Volume 25,Issue 10,2014 Table of Contents

Other Issues:  
  
Contents

  • Research on Abnormal Chinese Character Recognition
  • WANG Kai,LI Cheng-Xue,WANG Qing-Ren,ZHAO Hong and ZHANG Jian
  • 2014,25(10):2266-2281 [Abstract(3162)]  [View PDF(5799)971.38 K]
  • Dual Coordinate Descent Method for Solving AUC Optimization Problem
  • JIANG Ji-Yuan,TAO Qing,GAO Qian-Kun and CHU De-Jun
  • 2014,25(10):2282-2292 [Abstract(3344)]  [View PDF(6623)924.25 K]
  • Collaborative Partition Multi-View Fuzzy Clustering Algorithm using Entropy Weighting
  • JIANG Yi-Zhang,DENG Zhao-Hong,WANG Jun,QIAN Peng-Jiang and WANG Shi-Tong
  • 2014,25(10):2293-2311 [Abstract(3911)]  [View PDF(6686)1.28 M]
  • Research on the Binding Problem of Temporal Spans
  • ZUO Ya-Yao,SHU Zhong-Mei and TANG Yong
  • 2014,25(10):2312-2324 [Abstract(3219)]  [View PDF(4474)844.78 K]
  • Internet of Things Based Information Support System for Multi-Agent Decision
  • XU Yang,WANG Xiao-Feng and HE Qing-Yi
  • 2014,25(10):2325-2345 [Abstract(3613)]  [View PDF(7411)3.09 M]
  • RTT Estimation Based on Sampled Flow Data
  • SU Qi,GONG Jian and SU Yan-Jun
  • 2014,25(10):2346-2361 [Abstract(3081)]  [View PDF(5492)1.47 M]
  • Content Downloading-Oriented Resource Allocation Joint Scheduling in Drive-Thru Networks
  • CHEN Li,LI Zhi-Jun and JIANG Shou-Xu
  • 2014,25(10):2362-2372 [Abstract(3001)]  [View PDF(5997)873.48 K]
  • Service Migration Method for Cognitive Network Based on DAG Dynamic Reconstruction
  • LIN Jun-Yu,WANG Hui-Qiang,MA Chun-Guang,LU Xu and LÜ Hong-Wu
  • 2014,25(10):2373-2384 [Abstract(3242)]  [View PDF(5697)963.80 K]
  • One-Way Hash Chain Based Filtering Scheme in Wireless Sensor Networks
  • LIU Zhi-Xiong,WANG Jiang-Tao,WANG Wei-Ping,LIU Hua-Fu,WANG Jian-Xin and ZHANG Shi-Geng
  • 2014,25(10):2385-2396 [Abstract(4300)]  [View PDF(5747)885.34 K]
  • Provable Secure Attribute Based Authenticated Key Exchange Protocols in the Standard Model
  • WEI Jiang-Hong,LIU Wen-Fen and HU Xue-Xian
  • 2014,25(10):2397-2408 [Abstract(3428)]  [View PDF(5720)866.92 K]
  • Design and Analysis of a Fair ID-Based Multi-Receiver Anonymous Signcryption
  • PANG Liao-Jun,LI Hui-Xian,CUI Jing-Jing and WANG Yu-Min
  • 2014,25(10):2409-2420 [Abstract(2870)]  [View PDF(5687)835.25 K]
  • Latency Analysis of Large-Scale Cognitive Radio Networks
  • LU Dian-Jie,ZHENG Xiang-Wei,ZHANG Gui-Juan,HONG Jue and LIU Hong
  • 2014,25(10):2421-2431 [Abstract(3254)]  [View PDF(5516)1.17 M]
  • Special Issue's Articles

  • 网络资源虚拟化技术专题前言
  • 齐勇,罗英伟,孙毓忠
  • 2014,25(10):2187-2188 [Abstract(4836)]  [View PDF(6620)289.49 K]
  • Knowledge Description and Genetic Algorithm Based Multi-Domain Virtual Network Embedding
  • XIAO Ai-Ling,WANG Ying,MENG Luo-Ming,QIU Xue-Song,LI Wen-Jing and YIN Bin
  • 2014,25(10):2189-2205 [Abstract(6335)]  [View PDF(7127)1.16 M]
  • MBalancer:Predictive Dynamic Memory Balancing for Virtual Machines
  • WANG Zhi-Gang,WANG Xiao-Lin,JIN Xin-Xin,WANG Zhen-Lin and LUO Ying-Wei
  • 2014,25(10):2206-2219 [Abstract(6045)]  [View PDF(7799)1.50 M]
  • Fine-Grained Parallel SDN Virtualization Programming Framework
  • SONG Ping,LIU Yi,LIU Chi,ZHANG Jing-Jing,QIAN De-Pei and HAO Qin-Fen
  • 2014,25(10):2220-2234 [Abstract(6442)]  [View PDF(7170)1.41 M]
  • Reliability Architecture to Isolate the Driver Inside the VM
  • ZHENG Hao,DONG Xiao-She,WANG En-Dong,CHEN Bao-Ke and ZHU Zheng-Dong
  • 2014,25(10):2235-2250 [Abstract(5916)]  [View PDF(7622)1016.74 K]
  • Establishing Process-Level Defense-in-Depth Framework for Software Defined Networks
  • CUI Jing-Song,GUO Chi,CHEN Long,ZHANG Ya-Na and Dijiang HUANG
  • 2014,25(10):2251-2265 [Abstract(6200)]  [View PDF(7784)1.75 M]