Volume 26,Issue 3,2015 Table of Contents

Other Issues:  
  
Contents

  • Resource Location Flooding Strategy of Unstructured P2P for User Requirements
  • HE Ming, ZHANG Yu-Jie and MENG Xiang-Wu
  • 2015,26(3):640-662 [Abstract(3502)]  [View PDF(5459)723.77 K]
  • Extracting and Analyzing Internet Background Radiation in Live Networks
  • MIAO Li-Hua, DING Wei and YANG Wang
  • 2015,26(3):663-679 [Abstract(3281)]  [View PDF(5193)1.10 M]
  • 3D Point Cloud Shape Feature Descriptor Using 2D Principal Manifold
  • SUN Xiao-Peng, WANG Guan, WANG Lu and WEI Xiao-Peng
  • 2015,26(3):699-709 [Abstract(4027)]  [View PDF(7453)1.48 M]
  • Special Issue's Articles

  • 业务过程管理技术专题前言
  • 王建民,尹建伟,窦万春
  • 2015,26(3):447-448 [Abstract(5575)]  [View PDF(6505)199.70 K]
  • Behavioral Similarity Algorithm for Process Models Based on Firing Sequence Collection
  • DONG Zi-He, WEN Li-Jie, HUANG Hao-Wei and WANG Jian-Min
  • 2015,26(3):449-459 [Abstract(5609)]  [View PDF(7013)750.70 K]
  • Matching Process Model Variants Based on Process Structure Tree
  • LING Ji-Min and ZHANG Li
  • 2015,26(3):460-473 [Abstract(5217)]  [View PDF(6767)792.24 K]
  • Mapping Elements Between Process Models Based on Petri Net
  • CAO Bin, WANG Jia-Xing, FAN Jing and DONG Tian-Yang
  • 2015,26(3):474-490 [Abstract(5534)]  [View PDF(7177)1.42 M]
  • Method for Behavior Conformance Checking Based on Artifact Snapshot Sequences
  • LIU Hai-Bin, LIU Guo-Hua, HUANG Li-Ming and SONG Jin-Ling
  • 2015,26(3):491-508 [Abstract(5263)]  [View PDF(6744)1.03 M]
  • Method for Conformance Checking Based on Token Log
  • LI Chuan-Yi, GE Ji-Dong, HU Hai-Yang, HU Hao and LUO Bin
  • 2015,26(3):509-532 [Abstract(5479)]  [View PDF(8070)1.58 M]
  • Parallelized Heuristic Process Mining Algorithm
  • LU Fa-Ming, ZENG Qing-Tian, DUAN Hua, CHENG Jiu-Jun and BAO Yun-Xia
  • 2015,26(3):533-549 [Abstract(5910)]  [View PDF(7881)1.05 M]
  • Process Mining Approach for Diverse Application Environments
  • YANG Li-Qin, KANG Guo-Sheng, GUO Li-Peng, TIAN Zhao-Yang, ZHANG Liang, ZHANG Xiao-Nan and GAO Xiang
  • 2015,26(3):550-561 [Abstract(5608)]  [View PDF(6741)744.22 K]
  • Workflow Task Assignment Strategy Based on Social Context
  • YU Yang, WANG Ying, LIU Xing-Mei and CHEN Jian
  • 2015,26(3):562-573 [Abstract(5944)]  [View PDF(7155)922.77 K]
  • Instance Aspect Handling-Oriented Scheduling Optimization in Workflows
  • WEN Yi-Ping, LIU Jian-Xun and CHEN Zhi-Gang
  • 2015,26(3):574-583 [Abstract(5422)]  [View PDF(6323)630.63 K]
  • Business Process Modeling with Geospatial Constraints
  • ZHU Xin-Wei, ZHU Guo-Bin and Seppe VANDEN BROUCKE
  • 2015,26(3):584-599 [Abstract(5459)]  [View PDF(6436)1.25 M]
  • Review Articles

  • Research Progress on Routing Problem in Mobile Opportunistic Networks
  • MA Hua-Dong, YUAN Pei-Yan and ZHAO Dong
  • 2015,26(3):600-616 [Abstract(9578)]  [View PDF(10538)926.06 K]
  • Location Privacy Preservation in Wireless Sensor Networks
  • PENG Hui, CHEN Hong, ZHANG Xiao-Ying, FAN Yong-Jian, LI Cui-Ping and LI De-Ying
  • 2015,26(3):617-639 [Abstract(8074)]  [View PDF(9991)1.10 M]
  • Research of Energy Consumption Optimization Methods for Cloud Video Surveillance System
  • XIONG Yong-Hua, ZHANG Yin-Sheng, CHEN Xin and WU Min
  • 2015,26(3):680-698 [Abstract(7546)]  [View PDF(8326)1017.61 K]