Volume 23,Issue 1,2012 Table of Contents
Facial Expression Analysis Based on Synergetic Trust Model in Proactive EnvironmentXU Chao,FENG Zhi-Yong and WANG Jia-Fang2012,23(1):21-31 [Abstract(5806)] [View PDF(6194)702.54 K]Multi-Path Routing Algorithm for Video Stream in Wireless Multimedia Sensor NetworksCAO Xiao,WANG Ru-Chuan,HUANG Hai-Ping,SUN Li-Juan and XIAO Fu2012,23(1):108-121 [Abstract(5563)] [View PDF(7322)875.68 K]Algorithms for Joint Spectrum Allocation and Cooperation Set Partition in Cognitive Radio NetworksYANG Wei,BAN Dong-Song,LIANG Wei-Fa and DOU Wen-Hua2012,23(1):122-139 [Abstract(5320)] [View PDF(7074)1005.85 K]Cube Attack on GrainSONG Hai-Xin,FAN Xiu-Bin,WU Chuan-Kun and FENG Deng-Guo2012,23(1):171-176 [Abstract(5780)] [View PDF(8574)373.65 K]
Context-Aware Recommender SystemsWANG Li-Cai,MENG Xiang-Wu and ZHANG Yu-Jie2012,23(1):1-20 [Abstract(14749)] [View PDF(34462)1017.73 K]Big Data Analysis—Competition and Symbiosis of RDBMS and MapReduceQIN Xiong-Pai,WANG Hui-Ju,DU Xiao-Yong and WANG Shan2012,23(1):32-45 [Abstract(18828)] [View PDF(33531)408.86 K]Research on Mobile Web SearchZHANG Jin-Zeng and MENG Xiao-Feng2012,23(1):46-64 [Abstract(10365)] [View PDF(12422)493.82 K]Inter-Domain Multipath Routing ProtocolsSU Jin-Shu,DAI Bin,LIU Yu-Jing and PENG Wei2012,23(1):65-81 [Abstract(9035)] [View PDF(10389)348.87 K]Research on Botnet Mechanisms and DefensesJIANG Jian,ZHUGE Jian-Wei,DUAN Hai-Xin and WU Jian-Ping2012,23(1):82-96 [Abstract(13090)] [View PDF(16645)394.07 K]
Dual IP Address Spaces ArchitectureQIAN Hua-Lin,E Yue-Peng,GE Jing-Guo,REN Yong-Mao and YOU Jun-Ling2012,23(1):97-107 [Abstract(6813)] [View PDF(7195)606.79 K]
Random Oracle ModelJIA Xiao-Ying,LI Bao and LIU Ya-Min2012,23(1):140-151 [Abstract(8903)] [View PDF(13018)641.54 K]Research on the Format-Preserving Encryption TechniquesLIU Zhe-Li,JIA Chun-Fu and LI Jing-Wei2012,23(1):152-170 [Abstract(9456)] [View PDF(15440)924.40 K]