Volume 21,Issue 11,2010 Table of Contents

Other Issues:  
  
Contents

  • Decomposition of Large Class Diagrams Generated by Reverse Engineering
  • LIU Hui,SHAO Wei-Zhong and MA Zhi-Yi
  • 2010,21(11):2701-2710 [Abstract(3826)]  [View PDF(4875)385.33 K]
  • Weak Join for the Constraint-Based Polyehdra Abstract Domain
  • CHEN Li-Qian,WANG Ji and LIU Wan-Wei
  • 2010,21(11):2711-2724 [Abstract(4009)]  [View PDF(3619)664.29 K]
  • Identification of Centrally Managed Aggregations in Design Patterns Using Shape Analysis
  • ZHOU Xiao-Yu,QIAN Ju,CHEN Lin and XU Bao-Wen
  • 2010,21(11):2725-2737 [Abstract(4005)]  [View PDF(3516)568.66 K]
  • Method for Generating Software Architecture Models from Formal Specifications
  • ZHU Yi,HUANG Zhi-Qiu,CAO Zi-Ning,ZHOU Hang and LIU Ya-Ping
  • 2010,21(11):2738-2751 [Abstract(4525)]  [View PDF(4304)436.65 K]
  • Syntax and Semantics of Timed Property Sequence Chart
  • ZHANG Peng-Cheng,LI Bi-Xin and LI Wen-Rui
  • 2010,21(11):2752-2767 [Abstract(4367)]  [View PDF(3955)709.02 K]
  • Component Substitutability Analysis and Verification Based on Behavior Automata
  • ZHANG Jing-Zhou,REN Hong-Min,ZONG Yu-Wei,QIAN Le-Qiu and ZHU San-Yuan
  • 2010,21(11):2768-2781 [Abstract(3983)]  [View PDF(3421)593.25 K]
  • Covering Model of Granular Computing
  • SHE Yan-Hong and WANG Guo-Jun
  • 2010,21(11):2782-2789 [Abstract(4226)]  [View PDF(3343)329.62 K]
  • High Efficient Complex System Genetic Algorithm
  • ZHUANG Jian,YANG Qing-Yu,DU Hai-Feng and YU De-Hong
  • 2010,21(11):2790-2801 [Abstract(4341)]  [View PDF(4536)453.83 K]
  • Clustering Algorithm Based on the Distributions of Intrinsic Clusters
  • ZENG Yi-Ling,XU Hong-Bo,WU Gao-Wei and BAI Shuo
  • 2010,21(11):2802-2813 [Abstract(3898)]  [View PDF(3935)507.84 K]
  • Semi-Supervised Cluster Ensemble Model Based on Bayesian Network
  • WANG Hong-Jun,LI Zhi-Shu,QI Jian-Huai,CHENG Yang,ZHOU Peng and ZHOU Wei
  • 2010,21(11):2814-2825 [Abstract(5239)]  [View PDF(4646)456.73 K]
  • Possibilistic Extension Rules for Reasoning and Knowledge Compilation
  • YIN Ming-Hao,SUN Ji-Gui,LIN Hai and WU Xia
  • 2010,21(11):2826-2837 [Abstract(3502)]  [View PDF(3293)397.10 K]
  • Classification Algorithm Combined GCM with CCM in Cancer Recognition
  • LU Xin-Guo,Lin Ya-Ping,Luo Jia-Wei and Li Dan
  • 2010,21(11):2838-2851 [Abstract(3946)]  [View PDF(3935)504.36 K]
  • Analyzing the Characteristics of Application Traffic Behavior Based on Chi-Square Statistics
  • CHEN Liang and GONG Jian
  • 2010,21(11):2852-2865 [Abstract(3986)]  [View PDF(4085)470.09 K]
  • Performance Optimization for IEEE 802.11 with QoS Differentiation Supporting
  • MAO Jian-Bing,MAO Yu-Ming,LENG Su-Peng and BAI Xiang
  • 2010,21(11):2866-2882 [Abstract(4156)]  [View PDF(3472)671.35 K]
  • Localization in Wireless Sensor Network Using Locality Preserving Canonical Correlation Analysis
  • GU Jing-Jing,CHEN Song-Can and ZHUANG Yi
  • 2010,21(11):2883-2891 [Abstract(4250)]  [View PDF(3965)377.47 K]
  • Network Coding Method Using Heuristic Algorithms for Wireless Ad Hoc Networks
  • JIAO Xian-Long,WANG Xiao-Dong and ZHOU Xing-Ming
  • 2010,21(11):2892-2905 [Abstract(3864)]  [View PDF(3683)546.34 K]
  • Forward-Secure Multi-Signature in the Standard Model: Security Model and Construction
  • YU Jia,HAO Rong,KONG Fan-Yu,CHENG Xiang-Guo and GUO Xiang-Fa
  • 2010,21(11):2920-2932 [Abstract(4687)]  [View PDF(3625)411.77 K]
  • Design of Double Rounds Clustering Protocol for Improving Energy Efficient in Wireless Sensor Networks
  • CHEN Qing-Zhang,ZHAO Xiao-Min and CHEN Xiao-Ying
  • 2010,21(11):2933-2943 [Abstract(4224)]  [View PDF(3774)469.05 K]
  • Critical Vulnerability Analysis and Exploitation Based on Exception Capture
  • SHI Yun-Feng,ZHANG Jin-Xiang and FENG Jian-Hua
  • 2010,21(11):2944-2958 [Abstract(3264)]  [View PDF(3742)434.38 K]
  • Real-Time Subsurface Scattering Rendering Method for Dynamic Objects
  • ZHAO Qin-Ping,LI Shuai,HAO Ai-Min and GAO Yu-Jian
  • 2010,21(11):2959-2970 [Abstract(3427)]  [View PDF(4493)599.80 K]
  • Near Duplicate Keyframes Identifying and Correlation Analyzing of News Video Stories
  • WEN Jun,WU Ling-Da,ZEN Pu and LUAN Xi-Dao
  • 2010,21(11):2971-2984 [Abstract(3519)]  [View PDF(3564)652.81 K]
  • Stereo Matching Algorithm Using Segment Geometric Constraint and Disparity Probability
  • ZHAI Zhen-Gang,LU Yao and ZHAO Hong
  • 2010,21(11):2985-2998 [Abstract(3559)]  [View PDF(4493)605.19 K]
  • Online First

  • Prerequisite to 1-Connected Vehicular Ad Hoc Networks in Highway Scenarios
  • XIONG Wei and LI Qing-Quan
  • 2010,21(11):2906-2919 [Abstract(5264)]  [View PDF(5146)1001.99 K]