Volume 23,Issue 2,2012 Table of Contents
Robust Semi-Supervised Learning Algorithm Based on Maximum Correntropy CriterionYANG Nan-Hai,HUANG Ming-Ming,HE Ran and WANG Xiu-Kun2012,23(2):279-288 [Abstract(5883)] [View PDF(9401)807.03 K]Dynamic Multi-Document Summarization ModelLIU Mei-Ling,ZHENG De-Quan,ZHAO Tie-Jun and YU Yang2012,23(2):289-298 [Abstract(4166)] [View PDF(5936)756.25 K]Pedestrian Detection Method of Integrated Motion Information and Appearance FeaturesGUO Li-Jun,LIU Xi,ZHAO Jie-Yu and SHI Zhong-Zhi2012,23(2):299-309 [Abstract(4698)] [View PDF(7996)1.91 M]Coverage Optimization of Occlusion-Free Surveillance for Video Sensor NetworksJIANG Yi-Bo,WANG Wan-Liang,CHEN Wei-Jie,ZHENG Jian-Wei and YAO Xin-Wei2012,23(2):310-322 [Abstract(4878)] [View PDF(6237)1.79 M]Performance Analysis of (X,S)-Bottleneck Cell in Large-Scale Wireless NetworksYAN Guo-Feng,WANG Jian-Xin and CHEN Shu-Hong2012,23(2):323-334 [Abstract(4179)] [View PDF(5944)1.02 M]Self-Loading Decreasing Rate Packet Train Method for Available Bandwidth EstimationZHANG Da-Lu,HU Zhi-Guo,ZHU An-Qi and ZHANG Jun-Sheng2012,23(2):335-351 [Abstract(4668)] [View PDF(7676)1.08 M]Privacy Metric for User’s Trajectory in Location-Based ServicesWANG Cai-Mei,GUO Ya-Jun and GUO Yan-Hua2012,23(2):352-360 [Abstract(5562)] [View PDF(7126)703.62 K]Network-Wide Anomaly Detection Method Based on Multiscale Principal Component AnalysisQIAN Ye-Kui,CHEN Ming,YE Li-Xin,LIU Feng-Rong,ZHU Shao-Wei and ZHANG Han2012,23(2):361-377 [Abstract(5807)] [View PDF(9218)1.25 M]Semantics-Based Malware Behavior Signature Extraction and Detection MethodWANG Rui,FENG Deng-Guo,YANG Yi and SU Pu-Rui2012,23(2):378-393 [Abstract(6653)] [View PDF(15985)1.01 M]Certificateless Generalized Signcryption Scheme without Random OraclesLIU Lian-Dong,JI Hui-Fang,HAN Wen-Bao and ZHAO Long2012,23(2):394-410 [Abstract(4103)] [View PDF(6415)1.02 M]Fault Tolerance Scheme Using Parallel Recomputing for OpenMP ProgramsFU Hong-Yi,DING Yan,SONG Wei and YANG Xue-Jun2012,23(2):411-427 [Abstract(4131)] [View PDF(6573)973.17 K]Grid Resource Allocation Model Based on Incomplete Information GameLI Ming-Chu,XU Lei,SUN Wei-Feng,LU Kun and GUO Cheng2012,23(2):428-438 [Abstract(5700)] [View PDF(6792)862.95 K]
Preface孙毓忠,臧斌宇2012,23(2):177-178 [Abstract(8086)] [View PDF(7894)303.41 K]Resource Management in Internet-Oriented Data CentersZHANG Wei,SONG Ying,RUAN Li,ZHU Ming-Fa and XIAO Li-Min2012,23(2):179-199 [Abstract(8128)] [View PDF(12920)1.15 M]Energy-Efficiency Model and Measuring Approach for Cloud ComputingSONG Jie,LI Tian-Tian,YAN Zhen-Xing,NA Jun and ZHU Zhi-Liang2012,23(2):200-214 [Abstract(10692)] [View PDF(14897)2.05 M]Software-Based Green Proxy System for Wireless NetworksLIU Chen,LU Jia-Liang,KONG Ling-He,WU Feng-Gang,WU Qiang and WU Min-You2012,23(2):215-229 [Abstract(7217)] [View PDF(7928)1.15 M]Embedded Software Energy Modeling Method at Architecture LevelLIU Xiao-Bin,GUO Bing,SHEN Yan,XIONG Bing,WANG Ji-He,WU Yuan-Sheng and LIU Yun-Ben2012,23(2):230-239 [Abstract(7903)] [View PDF(8790)774.68 K]Adaptive Scheduling Algorithm Based on Dynamic Core-Resource Partitions for Many-Core Processor SystemsCAO Yang-Jie,QIAN De-Pei,WU Wei-Guo and DONG Xiao-She2012,23(2):240-252 [Abstract(7795)] [View PDF(9334)1.06 M]Distributed Search Engine System Productivity Modeling and EvaluationZHANG Wei-Zhe,ZHANG Hong-Li,XU Xiao and HE Hui2012,23(2):253-265 [Abstract(7748)] [View PDF(8957)821.92 K]Policy of Energy Optimal Management for Cloud Computing Platform with Stochastic TasksTAN Yi-Ming,ZENG Guo-Sun and WANG Wei2012,23(2):266-278 [Abstract(8823)] [View PDF(11374)878.43 K]