Volume 22,Issue 8,2011 Table of Contents
Retrieval Effectiveness Analysis for Anchor TextsZHOU Bo,LIU Yi-Qun,ZHANG Min,JIN Yi-Jiang and MA Shao-Ping2011,22(8):1714-1724 [Abstract(5179)] [View PDF(6277)645.17 K]Semantic Role Labeling in Chinese Language for Nominal PredicatesLI Jun-Hui,ZHOU Guo-Dong,ZHU Qiao-Ming and QIAN Pei-De2011,22(8):1725-1737 [Abstract(5951)] [View PDF(7745)706.38 K]Learning and Synchronized Privacy Preserving Frequent Pattern MiningGUO Yu-Hong,TONG Yun-Hai,TANG Shi-Wei and WU Leng-Dong2011,22(8):1749-1760 [Abstract(5242)] [View PDF(6309)650.23 K]Mining Hotspots from Multiple Text Streams Based on Stream Information DistanceYANG Ning,TANG Chang-Jie,WANG Yue,CHEN Yu,ZHENG Jiao-Ling and LI Hong-Jun2011,22(8):1761-1770 [Abstract(4881)] [View PDF(5916)608.39 K]Indexing the World Wide Web: Intelligent Query Suggestion Based on Term Relation NetworkLI Ya-Nan,WANG Bin,LI Jin-Tao and LI Peng2011,22(8):1771-1784 [Abstract(4864)] [View PDF(6814)505.71 K]Finding High Quality Threads in Web ForumsCHEN You,CHENG Xue-Qi and YANG Sen2011,22(8):1785-1804 [Abstract(5780)] [View PDF(8868)471.31 K]Continuous K Nearest Neighbor Queries over Moving Objects Based on Multi-Core and Multi- ThreadingZHAO Liang,JING Ning,CHEN Luo,LIAO Wei and ZHONG Zhi-Nong2011,22(8):1805-1815 [Abstract(4862)] [View PDF(6173)616.21 K]Near Duplicated Web Pages Detection Based on Concept and Semantic NetworkCAO Yu-Juan,NIU Zhen-Dong,ZHAO Kun and PENG Xue-Ping2011,22(8):1816-1826 [Abstract(5456)] [View PDF(7510)668.40 K]Efficient Cluster Analysis Method for Protein SequencesTANG Dong-Ming,ZHU Qing-Xin,YANG Fan and CHEN Ke2011,22(8):1827-1837 [Abstract(5716)] [View PDF(10174)613.34 K]Network Cross-Layer Mapping Based on Utility MaximizationLI Shi-Yong,YANG Dong,QIN Ya-Juan and ZHANG Hong-Ke2011,22(8):1855-1871 [Abstract(4658)] [View PDF(6139)837.25 K]Fine-Grained Mandatory Query Access Control Model and Its Efficient Realization for Spatial Vector DataZHANG Yan,CHEN Chi and FENG Deng-Guo2011,22(8):1872-1883 [Abstract(5096)] [View PDF(6273)780.78 K]Detection Approach of DDoS Attacks Based on Conditional Random FieldsLIU Yun,CAI Zhi-Ping,ZHONG Ping,YIN Jian-Ping and CHENG Jie-Ren2011,22(8):1897-1910 [Abstract(4703)] [View PDF(8779)749.40 K]Impossible Differential and Integral Cryptanalysis of ZodiacSUN Bing,SUN Bing and SUN Bing2011,22(8):1911-1917 [Abstract(4957)] [View PDF(5929)407.72 K]Certificateless Signcryption Scheme Without Bilinear PairingLIU Wen-Hao and XU Chun-Xiang2011,22(8):1918-1926 [Abstract(6252)] [View PDF(7793)483.62 K]Efficient Rendering of Single-Pass Order-Independent Transparency via CUDA RendererHUANG Meng-Cheng,LIU Fang,LIU Xue-Hui and WU En-Hua2011,22(8):1927-1933 [Abstract(5097)] [View PDF(6808)485.51 K]Approach for Physically-Based Animation of Tree Branches Impacting by RaindropsYANG Meng and WU En-Hua2011,22(8):1934-1947 [Abstract(5368)] [View PDF(6817)667.55 K]All-Frequency Shadows Rendering Algorithm for Dynamic Scenes Based on Harr WaveletsZHAO Qin-Ping and CHE Ying-Hui2011,22(8):1948-1959 [Abstract(4521)] [View PDF(6228)749.87 K]Fuzzy Description and Extracting Methods of Complex Feature Regions in Flow FieldsXU Hua-Xun,LI Si-Kun,MA Qian-Li and CAI Xun2011,22(8):1960-1972 [Abstract(4444)] [View PDF(6418)967.19 K]
Research on Markov Logic NetworksXU Cong-Fu,HAO Chun-Liang,SU Bao-Jun and LOU Jun-Jie2011,22(8):1699-1713 [Abstract(11400)] [View PDF(17943)764.57 K]
Dynamic Niche-Based Self-Organizing Learning AlgorithmZHOU Chuan-Hua and ZHOU Chuan-Hua2011,22(8):1738-1748 [Abstract(6935)] [View PDF(6849)667.87 K]
Regular Expressions Matching for Network SecurityZHANG Shu-Zhuang,LUO Hao and FANG Bin-Xing2011,22(8):1838-1854 [Abstract(8714)] [View PDF(14599)864.69 K]
Collusion-Resistant Digital Fingerprinting Based on Residual Characters TrackingWANG Zu-Xi,WANG Wen-Zong,GE Qiang and HU Han-Ping2011,22(8):1884-1896 [Abstract(5772)] [View PDF(6615)801.68 K]