Volume 22,Issue 4,2011 Table of Contents

Other Issues:  
  
Contents

  • Running Mechanism and Strategy Description Language SADL for Self-Adaptive MAS
  • DONG Meng-Gao,MAO Xin-Jun,CHANG Zhi-Ming,WANG Ji and QI Zhi-Chang
  • 2011,22(4):609-624 [Abstract(5638)]  [View PDF(7021)884.28 K]
  • Algorithm for Distributed Constraint Optimization Problems with Low Constraint Density
  • DING Bo,WANG Huai-Min,SHI Dian-Xi and TANG Yang-Bin
  • 2011,22(4):625-639 [Abstract(4910)]  [View PDF(6597)1.39 M]
  • BACH: A Toolset for Bounded Reachability Analysis of Linear Hybrid Systems
  • BU Lei,LI You,WANG Lin-Zhang and LI Xuan-Dong
  • 2011,22(4):640-658 [Abstract(5136)]  [View PDF(6348)669.57 K]
  • Formal Semantics of Universal Modal Sequence Diagram
  • LI Wen-Rui,WANG Zhi-Jian and ZHANG Peng-Cheng
  • 2011,22(4):659-675 [Abstract(6527)]  [View PDF(6488)878.20 K]
  • Correlative Particle Swarm Optimization Model
  • SHEN Yuan-Xia,WANG Guo-Yin and ZENG Chuan-Hua
  • 2011,22(4):695-708 [Abstract(5723)]  [View PDF(6387)761.46 K]
  • Fast Ensemble Pruning Algorithm Based on FP-Tree
  • ZHAO Qiang-Li,JIANG Yan-Huang and XU Ming
  • 2011,22(4):709-721 [Abstract(6147)]  [View PDF(6424)664.81 K]
  • Laurel: A Hybrid Overlay Network for Data Distribution
  • ZHENG Zhong,WANG Yi-Jie and MA Xing-Kong
  • 2011,22(4):722-735 [Abstract(5318)]  [View PDF(5980)744.92 K]
  • Cooperative Game Theory-Based CAC Strategy for Mobile Communication Systems
  • ZHANG Hui,FANG Xu-Ming and YUAN Qin
  • 2011,22(4):736-744 [Abstract(5562)]  [View PDF(5896)505.20 K]
  • Reputation Model with Feedback of Ranking for P2P Systems
  • LI Zhi-Jun,JIANG Shou-Xu and LI Xiao-Yi
  • 2011,22(4):745-760 [Abstract(5039)]  [View PDF(6822)847.00 K]
  • Detecting SIP Flooding Attacks Against IMS Network
  • WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun
  • 2011,22(4):761-772 [Abstract(6025)]  [View PDF(7312)836.62 K]
  • P2P Probabilistic Routing Algorithm Based on Data Copying and Bloom Filter
  • ZHU Gui-Ming,GUO De-Ke and JIN Shi-Yao
  • 2011,22(4):773-781 [Abstract(5253)]  [View PDF(5932)667.12 K]
  • A Multiple Scalar Multiplications Algorithm in the Elliptic Curve Cryptosystem
  • CHEN Hou-You and MA Chuan-Gui
  • 2011,22(4):782-788 [Abstract(5595)]  [View PDF(6966)435.19 K]
  • Automatic Image Annotation by Fusing Semantic Topics
  • LI Zhi-Xin,SHI Zhi-Ping,LI Zhi-Qing and SHI Zhong-Zhi
  • 2011,22(4):801-812 [Abstract(5257)]  [View PDF(9119)769.84 K]
  • Directly Fusion Method for Combining Variable Exposure Value Images
  • ZHANG Jun,DAI Xia,SUN De-Quan and WANG Bang-Ping
  • 2011,22(4):813-825 [Abstract(5248)]  [View PDF(9549)819.56 K]
  • Fast Directional Discrete Cosine Transforms Based Image Compression
  • CHEN Bo,WANG Hong-Xia and CHENG Li-Zhi
  • 2011,22(4):826-832 [Abstract(5579)]  [View PDF(7257)554.54 K]
  • Qualitative and Quantitative Representing and Reasoning for Goals Satisfiability
  • WANG Shou-Xin,ZHANG Li,WANG Shuai,SHEN Ju-Fang and LIU Yu
  • 2011,22(4):593-608 [Abstract(7506)]  [View PDF(9165)512.98 K]
  • Review Articles

  • Granular Computing Models for Knowledge Uncertainty
  • WANG Guo-Yin,ZHANG Qing-Hua,MA Xi-Ao and YANG Qing-Shan
  • 2011,22(4):676-694 [Abstract(8305)]  [View PDF(11475)404.64 K]
  • Contents

  • Image Shrinkage Based on Hot-Target Map and Featured Edge Preservation
  • LIANG Yun,SU Zhuo,LUO Xiao-Nan and WANG Dong
  • 2011,22(4):789-800 [Abstract(7117)]  [View PDF(7312)797.25 K]