Volume 20,Issue 6,2009 Table of Contents

Other Issues:  
  
Contents

  • Parallel Model of DDS and Its Formalization
  • LIU Zhen-Huan,WEI Li,CHEN Yan,ZHAO Rong-Sheng and WANG Ju
  • 2009,20(6):1406-1413 [Abstract(4752)]  [View PDF(7146)554.88 K]
  • SAT-Based Compositional Verification Strategy for Concurrent Software with States, Events
  • ZHOU Cong-Hua
  • 2009,20(6):1414-1424 [Abstract(4956)]  [View PDF(5390)671.35 K]
  • Heuristic Symbolic Verification of Safety Properties for Parameterized Systems
  • YANG Qiu-Song and LI Ming-Shu
  • 2009,20(6):1444-1456 [Abstract(4433)]  [View PDF(5741)840.10 K]
  • Non-Functional Attributes Oriented Description and Verification in UML Class Diagrams
  • ZHANG Yan and MEI Hong
  • 2009,20(6):1457-1469 [Abstract(4780)]  [View PDF(6946)854.96 K]
  • Service Collaboration Approach Based on Decentralized Mediation Model
  • QIAO Xiao-Qiang,WEI Jun and HUANG Tao
  • 2009,20(6):1470-1486 [Abstract(4482)]  [View PDF(6361)1.19 M]
  • Automatic Hierarchical Layout Algorithm for UML Class Diagram
  • WANG Xiao-Bo,WANG Huan and LIU Chao
  • 2009,20(6):1487-1498 [Abstract(5961)]  [View PDF(9263)784.25 K]
  • Benchmarking Software Task Performance Based on Data Envelopment Analysis
  • RUAN Li,WANG Yong-Ji,WANG Qing and ZENG Hai-Tao
  • 2009,20(6):1499-1510 [Abstract(4557)]  [View PDF(5772)822.75 K]
  • Discrete No-Fit Polygon, A Simple Structure for the 2-D Irregular Packing Problem
  • ZHANG De-Fu,CHEN Jing-Chi,LIU Yong-Kai and CHEN Huo-Wang
  • 2009,20(6):1511-1520 [Abstract(5054)]  [View PDF(6631)687.65 K]
  • Extension Rule Algorithms Based on IMOM and IBOHM Heuristics Strategies
  • LI Ying,SUN Ji-Gui,WU Xia and ZHU Xing-Jun
  • 2009,20(6):1521-1527 [Abstract(5207)]  [View PDF(5745)459.54 K]
  • Lowest-Level Left Align Best-Fit Algorithm for the 2D Rectangular Strip Packing Problem
  • JIANG Xing-Bo,Lü Xiao-Qing and LIU Cheng-Cheng
  • 2009,20(6):1528-1538 [Abstract(6877)]  [View PDF(10762)829.39 K]
  • Run Length Coding-Based Dynamic Trust Model for P2P Network
  • FANG Qun,JI Yi,WU Guo-Xin,ZHAO Sheng-Hui and WU Peng
  • 2009,20(6):1602-1616 [Abstract(5313)]  [View PDF(6782)1.11 M]
  • Set of Necessary and Sufficient Conditions in Collision Attacks on MD5
  • CHEN Shi-Wei and JIN Chen-Hui
  • 2009,20(6):1617-1624 [Abstract(5220)]  [View PDF(6087)542.42 K]
  • Component Property Based Remote Attestation
  • QIN Yu and FENG Deng-Guo
  • 2009,20(6):1625-1641 [Abstract(5773)]  [View PDF(7584)1.28 M]
  • Topology-Transparent Hybrid MAC Protocol for Ad Hoc Networks
  • LI Wei,WANG Shan and WEI Ji-Bo
  • 2009,20(6):1642-1650 [Abstract(4708)]  [View PDF(5499)568.13 K]
  • Robust Appearance-Based Method for Head Pose Estimation
  • MA Bing-Peng,SHAN Shi-Guang,CHEN Xi-Lin and GAO Wen
  • 2009,20(6):1651-1663 [Abstract(4434)]  [View PDF(5767)1.11 M]
  • Motion Synthesis for Virtual Human Using Functional Data Analysis
  • LI Chun-Peng,WANG Zhao-Qi and XIA Shi-Hong
  • 2009,20(6):1664-1672 [Abstract(5267)]  [View PDF(6980)857.93 K]
  • Constructing Surface on Irregular Meshes
  • HE Jun,ZHANG Cai-Ming and YANG Xing-Qiang
  • 2009,20(6):1673-1684 [Abstract(4983)]  [View PDF(6411)831.51 K]
  • Improved Coherent Hierarchical Culling Algorithm Based on Probability Computing Model
  • LIANG Xiao-Hui,REN Wei,YU Zhuo and LIANG Ai-Min
  • 2009,20(6):1685-1693 [Abstract(4449)]  [View PDF(5725)666.58 K]
  • Modified Algorithm with Bidirectional Diffusion for TV Image Interpolation
  • ZHAN Yi,WANG Ming-Hui,WAN Qun and LI Meng
  • 2009,20(6):1694-1702 [Abstract(4299)]  [View PDF(6126)945.62 K]
  • Review Articles

  • Combinatorial Testing: Principles and Methods
  • YAN Jun and ZHANG Jian
  • 2009,20(6):1393-1405 [Abstract(12140)]  [View PDF(18597)831.86 K]
  • Research on Software Fault Injection Testing
  • CHEN Jin-Fu,LU Yan-Sheng and XIE Xiao-Dong
  • 2009,20(6):1425-1443 [Abstract(10091)]  [View PDF(16815)1.09 M]
  • Research of QoS on Wireless Mesh Networks
  • DONG Chao,CHEN Gui-Hai and WANG Hai
  • 2009,20(6):1539-1552 [Abstract(7935)]  [View PDF(8742)2.32 M]
  • Biometric Template Protection
  • LI Peng,TIAN Jie,YANG Xin,SHI Peng and ZHANG Yang-Yang
  • 2009,20(6):1553-1573 [Abstract(10784)]  [View PDF(14489)1.60 M]
  • Network Distance Prediction Technology Research
  • WANG Yi-Jie and LI Xiao-Yong
  • 2009,20(6):1574-1590 [Abstract(7607)]  [View PDF(10510)1.06 M]