计算机网络和信息集成教育部重点实验室2012年发表论文一览表
2012年期刊论文:
序号第一作者文章名称发表刊物名称及期卷号论文级别检索情况
1Jiuchuan Jiang,DanaInfo=www,,DanaInfo=www
A Tag-Based Solution for Data Sensing Conflicts in Multiple Sensing Agent Systems





s,s
s,s



Advances in Engineering Software, Vol.47, No.1, pp.170-177, 2012. 
SCIEI
SCI:000302045800016; EI: 20120814795497 

2Darong LaiLearning Overlapping Communities in Complex Networks via Non-negative Matrix FactorizationInternational Journal of Modern Physics C, Vol. 22, No. 10, pp.1173-1190, 2011SCISCI:000297308200008
3
Feng Zhang 
Method for detecting breast cancer by electrical impedance scanningDongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural
Science Edition),42(1):45-49
EIAccession number: 20120914812601
4Jiasong WuSliding Conjugate Symmetric Sequency-Ordered Complex Hadamard Transform: Fast Algorithm and Applications IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS  : 59   : 6   : 1321-1334   DOI: 10.1109/TCSI.2011.2173386   出版年: JUN 2012 SCIIDS : 952WO 
5Yang ChenThoracic low-dose CT image processing using an artifact suppressed large-scale nonlocal means来源出版物: PHYSICS IN MEDICINE AND BIOLOGY  : 57   : 9     DOI: 10.1088/0031-9155/57/9/2667   出版年: MAY 7 2012SCIIDS : 929FH
6朱晓建基于粒子群优化的ad hoc网络最小能耗多播路由算法通信学报,第33卷第3EI20121614955556
7Weiwei NiHilAnchor: Location Privacy Protection in the Presence of Users' PreferencesJOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY,27(2),2012SCIEIWOS:000301446900013
8倪巍伟面向聚类的数据隐藏发布研究计算机研究与发展,49(5),2012EI20122615179091
9Fang DongAn Effective Data Aggregation based Adaptive Long
Term CPU Load Prediction Mechanism on
Computational Grid
FUTURE GENERATION COMPUTER SYSTEMS    2011年,卷: 28 : 7 : 1030-1044SCI/EISCI:000304636600007          EI: 20121814983506

10Bixin LiProfiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths the Journal of Systems and Software, Elsevier, July 2012, 85(7):1558-1576SCISCI检索IDS号:951LO 
11Bixin LiAutomatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph the Journal of Systems and Software, Elsevier, June 2012, 85(7):1300-1321.SCISCI检索IDS号:936YQ 
12Chunli XieCombining Control Structure and Composition Condition for Web Services Reliability Prediction Chinese Journal of Electronics 2012, 22(3): 425-429.SCISCI检索IDS号:976WS
13Min ZhuTransforming HybridUML to hybrid program for CPS property verificationTien Tzu Hsueh Pao/Acta Electronica Sinica, v 40, n 6, p 1126-1132, June 2012 EIEI检索号:20123615396196
14Xiaobing SunUsing LoCMD to support software change analysisRuan Jian Xue Bao/Journal of Software, v 23, n 6, p 1368-1381, June 2012 EIEI检索号:20122915260121
15Lulu Wang

Profiling all paths
Ruan Jian Xue Bao/Journal of Software, v 23, n 6, p 1413-1428, June 2012 EIEI检索号:20122915260124
16Cuicui LiuTest path generation and prioritization of WS-CDLDongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), v 42, n 3, p 428-434, May 2012 EIEI检索号:20122715214981

17Xiang Zhou A partition-based candidate network generation algorithm for keyword search on relational databasesJournal of Southeast University (Natural Science Edition)v 42, n 4, p 609-613, July 2012EI20123715424345
18Jiaji ZhouDegree-based sampling method with partition-based subgraph finder for larger motif detectionApplied Mechanics and Materials, v 135-136, p 509-515, 2012, Advances in Science and Engineering IIEI20114914578867
19Chaojun LiA novel core-attachment based greedy search method for mining functional modules in protein interaction networks Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 6674 LNBI, p 332-343, 2011, Bioinformatics Research and Applications - 7th International Symposium, ISBRA 2011, ProceedingsEI20112013980768
20Jieyue HeAn efficient algorithm for discovering probability motifs in biological networksJournal of Southeast University (Natural Science Edition), v 42, n 1, p 35-39, January 2012 Language: ChineseEI20120914812599
21Jieyue HeEfficient and accurate greedy search methods for
mining functional modules in protein interaction networks
 BMC Bioinformatics 2012, 13(Suppl 10):S19
http://www.biomedcentral.com/1471-2105-13-S10-S19
SCI入藏号: WOS:000306140100019
22Xiaoping LiAdaptive hybrid algorithms for the sequence-dependent setup time permutation flow shop scheduling problemIEEE Transactions on Automation Science and EngineeringEI


20122815226636

23朱洁A divide and conquer-based greedy search for two-machine no-wait job shop problems with makespan minimisation  INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH  SCI‘000304824400009
24朱洁An effective meta-heuristic for no-wait job shops to minimize makespanIEEE Transactions on Automation Science and EngineeringSCI‘000304754400018
25张毅Estimation of distribution algorithm for permutation flow shops with total flowtime minimization COMPUTERS & INDUSTRIAL ENGINEERING SCI‘000289395500025 
26Junzhou LuoAn interval centroid based spread spectrum watermarking scheme for multi-flow tracebackJournal of Network and Computer Applications (JNCA) 35 (2012):60–71SCIUT WOS:000298338600006
27Junzhou LuoA trust degree based access control in grid environmentsInformation SciencesVolume 179 Issue 15, July, 2009 Pages 2618-2628SCIUT  WOS: 000298338600006

28Junzhou LuoA clustering analysis and agent-based trust model in a grid environment supporting virtual organisations INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES(IJWGS)513-16出版年2009SCIUT WOS:000271426900002
29Junzhou LuoOptimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh NetworksJournal of Universal Computer Science, 2011, 17(14)SCIWOS:000304607900011 

30王维基于网络编码的多射频无线Mesh网组播时延建模与分析计算机研究与发展EI(EI)Compendex: 20123215308660
31王维多射频无线Mesh网络组播端到端时延建模与优化计算机学报EI(EI)Compendex: 20123615396358
32Xiaogang WangA potential HTTP-based application-level attack against TorFuture Generation Computer Systems 27 (2011) 67-77SCIUT ISI:000282246000008  
33郑啸面向机会社会网络的服务广告分发机制计算机学报,2012,35(6)EI20123215308651
34Tian TianCooperative Replica Prefetching Mechanism for Virtual Organization in GridJournal of Software,2011,22(10):2372−2384EIdoi: 10.3724/SP.J.1001.2011.03925
35顾军基于排队Petri网的服务系统性能建模与分析方法 (Performance Modeling and Analysis of Service Systems Using Queueing Petri Nets)计算机学报3412, 201112, 2435-2455EI20120214672609,
36顾军一种基于执行力模型的服务平台自主控制方法 (Autonomic Control Approach Based on Performability Model)计算机学报352, 20122, 282-297EI20121214874186

37Zhen LingA new cell-counting-based attack against torIEEE/ACM Transactions on Networking,20(4): 1245-1261EI20123515378167
38吴文甲干扰约束和负载均衡的无线Mesh网络网关部署策略计算机学报, 2012, 35(5)EI20122815240369
39Juan XuQuantum secret sharing without exclusive OR of qubits’ measuring resultsCEC 2012. Brisbane, Australia, June 10-15, 2012 613-616 EI

40Juan XuA simple and secure quantum secret sharing scheme based on product statesInternational Journal of Quantum Information, 2012, 10(3)SCI000304611800006
41Zhihao LiuDeterministic Secure Quantum Communication with Mutual Authentication Based on Bell MeasurementCEC 2012. Brisbane, Australia, June 10-15, 2012 726-730  EI

42Zhihao LiuMutually Authenticated Deterministic Secure Quantum Communication without Unitary Operations2011AQIS, Busan, Korea. August 23-27, 2011, Seoul, Korea, August 29-30, 2011. 185-186EI

43Zhihao LiuHigh-dimensional deterministic multiparty quantum secret sharing without unitary operationsQuantum Information ProcessingSCI

44Zhihao LiuQuantum secure direct communication with optimal quantum superdense coding by using general four-qubit statesQuantum Information ProcessingSCI

45Zhihao LiuUnitary operations are not required for message encoding or decoding in deterministic secure quantum communicationTQC 2012, Tokyo, Japan, May 17-19, 2012 EI

46Zhihao LiuDeterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping (基于高维纠缠交换的无酉操作确定性安全量子通信)中国科学(F), Vol. 41 (12): 1474-1482Dec. 2011.EI

47杨忠明基于二分法量子可逆逻辑电路综合电子学报, Vol. 40 (5): 1045-1049May.2012EI

2012年会议论文:
48Pinzheng Zhang,DanaInfo=www,,DanaInfo=www
Teaching exploration on programming design experimental practice





s,s
s,s



2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012Pages:  623-625 
EI
Accession number:  20122415104773

49Jiasong WuSliding conjugate symmetric sequency-ordered complex Hadamard transform: fast algorithm and applicationsEuropean Signal Processing Conference, Aalborg, Denmark, 2010 : 1742-1746.EIAccession number: 20122915261956 
50Honglin WangCustomizable and scalable network architecture modeling and analysis 2010 2nd International Conference on Information Science and Engineering (ICISE)EI20110913704293
51Hongbing WangCollaborative approaches to complementing qualitative preferences of agents for effective service selectionProceedings - 2011 23rd IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2011EI20120314693983

52Hongbing WangWeb service selection with quantitative and qualitative user preferences

Proceedings - 2011 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2011EI20114514485626

53Fang DongLoad-aware based Adaptive Rescheduling
Mechanism for Workflow Application
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design400-407EI‘20113614293894
54Wanzhi WenSoftware fault localization based on program slicing spectrum

International Conference on Software Engineering, p 1511-1514, 2012EIEI检索号:20123115287983

55Peng YangStudy on the Historical Development and Current Status of Computer Fundamentals Education of Liberal Arts in China 2011 International Conference on Education and Education Management (EEM 2011)CPCI-SSHWOS: 000302661400056
56李旻旻A memory and variable neighborhood structure based complete local search for the no-wait job shop problemProceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in DesignEI’20123115289470
57侯培英An improved harmony search algorithm for blocking job shop to minimize makespanProceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in DesignEI


20123115289466

58徐涛Efficient iterated greedy algorithm to minimize makespan for the no-wait flowshop with sequence dependent setup timesProceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in DesignEI‘20123115289469
59Xiaogang WangAn efficient sequential watermark detection model for tracing network attack flowsIEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2012)EI20123115289384  
60Xudong NiA trust aware access control in service oriented grid environmentSixth International Conference on Grid and Cooperative Computing (GCC 2007)EIAccession number: 
10021587

61Xudong NiA trust degree based access control for multi-domains in grid environment11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007EIAccession number: 
20083011404918

62Xudong NiMPSL: A Mobile Phone-Based Physical-Social Location Verification SystemWireless Algorithms, Systems, and Applications. 7th International Conference, WASA 2012EIAccession number: 
12949346

63Zhen LingExtensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM'12)EI20122315083313
64Zhen LingA novel network delay based side-channel attack: Modeling and defense Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM'12)EI20122315083314
65Yuxiang WangImproving Online Aggregation Performance for Skewed Data DistributionThe 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012)EI20121915010233
66Hanwu ChenA New Construction Method of Quantum Error-Correcting Codes Based on Elementary TransformationAsian Conference on Quantum Information Science 2010 (AQIS 2010), Tokyo, Japan, August 27–31, 2010, 167-168.EI

67Yichuan JiangThe Rich Get Richer: Preferential Attachment in the Task Allocation of Cooperative Networked Multiagent Systems With Resource CachingIEEE Transactions on Systems Man and Cybernetics Part A-Systems and Humans SCIEISCI, IDS Number: 993XM; EI Number: 20123515384857