Volume 19,Issue 6,2008 Table of Contents

Other Issues:  
  
Contents

  • Immune Algorithm with Selfadaptive Reduction for Large-Scale TSP
  • QI Yu-Tao,LIU Fang and JIAO Li-Cheng
  • 2008,19(6):1265-1273 [Abstract(3667)]  [View PDF(3326)557.92 K]
  • Iterative Space Alternate Tiling Parallel Gauss-Seidel Algorithm
  • HU Chang-Jun,ZHANG Ji-Lin,WANG Jue and LI Jian-Jiang
  • 2008,19(6):1274-1282 [Abstract(4325)]  [View PDF(3478)450.15 K]
  • Finding Natural Cluster Hierarchies Based on MultiFractal
  • YAN Guang-Hui,LI Zhan-Huai and DANG Jian-Wu
  • 2008,19(6):1283-1300 [Abstract(4122)]  [View PDF(3881)1.02 M]
  • A Novel Method for Assessing the Diversity of Approximation Pareto Fronts
  • ZENG San-You,CAI Zhen-Hua,ZHANG Qing and KANG Li-Shan
  • 2008,19(6):1301-1308 [Abstract(2897)]  [View PDF(3203)387.13 K]
  • Preprocessing for Point-Based Algorithms of POMDP
  • BIAN Ai-Hua,WANG Chong-Jun and CHEN Shi-Fu
  • 2008,19(6):1309-1316 [Abstract(3567)]  [View PDF(3087)509.82 K]
  • A Customizable Running Support Framework for Autonomous Components
  • SUN Xi,ZHUANG Lei,LIU Wen,JIAO Wen-Pin and MEI Hong
  • 2008,19(6):1340-1349 [Abstract(3591)]  [View PDF(3707)414.63 K]
  • An Internetware-Software-Architecture-Oriented Trust-Driven Mechanism for Selecting Services
  • WANG Yuan,Lü Jian,XU Feng and ZHANG Lin
  • 2008,19(6):1350-1362 [Abstract(3270)]  [View PDF(3710)520.71 K]
  • A Multi-View Software Process Model Based on Object Petri Nets
  • GE Ji-Dong,GU Qing,HU Hao and Lü Jian
  • 2008,19(6):1363-1378 [Abstract(3153)]  [View PDF(2965)598.72 K]
  • Study on the Assurance Ability of Statistical Test on Software Reliability
  • ZHAO Liang,WANG Jian-Min and SUN Jia-Guang
  • 2008,19(6):1379-1385 [Abstract(3338)]  [View PDF(3573)329.33 K]
  • Cluster Splitting Based High Dimensional Metric Space Index B+-Tree
  • ZHANG Jun-Qi,ZHOU Xiang-Dong,WANG Mei and SHI Bai-Le
  • 2008,19(6):1401-1412 [Abstract(3785)]  [View PDF(4644)571.64 K]
  • An Algorithm for Predictive Queries over Data Stream Based on Energy and Frequent Pattern
  • CHEN An-Long,TANG Chang-Jie,FU Yan and LIAO Yong
  • 2008,19(6):1413-1421 [Abstract(3004)]  [View PDF(2997)391.93 K]
  • A Method of Discovering Relation Information from XML Data
  • WU Yang-Yang,LEI Qing,CHEN Duan-Sheng and YOKOTA Harou
  • 2008,19(6):1422-1427 [Abstract(4495)]  [View PDF(3621)306.08 K]
  • Activity-Centered Personal Information Management
  • DENG Chang-Zhi,AO Xiang,ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(6):1428-1438 [Abstract(3882)]  [View PDF(3276)469.64 K]
  • An Adaptive Mechanism to Solve BGP Divergence Resulted from Policies Conflict
  • WANG Li-Jun,WU Jian-Ping and XU Ke
  • 2008,19(6):1465-1472 [Abstract(3173)]  [View PDF(3086)388.19 K]
  • An Efficient Search Algorithm for Large-Scale P2P Systems
  • ZHANG Yi-Ming,LU Xi-Cheng,ZHENG Qian-Bing and LI Dong-Sheng
  • 2008,19(6):1473-1480 [Abstract(3840)]  [View PDF(3574)363.61 K]
  • Research on Home Agent Fault-Tolerant Approach for Mobile IPv6 Networks
  • ZHANG Yu-Jun,ZHANG Han-Wen,XIAO Wen-Shu and LI Zhong-Cheng
  • 2008,19(6):1491-1498 [Abstract(3712)]  [View PDF(3270)386.78 K]
  • Study on TCP Flow-Competing Congestion and Buffer Requirement of the Congested Links
  • LI Yu-Feng,QIU Han,LAN Ju-Long and WANG Bin-Qiang
  • 2008,19(6):1499-1507 [Abstract(3021)]  [View PDF(3652)388.15 K]
  • Topology Aware Worm Simulation and Analysis
  • WANG Yue-Wu,JING Ji-Wu,XIANG Ji and LIU Qi
  • 2008,19(6):1508-1518 [Abstract(3343)]  [View PDF(4182)593.54 K]
  • Code-Injection Attack Automatic Analyses and Response System Based on Abnormal Scene Diagnose
  • LI Wen,DAI Ying-Xia,LIAN Yi-Feng,FENG Ping-Hui and BAO Xu-Hua
  • 2008,19(6):1519-1532 [Abstract(3012)]  [View PDF(3423)522.77 K]
  • An Active Congestion Control Mechanism for Transmission Control Protocol
  • XU Chang-Biao,XIAN Yong-Ju,TANG Chao-Wei and YANG Shi-Zhong
  • 2008,19(6):1533-1545 [Abstract(3557)]  [View PDF(3623)895.89 K]
  • Multi-Objective Optimization Multicast Routing for Forwarding State Scalability
  • HU Guang-Min and CHANG Rocky
  • 2008,19(6):1546-1554 [Abstract(3033)]  [View PDF(3124)367.09 K]
  • Identity-Based Strong Key-Insulated Signature Without Random Oracles
  • WENG Jian,CHEN Ke-Fei,LIU Sheng-Li and LI Xiang-Xue
  • 2008,19(6):1555-1564 [Abstract(3997)]  [View PDF(3385)335.90 K]
  • Review Articles

  • Progress of Research on Metamodeling
  • LIU Hui,MA Zhi-Yi and SHAO Wei-Zhong
  • 2008,19(6):1317-1327 [Abstract(7128)]  [View PDF(5952)502.00 K]
  • Software Architecture Evaluation
  • ZHANG Li,GAO Hui and WANG Shou-Xin
  • 2008,19(6):1328-1339 [Abstract(6470)]  [View PDF(8014)427.12 K]
  • Skyline Query Processing
  • WEI Xiao-Juan,YANG Jing,LI Cui-Ping and CHEN Hong
  • 2008,19(6):1386-1400 [Abstract(8924)]  [View PDF(7978)518.81 K]
  • Transmission Control Protocols for Wireless Sensor Networks
  • FANG Wei-Wei,QIAN De-Pei and LIU Yi
  • 2008,19(6):1439-1451 [Abstract(9578)]  [View PDF(5988)483.21 K]
  • Scalable Router
  • ZHANG Xiao-Ping,LIU Zhen-Hua,ZHAO You-Jian and GUAN Hong-Tao
  • 2008,19(6):1452-1464 [Abstract(6390)]  [View PDF(5765)538.69 K]
  • Optical Network Control and Management for Grid Applications
  • REN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin
  • 2008,19(6):1481-1490 [Abstract(6174)]  [View PDF(4516)500.10 K]