Volume 23,Issue 1,2012 Table of Contents

Other Issues:  
  
Contents

  • Facial Expression Analysis Based on Synergetic Trust Model in Proactive Environment
  • XU Chao,FENG Zhi-Yong and WANG Jia-Fang
  • 2012,23(1):21-31 [Abstract(5806)]  [View PDF(6194)702.54 K]
  • Multi-Path Routing Algorithm for Video Stream in Wireless Multimedia Sensor Networks
  • CAO Xiao,WANG Ru-Chuan,HUANG Hai-Ping,SUN Li-Juan and XIAO Fu
  • 2012,23(1):108-121 [Abstract(5563)]  [View PDF(7322)875.68 K]
  • Algorithms for Joint Spectrum Allocation and Cooperation Set Partition in Cognitive Radio Networks
  • YANG Wei,BAN Dong-Song,LIANG Wei-Fa and DOU Wen-Hua
  • 2012,23(1):122-139 [Abstract(5320)]  [View PDF(7074)1005.85 K]
  • Cube Attack on Grain
  • SONG Hai-Xin,FAN Xiu-Bin,WU Chuan-Kun and FENG Deng-Guo
  • 2012,23(1):171-176 [Abstract(5780)]  [View PDF(8574)373.65 K]
  • Review Articles

  • Context-Aware Recommender Systems
  • WANG Li-Cai,MENG Xiang-Wu and ZHANG Yu-Jie
  • 2012,23(1):1-20 [Abstract(14749)]  [View PDF(34462)1017.73 K]
  • Big Data Analysis—Competition and Symbiosis of RDBMS and MapReduce
  • QIN Xiong-Pai,WANG Hui-Ju,DU Xiao-Yong and WANG Shan
  • 2012,23(1):32-45 [Abstract(18828)]  [View PDF(33531)408.86 K]
  • Research on Mobile Web Search
  • ZHANG Jin-Zeng and MENG Xiao-Feng
  • 2012,23(1):46-64 [Abstract(10365)]  [View PDF(12422)493.82 K]
  • Inter-Domain Multipath Routing Protocols
  • SU Jin-Shu,DAI Bin,LIU Yu-Jing and PENG Wei
  • 2012,23(1):65-81 [Abstract(9035)]  [View PDF(10389)348.87 K]
  • Research on Botnet Mechanisms and Defenses
  • JIANG Jian,ZHUGE Jian-Wei,DUAN Hai-Xin and WU Jian-Ping
  • 2012,23(1):82-96 [Abstract(13090)]  [View PDF(16645)394.07 K]
  • Online First

  • Dual IP Address Spaces Architecture
  • QIAN Hua-Lin,E Yue-Peng,GE Jing-Guo,REN Yong-Mao and YOU Jun-Ling
  • 2012,23(1):97-107 [Abstract(6813)]  [View PDF(7195)606.79 K]
  • Review Articles

  • Random Oracle Model
  • JIA Xiao-Ying,LI Bao and LIU Ya-Min
  • 2012,23(1):140-151 [Abstract(8903)]  [View PDF(13018)641.54 K]
  • Research on the Format-Preserving Encryption Techniques
  • LIU Zhe-Li,JIA Chun-Fu and LI Jing-Wei
  • 2012,23(1):152-170 [Abstract(9456)]  [View PDF(15440)924.40 K]