Volume 27,Issue S2,2016 Table of Contents
Influence Maximization Algorithm Based on the Weak Tie in Social NetworkYI Xiu-Shuang, HU Jin-Lin and WANG Xing-Wei2016,27(S2):1-11 [Abstract(2145)] [View PDF(4806)1.61 M]Hierarchical Identity-Based Key Agreement Protocol of InternetXUE Tian, WANG Xiao-Feng, SU Jin-Shu and CHEN Pei-Xin2016,27(S2):12-17 [Abstract(1883)] [View PDF(3425)885.11 K]Research on Reconfigurable Parallel Routing Lookup Algorithm Based on Heterogeneous Network Processing PlatformYAN Jin-Li, LÜ Gao-Feng, TANG Lu, LI Tao and SUN Zhi-Gang2016,27(S2):18-24 [Abstract(2019)] [View PDF(3385)1.11 M]Network Processing Development Kit Based on Self-Described BufferTANG Lu, XU Dong-Lai, LÜ Gao-Feng, LI Tao and SUN Zhi-Gang2016,27(S2):25-34 [Abstract(1732)] [View PDF(3398)1.84 M]Design and Implementation of Software Defined Mobile Communication for Campus WiFi NetworksWU Jun-Qing, CHEN Ming, HU Chao and ZHANG Guo-Min2016,27(S2):35-42 [Abstract(1735)] [View PDF(3246)1.43 M]Backbone Active IP Address Space Detection Based on Flow RecordsZHANG Ling-Feng, DING Wei, GONG Jian and MIAO Li-Hua2016,27(S2):43-49 [Abstract(3243)] [View PDF(3948)1003.36 K]A FSM-Based Hardware Monitoring Technology for Packet ProcessingLI Jun-Nan, HU Kai, LI Tao and TANG Lu2016,27(S2):50-57 [Abstract(1800)] [View PDF(3433)1.22 M]Dynamic Gesture Detection and ClassificationWANG Han-Jie, CHAI Xiu-Juan and CHEN Xi-Lin2016,27(S2):58-63 [Abstract(1958)] [View PDF(4893)1.42 M]Speech Mask Estimation Using the Time-Frequency Correlation of Speech PresenceZHAN Ge, HUANG Zhao-Qiong, YING Dong-Wen, PAN Jie-Lin and YAN Yong-Hong2016,27(S2):64-68 [Abstract(2009)] [View PDF(3773)1.26 M]Error Analysis of Intention Classification and Speech Recognition in Human-Computer DialogYANG Ming-Hao, GAO Ting-Li, TAO Jian-Hua, ZHANG Da-Wei, SUN Meng-Yi, LI Hao and CHAO Lin-Lin2016,27(S2):69-75 [Abstract(1973)] [View PDF(4377)1.21 M]Mental Pressure Analysis Based on Reflective PhotoplethysmogramTIAN Yuan, RONG Si-Ke, LÜ Yong-Qiang and SHI Yuan-Chun2016,27(S2):76-81 [Abstract(2198)] [View PDF(4091)1.14 M]Potential Intention Detecting Model Based on Human-Computer CollaborationLIU Sheng-Hang, ZHU Jia-Qi, DENG Chang-Zhi, LUO Xiong-Fei and WANG Hong-An2016,27(S2):82-90 [Abstract(1993)] [View PDF(4469)1.43 M]QoE Preemptive RRTCC Transmission Improvement Strategy for Mobile NetworkGE Zhi-Hui, CEN Xiao, LI Tao-Shen and YE Jin2016,27(S2):91-102 [Abstract(2037)] [View PDF(4665)2.18 M]No Reference Video Quality Assessment Based on 3D Convolutional Neural NetworkWANG Chun-Feng, SU Li, ZHANG Wei-Gang and HUANG Qing-Ming2016,27(S2):103-112 [Abstract(3075)] [View PDF(5271)1.66 M]Binarization Method Based on Binary Tree for Arithmetic Coding in Screen Content CodingTAO Pin, JIANG Nan and YANG Shi-Qiang2016,27(S2):113-119 [Abstract(1770)] [View PDF(4319)1.54 M]Visualized Diagnosing Technique for Clinical Decision-Making and ReasoningZHAO Rui, ZHU Wei-Guo, MA Cui-Xia and TENG Dong-Xing2016,27(S2):120-129 [Abstract(1804)] [View PDF(3618)3.12 M]A Speech Emotion Recognition Based on Unsupervised Autoencoder in the Intervention of AutismGE Lei, QIANG Yan and ZHAO Juan-Juan2016,27(S2):130-136 [Abstract(1832)] [View PDF(3897)1.14 M]Random Increased Hybrid Learning Machine Oriented Human Body Movement IdentificationCHANG Zheng, BAN Xiao-Juan, MA Bo-Yuan and XING Yi-Ming2016,27(S2):137-147 [Abstract(2005)] [View PDF(3895)2.83 M]Visual Fatigue Detection Based on Eye Tracking DataHU Wei, ZHAO Xiao-Yan, CHEN Quan, FENG Gui-Huan and LUO Bin2016,27(S2):148-155 [Abstract(2583)] [View PDF(5295)1.27 M]Multimodal Human-Computer Interaction Model for Nerve Function Assessment in Mobile EnvironmentHUANG Jin, CHEN Yi-Neng, LIU Jie, TIAN Feng, DAI Guo-Zhong and WANG Hong-An2016,27(S2):156-171 [Abstract(1941)] [View PDF(3665)2.41 M]Local Pose Prior Based 3D Human Motion Capture from Depth CameraSU Le, CHAI Jin-Xiang and XIA Shi-Hong2016,27(S2):172-183 [Abstract(2427)] [View PDF(4246)6.10 M]Image Approximation on Capacity-Constrained Power DiagramLIU Hong-Wei, CAO Juan and CHEN Zhong-Gui2016,27(S2):184-196 [Abstract(1759)] [View PDF(4059)3.22 M]Virtual-Real Fusion System Integrated with Multiple VideosPAN Cheng-Wei, ZHANG Jian-Guo, WANG Shao-Rong and WANG Guo-Ping2016,27(S2):197-206 [Abstract(2519)] [View PDF(5799)2.93 M]Sketch-Based Interactive Modeling of GeologyWANG Yu-Tong, CHEN Hao, TIAN Tang-Hao and JIN Xiao-Gang2016,27(S2):207-219 [Abstract(2054)] [View PDF(3728)4.37 M]Computational Aesthetic Evaluation of Chinese Wash PaintingsZHANG Jia-Jing, PENG Ren, WANG Jian and YU Jin-Hui2016,27(S2):220-233 [Abstract(2248)] [View PDF(4618)4.57 M]Fast Content Verification for Named Data NetworkingWANG Yi and LIU Bin2016,27(S2):234-242 [Abstract(2039)] [View PDF(3906)1.20 M]Traffic Balancing in Data Center NetworksLI Zhao-Geng and BI Jun2016,27(S2):243-253 [Abstract(2217)] [View PDF(6800)1.44 M]Maximum Probability Path Scheduling Algorithm for Elephant Flow in Data Center Networks Based on SDNCHEN Lin and ZHANG Fu-Qiang2016,27(S2):254-260 [Abstract(2419)] [View PDF(7474)1.14 M]Multicast Routing Algorithm Based on the Asexual Propagation Optimization in Cognitive NetworksHUANG Xi-Wen, WANG Xing-Wei, LI Jie and HUANG Min2016,27(S2):261-271 [Abstract(1854)] [View PDF(3283)1.58 M]Decomposition Storage Model of Two-Dimensional FIBLAN Li-Jing, CHEN Wen-Long and TANG Xiao-Lan2016,27(S2):272-282 [Abstract(1788)] [View PDF(3462)1.55 M]LISP-MNet: A Mobility Support Identity/Locator Separation SchemeZHOU Yue-Xian, WANG Bao-Sheng, DENG Wen-Ping, TANG Zhu and GAO Xian-Ming2016,27(S2):283-290 [Abstract(1837)] [View PDF(3728)1.62 M]16043. htm The QoS Supported Handover Decision Scheme Based on Fast Continuous Ant Colony AlgorithmZHOU Yu, WANG Xing-Wei, LI Jie and HUANG Min2016,27(S2):291-300 [Abstract(1883)] [View PDF(3563)1.32 M]BAF Analysis of UDP Reflection DDoS AttacksZHOU Wen-Feng, DING Wei and LI Gang2016,27(S2):301-308 [Abstract(3346)] [View PDF(5401)1.27 M]Evolution of Urban Car Sharing Mode Based on Travel DemandFU Yao, XU Ke and SU Hui2016,27(S2):309-319 [Abstract(2103)] [View PDF(4996)1.92 M]Design of Persistent Embedded Main Memory Databases on Non-Volatile MemoryEdwin H.-M. SHA, CHEN Xian-Zhang, MA Dian-Long and ZHUGE Qing-Feng2016,27(S2):320-327 [Abstract(2690)] [View PDF(5642)1.14 M]Model-Based Performance Analysis Framework for Embedded SystemsZHU Xue-Yang2016,27(S2):328-335 [Abstract(3051)] [View PDF(4284)2.87 M]