Volume 26,Issue 3,2015 Table of Contents

Other Issues:  
  
Contents

  • Resource Location Flooding Strategy of Unstructured P2P for User Requirements
  • HE Ming, ZHANG Yu-Jie and MENG Xiang-Wu
  • 2015,26(3):640-662 [Abstract(3488)]  [View PDF(5358)723.77 K]
  • Extracting and Analyzing Internet Background Radiation in Live Networks
  • MIAO Li-Hua, DING Wei and YANG Wang
  • 2015,26(3):663-679 [Abstract(3265)]  [View PDF(5101)1.10 M]
  • 3D Point Cloud Shape Feature Descriptor Using 2D Principal Manifold
  • SUN Xiao-Peng, WANG Guan, WANG Lu and WEI Xiao-Peng
  • 2015,26(3):699-709 [Abstract(4005)]  [View PDF(7367)1.48 M]
  • Special Issue's Articles

  • 业务过程管理技术专题前言
  • 王建民,尹建伟,窦万春
  • 2015,26(3):447-448 [Abstract(5558)]  [View PDF(6098)199.70 K]
  • Behavioral Similarity Algorithm for Process Models Based on Firing Sequence Collection
  • DONG Zi-He, WEN Li-Jie, HUANG Hao-Wei and WANG Jian-Min
  • 2015,26(3):449-459 [Abstract(5589)]  [View PDF(6620)750.70 K]
  • Matching Process Model Variants Based on Process Structure Tree
  • LING Ji-Min and ZHANG Li
  • 2015,26(3):460-473 [Abstract(5207)]  [View PDF(6330)792.24 K]
  • Mapping Elements Between Process Models Based on Petri Net
  • CAO Bin, WANG Jia-Xing, FAN Jing and DONG Tian-Yang
  • 2015,26(3):474-490 [Abstract(5510)]  [View PDF(6715)1.42 M]
  • Method for Behavior Conformance Checking Based on Artifact Snapshot Sequences
  • LIU Hai-Bin, LIU Guo-Hua, HUANG Li-Ming and SONG Jin-Ling
  • 2015,26(3):491-508 [Abstract(5240)]  [View PDF(6300)1.03 M]
  • Method for Conformance Checking Based on Token Log
  • LI Chuan-Yi, GE Ji-Dong, HU Hai-Yang, HU Hao and LUO Bin
  • 2015,26(3):509-532 [Abstract(5454)]  [View PDF(7577)1.58 M]
  • Parallelized Heuristic Process Mining Algorithm
  • LU Fa-Ming, ZENG Qing-Tian, DUAN Hua, CHENG Jiu-Jun and BAO Yun-Xia
  • 2015,26(3):533-549 [Abstract(5890)]  [View PDF(7474)1.05 M]
  • Process Mining Approach for Diverse Application Environments
  • YANG Li-Qin, KANG Guo-Sheng, GUO Li-Peng, TIAN Zhao-Yang, ZHANG Liang, ZHANG Xiao-Nan and GAO Xiang
  • 2015,26(3):550-561 [Abstract(5579)]  [View PDF(6280)744.22 K]
  • Workflow Task Assignment Strategy Based on Social Context
  • YU Yang, WANG Ying, LIU Xing-Mei and CHEN Jian
  • 2015,26(3):562-573 [Abstract(5932)]  [View PDF(6708)922.77 K]
  • Instance Aspect Handling-Oriented Scheduling Optimization in Workflows
  • WEN Yi-Ping, LIU Jian-Xun and CHEN Zhi-Gang
  • 2015,26(3):574-583 [Abstract(5393)]  [View PDF(5979)630.63 K]
  • Business Process Modeling with Geospatial Constraints
  • ZHU Xin-Wei, ZHU Guo-Bin and Seppe VANDEN BROUCKE
  • 2015,26(3):584-599 [Abstract(5444)]  [View PDF(6014)1.25 M]
  • Review Articles

  • Research Progress on Routing Problem in Mobile Opportunistic Networks
  • MA Hua-Dong, YUAN Pei-Yan and ZHAO Dong
  • 2015,26(3):600-616 [Abstract(9377)]  [View PDF(10045)926.06 K]
  • Location Privacy Preservation in Wireless Sensor Networks
  • PENG Hui, CHEN Hong, ZHANG Xiao-Ying, FAN Yong-Jian, LI Cui-Ping and LI De-Ying
  • 2015,26(3):617-639 [Abstract(8044)]  [View PDF(9517)1.10 M]
  • Research of Energy Consumption Optimization Methods for Cloud Video Surveillance System
  • XIONG Yong-Hua, ZHANG Yin-Sheng, CHEN Xin and WU Min
  • 2015,26(3):680-698 [Abstract(7510)]  [View PDF(7919)1017.61 K]