Volume 25,Issue 10,2014 Table of Contents

Other Issues:  
  
Contents

  • Research on Abnormal Chinese Character Recognition
  • WANG Kai,LI Cheng-Xue,WANG Qing-Ren,ZHAO Hong and ZHANG Jian
  • 2014,25(10):2266-2281 [Abstract(3183)]  [View PDF(6084)971.38 K]
  • Dual Coordinate Descent Method for Solving AUC Optimization Problem
  • JIANG Ji-Yuan,TAO Qing,GAO Qian-Kun and CHU De-Jun
  • 2014,25(10):2282-2292 [Abstract(3374)]  [View PDF(6935)924.25 K]
  • Collaborative Partition Multi-View Fuzzy Clustering Algorithm using Entropy Weighting
  • JIANG Yi-Zhang,DENG Zhao-Hong,WANG Jun,QIAN Peng-Jiang and WANG Shi-Tong
  • 2014,25(10):2293-2311 [Abstract(3941)]  [View PDF(6930)1.28 M]
  • Research on the Binding Problem of Temporal Spans
  • ZUO Ya-Yao,SHU Zhong-Mei and TANG Yong
  • 2014,25(10):2312-2324 [Abstract(3251)]  [View PDF(4614)844.78 K]
  • Internet of Things Based Information Support System for Multi-Agent Decision
  • XU Yang,WANG Xiao-Feng and HE Qing-Yi
  • 2014,25(10):2325-2345 [Abstract(3661)]  [View PDF(7576)3.09 M]
  • RTT Estimation Based on Sampled Flow Data
  • SU Qi,GONG Jian and SU Yan-Jun
  • 2014,25(10):2346-2361 [Abstract(3105)]  [View PDF(5737)1.47 M]
  • Content Downloading-Oriented Resource Allocation Joint Scheduling in Drive-Thru Networks
  • CHEN Li,LI Zhi-Jun and JIANG Shou-Xu
  • 2014,25(10):2362-2372 [Abstract(3027)]  [View PDF(6179)873.48 K]
  • Service Migration Method for Cognitive Network Based on DAG Dynamic Reconstruction
  • LIN Jun-Yu,WANG Hui-Qiang,MA Chun-Guang,LU Xu and LÜ Hong-Wu
  • 2014,25(10):2373-2384 [Abstract(3286)]  [View PDF(5906)963.80 K]
  • One-Way Hash Chain Based Filtering Scheme in Wireless Sensor Networks
  • LIU Zhi-Xiong,WANG Jiang-Tao,WANG Wei-Ping,LIU Hua-Fu,WANG Jian-Xin and ZHANG Shi-Geng
  • 2014,25(10):2385-2396 [Abstract(4324)]  [View PDF(5883)885.34 K]
  • Provable Secure Attribute Based Authenticated Key Exchange Protocols in the Standard Model
  • WEI Jiang-Hong,LIU Wen-Fen and HU Xue-Xian
  • 2014,25(10):2397-2408 [Abstract(3464)]  [View PDF(5916)866.92 K]
  • Design and Analysis of a Fair ID-Based Multi-Receiver Anonymous Signcryption
  • PANG Liao-Jun,LI Hui-Xian,CUI Jing-Jing and WANG Yu-Min
  • 2014,25(10):2409-2420 [Abstract(2898)]  [View PDF(5866)835.25 K]
  • Latency Analysis of Large-Scale Cognitive Radio Networks
  • LU Dian-Jie,ZHENG Xiang-Wei,ZHANG Gui-Juan,HONG Jue and LIU Hong
  • 2014,25(10):2421-2431 [Abstract(3277)]  [View PDF(5697)1.17 M]
  • Special Issue's Articles

  • 网络资源虚拟化技术专题前言
  • 齐勇,罗英伟,孙毓忠
  • 2014,25(10):2187-2188 [Abstract(4872)]  [View PDF(7141)289.49 K]
  • Knowledge Description and Genetic Algorithm Based Multi-Domain Virtual Network Embedding
  • XIAO Ai-Ling,WANG Ying,MENG Luo-Ming,QIU Xue-Song,LI Wen-Jing and YIN Bin
  • 2014,25(10):2189-2205 [Abstract(6351)]  [View PDF(7734)1.16 M]
  • MBalancer:Predictive Dynamic Memory Balancing for Virtual Machines
  • WANG Zhi-Gang,WANG Xiao-Lin,JIN Xin-Xin,WANG Zhen-Lin and LUO Ying-Wei
  • 2014,25(10):2206-2219 [Abstract(6083)]  [View PDF(8526)1.50 M]
  • Fine-Grained Parallel SDN Virtualization Programming Framework
  • SONG Ping,LIU Yi,LIU Chi,ZHANG Jing-Jing,QIAN De-Pei and HAO Qin-Fen
  • 2014,25(10):2220-2234 [Abstract(6498)]  [View PDF(7707)1.41 M]
  • Reliability Architecture to Isolate the Driver Inside the VM
  • ZHENG Hao,DONG Xiao-She,WANG En-Dong,CHEN Bao-Ke and ZHU Zheng-Dong
  • 2014,25(10):2235-2250 [Abstract(5953)]  [View PDF(8381)1016.74 K]
  • Establishing Process-Level Defense-in-Depth Framework for Software Defined Networks
  • CUI Jing-Song,GUO Chi,CHEN Long,ZHANG Ya-Na and Dijiang HUANG
  • 2014,25(10):2251-2265 [Abstract(6229)]  [View PDF(8349)1.75 M]