao-Min and GONG Hai-Gang
  • 2013,24(3):507-525 [Abstract(2658)]  [View PDF(3776)2.26 M]
  • Evolutionary Game Theoretical Resource Deployment Model for P2P Networks
  • ZHOU Jing-Ya,SONG Ai-Bo and LUO Jun-Zhou
  • 2013,24(3):526-539 [Abstract(2863)]  [View PDF(2967)941.69 K]
  • Online Identification of Tor Anonymous Communication Traffic
  • HE Gao-Feng,YANG Ming,LUO Jun-Zhou and ZHANG Lu
  • 2013,24(3):540-556 [Abstract(2637)]  [View PDF(6040)2.40 M]
  • Virtual Nodes-Based Wavelet Compression Algorithm for Wireless Sensor Networks
  • YANG Sheng-Hong,JIA Yan and ZHOU Si-Wang
  • 2013,24(3):557-563 [Abstract(1959)]  [View PDF(2804)589.65 K]
  • Delegation Based Cross-Domain Access Control Model Under Cloud Computing for Mobile Terminal
  • YUAN Jia-Bin,WEI Li-Li and ZENG Qing-Hua
  • 2013,24(3):564-574 [Abstract(2470)]  [View PDF(2714)750.06 K]
  • Centralized Intra-Domain Protection Routing Mechanism for Low-Connectivity Topology
  • TAN Jing,LUO Jun-Zhou and LI Wei
  • 2013,24(3):575-592 [Abstract(1816)]  [View PDF(2095)1.10 M]
  • Contents

  • Control Algorithm and Performance Analysis Model of Multi-log2N Switching Networks
  • LIU Xiao-Feng,ZHAO You-Jian and WU Ya-Juan
  • 2013,24(3):593-603 [Abstract(3079)]  [View PDF(2900)753.04 K]
  • Contents

  • Noise-Tolerant and Optimal Segmentation of Message Formats for Unknown Application- Layer Protocols
  • LI Min and YU Shun-Zheng
  • 2013,24(3):604-617 [Abstract(2262)]  [View PDF(2605)857.35 K]
  • Security Analysis of a Certificateless Signcryption Scheme
  • HE De-Biao
  • 2013,24(3):618-622 [Abstract(2281)]  [View PDF(2914)427.56 K]
  • Face Segmentation Based on a Hybrid Energy Based Active Contour Model
  • GONG Xun,WANG Guo-Yin,LI Tian-Rui,LI Xin-Xin,XIA Ran and FENG Lin
  • 2013,24(3):623-638 [Abstract(2323)]  [View PDF(3075)1.15 M]
  • Maximum Intensity Projection Based on Visual Perception Enhancement
  • ZHOU Zhi-Guang,TAO Yu-Bo and LIN Hai
  • 2013,24(3):639-650 [Abstract(2238)]  [View PDF(3172)1.40 M]
  • From Point Cloud to Triangular Mesh by Growing Neural Gas
  • ZENG Feng,YANG Tong and YAO Shan
  • 2013,24(3):651-662 [Abstract(1990)]  [View PDF(2953)1.80 M]