Volume 18,Issue 3,2007 Table of Contents

Other Issues:  
  
Contents

  • Strategy of Extracting Domain Knowledge for STRIPS World
  • WU Xiang-Jun,JIANG Yun-Fei and LING Ying-Biao
  • 2007,18(3):490-504 [Abstract(3170)]  [View PDF(2644)1007.50 K]
  • A Quick Multi-Objective Evolutionary Algorithm Based on Dominating Tree
  • SHI Chuan,LI Qing-Yong and SHI Zhong-Zhi
  • 2007,18(3):505-516 [Abstract(2956)]  [View PDF(3514)798.86 K]
  • A Synthetic Fingerprint Generation Method and Its Implementation
  • HU Jin,TIAN Jie,CHEN Xin-Jian,YANG Xin and SHI Peng
  • 2007,18(3):517-526 [Abstract(2822)]  [View PDF(2999)746.52 K]
  • Behavior Modeling and Abnormality Detection Based on Semi-Supervised Learning Method
  • LI He-Ping,HU Zhan-Yi,WU Yi-Hong and WU Fu-Chao
  • 2007,18(3):527-537 [Abstract(3827)]  [View PDF(3946)798.64 K]
  • A Computational Model for Chinese Syntactic Structure Induction Based on Sentence Alignment
  • WANG Hou-Feng and WANG Bo
  • 2007,18(3):538-546 [Abstract(3081)]  [View PDF(2697)505.64 K]
  • An Interactive Key Video Object Selection Model
  • OUYANG Jian-Quan,LI Jin-Tao and ZHANG Yong-Dong
  • 2007,18(3):547-554 [Abstract(3307)]  [View PDF(2701)499.06 K]
  • Text Segmentation Model Based on Multiple Discriminant Analysis
  • ZHU Jing-Bo,YE Na and LUO Hai-Tao
  • 2007,18(3):555-564 [Abstract(3057)]  [View PDF(3128)669.18 K]
  • Semantic Role Labeling with Maximum Entropy Classifier
  • LIU Ting,CHE Wan-Xiang and LI Sheng
  • 2007,18(3):565-573 [Abstract(3794)]  [View PDF(4176)540.19 K]
  • A Dynamic Formation Algorithm of Multi-Agent Coalition Structure
  • ZHANG Xin-Liang and SHI Chun-Yi
  • 2007,18(3):565-573 [Abstract(2392)]  [View PDF(2926)567.41 K]
  • An Object-Oriented Design Model of Software Agent
  • LI Jian-Xing,MAO Xin-Jun and SHU Yao
  • 2007,18(3):582-591 [Abstract(3587)]  [View PDF(3130)566.51 K]
  • Unsupervised Texture Segmentation Based on Geodesic Active Regions
  • HE Yuan,LUO Yu-Pin and HU Dong-Cheng
  • 2007,18(3):592-599 [Abstract(3358)]  [View PDF(3136)529.26 K]
  • Anisotropic Diffusion of Halting Speed Fields in Geometric Active Contour Model
  • HE Chuan-Jiang and TANG Li-Ming
  • 2007,18(3):600-607 [Abstract(3428)]  [View PDF(3614)549.99 K]
  • A Robust Bootstrapping Algorithm of Speaker Models for On-Line Unsupervised Speaker Indexing
  • FU Zhong-Hua and ZHANG Yan-Ning
  • 2007,18(3):608-616 [Abstract(3291)]  [View PDF(3276)484.20 K]
  • Adaptive Exchanging Strategies in Parallel Ant Colony Algorithm
  • CHEN Ling and ZHANG Chun-Fang
  • 2007,18(3):617-624 [Abstract(3417)]  [View PDF(3525)544.66 K]
  • Normal Measure Based Multi-Constrained Path Selection
  • ZHENG Yan-Xing,WANG Xiao-Qing and TIAN Jing
  • 2007,18(3):636-645 [Abstract(3547)]  [View PDF(3012)649.92 K]
  • A Dynamic Web Services Selection Algorithm with QoS Global Optimal in Web Services Composition
  • LIU Shu-Lei,LIU Yun-Xiang,ZHANG Fan,TANG Gui-Fen and JING Ning
  • 2007,18(3):646-656 [Abstract(6487)]  [View PDF(5322)695.83 K]
  • Dynamics of Multiagents Coalition Formation in Combinatorial Electronic Marketplaces
  • GONG Yong,YAO Li and SHA Ji-Chang
  • 2007,18(3):657-668 [Abstract(3199)]  [View PDF(2942)852.75 K]
  • A Wavelet Data Compression Algorithm Using Ring Topology for Wireless Sensor Networks
  • ZHOU Si-Wang,LIN Ya-Ping,ZHANG Jian-Ming,OUYANG Jing-Cheng and LU Xin-Guo
  • 2007,18(3):669-680 [Abstract(3103)]  [View PDF(2836)723.22 K]
  • A Method of Selecting Steady Path Based on Neighbor Change Ratio in Mobile Ad Hoc Networks
  • CAI Yi-Bing,LI Hai-Bo,LI Zhong-Cheng and c
  • 2007,18(3):681-692 [Abstract(3562)]  [View PDF(3719)791.07 K]
  • Path Holding Probability Based Ad Hoc On-Demand Routing Protocol
  • LIU Jun,GUO Wei,XIAO Bai-Long and HUANG Fei
  • 2007,18(3):693-701 [Abstract(2953)]  [View PDF(3173)626.88 K]
  • An Energy-Efficient Distributed Topology-Control Algorithm for Ad Hoc Networks
  • LUO Yu-Hong,WANG Jian-Xin,HUANG Jia-Wei and CHEN Song-Qiao
  • 2007,18(3):702-713 [Abstract(2932)]  [View PDF(2992)841.77 K]
  • A Hybrid Peer-to-Peer Lookup Service Algorithm on Distributed Hash Table
  • YANG Feng,LI Feng-Xia,YU Hong-Liang,ZHAN Shou-Yi and ZHENG Wei-Min
  • 2007,18(3):714-721 [Abstract(3630)]  [View PDF(3522)559.52 K]
  • A Public Key Encryption Algorithm on Braid Groups
  • TANG Xue-Ming,HONG Fan and CUI Guo-Hua
  • 2007,18(3):722-729 [Abstract(3417)]  [View PDF(2893)509.38 K]
  • A Multi-Level Security Model with Least Privilege Support for Trusted Subject
  • WU Yan-Jun,LIANG Hong-Liang and ZHAO Chen
  • 2007,18(3):730-738 [Abstract(3452)]  [View PDF(3117)496.53 K]
  • Information Disguising and Hiding Technique to Protect Digital Elevation Model Data
  • LUO Yong,YANG Yue-Xiang,CHENG Li-Zhi and XU Zhi-Hong
  • 2007,18(3):739-745 [Abstract(3425)]  [View PDF(3001)447.06 K]
  • Constructing Optimistic ID-Based Fair Exchange Protocols via Proxy Signature
  • XU Jing,ZHANG Zhen-Feng and FENG Deng-Guo
  • 2007,18(3):746-754 [Abstract(4398)]  [View PDF(2775)610.88 K]
  • A New Approach in Optical Burst Switching Networks with QoS Support
  • XU Chang-Biao,LONG Ke-Ping and ZHANG Bi-Bo
  • 2007,18(3):755-764 [Abstract(2660)]  [View PDF(2785)672.20 K]
  • A Fair Bandwidth Allocation Mechanism with Preference to Short Flows
  • ZHANG He-Ying,JIANG Jie and DOU Wen-Hua
  • 2007,18(3):765-774 [Abstract(2874)]  [View PDF(2594)562.08 K]
  • Review Articles

  • Development in Signer-Independent Sign Language Recognition and the Ideas of Solving Some Key Problems
  • JIANG Feng,GAO Wen,WANG Chun-Li,YAO Hong-Xun and ZHAO De-Bin
  • 2007,18(3):477-489 [Abstract(4695)]  [View PDF(3690)755.14 K]
  • Study on Selfishness in Application-Layer Multicast
  • LI Dan,WU Jian-Ping and CUI Yong
  • 2007,18(3):625-635 [Abstract(5150)]  [View PDF(3889)619.66 K]