Volume 18,Issue 10,2007 Table of Contents
Description and Proof of Property Preservation of Model TransformationsLIU Hui,MA Zhi-Yi and SHAO Wei-Zhong2007,18(10):2369-2379 [Abstract(4462)] [View PDF(5673)657.84 K]A Tri-Dimensional Requirements Model and Its Support for Stakeholder CoordinationWANG Ji-Zhe and LI Ming-Shu2007,18(10):2380-2392 [Abstract(4434)] [View PDF(5694)843.82 K]Dynamic Inlining Based on Continuous MonitoringWANG Lei,ZHOU Jing and JIN Mao-Zhong2007,18(10):2393-2402 [Abstract(3924)] [View PDF(5244)713.10 K]A Collaborative Filtering Recommendation Algorithm Based on Cloud ModelZHANG Guang-Wei,LI De-Yi,LI Peng,KANG Jian-Chu and CHEN Gui-Sheng2007,18(10):2403-2411 [Abstract(5935)] [View PDF(8266)620.23 K]Density-Sensitive Semi-Supervised Spectral ClusteringWANG Ling,BO Lie-Feng and JIAO Li-Cheng2007,18(10):2412-2422 [Abstract(6469)] [View PDF(6173)703.52 K]An Approach to Tracking Deformable Hand Gesture for Real-Time InteractionWANG Xi-Ying,ZHANG Xi-Wen and DAI Guo-Zhong2007,18(10):2423-2433 [Abstract(4673)] [View PDF(6635)752.41 K]Super-Resolution Reconstruction Based on Generalized Huber-MRF Image ModelingSHAO Wen-Ze and WEI Zhi-Hui2007,18(10):2434-2444 [Abstract(5210)] [View PDF(6531)1.08 M]Exploiting SVC Algorithm for Multifocus Image FusionZHANG Cheng-Cheng and HU Jin-Chun2007,18(10):2445-2457 [Abstract(4019)] [View PDF(5867)1.10 M]Representation of RCC11 Composition TableLI Yong-Ming and LI San-Jiang2007,18(10):2458-2468 [Abstract(4431)] [View PDF(5071)704.88 K]An Efficient Frequent Subgraph Mining AlgorithmLI Xian-Tong,LI Jian-Zhong and GAO Hong2007,18(10):2469-2480 [Abstract(5748)] [View PDF(8728)756.56 K]A Hierarchically Differential P2P Storage ArchitectureGAO Qian,YANG Zhi,TIAN Jing and DAI Ya-Fei2007,18(10):2481-2494 [Abstract(4322)] [View PDF(5566)914.79 K]Ontology-Based Query Division and Reformulation for Heterogeneous Information IntegrationLI Jian,SONG Jing-Yu and ZHONG Hua2007,18(10):2495-2506 [Abstract(4082)] [View PDF(5672)774.93 K]A Data Mining Approach Based on the Integration of Ontology and Context KnowledgeCHEN Ying,XU Gang and GU Guo-Chang2007,18(10):2507-2515 [Abstract(4953)] [View PDF(6690)583.33 K]A Real-Time Dynamic Database Crash Recovery StrategyXIAO Ying-Yuan,LIU Yun-Sheng,LIAO Guo-Qiong and DENG Hua-Feng2007,18(10):2516-2527 [Abstract(4794)] [View PDF(6316)725.77 K]An Approach to Mining Two-Dimensional Optimized Association Rules for Numeric AttributesHE Zhi,TIAN Sheng-Feng and HUANG Hou-Kuan2007,18(10):2528-2537 [Abstract(4210)] [View PDF(5143)613.51 K]Implementation of Scalable Routers with Direct NetworksYUE Zu-Hui,ZHAO You-Jian and WU Jian-Ping2007,18(10):2538-2550 [Abstract(4331)] [View PDF(5499)748.46 K]A Reputation-Based Trust Mechanism for P2P E-Commerce SystemsJIANG Shou-Xu and LI Jian-Zhong2007,18(10):2551-2563 [Abstract(6102)] [View PDF(8252)772.67 K]Performance Analysis and Adaptive Scheme of Route Optimization in Mobile IPv6XIAO Wen-Shu,ZHANG Yu-Jun and LI Zhong-Cheng2007,18(10):2564-2571 [Abstract(4416)] [View PDF(5449)582.45 K]Half Overlay Multicast Routing for Hybrid NetworksLIN Tong,QIAN Hua-Lin,GE Jing-Guo and NIU Guang-Feng2007,18(10):2572-2583 [Abstract(4426)] [View PDF(5440)789.71 K]Internet Services Fault Management: Layering Model and AlgorithmHUANG Xiao-Hui,ZOU Shi-Hong,CHU Ling-Wei,CHENG Shi-Duan and WANG Wen-Dong2007,18(10):2584-2594 [Abstract(4701)] [View PDF(5843)742.84 K]A Network Anomaly Detection Method Based on Transduction SchemeLI Yang,FANG Bin-Xing,GUO Li and CHEN You2007,18(10):2595-2604 [Abstract(4974)] [View PDF(6935)645.59 K]单物理层用户数据传输平台网络;面向以太网的物理帧时槽交换;输入排队;时槽预定;公平调度LI Ji,ZENG Hua-Xin and GUO Zi-Rong2007,18(10):2605-2612 [Abstract(4045)] [View PDF(5337)557.97 K]Defending DDos Attacks Based on the Source and Destination IP Address DatabaseSUN Zhi-Xin and LI Qing-Dong2007,18(10):2613-2623 [Abstract(4816)] [View PDF(7402)809.45 K]CR:Scalable Routers Based on a New ArchitectureYUE Zu-Hui,WU Jian-Ping and ZHAO You-Jian2007,18(10):2624-2634 [Abstract(4243)] [View PDF(5478)801.30 K]Fuzzy Decision Tree Based Inference Techniques for Network Forensic AnalysisLIU Zai-Qiang,LIN Dong-Dai and FENG Deng-Guo2007,18(10):2635-2644 [Abstract(4499)] [View PDF(5889)685.84 K]Energy Dissipation Bounds on Three Dimensional UWB Wireless Sensor NetworkXU Juan,HONG Yong-Fa,JIANG Chang-Jun and CHEN Lin2007,18(10):2645-2651 [Abstract(4599)] [View PDF(5000)468.20 K]Router Numbering Based Adaptive Packet MarkingLI De-Quan,SU Pu-Rui,WEI Dong-Mei and FENG Deng-Guo2007,18(10):2652-2661 [Abstract(4466)] [View PDF(6005)573.63 K]Chameleon Signature from Bilinear PairingDU Xin-Jun,WANG Ying,GE Jian-Hua and WANG Yu-Min2007,18(10):2662-2668 [Abstract(4218)] [View PDF(5005)513.44 K]