Volume 26,Issue 3,2015 Table of Contents
Resource Location Flooding Strategy of Unstructured P2P for User RequirementsHE Ming, ZHANG Yu-Jie and MENG Xiang-Wu2015,26(3):640-662 [Abstract(3502)] [View PDF(5459)723.77 K]Extracting and Analyzing Internet Background Radiation in Live NetworksMIAO Li-Hua, DING Wei and YANG Wang2015,26(3):663-679 [Abstract(3281)] [View PDF(5193)1.10 M]3D Point Cloud Shape Feature Descriptor Using 2D Principal ManifoldSUN Xiao-Peng, WANG Guan, WANG Lu and WEI Xiao-Peng2015,26(3):699-709 [Abstract(4027)] [View PDF(7453)1.48 M]
业务过程管理技术专题前言王建民,尹建伟,窦万春2015,26(3):447-448 [Abstract(5575)] [View PDF(6505)199.70 K]Behavioral Similarity Algorithm for Process Models Based on Firing Sequence CollectionDONG Zi-He, WEN Li-Jie, HUANG Hao-Wei and WANG Jian-Min2015,26(3):449-459 [Abstract(5609)] [View PDF(7013)750.70 K]Matching Process Model Variants Based on Process Structure TreeLING Ji-Min and ZHANG Li2015,26(3):460-473 [Abstract(5217)] [View PDF(6767)792.24 K]Mapping Elements Between Process Models Based on Petri NetCAO Bin, WANG Jia-Xing, FAN Jing and DONG Tian-Yang2015,26(3):474-490 [Abstract(5534)] [View PDF(7177)1.42 M]Method for Behavior Conformance Checking Based on Artifact Snapshot SequencesLIU Hai-Bin, LIU Guo-Hua, HUANG Li-Ming and SONG Jin-Ling2015,26(3):491-508 [Abstract(5263)] [View PDF(6744)1.03 M]Method for Conformance Checking Based on Token LogLI Chuan-Yi, GE Ji-Dong, HU Hai-Yang, HU Hao and LUO Bin2015,26(3):509-532 [Abstract(5479)] [View PDF(8070)1.58 M]Parallelized Heuristic Process Mining AlgorithmLU Fa-Ming, ZENG Qing-Tian, DUAN Hua, CHENG Jiu-Jun and BAO Yun-Xia2015,26(3):533-549 [Abstract(5910)] [View PDF(7881)1.05 M]Process Mining Approach for Diverse Application EnvironmentsYANG Li-Qin, KANG Guo-Sheng, GUO Li-Peng, TIAN Zhao-Yang, ZHANG Liang, ZHANG Xiao-Nan and GAO Xiang2015,26(3):550-561 [Abstract(5608)] [View PDF(6741)744.22 K]Workflow Task Assignment Strategy Based on Social ContextYU Yang, WANG Ying, LIU Xing-Mei and CHEN Jian2015,26(3):562-573 [Abstract(5944)] [View PDF(7155)922.77 K]Instance Aspect Handling-Oriented Scheduling Optimization in WorkflowsWEN Yi-Ping, LIU Jian-Xun and CHEN Zhi-Gang2015,26(3):574-583 [Abstract(5422)] [View PDF(6323)630.63 K]Business Process Modeling with Geospatial ConstraintsZHU Xin-Wei, ZHU Guo-Bin and Seppe VANDEN BROUCKE2015,26(3):584-599 [Abstract(5459)] [View PDF(6436)1.25 M]
Research Progress on Routing Problem in Mobile Opportunistic NetworksMA Hua-Dong, YUAN Pei-Yan and ZHAO Dong2015,26(3):600-616 [Abstract(9578)] [View PDF(10538)926.06 K]Location Privacy Preservation in Wireless Sensor NetworksPENG Hui, CHEN Hong, ZHANG Xiao-Ying, FAN Yong-Jian, LI Cui-Ping and LI De-Ying2015,26(3):617-639 [Abstract(8074)] [View PDF(9991)1.10 M]Research of Energy Consumption Optimization Methods for Cloud Video Surveillance SystemXIONG Yong-Hua, ZHANG Yin-Sheng, CHEN Xin and WU Min2015,26(3):680-698 [Abstract(7546)] [View PDF(8326)1017.61 K]