Volume 21,Issue 6,2010 Table of Contents

Other Issues:  
  
Contents

  • Decision-Centric Software Architecture Design Method
  • CUI Xiao-Feng,SUN Yan-Chun and MEI Hong
  • 2010,21(6):1196-1207 [Abstract(5778)]  [View PDF(6476)834.38 K]
  • Asynchronous Time Consistency Control Methods in Distributed Interactive Simulation
  • ZHANG Wei,ZHOU Hang-Jun,PENG Yu-Xing and LI Si-Kun
  • 2010,21(6):1208-1219 [Abstract(4814)]  [View PDF(5720)716.62 K]
  • Hash Join Query Optimization Based on Shared-Cache Chip Multi-Processor
  • DENG Ya-Dan,JING Ning and XIONG Wei
  • 2010,21(6):1220-1232 [Abstract(5546)]  [View PDF(7001)842.19 K]
  • Temporal Workflow Process Model and Its Soundness Verification
  • YU Yang,TANG Yong,PAN Mao-Lin,ZHENG Ting-Ting and MAI Jian-Bin
  • 2010,21(6):1233-1253 [Abstract(5024)]  [View PDF(6436)1.19 M]
  • Modeling and Analysis of Internetware Based on PTCPN
  • ZHOU Hang,HUANG Zhi-Qiu,ZHANG Guang-Quan,ZHU Yi and HU Jun
  • 2010,21(6):1254-1267 [Abstract(5293)]  [View PDF(5961)923.79 K]
  • Paraphrase Collocation Extraction Based on Binary Classification
  • ZHAO Shi-Qi,ZHAO Lin,LIU Ting and LI Sheng
  • 2010,21(6):1267-1276 [Abstract(5124)]  [View PDF(5225)600.32 K]
  • Chinese Word Sense Disambiguation Based on Maximum Entropy Model with Feature Selection
  • HE Jing-Zhou and WANG Hou-Feng
  • 2010,21(6):1287-1295 [Abstract(5937)]  [View PDF(7172)535.38 K]
  • Hybrid Self-Adaptive Orthogonal Genetic Algorithm for Solving Global Optimization Problems
  • JIANG Zhong-Yang,CAI Zi-Xing and WANG Yong
  • 2010,21(6):1296-1307 [Abstract(6149)]  [View PDF(5495)724.79 K]
  • Haar Wavelet Data Compression Algorithm with Error Bound for Wireless Sensor Networks
  • ZHANG Jian-Ming,LIN Ya-Ping,ZHOU Si-Wang and OUYANG Jing-Cheng
  • 2010,21(6):1364-1377 [Abstract(4343)]  [View PDF(6159)852.11 K]
  • Multi-Flow Network Fairness Selection Scheme Based on Weighted Bigraph Model
  • YUAN Yao,ZHANG Yu-Cheng,DONG Wen-Xia,ZHENG Ru-Song,YANG Yu-Bo and SHI Jing-Lin
  • 2010,21(6):1378-1390 [Abstract(4476)]  [View PDF(5409)919.45 K]
  • Hits and Holds: Two Algorithms for Identifying the Elephant Flows
  • WANG Hong and GONG Zheng-Hu
  • 2010,21(6):1391-1403 [Abstract(5660)]  [View PDF(8285)886.39 K]
  • Cluster-Based Location Management Scheme for Wireless Mesh Networks
  • HU Wei-Qi,ZOU Shi-Hong,CHENG Shi-Duan,HU Bo and WANG Wen-Dong
  • 2010,21(6):1404-1415 [Abstract(4902)]  [View PDF(5090)922.62 K]
  • Distributed Virtue Backbone Network Algorithm Based on Topology Characteristic
  • XIE Wen-Bin,LI Jia,XIAN Ming and CHEN Yong-Guang
  • 2010,21(6):1416-1425 [Abstract(4725)]  [View PDF(5464)712.61 K]
  • Mean Shift Based Adaptive Texture Image Segmentation Method
  • WANG Shuang,XIA Yu and JIAO Li-Cheng
  • 2010,21(6):1451-1461 [Abstract(4834)]  [View PDF(6229)803.03 K]
  • Improved Multivariate Data Visualization Method
  • SUN Yang,TANG Jiu-Yang,TANG Da-Quan and XIAO Wei-Dong
  • 2010,21(6):1462-1472 [Abstract(4853)]  [View PDF(5758)728.62 K]
  • Explicit Multi-Degree Reduction of Said-Bézier Generalized Ball Curves
  • LIU Gang and WANG Guo-Jin
  • 2010,21(6):1473-1479 [Abstract(4039)]  [View PDF(4421)536.03 K]
  • Review Articles

  • Multicast Routing Protocol for Wireless Mesh Networks
  • FANG Yi-Lin,LI Fang-Min,WU Peng,LIU Xin-Hua and MA Xiao-Lin
  • 2010,21(6):1308-1325 [Abstract(8558)]  [View PDF(11350)1.43 M]
  • Key Techniques of Identifier-Based Routing
  • HOU Jie,LIU Ya-Ping and GONG Zheng-Hu
  • 2010,21(6):1326-1340 [Abstract(7525)]  [View PDF(9398)1.12 M]
  • Online First

  • Approach for Autonomous Web Service Aggregation Driven by Requirement
  • YE Rong-Hua,JIN Zhi,WANG Pu-Wei,ZHENG Li-Wei and ZHENG Li-Wei
  • 2010,21(6):1181-1195 [Abstract(7246)]  [View PDF(6711)990.38 K]
  • Complete Discriminant Locality Preserving Projections for Face Recognition
  • YANG Li-Ping,GONG Wei-Guo,GU Xiao-Hua,LI Wei-Hong and DU Xing
  • 2010,21(6):1277-1286 [Abstract(6638)]  [View PDF(7426)734.79 K]
  • Evaluation Approach of Subjective Trust Based on Cloud Model
  • WANG Shou-Xin,ZHANG Li and LI He-Song
  • 2010,21(6):1341-1352 [Abstract(8560)]  [View PDF(11425)804.19 K]
  • Research on Location Management Based on Irregular Cellular Network Topology Model
  • ZHAO Xiao-Min,LANG Mei-Ya and CHEN Qing-Zhang
  • 2010,21(6):1353-1363 [Abstract(6286)]  [View PDF(6545)837.61 K]
  • Implicit-Flow-Sensitive Method for Detection of Trojan-Spy Programs
  • LI Jia-Jing,LIANG Zhi-Yin,WEI Tao,ZOU Wei and MAO Jian
  • 2010,21(6):1426-4137 [Abstract(5459)]  [View PDF(6196)709.42 K]
  • Rapid and Automatic Method for 3D Scanned Data Registration
  • YANG Shen,QI Yue,SHEN Xu-Kun and ZHAO Qin-Ping
  • 2010,21(6):1438-1450 [Abstract(5139)]  [View PDF(6769)1.28 M]