Volume 18,Issue 9,2007 Table of Contents

Other Issues:  
  
Contents

  • Quantum Clonal Algorithm for Multicast Routing Problem
  • LI Yang-Yang and JIAO Li-Cheng
  • 2007,18(9):2063-2069 [Abstract(3004)]  [View PDF(3042)490.80 K]
  • Parameterized Algorithm of the Individual Haplotyping MSR Problem with Mate-Pairs
  • XIE Min-Zhu,CHEN Jian-Er and WANG Jian-Xin
  • 2007,18(9):2070-2082 [Abstract(3157)]  [View PDF(2979)828.79 K]
  • A Combinational Heuristic Algorithm for the Three-Dimensional Packing Problem
  • ZHANG De-Fu,WEI Li-Jun,CHEN Qing-Shan and CHEN Huo-Wang
  • 2007,18(9):2083-2089 [Abstract(3287)]  [View PDF(7426)509.33 K]
  • Haplotyping and Haplotype Frequency Estimates on Trio Genotype Data
  • ZHANG Qiang-Feng,XU Yun,CHEN Guo-Liang and CHE Hao-Yang
  • 2007,18(9):2090-2099 [Abstract(2808)]  [View PDF(2445)681.03 K]
  • A Probabilistic Study on the Multiple Solutions of the P3P Problem
  • ZHANG Cai-Xia and HU Zhan-Yi
  • 2007,18(9):2100-2104 [Abstract(3060)]  [View PDF(2540)320.22 K]
  • Efficient Partial Redundancy Fault Tolerance Compilation: Replicating Critical Subgraph of Error Flow
  • GAO Long,WANG Zhi-Yuan and YANG Xue-Jun
  • 2007,18(9):2105-2116 [Abstract(2888)]  [View PDF(2876)802.44 K]
  • A Performance Model-Based Self-Configuration Framework for Middleware
  • HU Jian-Jun,GUAN He-Qing,WEI Jun and HUANG Tao
  • 2007,18(9):2117-2129 [Abstract(3097)]  [View PDF(3030)790.49 K]
  • Verification of C Programs Using Assume-Guarantee Reuse of Searching
  • YI Xiao-Dong,WANG Ji and YANG Xue-Jun
  • 2007,18(9):2130-2140 [Abstract(3005)]  [View PDF(2869)789.70 K]
  • Towards Software Process Enactment Based on the SPEM2XPDL Model Transformation
  • YUAN Feng and LI Ming-Shu
  • 2007,18(9):2141-2152 [Abstract(2787)]  [View PDF(2621)1.02 M]
  • A Method of Time Constraint Workflow Model Analysis and Verification
  • WANG Yuan and FAN Yu-Shun
  • 2007,18(9):2153-2161 [Abstract(2816)]  [View PDF(2927)630.42 K]
  • Error Correction of Continuous Handwriting Recognition by Multimodal Fusion
  • AO Xiang,WANG Xu-Gang,DAI Guo-Zhong and WANG Hong-An
  • 2007,18(9):2162-2173 [Abstract(3022)]  [View PDF(3092)844.96 K]
  • Representation and Extension of Rough Set Theory Based on Formal Concept Analysis
  • QU Kai-She,ZHAI Yan-Hui,LIANG Ji-Ye and LI De-Yu
  • 2007,18(9):2174-2182 [Abstract(3115)]  [View PDF(3739)641.98 K]
  • Interactive Evolutionary Computation with Fitness Noise and Its Convergence Robustness
  • HAO Guo-Sheng,SHI You-Qun,HUANG Yong-Qing,Lü Jun-Huai and GUO Guang-Song
  • 2007,18(9):2183-2193 [Abstract(2950)]  [View PDF(2903)868.38 K]
  • Xmesh: A Mesh-Like Topology for Network on Chip
  • ZHU Xiao-Jing,HU Wei-Wu,MA Ke and ZHANG Long-Bing
  • 2007,18(9):2194-2204 [Abstract(3349)]  [View PDF(3893)651.08 K]
  • High Performance Control-Plane Communication Model for Scalable Routers
  • XU Ke,WU Kun and WANG Qing-Qing
  • 2007,18(9):2205-2215 [Abstract(2823)]  [View PDF(2845)677.04 K]
  • A User Behavior Based Semantic Search Approach under P2P Environment
  • QIU Zhi-Huan,XIAO Ming-Zhong and DAI Ya-Fei
  • 2007,18(9):2216-2225 [Abstract(3382)]  [View PDF(3112)718.79 K]
  • An Overlay Topology Based Proactive Replication in Unstructured P2P Systems
  • FENG Guo-Fu,ZHANG Jin-Cheng,GU Qing,LU Sang-Lu and CHEN Dao-Xu
  • 2007,18(9):2226-2234 [Abstract(2811)]  [View PDF(3069)621.62 K]
  • Movement-Assisted Data Gathering Scheme with Load-Balancing for Sensor Networks
  • SHI Gao-Tao and LIAO Ming-Hong
  • 2007,18(9):2235-2244 [Abstract(3574)]  [View PDF(2844)683.56 K]
  • DDOS Attack Detecting and Defending Model
  • SUN Zhi-Xin,JIANG Ju-Liang and JIAO Lin
  • 2007,18(9):2245-2258 [Abstract(3695)]  [View PDF(3969)841.44 K]
  • Performance Analysis of the Contention Resolution Scheme in IEEE 802.16
  • LU Wen-Yan,JIA Wei-Jia,DU Wen-Feng and ZHANG Li-Zhuo
  • 2007,18(9):2259 [Abstract(3703)]  [View PDF(3356)714.31 K]
  • Techniques of Building a Scalable, Efficient Intrusion Monitoring Architecture
  • YANG Wu,FANG Bin-Xing and YUN Xiao-Chun
  • 2007,18(9):2271-2282 [Abstract(3306)]  [View PDF(2805)691.62 K]
  • Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moment of Original Image
  • ZHANG Li,QIAN Gong-Bin and XIAO Wei-Wei
  • 2007,18(9):2283-2294 [Abstract(3265)]  [View PDF(3019)883.84 K]
  • Multi-Level and Dynamic Security Access Control for CAD Models in Collaborative Environment
  • FANG Cui-Hao,YE Xiu-Zi,PENG Wei and ZHANG Yin
  • 2007,18(9):2295-2305 [Abstract(3098)]  [View PDF(3500)776.54 K]
  • Algebraic B-Spline Curve Reconstruction Based on Signed Distance Field
  • LI Yun-Xi,FENG Jie-Qing and JIN Xiao-Gang
  • 2007,18(9):2306-2317 [Abstract(3069)]  [View PDF(3172)929.10 K]
  • Illumination Normalization with Morphological Quotient Image
  • HE Xiao-Guang,TIAN Jie,WU Li-Fang,ZHANG Yao-Yao and YANG Xin
  • 2007,18(9):2318-2325 [Abstract(3742)]  [View PDF(3217)937.10 K]
  • Bound Estimations on Lower Derivatives of Rational Triangular Bézier Surfaces
  • CAO Juan,CHEN Wen-Yu and WANG Guo-Zhao
  • 2007,18(9):2326-2335 [Abstract(3034)]  [View PDF(2557)558.68 K]
  • Multisolution Shape Editing of Point-Sampled Geometry
  • XIAO Chun-Xia,FENG Jie-Qing,ZHOU Ting-Fang,ZHENG Wen-Ting and Peng Qun-Sheng
  • 2007,18(9):2336-2345 [Abstract(2944)]  [View PDF(2913)953.81 K]
  • Ternary Subdivision Scheme for Quadrilateral Mesh with Fast Convergence
  • LIU Li,ZHANG Cai-Ming,YANG Xing-Qiang and BO Peng-Bo
  • 2007,18(9):2346-2355 [Abstract(2919)]  [View PDF(2921)680.17 K]
  • A Method for Character Animation Generation and Control
  • GAO Quan-Sheng and HONG Bing-Rong
  • 2007,18(9):2356-2364 [Abstract(2945)]  [View PDF(2750)686.21 K]