Abstract is missing.
- A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet PacketYingyou Wen, Zhi Li, Jian Chen, Hong Zhao. 1-8 [doi]
- The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and BehaviorXiusHuang Yi, Yeting Han, Xingwei Wang. 9-20 [doi]
- A Bayesian Investment Model for Online P2P LendingXubo Wang, Defu Zhang, Xiangxiang Zeng, Xiaoying Wu. 21-30 [doi]
- Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic AlgorithmsWeihai Li, Yunxiao Zu, Yue Jia. 31-39 [doi]
- On the Spatial-temporal Reachability of DTNsCheng Zhang, Chunhe Xia, Haiquan Wang, Xiaojian Li. 40-49 [doi]
- Research on Efficient Non-slotted Tree Structures for Advance ReservationLibing Wu, Ping Dang, Tianshui Yu, Lei Nie. 50-61 [doi]
- A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor NetworkJia Ye Chen, Wenzhong Guo. 62-73 [doi]
- An Efficient Lookup Service in DHT Based Communication SystemKai Shuang, Peng Zhang, Sen Su. 74-84 [doi]
- An Improved Cooperative Model of P2P and ISPYing Liu, Shenglin Zhang, Hongying Liu. 85-96 [doi]
- Assessing Survivability of Inter-domain Routing System under Cascading FailuresYujing Liu, Wei Peng, Jinshu Su, Zhilin Wang. 97-108 [doi]
- The Adaptive Multicast Data Origin Authentication ProtocolLiehuang Zhu, Hao Yang, Zhenghe Yang. 109-121 [doi]
- A Computer Network Defense Policy Refinement MethodZhao Wei, Yanli Lv, Chunhe Xia, Yang Luo, Qing Wei. 122-133 [doi]
- An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment TreeYanbiao Li, Dafang Zhang, Gaogang Xie, Jintao Zheng, Wei Zhao. 134-144 [doi]
- Research on Resource Management in PaaS Based on IaaS EnvironmentPeng Xu, Rui Hu, Sen Su. 145-157 [doi]
- A Conflict-Related Rules Detection Tool for Access Control PolicyXiaoyan Liang, Liangshuang Lv, Chunhe Xia, Yang Luo, Yazhuo Li. 158-169 [doi]
- East-West Bridge for SDN Network PeeringPingping Lin, Jun Bi, Yangyang Wang. 170-181 [doi]
- A Connectivity Invariant Dynamic Multichannel Assignment Method for VANETTong Zhao, Shanbo Lu, Wei Yan, Xiaoming Li. 182-193 [doi]
- VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking ApproachYang Luo, Yazhuo Li, Qing Tang, Zhao Wei, Chunhe Xia. 194-205 [doi]
- TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone ApplicationsWenshan Fu, Tong Zhao, Kaigui Bian, Wei Yan. 206-217 [doi]
- A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party ComputationXiao-han Yue, Fucai Zhou. 218-235 [doi]
- Towards Internet Innovation: Software Defined Data PlaneGaofeng Lv, ZhiGang Sun, Yijiao Chen, Tao Li. 236-247 [doi]
- Mining Network Behavior Specifications of Malware Based on Binary AnalysisPeidai Xie, Yongjun Wang, Huabiao Lu, Meijian Li, Jinshu Su. 248-255 [doi]
- CoISM: Improving Security and Accuracy of BGP through Information SharingNing Hu, Baosheng Wang. 256-265 [doi]
- Detecting Community Structures in Social Networks with Particle Swarm OptimizationYuzhong Chen, Xiaohui Qiu. 266-275 [doi]