Volume 24,Issue 9,2013 Table of Contents

Other Issues:  
  
Contents

  • Web Service Test Data Generation Using Interface Semantic Contract
  • HOU Ke-Jia,BAI Xiao-Ying,LU Hao,LI Shu-Fang and ZHOU Li-Zhu
  • 2013,24(9):2020-2041 [Abstract(2275)]  [View PDF(2478)1.72 M]
  • Contents

  • Discovering Network Community Based on Multi-Objective Optimization
  • HUANG Fa-Liang,ZHANG Shi-Chao and ZHU Xiao-Feng
  • 2013,24(9):2062-2077 [Abstract(5120)]  [View PDF(8873)1.02 M]
  • Contents

  • Heuristics for Solving the 2D Rectangle Packing Area Minimization Problem Basing on a Dynamic Reduction Method
  • HE Kun,JI Peng-Li and LI Chu-Min
  • 2013,24(9):2078-2088 [Abstract(2160)]  [View PDF(3237)641.90 K]
  • Domain-Specific Terms Extraction Based on Web Resource and User Behavior
  • YAN Xing-Long,LIU Yi-Qun,FANG Qi,ZHANG Min,MA Shao-Ping and RU Li-Yun
  • 2013,24(9):2089-2100 [Abstract(2292)]  [View PDF(2844)713.33 K]
  • Hand Tracking Based on Behavioral Analysis for Users
  • FENG Zhi-Quan,YANG Bo,ZHENG Yan-Wei,XU Tao and TANG Hao-Kui
  • 2013,24(9):2101-2116 [Abstract(2185)]  [View PDF(2919)1.04 M]
  • Query Mechanism for File Correlation in Cooperative Replica Prefetching
  • TIAN Tian,LUO Jun-Zhou,SONG Ai-Bo and Dong Fang
  • 2013,24(9):2117-2131 [Abstract(2054)]  [View PDF(1973)806.08 K]
  • Limited Search Mechanism for Unstructured Peer-to-Peer Network
  • MEI Hong-Yan,ZHANG Yu-Jie,MENG Xiang-Wu and MA Wen-Ming
  • 2013,24(9):2132-2150 [Abstract(2203)]  [View PDF(2006)1007.92 K]
  • Event Triggered-Based Flow Control Algorithm for Mixed Traffic in Wireless Sensor Networks
  • WEN Shu-Sheng,HUANG Jiong,SHU Ting,XU Wei-Qiang and WANG Ya-Ming
  • 2013,24(9):2151-2164 [Abstract(2039)]  [View PDF(2052)737.84 K]
  • Statistics Counter Architecture for Backbone Network Traffic Analysis and Management
  • ZHANG Jin,HUANG Qing-Shan,ZHAO Wen-Dong and PENG Lai-Xian
  • 2013,24(9):2165-2181 [Abstract(2220)]  [View PDF(1821)1.11 M]
  • Embedding Method for Packet Loss Self-Measurement of Video Streaming
  • HU Zhi-Guo,ZHANG Da-Lu,GU Li-Li,ZHANG Qi-Qiang,CHEN Zhi-Wei,ZHOU Hua-Lei and CAO Xiao-Jing
  • 2013,24(9):2182-2195 [Abstract(1976)]  [View PDF(2813)818.13 K]
  • Moving Target Localization and Tracking Algorithms: A Particle Filter Based Method
  • ZHOU Fan,JIANG Wei,LI Shu-Quan,ZHANG Yu-Hong,ZENG Xue and WU Yue
  • 2013,24(9):2196-2213 [Abstract(2480)]  [View PDF(4119)1.01 M]
  • Media Access Control Protocol with Differential Service in Aeronautical Frequency-Hopping Ad Hoc Networks
  • WANG Ye-Qun,YANG Feng,HUANG Guo-Ce,ZHANG Heng-Yang and GUO Jian-Xin
  • 2013,24(9):2214-2225 [Abstract(2062)]  [View PDF(2208)694.19 K]
  • Server Allocation Approach for P2P Networks and its Heuristic Algorithm
  • ZENG Ming-Fei and YU Shun-Zheng
  • 2013,24(9):2226-2237 [Abstract(2170)]  [View PDF(4017)697.00 K]
  • Efficient Attack to White-Box SMS4 Implementation
  • LIN Ting-Ting and LAI Xue-Jia
  • 2013,24(9):2238-2249 [Abstract(1986)]  [View PDF(2839)647.42 K]
  • Review Articles

  • Constructing Software with Self-Adaptability
  • DING Bo,WANG Huai-Min and SHI Dian-Xi
  • 2013,24(9):1981-2000 [Abstract(5798)]  [View PDF(4084)946.63 K]
  • Systematic Literarture Review of Software Product Line Variability Modeling Techniques
  • NIE Kun-Ming,ZHANG Li and FAN Zhi-Qiang
  • 2013,24(9):2001-2019 [Abstract(6491)]  [View PDF(4049)944.81 K]
  • Methods for Pattern Mining in Dynamic Networks and Applications
  • GAO Lin,YANG Jian-Ye and QIN Gui-Min
  • 2013,24(9):2042-2061 [Abstract(5898)]  [View PDF(4828)1.27 M]