Volume 19,Issue 6,2008 Table of Contents

Other Issues:  
  
Contents

  • Immune Algorithm with Selfadaptive Reduction for Large-Scale TSP
  • QI Yu-Tao,LIU Fang and JIAO Li-Cheng
  • 2008,19(6):1265-1273 [Abstract(3517)]  [View PDF(3102)557.92 K]
  • Iterative Space Alternate Tiling Parallel Gauss-Seidel Algorithm
  • HU Chang-Jun,ZHANG Ji-Lin,WANG Jue and LI Jian-Jiang
  • 2008,19(6):1274-1282 [Abstract(4147)]  [View PDF(3381)450.15 K]
  • Finding Natural Cluster Hierarchies Based on MultiFractal
  • YAN Guang-Hui,LI Zhan-Huai and DANG Jian-Wu
  • 2008,19(6):1283-1300 [Abstract(3912)]  [View PDF(3703)1.02 M]
  • A Novel Method for Assessing the Diversity of Approximation Pareto Fronts
  • ZENG San-You,CAI Zhen-Hua,ZHANG Qing and KANG Li-Shan
  • 2008,19(6):1301-1308 [Abstract(2782)]  [View PDF(3002)387.13 K]
  • Preprocessing for Point-Based Algorithms of POMDP
  • BIAN Ai-Hua,WANG Chong-Jun and CHEN Shi-Fu
  • 2008,19(6):1309-1316 [Abstract(3364)]  [View PDF(2904)509.82 K]
  • A Customizable Running Support Framework for Autonomous Components
  • SUN Xi,ZHUANG Lei,LIU Wen,JIAO Wen-Pin and MEI Hong
  • 2008,19(6):1340-1349 [Abstract(3420)]  [View PDF(3515)414.63 K]
  • An Internetware-Software-Architecture-Oriented Trust-Driven Mechanism for Selecting Services
  • WANG Yuan,Lü Jian,XU Feng and ZHANG Lin
  • 2008,19(6):1350-1362 [Abstract(3120)]  [View PDF(3508)520.71 K]
  • A Multi-View Software Process Model Based on Object Petri Nets
  • GE Ji-Dong,GU Qing,HU Hao and Lü Jian
  • 2008,19(6):1363-1378 [Abstract(2978)]  [View PDF(2752)598.72 K]
  • Study on the Assurance Ability of Statistical Test on Software Reliability
  • ZHAO Liang,WANG Jian-Min and SUN Jia-Guang
  • 2008,19(6):1379-1385 [Abstract(3202)]  [View PDF(3380)329.33 K]
  • Cluster Splitting Based High Dimensional Metric Space Index B+-Tree
  • ZHANG Jun-Qi,ZHOU Xiang-Dong,WANG Mei and SHI Bai-Le
  • 2008,19(6):1401-1412 [Abstract(3614)]  [View PDF(4451)571.64 K]
  • An Algorithm for Predictive Queries over Data Stream Based on Energy and Frequent Pattern
  • CHEN An-Long,TANG Chang-Jie,FU Yan and LIAO Yong
  • 2008,19(6):1413-1421 [Abstract(2863)]  [View PDF(2787)391.93 K]
  • A Method of Discovering Relation Information from XML Data
  • WU Yang-Yang,LEI Qing,CHEN Duan-Sheng and YOKOTA Harou
  • 2008,19(6):1422-1427 [Abstract(4283)]  [View PDF(3402)306.08 K]
  • Activity-Centered Personal Information Management
  • DENG Chang-Zhi,AO Xiang,ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(6):1428-1438 [Abstract(3712)]  [View PDF(3026)469.64 K]
  • An Adaptive Mechanism to Solve BGP Divergence Resulted from Policies Conflict
  • WANG Li-Jun,WU Jian-Ping and XU Ke
  • 2008,19(6):1465-1472 [Abstract(3021)]  [View PDF(2975)388.19 K]
  • An Efficient Search Algorithm for Large-Scale P2P Systems
  • ZHANG Yi-Ming,LU Xi-Cheng,ZHENG Qian-Bing and LI Dong-Sheng
  • 2008,19(6):1473-1480 [Abstract(3677)]  [View PDF(3459)363.61 K]
  • Research on Home Agent Fault-Tolerant Approach for Mobile IPv6 Networks
  • ZHANG Yu-Jun,ZHANG Han-Wen,XIAO Wen-Shu and LI Zhong-Cheng
  • 2008,19(6):1491-1498 [Abstract(3550)]  [View PDF(3079)386.78 K]
  • Study on TCP Flow-Competing Congestion and Buffer Requirement of the Congested Links
  • LI Yu-Feng,QIU Han,LAN Ju-Long and WANG Bin-Qiang
  • 2008,19(6):1499-1507 [Abstract(2837)]  [View PDF(3423)388.15 K]
  • Topology Aware Worm Simulation and Analysis
  • WANG Yue-Wu,JING Ji-Wu,XIANG Ji and LIU Qi
  • 2008,19(6):1508-1518 [Abstract(3207)]  [View PDF(3955)593.54 K]
  • Code-Injection Attack Automatic Analyses and Response System Based on Abnormal Scene Diagnose
  • LI Wen,DAI Ying-Xia,LIAN Yi-Feng,FENG Ping-Hui and BAO Xu-Hua
  • 2008,19(6):1519-1532 [Abstract(2856)]  [View PDF(3171)522.77 K]
  • An Active Congestion Control Mechanism for Transmission Control Protocol
  • XU Chang-Biao,XIAN Yong-Ju,TANG Chao-Wei and YANG Shi-Zhong
  • 2008,19(6):1533-1545 [Abstract(3430)]  [View PDF(3497)895.89 K]
  • Multi-Objective Optimization Multicast Routing for Forwarding State Scalability
  • HU Guang-Min and CHANG Rocky
  • 2008,19(6):1546-1554 [Abstract(2900)]  [View PDF(2960)367.09 K]
  • Identity-Based Strong Key-Insulated Signature Without Random Oracles
  • WENG Jian,CHEN Ke-Fei,LIU Sheng-Li and LI Xiang-Xue
  • 2008,19(6):1555-1564 [Abstract(3795)]  [View PDF(3194)335.90 K]
  • Review Articles

  • Progress of Research on Metamodeling
  • LIU Hui,MA Zhi-Yi and SHAO Wei-Zhong
  • 2008,19(6):1317-1327 [Abstract(6718)]  [View PDF(5708)502.00 K]
  • Software Architecture Evaluation
  • ZHANG Li,GAO Hui and WANG Shou-Xin
  • 2008,19(6):1328-1339 [Abstract(6161)]  [View PDF(7704)427.12 K]
  • Skyline Query Processing
  • WEI Xiao-Juan,YANG Jing,LI Cui-Ping and CHEN Hong
  • 2008,19(6):1386-1400 [Abstract(8337)]  [View PDF(7599)518.81 K]
  • Transmission Control Protocols for Wireless Sensor Networks
  • FANG Wei-Wei,QIAN De-Pei and LIU Yi
  • 2008,19(6):1439-1451 [Abstract(9285)]  [View PDF(5733)483.21 K]
  • Scalable Router
  • ZHANG Xiao-Ping,LIU Zhen-Hua,ZHAO You-Jian and GUAN Hong-Tao
  • 2008,19(6):1452-1464 [Abstract(6130)]  [View PDF(5528)538.69 K]
  • Optical Network Control and Management for Grid Applications
  • REN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin
  • 2008,19(6):1481-1490 [Abstract(5845)]  [View PDF(4261)500.10 K]