Volume 20,Issue 6,2009 Table of Contents

Other Issues:  
  
Contents

  • Parallel Model of DDS and Its Formalization
  • LIU Zhen-Huan,WEI Li,CHEN Yan,ZHAO Rong-Sheng and WANG Ju
  • 2009,20(6):1406-1413 [Abstract(3164)]  [View PDF(4714)554.88 K]
  • SAT-Based Compositional Verification Strategy for Concurrent Software with States, Events
  • ZHOU Cong-Hua
  • 2009,20(6):1414-1424 [Abstract(3617)]  [View PDF(3473)671.35 K]
  • Heuristic Symbolic Verification of Safety Properties for Parameterized Systems
  • YANG Qiu-Song and LI Ming-Shu
  • 2009,20(6):1444-1456 [Abstract(3088)]  [View PDF(3370)840.10 K]
  • Non-Functional Attributes Oriented Description and Verification in UML Class Diagrams
  • ZHANG Yan and MEI Hong
  • 2009,20(6):1457-1469 [Abstract(3197)]  [View PDF(4214)854.96 K]
  • Service Collaboration Approach Based on Decentralized Mediation Model
  • QIAO Xiao-Qiang,WEI Jun and HUANG Tao
  • 2009,20(6):1470-1486 [Abstract(3201)]  [View PDF(3925)1.19 M]
  • Automatic Hierarchical Layout Algorithm for UML Class Diagram
  • WANG Xiao-Bo,WANG Huan and LIU Chao
  • 2009,20(6):1487-1498 [Abstract(4254)]  [View PDF(5593)784.25 K]
  • Benchmarking Software Task Performance Based on Data Envelopment Analysis
  • RUAN Li,WANG Yong-Ji,WANG Qing and ZENG Hai-Tao
  • 2009,20(6):1499-1510 [Abstract(3206)]  [View PDF(3608)822.75 K]
  • Discrete No-Fit Polygon, A Simple Structure for the 2-D Irregular Packing Problem
  • ZHANG De-Fu,CHEN Jing-Chi,LIU Yong-Kai and CHEN Huo-Wang
  • 2009,20(6):1511-1520 [Abstract(3366)]  [View PDF(4022)687.65 K]
  • Extension Rule Algorithms Based on IMOM and IBOHM Heuristics Strategies
  • LI Ying,SUN Ji-Gui,WU Xia and ZHU Xing-Jun
  • 2009,20(6):1521-1527 [Abstract(3274)]  [View PDF(3320)459.54 K]
  • Lowest-Level Left Align Best-Fit Algorithm for the 2D Rectangular Strip Packing Problem
  • JIANG Xing-Bo,Lü Xiao-Qing and LIU Cheng-Cheng
  • 2009,20(6):1528-1538 [Abstract(4122)]  [View PDF(6829)829.39 K]
  • Run Length Coding-Based Dynamic Trust Model for P2P Network
  • FANG Qun,JI Yi,WU Guo-Xin,ZHAO Sheng-Hui and WU Peng
  • 2009,20(6):1602-1616 [Abstract(3569)]  [View PDF(4367)1.11 M]
  • Set of Necessary and Sufficient Conditions in Collision Attacks on MD5
  • CHEN Shi-Wei and JIN Chen-Hui
  • 2009,20(6):1617-1624 [Abstract(3739)]  [View PDF(3756)542.42 K]
  • Component Property Based Remote Attestation
  • QIN Yu and FENG Deng-Guo
  • 2009,20(6):1625-1641 [Abstract(4144)]  [View PDF(4385)1.28 M]
  • Topology-Transparent Hybrid MAC Protocol for Ad Hoc Networks
  • LI Wei,WANG Shan and WEI Ji-Bo
  • 2009,20(6):1642-1650 [Abstract(3299)]  [View PDF(3560)568.13 K]
  • Robust Appearance-Based Method for Head Pose Estimation
  • MA Bing-Peng,SHAN Shi-Guang,CHEN Xi-Lin and GAO Wen
  • 2009,20(6):1651-1663 [Abstract(2833)]  [View PDF(3554)1.11 M]
  • Motion Synthesis for Virtual Human Using Functional Data Analysis
  • LI Chun-Peng,WANG Zhao-Qi and XIA Shi-Hong
  • 2009,20(6):1664-1672 [Abstract(3738)]  [View PDF(4410)857.93 K]
  • Constructing Surface on Irregular Meshes
  • HE Jun,ZHANG Cai-Ming and YANG Xing-Qiang
  • 2009,20(6):1673-1684 [Abstract(3515)]  [View PDF(4064)831.51 K]
  • Improved Coherent Hierarchical Culling Algorithm Based on Probability Computing Model
  • LIANG Xiao-Hui,REN Wei,YU Zhuo and LIANG Ai-Min
  • 2009,20(6):1685-1693 [Abstract(3121)]  [View PDF(3699)666.58 K]
  • Modified Algorithm with Bidirectional Diffusion for TV Image Interpolation
  • ZHAN Yi,WANG Ming-Hui,WAN Qun and LI Meng
  • 2009,20(6):1694-1702 [Abstract(2955)]  [View PDF(3603)945.62 K]
  • Review Articles

  • Combinatorial Testing: Principles and Methods
  • YAN Jun and ZHANG Jian
  • 2009,20(6):1393-1405 [Abstract(8319)]  [View PDF(11564)831.86 K]
  • Research on Software Fault Injection Testing
  • CHEN Jin-Fu,LU Yan-Sheng and XIE Xiao-Dong
  • 2009,20(6):1425-1443 [Abstract(7210)]  [View PDF(10047)1.09 M]
  • Research of QoS on Wireless Mesh Networks
  • DONG Chao,CHEN Gui-Hai and WANG Hai
  • 2009,20(6):1539-1552 [Abstract(5821)]  [View PDF(5315)2.32 M]
  • Biometric Template Protection
  • LI Peng,TIAN Jie,YANG Xin,SHI Peng and ZHANG Yang-Yang
  • 2009,20(6):1553-1573 [Abstract(8135)]  [View PDF(9926)1.60 M]
  • Network Distance Prediction Technology Research
  • WANG Yi-Jie and LI Xiao-Yong
  • 2009,20(6):1574-1590 [Abstract(5548)]  [View PDF(6376)1.06 M]