Advanced Search

    column
    WInternet: From Net of Things to Internet of Things
    Jianjia Wu and Wei Zhao
    2013, 50(6): 1127-1134.
    Abstract PDF
    Universal Compute Account and Personal Information Asset Algebra in Human-Cyber-Physical Ternary Computing
    Xu Zhiwei, Xie Yi, Hai Mo, Li Xiaolin, Yuan Zimu
    2013, 50(6): 1135-1146.
    Abstract PDF
    An Important Aspect of Big Data: Data Usability
    Li Jianzhong and Liu Xianmin
    2013, 50(6): 1147-1162.
    Abstract PDF
    A Distributed Context-Aware Complex Event Processing Method for Internet of Things
    Cao Kening, Wang Yongheng, Li Renfa, Wang Fengjuan
    2013, 50(6): 1163-1176.
    Abstract PDF
    Multi-Label Feature Selection Algorithm Based on Information Entropy
    Zhang Zhenhai, Li Shining, Li Zhigang, and Chen Hao
    2013, 50(6): 1177-1184.
    Abstract PDF
    PMDA: A Physical Model Driven Software Architecture for Internet of Things
    Xie Kaibin, Chen Haiming, Cui Li
    2013, 50(6): 1185-1197.
    Abstract PDF
    An Approach to Building Systems and Applications of Internet of Things with Smart Things
    Kong Junjun, Guo Yao, Chen Xiangqun, and Shao Weizhong
    2013, 50(6): 1198-1209.
    Abstract PDF
    Cooperative Localization for Vehicular Ad Hoc Networks
    Peng Xin, Li Renfa, Wang Dong, Li Zhetao
    2013, 50(6): 1210-1216.
    Abstract PDF
    Data Dissemination Based on System Utility in Cooperative Delay Tolerant Networks
    Zhao Guangsong, Chen Ming, and Zuo Qingyun
    2013, 50(6): 1217-1226.
    Abstract PDF
    A Classification Prediction Mechanism Based on Comprehensive Assessment for Wireless Link Quality
    Guo Zhiqiang, Wang Qin, Wan Yadong, and Li Mohan
    2013, 50(6): 1227-1238.
    Abstract PDF
    Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks
    Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang
    2013, 50(6): 1239-1252.
    Abstract PDF
    Secure Range Query in Two-Tiered Wireless Sensor Networks
    Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin
    2013, 50(6): 1253-1266.
    Abstract PDF
    A Hierarchical Access Control Scheme for Perceptual Layer of IoT
    Ma Jun, Guo Yuanbo, Ma Jianfeng, Xiong Jinbo, Zhang Tao
    2013, 50(6): 1267-1275.
    Abstract PDF
    Scalable RFID Mutual Authentication Protocol with Backward Privacy
    Wang Shaohui, Liu Sujuan, Chen Danwei
    2013, 50(6): 1276-1284.
    Abstract PDF
    Health Status Detection via Temporal-Spatial Factor Graph Model in Medical Social Networks
    Gong Jibing, Wang Rui, Wang Xiaofeng, Cui Li
    2013, 50(6): 1285-1296.
    Abstract PDF
    Key Technologies of Vessel Segmentation and Reconstruction of the Cerebrovascular Disease Detection E-Health Platform Based on the Internet of Things
    Wang Xingce, Wu Zhongke, Zhou Mingquan, Luo Yanlin, Shui Wuyang, Liu Xinyu
    2013, 50(6): 1297-1312.
    Abstract PDF
    Multiple Particle Swarms Coevolutionary Algorithm for Dynamic Multi-Objective Optimization Problems and Its Application
    Hu Chengyu, Yao Hong, and Yan Xuesong
    2013, 50(6): 1313-1323.
    Abstract PDF
    CEclipse: A Services Composition Based Online IDE
    Wu Ling, Liang Guangtai, and Wang Qianxiang
    2013, 50(6): 1324-1334.
    Abstract PDF
    State-of-the-Art on Texture-Based Well Logging Image Classification
    Wang Huafeng, Wang Yuting, Chai Hua
    2013, 50(6): 1335-1348.
    Abstract PDF