Approximate generalized conditional symmetries and solutions for nonlinear filtration equation with a small parameter Hong LiJina LiSuli Zuo OriginalPaper 07 November 2015 Pages: 461 - 464
A critical model construction of knowledge sharing mechanism in virtual organization based on game theoretic perspective Jinrong Lu OriginalPaper 07 November 2015 Pages: 465 - 470
A type of Busemann-Petty problems for general Lp-intersection bodies Yanni PeiWeidong Wang OriginalPaper 07 November 2015 Pages: 471 - 475
Secure multi-source network coding scheme with lattice signature Tao ShangTianli PengJianwei Liu OriginalPaper 07 November 2015 Pages: 476 - 482
A policy integration method based on multilevel security for data integration Xinming WangHaoxiang TanRuihua Nie OriginalPaper 07 November 2015 Pages: 483 - 489
One-to-any command and control model: Precisely coordinated operation on uncooperative controlled nodes Han QiuYufeng LiJunhu Zhu OriginalPaper 07 November 2015 Pages: 490 - 498
Characteristics study of weibo users’ interactions Jing LiuShijun Li OriginalPaper 07 November 2015 Pages: 499 - 504
A security-improved scheme for virtual TPM based on KVM Yuan ShiBo ZhaoHuanguo Zhang OriginalPaper 07 November 2015 Pages: 505 - 511
An improved vTPM-VM live migration protocol Peiru FanBo ZhaoMingtao Ni OriginalPaper 07 November 2015 Pages: 512 - 520
A random anonymity framework for location privacy Songtao YangGuisheng YinChunguang Ma OriginalPaper 07 November 2015 Pages: 521 - 529
Chanel assignment optimization algorithm based on link throughput and node priority Liang ZhangJianfeng YangYinbo Yu OriginalPaper 07 November 2015 Pages: 530 - 536
An efficient load balancing approach for N-hierarchical web server cluster Ilchol PakBaiyou QiaoDonghai Chen OriginalPaper 07 November 2015 Pages: 537 - 542
Safety limitations of large new-built seagoing vessels towed through bridge area Dongfeng LiMingjun LiuLi Chen OriginalPaper 07 November 2015 Pages: 543 - 548