Volume 21,Issue 3,2010 Table of Contents

Other Issues:  
  
Contents

  • Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SONGCI
  • Chang-Le ZHOU,Wei YOU and Xiao-Jun Ding
  • 2010,21(3):427-437 [Abstract(28120)]  [View PDF(31107)308.76 K]
  • RFID Data Interpolation Algorithm Based on Dynamic Probabilistic Path-Event Model
  • GU Yu,YU Ge,LI Xiao-Jing and WANG Yi
  • 2010,21(3):438-451 [Abstract(4198)]  [View PDF(4466)1.27 M]
  • Approach for Object Recognition Based on a Computational Model of Feature Binding
  • LIU Xi,SHI Zhong-Zhi,SHI Zhi-Wei and SHI Zhi-Ping
  • 2010,21(3):452-460 [Abstract(4834)]  [View PDF(4508)964.63 K]
  • Hidden Markov Model for Multi-Thread Programs Time Sequence Analysis
  • KONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,SHUAI Jian-Mei and GONG Tao
  • 2010,21(3):461-472 [Abstract(4553)]  [View PDF(4695)814.22 K]
  • Real-Time Query Processing for Sensor Networks Based on Ant Algorithm
  • YU Jian-Ping and LIN Ya-Ping
  • 2010,21(3):473-489 [Abstract(4375)]  [View PDF(6136)1.32 M]
  • Relative Distance-Aware Data Delivery Scheme for Delay Tolerant Mobile Sensor Networks
  • XU Fu-Long,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai,LI Jian-Ping and ZHU Jin-Qi
  • 2010,21(3):490-504 [Abstract(4041)]  [View PDF(3930)1.03 M]
  • Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks
  • YUAN Ting,MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2010,21(3):516-527 [Abstract(4641)]  [View PDF(4167)940.68 K]
  • Approach of Degenerate Test Set Generation Based on Secure State Transition
  • CHENG Liang,ZHANG Yang and FENG Deng-Guo
  • 2010,21(3):539-547 [Abstract(4243)]  [View PDF(4311)658.31 K]
  • Collision Classification Model-Based Collision Resolution Algorithm
  • ZHANG Qi-Fei,LIU Wei,SUN Bao-Lin,GUI Chao and YAN Bing
  • 2010,21(3):548-563 [Abstract(4398)]  [View PDF(3951)1.08 M]
  • Markov Model of DCF Protocol Based on Fixed Slot in Multi-Hop Ad Hoc Networks
  • LEI Lei1,XU Zong-Ze and CAI Wei-Ling
  • 2010,21(3):564-574 [Abstract(4357)]  [View PDF(3921)815.49 K]
  • Online First

  • Approach for Efficient Subgraph Isomorphism Testing for Multiple Graphs
  • ZHANG Shuo,LI Jian-Zhong,,GAO Hong and ZOU Zhao-Nian
  • 2010,21(3):401-414 [Abstract(6756)]  [View PDF(7318)915.78 K]
  • Pointer Logic for Verification of Pointer Programs
  • CHEN Yi-Yun,LI Zhao-Peng,WANG Zhi-Fang and HUA Bao-Jian
  • 2010,21(3):415-426 [Abstract(4602)]  [View PDF(3619)857.80 K]
  • Reputation-Based Collaborative Management Method for Inter-Domain Routing Security
  • HU Ning,ZOU Peng and ZHU Pei-Dong
  • 2010,21(3):505-515 [Abstract(5528)]  [View PDF(5087)767.44 K]
  • Delay-Guaranteed Key Flow Routing Adjustment Algorithm
  • PEI Yu-Jie,WANG Hong-Bo and CHENG Shi-Duan
  • 2010,21(3):528-538 [Abstract(5336)]  [View PDF(6290)989.71 K]