Volume 20,Issue 6,2009 Table of Contents

Other Issues:  
  
Contents

  • Parallel Model of DDS and Its Formalization
  • LIU Zhen-Huan,WEI Li,CHEN Yan,ZHAO Rong-Sheng and WANG Ju
  • 2009,20(6):1406-1413 [Abstract(3307)]  [View PDF(4782)554.88 K]
  • SAT-Based Compositional Verification Strategy for Concurrent Software with States, Events
  • ZHOU Cong-Hua
  • 2009,20(6):1414-1424 [Abstract(3758)]  [View PDF(3557)671.35 K]
  • Heuristic Symbolic Verification of Safety Properties for Parameterized Systems
  • YANG Qiu-Song and LI Ming-Shu
  • 2009,20(6):1444-1456 [Abstract(3277)]  [View PDF(3451)840.10 K]
  • Non-Functional Attributes Oriented Description and Verification in UML Class Diagrams
  • ZHANG Yan and MEI Hong
  • 2009,20(6):1457-1469 [Abstract(3337)]  [View PDF(4305)854.96 K]
  • Service Collaboration Approach Based on Decentralized Mediation Model
  • QIAO Xiao-Qiang,WEI Jun and HUANG Tao
  • 2009,20(6):1470-1486 [Abstract(3337)]  [View PDF(4012)1.19 M]
  • Automatic Hierarchical Layout Algorithm for UML Class Diagram
  • WANG Xiao-Bo,WANG Huan and LIU Chao
  • 2009,20(6):1487-1498 [Abstract(4423)]  [View PDF(5782)784.25 K]
  • Benchmarking Software Task Performance Based on Data Envelopment Analysis
  • RUAN Li,WANG Yong-Ji,WANG Qing and ZENG Hai-Tao
  • 2009,20(6):1499-1510 [Abstract(3352)]  [View PDF(3768)822.75 K]
  • Discrete No-Fit Polygon, A Simple Structure for the 2-D Irregular Packing Problem
  • ZHANG De-Fu,CHEN Jing-Chi,LIU Yong-Kai and CHEN Huo-Wang
  • 2009,20(6):1511-1520 [Abstract(3516)]  [View PDF(4095)687.65 K]
  • Extension Rule Algorithms Based on IMOM and IBOHM Heuristics Strategies
  • LI Ying,SUN Ji-Gui,WU Xia and ZHU Xing-Jun
  • 2009,20(6):1521-1527 [Abstract(3542)]  [View PDF(3446)459.54 K]
  • Lowest-Level Left Align Best-Fit Algorithm for the 2D Rectangular Strip Packing Problem
  • JIANG Xing-Bo,Lü Xiao-Qing and LIU Cheng-Cheng
  • 2009,20(6):1528-1538 [Abstract(4474)]  [View PDF(7072)829.39 K]
  • Run Length Coding-Based Dynamic Trust Model for P2P Network
  • FANG Qun,JI Yi,WU Guo-Xin,ZHAO Sheng-Hui and WU Peng
  • 2009,20(6):1602-1616 [Abstract(3791)]  [View PDF(4512)1.11 M]
  • Set of Necessary and Sufficient Conditions in Collision Attacks on MD5
  • CHEN Shi-Wei and JIN Chen-Hui
  • 2009,20(6):1617-1624 [Abstract(3873)]  [View PDF(3870)542.42 K]
  • Component Property Based Remote Attestation
  • QIN Yu and FENG Deng-Guo
  • 2009,20(6):1625-1641 [Abstract(4415)]  [View PDF(4536)1.28 M]
  • Topology-Transparent Hybrid MAC Protocol for Ad Hoc Networks
  • LI Wei,WANG Shan and WEI Ji-Bo
  • 2009,20(6):1642-1650 [Abstract(3437)]  [View PDF(3640)568.13 K]
  • Robust Appearance-Based Method for Head Pose Estimation
  • MA Bing-Peng,SHAN Shi-Guang,CHEN Xi-Lin and GAO Wen
  • 2009,20(6):1651-1663 [Abstract(3136)]  [View PDF(3641)1.11 M]
  • Motion Synthesis for Virtual Human Using Functional Data Analysis
  • LI Chun-Peng,WANG Zhao-Qi and XIA Shi-Hong
  • 2009,20(6):1664-1672 [Abstract(3956)]  [View PDF(4494)857.93 K]
  • Constructing Surface on Irregular Meshes
  • HE Jun,ZHANG Cai-Ming and YANG Xing-Qiang
  • 2009,20(6):1673-1684 [Abstract(3680)]  [View PDF(4183)831.51 K]
  • Improved Coherent Hierarchical Culling Algorithm Based on Probability Computing Model
  • LIANG Xiao-Hui,REN Wei,YU Zhuo and LIANG Ai-Min
  • 2009,20(6):1685-1693 [Abstract(3269)]  [View PDF(3805)666.58 K]
  • Modified Algorithm with Bidirectional Diffusion for TV Image Interpolation
  • ZHAN Yi,WANG Ming-Hui,WAN Qun and LI Meng
  • 2009,20(6):1694-1702 [Abstract(3080)]  [View PDF(3680)945.62 K]
  • Review Articles

  • Combinatorial Testing: Principles and Methods
  • YAN Jun and ZHANG Jian
  • 2009,20(6):1393-1405 [Abstract(8685)]  [View PDF(11999)831.86 K]
  • Research on Software Fault Injection Testing
  • CHEN Jin-Fu,LU Yan-Sheng and XIE Xiao-Dong
  • 2009,20(6):1425-1443 [Abstract(7572)]  [View PDF(10514)1.09 M]
  • Research of QoS on Wireless Mesh Networks
  • DONG Chao,CHEN Gui-Hai and WANG Hai
  • 2009,20(6):1539-1552 [Abstract(6099)]  [View PDF(5396)2.32 M]
  • Biometric Template Protection
  • LI Peng,TIAN Jie,YANG Xin,SHI Peng and ZHANG Yang-Yang
  • 2009,20(6):1553-1573 [Abstract(8414)]  [View PDF(10190)1.60 M]
  • Network Distance Prediction Technology Research
  • WANG Yi-Jie and LI Xiao-Yong
  • 2009,20(6):1574-1590 [Abstract(5809)]  [View PDF(6503)1.06 M]