Volume 19,Issue 10,2008 Table of Contents
LCS and MSC Reasoning of Hybrid Terminological Cycles in Description Logic εLJIANG Yun-Cheng,WANG Ju,ZHOU Sheng-Ming and TANG Yong2008,19(10):2483-2497 [Abstract(4475)] [View PDF(5776)746.78 K]Extended Fuzzy Description Logics with Comparisons Between Fuzzy Membership DegreesKANG Da-Zhou,XU Bao-Wen,LU Jian-Jiang and LI Yan-Hui2008,19(10):2498-2507 [Abstract(3980)] [View PDF(5427)674.26 K]Two Values Passing CPS Transformation for Call-by-Name Calculus with ConstantsYU Gang and LIU Xin-Xin2008,19(10):2508-2516 [Abstract(4652)] [View PDF(5604)551.95 K]Dynamics Analysis Method of Cellular Automata for Complex Networking Storage SystemCHEN Jin-Cai,HE Ping and GE Xiong-Zi2008,19(10):2517-2526 [Abstract(4753)] [View PDF(4962)2.81 M]An Approach to Solve Deadlock Problem of Component ConnectionMAO Fei-Qiao,QI De-Yu and LIN Wei-Wei2008,19(10):2527-2538 [Abstract(4351)] [View PDF(6197)750.41 K]Design Calculus Based Approach to Modeling Use CaseCHEN Xin and LI Xuan-Dong2008,19(10):2539-2549 [Abstract(3913)] [View PDF(5671)647.03 K]Value Equality Analysis in C Program API Conformance ValidationMENG Ce,HE Ye-Ping and LUO Yu-Xiang2008,19(10):2550-2561 [Abstract(4109)] [View PDF(6019)644.93 K]FJ Extended Calculus for Multi-Version Class Dynamic UpdateZHANG Shi and HUANG Lin-Peng2008,19(10):2562-2572 [Abstract(4295)] [View PDF(5384)566.02 K]Main Memory Database TPC-H Workload Characterization on Modern ProcessorLIU Da-Wei,LUAN Hua,WANG Shan and QIN Biao2008,19(10):2573-2584 [Abstract(5109)] [View PDF(6774)933.63 K]Mining the Frequent Patterns in an Arbitrary Sliding Window over Online Data StreamsLI Guo-Hui and CHEN Hui2008,19(10):2585-2596 [Abstract(4704)] [View PDF(6392)627.59 K]Credible Association Rule and Its Mining Algorithm Based on Maximum CliqueXIAO Bo,XU Qian-Fang,LIN Zhi-Qing,GUO Jun and LI Chun-Guang2008,19(10):2597-2610 [Abstract(5115)] [View PDF(6541)812.22 K]Structural Query Expansion Based on Weighted Query Term for XML DocumentsWAN Chang-Xuan and LU Yuan2008,19(10):2611-2619 [Abstract(4674)] [View PDF(5957)531.52 K]Service Selection Approach Considering the Trustworthiness of QoS DataLI Yan,ZHOU Ming-Hui,LI Rui-Chao,CAO Dong-Gang and MEI Hong2008,19(10):2620-2627 [Abstract(5977)] [View PDF(6840)604.18 K]ServLoc: Secure Location Service for Wireless Sensor and Actuator NetworkMA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong2008,19(10):2628-2637 [Abstract(4749)] [View PDF(5858)603.00 K]A Method for Multipath Routing Based on Network Coding in Wireless Sensor NetworkLI Shan-Shan,LIAO Xiang-Ke,ZHU Pei-Dong and XIAO Nong2008,19(10):2638-2647 [Abstract(5410)] [View PDF(8545)1001.49 K]Multicast Fast Handover Algorithm Based on Neighbor Information ExchangeZHANG Hui and ZHANG Hong-Ke2008,19(10):2648-2658 [Abstract(4337)] [View PDF(5163)494.90 K]Rectangle and Boomerang Attacks on DESZHANG Lei and WU Wen-Ling2008,19(10):2659-2666 [Abstract(4635)] [View PDF(6258)521.93 K]An Integrated Indexing Structure for Large-Scale Cross-Media RetrievalZHUANG Yi,ZHUANG Yue-Ting and WU Fei2008,19(10):2667-2680 [Abstract(4381)] [View PDF(5657)905.37 K]A Conceptual Framework for Developing Adaptive Pen-Based User InterfaceXU Li-Shuang,ZHOU Ming-Jun,DENG Chang-Zhi,TIAN Feng,LIU Yuan-Yuan and DAI Guo-Zhong2008,19(10):2681-2693 [Abstract(5088)] [View PDF(5707)683.02 K]2007年中国计算机大会推荐优秀论文介绍郑纬民2008,19(10):2694-2695 [Abstract(4186)] [View PDF(5537)289.71 K]U-Tree Based Indexing Method for Uncertain Moving ObjectsDING Xiao-Feng,LU Yan-Sheng,PAN Peng,HONG Liang and WEI Qiong2008,19(10):2696-2705 [Abstract(4919)] [View PDF(6612)763.32 K]A Method for Code Safety Proof ConstructionGUO Yu,CHEN Yi-Yun and LIN Chun-Xiao2008,19(10):2720-2727 [Abstract(4889)] [View PDF(5709)562.82 K]A High Performance XML Parser OnceXMLParserJIN Bei-Hong,CAO Dong-Lei,REN Xin,YU Shuang and DAI Bei-Jie2008,19(10):2728-2738 [Abstract(4846)] [View PDF(7420)624.07 K]An Identity (ID)-Based Threshold Multi-Secret Sharing SchemePANG Liao-Jun,PEI Qing-Qi,JIAO Li-Cheng and WANG Yu-Min2008,19(10):2739-2745 [Abstract(4268)] [View PDF(6094)468.23 K]An Intrusion Response Method Based on Attack GraphSHI Jin,GUO Shan-Qing,LU Yin and XIE Li2008,19(10):2746-2753 [Abstract(4846)] [View PDF(5718)536.24 K]Negotiation-Based Dynamic Role Transition in Data Access across Multi-VOsFU Chang-Sheng,XIAO Nong,ZHAO Ying-Jie and CHEN Tao2008,19(10):2754-2761 [Abstract(4339)] [View PDF(5297)529.59 K]Performance Analysis Based on Packet Arrival Rate for the IEEE 802.11 DCFYANG Wei-Dong,MA Jian-Feng and LI Ya-Hui2008,19(10):2762-2769 [Abstract(4884)] [View PDF(6186)727.91 K]Cross-Entropy Method Based on Markov Decision Process for Optimal Software TestingZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen2008,19(10):2770-2779 [Abstract(5289)] [View PDF(6563)610.09 K]Research on Development Tools for Collaborative Pen-Based User InterfacesZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong2008,19(10):2780-2788 [Abstract(4819)] [View PDF(5825)956.66 K]
P2P Web Search TechnologyFANG Qi-Ming,YANG Guang-Wen,WU Yong-Wei and ZHENG Wei-Min2008,19(10):2706-2719 [Abstract(12295)] [View PDF(14301)778.29 K]