Volume 18,Issue 10,2007 Table of Contents

Other Issues:  
  
Contents

  • Description and Proof of Property Preservation of Model Transformations
  • LIU Hui,MA Zhi-Yi and SHAO Wei-Zhong
  • 2007,18(10):2369-2379 [Abstract(3247)]  [View PDF(3309)657.84 K]
  • A Tri-Dimensional Requirements Model and Its Support for Stakeholder Coordination
  • WANG Ji-Zhe and LI Ming-Shu
  • 2007,18(10):2380-2392 [Abstract(3128)]  [View PDF(3067)843.82 K]
  • Dynamic Inlining Based on Continuous Monitoring
  • WANG Lei,ZHOU Jing and JIN Mao-Zhong
  • 2007,18(10):2393-2402 [Abstract(2741)]  [View PDF(3006)713.10 K]
  • A Collaborative Filtering Recommendation Algorithm Based on Cloud Model
  • ZHANG Guang-Wei,LI De-Yi,LI Peng,KANG Jian-Chu and CHEN Gui-Sheng
  • 2007,18(10):2403-2411 [Abstract(4325)]  [View PDF(4928)620.23 K]
  • Density-Sensitive Semi-Supervised Spectral Clustering
  • WANG Ling,BO Lie-Feng and JIAO Li-Cheng
  • 2007,18(10):2412-2422 [Abstract(4573)]  [View PDF(3350)703.52 K]
  • An Approach to Tracking Deformable Hand Gesture for Real-Time Interaction
  • WANG Xi-Ying,ZHANG Xi-Wen and DAI Guo-Zhong
  • 2007,18(10):2423-2433 [Abstract(3486)]  [View PDF(4188)752.41 K]
  • Super-Resolution Reconstruction Based on Generalized Huber-MRF Image Modeling
  • SHAO Wen-Ze and WEI Zhi-Hui
  • 2007,18(10):2434-2444 [Abstract(3776)]  [View PDF(3809)1.08 M]
  • Exploiting SVC Algorithm for Multifocus Image Fusion
  • ZHANG Cheng-Cheng and HU Jin-Chun
  • 2007,18(10):2445-2457 [Abstract(2877)]  [View PDF(2871)1.10 M]
  • Representation of RCC11 Composition Table
  • LI Yong-Ming and LI San-Jiang
  • 2007,18(10):2458-2468 [Abstract(3196)]  [View PDF(2745)704.88 K]
  • An Efficient Frequent Subgraph Mining Algorithm
  • LI Xian-Tong,LI Jian-Zhong and GAO Hong
  • 2007,18(10):2469-2480 [Abstract(4139)]  [View PDF(4634)756.56 K]
  • A Hierarchically Differential P2P Storage Architecture
  • GAO Qian,YANG Zhi,TIAN Jing and DAI Ya-Fei
  • 2007,18(10):2481-2494 [Abstract(3055)]  [View PDF(3010)914.79 K]
  • Ontology-Based Query Division and Reformulation for Heterogeneous Information Integration
  • LI Jian,SONG Jing-Yu and ZHONG Hua
  • 2007,18(10):2495-2506 [Abstract(3013)]  [View PDF(3193)774.93 K]
  • A Data Mining Approach Based on the Integration of Ontology and Context Knowledge
  • CHEN Ying,XU Gang and GU Guo-Chang
  • 2007,18(10):2507-2515 [Abstract(3542)]  [View PDF(4058)583.33 K]
  • A Real-Time Dynamic Database Crash Recovery Strategy
  • XIAO Ying-Yuan,LIU Yun-Sheng,LIAO Guo-Qiong and DENG Hua-Feng
  • 2007,18(10):2516-2527 [Abstract(3669)]  [View PDF(3253)725.77 K]
  • An Approach to Mining Two-Dimensional Optimized Association Rules for Numeric Attributes
  • HE Zhi,TIAN Sheng-Feng and HUANG Hou-Kuan
  • 2007,18(10):2528-2537 [Abstract(3128)]  [View PDF(2975)613.51 K]
  • Implementation of Scalable Routers with Direct Networks
  • YUE Zu-Hui,ZHAO You-Jian and WU Jian-Ping
  • 2007,18(10):2538-2550 [Abstract(3047)]  [View PDF(2971)748.46 K]
  • A Reputation-Based Trust Mechanism for P2P E-Commerce Systems
  • JIANG Shou-Xu and LI Jian-Zhong
  • 2007,18(10):2551-2563 [Abstract(4478)]  [View PDF(5389)772.67 K]
  • Performance Analysis and Adaptive Scheme of Route Optimization in Mobile IPv6
  • XIAO Wen-Shu,ZHANG Yu-Jun and LI Zhong-Cheng
  • 2007,18(10):2564-2571 [Abstract(3148)]  [View PDF(3094)582.45 K]
  • Half Overlay Multicast Routing for Hybrid Networks
  • LIN Tong,QIAN Hua-Lin,GE Jing-Guo and NIU Guang-Feng
  • 2007,18(10):2572-2583 [Abstract(3043)]  [View PDF(3124)789.71 K]
  • Internet Services Fault Management: Layering Model and Algorithm
  • HUANG Xiao-Hui,ZOU Shi-Hong,CHU Ling-Wei,CHENG Shi-Duan and WANG Wen-Dong
  • 2007,18(10):2584-2594 [Abstract(3336)]  [View PDF(3381)742.84 K]
  • A Network Anomaly Detection Method Based on Transduction Scheme
  • LI Yang,FANG Bin-Xing,GUO Li and CHEN You
  • 2007,18(10):2595-2604 [Abstract(3713)]  [View PDF(4030)645.59 K]
  • 单物理层用户数据传输平台网络;面向以太网的物理帧时槽交换;输入排队;时槽预定;公平调度
  • LI Ji,ZENG Hua-Xin and GUO Zi-Rong
  • 2007,18(10):2605-2612 [Abstract(2796)]  [View PDF(3001)557.97 K]
  • Defending DDos Attacks Based on the Source and Destination IP Address Database
  • SUN Zhi-Xin and LI Qing-Dong
  • 2007,18(10):2613-2623 [Abstract(3452)]  [View PDF(4525)809.45 K]
  • CR:Scalable Routers Based on a New Architecture
  • YUE Zu-Hui,WU Jian-Ping and ZHAO You-Jian
  • 2007,18(10):2624-2634 [Abstract(3156)]  [View PDF(3152)801.30 K]
  • Fuzzy Decision Tree Based Inference Techniques for Network Forensic Analysis
  • LIU Zai-Qiang,LIN Dong-Dai and FENG Deng-Guo
  • 2007,18(10):2635-2644 [Abstract(3322)]  [View PDF(3203)685.84 K]
  • Energy Dissipation Bounds on Three Dimensional UWB Wireless Sensor Network
  • XU Juan,HONG Yong-Fa,JIANG Chang-Jun and CHEN Lin
  • 2007,18(10):2645-2651 [Abstract(3409)]  [View PDF(2622)468.20 K]
  • Router Numbering Based Adaptive Packet Marking
  • LI De-Quan,SU Pu-Rui,WEI Dong-Mei and FENG Deng-Guo
  • 2007,18(10):2652-2661 [Abstract(3203)]  [View PDF(3718)573.63 K]
  • Chameleon Signature from Bilinear Pairing
  • DU Xin-Jun,WANG Ying,GE Jian-Hua and WANG Yu-Min
  • 2007,18(10):2662-2668 [Abstract(2874)]  [View PDF(2754)513.44 K]