Volume 26,Issue 3,2015 Table of Contents
Resource Location Flooding Strategy of Unstructured P2P for User RequirementsHE Ming, ZHANG Yu-Jie and MENG Xiang-Wu2015,26(3):640-662 [Abstract(3488)] [View PDF(5358)723.77 K]Extracting and Analyzing Internet Background Radiation in Live NetworksMIAO Li-Hua, DING Wei and YANG Wang2015,26(3):663-679 [Abstract(3265)] [View PDF(5101)1.10 M]3D Point Cloud Shape Feature Descriptor Using 2D Principal ManifoldSUN Xiao-Peng, WANG Guan, WANG Lu and WEI Xiao-Peng2015,26(3):699-709 [Abstract(4005)] [View PDF(7367)1.48 M]
业务过程管理技术专题前言王建民,尹建伟,窦万春2015,26(3):447-448 [Abstract(5558)] [View PDF(6098)199.70 K]Behavioral Similarity Algorithm for Process Models Based on Firing Sequence CollectionDONG Zi-He, WEN Li-Jie, HUANG Hao-Wei and WANG Jian-Min2015,26(3):449-459 [Abstract(5589)] [View PDF(6620)750.70 K]Matching Process Model Variants Based on Process Structure TreeLING Ji-Min and ZHANG Li2015,26(3):460-473 [Abstract(5207)] [View PDF(6330)792.24 K]Mapping Elements Between Process Models Based on Petri NetCAO Bin, WANG Jia-Xing, FAN Jing and DONG Tian-Yang2015,26(3):474-490 [Abstract(5510)] [View PDF(6715)1.42 M]Method for Behavior Conformance Checking Based on Artifact Snapshot SequencesLIU Hai-Bin, LIU Guo-Hua, HUANG Li-Ming and SONG Jin-Ling2015,26(3):491-508 [Abstract(5240)] [View PDF(6300)1.03 M]Method for Conformance Checking Based on Token LogLI Chuan-Yi, GE Ji-Dong, HU Hai-Yang, HU Hao and LUO Bin2015,26(3):509-532 [Abstract(5454)] [View PDF(7577)1.58 M]Parallelized Heuristic Process Mining AlgorithmLU Fa-Ming, ZENG Qing-Tian, DUAN Hua, CHENG Jiu-Jun and BAO Yun-Xia2015,26(3):533-549 [Abstract(5890)] [View PDF(7474)1.05 M]Process Mining Approach for Diverse Application EnvironmentsYANG Li-Qin, KANG Guo-Sheng, GUO Li-Peng, TIAN Zhao-Yang, ZHANG Liang, ZHANG Xiao-Nan and GAO Xiang2015,26(3):550-561 [Abstract(5579)] [View PDF(6280)744.22 K]Workflow Task Assignment Strategy Based on Social ContextYU Yang, WANG Ying, LIU Xing-Mei and CHEN Jian2015,26(3):562-573 [Abstract(5932)] [View PDF(6708)922.77 K]Instance Aspect Handling-Oriented Scheduling Optimization in WorkflowsWEN Yi-Ping, LIU Jian-Xun and CHEN Zhi-Gang2015,26(3):574-583 [Abstract(5393)] [View PDF(5979)630.63 K]Business Process Modeling with Geospatial ConstraintsZHU Xin-Wei, ZHU Guo-Bin and Seppe VANDEN BROUCKE2015,26(3):584-599 [Abstract(5444)] [View PDF(6014)1.25 M]
Research Progress on Routing Problem in Mobile Opportunistic NetworksMA Hua-Dong, YUAN Pei-Yan and ZHAO Dong2015,26(3):600-616 [Abstract(9377)] [View PDF(10045)926.06 K]Location Privacy Preservation in Wireless Sensor NetworksPENG Hui, CHEN Hong, ZHANG Xiao-Ying, FAN Yong-Jian, LI Cui-Ping and LI De-Ying2015,26(3):617-639 [Abstract(8044)] [View PDF(9517)1.10 M]Research of Energy Consumption Optimization Methods for Cloud Video Surveillance SystemXIONG Yong-Hua, ZHANG Yin-Sheng, CHEN Xin and WU Min2015,26(3):680-698 [Abstract(7510)] [View PDF(7919)1017.61 K]