Volume 17,Issue 7,2006 Table of Contents

Other Issues:  
  
Contents

  • Model-Free Gene Selection Method by Considering Unbalanced Samples
  • LI Jian-Zhong,YANG Kun,GAO Hong,LUO Ji-Zhou and GUO Zheng
  • 2006,17(7):1485-1493 [Abstract(3233)]  [View PDF(3369)655.99 K]
  • Deep Approximation of Set Cover Greedy Algorithm for Test Set
  • CUI Peng and LIU Hong-Jing
  • 2006,17(7):1494-1500 [Abstract(3393)]  [View PDF(3229)421.39 K]
  • An Optimized and Efficiently Parallelized Dynamic Programming for RNA Secondary Structure Prediction
  • TAN Guang-Ming,FENG Sheng-Zhong and SUN Ning-Hui
  • 2006,17(7):1501-1509 [Abstract(3396)]  [View PDF(3032)705.47 K]
  • Formal Analysis of Timeliness in Non-Repudiation Protocols
  • LI Bo-Tao and LUO Jun-Zhou
  • 2006,17(7):1510-1516 [Abstract(3034)]  [View PDF(2735)560.69 K]
  • Complexities of Renaming for Formulas in MAX(1) and MARG(1)
  • XU Dao-Yun,DONG Gai-Fang and WANG Jian
  • 2006,17(7):1517-1526 [Abstract(2720)]  [View PDF(2612)621.77 K]
  • Upper Bounds on the Size of Inner Voronoi Diagrams of Multiply Connected Polygons
  • YANG Cheng-Lei,WANG Jia-Ye and MENG Xiang-Xu
  • 2006,17(7):1527-1534 [Abstract(3127)]  [View PDF(2877)472.52 K]
  • 3D Interaction Techniques Based on Semantics in Virtual Environments
  • JI Lian-En,ZHANG Feng-Jun,FU Yong-Gang and DAI Guo-Zhong
  • 2006,17(7):1535-1543 [Abstract(2751)]  [View PDF(6479)503.58 K]
  • Morphing Based on Mended Sparse-Field Algorithm of Level-Set Method
  • WENG Jian-Guang,ZHUANG Yue-Ting and PAN Yun-He
  • 2006,17(7):1544-1552 [Abstract(2715)]  [View PDF(2928)555.30 K]
  • A High Performance EBCOT Coding and Its VLSI Architecture
  • LIU Kai,LI Yun-Song and WU Cheng-Ke
  • 2006,17(7):1553-1560 [Abstract(3212)]  [View PDF(2813)524.85 K]
  • Representation and Rendering of General Julia Sets Based on Tri-Dimensional Polynomial Maps
  • CHENG Jin and TAN Jian-Rong
  • 2006,17(7):1561-1570 [Abstract(2959)]  [View PDF(2698)661.28 K]
  • Oil Style Image Generation via Fluid Simulation
  • ZHAO Yang and XU Dan
  • 2006,17(7):1571-1579 [Abstract(2953)]  [View PDF(3374)590.51 K]
  • Similarity-Based Objective Measure for Performance of Image Fusion
  • WANG Chao and YE Zhong-Fu
  • 2006,17(7):1580-1587 [Abstract(3558)]  [View PDF(5269)748.72 K]
  • A Noninterference Model for Nondeterministic Systems
  • XIE Jun and HUANG Hao
  • 2006,17(7):1601-1608 [Abstract(2905)]  [View PDF(2734)500.41 K]
  • A Congestion Control Algorithm for Layered Multicast Based on Differentiated Services
  • YE Xiao-Guo,WANG Ru-Chuan and WANG Shao-Di
  • 2006,17(7):1609-1616 [Abstract(2816)]  [View PDF(2644)495.32 K]
  • Convolutional Fingerprinting Information Codes for Collusion Security
  • ZHU Yan,YANG Yong-Tian and FENG Deng-Guo
  • 2006,17(7):1617-1626 [Abstract(2979)]  [View PDF(3120)767.71 K]
  • Analysis and Improvement of a Multisecret Sharing Authenticating Scheme
  • WANG Gui-Lin and QING Si-Han
  • 2006,17(7):1627-1632 [Abstract(2782)]  [View PDF(2840)371.29 K]
  • A Vulnerability Model of Distributed Systems Based on Reliability Theory
  • FENG Ping-Hui,LIAN Yi-Feng,DAI Ying-Xia and BAO Xu-Hua
  • 2006,17(7):1633-1640 [Abstract(3512)]  [View PDF(4119)1.12 M]
  • Real-Time System Design Based on Logic OR Constrained Optimization
  • LIU Jun-Xiang,WANG Yong-Ji,WANG Yuan,XING Jian-Sheng and ZENG Hai-Tao
  • 2006,17(7):1641-1649 [Abstract(2866)]  [View PDF(2896)595.12 K]
  • Energy-Constrained Software Prefetching Optimization
  • CHEN Juan,YI Hui-Zhan,DONG Yong and YANG Xue-Jun
  • 2006,17(7):1650-1660 [Abstract(3014)]  [View PDF(2870)887.43 K]
  • Review Articles

  • Cluster-Based Routing Protocols for Wireless Sensor Networks
  • SHEN Bo,ZHANG Shi-Yong and ZHONG Yi-Ping
  • 2006,17(7):1588-1600 [Abstract(8864)]  [View PDF(10158)808.73 K]