Volume 18,Issue 4,2007 Table of Contents
Detecting Feature Interactions by Pattern AnalysisZUO Ji-Hong,WANG Qian-Xiang and MEI Hong2007,18(4):796-807 [Abstract(2815)] [View PDF(2832)701.40 K]Error Flow Model: Modeling and Analysis of Software Propagating Hardware FaultsYANG Xue-Jun and GAO Long2007,18(4):808-820 [Abstract(3098)] [View PDF(2943)795.63 K]An Approach for Optimizing Test Suite Based on Testing Requirement ReductionZHANG Xiao-Fang,XU Bao-Wen,NIE Chang-Hai and SHI Liang2007,18(4):821-831 [Abstract(3890)] [View PDF(4169)956.33 K]An Approach to Analyzing Dependence Based on Exception Propagation AnalysisJIANG Shu-Juan,XU Bao-Wen,SHI Liang and ZHOU Xiao-Yu2007,18(4):832-841 [Abstract(2808)] [View PDF(3291)631.54 K]Levelset Method with Multi-Speed-Function and Its Application in Segmentation of Medical ImagesCHEN Jian,TIAN Jie,XUE Jian and DAI Ya-Kang2007,18(4):842-849 [Abstract(2884)] [View PDF(3086)358.58 K]Block Motion Estimation Based on Immune Clonal SelectionLIU Fang and PAN Xiao-Ying2007,18(4):850-860 [Abstract(2752)] [View PDF(3156)749.62 K]A Simpler and More Effective Particle Swarm Optimization AlgorithmHU Wang and LI Zhi-Shu2007,18(4):861-868 [Abstract(7831)] [View PDF(7764)692.44 K]A More Topologically Stable ISOMAP AlgorithmSHAO Chao,HUANG Hou-Kuan and ZHAO Lian-Wei2007,18(4):869-877 [Abstract(3623)] [View PDF(4314)741.24 K]Robust Speech Recognition Based on Neighborhood SpaceYAN Bin-Feng,ZHU Xiao-Yan,ZHANG Zhi-Jiang and ZHANG Fan2007,18(4):878-883 [Abstract(3634)] [View PDF(3096)405.05 K]An Efficient Algorithm for Mining Approximate Frequent Item over Data StreamsWANG Wei-Ping,LI Jian-Zhong,ZHANG Dong-Dong and GUO Long-Jiang2007,18(4):884-892 [Abstract(3821)] [View PDF(4361)545.31 K]Complex Twig Pattern Query Processing over XML StreamsYANG Wei-Dong,WANG Qing-Ming and SHI Bai-Le2007,18(4):893-904 [Abstract(3558)] [View PDF(3210)758.91 K]Clustering Evolving Data Streams over Sliding WindowsCHANG Jian-Long,CAO Feng and ZHOU Ao-Ying2007,18(4):905-918 [Abstract(3821)] [View PDF(4393)860.78 K]Layered Solution for SLCA Problem in XML Information RetrievalKONG Ling-Bo,TANG Shi-Wei,YANG Dong-Qing,WANG Teng-Jiao and GAO Jun2007,18(4):919-932 [Abstract(3570)] [View PDF(3664)843.04 K]A Fast Outlier Detection Algorithm for High Dimensional Categorical Data StreamsZHOU Xiao-Yun,SUN Zhi-Hui,ZHANG Bai-Li and YANG Yi-Dong2007,18(4):933-942 [Abstract(3591)] [View PDF(3805)571.89 K]Access Control in New Network EnvironmentLIN Chuang,FENG Fu-Jun and LI Jun-Shan2007,18(4):955-966 [Abstract(3929)] [View PDF(4702)695.74 K]Anomaly Detection Based on Web Users' Browsing BehaviorsXIE Yi and YU Shun-Zheng2007,18(4):967-977 [Abstract(4113)] [View PDF(5082)672.08 K]Towards the Optimization of Access Control ListZENG Kuang-Yi and YANG Jia-Hai2007,18(4):978-986 [Abstract(2901)] [View PDF(3052)564.98 K]A Cluster-Based Multipath Routing Algorithm in Mobile Ad Hoc NetworksAN Hui-Yao,LU Xi-Cheng and PENG Wei2007,18(4):987-995 [Abstract(3407)] [View PDF(3121)524.29 K]Percolation-Based Probabilistic Reliable Dissemination for Mobile Ad Hoc NetworksZHENG Jing,LU Xi-Cheng and CAO Jian-Nong2007,18(4):996-1006 [Abstract(2804)] [View PDF(2584)663.52 K]Forking Lemma and the Security Proofs for a Class of ID-Based SignaturesGU Chun-Xiang,ZHU Yue-Fei and PAN Xiao-Yu2007,18(4):1007-1014 [Abstract(3322)] [View PDF(4469)570.08 K]Independent Oblivious TransferHUANG Qiong and ZHAO Yi-Ming2007,18(4):1015-1025 [Abstract(3006)] [View PDF(2525)681.46 K]Macor: A Maintainable XQuery Model for Representing Nested Schema MappingsQIAN Gang and DONG Yi-Sheng2007,18(4):1026-1038 [Abstract(2709)] [View PDF(3328)524.03 K]A High Performance Computer System Evaluation Model Based on HPCC and Analytic Hierarchy ProcessLIU Chuan-Yi and WANG Dong-Sheng2007,18(4):1039-1046 [Abstract(3288)] [View PDF(4008)551.10 K]SimOS-Goodson: A Goodson-Processor Based Multi-Core Full-System SimulatorGAO Xiang,ZHANG Fu-Xin,TANG Yan,ZHANG Long-Bing,HU Wei-Wu and TANG Zhi-Min2007,18(4):1047-1055 [Abstract(3418)] [View PDF(3693)570.91 K]Automatedly Checking Function Execution Context of Kernel Programs in Operation SystemsWANG Li,YANG Xue-Jun,WANG Ji and LUO Yu2007,18(4):1056-1067 [Abstract(2988)] [View PDF(3420)690.53 K]Mission Reliability Analysis of Generalized Phased Mission SystemsMO Yu-Chang,YANG Xiao-Zong,CUI Gang and LIU Hong-Wei2007,18(4):1068-1076 [Abstract(3476)] [View PDF(3123)559.63 K]
Software Cost Estimation Method and ApplicationLI Ming-Shu,HE Mei,YANG Da,SHU Feng-Di and WANG Qing2007,18(4):775-795 [Abstract(7908)] [View PDF(7612)1.36 M]Topology Control for Wireless Sensor NetworksZHANG Xue,LU Sang-Lu,CHEN Gui-Hai,CHEN Dao-Xu and XIE Li2007,18(4):943-954 [Abstract(6452)] [View PDF(6891)699.81 K]