Volume 19,Issue 10,2008 Table of Contents

Other Issues:  
  
Contents

  • LCS and MSC Reasoning of Hybrid Terminological Cycles in Description Logic εL
  • JIANG Yun-Cheng,WANG Ju,ZHOU Sheng-Ming and TANG Yong
  • 2008,19(10):2483-2497 [Abstract(3102)]  [View PDF(2918)746.78 K]
  • Extended Fuzzy Description Logics with Comparisons Between Fuzzy Membership Degrees
  • KANG Da-Zhou,XU Bao-Wen,LU Jian-Jiang and LI Yan-Hui
  • 2008,19(10):2498-2507 [Abstract(2817)]  [View PDF(2775)674.26 K]
  • Two Values Passing CPS Transformation for Call-by-Name Calculus with Constants
  • YU Gang and LIU Xin-Xin
  • 2008,19(10):2508-2516 [Abstract(3256)]  [View PDF(2870)551.95 K]
  • Dynamics Analysis Method of Cellular Automata for Complex Networking Storage System
  • CHEN Jin-Cai,HE Ping and GE Xiong-Zi
  • 2008,19(10):2517-2526 [Abstract(3268)]  [View PDF(2502)2.81 M]
  • An Approach to Solve Deadlock Problem of Component Connection
  • MAO Fei-Qiao,QI De-Yu and LIN Wei-Wei
  • 2008,19(10):2527-2538 [Abstract(3001)]  [View PDF(3367)750.41 K]
  • Design Calculus Based Approach to Modeling Use Case
  • CHEN Xin and LI Xuan-Dong
  • 2008,19(10):2539-2549 [Abstract(2595)]  [View PDF(2907)647.03 K]
  • Value Equality Analysis in C Program API Conformance Validation
  • MENG Ce,HE Ye-Ping and LUO Yu-Xiang
  • 2008,19(10):2550-2561 [Abstract(2997)]  [View PDF(3264)644.93 K]
  • FJ Extended Calculus for Multi-Version Class Dynamic Update
  • ZHANG Shi and HUANG Lin-Peng
  • 2008,19(10):2562-2572 [Abstract(3001)]  [View PDF(2871)566.02 K]
  • Main Memory Database TPC-H Workload Characterization on Modern Processor
  • LIU Da-Wei,LUAN Hua,WANG Shan and QIN Biao
  • 2008,19(10):2573-2584 [Abstract(3712)]  [View PDF(4117)933.63 K]
  • Mining the Frequent Patterns in an Arbitrary Sliding Window over Online Data Streams
  • LI Guo-Hui and CHEN Hui
  • 2008,19(10):2585-2596 [Abstract(3294)]  [View PDF(3545)627.59 K]
  • Credible Association Rule and Its Mining Algorithm Based on Maximum Clique
  • XIAO Bo,XU Qian-Fang,LIN Zhi-Qing,GUO Jun and LI Chun-Guang
  • 2008,19(10):2597-2610 [Abstract(3470)]  [View PDF(3565)812.22 K]
  • Structural Query Expansion Based on Weighted Query Term for XML Documents
  • WAN Chang-Xuan and LU Yuan
  • 2008,19(10):2611-2619 [Abstract(3304)]  [View PDF(3357)531.52 K]
  • Service Selection Approach Considering the Trustworthiness of QoS Data
  • LI Yan,ZHOU Ming-Hui,LI Rui-Chao,CAO Dong-Gang and MEI Hong
  • 2008,19(10):2620-2627 [Abstract(4028)]  [View PDF(3784)604.18 K]
  • ServLoc: Secure Location Service for Wireless Sensor and Actuator Network
  • MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2008,19(10):2628-2637 [Abstract(3411)]  [View PDF(3132)603.00 K]
  • A Method for Multipath Routing Based on Network Coding in Wireless Sensor Network
  • LI Shan-Shan,LIAO Xiang-Ke,ZHU Pei-Dong and XIAO Nong
  • 2008,19(10):2638-2647 [Abstract(4035)]  [View PDF(5562)1001.49 K]
  • Multicast Fast Handover Algorithm Based on Neighbor Information Exchange
  • ZHANG Hui and ZHANG Hong-Ke
  • 2008,19(10):2648-2658 [Abstract(3112)]  [View PDF(2637)494.90 K]
  • Rectangle and Boomerang Attacks on DES
  • ZHANG Lei and WU Wen-Ling
  • 2008,19(10):2659-2666 [Abstract(2960)]  [View PDF(3275)521.93 K]
  • An Integrated Indexing Structure for Large-Scale Cross-Media Retrieval
  • ZHUANG Yi,ZHUANG Yue-Ting and WU Fei
  • 2008,19(10):2667-2680 [Abstract(2971)]  [View PDF(2993)905.37 K]
  • A Conceptual Framework for Developing Adaptive Pen-Based User Interface
  • XU Li-Shuang,ZHOU Ming-Jun,DENG Chang-Zhi,TIAN Feng,LIU Yuan-Yuan and DAI Guo-Zhong
  • 2008,19(10):2681-2693 [Abstract(3539)]  [View PDF(3143)683.02 K]
  • 2007年中国计算机大会推荐优秀论文介绍
  • 郑纬民
  • 2008,19(10):2694-2695 [Abstract(2928)]  [View PDF(3174)289.71 K]
  • U-Tree Based Indexing Method for Uncertain Moving Objects
  • DING Xiao-Feng,LU Yan-Sheng,PAN Peng,HONG Liang and WEI Qiong
  • 2008,19(10):2696-2705 [Abstract(3429)]  [View PDF(3794)763.32 K]
  • A Method for Code Safety Proof Construction
  • GUO Yu,CHEN Yi-Yun and LIN Chun-Xiao
  • 2008,19(10):2720-2727 [Abstract(3431)]  [View PDF(2860)562.82 K]
  • A High Performance XML Parser OnceXMLParser
  • JIN Bei-Hong,CAO Dong-Lei,REN Xin,YU Shuang and DAI Bei-Jie
  • 2008,19(10):2728-2738 [Abstract(3430)]  [View PDF(4002)624.07 K]
  • An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme
  • PANG Liao-Jun,PEI Qing-Qi,JIAO Li-Cheng and WANG Yu-Min
  • 2008,19(10):2739-2745 [Abstract(2938)]  [View PDF(2982)468.23 K]
  • An Intrusion Response Method Based on Attack Graph
  • SHI Jin,GUO Shan-Qing,LU Yin and XIE Li
  • 2008,19(10):2746-2753 [Abstract(3369)]  [View PDF(3139)536.24 K]
  • Negotiation-Based Dynamic Role Transition in Data Access across Multi-VOs
  • FU Chang-Sheng,XIAO Nong,ZHAO Ying-Jie and CHEN Tao
  • 2008,19(10):2754-2761 [Abstract(3085)]  [View PDF(2748)529.59 K]
  • Performance Analysis Based on Packet Arrival Rate for the IEEE 802.11 DCF
  • YANG Wei-Dong,MA Jian-Feng and LI Ya-Hui
  • 2008,19(10):2762-2769 [Abstract(3278)]  [View PDF(3361)727.91 K]
  • Cross-Entropy Method Based on Markov Decision Process for Optimal Software Testing
  • ZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen
  • 2008,19(10):2770-2779 [Abstract(3849)]  [View PDF(3695)610.09 K]
  • Research on Development Tools for Collaborative Pen-Based User Interfaces
  • ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(10):2780-2788 [Abstract(3303)]  [View PDF(3085)956.66 K]
  • Review Articles

  • P2P Web Search Technology
  • FANG Qi-Ming,YANG Guang-Wen,WU Yong-Wei and ZHENG Wei-Min
  • 2008,19(10):2706-2719 [Abstract(9839)]  [View PDF(7799)778.29 K]