Volume 24,Issue 9,2013 Table of Contents

Other Issues:  
  
Contents

  • Web Service Test Data Generation Using Interface Semantic Contract
  • HOU Ke-Jia,BAI Xiao-Ying,LU Hao,LI Shu-Fang and ZHOU Li-Zhu
  • 2013,24(9):2020-2041 [Abstract(3789)]  [View PDF(5185)1.72 M]
  • Contents

  • Discovering Network Community Based on Multi-Objective Optimization
  • HUANG Fa-Liang,ZHANG Shi-Chao and ZHU Xiao-Feng
  • 2013,24(9):2062-2077 [Abstract(7486)]  [View PDF(12829)1.02 M]
  • Contents

  • Heuristics for Solving the 2D Rectangle Packing Area Minimization Problem Basing on a Dynamic Reduction Method
  • HE Kun,JI Peng-Li and LI Chu-Min
  • 2013,24(9):2078-2088 [Abstract(3885)]  [View PDF(6086)641.90 K]
  • Domain-Specific Terms Extraction Based on Web Resource and User Behavior
  • YAN Xing-Long,LIU Yi-Qun,FANG Qi,ZHANG Min,MA Shao-Ping and RU Li-Yun
  • 2013,24(9):2089-2100 [Abstract(3881)]  [View PDF(5139)713.33 K]
  • Hand Tracking Based on Behavioral Analysis for Users
  • FENG Zhi-Quan,YANG Bo,ZHENG Yan-Wei,XU Tao and TANG Hao-Kui
  • 2013,24(9):2101-2116 [Abstract(3571)]  [View PDF(5215)1.04 M]
  • Query Mechanism for File Correlation in Cooperative Replica Prefetching
  • TIAN Tian,LUO Jun-Zhou,SONG Ai-Bo and Dong Fang
  • 2013,24(9):2117-2131 [Abstract(3424)]  [View PDF(4061)806.08 K]
  • Limited Search Mechanism for Unstructured Peer-to-Peer Network
  • MEI Hong-Yan,ZHANG Yu-Jie,MENG Xiang-Wu and MA Wen-Ming
  • 2013,24(9):2132-2150 [Abstract(3569)]  [View PDF(4596)1007.92 K]
  • Event Triggered-Based Flow Control Algorithm for Mixed Traffic in Wireless Sensor Networks
  • WEN Shu-Sheng,HUANG Jiong,SHU Ting,XU Wei-Qiang and WANG Ya-Ming
  • 2013,24(9):2151-2164 [Abstract(3374)]  [View PDF(4350)737.84 K]
  • Statistics Counter Architecture for Backbone Network Traffic Analysis and Management
  • ZHANG Jin,HUANG Qing-Shan,ZHAO Wen-Dong and PENG Lai-Xian
  • 2013,24(9):2165-2181 [Abstract(3627)]  [View PDF(4021)1.11 M]
  • Embedding Method for Packet Loss Self-Measurement of Video Streaming
  • HU Zhi-Guo,ZHANG Da-Lu,GU Li-Li,ZHANG Qi-Qiang,CHEN Zhi-Wei,ZHOU Hua-Lei and CAO Xiao-Jing
  • 2013,24(9):2182-2195 [Abstract(3577)]  [View PDF(5814)818.13 K]
  • Moving Target Localization and Tracking Algorithms: A Particle Filter Based Method
  • ZHOU Fan,JIANG Wei,LI Shu-Quan,ZHANG Yu-Hong,ZENG Xue and WU Yue
  • 2013,24(9):2196-2213 [Abstract(4109)]  [View PDF(8101)1.01 M]
  • Media Access Control Protocol with Differential Service in Aeronautical Frequency-Hopping Ad Hoc Networks
  • WANG Ye-Qun,YANG Feng,HUANG Guo-Ce,ZHANG Heng-Yang and GUO Jian-Xin
  • 2013,24(9):2214-2225 [Abstract(3542)]  [View PDF(4493)694.19 K]
  • Server Allocation Approach for P2P Networks and its Heuristic Algorithm
  • ZENG Ming-Fei and YU Shun-Zheng
  • 2013,24(9):2226-2237 [Abstract(3406)]  [View PDF(6113)697.00 K]
  • Efficient Attack to White-Box SMS4 Implementation
  • LIN Ting-Ting and LAI Xue-Jia
  • 2013,24(9):2238-2249 [Abstract(3417)]  [View PDF(5568)647.42 K]
  • Review Articles

  • Constructing Software with Self-Adaptability
  • DING Bo,WANG Huai-Min and SHI Dian-Xi
  • 2013,24(9):1981-2000 [Abstract(8621)]  [View PDF(8086)946.63 K]
  • Systematic Literarture Review of Software Product Line Variability Modeling Techniques
  • NIE Kun-Ming,ZHANG Li and FAN Zhi-Qiang
  • 2013,24(9):2001-2019 [Abstract(9061)]  [View PDF(8109)944.81 K]
  • Methods for Pattern Mining in Dynamic Networks and Applications
  • GAO Lin,YANG Jian-Ye and QIN Gui-Min
  • 2013,24(9):2042-2061 [Abstract(8465)]  [View PDF(10172)1.27 M]