Volume 21,Issue 3,2010 Table of Contents

Other Issues:  
  
Contents

  • Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SONGCI
  • Chang-Le ZHOU,Wei YOU and Xiao-Jun Ding
  • 2010,21(3):427-437 [Abstract(24002)]  [View PDF(27540)308.76 K]
  • RFID Data Interpolation Algorithm Based on Dynamic Probabilistic Path-Event Model
  • GU Yu,YU Ge,LI Xiao-Jing and WANG Yi
  • 2010,21(3):438-451 [Abstract(3656)]  [View PDF(4061)1.27 M]
  • Approach for Object Recognition Based on a Computational Model of Feature Binding
  • LIU Xi,SHI Zhong-Zhi,SHI Zhi-Wei and SHI Zhi-Ping
  • 2010,21(3):452-460 [Abstract(4279)]  [View PDF(3836)964.63 K]
  • Hidden Markov Model for Multi-Thread Programs Time Sequence Analysis
  • KONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,SHUAI Jian-Mei and GONG Tao
  • 2010,21(3):461-472 [Abstract(3965)]  [View PDF(4161)814.22 K]
  • Real-Time Query Processing for Sensor Networks Based on Ant Algorithm
  • YU Jian-Ping and LIN Ya-Ping
  • 2010,21(3):473-489 [Abstract(3948)]  [View PDF(5625)1.32 M]
  • Relative Distance-Aware Data Delivery Scheme for Delay Tolerant Mobile Sensor Networks
  • XU Fu-Long,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai,LI Jian-Ping and ZHU Jin-Qi
  • 2010,21(3):490-504 [Abstract(3570)]  [View PDF(3647)1.03 M]
  • Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks
  • YUAN Ting,MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2010,21(3):516-527 [Abstract(4128)]  [View PDF(3797)940.68 K]
  • Approach of Degenerate Test Set Generation Based on Secure State Transition
  • CHENG Liang,ZHANG Yang and FENG Deng-Guo
  • 2010,21(3):539-547 [Abstract(3771)]  [View PDF(4040)658.31 K]
  • Collision Classification Model-Based Collision Resolution Algorithm
  • ZHANG Qi-Fei,LIU Wei,SUN Bao-Lin,GUI Chao and YAN Bing
  • 2010,21(3):548-563 [Abstract(3925)]  [View PDF(3675)1.08 M]
  • Markov Model of DCF Protocol Based on Fixed Slot in Multi-Hop Ad Hoc Networks
  • LEI Lei1,XU Zong-Ze and CAI Wei-Ling
  • 2010,21(3):564-574 [Abstract(3857)]  [View PDF(3616)815.49 K]
  • Online First

  • Approach for Efficient Subgraph Isomorphism Testing for Multiple Graphs
  • ZHANG Shuo,LI Jian-Zhong,,GAO Hong and ZOU Zhao-Nian
  • 2010,21(3):401-414 [Abstract(6241)]  [View PDF(6775)915.78 K]
  • Pointer Logic for Verification of Pointer Programs
  • CHEN Yi-Yun,LI Zhao-Peng,WANG Zhi-Fang and HUA Bao-Jian
  • 2010,21(3):415-426 [Abstract(4065)]  [View PDF(3294)857.80 K]
  • Reputation-Based Collaborative Management Method for Inter-Domain Routing Security
  • HU Ning,ZOU Peng and ZHU Pei-Dong
  • 2010,21(3):505-515 [Abstract(5059)]  [View PDF(4566)767.44 K]
  • Delay-Guaranteed Key Flow Routing Adjustment Algorithm
  • PEI Yu-Jie,WANG Hong-Bo and CHENG Shi-Duan
  • 2010,21(3):528-538 [Abstract(4895)]  [View PDF(5960)989.71 K]