Volume 22,Issue 1,2011 Table of Contents
Formalized Approach for Componentized Software Process ModelingZHAI Jian,YANG Qiu-Song,XIAO Jun-Chao and LI Ming-Shu2011,22(1):1-16 [Abstract(9575)] [View PDF(9625)809.46 K]Component Model Supporting Trustworthiness-Oriented Software EvolutionDING Bo,WANG Huai-Min,SHI Dian-Xi and LI Xiao2011,22(1):17-27 [Abstract(7740)] [View PDF(10873)1.21 M]Constructing Goal Agenda and Macro Actions Using Proposition Relation Graphs in PlanningJIANG Zhi-Hua,RAO Dong-Ning,JIANG Yun-Fei and ZHU Hui-Quan2011,22(1):44-56 [Abstract(6306)] [View PDF(5878)667.91 K]Algorithms Improving the Storage Efficiency of Deep Packet InspectionYU Qiang and HUO Hong-Wei2011,22(1):149-163 [Abstract(6045)] [View PDF(7594)1.17 M]Dynamic Pointer Forwarding Scheme for HMIPv6 NetworksYANG Yi and DONG Yong-Qiang2011,22(1):164-176 [Abstract(6002)] [View PDF(5687)655.36 K]
Experimental Comparisons of Semi-Supervised Dimensional Reduction MethodsCHEN Shi-Guo and ZHANG Dao-Qiang2011,22(1):28-43 [Abstract(9481)] [View PDF(14854)825.89 K]Study on Cloud Computing SecurityFENG Deng-Guo,ZHANG Min,ZHANG Yan and XU Zhen2011,22(1):71-83 [Abstract(29790)] [View PDF(54703)781.42 K]Scalability of Internet Inter-Domain RoutingZHANG Wei,BI Jun and WU Jian-Ping2011,22(1):84-100 [Abstract(8733)] [View PDF(9581)840.81 K]Cooperative MAC for Wireless NetworksLI Yun,DU Yang,CAO Bin and YOU Xiao-Hu2011,22(1):101-114 [Abstract(10777)] [View PDF(10154)787.24 K]Survey and Analysis on the Internet Traffic ModelZHANG Bin,YANG Jia-Hai and WU Jian-Ping2011,22(1):115-131 [Abstract(13611)] [View PDF(28021)845.91 K]Concurrency-Related Complexities in Network ProgrammingLI Hui-Ba,TIAN Tian,PENG Yu-Xing,LI Dong-Sheng and LU Xi-Cheng2011,22(1):132-148 [Abstract(9506)] [View PDF(16363)852.82 K]
Strategy of Extracting Domain Knowledge for STRIPS World Based on Derived PredicatesBIAN Rui,JIANG Yun-Fei,WU Xiang-Jun and LIANG Rui-Shi2011,22(1):57-70 [Abstract(6213)] [View PDF(6264)675.87 K]