Volume 20,Issue 6,2009 Table of Contents
Parallel Model of DDS and Its FormalizationLIU Zhen-Huan,WEI Li,CHEN Yan,ZHAO Rong-Sheng and WANG Ju2009,20(6):1406-1413 [Abstract(4752)] [View PDF(7146)554.88 K]SAT-Based Compositional Verification Strategy for Concurrent Software with States, EventsZHOU Cong-Hua2009,20(6):1414-1424 [Abstract(4956)] [View PDF(5390)671.35 K]Heuristic Symbolic Verification of Safety Properties for Parameterized SystemsYANG Qiu-Song and LI Ming-Shu2009,20(6):1444-1456 [Abstract(4433)] [View PDF(5741)840.10 K]Non-Functional Attributes Oriented Description and Verification in UML Class DiagramsZHANG Yan and MEI Hong2009,20(6):1457-1469 [Abstract(4780)] [View PDF(6946)854.96 K]Service Collaboration Approach Based on Decentralized Mediation ModelQIAO Xiao-Qiang,WEI Jun and HUANG Tao2009,20(6):1470-1486 [Abstract(4482)] [View PDF(6361)1.19 M]Automatic Hierarchical Layout Algorithm for UML Class DiagramWANG Xiao-Bo,WANG Huan and LIU Chao2009,20(6):1487-1498 [Abstract(5961)] [View PDF(9263)784.25 K]Benchmarking Software Task Performance Based on Data Envelopment AnalysisRUAN Li,WANG Yong-Ji,WANG Qing and ZENG Hai-Tao2009,20(6):1499-1510 [Abstract(4557)] [View PDF(5772)822.75 K]Discrete No-Fit Polygon, A Simple Structure for the 2-D Irregular Packing ProblemZHANG De-Fu,CHEN Jing-Chi,LIU Yong-Kai and CHEN Huo-Wang2009,20(6):1511-1520 [Abstract(5054)] [View PDF(6631)687.65 K]Extension Rule Algorithms Based on IMOM and IBOHM Heuristics StrategiesLI Ying,SUN Ji-Gui,WU Xia and ZHU Xing-Jun2009,20(6):1521-1527 [Abstract(5207)] [View PDF(5745)459.54 K]Lowest-Level Left Align Best-Fit Algorithm for the 2D Rectangular Strip Packing ProblemJIANG Xing-Bo,Lü Xiao-Qing and LIU Cheng-Cheng2009,20(6):1528-1538 [Abstract(6877)] [View PDF(10762)829.39 K]Run Length Coding-Based Dynamic Trust Model for P2P NetworkFANG Qun,JI Yi,WU Guo-Xin,ZHAO Sheng-Hui and WU Peng2009,20(6):1602-1616 [Abstract(5313)] [View PDF(6782)1.11 M]Set of Necessary and Sufficient Conditions in Collision Attacks on MD5CHEN Shi-Wei and JIN Chen-Hui2009,20(6):1617-1624 [Abstract(5220)] [View PDF(6087)542.42 K]Component Property Based Remote AttestationQIN Yu and FENG Deng-Guo2009,20(6):1625-1641 [Abstract(5773)] [View PDF(7584)1.28 M]Topology-Transparent Hybrid MAC Protocol for Ad Hoc NetworksLI Wei,WANG Shan and WEI Ji-Bo2009,20(6):1642-1650 [Abstract(4708)] [View PDF(5499)568.13 K]Robust Appearance-Based Method for Head Pose EstimationMA Bing-Peng,SHAN Shi-Guang,CHEN Xi-Lin and GAO Wen2009,20(6):1651-1663 [Abstract(4434)] [View PDF(5767)1.11 M]Motion Synthesis for Virtual Human Using Functional Data AnalysisLI Chun-Peng,WANG Zhao-Qi and XIA Shi-Hong2009,20(6):1664-1672 [Abstract(5267)] [View PDF(6980)857.93 K]Constructing Surface on Irregular MeshesHE Jun,ZHANG Cai-Ming and YANG Xing-Qiang2009,20(6):1673-1684 [Abstract(4983)] [View PDF(6411)831.51 K]Improved Coherent Hierarchical Culling Algorithm Based on Probability Computing ModelLIANG Xiao-Hui,REN Wei,YU Zhuo and LIANG Ai-Min2009,20(6):1685-1693 [Abstract(4449)] [View PDF(5725)666.58 K]Modified Algorithm with Bidirectional Diffusion for TV Image InterpolationZHAN Yi,WANG Ming-Hui,WAN Qun and LI Meng2009,20(6):1694-1702 [Abstract(4299)] [View PDF(6126)945.62 K]
Combinatorial Testing: Principles and MethodsYAN Jun and ZHANG Jian2009,20(6):1393-1405 [Abstract(12140)] [View PDF(18597)831.86 K]Research on Software Fault Injection TestingCHEN Jin-Fu,LU Yan-Sheng and XIE Xiao-Dong2009,20(6):1425-1443 [Abstract(10091)] [View PDF(16815)1.09 M]Research of QoS on Wireless Mesh NetworksDONG Chao,CHEN Gui-Hai and WANG Hai2009,20(6):1539-1552 [Abstract(7935)] [View PDF(8742)2.32 M]Biometric Template ProtectionLI Peng,TIAN Jie,YANG Xin,SHI Peng and ZHANG Yang-Yang2009,20(6):1553-1573 [Abstract(10784)] [View PDF(14489)1.60 M]Network Distance Prediction Technology ResearchWANG Yi-Jie and LI Xiao-Yong2009,20(6):1574-1590 [Abstract(7607)] [View PDF(10510)1.06 M]