Volume 21,Issue 6,2010 Table of Contents

Other Issues:  
  
Contents

  • Decision-Centric Software Architecture Design Method
  • CUI Xiao-Feng,SUN Yan-Chun and MEI Hong
  • 2010,21(6):1196-1207 [Abstract(4021)]  [View PDF(4110)834.38 K]
  • Asynchronous Time Consistency Control Methods in Distributed Interactive Simulation
  • ZHANG Wei,ZHOU Hang-Jun,PENG Yu-Xing and LI Si-Kun
  • 2010,21(6):1208-1219 [Abstract(3389)]  [View PDF(3341)716.62 K]
  • Hash Join Query Optimization Based on Shared-Cache Chip Multi-Processor
  • DENG Ya-Dan,JING Ning and XIONG Wei
  • 2010,21(6):1220-1232 [Abstract(4052)]  [View PDF(4052)842.19 K]
  • Temporal Workflow Process Model and Its Soundness Verification
  • YU Yang,TANG Yong,PAN Mao-Lin,ZHENG Ting-Ting and MAI Jian-Bin
  • 2010,21(6):1233-1253 [Abstract(3606)]  [View PDF(3805)1.19 M]
  • Modeling and Analysis of Internetware Based on PTCPN
  • ZHOU Hang,HUANG Zhi-Qiu,ZHANG Guang-Quan,ZHU Yi and HU Jun
  • 2010,21(6):1254-1267 [Abstract(3974)]  [View PDF(3653)923.79 K]
  • Paraphrase Collocation Extraction Based on Binary Classification
  • ZHAO Shi-Qi,ZHAO Lin,LIU Ting and LI Sheng
  • 2010,21(6):1267-1276 [Abstract(3831)]  [View PDF(3214)600.32 K]
  • Chinese Word Sense Disambiguation Based on Maximum Entropy Model with Feature Selection
  • HE Jing-Zhou and WANG Hou-Feng
  • 2010,21(6):1287-1295 [Abstract(4369)]  [View PDF(4690)535.38 K]
  • Hybrid Self-Adaptive Orthogonal Genetic Algorithm for Solving Global Optimization Problems
  • JIANG Zhong-Yang,CAI Zi-Xing and WANG Yong
  • 2010,21(6):1296-1307 [Abstract(4552)]  [View PDF(3338)724.79 K]
  • Haar Wavelet Data Compression Algorithm with Error Bound for Wireless Sensor Networks
  • ZHANG Jian-Ming,LIN Ya-Ping,ZHOU Si-Wang and OUYANG Jing-Cheng
  • 2010,21(6):1364-1377 [Abstract(3156)]  [View PDF(3996)852.11 K]
  • Multi-Flow Network Fairness Selection Scheme Based on Weighted Bigraph Model
  • YUAN Yao,ZHANG Yu-Cheng,DONG Wen-Xia,ZHENG Ru-Song,YANG Yu-Bo and SHI Jing-Lin
  • 2010,21(6):1378-1390 [Abstract(3182)]  [View PDF(3467)919.45 K]
  • Hits and Holds: Two Algorithms for Identifying the Elephant Flows
  • WANG Hong and GONG Zheng-Hu
  • 2010,21(6):1391-1403 [Abstract(3858)]  [View PDF(4303)886.39 K]
  • Cluster-Based Location Management Scheme for Wireless Mesh Networks
  • HU Wei-Qi,ZOU Shi-Hong,CHENG Shi-Duan,HU Bo and WANG Wen-Dong
  • 2010,21(6):1404-1415 [Abstract(3728)]  [View PDF(3140)922.62 K]
  • Distributed Virtue Backbone Network Algorithm Based on Topology Characteristic
  • XIE Wen-Bin,LI Jia,XIAN Ming and CHEN Yong-Guang
  • 2010,21(6):1416-1425 [Abstract(3466)]  [View PDF(3379)712.61 K]
  • Mean Shift Based Adaptive Texture Image Segmentation Method
  • WANG Shuang,XIA Yu and JIAO Li-Cheng
  • 2010,21(6):1451-1461 [Abstract(3618)]  [View PDF(3858)803.03 K]
  • Improved Multivariate Data Visualization Method
  • SUN Yang,TANG Jiu-Yang,TANG Da-Quan and XIAO Wei-Dong
  • 2010,21(6):1462-1472 [Abstract(3351)]  [View PDF(3544)728.62 K]
  • Explicit Multi-Degree Reduction of Said-Bézier Generalized Ball Curves
  • LIU Gang and WANG Guo-Jin
  • 2010,21(6):1473-1479 [Abstract(2706)]  [View PDF(2625)536.03 K]
  • Review Articles

  • Multicast Routing Protocol for Wireless Mesh Networks
  • FANG Yi-Lin,LI Fang-Min,WU Peng,LIU Xin-Hua and MA Xiao-Lin
  • 2010,21(6):1308-1325 [Abstract(6323)]  [View PDF(6776)1.43 M]
  • Key Techniques of Identifier-Based Routing
  • HOU Jie,LIU Ya-Ping and GONG Zheng-Hu
  • 2010,21(6):1326-1340 [Abstract(5589)]  [View PDF(5765)1.12 M]
  • Online First

  • Approach for Autonomous Web Service Aggregation Driven by Requirement
  • YE Rong-Hua,JIN Zhi,WANG Pu-Wei,ZHENG Li-Wei and ZHENG Li-Wei
  • 2010,21(6):1181-1195 [Abstract(5780)]  [View PDF(4686)990.38 K]
  • Complete Discriminant Locality Preserving Projections for Face Recognition
  • YANG Li-Ping,GONG Wei-Guo,GU Xiao-Hua,LI Wei-Hong and DU Xing
  • 2010,21(6):1277-1286 [Abstract(5028)]  [View PDF(4995)734.79 K]
  • Evaluation Approach of Subjective Trust Based on Cloud Model
  • WANG Shou-Xin,ZHANG Li and LI He-Song
  • 2010,21(6):1341-1352 [Abstract(6799)]  [View PDF(8259)804.19 K]
  • Research on Location Management Based on Irregular Cellular Network Topology Model
  • ZHAO Xiao-Min,LANG Mei-Ya and CHEN Qing-Zhang
  • 2010,21(6):1353-1363 [Abstract(4904)]  [View PDF(4500)837.61 K]
  • Implicit-Flow-Sensitive Method for Detection of Trojan-Spy Programs
  • LI Jia-Jing,LIANG Zhi-Yin,WEI Tao,ZOU Wei and MAO Jian
  • 2010,21(6):1426-4137 [Abstract(3814)]  [View PDF(4029)709.42 K]
  • Rapid and Automatic Method for 3D Scanned Data Registration
  • YANG Shen,QI Yue,SHEN Xu-Kun and ZHAO Qin-Ping
  • 2010,21(6):1438-1450 [Abstract(3644)]  [View PDF(4266)1.28 M]