Volume 23,Issue 7,2012 Table of Contents
On the Expressiveness of Context-Sensitive Graph GrammarsZOU Yang,Lü Jian,CAO Chun,HU Hao,SONG Wei and YANG Qi-Liang2012,23(7):1635-1655 [Abstract(4385)] [View PDF(5550)1.12 M]Bounded Model Checking for Probabilistic Computation Tree LogicZHOU Cong-Hua,LIU Zhi-Feng and WANG Chang-Da2012,23(7):1656-1668 [Abstract(4647)] [View PDF(6858)734.14 K]W4H: An Analytical Framework for Software Deployment TechnologiesCHEN Wei,WEI Jun and HUANG Tao2012,23(7):1669-1687 [Abstract(4072)] [View PDF(6317)916.89 K]A Constraint-Based Approach to Identifying and Analyzing Failure-Causing RegionsSUN Chang-Ai2012,23(7):1688-1701 [Abstract(3444)] [View PDF(4986)706.39 K]Genetic Algorithm Based Approach to Personal Worklist Resource SchedulingDENG Tie-Qing,REN Gen-Quan and LIU Ying-Bo2012,23(7):1702-1716 [Abstract(4852)] [View PDF(6321)836.69 K]Loop-Nest Auto-Vectorization Based on SLPWEI Shuai,ZHAO Rong-Cai and YAO Yuan2012,23(7):1717-1728 [Abstract(4154)] [View PDF(5727)613.61 K]Approximation Sets of Rough SetsZHANG Qing-Hua,WANG Guo-Yin and XIAO Yu2012,23(7):1745-1759 [Abstract(5551)] [View PDF(5812)772.09 K]Nature Computation with Self-Adaptive Dynamic Control Strategy of Population SizeWANG Rong-Fang,JIAO Li-Cheng,LIU Fang and YANG Shu-Yuan2012,23(7):1760-1772 [Abstract(4158)] [View PDF(5544)839.34 K]Modified Immune Clonal Constrained Multi-Objective Optimization AlgorithmSHANG Rong-Hua,JIAO Li-Cheng,HU Chao-Xu and MA Jing-Jing2012,23(7):1773-1786 [Abstract(4344)] [View PDF(5404)924.27 K]Visual Word Soft-Histogram for Image RepresentationWANG Yan-Jie,LIU Xia-Bi and JIA Yun-De2012,23(7):1787-1795 [Abstract(3971)] [View PDF(5893)602.71 K]On the Limitation of the Power of Coalitional Normative SystemsWANG Chong-Jun,WU Jun,ZHANG Lei and XIE Jun-Yuan2012,23(7):1796-1804 [Abstract(3906)] [View PDF(3944)513.65 K]Multi-Scale Cooperative Mutation Particle Swarm Optimization AlgorithmTAO Xin-Min,LIU Fu-Rong,LIU Yu and TONG Zhi-Jing2012,23(7):1805-1815 [Abstract(4945)] [View PDF(6398)598.97 K]Improving Coarse-Grained Arc Consistency Algorithms in Solving Constraint Satisfaction ProblemsLI Hong-Bo,LI Zhan-Shan and WANG Tao2012,23(7):1816-1823 [Abstract(4093)] [View PDF(5665)448.76 K]Active Routing Based Intra-Domain Mobility Management for Wireless Mesh NetworksZHANG Yu-Jun,ZHANG Han-Wen and XU Zhi-Jun2012,23(7):1838-1848 [Abstract(4220)] [View PDF(5059)761.97 K]TypeSampler: A Type Sampling Approach Based on GossipZHENG Zhong,WANG Yi-Jie,MA Xing-Kong and YANG Yong-Tao2012,23(7):1849-1868 [Abstract(3722)] [View PDF(4754)1.15 M]JPEG Steganalysis Based on Feature Fusion by Principal Component AnalysisHUANG Wei,ZHAO Xian-Feng,FENG Deng-Guo and SHENG Ren-Nong2012,23(7):1869-1879 [Abstract(4640)] [View PDF(6291)754.67 K]Efficiency Evaluation Model of System Security Measures in the Given Vulnerabilities SetWU Di,FENG Deng-Guo,LIAN Yi-Feng and CHEN Kai2012,23(7):1880-1898 [Abstract(3867)] [View PDF(5854)1022.97 K]Cryptographic Properties of BOMMYANG Xiao,FAN Xiu-Bin,WU Chuan-Kun,YU Yu-Yin and FENG Xiu-Tao2012,23(7):1899-1907 [Abstract(4427)] [View PDF(6446)512.14 K]Origin Authentication Scheme Against BGP Address Prefix HijackingLIU Zhi-Hui,SUN Bin,GU Li-Ze and YANG Yi-Xian2012,23(7):1908-1923 [Abstract(4425)] [View PDF(6324)916.93 K]A Demand Based Packet Scheduling Algorithm for Multipath TransferCAO Yu and XU Ming-Wei2012,23(7):1924-1934 [Abstract(3932)] [View PDF(6078)812.00 K]
Research on Resolving Object Coreference on the Semantic WebHU Wei,BAI Wen-Yang and QU Yu-Zhong2012,23(7):1729-1744 [Abstract(7301)] [View PDF(6787)826.66 K]MAC Protocols for Cognitive Radio NetworksKAN Bao-Qiang,FAN Jian-Hua and WANG Jian-Ye2012,23(7):1824-1837 [Abstract(7943)] [View PDF(10194)780.12 K]