Volume 17,Issue 12,2006 Table of Contents
A Parallel Analysis Algorithm for Sequence Stream Based on Proactive Fault ToleranceZHAO Feng,LI Qing-Hua and JIN Li2006,17(12):2416-2424 [Abstract(4205)] [View PDF(4588)635.14 K]Efficient Fault Tolerant Compilation: Compress Error Flow to Reduce Power and Enhance PerformanceGAO Long and YANG Xue-Jun2006,17(12):2425-2437 [Abstract(4632)] [View PDF(4787)842.78 K]Impact of the Compactness of Failure Regions on the Performance of Adaptive Random TestingCHEN Tsong-Yueh,KUO Fei-Ching and SUN Chang-Ai2006,17(12):2438-2449 [Abstract(4876)] [View PDF(4489)1.01 M]A Risk-Driven Method for Prioritizing Requirements in Iteration DevelopmentHUANG Meng,SHU Feng-Di and LI Ming-Shu2006,17(12):2450-2460 [Abstract(4414)] [View PDF(5156)690.81 K]A Simulation Model of Loosely Coupled Inter-Organizational WorkflowsCHENG Shao-Wu,XU Xiao-Fei,WANG Gang and LI Quan-Long2006,17(12):2461-2470 [Abstract(6818)] [View PDF(5130)702.65 K]A Global Algorithm for Straight Line Stereo Matching Based on Feature GroupingWEN GongJian2006,17(12):2471-2484 [Abstract(4244)] [View PDF(5482)829.94 K]Bounded Model Checking for Temporal Epistemic Logic in Synchronous Multi-Agent SystemsLUO Xiang-Yu,SU Kai-Le and YANG Jin-Ji2006,17(12):2485-2498 [Abstract(4984)] [View PDF(4852)1.00 M]Algorithms for Equal-Quality Fine Granularity Scalable Video StreamingMEI Zheng,LI Jin-Tao and NING Hua2006,17(12):2499-2507 [Abstract(4510)] [View PDF(4627)711.22 K]Histogram Sequence of Local Gabor Binary Pattern for Face Description and IdentificationZHANG Wen-Chao,SHAN Shi-Guang,ZHANG Hong-Ming,CHEN Jie,CHEN Xi-Lin and GAO Wen2006,17(12):2508-2517 [Abstract(6160)] [View PDF(5569)690.62 K]Implementation of Preference Reasoning by Manipulating Logical ChainZHANG Zhi-Zheng,ZHAI Yu-Qing x and XING Han-Cheng2006,17(12):2518-2528 [Abstract(4299)] [View PDF(4931)915.71 K]Super-Resolution Reconstruction for Face Images Based on Particle Filters MethodHUANG Hua,FAN Xin,QI Chun and ZHU Shi-Hua2006,17(12):2529-2536 [Abstract(4350)] [View PDF(5432)560.51 K]Choosing Multi-Issue Negotiating Object Based on Trust and K-Armed Bandit ProblemWANG Li-Ming,HUANG Hou-Kuan and CHAI Yu-Mei2006,17(12):2537-2546 [Abstract(4871)] [View PDF(5680)687.07 K]Confidence Measures and Integrating Algorithm in Utterance VerificationYAN Bin-Feng,ZHU Xiao-Yan,ZHANG Zhi-Jiang and ZHANG Fan2006,17(12):2547-2553 [Abstract(4722)] [View PDF(5056)435.67 K]Information and Services Integrating and Scheduling Model for Event HandlingLUO Ying-Wei,LIU Xin-Peng,PENG Hao-Bo,WANG Xigo-Lin and XU Zhuo-Qun2006,17(12):2554-2564 [Abstract(4500)] [View PDF(4590)618.04 K]A Method of Topology Discovery for Switched Ethernet Based on Address Forwarding TablesSUN Yan-Tao,WU Zhi-Mei and SHI Zhi-Qiang2006,17(12):2565-2576 [Abstract(4853)] [View PDF(6467)758.90 K]Search on Security in Sensor NetworksLI Ping,LIN Ya-Ping and ZENG Wei-Ni2006,17(12):2577-2588 [Abstract(5374)] [View PDF(4963)658.43 K]A Genetic Local Search Algorithm for the Parallel Machine Batch Process Scheduling ProblemXU Xiao-Fei,ZHAN De-Chen and XU Xiao-Fei2006,17(12):2589-2600 [Abstract(4425)] [View PDF(5901)847.80 K]Constraint Specification of Weakly Hard Real-Time SystemCHEN Ji-Ming,SONG Ye-Qiong and SUN You-Xian2006,17(12):2601-2608 [Abstract(4592)] [View PDF(4660)551.44 K]
Multi-Pattern Matching Algorithms and Hardware Based ImplementationLI Wei-Nan,E Yue-Peng,GE Jing-Guo and QIAN Hua-Lin2006,17(12):2403-2415 [Abstract(8861)] [View PDF(8415)721.77 K]