Volume 16,Issue 12,2005 Table of Contents

Other Issues:  
  
Contents

  • An Algorithm for Generating Concepts Based on Search Space Partition
  • QI Hong,LIU Da-You,HU Cheng-Quan,LU Ming and ZHAO Liang
  • 2005,16(12):2029-2035 [Abstract(2949)]  [View PDF(3532)526.23 K]
  • An Improved Particle Swarm Optimization Based on Self-Adaptive Escape Velocity
  • HE Ran,WANG Yong-Ji,WANG Qing,ZHOU Jin-Hui and HU Chen-Yong
  • 2005,16(12):2036-2044 [Abstract(3437)]  [View PDF(4112)703.99 K]
  • Ontologies, Frames and Logical Theories in NKI
  • SUI Yue-Fei,GAO Ying and CAO Cun-Geng
  • 2005,16(12):2045-2053 [Abstract(2971)]  [View PDF(3178)666.36 K]
  • K-Nearest Neighbor Classification Based on Semantic Distance
  • YANG Li,ZUO Chun and WANG Yu-Guo
  • 2005,16(12):2054-2062 [Abstract(2842)]  [View PDF(4059)533.81 K]
  • Ontology-Based Preference Model in Digital Library
  • YANG Yan,LI Jian-Zhong and GAO Hong
  • 2005,16(12):2080-2088 [Abstract(2878)]  [View PDF(3231)594.51 K]
  • Algorithms for Storing and Aggregating Historical Streaming Data
  • ZHANG Dong-Dong,LI Jian-Zhong,WANG Wei-Ping and GUO Long-Jiang
  • 2005,16(12):2089-2098 [Abstract(2871)]  [View PDF(2958)630.09 K]
  • A High-Speed Heuristic Algorithm for Mining Frequent Patterns in Data Stream
  • ZHANG Xin,LI Xiao-Guang,WANG Da-Ling and YU Ge
  • 2005,16(12):2099-2105 [Abstract(2953)]  [View PDF(3206)414.70 K]
  • A Distributed Energy-Efficient Data Gathering and Aggregation Protocol for Wireless Sensor Networks
  • LIU Ming,GONG Hai-Gang,MAO Ying-Chi,CHEN Li-Jun and XIE Li
  • 2005,16(12):2106-2116 [Abstract(3721)]  [View PDF(3921)674.81 K]
  • Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithms
  • SUN Zhi-Xin,TANG Yi-Wei and CHENG Yuan
  • 2005,16(12):2117-2123 [Abstract(3598)]  [View PDF(3727)411.53 K]
  • TCP-Friendly Congestion Control Mechanism Based on Adaptive Weighted Average
  • HUANG Kui,WU Yi-Chuan,ZHENG Jian-Ping and WU Zhi-Mei
  • 2005,16(12):2124-2131 [Abstract(3434)]  [View PDF(3346)449.87 K]
  • A Detection and Forecast Algorithm for Multi-Step Attack Based on Intrusion Intention
  • BAO Xu-Hua,DAI Ying-Xia,FENG Ping-Hui,ZHU Peng-Fei and WEI Jun
  • 2005,16(12):2132-2138 [Abstract(3530)]  [View PDF(3112)465.26 K]
  • A Light Weight On-Board Distributed Routing Protocol for LEO Satellite Networks
  • BAI Jian-Jun,LU Xi-Cheng and PENG Wei
  • 2005,16(12):2139-2149 [Abstract(3899)]  [View PDF(3248)670.39 K]
  • Protocols Security Analysis Based on Ideal
  • SUN Hai-Bo,LIN Dong-Dai and LI Li
  • 2005,16(12):2150-2156 [Abstract(2585)]  [View PDF(2746)424.56 K]
  • Reuse Cost Optimization Oriented Component Refactoring Method
  • WANG Zhong-Jie,XU Xiao-Fei and ZHAN De-Chen
  • 2005,16(12):2157-2165 [Abstract(2775)]  [View PDF(3175)869.31 K]
  • Perfect Ball in Nature-On Software Development Methodologies for Distributed Systems
  • ZHOU Zhi-Ying
  • 2005,16(12):2166-2171 [Abstract(2529)]  [View PDF(2716)360.03 K]
  • Microprocessor Architectural Automatic Test Program Generation
  • ZHU Dan,LI Tun,GUO Yang and LI Si-Kun
  • 2005,16(12):2172-2180 [Abstract(2842)]  [View PDF(3069)457.50 K]
  • Buffering High-Speed Packets with Tri-Stage Memory Array and Its Performance Analysis
  • WANG Peng,YI Peng,JIN De-Peng and ZENG Lie-Guang
  • 2005,16(12):2181-2189 [Abstract(3173)]  [View PDF(3186)463.19 K]
  • Review Articles

  • XML Indices
  • KONG Ling-Bo,TANG Shi-Wei,YANG Dong-Qing,WANG Teng-Jiao and GAO Jun
  • 2005,16(12):2063-2079 [Abstract(5876)]  [View PDF(4138)1006.81 K]