Volume 25,Issue 10,2014 Table of Contents
Research on Abnormal Chinese Character RecognitionWANG Kai,LI Cheng-Xue,WANG Qing-Ren,ZHAO Hong and ZHANG Jian2014,25(10):2266-2281 [Abstract(3183)] [View PDF(6084)971.38 K]Dual Coordinate Descent Method for Solving AUC Optimization ProblemJIANG Ji-Yuan,TAO Qing,GAO Qian-Kun and CHU De-Jun2014,25(10):2282-2292 [Abstract(3374)] [View PDF(6935)924.25 K]Collaborative Partition Multi-View Fuzzy Clustering Algorithm using Entropy WeightingJIANG Yi-Zhang,DENG Zhao-Hong,WANG Jun,QIAN Peng-Jiang and WANG Shi-Tong2014,25(10):2293-2311 [Abstract(3941)] [View PDF(6930)1.28 M]Research on the Binding Problem of Temporal SpansZUO Ya-Yao,SHU Zhong-Mei and TANG Yong2014,25(10):2312-2324 [Abstract(3251)] [View PDF(4614)844.78 K]Internet of Things Based Information Support System for Multi-Agent DecisionXU Yang,WANG Xiao-Feng and HE Qing-Yi2014,25(10):2325-2345 [Abstract(3661)] [View PDF(7576)3.09 M]RTT Estimation Based on Sampled Flow DataSU Qi,GONG Jian and SU Yan-Jun2014,25(10):2346-2361 [Abstract(3105)] [View PDF(5737)1.47 M]Content Downloading-Oriented Resource Allocation Joint Scheduling in Drive-Thru NetworksCHEN Li,LI Zhi-Jun and JIANG Shou-Xu2014,25(10):2362-2372 [Abstract(3027)] [View PDF(6179)873.48 K]Service Migration Method for Cognitive Network Based on DAG Dynamic ReconstructionLIN Jun-Yu,WANG Hui-Qiang,MA Chun-Guang,LU Xu and LÜ Hong-Wu2014,25(10):2373-2384 [Abstract(3286)] [View PDF(5906)963.80 K]One-Way Hash Chain Based Filtering Scheme in Wireless Sensor NetworksLIU Zhi-Xiong,WANG Jiang-Tao,WANG Wei-Ping,LIU Hua-Fu,WANG Jian-Xin and ZHANG Shi-Geng2014,25(10):2385-2396 [Abstract(4324)] [View PDF(5883)885.34 K]Provable Secure Attribute Based Authenticated Key Exchange Protocols in the Standard ModelWEI Jiang-Hong,LIU Wen-Fen and HU Xue-Xian2014,25(10):2397-2408 [Abstract(3464)] [View PDF(5916)866.92 K]Design and Analysis of a Fair ID-Based Multi-Receiver Anonymous SigncryptionPANG Liao-Jun,LI Hui-Xian,CUI Jing-Jing and WANG Yu-Min2014,25(10):2409-2420 [Abstract(2898)] [View PDF(5866)835.25 K]Latency Analysis of Large-Scale Cognitive Radio NetworksLU Dian-Jie,ZHENG Xiang-Wei,ZHANG Gui-Juan,HONG Jue and LIU Hong2014,25(10):2421-2431 [Abstract(3277)] [View PDF(5697)1.17 M]
网络资源虚拟化技术专题前言齐勇,罗英伟,孙毓忠2014,25(10):2187-2188 [Abstract(4872)] [View PDF(7141)289.49 K]Knowledge Description and Genetic Algorithm Based Multi-Domain Virtual Network EmbeddingXIAO Ai-Ling,WANG Ying,MENG Luo-Ming,QIU Xue-Song,LI Wen-Jing and YIN Bin2014,25(10):2189-2205 [Abstract(6351)] [View PDF(7734)1.16 M]MBalancer:Predictive Dynamic Memory Balancing for Virtual MachinesWANG Zhi-Gang,WANG Xiao-Lin,JIN Xin-Xin,WANG Zhen-Lin and LUO Ying-Wei2014,25(10):2206-2219 [Abstract(6083)] [View PDF(8526)1.50 M]Fine-Grained Parallel SDN Virtualization Programming FrameworkSONG Ping,LIU Yi,LIU Chi,ZHANG Jing-Jing,QIAN De-Pei and HAO Qin-Fen2014,25(10):2220-2234 [Abstract(6498)] [View PDF(7707)1.41 M]Reliability Architecture to Isolate the Driver Inside the VMZHENG Hao,DONG Xiao-She,WANG En-Dong,CHEN Bao-Ke and ZHU Zheng-Dong2014,25(10):2235-2250 [Abstract(5953)] [View PDF(8381)1016.74 K]Establishing Process-Level Defense-in-Depth Framework for Software Defined NetworksCUI Jing-Song,GUO Chi,CHEN Long,ZHANG Ya-Na and Dijiang HUANG2014,25(10):2251-2265 [Abstract(6229)] [View PDF(8349)1.75 M]