Volume 24,Issue 6,2013 Table of Contents

Other Issues:  
  
Contents

  • Multi-Objective Cooperative Co-Evolutionary Algorithm for Negotiated Scheduling of Distribution Supply Chain
  • SU Sheng,YU Hai-Jie,WU Zheng-Hua,YAO Yuan-Zhe and ZHANG Liang
  • 2013,24(6):1165-1176 [Abstract(2302)]  [View PDF(2735)706.02 K]
  • Differential Evolution Algorithm for Multimodal Optimization Based on Abstract Convex Underestimation
  • ZHANG Gui-Jun,HE Yang-Jun,GUO Hai-Feng,FENG Yuan-Jing and XU Jian-Ming
  • 2013,24(6):1177-1195 [Abstract(2164)]  [View PDF(2202)1.07 M]
  • Hybrid Parallel Method for XML Parsing
  • FANG Yue-Jian,YU Zhi-Qiang,ZHAI Lei and WU Zhong-Hai
  • 2013,24(6):1196-1206 [Abstract(2333)]  [View PDF(2458)617.53 K]
  • Path Balance Based Heuristics for Cost Optimization in Workflow Scheduling
  • LIU Can-Can,ZHANG Wei-Min and LUO Zhi-Gang
  • 2013,24(6):1207-1221 [Abstract(2124)]  [View PDF(2160)749.30 K]
  • Uncertain Moving Range Query Techniques in Road Networks
  • GU Yu,GUO Na and YU Ge
  • 2013,24(6):1243-1262 [Abstract(1906)]  [View PDF(2360)1.16 M]
  • Method of Detecting Application-Layer DDoS Based on the Out-Linking Behavior of Web Community
  • WANG Feng-Yu,CAO Shou-Feng,XIAO Jun,YUN Xiao-Chun and GONG Bin
  • 2013,24(6):1263-1273 [Abstract(2090)]  [View PDF(2637)652.65 K]
  • Secure Routing Architecture Based on Accountability Realm
  • LU Ning-Ning and ZHANG Hong-Ke
  • 2013,24(6):1274-1294 [Abstract(2090)]  [View PDF(2474)1.14 M]
  • Low-Interference Multicast in Wireless Mesh Networks
  • XIAO Chun-Jing,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai,ZHOU Fan and WU Yue
  • 2013,24(6):1295-1309 [Abstract(2030)]  [View PDF(1900)792.31 K]
  • Dynamic Hierarchical Power Control in Multi-User Cognitive Wi-Fi 2.0 Wireless Networks
  • YANG Chun-Gang,SHENG Min,LI Jian-Dong and LI Hong-Yan
  • 2013,24(6):1310-1323 [Abstract(2098)]  [View PDF(2750)916.75 K]
  • Guess and Determine Attack on SNOW3G and ZUC
  • GUAN Jie,DING Lin and LIU Shu-Kai
  • 2013,24(6):1324-1333 [Abstract(2049)]  [View PDF(4088)631.92 K]
  • Protocol Independent Identification of Encrypted Traffic Based on Weighted Cumulative Sum Test
  • ZHAO Bo,GUO Hong,LIU Qin-Rang and WU Jiang-Xing
  • 2013,24(6):1334-1345 [Abstract(2103)]  [View PDF(3315)661.41 K]
  • Static Analysis for the Placement of Application-Level Checkpoints on Heterogeneous System
  • JIA Jia,YANG Xue-Jun and MA Ya-Qing
  • 2013,24(6):1361-1375 [Abstract(1636)]  [View PDF(2154)1.24 M]
  • Multicore-Oriented Service Optimization of Parallel Discrete Event Simulation
  • TANG Wen-Jie and YAO Yi-Ping
  • 2013,24(6):1376-1389 [Abstract(1958)]  [View PDF(3519)765.50 K]
  • Enabling Elasticity of Key-Value Stores in the Cloud Using Cost-Aware Live Data Migration
  • QIN Xiu-Lei,ZHANG Wen-Bo,WANG Wei,WEI Jun,ZHAO Xin,ZHONG Hua and HUANG Tao
  • 2013,24(6):1403-1417 [Abstract(2411)]  [View PDF(3000)1.52 M]
  • Review Articles

  • Survey of RDF Query Processing Techniques
  • DU Fang,CHEN Yue-Guo and DU Xiao-Yong
  • 2013,24(6):1222-1242 [Abstract(6059)]  [View PDF(7342)1.06 M]
  • Research on the Technologies of Byzantine System
  • FAN Jie,YI Le-Tian and SHU Ji-Wu
  • 2013,24(6):1346-1360 [Abstract(5827)]  [View PDF(8146)1022.34 K]
  • Deterministic Replay for Parallel Programs in Multi-Core Processors
  • GAO Lan,WANG Rui and QIAN De-Pei
  • 2013,24(6):1390-1402 [Abstract(5178)]  [View PDF(4176)728.82 K]