Volume 21,Issue 3,2010 Table of Contents

Other Issues:  
  
Contents

  • Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SONGCI
  • Chang-Le ZHOU,Wei YOU and Xiao-Jun Ding
  • 2010,21(3):427-437 [Abstract(23481)]  [View PDF(27133)308.76 K]
  • RFID Data Interpolation Algorithm Based on Dynamic Probabilistic Path-Event Model
  • GU Yu,YU Ge,LI Xiao-Jing and WANG Yi
  • 2010,21(3):438-451 [Abstract(3597)]  [View PDF(4029)1.27 M]
  • Approach for Object Recognition Based on a Computational Model of Feature Binding
  • LIU Xi,SHI Zhong-Zhi,SHI Zhi-Wei and SHI Zhi-Ping
  • 2010,21(3):452-460 [Abstract(4217)]  [View PDF(3799)964.63 K]
  • Hidden Markov Model for Multi-Thread Programs Time Sequence Analysis
  • KONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,SHUAI Jian-Mei and GONG Tao
  • 2010,21(3):461-472 [Abstract(3870)]  [View PDF(4119)814.22 K]
  • Real-Time Query Processing for Sensor Networks Based on Ant Algorithm
  • YU Jian-Ping and LIN Ya-Ping
  • 2010,21(3):473-489 [Abstract(3898)]  [View PDF(5607)1.32 M]
  • Relative Distance-Aware Data Delivery Scheme for Delay Tolerant Mobile Sensor Networks
  • XU Fu-Long,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai,LI Jian-Ping and ZHU Jin-Qi
  • 2010,21(3):490-504 [Abstract(3476)]  [View PDF(3610)1.03 M]
  • Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks
  • YUAN Ting,MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2010,21(3):516-527 [Abstract(4065)]  [View PDF(3758)940.68 K]
  • Approach of Degenerate Test Set Generation Based on Secure State Transition
  • CHENG Liang,ZHANG Yang and FENG Deng-Guo
  • 2010,21(3):539-547 [Abstract(3720)]  [View PDF(4001)658.31 K]
  • Collision Classification Model-Based Collision Resolution Algorithm
  • ZHANG Qi-Fei,LIU Wei,SUN Bao-Lin,GUI Chao and YAN Bing
  • 2010,21(3):548-563 [Abstract(3869)]  [View PDF(3645)1.08 M]
  • Markov Model of DCF Protocol Based on Fixed Slot in Multi-Hop Ad Hoc Networks
  • LEI Lei1,XU Zong-Ze and CAI Wei-Ling
  • 2010,21(3):564-574 [Abstract(3801)]  [View PDF(3587)815.49 K]
  • Online First

  • Approach for Efficient Subgraph Isomorphism Testing for Multiple Graphs
  • ZHANG Shuo,LI Jian-Zhong,,GAO Hong and ZOU Zhao-Nian
  • 2010,21(3):401-414 [Abstract(6176)]  [View PDF(6729)915.78 K]
  • Pointer Logic for Verification of Pointer Programs
  • CHEN Yi-Yun,LI Zhao-Peng,WANG Zhi-Fang and HUA Bao-Jian
  • 2010,21(3):415-426 [Abstract(4005)]  [View PDF(3259)857.80 K]
  • Reputation-Based Collaborative Management Method for Inter-Domain Routing Security
  • HU Ning,ZOU Peng and ZHU Pei-Dong
  • 2010,21(3):505-515 [Abstract(5001)]  [View PDF(4519)767.44 K]
  • Delay-Guaranteed Key Flow Routing Adjustment Algorithm
  • PEI Yu-Jie,WANG Hong-Bo and CHENG Shi-Duan
  • 2010,21(3):528-538 [Abstract(4847)]  [View PDF(5940)989.71 K]