Volume 20,Issue 10,2009 Table of Contents

Other Issues:  
  
Contents

  • Refactoring Generic Instantiations Based on Type Propagation Analysis
  • CHEN Lin,XU Bao-Wen,QIAN Ju,ZHOU Tian-Lin and ZHOU Yu-Ming
  • 2009,20(10):2617-2627 [Abstract(4837)]  [View PDF(5859)642.10 K]
  • Algorithms for Rule Generation and Matchmaking in Context-Aware System
  • LIU Dong,MENG Xiang-Wu,CHEN Jun-Liang and XIA Ya-Mei
  • 2009,20(10):2655-2666 [Abstract(5225)]  [View PDF(6685)782.68 K]
  • Internet Traffic Classification Using C4.5 Decision Tree
  • XU Peng and LIN Sen
  • 2009,20(10):2692-2704 [Abstract(5640)]  [View PDF(10091)645.73 K]
  • Route-Sign-Based Adaptive Void Handling Geographical Routing Algorithm
  • ZHANG Heng-Yang,WANG Ling,LIU Yun-Hui and CAI Xuan-Ping
  • 2009,20(10):2744-2751 [Abstract(4647)]  [View PDF(5288)566.38 K]
  • Cache System Based on Disk Media for Network Storage
  • YIN Yang,LIU Zhen-Jun and XU Lu
  • 2009,20(10):2752-2765 [Abstract(4704)]  [View PDF(7055)892.16 K]
  • Overcome the Limitation on Authentication Test
  • LIU Jia-Fen and ZHOU Ming-Tian
  • 2009,20(10):2799-2809 [Abstract(4868)]  [View PDF(4964)581.28 K]
  • Cryptographic Workflow Key Encapsulation Mechanism Based on Signcryption
  • LAI Xin and HE Da-Ke
  • 2009,20(10):2810-2821 [Abstract(4711)]  [View PDF(5846)614.13 K]
  • Importance Sampling Method of Software Reliability Estimation
  • ZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen
  • 2009,20(10):2859-2866 [Abstract(5485)]  [View PDF(7368)500.93 K]
  • Similarity Search in Data Stream with Adaptive Segmental Approximations
  • WU Feng,ZHONG Yan,WU Quan-Yuan,JIA Yan and YANG Shu-Qiang
  • 2009,20(10):2867-2884 [Abstract(4860)]  [View PDF(5840)1.43 M]
  • Robust Feedback Credibility-Based Distributed P2P Trust Model
  • HU Jian-Li,WU Quan-Yuan,ZHOU Bin and LIU Jia-Hong
  • 2009,20(10):2885-2898 [Abstract(5434)]  [View PDF(7003)1.09 M]
  • Sketch-Based Anomalies Detection with IP Address Traceability
  • LUO Na,LI Ai-Ping,WU Quan-Yuan and LU Hua-Biao
  • 2009,20(10):2899-2906 [Abstract(5158)]  [View PDF(6936)530.76 K]
  • Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme
  • PANG Liao-Jun,LI Hui-Xian,JIAO Li-Cheng and WANG Yu-Min
  • 2009,20(10):2907-2914 [Abstract(5500)]  [View PDF(7035)497.68 K]
  • Education Resource Grid Model and Replica Creation Strategies
  • XING Chang-Ming,LIU Fang-Ai,YANG Lin and LI Wen
  • 2009,20(10):3844-2856 [Abstract(4290)]  [View PDF(5327)642.62 K]
  • Review Articles

  • Addressing Protocols for Wireless Sensor Networks
  • DU Zhi-Gao,QIAN De-Pei and LIU Yi
  • 2009,20(10):2787-2798 [Abstract(8037)]  [View PDF(9025)691.97 K]
  • Online First

  • Efficient Scheduling Algorithm for Hard Real-Time Tasks in Primary-Backup Based Multiprocessor Systems
  • WANG Jian,SUN Jian-Ling,WANG Xin-Yu,YANG Xiao-Hu,WANG Shen-Kang and CHEN Jun-Bo
  • 2009,20(10):2628-2636 [Abstract(4619)]  [View PDF(6389)469.51 K]
  • Experimental Study to Compare the Use of Metamorphic Testing and Assertion Checking
  • ZHANG Zhen-Yu,CHAN WK,TSE TH and U Pei-Feng
  • 2009,20(10):2637-2654 [Abstract(5957)]  [View PDF(6494)821.81 K]
  • Structure Matching Method Based on Functional Dependencies
  • LI Guo-Hui,DU Xiao-Kun,HU Fang-Xiao,YANG Bing and TANG Xiang-Hong
  • 2009,20(10):2667-2678 [Abstract(6077)]  [View PDF(6192)623.67 K]
  • View-Invariant Action Recognition Based on Action Graphs
  • YANG Yue-Dong,HAO Ai-Min,CHU Qing-Jun,ZHAO Qin-Ping and WANG Li-Li
  • 2009,20(10):2679-2691 [Abstract(5192)]  [View PDF(7662)745.46 K]
  • Distributed Secure Clustering Protocol in Wireless Sensor Networks
  • YU Lei,LI Jian-Zhong and LUO Ji-Zhou
  • 2009,20(10):2705-2720 [Abstract(6122)]  [View PDF(7932)785.34 K]
  • Traffic Load-Based Interference-Aware Routing Protocol for Mobile Ad Hoc Networks
  • ZHANG Xin-Ming,LIU Qiong,DAI Shi-Fang and LIU Yong-Zhen
  • 2009,20(10):2721-2728 [Abstract(5610)]  [View PDF(6160)615.79 K]
  • ACO-Based Algorithm for Solving Energy Hole Problems in Wireless Sensor Networks
  • SONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min
  • 2009,20(10):2729-2743 [Abstract(14397)]  [View PDF(11081)1.12 M]
  • Task Scheduling Based on Multidimensional Performance Clustering of Grid Service Resources
  • CHEN Zhi-Gang and YANG Bo
  • 2009,20(10):2766-2775 [Abstract(5640)]  [View PDF(6230)554.10 K]
  • Distributed Proving Oriented Language and Method for Trust Negotiation
  • WANG Xiao-Feng,SU Jin-Shu,ZHANG Qiang and ZHANG Yi-Ming
  • 2009,20(10):2776-2786 [Abstract(5667)]  [View PDF(5793)583.96 K]
  • Verifying Mobile Ad-Hoc Security Routing Protocols with Type Inference
  • LI Qin and ZENG Qing-Kai
  • 2009,20(10):2822-2833 [Abstract(5113)]  [View PDF(6402)645.24 K]
  • Finding and Ranking Semantic Web Sites
  • ZHANG Xiang,GE Wei-Yi and U Yu-Zhong
  • 2009,20(10):2834-3843 [Abstract(5893)]  [View PDF(6975)541.91 K]
  • 2008年中国计算机大会推荐优秀论文介绍
  • ZHENG Wei-Min
  • 2009,20(10):2857-2858 [Abstract(5015)]  [View PDF(5763)191.09 K]