Volume 24,Issue 9,2013 Table of Contents
Web Service Test Data Generation Using Interface Semantic ContractHOU Ke-Jia,BAI Xiao-Ying,LU Hao,LI Shu-Fang and ZHOU Li-Zhu2013,24(9):2020-2041 [Abstract(3898)] [View PDF(6171)1.72 M]
Discovering Network Community Based on Multi-Objective OptimizationHUANG Fa-Liang,ZHANG Shi-Chao and ZHU Xiao-Feng2013,24(9):2062-2077 [Abstract(7745)] [View PDF(14236)1.02 M]
Heuristics for Solving the 2D Rectangle Packing Area Minimization Problem Basing on a Dynamic Reduction MethodHE Kun,JI Peng-Li and LI Chu-Min2013,24(9):2078-2088 [Abstract(4054)] [View PDF(7207)641.90 K]Domain-Specific Terms Extraction Based on Web Resource and User BehaviorYAN Xing-Long,LIU Yi-Qun,FANG Qi,ZHANG Min,MA Shao-Ping and RU Li-Yun2013,24(9):2089-2100 [Abstract(3980)] [View PDF(6155)713.33 K]Hand Tracking Based on Behavioral Analysis for UsersFENG Zhi-Quan,YANG Bo,ZHENG Yan-Wei,XU Tao and TANG Hao-Kui2013,24(9):2101-2116 [Abstract(3655)] [View PDF(6013)1.04 M]Query Mechanism for File Correlation in Cooperative Replica PrefetchingTIAN Tian,LUO Jun-Zhou,SONG Ai-Bo and Dong Fang2013,24(9):2117-2131 [Abstract(3520)] [View PDF(4779)806.08 K]Limited Search Mechanism for Unstructured Peer-to-Peer NetworkMEI Hong-Yan,ZHANG Yu-Jie,MENG Xiang-Wu and MA Wen-Ming2013,24(9):2132-2150 [Abstract(3670)] [View PDF(5883)1007.92 K]Event Triggered-Based Flow Control Algorithm for Mixed Traffic in Wireless Sensor NetworksWEN Shu-Sheng,HUANG Jiong,SHU Ting,XU Wei-Qiang and WANG Ya-Ming2013,24(9):2151-2164 [Abstract(3456)] [View PDF(5085)737.84 K]Statistics Counter Architecture for Backbone Network Traffic Analysis and ManagementZHANG Jin,HUANG Qing-Shan,ZHAO Wen-Dong and PENG Lai-Xian2013,24(9):2165-2181 [Abstract(3695)] [View PDF(4743)1.11 M]Embedding Method for Packet Loss Self-Measurement of Video StreamingHU Zhi-Guo,ZHANG Da-Lu,GU Li-Li,ZHANG Qi-Qiang,CHEN Zhi-Wei,ZHOU Hua-Lei and CAO Xiao-Jing2013,24(9):2182-2195 [Abstract(3670)] [View PDF(6920)818.13 K]Moving Target Localization and Tracking Algorithms: A Particle Filter Based MethodZHOU Fan,JIANG Wei,LI Shu-Quan,ZHANG Yu-Hong,ZENG Xue and WU Yue2013,24(9):2196-2213 [Abstract(4233)] [View PDF(9863)1.01 M]Media Access Control Protocol with Differential Service in Aeronautical Frequency-Hopping Ad Hoc NetworksWANG Ye-Qun,YANG Feng,HUANG Guo-Ce,ZHANG Heng-Yang and GUO Jian-Xin2013,24(9):2214-2225 [Abstract(3639)] [View PDF(5384)694.19 K]Server Allocation Approach for P2P Networks and its Heuristic AlgorithmZENG Ming-Fei and YU Shun-Zheng2013,24(9):2226-2237 [Abstract(3499)] [View PDF(7079)697.00 K]Efficient Attack to White-Box SMS4 ImplementationLIN Ting-Ting and LAI Xue-Jia2013,24(9):2238-2249 [Abstract(3604)] [View PDF(6562)647.42 K]
Constructing Software with Self-AdaptabilityDING Bo,WANG Huai-Min and SHI Dian-Xi2013,24(9):1981-2000 [Abstract(8793)] [View PDF(10769)946.63 K]Systematic Literarture Review of Software Product Line Variability Modeling TechniquesNIE Kun-Ming,ZHANG Li and FAN Zhi-Qiang2013,24(9):2001-2019 [Abstract(9262)] [View PDF(10670)944.81 K]Methods for Pattern Mining in Dynamic Networks and ApplicationsGAO Lin,YANG Jian-Ye and QIN Gui-Min2013,24(9):2042-2061 [Abstract(8690)] [View PDF(12665)1.27 M]