Volume 24,Issue 3,2013 Table of Contents

Other Issues:  
  
Contents

  • Model Checking for Event Graphs and Event Temporal Logic
  • XIA Wei,YAO Yi-Ping and MU Xiao-Dong
  • 2013,24(3):421-432 [Abstract(4105)]  [View PDF(5208)759.59 K]
  • Normal Form of Łukasiewicz Logic Formulae and Related Counting Problems
  • WANG Qing-Ping and WANG Guo-Jun
  • 2013,24(3):433-453 [Abstract(4022)]  [View PDF(4558)1.12 M]
  • Using Unified Probabilistic Matrix Factorization for Contextual Advertisement Recommendation
  • TU Dan-Dan,SHU Cheng-Chun and YU Hai-Yan
  • 2013,24(3):454-464 [Abstract(5834)]  [View PDF(10204)585.57 K]
  • Clustering Trajectories of Entities in Computer Wargames
  • SHI Chong-Lin,GAN Wen-Yan,WU Lin,ZHANG Mao-Jun and TANG Yu-Bo
  • 2013,24(3):465-475 [Abstract(4338)]  [View PDF(5617)977.50 K]
  • Many-Objective Evolutionary Algorithm Based on Bipolar Preferences Dominance
  • QIU Fei-Yue,WU Yu-Shi,QIU Qi-Cang and WANG Li-Ping
  • 2013,24(3):476-489 [Abstract(4171)]  [View PDF(5346)953.23 K]
  • Multilevel Core-Sets Based Aggregation Clustering Algorithm
  • MA Ru-Ning,WANG Xiu-Li and DING Jun-Di
  • 2013,24(3):490-506 [Abstract(3738)]  [View PDF(4744)2.61 M]
  • Periodic Intermittently Connected-Based Data Delivery in Opportunistic Networks
  • WU Lei,WU De-An,LIU Ming,WANG Xiao-Min and GONG Hai-Gang
  • 2013,24(3):507-525 [Abstract(4163)]  [View PDF(6443)2.26 M]
  • Evolutionary Game Theoretical Resource Deployment Model for P2P Networks
  • ZHOU Jing-Ya,SONG Ai-Bo and LUO Jun-Zhou
  • 2013,24(3):526-539 [Abstract(4342)]  [View PDF(6078)941.69 K]
  • Online Identification of Tor Anonymous Communication Traffic
  • HE Gao-Feng,YANG Ming,LUO Jun-Zhou and ZHANG Lu
  • 2013,24(3):540-556 [Abstract(4792)]  [View PDF(12100)2.40 M]
  • Virtual Nodes-Based Wavelet Compression Algorithm for Wireless Sensor Networks
  • YANG Sheng-Hong,JIA Yan and ZHOU Si-Wang
  • 2013,24(3):557-563 [Abstract(3296)]  [View PDF(4585)589.65 K]
  • Delegation Based Cross-Domain Access Control Model Under Cloud Computing for Mobile Terminal
  • YUAN Jia-Bin,WEI Li-Li and ZENG Qing-Hua
  • 2013,24(3):564-574 [Abstract(3789)]  [View PDF(5027)750.06 K]
  • Centralized Intra-Domain Protection Routing Mechanism for Low-Connectivity Topology
  • TAN Jing,LUO Jun-Zhou and LI Wei
  • 2013,24(3):575-592 [Abstract(3083)]  [View PDF(4282)1.10 M]
  • Contents

  • Control Algorithm and Performance Analysis Model of Multi-log2N Switching Networks
  • LIU Xiao-Feng,ZHAO You-Jian and WU Ya-Juan
  • 2013,24(3):593-603 [Abstract(4538)]  [View PDF(5072)753.04 K]
  • Contents

  • Noise-Tolerant and Optimal Segmentation of Message Formats for Unknown Application- Layer Protocols
  • LI Min and YU Shun-Zheng
  • 2013,24(3):604-617 [Abstract(3732)]  [View PDF(5881)857.35 K]
  • Security Analysis of a Certificateless Signcryption Scheme
  • HE De-Biao
  • 2013,24(3):618-622 [Abstract(3736)]  [View PDF(5402)427.56 K]
  • Face Segmentation Based on a Hybrid Energy Based Active Contour Model
  • GONG Xun,WANG Guo-Yin,LI Tian-Rui,LI Xin-Xin,XIA Ran and FENG Lin
  • 2013,24(3):623-638 [Abstract(3935)]  [View PDF(5602)1.15 M]
  • Maximum Intensity Projection Based on Visual Perception Enhancement
  • ZHOU Zhi-Guang,TAO Yu-Bo and LIN Hai
  • 2013,24(3):639-650 [Abstract(3732)]  [View PDF(6465)1.40 M]
  • From Point Cloud to Triangular Mesh by Growing Neural Gas
  • ZENG Feng,YANG Tong and YAO Shan
  • 2013,24(3):651-662 [Abstract(3379)]  [View PDF(6718)1.80 M]