Volume 16,Issue 12,2005 Table of Contents

Other Issues:  
  
Contents

  • An Algorithm for Generating Concepts Based on Search Space Partition
  • QI Hong,LIU Da-You,HU Cheng-Quan,LU Ming and ZHAO Liang
  • 2005,16(12):2029-2035 [Abstract(4011)]  [View PDF(5360)526.23 K]
  • An Improved Particle Swarm Optimization Based on Self-Adaptive Escape Velocity
  • HE Ran,WANG Yong-Ji,WANG Qing,ZHOU Jin-Hui and HU Chen-Yong
  • 2005,16(12):2036-2044 [Abstract(4823)]  [View PDF(7098)703.99 K]
  • Ontologies, Frames and Logical Theories in NKI
  • SUI Yue-Fei,GAO Ying and CAO Cun-Geng
  • 2005,16(12):2045-2053 [Abstract(4016)]  [View PDF(4946)666.36 K]
  • K-Nearest Neighbor Classification Based on Semantic Distance
  • YANG Li,ZUO Chun and WANG Yu-Guo
  • 2005,16(12):2054-2062 [Abstract(3976)]  [View PDF(6077)533.81 K]
  • Ontology-Based Preference Model in Digital Library
  • YANG Yan,LI Jian-Zhong and GAO Hong
  • 2005,16(12):2080-2088 [Abstract(3884)]  [View PDF(4798)594.51 K]
  • Algorithms for Storing and Aggregating Historical Streaming Data
  • ZHANG Dong-Dong,LI Jian-Zhong,WANG Wei-Ping and GUO Long-Jiang
  • 2005,16(12):2089-2098 [Abstract(3835)]  [View PDF(4625)630.09 K]
  • A High-Speed Heuristic Algorithm for Mining Frequent Patterns in Data Stream
  • ZHANG Xin,LI Xiao-Guang,WANG Da-Ling and YU Ge
  • 2005,16(12):2099-2105 [Abstract(4008)]  [View PDF(4956)414.70 K]
  • A Distributed Energy-Efficient Data Gathering and Aggregation Protocol for Wireless Sensor Networks
  • LIU Ming,GONG Hai-Gang,MAO Ying-Chi,CHEN Li-Jun and XIE Li
  • 2005,16(12):2106-2116 [Abstract(5153)]  [View PDF(5980)674.81 K]
  • Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithms
  • SUN Zhi-Xin,TANG Yi-Wei and CHENG Yuan
  • 2005,16(12):2117-2123 [Abstract(4981)]  [View PDF(5643)411.53 K]
  • TCP-Friendly Congestion Control Mechanism Based on Adaptive Weighted Average
  • HUANG Kui,WU Yi-Chuan,ZHENG Jian-Ping and WU Zhi-Mei
  • 2005,16(12):2124-2131 [Abstract(4525)]  [View PDF(5062)449.87 K]
  • A Detection and Forecast Algorithm for Multi-Step Attack Based on Intrusion Intention
  • BAO Xu-Hua,DAI Ying-Xia,FENG Ping-Hui,ZHU Peng-Fei and WEI Jun
  • 2005,16(12):2132-2138 [Abstract(4777)]  [View PDF(4892)465.26 K]
  • A Light Weight On-Board Distributed Routing Protocol for LEO Satellite Networks
  • BAI Jian-Jun,LU Xi-Cheng and PENG Wei
  • 2005,16(12):2139-2149 [Abstract(5070)]  [View PDF(5337)670.39 K]
  • Protocols Security Analysis Based on Ideal
  • SUN Hai-Bo,LIN Dong-Dai and LI Li
  • 2005,16(12):2150-2156 [Abstract(3525)]  [View PDF(4474)424.56 K]
  • Reuse Cost Optimization Oriented Component Refactoring Method
  • WANG Zhong-Jie,XU Xiao-Fei and ZHAN De-Chen
  • 2005,16(12):2157-2165 [Abstract(3813)]  [View PDF(4840)869.31 K]
  • Perfect Ball in Nature-On Software Development Methodologies for Distributed Systems
  • ZHOU Zhi-Ying
  • 2005,16(12):2166-2171 [Abstract(3563)]  [View PDF(4257)360.03 K]
  • Microprocessor Architectural Automatic Test Program Generation
  • ZHU Dan,LI Tun,GUO Yang and LI Si-Kun
  • 2005,16(12):2172-2180 [Abstract(3857)]  [View PDF(4776)457.50 K]
  • Buffering High-Speed Packets with Tri-Stage Memory Array and Its Performance Analysis
  • WANG Peng,YI Peng,JIN De-Peng and ZENG Lie-Guang
  • 2005,16(12):2181-2189 [Abstract(4425)]  [View PDF(4856)463.19 K]
  • Review Articles

  • XML Indices
  • KONG Ling-Bo,TANG Shi-Wei,YANG Dong-Qing,WANG Teng-Jiao and GAO Jun
  • 2005,16(12):2063-2079 [Abstract(7811)]  [View PDF(7204)1006.81 K]