Advanced Search

    column
    Joint TOA/AOA Localization Based on UWB for Wireless Sensor Networks
    Xiao Zhu, Tan Guanghua, Li Renfa, and Zhang Xiaoming
    2013, 50(3): 453-460.
    Abstract PDF
    Extending the Network Lifetime Using Topology Control in Ad Hoc Networks
    Li Xiaohong, Wang Wenyan, and Wang Dong
    2013, 50(3): 461-471.
    Abstract PDF
    An Adaptive Beacon Exchange Algorithm Based on Link Broken Probability
    Zhang Hengyang, Zheng Bo, Chen Xiaoping, and Yu Jia
    2013, 50(3): 472-480.
    Abstract PDF
    An Adaptive Dynamic Redundant Reservation Strategy in Grid Computing
    Xiao Peng, Hu Zhigang
    2013, 50(3): 481-489.
    Abstract PDF
    Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network
    Liao Xiaojing, Li Jianzhong, and Yu Lei
    2013, 50(3): 490-497.
    Abstract PDF
    Network Intrusion Detection Model Based on Context Verification
    Tian Zhihong, Wang Bailing, Zhang Weizhe, Ye Jianwei, and Zhang Hongli
    2013, 50(3): 498-508.
    Abstract PDF
    TIV and Access Delay in the Internet Delay Space
    Wang Zhanfeng, Chen Ming, Xing Changyou, Bai Huali, and Wei Xianglin
    2013, 50(3): 509-516.
    Abstract PDF
    Centralized-Calculating-Based 2-Disjoint Multipath Routing Algorithm for Wireless Sensor Networks
    Yu Leilei, Chen Dongyan, Liu Yuemei, Huang Xu
    2013, 50(3): 517-523.
    Abstract PDF
    A Line of Sight Fingerprint Localization Algorithm Resisting Multipath and Shadow
    Chen Yongle, Zhu Hongsong, Sun Limin
    2013, 50(3): 524-531.
    Abstract PDF
    A New Key Hiding Scheme Based on Fingerprint
    Li Ximing, Yang Bo, Guo Yubin, Yao Jintao
    2013, 50(3): 532-539.
    Abstract PDF
    An End-to-End Authentication Protocol for Satellite Communication Network
    Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui
    2013, 50(3): 540-547.
    Abstract PDF
    A Membership Degree Refinement-Based Evolutionary Clustering Algorithm
    Hou Wei, Dong Hongbin, Yin Guisheng
    2013, 50(3): 548-558.
    Abstract PDF
    Measuring Ontology Inconsistency Based on Dempster-Shafer Theory
    Li Dongmei, Lin Youfang, Huang Houkuan, Tian Xuan
    2013, 50(3): 559-567.
    Abstract PDF
    An In-Building Localization Algorithm Based on Wi-Fi Signal Fingerprint
    Niu Jianwei, Liu Yang, Lu Banghui, and Song Wenfang
    2013, 50(3): 568-577.
    Abstract PDF
    A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing
    Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, Liao Shangbin
    2013, 50(3): 578-593.
    Abstract PDF
    A Column-Store Based Bucket Partition Algorithm for Range Queries
    Li Yefeng, Le Jiajin, and Wang Mei
    2013, 50(3): 594-601.
    Abstract PDF
    Hylomorphisms with Parameters and Its Associated Calculational Laws
    Yu Shanshan, Li Shixian, Su Jindian
    2013, 50(3): 602-618.
    Abstract PDF
    Application of Artificial Neural Network in Software Multi-Faults Location
    He Jialang, Zhang Hong
    2013, 50(3): 619-625.
    Abstract PDF
    Formal Description of Software Dynamic Correctness
    Ma Yanfang, Zhang Min, Chen Yixiang
    2013, 50(3): 626-635.
    Abstract PDF
    A Data Placement Approach for Workflow in Cloud
    Zhang Peng, Wang Guiling, Xu Xuehui
    2013, 50(3): 636-647.
    Abstract PDF
    Auto-Tuning of SpMV for Diagonal Sparse Matrices
    Sun Xiangzheng, Zhang Yunquan, Wang Ting, Li Yan, Yuan Liang
    2013, 50(3): 648-656.
    Abstract PDF
    A Polynomial Time Approximation Scheme for the Traveling Salesman Problem in Curved Surfaces
    Wang Gang and Luo Zhigang
    2013, 50(3): 657-665.
    Abstract PDF
    An Algorithm in Tile Assembly Model for Maximum Clique Problem
    Li Kenli, Luo Xing, Wu Fan, Zhou Xu, and Huang Xin
    2013, 50(3): 666-675.
    Abstract PDF