Volume 22,Issue 1,2011 Table of Contents
Formalized Approach for Componentized Software Process ModelingZHAI Jian,YANG Qiu-Song,XIAO Jun-Chao and LI Ming-Shu2011,22(1):1-16 [Abstract(9684)] [View PDF(10622)809.46 K]Component Model Supporting Trustworthiness-Oriented Software EvolutionDING Bo,WANG Huai-Min,SHI Dian-Xi and LI Xiao2011,22(1):17-27 [Abstract(7825)] [View PDF(11611)1.21 M]Constructing Goal Agenda and Macro Actions Using Proposition Relation Graphs in PlanningJIANG Zhi-Hua,RAO Dong-Ning,JIANG Yun-Fei and ZHU Hui-Quan2011,22(1):44-56 [Abstract(6440)] [View PDF(6540)667.91 K]Algorithms Improving the Storage Efficiency of Deep Packet InspectionYU Qiang and HUO Hong-Wei2011,22(1):149-163 [Abstract(6125)] [View PDF(8429)1.17 M]Dynamic Pointer Forwarding Scheme for HMIPv6 NetworksYANG Yi and DONG Yong-Qiang2011,22(1):164-176 [Abstract(6076)] [View PDF(6532)655.36 K]
Experimental Comparisons of Semi-Supervised Dimensional Reduction MethodsCHEN Shi-Guo and ZHANG Dao-Qiang2011,22(1):28-43 [Abstract(9654)] [View PDF(16333)825.89 K]Study on Cloud Computing SecurityFENG Deng-Guo,ZHANG Min,ZHANG Yan and XU Zhen2011,22(1):71-83 [Abstract(30300)] [View PDF(58419)781.42 K]Scalability of Internet Inter-Domain RoutingZHANG Wei,BI Jun and WU Jian-Ping2011,22(1):84-100 [Abstract(8848)] [View PDF(11028)840.81 K]Cooperative MAC for Wireless NetworksLI Yun,DU Yang,CAO Bin and YOU Xiao-Hu2011,22(1):101-114 [Abstract(10924)] [View PDF(11589)787.24 K]Survey and Analysis on the Internet Traffic ModelZHANG Bin,YANG Jia-Hai and WU Jian-Ping2011,22(1):115-131 [Abstract(13883)] [View PDF(30211)845.91 K]Concurrency-Related Complexities in Network ProgrammingLI Hui-Ba,TIAN Tian,PENG Yu-Xing,LI Dong-Sheng and LU Xi-Cheng2011,22(1):132-148 [Abstract(9615)] [View PDF(18089)852.82 K]
Strategy of Extracting Domain Knowledge for STRIPS World Based on Derived PredicatesBIAN Rui,JIANG Yun-Fei,WU Xiang-Jun and LIANG Rui-Shi2011,22(1):57-70 [Abstract(6295)] [View PDF(7184)675.87 K]