Volume 19,Issue 6,2008 Table of Contents

Other Issues:  
  
Contents

  • Immune Algorithm with Selfadaptive Reduction for Large-Scale TSP
  • QI Yu-Tao,LIU Fang and JIAO Li-Cheng
  • 2008,19(6):1265-1273 [Abstract(4000)]  [View PDF(3581)557.92 K]
  • Iterative Space Alternate Tiling Parallel Gauss-Seidel Algorithm
  • HU Chang-Jun,ZHANG Ji-Lin,WANG Jue and LI Jian-Jiang
  • 2008,19(6):1274-1282 [Abstract(4625)]  [View PDF(3751)450.15 K]
  • Finding Natural Cluster Hierarchies Based on MultiFractal
  • YAN Guang-Hui,LI Zhan-Huai and DANG Jian-Wu
  • 2008,19(6):1283-1300 [Abstract(4563)]  [View PDF(4255)1.02 M]
  • A Novel Method for Assessing the Diversity of Approximation Pareto Fronts
  • ZENG San-You,CAI Zhen-Hua,ZHANG Qing and KANG Li-Shan
  • 2008,19(6):1301-1308 [Abstract(3172)]  [View PDF(3474)387.13 K]
  • Preprocessing for Point-Based Algorithms of POMDP
  • BIAN Ai-Hua,WANG Chong-Jun and CHEN Shi-Fu
  • 2008,19(6):1309-1316 [Abstract(3878)]  [View PDF(3345)509.82 K]
  • A Customizable Running Support Framework for Autonomous Components
  • SUN Xi,ZHUANG Lei,LIU Wen,JIAO Wen-Pin and MEI Hong
  • 2008,19(6):1340-1349 [Abstract(3963)]  [View PDF(4024)414.63 K]
  • An Internetware-Software-Architecture-Oriented Trust-Driven Mechanism for Selecting Services
  • WANG Yuan,Lü Jian,XU Feng and ZHANG Lin
  • 2008,19(6):1350-1362 [Abstract(3617)]  [View PDF(3957)520.71 K]
  • A Multi-View Software Process Model Based on Object Petri Nets
  • GE Ji-Dong,GU Qing,HU Hao and Lü Jian
  • 2008,19(6):1363-1378 [Abstract(3547)]  [View PDF(3166)598.72 K]
  • Study on the Assurance Ability of Statistical Test on Software Reliability
  • ZHAO Liang,WANG Jian-Min and SUN Jia-Guang
  • 2008,19(6):1379-1385 [Abstract(3687)]  [View PDF(3867)329.33 K]
  • Cluster Splitting Based High Dimensional Metric Space Index B+-Tree
  • ZHANG Jun-Qi,ZHOU Xiang-Dong,WANG Mei and SHI Bai-Le
  • 2008,19(6):1401-1412 [Abstract(4145)]  [View PDF(4953)571.64 K]
  • An Algorithm for Predictive Queries over Data Stream Based on Energy and Frequent Pattern
  • CHEN An-Long,TANG Chang-Jie,FU Yan and LIAO Yong
  • 2008,19(6):1413-1421 [Abstract(3358)]  [View PDF(3229)391.93 K]
  • A Method of Discovering Relation Information from XML Data
  • WU Yang-Yang,LEI Qing,CHEN Duan-Sheng and YOKOTA Harou
  • 2008,19(6):1422-1427 [Abstract(4981)]  [View PDF(3837)306.08 K]
  • Activity-Centered Personal Information Management
  • DENG Chang-Zhi,AO Xiang,ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(6):1428-1438 [Abstract(4224)]  [View PDF(3564)469.64 K]
  • An Adaptive Mechanism to Solve BGP Divergence Resulted from Policies Conflict
  • WANG Li-Jun,WU Jian-Ping and XU Ke
  • 2008,19(6):1465-1472 [Abstract(3515)]  [View PDF(3298)388.19 K]
  • An Efficient Search Algorithm for Large-Scale P2P Systems
  • ZHANG Yi-Ming,LU Xi-Cheng,ZHENG Qian-Bing and LI Dong-Sheng
  • 2008,19(6):1473-1480 [Abstract(4334)]  [View PDF(3863)363.61 K]
  • Research on Home Agent Fault-Tolerant Approach for Mobile IPv6 Networks
  • ZHANG Yu-Jun,ZHANG Han-Wen,XIAO Wen-Shu and LI Zhong-Cheng
  • 2008,19(6):1491-1498 [Abstract(4052)]  [View PDF(3510)386.78 K]
  • Study on TCP Flow-Competing Congestion and Buffer Requirement of the Congested Links
  • LI Yu-Feng,QIU Han,LAN Ju-Long and WANG Bin-Qiang
  • 2008,19(6):1499-1507 [Abstract(3329)]  [View PDF(3930)388.15 K]
  • Topology Aware Worm Simulation and Analysis
  • WANG Yue-Wu,JING Ji-Wu,XIANG Ji and LIU Qi
  • 2008,19(6):1508-1518 [Abstract(3643)]  [View PDF(4448)593.54 K]
  • Code-Injection Attack Automatic Analyses and Response System Based on Abnormal Scene Diagnose
  • LI Wen,DAI Ying-Xia,LIAN Yi-Feng,FENG Ping-Hui and BAO Xu-Hua
  • 2008,19(6):1519-1532 [Abstract(3347)]  [View PDF(3650)522.77 K]
  • An Active Congestion Control Mechanism for Transmission Control Protocol
  • XU Chang-Biao,XIAN Yong-Ju,TANG Chao-Wei and YANG Shi-Zhong
  • 2008,19(6):1533-1545 [Abstract(3914)]  [View PDF(3949)895.89 K]
  • Multi-Objective Optimization Multicast Routing for Forwarding State Scalability
  • HU Guang-Min and CHANG Rocky
  • 2008,19(6):1546-1554 [Abstract(3327)]  [View PDF(3324)367.09 K]
  • Identity-Based Strong Key-Insulated Signature Without Random Oracles
  • WENG Jian,CHEN Ke-Fei,LIU Sheng-Li and LI Xiang-Xue
  • 2008,19(6):1555-1564 [Abstract(4405)]  [View PDF(3652)335.90 K]
  • Review Articles

  • Progress of Research on Metamodeling
  • LIU Hui,MA Zhi-Yi and SHAO Wei-Zhong
  • 2008,19(6):1317-1327 [Abstract(7785)]  [View PDF(6251)502.00 K]
  • Software Architecture Evaluation
  • ZHANG Li,GAO Hui and WANG Shou-Xin
  • 2008,19(6):1328-1339 [Abstract(7079)]  [View PDF(8462)427.12 K]
  • Skyline Query Processing
  • WEI Xiao-Juan,YANG Jing,LI Cui-Ping and CHEN Hong
  • 2008,19(6):1386-1400 [Abstract(9794)]  [View PDF(8769)518.81 K]
  • Transmission Control Protocols for Wireless Sensor Networks
  • FANG Wei-Wei,QIAN De-Pei and LIU Yi
  • 2008,19(6):1439-1451 [Abstract(10165)]  [View PDF(6324)483.21 K]
  • Scalable Router
  • ZHANG Xiao-Ping,LIU Zhen-Hua,ZHAO You-Jian and GUAN Hong-Tao
  • 2008,19(6):1452-1464 [Abstract(6917)]  [View PDF(6168)538.69 K]
  • Optical Network Control and Management for Grid Applications
  • REN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin
  • 2008,19(6):1481-1490 [Abstract(6892)]  [View PDF(4808)500.10 K]