Volume 20,Issue 10,2009 Table of Contents

Other Issues:  
  
Contents

  • Refactoring Generic Instantiations Based on Type Propagation Analysis
  • CHEN Lin,XU Bao-Wen,QIAN Ju,ZHOU Tian-Lin and ZHOU Yu-Ming
  • 2009,20(10):2617-2627 [Abstract(3401)]  [View PDF(3519)642.10 K]
  • Algorithms for Rule Generation and Matchmaking in Context-Aware System
  • LIU Dong,MENG Xiang-Wu,CHEN Jun-Liang and XIA Ya-Mei
  • 2009,20(10):2655-2666 [Abstract(3795)]  [View PDF(4335)782.68 K]
  • Internet Traffic Classification Using C4.5 Decision Tree
  • XU Peng and LIN Sen
  • 2009,20(10):2692-2704 [Abstract(3806)]  [View PDF(6052)645.73 K]
  • Route-Sign-Based Adaptive Void Handling Geographical Routing Algorithm
  • ZHANG Heng-Yang,WANG Ling,LIU Yun-Hui and CAI Xuan-Ping
  • 2009,20(10):2744-2751 [Abstract(3235)]  [View PDF(3202)566.38 K]
  • Cache System Based on Disk Media for Network Storage
  • YIN Yang,LIU Zhen-Jun and XU Lu
  • 2009,20(10):2752-2765 [Abstract(3334)]  [View PDF(4699)892.16 K]
  • Overcome the Limitation on Authentication Test
  • LIU Jia-Fen and ZHOU Ming-Tian
  • 2009,20(10):2799-2809 [Abstract(3542)]  [View PDF(2918)581.28 K]
  • Cryptographic Workflow Key Encapsulation Mechanism Based on Signcryption
  • LAI Xin and HE Da-Ke
  • 2009,20(10):2810-2821 [Abstract(3208)]  [View PDF(3496)614.13 K]
  • Importance Sampling Method of Software Reliability Estimation
  • ZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen
  • 2009,20(10):2859-2866 [Abstract(3734)]  [View PDF(5000)500.93 K]
  • Similarity Search in Data Stream with Adaptive Segmental Approximations
  • WU Feng,ZHONG Yan,WU Quan-Yuan,JIA Yan and YANG Shu-Qiang
  • 2009,20(10):2867-2884 [Abstract(3470)]  [View PDF(3513)1.43 M]
  • Robust Feedback Credibility-Based Distributed P2P Trust Model
  • HU Jian-Li,WU Quan-Yuan,ZHOU Bin and LIU Jia-Hong
  • 2009,20(10):2885-2898 [Abstract(3766)]  [View PDF(4307)1.09 M]
  • Sketch-Based Anomalies Detection with IP Address Traceability
  • LUO Na,LI Ai-Ping,WU Quan-Yuan and LU Hua-Biao
  • 2009,20(10):2899-2906 [Abstract(3566)]  [View PDF(3865)530.76 K]
  • Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme
  • PANG Liao-Jun,LI Hui-Xian,JIAO Li-Cheng and WANG Yu-Min
  • 2009,20(10):2907-2914 [Abstract(3831)]  [View PDF(4657)497.68 K]
  • Education Resource Grid Model and Replica Creation Strategies
  • XING Chang-Ming,LIU Fang-Ai,YANG Lin and LI Wen
  • 2009,20(10):3844-2856 [Abstract(2949)]  [View PDF(3199)642.62 K]
  • Review Articles

  • Addressing Protocols for Wireless Sensor Networks
  • DU Zhi-Gao,QIAN De-Pei and LIU Yi
  • 2009,20(10):2787-2798 [Abstract(5716)]  [View PDF(5960)691.97 K]
  • Online First

  • Efficient Scheduling Algorithm for Hard Real-Time Tasks in Primary-Backup Based Multiprocessor Systems
  • WANG Jian,SUN Jian-Ling,WANG Xin-Yu,YANG Xiao-Hu,WANG Shen-Kang and CHEN Jun-Bo
  • 2009,20(10):2628-2636 [Abstract(3083)]  [View PDF(3901)469.51 K]
  • Experimental Study to Compare the Use of Metamorphic Testing and Assertion Checking
  • ZHANG Zhen-Yu,CHAN WK,TSE TH and U Pei-Feng
  • 2009,20(10):2637-2654 [Abstract(4333)]  [View PDF(3944)821.81 K]
  • Structure Matching Method Based on Functional Dependencies
  • LI Guo-Hui,DU Xiao-Kun,HU Fang-Xiao,YANG Bing and TANG Xiang-Hong
  • 2009,20(10):2667-2678 [Abstract(4614)]  [View PDF(4055)623.67 K]
  • View-Invariant Action Recognition Based on Action Graphs
  • YANG Yue-Dong,HAO Ai-Min,CHU Qing-Jun,ZHAO Qin-Ping and WANG Li-Li
  • 2009,20(10):2679-2691 [Abstract(3875)]  [View PDF(5213)745.46 K]
  • Distributed Secure Clustering Protocol in Wireless Sensor Networks
  • YU Lei,LI Jian-Zhong and LUO Ji-Zhou
  • 2009,20(10):2705-2720 [Abstract(4878)]  [View PDF(5570)785.34 K]
  • Traffic Load-Based Interference-Aware Routing Protocol for Mobile Ad Hoc Networks
  • ZHANG Xin-Ming,LIU Qiong,DAI Shi-Fang and LIU Yong-Zhen
  • 2009,20(10):2721-2728 [Abstract(4306)]  [View PDF(4060)615.79 K]
  • ACO-Based Algorithm for Solving Energy Hole Problems in Wireless Sensor Networks
  • SONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min
  • 2009,20(10):2729-2743 [Abstract(11953)]  [View PDF(7094)1.12 M]
  • Task Scheduling Based on Multidimensional Performance Clustering of Grid Service Resources
  • CHEN Zhi-Gang and YANG Bo
  • 2009,20(10):2766-2775 [Abstract(4385)]  [View PDF(4043)554.10 K]
  • Distributed Proving Oriented Language and Method for Trust Negotiation
  • WANG Xiao-Feng,SU Jin-Shu,ZHANG Qiang and ZHANG Yi-Ming
  • 2009,20(10):2776-2786 [Abstract(4359)]  [View PDF(3738)583.96 K]
  • Verifying Mobile Ad-Hoc Security Routing Protocols with Type Inference
  • LI Qin and ZENG Qing-Kai
  • 2009,20(10):2822-2833 [Abstract(3819)]  [View PDF(4131)645.24 K]
  • Finding and Ranking Semantic Web Sites
  • ZHANG Xiang,GE Wei-Yi and U Yu-Zhong
  • 2009,20(10):2834-3843 [Abstract(4532)]  [View PDF(4872)541.91 K]
  • 2008年中国计算机大会推荐优秀论文介绍
  • ZHENG Wei-Min
  • 2009,20(10):2857-2858 [Abstract(3915)]  [View PDF(3914)191.09 K]