Volume 21,Issue 10,2010 Table of Contents
Mining Evolutionary Events from Multi-Streams Based on Spectral ClusteringYANG Ning,TANG Chang-Jie,WANG Yue,CHEN Yu and ZHENG Jiao-Ling2010,21(10):2395-2409 [Abstract(5312)] [View PDF(6614)866.87 K]Sparse Coding Model Based on Structural SimilarityLI Zhi-Qing,SHI Zhi-Ping,LI Zhi-Xin and SHI Zhong-Zhi2010,21(10):2410-2419 [Abstract(4809)] [View PDF(7291)828.34 K]Density Sensitive Based Multi-Agent Evolutionary Clustering AlgorithmPAN Xiao-Ying,LIU Fang and JIAO Li-Cheng2010,21(10):2420-2431 [Abstract(4984)] [View PDF(6632)898.38 K]Web Relationship Mining Based on Extended Concept LatticeJIANG Feng and FAN Yu-Shun2010,21(10):2432-2444 [Abstract(5106)] [View PDF(6168)557.56 K]Semi-Supervised Discriminant Analysis Based on Manifold DistanceWEI Lai and WANG Shou-Jue2010,21(10):2445-2453 [Abstract(5662)] [View PDF(7056)513.21 K]Mining Frequent Jump Patterns from Graph DatabasesLIU Yong,LI Jian-Zhong and GAO Hong2010,21(10):2477-2493 [Abstract(5206)] [View PDF(6672)691.74 K]What-If Query Processing Policy of Main-Memory OLAP SystemZHANG Yan-Song,XIAO Yan-Qin,WANG Shan and CHEN Hong2010,21(10):2494-2512 [Abstract(4537)] [View PDF(6426)763.61 K]Adaptive Algorithm for Soft Subspace ClusteringCHEN Li-Fei,GUO Gong-De and JIANG Qing-Shan2010,21(10):2513-2523 [Abstract(5228)] [View PDF(8503)508.15 K]Routing Protocols for Delay and Disruption Tolerant NetworksZHANG Long,ZHOU Xian-Wei,WANG Jian-Ping,DENG Yu and WU Qi-Wu2010,21(10):2554-2572 [Abstract(5031)] [View PDF(9707)974.66 K]Anomaly Detection Based on Traffic Information StructureZHU Ying-Wu,YANG Jia-Hai and ZHANG Jin-Xiang2010,21(10):2573-2583 [Abstract(10852)] [View PDF(7793)480.80 K]Co-Monitor: Collaborative Monitoring Mechanism for Detecting Prefix HijacksLIU Xin,ZHU Pei-Dong and PENG Yu-Xing2010,21(10):2584-2598 [Abstract(5129)] [View PDF(6555)884.86 K]Automated Signature Generation Approach for Polymorphic Worm Based on Color CodingWANG Jie,WANG Jian-Xin and CHEN Jian-Er2010,21(10):2599-2609 [Abstract(4249)] [View PDF(5856)437.52 K]Heuristic Fault Localization Algorithm Based on Bayesian Suspected DegreeZHANG Cheng,LIAO Jian-Xin and ZHU Xiao-Min2010,21(10):2610-2621 [Abstract(4948)] [View PDF(8372)719.18 K]Strategy of Content Location of P2P Based on the Social NetworkHUANG Yong-Sheng,MENG Xiang-Wu and ZHANG Yu-Jie2010,21(10):2622-2630 [Abstract(5663)] [View PDF(6684)437.22 K]Server Protocols of Byzantine Quorum Systems Implemented Utilizing Threshold Signature SchemesJING Ji-Wu,WANG Jing,LIN Jing-Qiang,XIE Yong-Quan and GU Qing2010,21(10):2631-2641 [Abstract(4243)] [View PDF(5930)424.46 K]Space-Efficient Fair Packet Sampling AlgorithmZHANG Jin,WU Jiang-Xing and NIU Xiao-Na2010,21(10):2642-2655 [Abstract(4565)] [View PDF(6168)895.92 K]Greedy Approximation Algorithm of Minimum Cover Set in Wireless Sensor NetworksLU Ke-Zhong and SUN Hong-Yuan2010,21(10):2656-2665 [Abstract(4858)] [View PDF(6535)444.07 K]e-MAC: A High Throughput MAC Protocol for Ad Hoc NetworksZHANG Ke-Wang,PAN Yu,ZHANG Qiong and ZHANG De-Yun2010,21(10):2666-2676 [Abstract(4503)] [View PDF(6081)501.43 K]Replication in Intermittently Connected Mobile Ad Hoc NetworksSHI Ke and DONG Yan2010,21(10):2677-2689 [Abstract(3966)] [View PDF(6193)653.51 K]ID-Based Channel Reservation Multiple Access for Mobile Ad Hoc NetworksXING Xiao-Qin and LIU Kai2010,21(10):2690-2700 [Abstract(4013)] [View PDF(6620)848.32 K]
Keyword Search over Relational DatabasesLIN Zi-Yu,YANG Dong-Qing,WANG Teng-Jiao and ZHANG Dong-Zhan2010,21(10):2454-2476 [Abstract(10793)] [View PDF(12315)714.50 K]Scalable Routing for the InternetTANG Ming-Dong,ZHANG Guo-Qing,YANG Jing and ZHANG Guo-Qiang2010,21(10):2524-2541 [Abstract(7619)] [View PDF(11864)743.51 K]Opportunistic Routing Protocols for Wireless Multihop NetworksTIAN Ke,ZHANG Bao-Xian,MA Jian and YAO Zheng2010,21(10):2542-2553 [Abstract(8644)] [View PDF(16634)516.29 K]