Volume 25,Issue 10,2014 Table of Contents
Research on Abnormal Chinese Character RecognitionWANG Kai,LI Cheng-Xue,WANG Qing-Ren,ZHAO Hong and ZHANG Jian2014,25(10):2266-2281 [Abstract(3162)] [View PDF(5799)971.38 K]Dual Coordinate Descent Method for Solving AUC Optimization ProblemJIANG Ji-Yuan,TAO Qing,GAO Qian-Kun and CHU De-Jun2014,25(10):2282-2292 [Abstract(3344)] [View PDF(6623)924.25 K]Collaborative Partition Multi-View Fuzzy Clustering Algorithm using Entropy WeightingJIANG Yi-Zhang,DENG Zhao-Hong,WANG Jun,QIAN Peng-Jiang and WANG Shi-Tong2014,25(10):2293-2311 [Abstract(3911)] [View PDF(6686)1.28 M]Research on the Binding Problem of Temporal SpansZUO Ya-Yao,SHU Zhong-Mei and TANG Yong2014,25(10):2312-2324 [Abstract(3219)] [View PDF(4474)844.78 K]Internet of Things Based Information Support System for Multi-Agent DecisionXU Yang,WANG Xiao-Feng and HE Qing-Yi2014,25(10):2325-2345 [Abstract(3613)] [View PDF(7411)3.09 M]RTT Estimation Based on Sampled Flow DataSU Qi,GONG Jian and SU Yan-Jun2014,25(10):2346-2361 [Abstract(3081)] [View PDF(5492)1.47 M]Content Downloading-Oriented Resource Allocation Joint Scheduling in Drive-Thru NetworksCHEN Li,LI Zhi-Jun and JIANG Shou-Xu2014,25(10):2362-2372 [Abstract(3001)] [View PDF(5997)873.48 K]Service Migration Method for Cognitive Network Based on DAG Dynamic ReconstructionLIN Jun-Yu,WANG Hui-Qiang,MA Chun-Guang,LU Xu and LÜ Hong-Wu2014,25(10):2373-2384 [Abstract(3242)] [View PDF(5697)963.80 K]One-Way Hash Chain Based Filtering Scheme in Wireless Sensor NetworksLIU Zhi-Xiong,WANG Jiang-Tao,WANG Wei-Ping,LIU Hua-Fu,WANG Jian-Xin and ZHANG Shi-Geng2014,25(10):2385-2396 [Abstract(4300)] [View PDF(5747)885.34 K]Provable Secure Attribute Based Authenticated Key Exchange Protocols in the Standard ModelWEI Jiang-Hong,LIU Wen-Fen and HU Xue-Xian2014,25(10):2397-2408 [Abstract(3428)] [View PDF(5720)866.92 K]Design and Analysis of a Fair ID-Based Multi-Receiver Anonymous SigncryptionPANG Liao-Jun,LI Hui-Xian,CUI Jing-Jing and WANG Yu-Min2014,25(10):2409-2420 [Abstract(2870)] [View PDF(5687)835.25 K]Latency Analysis of Large-Scale Cognitive Radio NetworksLU Dian-Jie,ZHENG Xiang-Wei,ZHANG Gui-Juan,HONG Jue and LIU Hong2014,25(10):2421-2431 [Abstract(3254)] [View PDF(5516)1.17 M]
网络资源虚拟化技术专题前言齐勇,罗英伟,孙毓忠2014,25(10):2187-2188 [Abstract(4836)] [View PDF(6620)289.49 K]Knowledge Description and Genetic Algorithm Based Multi-Domain Virtual Network EmbeddingXIAO Ai-Ling,WANG Ying,MENG Luo-Ming,QIU Xue-Song,LI Wen-Jing and YIN Bin2014,25(10):2189-2205 [Abstract(6335)] [View PDF(7127)1.16 M]MBalancer:Predictive Dynamic Memory Balancing for Virtual MachinesWANG Zhi-Gang,WANG Xiao-Lin,JIN Xin-Xin,WANG Zhen-Lin and LUO Ying-Wei2014,25(10):2206-2219 [Abstract(6045)] [View PDF(7799)1.50 M]Fine-Grained Parallel SDN Virtualization Programming FrameworkSONG Ping,LIU Yi,LIU Chi,ZHANG Jing-Jing,QIAN De-Pei and HAO Qin-Fen2014,25(10):2220-2234 [Abstract(6442)] [View PDF(7170)1.41 M]Reliability Architecture to Isolate the Driver Inside the VMZHENG Hao,DONG Xiao-She,WANG En-Dong,CHEN Bao-Ke and ZHU Zheng-Dong2014,25(10):2235-2250 [Abstract(5916)] [View PDF(7622)1016.74 K]Establishing Process-Level Defense-in-Depth Framework for Software Defined NetworksCUI Jing-Song,GUO Chi,CHEN Long,ZHANG Ya-Na and Dijiang HUANG2014,25(10):2251-2265 [Abstract(6200)] [View PDF(7784)1.75 M]