Volume 22,Issue 7,2011 Table of Contents
Web Service Business Protocol Mining Based on Message LogsLI Xiang,HUAI Jin-Peng,LIU Xu-Dong,SUN Hai-Long and QU Xian-Yang2011,22(7):1413-1425 [Abstract(4918)] [View PDF(6346)883.43 K]Web Service Dynamic Selection by the Decomposition of Global QoS ConstraintsWANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun2011,22(7):1426-1439 [Abstract(6514)] [View PDF(7206)773.70 K]Fault-Tolerant Scheduling for Real-Time Tasks with QoS Requirements on Heterogeneous ClustersZHU Xiao-Min,ZHU Jiang-Han and MA Man-Hao2011,22(7):1440-1456 [Abstract(5217)] [View PDF(6130)872.32 K]DFSM-Based Minimum Test Cost Transition Coverage CriterionLIU Pan,MIAO Huai-Kou,ZENG Hong-Wei and MEI Jia2011,22(7):1457-1474 [Abstract(5222)] [View PDF(6414)850.28 K]Performance Optimization of Application Algorithms for Heterogeneous Multi-Processor System-on-ChipsZHAO Peng,YAN Ming and LI Si-Kun2011,22(7):1475-1487 [Abstract(4184)] [View PDF(6763)695.64 K]Framework for Tracking the Event-Based Evolution in Social NetworksWU Bin,WANG Bai and YANG Sheng-Qi2011,22(7):1488-1502 [Abstract(6466)] [View PDF(7781)662.65 K]Decidable Temporal Dynamic Description LogicCHANG Liang,SHI Zhong-Zhi,GU Tian-Long and WANG Xiao-Feng2011,22(7):1524-1537 [Abstract(5172)] [View PDF(5999)871.49 K]Heuristic Survey Propagation Algorithm for Solving QBF ProblemYIN Ming-Hao,ZHOU Jun-Ping,SUN Ji-Gui and GU Wen-Xiang2011,22(7):1538-1550 [Abstract(5628)] [View PDF(6629)656.79 K]Theoretical Analysis for the Optimization Problem of Support Vector Data DescriptionWANG Xiao-Ming and WANG Shi-Tong2011,22(7):1551-1560 [Abstract(4744)] [View PDF(5715)603.36 K]Optimal Discriminant Analysis Based on Kernel Extension of Graph Embedding and Face RecognitionLU Gui-Fu,LIN Zhong and JIN Zhong2011,22(7):1561-1570 [Abstract(4749)] [View PDF(6405)614.91 K]Outlier Detection Approach Based on Reconstruction WeightsWANG Jing2011,22(7):1571-1579 [Abstract(5128)] [View PDF(5804)548.89 K]Mobile Distribution-Aware Data Dissemination for Vehicular Ad Hoc NetworksWU Lei,LIU Ming,WANG Xiao-Min,CHEN Gui-Hai and GONG Hai-Gang2011,22(7):1580-1596 [Abstract(5354)] [View PDF(6345)649.56 K]Performance Evaluation of Localization Algorithms for Mobile Sensor NetworksZHANG Shi-Geng,ZENG Ying-Pei,CHEN Li-Jun,CHEN Dao-Xu and XIE Li2011,22(7):1597-1611 [Abstract(4754)] [View PDF(6845)915.90 K]Localization Model in Wireless Sensor NetworksZHU Jian,ZHAO Hai,XU Jiu-Qiang and LI Da-Zhou2011,22(7):1612-1625 [Abstract(5876)] [View PDF(7181)809.85 K]Delay-Constrained and Energy-Efficient Cross-Layer Routing in Wireless Sensor NetworksWANG Xin-Guo,ZHANG Xin-Ming and CHEN Guo-Liang2011,22(7):1626-1640 [Abstract(6958)] [View PDF(7225)870.29 K]Attack Analysis Model on Ad Hoc Security Routing Protocol Based on Strand Space ModelDONG Xue-Wen,MA Jian-Feng,NIU Wen-Sheng,MAO Li-Qiang and XIE Hui2011,22(7):1641-1651 [Abstract(5319)] [View PDF(5786)635.32 K]On the XOR Branch Numbers of the Transformations About Modulo 2n Addition andModulo 2 AdditionCHANG Ya-Qin and JIN Chen-Hui2011,22(7):1652-1660 [Abstract(5671)] [View PDF(6338)505.38 K]Attribute-Based Authorization Delegation Model in Multi-Domain EnvironmentsWU Bin and FENG Deng-Guo2011,22(7):1661-1675 [Abstract(4841)] [View PDF(5529)735.04 K]Syntax and Behavior Semantics Analysis of Network Protocol of MalwareYING Ling-Yun,YANG Yi,FENG Deng-Guo and SU Pu-Rui2011,22(7):1676-1689 [Abstract(5300)] [View PDF(8806)815.00 K]Efficient Certificateless Hybrid SigncryptionSUN Yin-Xia and LI Hui2011,22(7):1690-1698 [Abstract(4886)] [View PDF(6257)583.96 K]
Automatic Age Estimation Based on Visual and Audio InformationFANG Er-Qing and GENG Xin2011,22(7):1503-1523 [Abstract(9455)] [View PDF(12669)641.44 K]