Volume 26,Issue 3,2015 Table of Contents

Other Issues:  
  
Contents

  • Resource Location Flooding Strategy of Unstructured P2P for User Requirements
  • HE Ming, ZHANG Yu-Jie and MENG Xiang-Wu
  • 2015,26(3):640-662 [Abstract(2011)]  [View PDF(2184)723.77 K]
  • Extracting and Analyzing Internet Background Radiation in Live Networks
  • MIAO Li-Hua, DING Wei and YANG Wang
  • 2015,26(3):663-679 [Abstract(1701)]  [View PDF(2004)1.10 M]
  • 3D Point Cloud Shape Feature Descriptor Using 2D Principal Manifold
  • SUN Xiao-Peng, WANG Guan, WANG Lu and WEI Xiao-Peng
  • 2015,26(3):699-709 [Abstract(2233)]  [View PDF(3079)1.48 M]
  • Special Issue's Articles

  • 业务过程管理技术专题前言
  • 王建民,尹建伟,窦万春
  • 2015,26(3):447-448 [Abstract(3364)]  [View PDF(2416)199.70 K]
  • Behavioral Similarity Algorithm for Process Models Based on Firing Sequence Collection
  • DONG Zi-He, WEN Li-Jie, HUANG Hao-Wei and WANG Jian-Min
  • 2015,26(3):449-459 [Abstract(3336)]  [View PDF(2440)750.70 K]
  • Matching Process Model Variants Based on Process Structure Tree
  • LING Ji-Min and ZHANG Li
  • 2015,26(3):460-473 [Abstract(3198)]  [View PDF(2222)792.24 K]
  • Mapping Elements Between Process Models Based on Petri Net
  • CAO Bin, WANG Jia-Xing, FAN Jing and DONG Tian-Yang
  • 2015,26(3):474-490 [Abstract(3206)]  [View PDF(2491)1.42 M]
  • Method for Behavior Conformance Checking Based on Artifact Snapshot Sequences
  • LIU Hai-Bin, LIU Guo-Hua, HUANG Li-Ming and SONG Jin-Ling
  • 2015,26(3):491-508 [Abstract(3033)]  [View PDF(2243)1.03 M]
  • Method for Conformance Checking Based on Token Log
  • LI Chuan-Yi, GE Ji-Dong, HU Hai-Yang, HU Hao and LUO Bin
  • 2015,26(3):509-532 [Abstract(3072)]  [View PDF(2332)1.58 M]
  • Parallelized Heuristic Process Mining Algorithm
  • LU Fa-Ming, ZENG Qing-Tian, DUAN Hua, CHENG Jiu-Jun and BAO Yun-Xia
  • 2015,26(3):533-549 [Abstract(3450)]  [View PDF(2669)1.05 M]
  • Process Mining Approach for Diverse Application Environments
  • YANG Li-Qin, KANG Guo-Sheng, GUO Li-Peng, TIAN Zhao-Yang, ZHANG Liang, ZHANG Xiao-Nan and GAO Xiang
  • 2015,26(3):550-561 [Abstract(3274)]  [View PDF(2385)744.22 K]
  • Workflow Task Assignment Strategy Based on Social Context
  • YU Yang, WANG Ying, LIU Xing-Mei and CHEN Jian
  • 2015,26(3):562-573 [Abstract(3684)]  [View PDF(2618)922.77 K]
  • Instance Aspect Handling-Oriented Scheduling Optimization in Workflows
  • WEN Yi-Ping, LIU Jian-Xun and CHEN Zhi-Gang
  • 2015,26(3):574-583 [Abstract(3190)]  [View PDF(2273)630.63 K]
  • Business Process Modeling with Geospatial Constraints
  • ZHU Xin-Wei, ZHU Guo-Bin and Seppe VANDEN BROUCKE
  • 2015,26(3):584-599 [Abstract(3239)]  [View PDF(2067)1.25 M]
  • Review Articles

  • Research Progress on Routing Problem in Mobile Opportunistic Networks
  • MA Hua-Dong, YUAN Pei-Yan and ZHAO Dong
  • 2015,26(3):600-616 [Abstract(5945)]  [View PDF(4114)926.06 K]
  • Location Privacy Preservation in Wireless Sensor Networks
  • PENG Hui, CHEN Hong, ZHANG Xiao-Ying, FAN Yong-Jian, LI Cui-Ping and LI De-Ying
  • 2015,26(3):617-639 [Abstract(5306)]  [View PDF(3506)1.10 M]
  • Research of Energy Consumption Optimization Methods for Cloud Video Surveillance System
  • XIONG Yong-Hua, ZHANG Yin-Sheng, CHEN Xin and WU Min
  • 2015,26(3):680-698 [Abstract(4746)]  [View PDF(3169)1017.61 K]