Volume 18,Issue 8,2007 Table of Contents
Preface of Special Issue on Virtual Computing Environment for Sharing Internet ResourcesLU Xi-Cheng and HUAI Jin-Peng2007,18(8):1855-1857 [Abstract(7074)] [View PDF(6446)262.43 K]A Clustering Based Resource Aggregation Method for Virtual Computing EnvironmentCHU Rui,LU Xi-Cheng and XIAO Nong2007,18(8):1858-1869 [Abstract(7176)] [View PDF(6298)725.32 K]An Approach to Constructing Web Service Workflow Based on Business Spanning GraphHU Chun-Hua,WU Min,LIU Guo-Ping and XU De-Zhi2007,18(8):1870-1882 [Abstract(8269)] [View PDF(7053)856.72 K]Consumer-Centric Service Aggregation: Method and Its Supporting FrameworkLIU Xuan-Zhe,HUANG Gang and MEI Hong2007,18(8):1883-1895 [Abstract(8141)] [View PDF(6774)1.15 M]Automatic Web Service Composition Based on Backward TreeDENG Shui-Guang,WU Jian,LI Ying and WU Zhao-Hui2007,18(8):1896-1910 [Abstract(8071)] [View PDF(7174)992.49 K]Using Inverted Indexing to Facilitate Composition-Oriented Semantic Service DiscoveryKUANG Li,DENG Shui-Guang,LI Ying,WU Jian and WU Zhao-Hui2007,18(8):1911-1921 [Abstract(8175)] [View PDF(7309)1.76 M]A Two Layered P2P Model for Semantic Service DiscoveryLIU Zhi-Zhong,WANG Huai-Min and ZHOU Bin2007,18(8):1922-1932 [Abstract(7658)] [View PDF(6729)733.14 K]Scalable Distributed Resource Information Service for Internet-Based Virtual Computing EnvironmentZHANG Yi-Ming,LI Dong-Sheng and LU Xi-Cheng2007,18(8):1933-1942 [Abstract(7515)] [View PDF(6299)697.60 K]Service Behavior and Quality Consistency in Virtualized Computing EnvironmentHU Hao,YIN Qin and Lü Jian2007,18(8):1943-1957 [Abstract(7811)] [View PDF(6181)953.92 K]A Trustworthiness Based Ad-Hoc Secure Interoperation MethodLIU Wei,CAI Jia-Yong and HE Ye-Ping2007,18(8):1958-1967 [Abstract(7114)] [View PDF(5999)661.13 K]Clique-Based Reputation System in Self-Organizing Internet-Based Virtual Computing EnvironmentTANG Yang-Bin,WANG Huai-Min and CHANG Jun-Sheng2007,18(8):1968-1986 [Abstract(7853)] [View PDF(5790)1.18 M]Autonomic Intrusiveness Control Mechanism, Algorithm and Policies in R-Net Monitoring SystemYAO Yuan-Zhe,FANG Bin-Xing,LIU Xin-Ran,ZHANG Hong,CHEN Li and SHI Ling2007,18(8):1987-2001 [Abstract(7304)] [View PDF(5936)953.95 K]Fine-Grained Controllable Delegation Authorization Model Based on TrustworthinessZHAI Zheng-De,FENG Deng-Guo and XU Zhen2007,18(8):2002-2015 [Abstract(7893)] [View PDF(7373)794.78 K]Research and Design on Hypervisor Based Virtual Computing EnvironmentHUAI Jin-Peng,LI Qin and HU Chun-Ming2007,18(8):2016-2026 [Abstract(8815)] [View PDF(8367)850.77 K]Multi-Cluster Co-Allocation Scheduling Algorithms in Virtual Computing EnvironmentZHANG Wei-Zhe,TIAN Zhi-Hong,ZHANG Hong-Li,HE Hui and LIU Wen-Mao2007,18(8):2027-2037 [Abstract(7794)] [View PDF(6787)811.32 K]Software Agent-Virtualized Application Mobility in Pervasive EnvironmentsZHOU Yu,MA Xiao-Xing,CAO Jian-Nong,YU Ping and Lü Jian2007,18(8):2038-2048 [Abstract(7563)] [View PDF(6232)801.43 K]Semantic-Based Medical Information Integration Scheme for Medical Image GridJIN Hai,SUN Ao-Bing,ZHENG Ran,HE Ru-Han,ZHANG Qin and WU Song2007,18(8):2049-2062 [Abstract(7958)] [View PDF(7298)1.70 M]