Volume 22,Issue zk2,2011 Table of Contents
Approach for Hardware Virtualization-Based Rootkit Detection via Physical Memory SearchingZHOU Tian-Yang,ZHU Jun-Hu,LI He-Shuai and WANG Qing-Xian2011,22(zk2):1-8 [Abstract(3398)] [View PDF(6895)660.82 K]A Kind of Attack to Free Roaming Mobile Agent Data Integrity Protection ProtocolMA Heng-Tai and LI Peng-Fei2011,22(zk2):9-16 [Abstract(3335)] [View PDF(5061)523.44 K]Flow Watermarking Scheme Based on Packet ReorderingZHANG Lian-Cheng,WANG Zhen-Xing and XU Jing2011,22(zk2):17-26 [Abstract(3452)] [View PDF(6592)614.63 K]Semantic Interoperability Oriented Method of Service AggregationLIU Jian-Xiao,HE Ke-Qing,WANG Jian,FENG Zai-Wen and NING Da2011,22(zk2):27-40 [Abstract(3640)] [View PDF(6154)753.76 K]Active Service Discovery Method Based on Context Aware EventMO Tong,CHU Wei-Jie,LI Wei-Ping,WU Zhong-Hai and LIN Hui-Ping2011,22(zk2):41-51 [Abstract(4274)] [View PDF(6653)703.00 K]Ontology-Based Service Recommendation and Its Measure StandardYANG Zhi,WU Bu-Dan and CHEN Jun-Liang2011,22(zk2):52-62 [Abstract(3650)] [View PDF(6164)828.25 K]ASBS Performance Modeling Approach using Reflective Petri NetGE Liang,ZHANG Bin,LIU Ying and LI Fei2011,22(zk2):63-79 [Abstract(3268)] [View PDF(5459)1.14 M]Marker Design and Recognition on Tiled Interaction TabletopWANG Yun-Tao,YU Chun,QIN Yong-Qiang and SHI Yuan-Chun2011,22(zk2):80-88 [Abstract(3594)] [View PDF(6149)842.20 K]Nonnegative Sparse Locally Linear CodingZHUANG Lian-Sheng,GAO Hao-Yuan,LIU Chao and YU Neng-Hai2011,22(zk2):89-95 [Abstract(3403)] [View PDF(7625)840.39 K]Physical Object Searching System in Smart HomeGENG Hui-Dong,YU Zhi-Wen,ZHANG Xin-Xin,XIA Yun-Yun and WANG Hai-Peng2011,22(zk2):96-104 [Abstract(3914)] [View PDF(5631)591.50 K]Modeling and Manipulating Context in Pervasive Computing Based on Set TheoryMA Jun,CAO Jian-Nong,MA Chao,TAO Xian-Ping and Lü Jian2011,22(zk2):105-119 [Abstract(3435)] [View PDF(6052)1.21 M]A User Model Based on Mobile EnvironmentDU Yi,TIAN Feng,DAI Guo-Zhong,WANG Feng and WANG Hong-An2011,22(zk2):120-128 [Abstract(4967)] [View PDF(6142)601.71 K]TaskShadow-V: User Task Migration Across Mobile Devices Based on VirtualizationXU Yu-Qiong,SHEN Zong-Jia,PAN Gang and LI Shi-Jian2011,22(zk2):129-136 [Abstract(3410)] [View PDF(5480)975.40 K]Sensing Surrounding Contexts using Dynamic Bluetooth InformationCHEN Yi-Qiang,LI Qiu-Shi,LIU Jun-Fa,HU Kun and CHEN Zhen-Yu2011,22(zk2):137-146 [Abstract(3355)] [View PDF(6269)671.23 K]Spatial Event Detection and OptimizationHU Jia-Feng,JIN Bei-Hong,ZHUO Wei,CHEN Hai-Biao and ZHANG Li-Feng2011,22(zk2):147-156 [Abstract(3793)] [View PDF(5884)1.57 M]Performance Study of Complex Application Programs on Tens of Thousands CoresGAO Xing-Yu,CAO Xiao-Lin,ZHAO Wei-Bo,ZHANG Ai-Qing and MO Ze-Yao2011,22(zk2):157-162 [Abstract(3422)] [View PDF(6289)577.50 K]Reduction Algorithm Optimization Based on the OpenCLYAN Shen-Gen,ZHANG Yun-Quan,LONG Guo-Ping and LI Yan2011,22(zk2):163-171 [Abstract(3658)] [View PDF(7529)534.17 K]Intensity Model with Blur Effect on GPUs Applied to Large-Scale Star SimulatorsLI Chao,ZHANG Yun-Quan,ZHENG Chang-Wen and HU Xiao-Hui2011,22(zk2):172-181 [Abstract(3211)] [View PDF(5635)666.85 K]Study on Performance Simulation of Interconnection Network under Complex Workload ModeHU Kai,CHEN Lu-Jia,WANG Zhe and JIANG Shu2011,22(zk2):182-191 [Abstract(3220)] [View PDF(6009)857.50 K]Load-Balance Analysis for the MPMD Program CCSM3WU Hong,ZHAI Yan and ZHAI Ji-Dong2011,22(zk2):192-198 [Abstract(3755)] [View PDF(5965)582.86 K]Power Capping of Large Scale Computing Systems with NInOLIU Yong-Peng,ZHU Hong,LU Kai,CHI Wan-Qing and LIU Yong-Yan2011,22(zk2):199-207 [Abstract(3013)] [View PDF(5767)738.43 K]OpenBLAS: A High Performance BLAS Library on Loongson 3A CPUZHANG Xian-Yi,WANG Qian and ZHANG Yun-Quan2011,22(zk2):208-216 [Abstract(5135)] [View PDF(9011)538.02 K]