Volume 22,Issue 4,2011 Table of Contents

Other Issues:  
  
Contents

  • Running Mechanism and Strategy Description Language SADL for Self-Adaptive MAS
  • DONG Meng-Gao,MAO Xin-Jun,CHANG Zhi-Ming,WANG Ji and QI Zhi-Chang
  • 2011,22(4):609-624 [Abstract(4247)]  [View PDF(4084)884.28 K]
  • Algorithm for Distributed Constraint Optimization Problems with Low Constraint Density
  • DING Bo,WANG Huai-Min,SHI Dian-Xi and TANG Yang-Bin
  • 2011,22(4):625-639 [Abstract(3393)]  [View PDF(4051)1.39 M]
  • BACH: A Toolset for Bounded Reachability Analysis of Linear Hybrid Systems
  • BU Lei,LI You,WANG Lin-Zhang and LI Xuan-Dong
  • 2011,22(4):640-658 [Abstract(3389)]  [View PDF(4148)669.57 K]
  • Formal Semantics of Universal Modal Sequence Diagram
  • LI Wen-Rui,WANG Zhi-Jian and ZHANG Peng-Cheng
  • 2011,22(4):659-675 [Abstract(4862)]  [View PDF(4085)878.20 K]
  • Correlative Particle Swarm Optimization Model
  • SHEN Yuan-Xia,WANG Guo-Yin and ZENG Chuan-Hua
  • 2011,22(4):695-708 [Abstract(4234)]  [View PDF(4007)761.46 K]
  • Fast Ensemble Pruning Algorithm Based on FP-Tree
  • ZHAO Qiang-Li,JIANG Yan-Huang and XU Ming
  • 2011,22(4):709-721 [Abstract(4533)]  [View PDF(4076)664.81 K]
  • Laurel: A Hybrid Overlay Network for Data Distribution
  • ZHENG Zhong,WANG Yi-Jie and MA Xing-Kong
  • 2011,22(4):722-735 [Abstract(4023)]  [View PDF(3880)744.92 K]
  • Cooperative Game Theory-Based CAC Strategy for Mobile Communication Systems
  • ZHANG Hui,FANG Xu-Ming and YUAN Qin
  • 2011,22(4):736-744 [Abstract(3995)]  [View PDF(3512)505.20 K]
  • Reputation Model with Feedback of Ranking for P2P Systems
  • LI Zhi-Jun,JIANG Shou-Xu and LI Xiao-Yi
  • 2011,22(4):745-760 [Abstract(3757)]  [View PDF(4458)847.00 K]
  • Detecting SIP Flooding Attacks Against IMS Network
  • WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun
  • 2011,22(4):761-772 [Abstract(3982)]  [View PDF(4335)836.62 K]
  • P2P Probabilistic Routing Algorithm Based on Data Copying and Bloom Filter
  • ZHU Gui-Ming,GUO De-Ke and JIN Shi-Yao
  • 2011,22(4):773-781 [Abstract(3820)]  [View PDF(3840)667.12 K]
  • A Multiple Scalar Multiplications Algorithm in the Elliptic Curve Cryptosystem
  • CHEN Hou-You and MA Chuan-Gui
  • 2011,22(4):782-788 [Abstract(3939)]  [View PDF(3711)435.19 K]
  • Automatic Image Annotation by Fusing Semantic Topics
  • LI Zhi-Xin,SHI Zhi-Ping,LI Zhi-Qing and SHI Zhong-Zhi
  • 2011,22(4):801-812 [Abstract(3816)]  [View PDF(6468)769.84 K]
  • Directly Fusion Method for Combining Variable Exposure Value Images
  • ZHANG Jun,DAI Xia,SUN De-Quan and WANG Bang-Ping
  • 2011,22(4):813-825 [Abstract(3501)]  [View PDF(6065)819.56 K]
  • Fast Directional Discrete Cosine Transforms Based Image Compression
  • CHEN Bo,WANG Hong-Xia and CHENG Li-Zhi
  • 2011,22(4):826-832 [Abstract(4079)]  [View PDF(4948)554.54 K]
  • Qualitative and Quantitative Representing and Reasoning for Goals Satisfiability
  • WANG Shou-Xin,ZHANG Li,WANG Shuai,SHEN Ju-Fang and LIU Yu
  • 2011,22(4):593-608 [Abstract(5919)]  [View PDF(6456)512.98 K]
  • Review Articles

  • Granular Computing Models for Knowledge Uncertainty
  • WANG Guo-Yin,ZHANG Qing-Hua,MA Xi-Ao and YANG Qing-Shan
  • 2011,22(4):676-694 [Abstract(5873)]  [View PDF(7116)404.64 K]
  • Contents

  • Image Shrinkage Based on Hot-Target Map and Featured Edge Preservation
  • LIANG Yun,SU Zhuo,LUO Xiao-Nan and WANG Dong
  • 2011,22(4):789-800 [Abstract(5571)]  [View PDF(4535)797.25 K]