Volume 18,Issue 9,2007 Table of Contents

Other Issues:  
  
Contents

  • Quantum Clonal Algorithm for Multicast Routing Problem
  • LI Yang-Yang and JIAO Li-Cheng
  • 2007,18(9):2063-2069 [Abstract(4189)]  [View PDF(4743)490.80 K]
  • Parameterized Algorithm of the Individual Haplotyping MSR Problem with Mate-Pairs
  • XIE Min-Zhu,CHEN Jian-Er and WANG Jian-Xin
  • 2007,18(9):2070-2082 [Abstract(4338)]  [View PDF(4716)828.79 K]
  • A Combinational Heuristic Algorithm for the Three-Dimensional Packing Problem
  • ZHANG De-Fu,WEI Li-Jun,CHEN Qing-Shan and CHEN Huo-Wang
  • 2007,18(9):2083-2089 [Abstract(5114)]  [View PDF(11063)509.33 K]
  • Haplotyping and Haplotype Frequency Estimates on Trio Genotype Data
  • ZHANG Qiang-Feng,XU Yun,CHEN Guo-Liang and CHE Hao-Yang
  • 2007,18(9):2090-2099 [Abstract(4039)]  [View PDF(4528)681.03 K]
  • A Probabilistic Study on the Multiple Solutions of the P3P Problem
  • ZHANG Cai-Xia and HU Zhan-Yi
  • 2007,18(9):2100-2104 [Abstract(4482)]  [View PDF(4388)320.22 K]
  • Efficient Partial Redundancy Fault Tolerance Compilation: Replicating Critical Subgraph of Error Flow
  • GAO Long,WANG Zhi-Yuan and YANG Xue-Jun
  • 2007,18(9):2105-2116 [Abstract(4098)]  [View PDF(4544)802.44 K]
  • A Performance Model-Based Self-Configuration Framework for Middleware
  • HU Jian-Jun,GUAN He-Qing,WEI Jun and HUANG Tao
  • 2007,18(9):2117-2129 [Abstract(4317)]  [View PDF(4747)790.49 K]
  • Verification of C Programs Using Assume-Guarantee Reuse of Searching
  • YI Xiao-Dong,WANG Ji and YANG Xue-Jun
  • 2007,18(9):2130-2140 [Abstract(4481)]  [View PDF(4815)789.70 K]
  • Towards Software Process Enactment Based on the SPEM2XPDL Model Transformation
  • YUAN Feng and LI Ming-Shu
  • 2007,18(9):2141-2152 [Abstract(3838)]  [View PDF(4377)1.02 M]
  • A Method of Time Constraint Workflow Model Analysis and Verification
  • WANG Yuan and FAN Yu-Shun
  • 2007,18(9):2153-2161 [Abstract(4052)]  [View PDF(4871)630.42 K]
  • Error Correction of Continuous Handwriting Recognition by Multimodal Fusion
  • AO Xiang,WANG Xu-Gang,DAI Guo-Zhong and WANG Hong-An
  • 2007,18(9):2162-2173 [Abstract(4354)]  [View PDF(5044)844.96 K]
  • Representation and Extension of Rough Set Theory Based on Formal Concept Analysis
  • QU Kai-She,ZHAI Yan-Hui,LIANG Ji-Ye and LI De-Yu
  • 2007,18(9):2174-2182 [Abstract(4453)]  [View PDF(5886)641.98 K]
  • Interactive Evolutionary Computation with Fitness Noise and Its Convergence Robustness
  • HAO Guo-Sheng,SHI You-Qun,HUANG Yong-Qing,Lü Jun-Huai and GUO Guang-Song
  • 2007,18(9):2183-2193 [Abstract(4106)]  [View PDF(4638)868.38 K]
  • Xmesh: A Mesh-Like Topology for Network on Chip
  • ZHU Xiao-Jing,HU Wei-Wu,MA Ke and ZHANG Long-Bing
  • 2007,18(9):2194-2204 [Abstract(4780)]  [View PDF(5715)651.08 K]
  • High Performance Control-Plane Communication Model for Scalable Routers
  • XU Ke,WU Kun and WANG Qing-Qing
  • 2007,18(9):2205-2215 [Abstract(4020)]  [View PDF(4644)677.04 K]
  • A User Behavior Based Semantic Search Approach under P2P Environment
  • QIU Zhi-Huan,XIAO Ming-Zhong and DAI Ya-Fei
  • 2007,18(9):2216-2225 [Abstract(4578)]  [View PDF(4935)718.79 K]
  • An Overlay Topology Based Proactive Replication in Unstructured P2P Systems
  • FENG Guo-Fu,ZHANG Jin-Cheng,GU Qing,LU Sang-Lu and CHEN Dao-Xu
  • 2007,18(9):2226-2234 [Abstract(3885)]  [View PDF(4879)621.62 K]
  • Movement-Assisted Data Gathering Scheme with Load-Balancing for Sensor Networks
  • SHI Gao-Tao and LIAO Ming-Hong
  • 2007,18(9):2235-2244 [Abstract(4927)]  [View PDF(4466)683.56 K]
  • DDOS Attack Detecting and Defending Model
  • SUN Zhi-Xin,JIANG Ju-Liang and JIAO Lin
  • 2007,18(9):2245-2258 [Abstract(5122)]  [View PDF(6414)841.44 K]
  • Performance Analysis of the Contention Resolution Scheme in IEEE 802.16
  • LU Wen-Yan,JIA Wei-Jia,DU Wen-Feng and ZHANG Li-Zhuo
  • 2007,18(9):2259 [Abstract(5239)]  [View PDF(5093)714.31 K]
  • Techniques of Building a Scalable, Efficient Intrusion Monitoring Architecture
  • YANG Wu,FANG Bin-Xing and YUN Xiao-Chun
  • 2007,18(9):2271-2282 [Abstract(4593)]  [View PDF(4617)691.62 K]
  • Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moment of Original Image
  • ZHANG Li,QIAN Gong-Bin and XIAO Wei-Wei
  • 2007,18(9):2283-2294 [Abstract(4395)]  [View PDF(4586)883.84 K]
  • Multi-Level and Dynamic Security Access Control for CAD Models in Collaborative Environment
  • FANG Cui-Hao,YE Xiu-Zi,PENG Wei and ZHANG Yin
  • 2007,18(9):2295-2305 [Abstract(4396)]  [View PDF(5275)776.54 K]
  • Algebraic B-Spline Curve Reconstruction Based on Signed Distance Field
  • LI Yun-Xi,FENG Jie-Qing and JIN Xiao-Gang
  • 2007,18(9):2306-2317 [Abstract(4391)]  [View PDF(5499)929.10 K]
  • Illumination Normalization with Morphological Quotient Image
  • HE Xiao-Guang,TIAN Jie,WU Li-Fang,ZHANG Yao-Yao and YANG Xin
  • 2007,18(9):2318-2325 [Abstract(5135)]  [View PDF(5046)937.10 K]
  • Bound Estimations on Lower Derivatives of Rational Triangular Bézier Surfaces
  • CAO Juan,CHEN Wen-Yu and WANG Guo-Zhao
  • 2007,18(9):2326-2335 [Abstract(4125)]  [View PDF(4117)558.68 K]
  • Multisolution Shape Editing of Point-Sampled Geometry
  • XIAO Chun-Xia,FENG Jie-Qing,ZHOU Ting-Fang,ZHENG Wen-Ting and Peng Qun-Sheng
  • 2007,18(9):2336-2345 [Abstract(4268)]  [View PDF(4582)953.81 K]
  • Ternary Subdivision Scheme for Quadrilateral Mesh with Fast Convergence
  • LIU Li,ZHANG Cai-Ming,YANG Xing-Qiang and BO Peng-Bo
  • 2007,18(9):2346-2355 [Abstract(4192)]  [View PDF(4592)680.17 K]
  • A Method for Character Animation Generation and Control
  • GAO Quan-Sheng and HONG Bing-Rong
  • 2007,18(9):2356-2364 [Abstract(4134)]  [View PDF(4427)686.21 K]