Volume 22,Issue 10,2011 Table of Contents
Concurrent Redundancy Problem and Control MethodsHE Qian,MENG Xiang-Wu,CHEN Jun-Liang and SHEN Xiao-Yan2011,22(10):2263-2278 [Abstract(4869)] [View PDF(6777)466.03 K]Shortest Path Approximate Algorithm for Complex Network AnalysisTANG Jin-Tao,WANG Ting and WANG Ji2011,22(10):2279-2290 [Abstract(6236)] [View PDF(11900)689.62 K]Improved ε Dominance by IsomapYANG Dong-Dong,MA Jing-Jing,JIAO Li-Cheng,GONG Mao-Guo and SI Xiao-Yun2011,22(10):2291-2304 [Abstract(4885)] [View PDF(6748)1.47 M]Improved RLS Algorithm with Color-Partition and Performance AnalysisZHANG Yan,JIAO Fang-Zheng,LU Xin-Wei and HUANG Yong-Xuan2011,22(10):2305-2316 [Abstract(3996)] [View PDF(5930)701.37 K]Movement Control Algorithms for Improving Topology Control Performance in Ad Hoc NetworksGONG Wei-Bin,CHANG Yi-Lin and SHEN Zhong2011,22(10):2335-2345 [Abstract(4648)] [View PDF(5346)655.54 K]Accurate and Adaptive Reputation Mechanism for P2P File Sharing NetworkWANG Miao,TAO Fei,ZHANG Yu-Jun and LI Guo-Jie2011,22(10):2346-2357 [Abstract(4049)] [View PDF(5786)809.77 K]Interval Centroid Based Flow Watermarking Technique for Anonymous Communication TracebackZHANG Lu,LUO Jun-Zhou,YANG Ming and HE Gao-Feng2011,22(10):2358-2371 [Abstract(4395)] [View PDF(6360)588.54 K]Cooperative Replica Prefetching Mechanism for Virtual Organization in GridTIAN Tian,LUO Jun-Zhou,SONG Ai-Bo and WU Zhi-Ang2011,22(10):2372-2384 [Abstract(4479)] [View PDF(5540)780.21 K]Fault-Tolerant Approach Based on Pool for MAG in PMIPv6ZHANG Han-Wen,XU Zhi-Jun,ZHANG Yu-Jun,LI Zhong-Cheng and ZHOU Ji-Hua2011,22(10):2385-2400 [Abstract(5023)] [View PDF(5559)843.17 K]Reputation-Based Multi-Dimensional Trust AlgorithmGAN Zao-Bin,DING Qian,LI Kai and XIAO Guo-Qiang2011,22(10):2401-2411 [Abstract(5703)] [View PDF(7676)909.40 K]Rate-Distortion Optimized Multi-Path Selection for Video Streaming over Wireless Multi-Hop NetworksZHANG Xing-Gong and GUO Zong-Ming2011,22(10):2412-2424 [Abstract(4287)] [View PDF(6793)717.77 K]Random Spoofed Source Address Distributed Denial-of-Service Attack Traffic FilterXIAO Jun,YUN Xiao-Chun and ZHANG Yong-Zheng2011,22(10):2425-2437 [Abstract(3927)] [View PDF(6997)761.13 K]Dependency-Based Malware Similarity Comparison MethodYANG Yi,SU Pu-Rui,YING Ling-Yun and FENG Deng-Guo2011,22(10):2438-2453 [Abstract(5139)] [View PDF(8171)870.65 K]Real-Time Global Illumination Rendering for Mesostructure Surface Based on Gradient MapWANG Li-Li,YANG Zheng,MA Zhi-Qiang and ZHAO Qin-Ping2011,22(10):2454-2466 [Abstract(4805)] [View PDF(5891)714.90 K]Layout Algorithm Suitable for Structural Analysis and Visualization of Social NetworkWU Peng and LI Si-Kun2011,22(10):2467-2475 [Abstract(5468)] [View PDF(8472)704.97 K]Weighted Linear Methods for the Camera Pose EstimationYANG Sen and WU Fu-Chao2011,22(10):2476-2487 [Abstract(5350)] [View PDF(7362)707.05 K]Optimizing Grid Construction in Linear ComplexityLI Jing and WANG Wen-Cheng2011,22(10):2488-2496 [Abstract(4346)] [View PDF(5934)604.42 K]Dynamic Grid Resource Reservation Mechanism Based on Resource-Reservation GraphGAO Zhan and LUO Si-Wei2011,22(10):2497-2508 [Abstract(4516)] [View PDF(5221)630.44 K]Optimizing Method for Improving the Performance of MPI Broadcast under Unbalanced Process Arrival PatternsLIU Zhi-Qiang,SONG Jun-Qiang,LU Feng-Shun and XU Fen2011,22(10):2509-2522 [Abstract(4814)] [View PDF(6503)874.82 K]Snapshot Method for Continuous Data Protection SystemsLI Xiao,TAN Yu-An and LI Yuan-Zhang2011,22(10):2523-2537 [Abstract(3780)] [View PDF(5810)519.33 K]Fault-Torlerance Method for CPU-GPU Heterogeneous SystemXU Xin-Hai,YANG Xue-Jun,LIN Yu-Fei,LIN Yi-Song and TANG Tao2011,22(10):2538-2552 [Abstract(4746)] [View PDF(6637)613.27 K]
Coverage Control Algorithms for Directional Sensor NetworksTAO Dan and MA Hua-Dong2011,22(10):2317-2334 [Abstract(8996)] [View PDF(11055)623.89 K]