Volume 24,Issue 3,2013 Table of Contents
Model Checking for Event Graphs and Event Temporal LogicXIA Wei,YAO Yi-Ping and MU Xiao-Dong2013,24(3):421-432 [Abstract(4190)] [View PDF(5833)759.59 K]Normal Form of Łukasiewicz Logic Formulae and Related Counting ProblemsWANG Qing-Ping and WANG Guo-Jun2013,24(3):433-453 [Abstract(4101)] [View PDF(5327)1.12 M]Using Unified Probabilistic Matrix Factorization for Contextual Advertisement RecommendationTU Dan-Dan,SHU Cheng-Chun and YU Hai-Yan2013,24(3):454-464 [Abstract(5968)] [View PDF(11026)585.57 K]Clustering Trajectories of Entities in Computer WargamesSHI Chong-Lin,GAN Wen-Yan,WU Lin,ZHANG Mao-Jun and TANG Yu-Bo2013,24(3):465-475 [Abstract(4485)] [View PDF(6379)977.50 K]Many-Objective Evolutionary Algorithm Based on Bipolar Preferences DominanceQIU Fei-Yue,WU Yu-Shi,QIU Qi-Cang and WANG Li-Ping2013,24(3):476-489 [Abstract(4249)] [View PDF(6164)953.23 K]Multilevel Core-Sets Based Aggregation Clustering AlgorithmMA Ru-Ning,WANG Xiu-Li and DING Jun-Di2013,24(3):490-506 [Abstract(3804)] [View PDF(5393)2.61 M]Periodic Intermittently Connected-Based Data Delivery in Opportunistic NetworksWU Lei,WU De-An,LIU Ming,WANG Xiao-Min and GONG Hai-Gang2013,24(3):507-525 [Abstract(4221)] [View PDF(7157)2.26 M]Evolutionary Game Theoretical Resource Deployment Model for P2P NetworksZHOU Jing-Ya,SONG Ai-Bo and LUO Jun-Zhou2013,24(3):526-539 [Abstract(4424)] [View PDF(7038)941.69 K]Online Identification of Tor Anonymous Communication TrafficHE Gao-Feng,YANG Ming,LUO Jun-Zhou and ZHANG Lu2013,24(3):540-556 [Abstract(5010)] [View PDF(13278)2.40 M]Virtual Nodes-Based Wavelet Compression Algorithm for Wireless Sensor NetworksYANG Sheng-Hong,JIA Yan and ZHOU Si-Wang2013,24(3):557-563 [Abstract(3336)] [View PDF(5154)589.65 K]Delegation Based Cross-Domain Access Control Model Under Cloud Computing for Mobile TerminalYUAN Jia-Bin,WEI Li-Li and ZENG Qing-Hua2013,24(3):564-574 [Abstract(3867)] [View PDF(5798)750.06 K]Centralized Intra-Domain Protection Routing Mechanism for Low-Connectivity TopologyTAN Jing,LUO Jun-Zhou and LI Wei2013,24(3):575-592 [Abstract(3135)] [View PDF(5195)1.10 M]
Control Algorithm and Performance Analysis Model of Multi-log2N Switching NetworksLIU Xiao-Feng,ZHAO You-Jian and WU Ya-Juan2013,24(3):593-603 [Abstract(4581)] [View PDF(5720)753.04 K]
Noise-Tolerant and Optimal Segmentation of Message Formats for Unknown Application- Layer ProtocolsLI Min and YU Shun-Zheng2013,24(3):604-617 [Abstract(3848)] [View PDF(6725)857.35 K]Security Analysis of a Certificateless Signcryption SchemeHE De-Biao2013,24(3):618-622 [Abstract(3800)] [View PDF(6034)427.56 K]Face Segmentation Based on a Hybrid Energy Based Active Contour ModelGONG Xun,WANG Guo-Yin,LI Tian-Rui,LI Xin-Xin,XIA Ran and FENG Lin2013,24(3):623-638 [Abstract(3990)] [View PDF(6358)1.15 M]Maximum Intensity Projection Based on Visual Perception EnhancementZHOU Zhi-Guang,TAO Yu-Bo and LIN Hai2013,24(3):639-650 [Abstract(3837)] [View PDF(7384)1.40 M]From Point Cloud to Triangular Mesh by Growing Neural GasZENG Feng,YANG Tong and YAO Shan2013,24(3):651-662 [Abstract(3456)] [View PDF(7537)1.80 M]