Volume 21,Issue 6,2010 Table of Contents

Other Issues:  
  
Contents

  • Decision-Centric Software Architecture Design Method
  • CUI Xiao-Feng,SUN Yan-Chun and MEI Hong
  • 2010,21(6):1196-1207 [Abstract(4112)]  [View PDF(4209)834.38 K]
  • Asynchronous Time Consistency Control Methods in Distributed Interactive Simulation
  • ZHANG Wei,ZHOU Hang-Jun,PENG Yu-Xing and LI Si-Kun
  • 2010,21(6):1208-1219 [Abstract(3487)]  [View PDF(3407)716.62 K]
  • Hash Join Query Optimization Based on Shared-Cache Chip Multi-Processor
  • DENG Ya-Dan,JING Ning and XIONG Wei
  • 2010,21(6):1220-1232 [Abstract(4140)]  [View PDF(4134)842.19 K]
  • Temporal Workflow Process Model and Its Soundness Verification
  • YU Yang,TANG Yong,PAN Mao-Lin,ZHENG Ting-Ting and MAI Jian-Bin
  • 2010,21(6):1233-1253 [Abstract(3704)]  [View PDF(3893)1.19 M]
  • Modeling and Analysis of Internetware Based on PTCPN
  • ZHOU Hang,HUANG Zhi-Qiu,ZHANG Guang-Quan,ZHU Yi and HU Jun
  • 2010,21(6):1254-1267 [Abstract(4072)]  [View PDF(3697)923.79 K]
  • Paraphrase Collocation Extraction Based on Binary Classification
  • ZHAO Shi-Qi,ZHAO Lin,LIU Ting and LI Sheng
  • 2010,21(6):1267-1276 [Abstract(3912)]  [View PDF(3265)600.32 K]
  • Chinese Word Sense Disambiguation Based on Maximum Entropy Model with Feature Selection
  • HE Jing-Zhou and WANG Hou-Feng
  • 2010,21(6):1287-1295 [Abstract(4521)]  [View PDF(4786)535.38 K]
  • Hybrid Self-Adaptive Orthogonal Genetic Algorithm for Solving Global Optimization Problems
  • JIANG Zhong-Yang,CAI Zi-Xing and WANG Yong
  • 2010,21(6):1296-1307 [Abstract(4694)]  [View PDF(3397)724.79 K]
  • Haar Wavelet Data Compression Algorithm with Error Bound for Wireless Sensor Networks
  • ZHANG Jian-Ming,LIN Ya-Ping,ZHOU Si-Wang and OUYANG Jing-Cheng
  • 2010,21(6):1364-1377 [Abstract(3235)]  [View PDF(4045)852.11 K]
  • Multi-Flow Network Fairness Selection Scheme Based on Weighted Bigraph Model
  • YUAN Yao,ZHANG Yu-Cheng,DONG Wen-Xia,ZHENG Ru-Song,YANG Yu-Bo and SHI Jing-Lin
  • 2010,21(6):1378-1390 [Abstract(3256)]  [View PDF(3511)919.45 K]
  • Hits and Holds: Two Algorithms for Identifying the Elephant Flows
  • WANG Hong and GONG Zheng-Hu
  • 2010,21(6):1391-1403 [Abstract(3959)]  [View PDF(4522)886.39 K]
  • Cluster-Based Location Management Scheme for Wireless Mesh Networks
  • HU Wei-Qi,ZOU Shi-Hong,CHENG Shi-Duan,HU Bo and WANG Wen-Dong
  • 2010,21(6):1404-1415 [Abstract(3812)]  [View PDF(3187)922.62 K]
  • Distributed Virtue Backbone Network Algorithm Based on Topology Characteristic
  • XIE Wen-Bin,LI Jia,XIAN Ming and CHEN Yong-Guang
  • 2010,21(6):1416-1425 [Abstract(3549)]  [View PDF(3428)712.61 K]
  • Mean Shift Based Adaptive Texture Image Segmentation Method
  • WANG Shuang,XIA Yu and JIAO Li-Cheng
  • 2010,21(6):1451-1461 [Abstract(3685)]  [View PDF(3929)803.03 K]
  • Improved Multivariate Data Visualization Method
  • SUN Yang,TANG Jiu-Yang,TANG Da-Quan and XIAO Wei-Dong
  • 2010,21(6):1462-1472 [Abstract(3443)]  [View PDF(3590)728.62 K]
  • Explicit Multi-Degree Reduction of Said-Bézier Generalized Ball Curves
  • LIU Gang and WANG Guo-Jin
  • 2010,21(6):1473-1479 [Abstract(2849)]  [View PDF(2674)536.03 K]
  • Review Articles

  • Multicast Routing Protocol for Wireless Mesh Networks
  • FANG Yi-Lin,LI Fang-Min,WU Peng,LIU Xin-Hua and MA Xiao-Lin
  • 2010,21(6):1308-1325 [Abstract(6498)]  [View PDF(6904)1.43 M]
  • Key Techniques of Identifier-Based Routing
  • HOU Jie,LIU Ya-Ping and GONG Zheng-Hu
  • 2010,21(6):1326-1340 [Abstract(5755)]  [View PDF(5882)1.12 M]
  • Online First

  • Approach for Autonomous Web Service Aggregation Driven by Requirement
  • YE Rong-Hua,JIN Zhi,WANG Pu-Wei,ZHENG Li-Wei and ZHENG Li-Wei
  • 2010,21(6):1181-1195 [Abstract(5907)]  [View PDF(4723)990.38 K]
  • Complete Discriminant Locality Preserving Projections for Face Recognition
  • YANG Li-Ping,GONG Wei-Guo,GU Xiao-Hua,LI Wei-Hong and DU Xing
  • 2010,21(6):1277-1286 [Abstract(5144)]  [View PDF(5061)734.79 K]
  • Evaluation Approach of Subjective Trust Based on Cloud Model
  • WANG Shou-Xin,ZHANG Li and LI He-Song
  • 2010,21(6):1341-1352 [Abstract(6963)]  [View PDF(8314)804.19 K]
  • Research on Location Management Based on Irregular Cellular Network Topology Model
  • ZHAO Xiao-Min,LANG Mei-Ya and CHEN Qing-Zhang
  • 2010,21(6):1353-1363 [Abstract(4986)]  [View PDF(4550)837.61 K]
  • Implicit-Flow-Sensitive Method for Detection of Trojan-Spy Programs
  • LI Jia-Jing,LIANG Zhi-Yin,WEI Tao,ZOU Wei and MAO Jian
  • 2010,21(6):1426-4137 [Abstract(3914)]  [View PDF(4095)709.42 K]
  • Rapid and Automatic Method for 3D Scanned Data Registration
  • YANG Shen,QI Yue,SHEN Xu-Kun and ZHAO Qin-Ping
  • 2010,21(6):1438-1450 [Abstract(3759)]  [View PDF(4326)1.28 M]