Volume 22,Issue zk2,2011 Table of Contents
Approach for Hardware Virtualization-Based Rootkit Detection via Physical Memory SearchingZHOU Tian-Yang,ZHU Jun-Hu,LI He-Shuai and WANG Qing-Xian2011,22(zk2):1-8 [Abstract(3384)] [View PDF(6816)660.82 K]A Kind of Attack to Free Roaming Mobile Agent Data Integrity Protection ProtocolMA Heng-Tai and LI Peng-Fei2011,22(zk2):9-16 [Abstract(3314)] [View PDF(4997)523.44 K]Flow Watermarking Scheme Based on Packet ReorderingZHANG Lian-Cheng,WANG Zhen-Xing and XU Jing2011,22(zk2):17-26 [Abstract(3428)] [View PDF(6516)614.63 K]Semantic Interoperability Oriented Method of Service AggregationLIU Jian-Xiao,HE Ke-Qing,WANG Jian,FENG Zai-Wen and NING Da2011,22(zk2):27-40 [Abstract(3619)] [View PDF(6076)753.76 K]Active Service Discovery Method Based on Context Aware EventMO Tong,CHU Wei-Jie,LI Wei-Ping,WU Zhong-Hai and LIN Hui-Ping2011,22(zk2):41-51 [Abstract(4250)] [View PDF(6554)703.00 K]Ontology-Based Service Recommendation and Its Measure StandardYANG Zhi,WU Bu-Dan and CHEN Jun-Liang2011,22(zk2):52-62 [Abstract(3627)] [View PDF(6092)828.25 K]ASBS Performance Modeling Approach using Reflective Petri NetGE Liang,ZHANG Bin,LIU Ying and LI Fei2011,22(zk2):63-79 [Abstract(3253)] [View PDF(5352)1.14 M]Marker Design and Recognition on Tiled Interaction TabletopWANG Yun-Tao,YU Chun,QIN Yong-Qiang and SHI Yuan-Chun2011,22(zk2):80-88 [Abstract(3575)] [View PDF(6060)842.20 K]Nonnegative Sparse Locally Linear CodingZHUANG Lian-Sheng,GAO Hao-Yuan,LIU Chao and YU Neng-Hai2011,22(zk2):89-95 [Abstract(3382)] [View PDF(7508)840.39 K]Physical Object Searching System in Smart HomeGENG Hui-Dong,YU Zhi-Wen,ZHANG Xin-Xin,XIA Yun-Yun and WANG Hai-Peng2011,22(zk2):96-104 [Abstract(3893)] [View PDF(5553)591.50 K]Modeling and Manipulating Context in Pervasive Computing Based on Set TheoryMA Jun,CAO Jian-Nong,MA Chao,TAO Xian-Ping and Lü Jian2011,22(zk2):105-119 [Abstract(3410)] [View PDF(5955)1.21 M]A User Model Based on Mobile EnvironmentDU Yi,TIAN Feng,DAI Guo-Zhong,WANG Feng and WANG Hong-An2011,22(zk2):120-128 [Abstract(4939)] [View PDF(6066)601.71 K]TaskShadow-V: User Task Migration Across Mobile Devices Based on VirtualizationXU Yu-Qiong,SHEN Zong-Jia,PAN Gang and LI Shi-Jian2011,22(zk2):129-136 [Abstract(3391)] [View PDF(5403)975.40 K]Sensing Surrounding Contexts using Dynamic Bluetooth InformationCHEN Yi-Qiang,LI Qiu-Shi,LIU Jun-Fa,HU Kun and CHEN Zhen-Yu2011,22(zk2):137-146 [Abstract(3326)] [View PDF(6175)671.23 K]Spatial Event Detection and OptimizationHU Jia-Feng,JIN Bei-Hong,ZHUO Wei,CHEN Hai-Biao and ZHANG Li-Feng2011,22(zk2):147-156 [Abstract(3772)] [View PDF(5794)1.57 M]Performance Study of Complex Application Programs on Tens of Thousands CoresGAO Xing-Yu,CAO Xiao-Lin,ZHAO Wei-Bo,ZHANG Ai-Qing and MO Ze-Yao2011,22(zk2):157-162 [Abstract(3405)] [View PDF(6198)577.50 K]Reduction Algorithm Optimization Based on the OpenCLYAN Shen-Gen,ZHANG Yun-Quan,LONG Guo-Ping and LI Yan2011,22(zk2):163-171 [Abstract(3634)] [View PDF(7436)534.17 K]Intensity Model with Blur Effect on GPUs Applied to Large-Scale Star SimulatorsLI Chao,ZHANG Yun-Quan,ZHENG Chang-Wen and HU Xiao-Hui2011,22(zk2):172-181 [Abstract(3186)] [View PDF(5556)666.85 K]Study on Performance Simulation of Interconnection Network under Complex Workload ModeHU Kai,CHEN Lu-Jia,WANG Zhe and JIANG Shu2011,22(zk2):182-191 [Abstract(3196)] [View PDF(5931)857.50 K]Load-Balance Analysis for the MPMD Program CCSM3WU Hong,ZHAI Yan and ZHAI Ji-Dong2011,22(zk2):192-198 [Abstract(3729)] [View PDF(5889)582.86 K]Power Capping of Large Scale Computing Systems with NInOLIU Yong-Peng,ZHU Hong,LU Kai,CHI Wan-Qing and LIU Yong-Yan2011,22(zk2):199-207 [Abstract(2995)] [View PDF(5623)738.43 K]OpenBLAS: A High Performance BLAS Library on Loongson 3A CPUZHANG Xian-Yi,WANG Qian and ZHANG Yun-Quan2011,22(zk2):208-216 [Abstract(5089)] [View PDF(8894)538.02 K]