Volume 25,Issue 5,2014 Table of Contents
Multiobjective Evolutionary Algorithm Based on Mixture Gaussian ModelsZHOU Ai-Min,ZHANG Qing-Fu and ZHANG Gui-Xu2014,25(5):913-928 [Abstract(4639)] [View PDF(7039)2.37 M]Heuristic Clustering Method Based on Neighbor-Seeds for 454 Sequencing DataCHEN Wei,CHENG Yong-Mei,ZHANG Shao-Wu and PAN Quan2014,25(5):929-938 [Abstract(3656)] [View PDF(5842)709.07 K]Left-Right Hand Distinction for Multi-Touch Tabletop InteractionLIU Jia-Sheng,ZHANG Feng-Jun,ZHANG Zhen-Song,CHEN Hui,DAI Guo-Zhong and WANG Hong-An2014,25(5):939-952 [Abstract(3377)] [View PDF(6274)1.30 M]Optimization Algorithm Based on BenchmarkingXIE An-Shi,YU Yong-Da and HUANG Si-Ming2014,25(5):953-969 [Abstract(2930)] [View PDF(7111)1.14 M]Borel Probabilistic Rough Truth Degree of Formulae in Rough LogicSHE Yan-Hong and HE Xiao-Li2014,25(5):970-983 [Abstract(2894)] [View PDF(5102)784.98 K]Strategy Selecting Problem of Self-Adaptive Discrete Differential Evolution AlgorithmXUE Yu,ZHUANG Yi,GU Jing-Jing,CHANG Xiang-Mao and WANG Zhou2014,25(5):984-996 [Abstract(3826)] [View PDF(6044)1004.79 K]Semi-Supervised Clustering via Two-Level Random WalkHE Ping,XU Xiao-Hua,LU Lin and CHEN Ling2014,25(5):997-1013 [Abstract(3438)] [View PDF(5160)1.29 M]Formula-Layered Predicate Modal LogicSUN Mei-Ying,DENG Shao-Bo,CHEN Bo,CAO Cun-Gen and SUI Yue-Fei2014,25(5):1014-1024 [Abstract(3326)] [View PDF(5056)779.33 K]Multiobjective Particle Swarm Optimization Based on Pareto EntropyHU Wang,Gary G. YEN and ZHANG Xin2014,25(5):1025-1050 [Abstract(4278)] [View PDF(9262)1.55 M]Online and Offline Algorithms for the Ski-Rental Problem with Multiple Discount OptionsXIAO Ming-Yu and SHEN Zheng-Xiang2014,25(5):1051-1060 [Abstract(3115)] [View PDF(5533)700.78 K]Minimum-Energy Broadcast Algorithm for Wireless Sensor Networks with Unreliable CommunicationsCHENG Hong-Ju,HUANG Xing-Bo and XIONG Naixue2014,25(5):1101-1112 [Abstract(3108)] [View PDF(4876)832.35 K]Eliminating Redundant Sensed Data for Wireless Cognitive NetworksHU Gang,LIU Li-Xia,ZHOU Hang-Jun,HUANG Zhen and PENG Yu-Xing2014,25(5):1113-1124 [Abstract(3062)] [View PDF(5500)864.23 K]Cryptanalysis of a Secure and Efficient Identity-Based Signature SchemeYU Yong,NI Jian-Bing,XU Chun-Xiang and NIU Lei2014,25(5):1125-1131 [Abstract(3687)] [View PDF(5647)575.53 K]
Overview of Energy-Aware Geographic Routing Protocols in Wireless Ad Hoc NetworksHUANG Hao-Jun,YIN Hao,CHEN He-Ping,ZHANG Jun-Bao,QIAN Feng and SONG Wei2014,25(5):1061-1084 [Abstract(6622)] [View PDF(9267)1.44 M]Routing Techniques on Satellite NetworksLU Yong,ZHAO You-Jian,SUN Fu-Chun,LI Hong-Bo,NI Guo-Qi and WANG Dian-Jun2014,25(5):1085-1100 [Abstract(6932)] [View PDF(12615)1.87 M]