Volume 19,Issue 10,2008 Table of Contents

Other Issues:  
  
Contents

  • LCS and MSC Reasoning of Hybrid Terminological Cycles in Description Logic εL
  • JIANG Yun-Cheng,WANG Ju,ZHOU Sheng-Ming and TANG Yong
  • 2008,19(10):2483-2497 [Abstract(3148)]  [View PDF(2949)746.78 K]
  • Extended Fuzzy Description Logics with Comparisons Between Fuzzy Membership Degrees
  • KANG Da-Zhou,XU Bao-Wen,LU Jian-Jiang and LI Yan-Hui
  • 2008,19(10):2498-2507 [Abstract(2873)]  [View PDF(2806)674.26 K]
  • Two Values Passing CPS Transformation for Call-by-Name Calculus with Constants
  • YU Gang and LIU Xin-Xin
  • 2008,19(10):2508-2516 [Abstract(3322)]  [View PDF(2896)551.95 K]
  • Dynamics Analysis Method of Cellular Automata for Complex Networking Storage System
  • CHEN Jin-Cai,HE Ping and GE Xiong-Zi
  • 2008,19(10):2517-2526 [Abstract(3325)]  [View PDF(2523)2.81 M]
  • An Approach to Solve Deadlock Problem of Component Connection
  • MAO Fei-Qiao,QI De-Yu and LIN Wei-Wei
  • 2008,19(10):2527-2538 [Abstract(3052)]  [View PDF(3400)750.41 K]
  • Design Calculus Based Approach to Modeling Use Case
  • CHEN Xin and LI Xuan-Dong
  • 2008,19(10):2539-2549 [Abstract(2648)]  [View PDF(2946)647.03 K]
  • Value Equality Analysis in C Program API Conformance Validation
  • MENG Ce,HE Ye-Ping and LUO Yu-Xiang
  • 2008,19(10):2550-2561 [Abstract(3036)]  [View PDF(3292)644.93 K]
  • FJ Extended Calculus for Multi-Version Class Dynamic Update
  • ZHANG Shi and HUANG Lin-Peng
  • 2008,19(10):2562-2572 [Abstract(3055)]  [View PDF(2909)566.02 K]
  • Main Memory Database TPC-H Workload Characterization on Modern Processor
  • LIU Da-Wei,LUAN Hua,WANG Shan and QIN Biao
  • 2008,19(10):2573-2584 [Abstract(3767)]  [View PDF(4150)933.63 K]
  • Mining the Frequent Patterns in an Arbitrary Sliding Window over Online Data Streams
  • LI Guo-Hui and CHEN Hui
  • 2008,19(10):2585-2596 [Abstract(3354)]  [View PDF(3576)627.59 K]
  • Credible Association Rule and Its Mining Algorithm Based on Maximum Clique
  • XIAO Bo,XU Qian-Fang,LIN Zhi-Qing,GUO Jun and LI Chun-Guang
  • 2008,19(10):2597-2610 [Abstract(3528)]  [View PDF(3587)812.22 K]
  • Structural Query Expansion Based on Weighted Query Term for XML Documents
  • WAN Chang-Xuan and LU Yuan
  • 2008,19(10):2611-2619 [Abstract(3367)]  [View PDF(3390)531.52 K]
  • Service Selection Approach Considering the Trustworthiness of QoS Data
  • LI Yan,ZHOU Ming-Hui,LI Rui-Chao,CAO Dong-Gang and MEI Hong
  • 2008,19(10):2620-2627 [Abstract(4102)]  [View PDF(3817)604.18 K]
  • ServLoc: Secure Location Service for Wireless Sensor and Actuator Network
  • MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2008,19(10):2628-2637 [Abstract(3484)]  [View PDF(3182)603.00 K]
  • A Method for Multipath Routing Based on Network Coding in Wireless Sensor Network
  • LI Shan-Shan,LIAO Xiang-Ke,ZHU Pei-Dong and XIAO Nong
  • 2008,19(10):2638-2647 [Abstract(4087)]  [View PDF(5599)1001.49 K]
  • Multicast Fast Handover Algorithm Based on Neighbor Information Exchange
  • ZHANG Hui and ZHANG Hong-Ke
  • 2008,19(10):2648-2658 [Abstract(3167)]  [View PDF(2663)494.90 K]
  • Rectangle and Boomerang Attacks on DES
  • ZHANG Lei and WU Wen-Ling
  • 2008,19(10):2659-2666 [Abstract(3052)]  [View PDF(3307)521.93 K]
  • An Integrated Indexing Structure for Large-Scale Cross-Media Retrieval
  • ZHUANG Yi,ZHUANG Yue-Ting and WU Fei
  • 2008,19(10):2667-2680 [Abstract(3020)]  [View PDF(3026)905.37 K]
  • A Conceptual Framework for Developing Adaptive Pen-Based User Interface
  • XU Li-Shuang,ZHOU Ming-Jun,DENG Chang-Zhi,TIAN Feng,LIU Yuan-Yuan and DAI Guo-Zhong
  • 2008,19(10):2681-2693 [Abstract(3639)]  [View PDF(3175)683.02 K]
  • 2007年中国计算机大会推荐优秀论文介绍
  • 郑纬民
  • 2008,19(10):2694-2695 [Abstract(2997)]  [View PDF(3210)289.71 K]
  • U-Tree Based Indexing Method for Uncertain Moving Objects
  • DING Xiao-Feng,LU Yan-Sheng,PAN Peng,HONG Liang and WEI Qiong
  • 2008,19(10):2696-2705 [Abstract(3489)]  [View PDF(3830)763.32 K]
  • A Method for Code Safety Proof Construction
  • GUO Yu,CHEN Yi-Yun and LIN Chun-Xiao
  • 2008,19(10):2720-2727 [Abstract(3509)]  [View PDF(2901)562.82 K]
  • A High Performance XML Parser OnceXMLParser
  • JIN Bei-Hong,CAO Dong-Lei,REN Xin,YU Shuang and DAI Bei-Jie
  • 2008,19(10):2728-2738 [Abstract(3493)]  [View PDF(4039)624.07 K]
  • An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme
  • PANG Liao-Jun,PEI Qing-Qi,JIAO Li-Cheng and WANG Yu-Min
  • 2008,19(10):2739-2745 [Abstract(2986)]  [View PDF(3019)468.23 K]
  • An Intrusion Response Method Based on Attack Graph
  • SHI Jin,GUO Shan-Qing,LU Yin and XIE Li
  • 2008,19(10):2746-2753 [Abstract(3421)]  [View PDF(3176)536.24 K]
  • Negotiation-Based Dynamic Role Transition in Data Access across Multi-VOs
  • FU Chang-Sheng,XIAO Nong,ZHAO Ying-Jie and CHEN Tao
  • 2008,19(10):2754-2761 [Abstract(3135)]  [View PDF(2806)529.59 K]
  • Performance Analysis Based on Packet Arrival Rate for the IEEE 802.11 DCF
  • YANG Wei-Dong,MA Jian-Feng and LI Ya-Hui
  • 2008,19(10):2762-2769 [Abstract(3332)]  [View PDF(3390)727.91 K]
  • Cross-Entropy Method Based on Markov Decision Process for Optimal Software Testing
  • ZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen
  • 2008,19(10):2770-2779 [Abstract(3909)]  [View PDF(3735)610.09 K]
  • Research on Development Tools for Collaborative Pen-Based User Interfaces
  • ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(10):2780-2788 [Abstract(3359)]  [View PDF(3111)956.66 K]
  • Review Articles

  • P2P Web Search Technology
  • FANG Qi-Ming,YANG Guang-Wen,WU Yong-Wei and ZHENG Wei-Min
  • 2008,19(10):2706-2719 [Abstract(9957)]  [View PDF(7833)778.29 K]