Volume 19,Issue 10,2008 Table of Contents

Other Issues:  
  
Contents

  • LCS and MSC Reasoning of Hybrid Terminological Cycles in Description Logic εL
  • JIANG Yun-Cheng,WANG Ju,ZHOU Sheng-Ming and TANG Yong
  • 2008,19(10):2483-2497 [Abstract(4475)]  [View PDF(5776)746.78 K]
  • Extended Fuzzy Description Logics with Comparisons Between Fuzzy Membership Degrees
  • KANG Da-Zhou,XU Bao-Wen,LU Jian-Jiang and LI Yan-Hui
  • 2008,19(10):2498-2507 [Abstract(3980)]  [View PDF(5427)674.26 K]
  • Two Values Passing CPS Transformation for Call-by-Name Calculus with Constants
  • YU Gang and LIU Xin-Xin
  • 2008,19(10):2508-2516 [Abstract(4652)]  [View PDF(5604)551.95 K]
  • Dynamics Analysis Method of Cellular Automata for Complex Networking Storage System
  • CHEN Jin-Cai,HE Ping and GE Xiong-Zi
  • 2008,19(10):2517-2526 [Abstract(4753)]  [View PDF(4962)2.81 M]
  • An Approach to Solve Deadlock Problem of Component Connection
  • MAO Fei-Qiao,QI De-Yu and LIN Wei-Wei
  • 2008,19(10):2527-2538 [Abstract(4351)]  [View PDF(6197)750.41 K]
  • Design Calculus Based Approach to Modeling Use Case
  • CHEN Xin and LI Xuan-Dong
  • 2008,19(10):2539-2549 [Abstract(3913)]  [View PDF(5671)647.03 K]
  • Value Equality Analysis in C Program API Conformance Validation
  • MENG Ce,HE Ye-Ping and LUO Yu-Xiang
  • 2008,19(10):2550-2561 [Abstract(4109)]  [View PDF(6019)644.93 K]
  • FJ Extended Calculus for Multi-Version Class Dynamic Update
  • ZHANG Shi and HUANG Lin-Peng
  • 2008,19(10):2562-2572 [Abstract(4295)]  [View PDF(5384)566.02 K]
  • Main Memory Database TPC-H Workload Characterization on Modern Processor
  • LIU Da-Wei,LUAN Hua,WANG Shan and QIN Biao
  • 2008,19(10):2573-2584 [Abstract(5109)]  [View PDF(6774)933.63 K]
  • Mining the Frequent Patterns in an Arbitrary Sliding Window over Online Data Streams
  • LI Guo-Hui and CHEN Hui
  • 2008,19(10):2585-2596 [Abstract(4704)]  [View PDF(6392)627.59 K]
  • Credible Association Rule and Its Mining Algorithm Based on Maximum Clique
  • XIAO Bo,XU Qian-Fang,LIN Zhi-Qing,GUO Jun and LI Chun-Guang
  • 2008,19(10):2597-2610 [Abstract(5115)]  [View PDF(6541)812.22 K]
  • Structural Query Expansion Based on Weighted Query Term for XML Documents
  • WAN Chang-Xuan and LU Yuan
  • 2008,19(10):2611-2619 [Abstract(4674)]  [View PDF(5957)531.52 K]
  • Service Selection Approach Considering the Trustworthiness of QoS Data
  • LI Yan,ZHOU Ming-Hui,LI Rui-Chao,CAO Dong-Gang and MEI Hong
  • 2008,19(10):2620-2627 [Abstract(5977)]  [View PDF(6840)604.18 K]
  • ServLoc: Secure Location Service for Wireless Sensor and Actuator Network
  • MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2008,19(10):2628-2637 [Abstract(4749)]  [View PDF(5858)603.00 K]
  • A Method for Multipath Routing Based on Network Coding in Wireless Sensor Network
  • LI Shan-Shan,LIAO Xiang-Ke,ZHU Pei-Dong and XIAO Nong
  • 2008,19(10):2638-2647 [Abstract(5410)]  [View PDF(8545)1001.49 K]
  • Multicast Fast Handover Algorithm Based on Neighbor Information Exchange
  • ZHANG Hui and ZHANG Hong-Ke
  • 2008,19(10):2648-2658 [Abstract(4337)]  [View PDF(5163)494.90 K]
  • Rectangle and Boomerang Attacks on DES
  • ZHANG Lei and WU Wen-Ling
  • 2008,19(10):2659-2666 [Abstract(4635)]  [View PDF(6258)521.93 K]
  • An Integrated Indexing Structure for Large-Scale Cross-Media Retrieval
  • ZHUANG Yi,ZHUANG Yue-Ting and WU Fei
  • 2008,19(10):2667-2680 [Abstract(4381)]  [View PDF(5657)905.37 K]
  • A Conceptual Framework for Developing Adaptive Pen-Based User Interface
  • XU Li-Shuang,ZHOU Ming-Jun,DENG Chang-Zhi,TIAN Feng,LIU Yuan-Yuan and DAI Guo-Zhong
  • 2008,19(10):2681-2693 [Abstract(5088)]  [View PDF(5707)683.02 K]
  • 2007年中国计算机大会推荐优秀论文介绍
  • 郑纬民
  • 2008,19(10):2694-2695 [Abstract(4186)]  [View PDF(5537)289.71 K]
  • U-Tree Based Indexing Method for Uncertain Moving Objects
  • DING Xiao-Feng,LU Yan-Sheng,PAN Peng,HONG Liang and WEI Qiong
  • 2008,19(10):2696-2705 [Abstract(4919)]  [View PDF(6612)763.32 K]
  • A Method for Code Safety Proof Construction
  • GUO Yu,CHEN Yi-Yun and LIN Chun-Xiao
  • 2008,19(10):2720-2727 [Abstract(4889)]  [View PDF(5709)562.82 K]
  • A High Performance XML Parser OnceXMLParser
  • JIN Bei-Hong,CAO Dong-Lei,REN Xin,YU Shuang and DAI Bei-Jie
  • 2008,19(10):2728-2738 [Abstract(4846)]  [View PDF(7420)624.07 K]
  • An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme
  • PANG Liao-Jun,PEI Qing-Qi,JIAO Li-Cheng and WANG Yu-Min
  • 2008,19(10):2739-2745 [Abstract(4268)]  [View PDF(6094)468.23 K]
  • An Intrusion Response Method Based on Attack Graph
  • SHI Jin,GUO Shan-Qing,LU Yin and XIE Li
  • 2008,19(10):2746-2753 [Abstract(4846)]  [View PDF(5718)536.24 K]
  • Negotiation-Based Dynamic Role Transition in Data Access across Multi-VOs
  • FU Chang-Sheng,XIAO Nong,ZHAO Ying-Jie and CHEN Tao
  • 2008,19(10):2754-2761 [Abstract(4339)]  [View PDF(5297)529.59 K]
  • Performance Analysis Based on Packet Arrival Rate for the IEEE 802.11 DCF
  • YANG Wei-Dong,MA Jian-Feng and LI Ya-Hui
  • 2008,19(10):2762-2769 [Abstract(4884)]  [View PDF(6186)727.91 K]
  • Cross-Entropy Method Based on Markov Decision Process for Optimal Software Testing
  • ZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen
  • 2008,19(10):2770-2779 [Abstract(5289)]  [View PDF(6563)610.09 K]
  • Research on Development Tools for Collaborative Pen-Based User Interfaces
  • ZHOU Ming-Jun,XU Li-Shuang,TIAN Feng and DAI Guo-Zhong
  • 2008,19(10):2780-2788 [Abstract(4819)]  [View PDF(5825)956.66 K]
  • Review Articles

  • P2P Web Search Technology
  • FANG Qi-Ming,YANG Guang-Wen,WU Yong-Wei and ZHENG Wei-Min
  • 2008,19(10):2706-2719 [Abstract(12295)]  [View PDF(14301)778.29 K]