Volume 21,Issue 6,2010 Table of Contents

Other Issues:  
  
Contents

  • Decision-Centric Software Architecture Design Method
  • CUI Xiao-Feng,SUN Yan-Chun and MEI Hong
  • 2010,21(6):1196-1207 [Abstract(3970)]  [View PDF(4070)834.38 K]
  • Asynchronous Time Consistency Control Methods in Distributed Interactive Simulation
  • ZHANG Wei,ZHOU Hang-Jun,PENG Yu-Xing and LI Si-Kun
  • 2010,21(6):1208-1219 [Abstract(3349)]  [View PDF(3318)716.62 K]
  • Hash Join Query Optimization Based on Shared-Cache Chip Multi-Processor
  • DENG Ya-Dan,JING Ning and XIONG Wei
  • 2010,21(6):1220-1232 [Abstract(3997)]  [View PDF(4015)842.19 K]
  • Temporal Workflow Process Model and Its Soundness Verification
  • YU Yang,TANG Yong,PAN Mao-Lin,ZHENG Ting-Ting and MAI Jian-Bin
  • 2010,21(6):1233-1253 [Abstract(3563)]  [View PDF(3775)1.19 M]
  • Modeling and Analysis of Internetware Based on PTCPN
  • ZHOU Hang,HUANG Zhi-Qiu,ZHANG Guang-Quan,ZHU Yi and HU Jun
  • 2010,21(6):1254-1267 [Abstract(3934)]  [View PDF(3629)923.79 K]
  • Paraphrase Collocation Extraction Based on Binary Classification
  • ZHAO Shi-Qi,ZHAO Lin,LIU Ting and LI Sheng
  • 2010,21(6):1267-1276 [Abstract(3784)]  [View PDF(3181)600.32 K]
  • Chinese Word Sense Disambiguation Based on Maximum Entropy Model with Feature Selection
  • HE Jing-Zhou and WANG Hou-Feng
  • 2010,21(6):1287-1295 [Abstract(4288)]  [View PDF(4602)535.38 K]
  • Hybrid Self-Adaptive Orthogonal Genetic Algorithm for Solving Global Optimization Problems
  • JIANG Zhong-Yang,CAI Zi-Xing and WANG Yong
  • 2010,21(6):1296-1307 [Abstract(4477)]  [View PDF(3311)724.79 K]
  • Haar Wavelet Data Compression Algorithm with Error Bound for Wireless Sensor Networks
  • ZHANG Jian-Ming,LIN Ya-Ping,ZHOU Si-Wang and OUYANG Jing-Cheng
  • 2010,21(6):1364-1377 [Abstract(3123)]  [View PDF(3964)852.11 K]
  • Multi-Flow Network Fairness Selection Scheme Based on Weighted Bigraph Model
  • YUAN Yao,ZHANG Yu-Cheng,DONG Wen-Xia,ZHENG Ru-Song,YANG Yu-Bo and SHI Jing-Lin
  • 2010,21(6):1378-1390 [Abstract(3141)]  [View PDF(3448)919.45 K]
  • Hits and Holds: Two Algorithms for Identifying the Elephant Flows
  • WANG Hong and GONG Zheng-Hu
  • 2010,21(6):1391-1403 [Abstract(3814)]  [View PDF(4226)886.39 K]
  • Cluster-Based Location Management Scheme for Wireless Mesh Networks
  • HU Wei-Qi,ZOU Shi-Hong,CHENG Shi-Duan,HU Bo and WANG Wen-Dong
  • 2010,21(6):1404-1415 [Abstract(3684)]  [View PDF(3113)922.62 K]
  • Distributed Virtue Backbone Network Algorithm Based on Topology Characteristic
  • XIE Wen-Bin,LI Jia,XIAN Ming and CHEN Yong-Guang
  • 2010,21(6):1416-1425 [Abstract(3422)]  [View PDF(3351)712.61 K]
  • Mean Shift Based Adaptive Texture Image Segmentation Method
  • WANG Shuang,XIA Yu and JIAO Li-Cheng
  • 2010,21(6):1451-1461 [Abstract(3580)]  [View PDF(3816)803.03 K]
  • Improved Multivariate Data Visualization Method
  • SUN Yang,TANG Jiu-Yang,TANG Da-Quan and XIAO Wei-Dong
  • 2010,21(6):1462-1472 [Abstract(3311)]  [View PDF(3516)728.62 K]
  • Explicit Multi-Degree Reduction of Said-Bézier Generalized Ball Curves
  • LIU Gang and WANG Guo-Jin
  • 2010,21(6):1473-1479 [Abstract(2628)]  [View PDF(2590)536.03 K]
  • Review Articles

  • Multicast Routing Protocol for Wireless Mesh Networks
  • FANG Yi-Lin,LI Fang-Min,WU Peng,LIU Xin-Hua and MA Xiao-Lin
  • 2010,21(6):1308-1325 [Abstract(6247)]  [View PDF(6703)1.43 M]
  • Key Techniques of Identifier-Based Routing
  • HOU Jie,LIU Ya-Ping and GONG Zheng-Hu
  • 2010,21(6):1326-1340 [Abstract(5512)]  [View PDF(5723)1.12 M]
  • Online First

  • Approach for Autonomous Web Service Aggregation Driven by Requirement
  • YE Rong-Hua,JIN Zhi,WANG Pu-Wei,ZHENG Li-Wei and ZHENG Li-Wei
  • 2010,21(6):1181-1195 [Abstract(5723)]  [View PDF(4658)990.38 K]
  • Complete Discriminant Locality Preserving Projections for Face Recognition
  • YANG Li-Ping,GONG Wei-Guo,GU Xiao-Hua,LI Wei-Hong and DU Xing
  • 2010,21(6):1277-1286 [Abstract(4979)]  [View PDF(4959)734.79 K]
  • Evaluation Approach of Subjective Trust Based on Cloud Model
  • WANG Shou-Xin,ZHANG Li and LI He-Song
  • 2010,21(6):1341-1352 [Abstract(6722)]  [View PDF(8236)804.19 K]
  • Research on Location Management Based on Irregular Cellular Network Topology Model
  • ZHAO Xiao-Min,LANG Mei-Ya and CHEN Qing-Zhang
  • 2010,21(6):1353-1363 [Abstract(4847)]  [View PDF(4469)837.61 K]
  • Implicit-Flow-Sensitive Method for Detection of Trojan-Spy Programs
  • LI Jia-Jing,LIANG Zhi-Yin,WEI Tao,ZOU Wei and MAO Jian
  • 2010,21(6):1426-4137 [Abstract(3768)]  [View PDF(4001)709.42 K]
  • Rapid and Automatic Method for 3D Scanned Data Registration
  • YANG Shen,QI Yue,SHEN Xu-Kun and ZHAO Qin-Ping
  • 2010,21(6):1438-1450 [Abstract(3571)]  [View PDF(4244)1.28 M]