Volume 23,Issue 2,2012 Table of Contents
Robust Semi-Supervised Learning Algorithm Based on Maximum Correntropy CriterionYANG Nan-Hai,HUANG Ming-Ming,HE Ran and WANG Xiu-Kun2012,23(2):279-288 [Abstract(5927)] [View PDF(9782)807.03 K]Dynamic Multi-Document Summarization ModelLIU Mei-Ling,ZHENG De-Quan,ZHAO Tie-Jun and YU Yang2012,23(2):289-298 [Abstract(4191)] [View PDF(6060)756.25 K]Pedestrian Detection Method of Integrated Motion Information and Appearance FeaturesGUO Li-Jun,LIU Xi,ZHAO Jie-Yu and SHI Zhong-Zhi2012,23(2):299-309 [Abstract(4735)] [View PDF(8136)1.91 M]Coverage Optimization of Occlusion-Free Surveillance for Video Sensor NetworksJIANG Yi-Bo,WANG Wan-Liang,CHEN Wei-Jie,ZHENG Jian-Wei and YAO Xin-Wei2012,23(2):310-322 [Abstract(4906)] [View PDF(6412)1.79 M]Performance Analysis of (X,S)-Bottleneck Cell in Large-Scale Wireless NetworksYAN Guo-Feng,WANG Jian-Xin and CHEN Shu-Hong2012,23(2):323-334 [Abstract(4195)] [View PDF(6092)1.02 M]Self-Loading Decreasing Rate Packet Train Method for Available Bandwidth EstimationZHANG Da-Lu,HU Zhi-Guo,ZHU An-Qi and ZHANG Jun-Sheng2012,23(2):335-351 [Abstract(4706)] [View PDF(7799)1.08 M]Privacy Metric for User’s Trajectory in Location-Based ServicesWANG Cai-Mei,GUO Ya-Jun and GUO Yan-Hua2012,23(2):352-360 [Abstract(5609)] [View PDF(7267)703.62 K]Network-Wide Anomaly Detection Method Based on Multiscale Principal Component AnalysisQIAN Ye-Kui,CHEN Ming,YE Li-Xin,LIU Feng-Rong,ZHU Shao-Wei and ZHANG Han2012,23(2):361-377 [Abstract(5867)] [View PDF(9507)1.25 M]Semantics-Based Malware Behavior Signature Extraction and Detection MethodWANG Rui,FENG Deng-Guo,YANG Yi and SU Pu-Rui2012,23(2):378-393 [Abstract(6733)] [View PDF(16192)1.01 M]Certificateless Generalized Signcryption Scheme without Random OraclesLIU Lian-Dong,JI Hui-Fang,HAN Wen-Bao and ZHAO Long2012,23(2):394-410 [Abstract(4144)] [View PDF(6634)1.02 M]Fault Tolerance Scheme Using Parallel Recomputing for OpenMP ProgramsFU Hong-Yi,DING Yan,SONG Wei and YANG Xue-Jun2012,23(2):411-427 [Abstract(4186)] [View PDF(6728)973.17 K]Grid Resource Allocation Model Based on Incomplete Information GameLI Ming-Chu,XU Lei,SUN Wei-Feng,LU Kun and GUO Cheng2012,23(2):428-438 [Abstract(5770)] [View PDF(6960)862.95 K]
Preface孙毓忠,臧斌宇2012,23(2):177-178 [Abstract(8138)] [View PDF(8379)303.41 K]Resource Management in Internet-Oriented Data CentersZHANG Wei,SONG Ying,RUAN Li,ZHU Ming-Fa and XIAO Li-Min2012,23(2):179-199 [Abstract(8167)] [View PDF(14155)1.15 M]Energy-Efficiency Model and Measuring Approach for Cloud ComputingSONG Jie,LI Tian-Tian,YAN Zhen-Xing,NA Jun and ZHU Zhi-Liang2012,23(2):200-214 [Abstract(10757)] [View PDF(15575)2.05 M]Software-Based Green Proxy System for Wireless NetworksLIU Chen,LU Jia-Liang,KONG Ling-He,WU Feng-Gang,WU Qiang and WU Min-You2012,23(2):215-229 [Abstract(7257)] [View PDF(8515)1.15 M]Embedded Software Energy Modeling Method at Architecture LevelLIU Xiao-Bin,GUO Bing,SHEN Yan,XIONG Bing,WANG Ji-He,WU Yuan-Sheng and LIU Yun-Ben2012,23(2):230-239 [Abstract(7949)] [View PDF(9396)774.68 K]Adaptive Scheduling Algorithm Based on Dynamic Core-Resource Partitions for Many-Core Processor SystemsCAO Yang-Jie,QIAN De-Pei,WU Wei-Guo and DONG Xiao-She2012,23(2):240-252 [Abstract(7841)] [View PDF(9926)1.06 M]Distributed Search Engine System Productivity Modeling and EvaluationZHANG Wei-Zhe,ZHANG Hong-Li,XU Xiao and HE Hui2012,23(2):253-265 [Abstract(7793)] [View PDF(9506)821.92 K]Policy of Energy Optimal Management for Cloud Computing Platform with Stochastic TasksTAN Yi-Ming,ZENG Guo-Sun and WANG Wei2012,23(2):266-278 [Abstract(8890)] [View PDF(11927)878.43 K]