Volume 20,Issue 6,2009 Table of Contents

Other Issues:  
  
Contents

  • Parallel Model of DDS and Its Formalization
  • LIU Zhen-Huan,WEI Li,CHEN Yan,ZHAO Rong-Sheng and WANG Ju
  • 2009,20(6):1406-1413 [Abstract(3694)]  [View PDF(5086)554.88 K]
  • SAT-Based Compositional Verification Strategy for Concurrent Software with States, Events
  • ZHOU Cong-Hua
  • 2009,20(6):1414-1424 [Abstract(4121)]  [View PDF(3788)671.35 K]
  • Heuristic Symbolic Verification of Safety Properties for Parameterized Systems
  • YANG Qiu-Song and LI Ming-Shu
  • 2009,20(6):1444-1456 [Abstract(3618)]  [View PDF(3691)840.10 K]
  • Non-Functional Attributes Oriented Description and Verification in UML Class Diagrams
  • ZHANG Yan and MEI Hong
  • 2009,20(6):1457-1469 [Abstract(3728)]  [View PDF(4548)854.96 K]
  • Service Collaboration Approach Based on Decentralized Mediation Model
  • QIAO Xiao-Qiang,WEI Jun and HUANG Tao
  • 2009,20(6):1470-1486 [Abstract(3634)]  [View PDF(4457)1.19 M]
  • Automatic Hierarchical Layout Algorithm for UML Class Diagram
  • WANG Xiao-Bo,WANG Huan and LIU Chao
  • 2009,20(6):1487-1498 [Abstract(4801)]  [View PDF(6229)784.25 K]
  • Benchmarking Software Task Performance Based on Data Envelopment Analysis
  • RUAN Li,WANG Yong-Ji,WANG Qing and ZENG Hai-Tao
  • 2009,20(6):1499-1510 [Abstract(3745)]  [View PDF(4029)822.75 K]
  • Discrete No-Fit Polygon, A Simple Structure for the 2-D Irregular Packing Problem
  • ZHANG De-Fu,CHEN Jing-Chi,LIU Yong-Kai and CHEN Huo-Wang
  • 2009,20(6):1511-1520 [Abstract(3899)]  [View PDF(4437)687.65 K]
  • Extension Rule Algorithms Based on IMOM and IBOHM Heuristics Strategies
  • LI Ying,SUN Ji-Gui,WU Xia and ZHU Xing-Jun
  • 2009,20(6):1521-1527 [Abstract(4037)]  [View PDF(3747)459.54 K]
  • Lowest-Level Left Align Best-Fit Algorithm for the 2D Rectangular Strip Packing Problem
  • JIANG Xing-Bo,Lü Xiao-Qing and LIU Cheng-Cheng
  • 2009,20(6):1528-1538 [Abstract(4999)]  [View PDF(7592)829.39 K]
  • Run Length Coding-Based Dynamic Trust Model for P2P Network
  • FANG Qun,JI Yi,WU Guo-Xin,ZHAO Sheng-Hui and WU Peng
  • 2009,20(6):1602-1616 [Abstract(4251)]  [View PDF(4756)1.11 M]
  • Set of Necessary and Sufficient Conditions in Collision Attacks on MD5
  • CHEN Shi-Wei and JIN Chen-Hui
  • 2009,20(6):1617-1624 [Abstract(4210)]  [View PDF(4149)542.42 K]
  • Component Property Based Remote Attestation
  • QIN Yu and FENG Deng-Guo
  • 2009,20(6):1625-1641 [Abstract(4791)]  [View PDF(4843)1.28 M]
  • Topology-Transparent Hybrid MAC Protocol for Ad Hoc Networks
  • LI Wei,WANG Shan and WEI Ji-Bo
  • 2009,20(6):1642-1650 [Abstract(3764)]  [View PDF(3818)568.13 K]
  • Robust Appearance-Based Method for Head Pose Estimation
  • MA Bing-Peng,SHAN Shi-Guang,CHEN Xi-Lin and GAO Wen
  • 2009,20(6):1651-1663 [Abstract(3494)]  [View PDF(3860)1.11 M]
  • Motion Synthesis for Virtual Human Using Functional Data Analysis
  • LI Chun-Peng,WANG Zhao-Qi and XIA Shi-Hong
  • 2009,20(6):1664-1672 [Abstract(4368)]  [View PDF(4756)857.93 K]
  • Constructing Surface on Irregular Meshes
  • HE Jun,ZHANG Cai-Ming and YANG Xing-Qiang
  • 2009,20(6):1673-1684 [Abstract(4037)]  [View PDF(4385)831.51 K]
  • Improved Coherent Hierarchical Culling Algorithm Based on Probability Computing Model
  • LIANG Xiao-Hui,REN Wei,YU Zhuo and LIANG Ai-Min
  • 2009,20(6):1685-1693 [Abstract(3621)]  [View PDF(4034)666.58 K]
  • Modified Algorithm with Bidirectional Diffusion for TV Image Interpolation
  • ZHAN Yi,WANG Ming-Hui,WAN Qun and LI Meng
  • 2009,20(6):1694-1702 [Abstract(3381)]  [View PDF(3937)945.62 K]
  • Review Articles

  • Combinatorial Testing: Principles and Methods
  • YAN Jun and ZHANG Jian
  • 2009,20(6):1393-1405 [Abstract(9383)]  [View PDF(13040)831.86 K]
  • Research on Software Fault Injection Testing
  • CHEN Jin-Fu,LU Yan-Sheng and XIE Xiao-Dong
  • 2009,20(6):1425-1443 [Abstract(8278)]  [View PDF(12255)1.09 M]
  • Research of QoS on Wireless Mesh Networks
  • DONG Chao,CHEN Gui-Hai and WANG Hai
  • 2009,20(6):1539-1552 [Abstract(6616)]  [View PDF(5644)2.32 M]
  • Biometric Template Protection
  • LI Peng,TIAN Jie,YANG Xin,SHI Peng and ZHANG Yang-Yang
  • 2009,20(6):1553-1573 [Abstract(8960)]  [View PDF(10779)1.60 M]
  • Network Distance Prediction Technology Research
  • WANG Yi-Jie and LI Xiao-Yong
  • 2009,20(6):1574-1590 [Abstract(6300)]  [View PDF(7239)1.06 M]