Volume 18,Issue 4,2007 Table of Contents

Other Issues:  
  
Contents

  • Detecting Feature Interactions by Pattern Analysis
  • ZUO Ji-Hong,WANG Qian-Xiang and MEI Hong
  • 2007,18(4):796-807 [Abstract(4021)]  [View PDF(4662)701.40 K]
  • Error Flow Model: Modeling and Analysis of Software Propagating Hardware Faults
  • YANG Xue-Jun and GAO Long
  • 2007,18(4):808-820 [Abstract(4359)]  [View PDF(4619)795.63 K]
  • An Approach for Optimizing Test Suite Based on Testing Requirement Reduction
  • ZHANG Xiao-Fang,XU Bao-Wen,NIE Chang-Hai and SHI Liang
  • 2007,18(4):821-831 [Abstract(5548)]  [View PDF(6229)956.33 K]
  • An Approach to Analyzing Dependence Based on Exception Propagation Analysis
  • JIANG Shu-Juan,XU Bao-Wen,SHI Liang and ZHOU Xiao-Yu
  • 2007,18(4):832-841 [Abstract(4108)]  [View PDF(4940)631.54 K]
  • Levelset Method with Multi-Speed-Function and Its Application in Segmentation of Medical Images
  • CHEN Jian,TIAN Jie,XUE Jian and DAI Ya-Kang
  • 2007,18(4):842-849 [Abstract(4308)]  [View PDF(4967)358.58 K]
  • Block Motion Estimation Based on Immune Clonal Selection
  • LIU Fang and PAN Xiao-Ying
  • 2007,18(4):850-860 [Abstract(3953)]  [View PDF(4754)749.62 K]
  • A Simpler and More Effective Particle Swarm Optimization Algorithm
  • HU Wang and LI Zhi-Shu
  • 2007,18(4):861-868 [Abstract(10384)]  [View PDF(12163)692.44 K]
  • A More Topologically Stable ISOMAP Algorithm
  • SHAO Chao,HUANG Hou-Kuan and ZHAO Lian-Wei
  • 2007,18(4):869-877 [Abstract(5114)]  [View PDF(6256)741.24 K]
  • Robust Speech Recognition Based on Neighborhood Space
  • YAN Bin-Feng,ZHU Xiao-Yan,ZHANG Zhi-Jiang and ZHANG Fan
  • 2007,18(4):878-883 [Abstract(4936)]  [View PDF(4738)405.05 K]
  • An Efficient Algorithm for Mining Approximate Frequent Item over Data Streams
  • WANG Wei-Ping,LI Jian-Zhong,ZHANG Dong-Dong and GUO Long-Jiang
  • 2007,18(4):884-892 [Abstract(5100)]  [View PDF(6347)545.31 K]
  • Complex Twig Pattern Query Processing over XML Streams
  • YANG Wei-Dong,WANG Qing-Ming and SHI Bai-Le
  • 2007,18(4):893-904 [Abstract(4747)]  [View PDF(4889)758.91 K]
  • Clustering Evolving Data Streams over Sliding Windows
  • CHANG Jian-Long,CAO Feng and ZHOU Ao-Ying
  • 2007,18(4):905-918 [Abstract(5359)]  [View PDF(6599)860.78 K]
  • Layered Solution for SLCA Problem in XML Information Retrieval
  • KONG Ling-Bo,TANG Shi-Wei,YANG Dong-Qing,WANG Teng-Jiao and GAO Jun
  • 2007,18(4):919-932 [Abstract(4871)]  [View PDF(5477)843.04 K]
  • A Fast Outlier Detection Algorithm for High Dimensional Categorical Data Streams
  • ZHOU Xiao-Yun,SUN Zhi-Hui,ZHANG Bai-Li and YANG Yi-Dong
  • 2007,18(4):933-942 [Abstract(5090)]  [View PDF(5879)571.89 K]
  • Access Control in New Network Environment
  • LIN Chuang,FENG Fu-Jun and LI Jun-Shan
  • 2007,18(4):955-966 [Abstract(5464)]  [View PDF(6978)695.74 K]
  • Anomaly Detection Based on Web Users' Browsing Behaviors
  • XIE Yi and YU Shun-Zheng
  • 2007,18(4):967-977 [Abstract(5628)]  [View PDF(7221)672.08 K]
  • Towards the Optimization of Access Control List
  • ZENG Kuang-Yi and YANG Jia-Hai
  • 2007,18(4):978-986 [Abstract(4165)]  [View PDF(5057)564.98 K]
  • A Cluster-Based Multipath Routing Algorithm in Mobile Ad Hoc Networks
  • AN Hui-Yao,LU Xi-Cheng and PENG Wei
  • 2007,18(4):987-995 [Abstract(5046)]  [View PDF(5054)524.29 K]
  • Percolation-Based Probabilistic Reliable Dissemination for Mobile Ad Hoc Networks
  • ZHENG Jing,LU Xi-Cheng and CAO Jian-Nong
  • 2007,18(4):996-1006 [Abstract(4013)]  [View PDF(4161)663.52 K]
  • Forking Lemma and the Security Proofs for a Class of ID-Based Signatures
  • GU Chun-Xiang,ZHU Yue-Fei and PAN Xiao-Yu
  • 2007,18(4):1007-1014 [Abstract(4770)]  [View PDF(6705)570.08 K]
  • Independent Oblivious Transfer
  • HUANG Qiong and ZHAO Yi-Ming
  • 2007,18(4):1015-1025 [Abstract(4485)]  [View PDF(4429)681.46 K]
  • Macor: A Maintainable XQuery Model for Representing Nested Schema Mappings
  • QIAN Gang and DONG Yi-Sheng
  • 2007,18(4):1026-1038 [Abstract(3892)]  [View PDF(4943)524.03 K]
  • A High Performance Computer System Evaluation Model Based on HPCC and Analytic Hierarchy Process
  • LIU Chuan-Yi and WANG Dong-Sheng
  • 2007,18(4):1039-1046 [Abstract(4590)]  [View PDF(6056)551.10 K]
  • SimOS-Goodson: A Goodson-Processor Based Multi-Core Full-System Simulator
  • GAO Xiang,ZHANG Fu-Xin,TANG Yan,ZHANG Long-Bing,HU Wei-Wu and TANG Zhi-Min
  • 2007,18(4):1047-1055 [Abstract(5068)]  [View PDF(6096)570.91 K]
  • Automatedly Checking Function Execution Context of Kernel Programs in Operation Systems
  • WANG Li,YANG Xue-Jun,WANG Ji and LUO Yu
  • 2007,18(4):1056-1067 [Abstract(4703)]  [View PDF(5186)690.53 K]
  • Mission Reliability Analysis of Generalized Phased Mission Systems
  • MO Yu-Chang,YANG Xiao-Zong,CUI Gang and LIU Hong-Wei
  • 2007,18(4):1068-1076 [Abstract(4977)]  [View PDF(5057)559.63 K]
  • Review Articles

  • Software Cost Estimation Method and Application
  • LI Ming-Shu,HE Mei,YANG Da,SHU Feng-Di and WANG Qing
  • 2007,18(4):775-795 [Abstract(10683)]  [View PDF(12107)1.36 M]
  • Topology Control for Wireless Sensor Networks
  • ZHANG Xue,LU Sang-Lu,CHEN Gui-Hai,CHEN Dao-Xu and XIE Li
  • 2007,18(4):943-954 [Abstract(9433)]  [View PDF(10460)699.81 K]