Volume 19,Issue 1,2008 Table of Contents
Quantum Programming Language NDQJavaXU Jia-Fu,SONG Fang-Min,QIAN Shi-Jun,DAI Jing-An and ZHANG Yun-Jie2008,19(1):1-8 [Abstract(7020)] [View PDF(6698)419.28 K]Processing System of Quantum Programming Language NDQJavaQIAN Shi-Jun,DAI Jing-An,ZHANG Yun-Jie and XU Jia-Fu2008,19(1):9-16 [Abstract(5711)] [View PDF(5268)411.41 K]Applying Variable Minimal Unsatisfiability in Model CheckingCHEN Zhen-Yu,TAO Zhi-Hong,KLEINE BüNING Hans and WANG Li-Fu2008,19(1):39-47 [Abstract(4808)] [View PDF(4869)424.62 K]A Hierarchical Method for Determining the Number of ClustersCHEN Li-Fei,JIANG Qing-Shan and WANG Sheng-Rui2008,19(1):62-72 [Abstract(6934)] [View PDF(9626)633.53 K]An Approach to Learning PRM from Incomplete Relational DataLI Xiao-Lin and ZHOU Zhi-Hua2008,19(1):73-81 [Abstract(5119)] [View PDF(5627)920.43 K]A Category Resolve Power-Based Feature Selection MethodXU Yan,LI Jin-Tao,WANG Bin and SUN Chun-Ming2008,19(1):82-89 [Abstract(6179)] [View PDF(9481)442.59 K]Adaptive Information Brokerage in Wireless Sensor NetworksYU Zhao-Chun,ZHOU Shui-Geng and 1,2XIAO Bin2008,19(1):103-115 [Abstract(5721)] [View PDF(5994)839.94 K]Trust Model Based on Minimal Uncertainty Metric in Wireless Mesh NetworkDING Xu-Yang,FAN Ming-Yu,ZHU Da-Yong and WANG Jia-Hao2008,19(1):116-124 [Abstract(5233)] [View PDF(5413)425.17 K]A Cooperant Congestion Control Protocol in High Bandwidth-Delay Product NetworksWANG Jian-Xin,GONG Hao and CHEN Jian-Er2008,19(1):125-135 [Abstract(5836)] [View PDF(5670)567.53 K]Document Collection Partition Evaluation in Distributed Information RetrievalZHANG Gang and TAN Jian-Long2008,19(1):136-143 [Abstract(4289)] [View PDF(4975)429.30 K]A Pricing Model of Inter-Domain Multicasting Based on Game TheoryZHAO Jin-Jing,ZHU Pei-Dong and LU Xi-Cheng2008,19(1):144-155 [Abstract(5313)] [View PDF(5171)787.05 K]A Cross-Layer Scheduling Algorithm for Real-Time Applications in Wireless NetworksHAO Dan-Dan,ZOU Shi-Hong and CHENG Shi-Duan2008,19(1):156-166 [Abstract(4577)] [View PDF(5586)766.23 K]SE-BGP: An Approach for BGP SecurityHU Xiang-Jiang and ZHU Pei-Dong2008,19(1):167-176 [Abstract(5424)] [View PDF(5356)493.80 K]
Program Verification Techniques Based on the Abstract Interpretation TheoryLI Meng-Jun,LI Zhou-Jun and CHEN Huo-Wang2008,19(1):17-26 [Abstract(10628)] [View PDF(10516)521.14 K]Advances in Predicate AbstractionQU Wan-Xia,LI Tun,GUO Yang and YANG Xiao-Dong2008,19(1):27-38 [Abstract(7751)] [View PDF(8061)583.01 K]Clustering Algorithms ResearchSUN Ji-Gui,LIU Jie1 and ZHAO Lian-Yu2008,19(1):48-61 [Abstract(28082)] [View PDF(61407)671.39 K]QoS Architecture in Beyond 3rd Generation Mobile Communication SystemLIN Chuang,ZENG Rong-Fei,LEI Lei and XIAO Zhen-Sha2008,19(1):90-102 [Abstract(7862)] [View PDF(8213)964.58 K]