Volume 25,Issue 5,2014 Table of Contents
Multiobjective Evolutionary Algorithm Based on Mixture Gaussian ModelsZHOU Ai-Min,ZHANG Qing-Fu and ZHANG Gui-Xu2014,25(5):913-928 [Abstract(4671)] [View PDF(7141)2.37 M]Heuristic Clustering Method Based on Neighbor-Seeds for 454 Sequencing DataCHEN Wei,CHENG Yong-Mei,ZHANG Shao-Wu and PAN Quan2014,25(5):929-938 [Abstract(3675)] [View PDF(5962)709.07 K]Left-Right Hand Distinction for Multi-Touch Tabletop InteractionLIU Jia-Sheng,ZHANG Feng-Jun,ZHANG Zhen-Song,CHEN Hui,DAI Guo-Zhong and WANG Hong-An2014,25(5):939-952 [Abstract(3404)] [View PDF(6386)1.30 M]Optimization Algorithm Based on BenchmarkingXIE An-Shi,YU Yong-Da and HUANG Si-Ming2014,25(5):953-969 [Abstract(2950)] [View PDF(7320)1.14 M]Borel Probabilistic Rough Truth Degree of Formulae in Rough LogicSHE Yan-Hong and HE Xiao-Li2014,25(5):970-983 [Abstract(2908)] [View PDF(5207)784.98 K]Strategy Selecting Problem of Self-Adaptive Discrete Differential Evolution AlgorithmXUE Yu,ZHUANG Yi,GU Jing-Jing,CHANG Xiang-Mao and WANG Zhou2014,25(5):984-996 [Abstract(3854)] [View PDF(6132)1004.79 K]Semi-Supervised Clustering via Two-Level Random WalkHE Ping,XU Xiao-Hua,LU Lin and CHEN Ling2014,25(5):997-1013 [Abstract(3454)] [View PDF(5261)1.29 M]Formula-Layered Predicate Modal LogicSUN Mei-Ying,DENG Shao-Bo,CHEN Bo,CAO Cun-Gen and SUI Yue-Fei2014,25(5):1014-1024 [Abstract(3339)] [View PDF(5205)779.33 K]Multiobjective Particle Swarm Optimization Based on Pareto EntropyHU Wang,Gary G. YEN and ZHANG Xin2014,25(5):1025-1050 [Abstract(4312)] [View PDF(9418)1.55 M]Online and Offline Algorithms for the Ski-Rental Problem with Multiple Discount OptionsXIAO Ming-Yu and SHEN Zheng-Xiang2014,25(5):1051-1060 [Abstract(3145)] [View PDF(5668)700.78 K]Minimum-Energy Broadcast Algorithm for Wireless Sensor Networks with Unreliable CommunicationsCHENG Hong-Ju,HUANG Xing-Bo and XIONG Naixue2014,25(5):1101-1112 [Abstract(3120)] [View PDF(4970)832.35 K]Eliminating Redundant Sensed Data for Wireless Cognitive NetworksHU Gang,LIU Li-Xia,ZHOU Hang-Jun,HUANG Zhen and PENG Yu-Xing2014,25(5):1113-1124 [Abstract(3074)] [View PDF(5578)864.23 K]Cryptanalysis of a Secure and Efficient Identity-Based Signature SchemeYU Yong,NI Jian-Bing,XU Chun-Xiang and NIU Lei2014,25(5):1125-1131 [Abstract(3717)] [View PDF(5749)575.53 K]
Overview of Energy-Aware Geographic Routing Protocols in Wireless Ad Hoc NetworksHUANG Hao-Jun,YIN Hao,CHEN He-Ping,ZHANG Jun-Bao,QIAN Feng and SONG Wei2014,25(5):1061-1084 [Abstract(6645)] [View PDF(9678)1.44 M]Routing Techniques on Satellite NetworksLU Yong,ZHAO You-Jian,SUN Fu-Chun,LI Hong-Bo,NI Guo-Qi and WANG Dian-Jun2014,25(5):1085-1100 [Abstract(6983)] [View PDF(13124)1.87 M]