Volume 24,Issue 6,2013 Table of Contents

Other Issues:  
  
Contents

  • Multi-Objective Cooperative Co-Evolutionary Algorithm for Negotiated Scheduling of Distribution Supply Chain
  • SU Sheng,YU Hai-Jie,WU Zheng-Hua,YAO Yuan-Zhe and ZHANG Liang
  • 2013,24(6):1165-1176 [Abstract(2427)]  [View PDF(2782)706.02 K]
  • Differential Evolution Algorithm for Multimodal Optimization Based on Abstract Convex Underestimation
  • ZHANG Gui-Jun,HE Yang-Jun,GUO Hai-Feng,FENG Yuan-Jing and XU Jian-Ming
  • 2013,24(6):1177-1195 [Abstract(2258)]  [View PDF(2239)1.07 M]
  • Hybrid Parallel Method for XML Parsing
  • FANG Yue-Jian,YU Zhi-Qiang,ZHAI Lei and WU Zhong-Hai
  • 2013,24(6):1196-1206 [Abstract(2478)]  [View PDF(2515)617.53 K]
  • Path Balance Based Heuristics for Cost Optimization in Workflow Scheduling
  • LIU Can-Can,ZHANG Wei-Min and LUO Zhi-Gang
  • 2013,24(6):1207-1221 [Abstract(2252)]  [View PDF(2244)749.30 K]
  • Uncertain Moving Range Query Techniques in Road Networks
  • GU Yu,GUO Na and YU Ge
  • 2013,24(6):1243-1262 [Abstract(2000)]  [View PDF(2419)1.16 M]
  • Method of Detecting Application-Layer DDoS Based on the Out-Linking Behavior of Web Community
  • WANG Feng-Yu,CAO Shou-Feng,XIAO Jun,YUN Xiao-Chun and GONG Bin
  • 2013,24(6):1263-1273 [Abstract(2241)]  [View PDF(2693)652.65 K]
  • Secure Routing Architecture Based on Accountability Realm
  • LU Ning-Ning and ZHANG Hong-Ke
  • 2013,24(6):1274-1294 [Abstract(2198)]  [View PDF(2603)1.14 M]
  • Low-Interference Multicast in Wireless Mesh Networks
  • XIAO Chun-Jing,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai,ZHOU Fan and WU Yue
  • 2013,24(6):1295-1309 [Abstract(2157)]  [View PDF(1938)792.31 K]
  • Dynamic Hierarchical Power Control in Multi-User Cognitive Wi-Fi 2.0 Wireless Networks
  • YANG Chun-Gang,SHENG Min,LI Jian-Dong and LI Hong-Yan
  • 2013,24(6):1310-1323 [Abstract(2188)]  [View PDF(2803)916.75 K]
  • Guess and Determine Attack on SNOW3G and ZUC
  • GUAN Jie,DING Lin and LIU Shu-Kai
  • 2013,24(6):1324-1333 [Abstract(2186)]  [View PDF(4214)631.92 K]
  • Protocol Independent Identification of Encrypted Traffic Based on Weighted Cumulative Sum Test
  • ZHAO Bo,GUO Hong,LIU Qin-Rang and WU Jiang-Xing
  • 2013,24(6):1334-1345 [Abstract(2236)]  [View PDF(3421)661.41 K]
  • Static Analysis for the Placement of Application-Level Checkpoints on Heterogeneous System
  • JIA Jia,YANG Xue-Jun and MA Ya-Qing
  • 2013,24(6):1361-1375 [Abstract(1738)]  [View PDF(2233)1.24 M]
  • Multicore-Oriented Service Optimization of Parallel Discrete Event Simulation
  • TANG Wen-Jie and YAO Yi-Ping
  • 2013,24(6):1376-1389 [Abstract(2065)]  [View PDF(3558)765.50 K]
  • Enabling Elasticity of Key-Value Stores in the Cloud Using Cost-Aware Live Data Migration
  • QIN Xiu-Lei,ZHANG Wen-Bo,WANG Wei,WEI Jun,ZHAO Xin,ZHONG Hua and HUANG Tao
  • 2013,24(6):1403-1417 [Abstract(2528)]  [View PDF(3089)1.52 M]
  • Review Articles

  • Survey of RDF Query Processing Techniques
  • DU Fang,CHEN Yue-Guo and DU Xiao-Yong
  • 2013,24(6):1222-1242 [Abstract(6291)]  [View PDF(7482)1.06 M]
  • Research on the Technologies of Byzantine System
  • FAN Jie,YI Le-Tian and SHU Ji-Wu
  • 2013,24(6):1346-1360 [Abstract(6241)]  [View PDF(8461)1022.34 K]
  • Deterministic Replay for Parallel Programs in Multi-Core Processors
  • GAO Lan,WANG Rui and QIAN De-Pei
  • 2013,24(6):1390-1402 [Abstract(5399)]  [View PDF(4277)728.82 K]