Volume 18,Issue 9,2007 Table of Contents

Other Issues:  
  
Contents

  • Quantum Clonal Algorithm for Multicast Routing Problem
  • LI Yang-Yang and JIAO Li-Cheng
  • 2007,18(9):2063-2069 [Abstract(2953)]  [View PDF(3020)490.80 K]
  • Parameterized Algorithm of the Individual Haplotyping MSR Problem with Mate-Pairs
  • XIE Min-Zhu,CHEN Jian-Er and WANG Jian-Xin
  • 2007,18(9):2070-2082 [Abstract(3108)]  [View PDF(2958)828.79 K]
  • A Combinational Heuristic Algorithm for the Three-Dimensional Packing Problem
  • ZHANG De-Fu,WEI Li-Jun,CHEN Qing-Shan and CHEN Huo-Wang
  • 2007,18(9):2083-2089 [Abstract(3214)]  [View PDF(7381)509.33 K]
  • Haplotyping and Haplotype Frequency Estimates on Trio Genotype Data
  • ZHANG Qiang-Feng,XU Yun,CHEN Guo-Liang and CHE Hao-Yang
  • 2007,18(9):2090-2099 [Abstract(2714)]  [View PDF(2419)681.03 K]
  • A Probabilistic Study on the Multiple Solutions of the P3P Problem
  • ZHANG Cai-Xia and HU Zhan-Yi
  • 2007,18(9):2100-2104 [Abstract(2999)]  [View PDF(2515)320.22 K]
  • Efficient Partial Redundancy Fault Tolerance Compilation: Replicating Critical Subgraph of Error Flow
  • GAO Long,WANG Zhi-Yuan and YANG Xue-Jun
  • 2007,18(9):2105-2116 [Abstract(2832)]  [View PDF(2845)802.44 K]
  • A Performance Model-Based Self-Configuration Framework for Middleware
  • HU Jian-Jun,GUAN He-Qing,WEI Jun and HUANG Tao
  • 2007,18(9):2117-2129 [Abstract(3036)]  [View PDF(3003)790.49 K]
  • Verification of C Programs Using Assume-Guarantee Reuse of Searching
  • YI Xiao-Dong,WANG Ji and YANG Xue-Jun
  • 2007,18(9):2130-2140 [Abstract(2941)]  [View PDF(2840)789.70 K]
  • Towards Software Process Enactment Based on the SPEM2XPDL Model Transformation
  • YUAN Feng and LI Ming-Shu
  • 2007,18(9):2141-2152 [Abstract(2736)]  [View PDF(2594)1.02 M]
  • A Method of Time Constraint Workflow Model Analysis and Verification
  • WANG Yuan and FAN Yu-Shun
  • 2007,18(9):2153-2161 [Abstract(2763)]  [View PDF(2877)630.42 K]
  • Error Correction of Continuous Handwriting Recognition by Multimodal Fusion
  • AO Xiang,WANG Xu-Gang,DAI Guo-Zhong and WANG Hong-An
  • 2007,18(9):2162-2173 [Abstract(2962)]  [View PDF(3062)844.96 K]
  • Representation and Extension of Rough Set Theory Based on Formal Concept Analysis
  • QU Kai-She,ZHAI Yan-Hui,LIANG Ji-Ye and LI De-Yu
  • 2007,18(9):2174-2182 [Abstract(3043)]  [View PDF(3708)641.98 K]
  • Interactive Evolutionary Computation with Fitness Noise and Its Convergence Robustness
  • HAO Guo-Sheng,SHI You-Qun,HUANG Yong-Qing,Lü Jun-Huai and GUO Guang-Song
  • 2007,18(9):2183-2193 [Abstract(2902)]  [View PDF(2876)868.38 K]
  • Xmesh: A Mesh-Like Topology for Network on Chip
  • ZHU Xiao-Jing,HU Wei-Wu,MA Ke and ZHANG Long-Bing
  • 2007,18(9):2194-2204 [Abstract(3276)]  [View PDF(3866)651.08 K]
  • High Performance Control-Plane Communication Model for Scalable Routers
  • XU Ke,WU Kun and WANG Qing-Qing
  • 2007,18(9):2205-2215 [Abstract(2744)]  [View PDF(2814)677.04 K]
  • A User Behavior Based Semantic Search Approach under P2P Environment
  • QIU Zhi-Huan,XIAO Ming-Zhong and DAI Ya-Fei
  • 2007,18(9):2216-2225 [Abstract(3335)]  [View PDF(3086)718.79 K]
  • An Overlay Topology Based Proactive Replication in Unstructured P2P Systems
  • FENG Guo-Fu,ZHANG Jin-Cheng,GU Qing,LU Sang-Lu and CHEN Dao-Xu
  • 2007,18(9):2226-2234 [Abstract(2751)]  [View PDF(3041)621.62 K]
  • Movement-Assisted Data Gathering Scheme with Load-Balancing for Sensor Networks
  • SHI Gao-Tao and LIAO Ming-Hong
  • 2007,18(9):2235-2244 [Abstract(3457)]  [View PDF(2811)683.56 K]
  • DDOS Attack Detecting and Defending Model
  • SUN Zhi-Xin,JIANG Ju-Liang and JIAO Lin
  • 2007,18(9):2245-2258 [Abstract(3614)]  [View PDF(3930)841.44 K]
  • Performance Analysis of the Contention Resolution Scheme in IEEE 802.16
  • LU Wen-Yan,JIA Wei-Jia,DU Wen-Feng and ZHANG Li-Zhuo
  • 2007,18(9):2259 [Abstract(3644)]  [View PDF(3327)714.31 K]
  • Techniques of Building a Scalable, Efficient Intrusion Monitoring Architecture
  • YANG Wu,FANG Bin-Xing and YUN Xiao-Chun
  • 2007,18(9):2271-2282 [Abstract(3154)]  [View PDF(2768)691.62 K]
  • Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moment of Original Image
  • ZHANG Li,QIAN Gong-Bin and XIAO Wei-Wei
  • 2007,18(9):2283-2294 [Abstract(3209)]  [View PDF(2997)883.84 K]
  • Multi-Level and Dynamic Security Access Control for CAD Models in Collaborative Environment
  • FANG Cui-Hao,YE Xiu-Zi,PENG Wei and ZHANG Yin
  • 2007,18(9):2295-2305 [Abstract(3041)]  [View PDF(3475)776.54 K]
  • Algebraic B-Spline Curve Reconstruction Based on Signed Distance Field
  • LI Yun-Xi,FENG Jie-Qing and JIN Xiao-Gang
  • 2007,18(9):2306-2317 [Abstract(3013)]  [View PDF(3135)929.10 K]
  • Illumination Normalization with Morphological Quotient Image
  • HE Xiao-Guang,TIAN Jie,WU Li-Fang,ZHANG Yao-Yao and YANG Xin
  • 2007,18(9):2318-2325 [Abstract(3635)]  [View PDF(3193)937.10 K]
  • Bound Estimations on Lower Derivatives of Rational Triangular Bézier Surfaces
  • CAO Juan,CHEN Wen-Yu and WANG Guo-Zhao
  • 2007,18(9):2326-2335 [Abstract(2983)]  [View PDF(2532)558.68 K]
  • Multisolution Shape Editing of Point-Sampled Geometry
  • XIAO Chun-Xia,FENG Jie-Qing,ZHOU Ting-Fang,ZHENG Wen-Ting and Peng Qun-Sheng
  • 2007,18(9):2336-2345 [Abstract(2854)]  [View PDF(2884)953.81 K]
  • Ternary Subdivision Scheme for Quadrilateral Mesh with Fast Convergence
  • LIU Li,ZHANG Cai-Ming,YANG Xing-Qiang and BO Peng-Bo
  • 2007,18(9):2346-2355 [Abstract(2837)]  [View PDF(2895)680.17 K]
  • A Method for Character Animation Generation and Control
  • GAO Quan-Sheng and HONG Bing-Rong
  • 2007,18(9):2356-2364 [Abstract(2881)]  [View PDF(2716)686.21 K]