Volume 19,Issue 6,2008 Table of Contents

Other Issues:  
  
Contents

  • Immune Algorithm with Selfadaptive Reduction for Large-Scale TSP
  • QI Yu-Tao,LIU Fang and JIAO Li-Cheng
  • 2008,19(6):1265-1273 [Abstract(4963)]  [View PDF(5188)557.92 K]
  • Iterative Space Alternate Tiling Parallel Gauss-Seidel Algorithm
  • HU Chang-Jun,ZHANG Ji-Lin,WANG Jue and LI Jian-Jiang
  • 2008,19(6):1274-1282 [Abstract(5564)]  [View PDF(5330)450.15 K]
  • Finding Natural Cluster Hierarchies Based on MultiFractal
  • YAN Guang-Hui,LI Zhan-Huai and DANG Jian-Wu
  • 2008,19(6):1283-1300 [Abstract(5598)]  [View PDF(6606)1.02 M]
  • A Novel Method for Assessing the Diversity of Approximation Pareto Fronts
  • ZENG San-You,CAI Zhen-Hua,ZHANG Qing and KANG Li-Shan
  • 2008,19(6):1301-1308 [Abstract(4108)]  [View PDF(5883)387.13 K]
  • Preprocessing for Point-Based Algorithms of POMDP
  • BIAN Ai-Hua,WANG Chong-Jun and CHEN Shi-Fu
  • 2008,19(6):1309-1316 [Abstract(4686)]  [View PDF(5004)509.82 K]
  • A Customizable Running Support Framework for Autonomous Components
  • SUN Xi,ZHUANG Lei,LIU Wen,JIAO Wen-Pin and MEI Hong
  • 2008,19(6):1340-1349 [Abstract(4840)]  [View PDF(5631)414.63 K]
  • An Internetware-Software-Architecture-Oriented Trust-Driven Mechanism for Selecting Services
  • WANG Yuan,Lü Jian,XU Feng and ZHANG Lin
  • 2008,19(6):1350-1362 [Abstract(4348)]  [View PDF(5461)520.71 K]
  • A Multi-View Software Process Model Based on Object Petri Nets
  • GE Ji-Dong,GU Qing,HU Hao and Lü Jian
  • 2008,19(6):1363-1378 [Abstract(4770)]  [View PDF(4865)598.72 K]
  • Study on the Assurance Ability of Statistical Test on Software Reliability
  • ZHAO Liang,WANG Jian-Min and SUN Jia-Guang
  • 2008,19(6):1379-1385 [Abstract(4590)]  [View PDF(5431)329.33 K]
  • Cluster Splitting Based High Dimensional Metric Space Index B+-Tree
  • ZHANG Jun-Qi,ZHOU Xiang-Dong,WANG Mei and SHI Bai-Le
  • 2008,19(6):1401-1412 [Abstract(4847)]  [View PDF(6588)571.64 K]
  • An Algorithm for Predictive Queries over Data Stream Based on Energy and Frequent Pattern
  • CHEN An-Long,TANG Chang-Jie,FU Yan and LIAO Yong
  • 2008,19(6):1413-1421 [Abstract(4131)]  [View PDF(4612)391.93 K]
  • A Method of Discovering Relation Information from XML Data
  • WU Yang-Yang,LEI Qing,CHEN Duan-Sheng and YOKOTA Harou
  • 2008,19(6):1422-1427 [Abstract(5881)]  [View PDF(5460)306.08 K]
  • Activity-Centered Personal Information Management
  • DENG Chang-Zhi,AO Xiang,ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(6):1428-1438 [Abstract(5019)]  [View PDF(5222)469.64 K]
  • An Adaptive Mechanism to Solve BGP Divergence Resulted from Policies Conflict
  • WANG Li-Jun,WU Jian-Ping and XU Ke
  • 2008,19(6):1465-1472 [Abstract(4382)]  [View PDF(4908)388.19 K]
  • An Efficient Search Algorithm for Large-Scale P2P Systems
  • ZHANG Yi-Ming,LU Xi-Cheng,ZHENG Qian-Bing and LI Dong-Sheng
  • 2008,19(6):1473-1480 [Abstract(5291)]  [View PDF(5442)363.61 K]
  • Research on Home Agent Fault-Tolerant Approach for Mobile IPv6 Networks
  • ZHANG Yu-Jun,ZHANG Han-Wen,XIAO Wen-Shu and LI Zhong-Cheng
  • 2008,19(6):1491-1498 [Abstract(4817)]  [View PDF(4973)386.78 K]
  • Study on TCP Flow-Competing Congestion and Buffer Requirement of the Congested Links
  • LI Yu-Feng,QIU Han,LAN Ju-Long and WANG Bin-Qiang
  • 2008,19(6):1499-1507 [Abstract(4078)]  [View PDF(5511)388.15 K]
  • Topology Aware Worm Simulation and Analysis
  • WANG Yue-Wu,JING Ji-Wu,XIANG Ji and LIU Qi
  • 2008,19(6):1508-1518 [Abstract(4466)]  [View PDF(5969)593.54 K]
  • Code-Injection Attack Automatic Analyses and Response System Based on Abnormal Scene Diagnose
  • LI Wen,DAI Ying-Xia,LIAN Yi-Feng,FENG Ping-Hui and BAO Xu-Hua
  • 2008,19(6):1519-1532 [Abstract(4144)]  [View PDF(5179)522.77 K]
  • An Active Congestion Control Mechanism for Transmission Control Protocol
  • XU Chang-Biao,XIAN Yong-Ju,TANG Chao-Wei and YANG Shi-Zhong
  • 2008,19(6):1533-1545 [Abstract(4873)]  [View PDF(5877)895.89 K]
  • Multi-Objective Optimization Multicast Routing for Forwarding State Scalability
  • HU Guang-Min and CHANG Rocky
  • 2008,19(6):1546-1554 [Abstract(4065)]  [View PDF(4742)367.09 K]
  • Identity-Based Strong Key-Insulated Signature Without Random Oracles
  • WENG Jian,CHEN Ke-Fei,LIU Sheng-Li and LI Xiang-Xue
  • 2008,19(6):1555-1564 [Abstract(5253)]  [View PDF(5083)335.90 K]
  • Review Articles

  • Progress of Research on Metamodeling
  • LIU Hui,MA Zhi-Yi and SHAO Wei-Zhong
  • 2008,19(6):1317-1327 [Abstract(9240)]  [View PDF(8614)502.00 K]
  • Software Architecture Evaluation
  • ZHANG Li,GAO Hui and WANG Shou-Xin
  • 2008,19(6):1328-1339 [Abstract(8548)]  [View PDF(11908)427.12 K]
  • Skyline Query Processing
  • WEI Xiao-Juan,YANG Jing,LI Cui-Ping and CHEN Hong
  • 2008,19(6):1386-1400 [Abstract(11449)]  [View PDF(12295)518.81 K]
  • Transmission Control Protocols for Wireless Sensor Networks
  • FANG Wei-Wei,QIAN De-Pei and LIU Yi
  • 2008,19(6):1439-1451 [Abstract(11428)]  [View PDF(9197)483.21 K]
  • Scalable Router
  • ZHANG Xiao-Ping,LIU Zhen-Hua,ZHAO You-Jian and GUAN Hong-Tao
  • 2008,19(6):1452-1464 [Abstract(8362)]  [View PDF(8949)538.69 K]
  • Optical Network Control and Management for Grid Applications
  • REN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin
  • 2008,19(6):1481-1490 [Abstract(8317)]  [View PDF(7354)500.10 K]