Volume 20,Issue 9,2009 Table of Contents

Other Issues:  
  
Review Articles

  • Kernelization Techniques and Its Applications to Parameterized Computation
  • LI Shao-Hua,WANG Jian-Xin and CHEN Jian-Er
  • 2009,20(9):2307-2319 [Abstract(4962)]  [View PDF(4797)772.77 K]
  • Contents

  • Parameter Model Based Strip-Mining Technique on the Stream Processor
  • DU Jing,AO Fu-Jiang,TANG Tao and YANG Xue-Jun
  • 2009,20(9):2320-2331 [Abstract(3255)]  [View PDF(2948)750.01 K]
  • lgorithm of Optimizing Quantum Reversible Logic Synthesis
  • LI Zhi-Qiang,LI Wen-Qian and CHEN Han-Wu
  • 2009,20(9):2332-2343 [Abstract(3093)]  [View PDF(2866)2.89 M]
  • Fat Computational Complexity and Heuristic Design for the TSP
  • JIANG He,HU Yan,LI Qiang and YU Hong
  • 2009,20(9):2344-2351 [Abstract(3700)]  [View PDF(4790)494.75 K]
  • BDD-Based Incremental Heuristic Search
  • XU Yan-Yan and YUE Wei-Ya
  • 2009,20(9):2352-2365 [Abstract(3575)]  [View PDF(3496)990.78 K]
  • Approach to Chinese Word Segmentation Based on Character-Word Joint Decoding
  • SONG Yan,CAI Dong-Feng,ZHANG Gui-Ping and ZHAO Hai
  • 2009,20(9):2366-2375 [Abstract(3630)]  [View PDF(4759)546.05 K]
  • Concept-Based Data Clustering Model
  • ZHANG Ming-Wei,LIU Ying,ZHANG Bin and ZHU Zhi-Liang
  • 2009,20(9):2387-2396 [Abstract(3721)]  [View PDF(3945)366.22 K]
  • Model for Internet News Force Evaluation Based on Information Retrieval Technologies
  • YANG Wei-Jie,DAI Ru-Wei and CUI Xia
  • 2009,20(9):2397-2406 [Abstract(3604)]  [View PDF(4135)546.50 K]
  • Online First

  • Algorithm for Creating Voronoi Diagrams for Two-Dimensional Riemannian Manifolds
  • HENG Dan,YANG Qin,LI Ji-Gang and CAI Qiang
  • 2009,20(9):2407-2416 [Abstract(4515)]  [View PDF(4875)720.00 K]
  • Contents

  • Anchor Shot Detection Based on Face Detection and SIFT
  • YANG Wu-Yi,ZENG Zhi,ZHANG Shu-Wu and LI He-Ping
  • 2009,20(9):2417-2425 [Abstract(3313)]  [View PDF(3474)627.73 K]
  • Efficient Trajectory Outlier Detection Algorithm Based on R-Tree
  • LIU Liang-Xu,QIAO Shao-Jie,LIU Bin,LE Jia-Jin and TANG Chang-Jie
  • 2009,20(9):2426-2435 [Abstract(3604)]  [View PDF(4563)704.84 K]
  • Efficient Subgraph Query Processing Algorithms on Graph-Structured XML Documents
  • WANG Hong-Zhi,LUO Ji-Zhou and LI Jian-Zhong
  • 2009,20(9):2436-2449 [Abstract(3222)]  [View PDF(3685)766.42 K]
  • Effective Image Auto-Annotation via Discriminative Hyperplane Tree Based Generative Model
  • WANG Mei,ZHOU Xiang-Dong,XU Hong-Tao and SHI Bai-Le
  • 2009,20(9):2450-2461 [Abstract(3046)]  [View PDF(2992)766.32 K]
  • Storage Optimized Containment-Encoded Intervals Indexing for Data Stream Querying
  • YAO Qiu-Lin,WANG Ying,LIU Ping and GUO Li
  • 2009,20(9):2462-2469 [Abstract(2421)]  [View PDF(2861)545.56 K]
  • Review Articles

  • Techniques of Network Distance Prediction
  • XING Chang-You and CHEN Ming
  • 2009,20(9):2470-2482 [Abstract(6020)]  [View PDF(5409)716.78 K]
  • Contents

  • MAC Protocol for Wireless Sensor Networks via Collaborative Compression
  • HU Yu-Peng,LIN Ya-Ping,JIANG Hong-Yan,LI Xiao-Long and ZHOU Si-Wang
  • 2009,20(9):2483-2494 [Abstract(3268)]  [View PDF(2994)676.46 K]
  • Hierarchical Role-Based Delegation Authorization Execution Model for Service Grid
  • CHEN Zhi-Gang,GUI Jin-Song and GUO Ying
  • 2009,20(9):2495-2510 [Abstract(3125)]  [View PDF(3192)923.53 K]
  • Load Balancing for Home Agents in MIPv6 Based on Active Overload Prevention
  • ZHANG Han-Wen,ZHANG Yu-Jun,MA Chao and LI Zhong-Cheng
  • 2009,20(9):2511-2519 [Abstract(2908)]  [View PDF(3203)1.44 M]
  • Efficient Fault Diagnosis Algorithm in Dynamic Internet Service Environment
  • CHU Ling-Wei,ZOU Shi-Hong,CHENG Shi-Duan,TIAN Chun-Qi and WANG Wen-Dong
  • 2009,20(9):2520-2530 [Abstract(3235)]  [View PDF(3473)703.92 K]
  • Collusion Problem of the EBS-Based Dynamic Key Management Scheme
  • KONG Fan-Rui,LI Chun-Wen,DING Qing-Qing,JIAO Fei and GU Qi-Bin
  • 2009,20(9):2531-2541 [Abstract(3063)]  [View PDF(3167)796.80 K]
  • Truthful Mechanisms for Maximum Lifetime Routing in Wireless Ad Hoc Networks
  • XIE Zhi-Peng and ZHANG Qing
  • 2009,20(9):2542-2557 [Abstract(3059)]  [View PDF(3226)718.49 K]
  • Adaptive Client Puzzle Scheme Against Denial-of-Service Attacks
  • CHEN Rui-Chuan,GUO Wen-Jia,TANG Li-Yong and CHEN Zhong
  • 2009,20(9):2558-2573 [Abstract(2541)]  [View PDF(3147)754.09 K]
  • Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks
  • SUN Yu-Xing,HUANG Song-Hua,CHEN Li-Jun and XIE Li
  • 2009,20(9):2574-2586 [Abstract(3557)]  [View PDF(3774)607.50 K]
  • Impossible Differential Cryptanalysis of CLEFIA-128/192/256
  • WANG Wei and WANG Xiao-Yun
  • 2009,20(9):2587-2596 [Abstract(3349)]  [View PDF(3448)505.24 K]
  • Multi-Camera Collaboration Based on Trifocal Tensor Transfer
  • LIANG Hua,LIU Yun-Hui and CAI Xuan-Ping
  • 2009,20(9):2597-2606 [Abstract(3033)]  [View PDF(3307)843.41 K]
  • Locally Linear Embedding Based on Relative Manifold
  • WEN Gui-Hua,LU Ting-Hui,JIANG Li-Jun and WEN Jun
  • 2009,20(9):3476-2386 [Abstract(2946)]  [View PDF(3901)1.38 M]
  • Triangle Mesh Compression Based on Reverse Subdivision for Mobile Terminals
  • MA Jian-Ping,LUO Xiao-Nan,CHEN Bo and LI Zheng
  • 2009,20(9):3607-2615 [Abstract(2798)]  [View PDF(3706)747.07 K]