Volume 18,Issue 9,2007 Table of Contents

Other Issues:  
  
Contents

  • Quantum Clonal Algorithm for Multicast Routing Problem
  • LI Yang-Yang and JIAO Li-Cheng
  • 2007,18(9):2063-2069 [Abstract(3417)]  [View PDF(3262)490.80 K]
  • Parameterized Algorithm of the Individual Haplotyping MSR Problem with Mate-Pairs
  • XIE Min-Zhu,CHEN Jian-Er and WANG Jian-Xin
  • 2007,18(9):2070-2082 [Abstract(3573)]  [View PDF(3222)828.79 K]
  • A Combinational Heuristic Algorithm for the Three-Dimensional Packing Problem
  • ZHANG De-Fu,WEI Li-Jun,CHEN Qing-Shan and CHEN Huo-Wang
  • 2007,18(9):2083-2089 [Abstract(3874)]  [View PDF(8016)509.33 K]
  • Haplotyping and Haplotype Frequency Estimates on Trio Genotype Data
  • ZHANG Qiang-Feng,XU Yun,CHEN Guo-Liang and CHE Hao-Yang
  • 2007,18(9):2090-2099 [Abstract(3257)]  [View PDF(2693)681.03 K]
  • A Probabilistic Study on the Multiple Solutions of the P3P Problem
  • ZHANG Cai-Xia and HU Zhan-Yi
  • 2007,18(9):2100-2104 [Abstract(3648)]  [View PDF(2775)320.22 K]
  • Efficient Partial Redundancy Fault Tolerance Compilation: Replicating Critical Subgraph of Error Flow
  • GAO Long,WANG Zhi-Yuan and YANG Xue-Jun
  • 2007,18(9):2105-2116 [Abstract(3364)]  [View PDF(3100)802.44 K]
  • A Performance Model-Based Self-Configuration Framework for Middleware
  • HU Jian-Jun,GUAN He-Qing,WEI Jun and HUANG Tao
  • 2007,18(9):2117-2129 [Abstract(3562)]  [View PDF(3352)790.49 K]
  • Verification of C Programs Using Assume-Guarantee Reuse of Searching
  • YI Xiao-Dong,WANG Ji and YANG Xue-Jun
  • 2007,18(9):2130-2140 [Abstract(3573)]  [View PDF(3159)789.70 K]
  • Towards Software Process Enactment Based on the SPEM2XPDL Model Transformation
  • YUAN Feng and LI Ming-Shu
  • 2007,18(9):2141-2152 [Abstract(3163)]  [View PDF(2805)1.02 M]
  • A Method of Time Constraint Workflow Model Analysis and Verification
  • WANG Yuan and FAN Yu-Shun
  • 2007,18(9):2153-2161 [Abstract(3189)]  [View PDF(3225)630.42 K]
  • Error Correction of Continuous Handwriting Recognition by Multimodal Fusion
  • AO Xiang,WANG Xu-Gang,DAI Guo-Zhong and WANG Hong-An
  • 2007,18(9):2162-2173 [Abstract(3521)]  [View PDF(3377)844.96 K]
  • Representation and Extension of Rough Set Theory Based on Formal Concept Analysis
  • QU Kai-She,ZHAI Yan-Hui,LIANG Ji-Ye and LI De-Yu
  • 2007,18(9):2174-2182 [Abstract(3624)]  [View PDF(4076)641.98 K]
  • Interactive Evolutionary Computation with Fitness Noise and Its Convergence Robustness
  • HAO Guo-Sheng,SHI You-Qun,HUANG Yong-Qing,Lü Jun-Huai and GUO Guang-Song
  • 2007,18(9):2183-2193 [Abstract(3336)]  [View PDF(3216)868.38 K]
  • Xmesh: A Mesh-Like Topology for Network on Chip
  • ZHU Xiao-Jing,HU Wei-Wu,MA Ke and ZHANG Long-Bing
  • 2007,18(9):2194-2204 [Abstract(3905)]  [View PDF(4170)651.08 K]
  • High Performance Control-Plane Communication Model for Scalable Routers
  • XU Ke,WU Kun and WANG Qing-Qing
  • 2007,18(9):2205-2215 [Abstract(3242)]  [View PDF(3132)677.04 K]
  • A User Behavior Based Semantic Search Approach under P2P Environment
  • QIU Zhi-Huan,XIAO Ming-Zhong and DAI Ya-Fei
  • 2007,18(9):2216-2225 [Abstract(3814)]  [View PDF(3341)718.79 K]
  • An Overlay Topology Based Proactive Replication in Unstructured P2P Systems
  • FENG Guo-Fu,ZHANG Jin-Cheng,GU Qing,LU Sang-Lu and CHEN Dao-Xu
  • 2007,18(9):2226-2234 [Abstract(3190)]  [View PDF(3312)621.62 K]
  • Movement-Assisted Data Gathering Scheme with Load-Balancing for Sensor Networks
  • SHI Gao-Tao and LIAO Ming-Hong
  • 2007,18(9):2235-2244 [Abstract(4106)]  [View PDF(3077)683.56 K]
  • DDOS Attack Detecting and Defending Model
  • SUN Zhi-Xin,JIANG Ju-Liang and JIAO Lin
  • 2007,18(9):2245-2258 [Abstract(4144)]  [View PDF(4425)841.44 K]
  • Performance Analysis of the Contention Resolution Scheme in IEEE 802.16
  • LU Wen-Yan,JIA Wei-Jia,DU Wen-Feng and ZHANG Li-Zhuo
  • 2007,18(9):2259 [Abstract(4227)]  [View PDF(3609)714.31 K]
  • Techniques of Building a Scalable, Efficient Intrusion Monitoring Architecture
  • YANG Wu,FANG Bin-Xing and YUN Xiao-Chun
  • 2007,18(9):2271-2282 [Abstract(3894)]  [View PDF(3052)691.62 K]
  • Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moment of Original Image
  • ZHANG Li,QIAN Gong-Bin and XIAO Wei-Wei
  • 2007,18(9):2283-2294 [Abstract(3697)]  [View PDF(3233)883.84 K]
  • Multi-Level and Dynamic Security Access Control for CAD Models in Collaborative Environment
  • FANG Cui-Hao,YE Xiu-Zi,PENG Wei and ZHANG Yin
  • 2007,18(9):2295-2305 [Abstract(3583)]  [View PDF(3710)776.54 K]
  • Algebraic B-Spline Curve Reconstruction Based on Signed Distance Field
  • LI Yun-Xi,FENG Jie-Qing and JIN Xiao-Gang
  • 2007,18(9):2306-2317 [Abstract(3529)]  [View PDF(3661)929.10 K]
  • Illumination Normalization with Morphological Quotient Image
  • HE Xiao-Guang,TIAN Jie,WU Li-Fang,ZHANG Yao-Yao and YANG Xin
  • 2007,18(9):2318-2325 [Abstract(4302)]  [View PDF(3464)937.10 K]
  • Bound Estimations on Lower Derivatives of Rational Triangular Bézier Surfaces
  • CAO Juan,CHEN Wen-Yu and WANG Guo-Zhao
  • 2007,18(9):2326-2335 [Abstract(3404)]  [View PDF(2752)558.68 K]
  • Multisolution Shape Editing of Point-Sampled Geometry
  • XIAO Chun-Xia,FENG Jie-Qing,ZHOU Ting-Fang,ZHENG Wen-Ting and Peng Qun-Sheng
  • 2007,18(9):2336-2345 [Abstract(3436)]  [View PDF(3166)953.81 K]
  • Ternary Subdivision Scheme for Quadrilateral Mesh with Fast Convergence
  • LIU Li,ZHANG Cai-Ming,YANG Xing-Qiang and BO Peng-Bo
  • 2007,18(9):2346-2355 [Abstract(3403)]  [View PDF(3157)680.17 K]
  • A Method for Character Animation Generation and Control
  • GAO Quan-Sheng and HONG Bing-Rong
  • 2007,18(9):2356-2364 [Abstract(3396)]  [View PDF(2967)686.21 K]