Volume 19,Issue 6,2008 Table of Contents

Other Issues:  
  
Contents

  • Immune Algorithm with Selfadaptive Reduction for Large-Scale TSP
  • QI Yu-Tao,LIU Fang and JIAO Li-Cheng
  • 2008,19(6):1265-1273 [Abstract(3567)]  [View PDF(3133)557.92 K]
  • Iterative Space Alternate Tiling Parallel Gauss-Seidel Algorithm
  • HU Chang-Jun,ZHANG Ji-Lin,WANG Jue and LI Jian-Jiang
  • 2008,19(6):1274-1282 [Abstract(4214)]  [View PDF(3404)450.15 K]
  • Finding Natural Cluster Hierarchies Based on MultiFractal
  • YAN Guang-Hui,LI Zhan-Huai and DANG Jian-Wu
  • 2008,19(6):1283-1300 [Abstract(3979)]  [View PDF(3734)1.02 M]
  • A Novel Method for Assessing the Diversity of Approximation Pareto Fronts
  • ZENG San-You,CAI Zhen-Hua,ZHANG Qing and KANG Li-Shan
  • 2008,19(6):1301-1308 [Abstract(2817)]  [View PDF(3028)387.13 K]
  • Preprocessing for Point-Based Algorithms of POMDP
  • BIAN Ai-Hua,WANG Chong-Jun and CHEN Shi-Fu
  • 2008,19(6):1309-1316 [Abstract(3434)]  [View PDF(2929)509.82 K]
  • A Customizable Running Support Framework for Autonomous Components
  • SUN Xi,ZHUANG Lei,LIU Wen,JIAO Wen-Pin and MEI Hong
  • 2008,19(6):1340-1349 [Abstract(3472)]  [View PDF(3554)414.63 K]
  • An Internetware-Software-Architecture-Oriented Trust-Driven Mechanism for Selecting Services
  • WANG Yuan,Lü Jian,XU Feng and ZHANG Lin
  • 2008,19(6):1350-1362 [Abstract(3170)]  [View PDF(3543)520.71 K]
  • A Multi-View Software Process Model Based on Object Petri Nets
  • GE Ji-Dong,GU Qing,HU Hao and Lü Jian
  • 2008,19(6):1363-1378 [Abstract(3030)]  [View PDF(2776)598.72 K]
  • Study on the Assurance Ability of Statistical Test on Software Reliability
  • ZHAO Liang,WANG Jian-Min and SUN Jia-Guang
  • 2008,19(6):1379-1385 [Abstract(3250)]  [View PDF(3413)329.33 K]
  • Cluster Splitting Based High Dimensional Metric Space Index B+-Tree
  • ZHANG Jun-Qi,ZHOU Xiang-Dong,WANG Mei and SHI Bai-Le
  • 2008,19(6):1401-1412 [Abstract(3669)]  [View PDF(4483)571.64 K]
  • An Algorithm for Predictive Queries over Data Stream Based on Energy and Frequent Pattern
  • CHEN An-Long,TANG Chang-Jie,FU Yan and LIAO Yong
  • 2008,19(6):1413-1421 [Abstract(2898)]  [View PDF(2808)391.93 K]
  • A Method of Discovering Relation Information from XML Data
  • WU Yang-Yang,LEI Qing,CHEN Duan-Sheng and YOKOTA Harou
  • 2008,19(6):1422-1427 [Abstract(4347)]  [View PDF(3423)306.08 K]
  • Activity-Centered Personal Information Management
  • DENG Chang-Zhi,AO Xiang,ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(6):1428-1438 [Abstract(3767)]  [View PDF(3060)469.64 K]
  • An Adaptive Mechanism to Solve BGP Divergence Resulted from Policies Conflict
  • WANG Li-Jun,WU Jian-Ping and XU Ke
  • 2008,19(6):1465-1472 [Abstract(3068)]  [View PDF(3004)388.19 K]
  • An Efficient Search Algorithm for Large-Scale P2P Systems
  • ZHANG Yi-Ming,LU Xi-Cheng,ZHENG Qian-Bing and LI Dong-Sheng
  • 2008,19(6):1473-1480 [Abstract(3735)]  [View PDF(3496)363.61 K]
  • Research on Home Agent Fault-Tolerant Approach for Mobile IPv6 Networks
  • ZHANG Yu-Jun,ZHANG Han-Wen,XIAO Wen-Shu and LI Zhong-Cheng
  • 2008,19(6):1491-1498 [Abstract(3606)]  [View PDF(3109)386.78 K]
  • Study on TCP Flow-Competing Congestion and Buffer Requirement of the Congested Links
  • LI Yu-Feng,QIU Han,LAN Ju-Long and WANG Bin-Qiang
  • 2008,19(6):1499-1507 [Abstract(2903)]  [View PDF(3481)388.15 K]
  • Topology Aware Worm Simulation and Analysis
  • WANG Yue-Wu,JING Ji-Wu,XIANG Ji and LIU Qi
  • 2008,19(6):1508-1518 [Abstract(3256)]  [View PDF(4031)593.54 K]
  • Code-Injection Attack Automatic Analyses and Response System Based on Abnormal Scene Diagnose
  • LI Wen,DAI Ying-Xia,LIAN Yi-Feng,FENG Ping-Hui and BAO Xu-Hua
  • 2008,19(6):1519-1532 [Abstract(2909)]  [View PDF(3237)522.77 K]
  • An Active Congestion Control Mechanism for Transmission Control Protocol
  • XU Chang-Biao,XIAN Yong-Ju,TANG Chao-Wei and YANG Shi-Zhong
  • 2008,19(6):1533-1545 [Abstract(3472)]  [View PDF(3553)895.89 K]
  • Multi-Objective Optimization Multicast Routing for Forwarding State Scalability
  • HU Guang-Min and CHANG Rocky
  • 2008,19(6):1546-1554 [Abstract(2960)]  [View PDF(2997)367.09 K]
  • Identity-Based Strong Key-Insulated Signature Without Random Oracles
  • WENG Jian,CHEN Ke-Fei,LIU Sheng-Li and LI Xiang-Xue
  • 2008,19(6):1555-1564 [Abstract(3868)]  [View PDF(3243)335.90 K]
  • Review Articles

  • Progress of Research on Metamodeling
  • LIU Hui,MA Zhi-Yi and SHAO Wei-Zhong
  • 2008,19(6):1317-1327 [Abstract(6840)]  [View PDF(5740)502.00 K]
  • Software Architecture Evaluation
  • ZHANG Li,GAO Hui and WANG Shou-Xin
  • 2008,19(6):1328-1339 [Abstract(6254)]  [View PDF(7752)427.12 K]
  • Skyline Query Processing
  • WEI Xiao-Juan,YANG Jing,LI Cui-Ping and CHEN Hong
  • 2008,19(6):1386-1400 [Abstract(8534)]  [View PDF(7658)518.81 K]
  • Transmission Control Protocols for Wireless Sensor Networks
  • FANG Wei-Wei,QIAN De-Pei and LIU Yi
  • 2008,19(6):1439-1451 [Abstract(9387)]  [View PDF(5765)483.21 K]
  • Scalable Router
  • ZHANG Xiao-Ping,LIU Zhen-Hua,ZHAO You-Jian and GUAN Hong-Tao
  • 2008,19(6):1452-1464 [Abstract(6208)]  [View PDF(5567)538.69 K]
  • Optical Network Control and Management for Grid Applications
  • REN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin
  • 2008,19(6):1481-1490 [Abstract(5941)]  [View PDF(4299)500.10 K]