Volume 20,Issue 10,2009 Table of Contents
Refactoring Generic Instantiations Based on Type Propagation AnalysisCHEN Lin,XU Bao-Wen,QIAN Ju,ZHOU Tian-Lin and ZHOU Yu-Ming2009,20(10):2617-2627 [Abstract(4917)] [View PDF(6617)642.10 K]Algorithms for Rule Generation and Matchmaking in Context-Aware SystemLIU Dong,MENG Xiang-Wu,CHEN Jun-Liang and XIA Ya-Mei2009,20(10):2655-2666 [Abstract(5332)] [View PDF(7325)782.68 K]Internet Traffic Classification Using C4.5 Decision TreeXU Peng and LIN Sen2009,20(10):2692-2704 [Abstract(5780)] [View PDF(11114)645.73 K]Route-Sign-Based Adaptive Void Handling Geographical Routing AlgorithmZHANG Heng-Yang,WANG Ling,LIU Yun-Hui and CAI Xuan-Ping2009,20(10):2744-2751 [Abstract(4730)] [View PDF(5946)566.38 K]Cache System Based on Disk Media for Network StorageYIN Yang,LIU Zhen-Jun and XU Lu2009,20(10):2752-2765 [Abstract(4781)] [View PDF(7806)892.16 K]Overcome the Limitation on Authentication TestLIU Jia-Fen and ZHOU Ming-Tian2009,20(10):2799-2809 [Abstract(4945)] [View PDF(5640)581.28 K]Cryptographic Workflow Key Encapsulation Mechanism Based on SigncryptionLAI Xin and HE Da-Ke2009,20(10):2810-2821 [Abstract(4809)] [View PDF(6499)614.13 K]Importance Sampling Method of Software Reliability EstimationZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen2009,20(10):2859-2866 [Abstract(5583)] [View PDF(8169)500.93 K]Similarity Search in Data Stream with Adaptive Segmental ApproximationsWU Feng,ZHONG Yan,WU Quan-Yuan,JIA Yan and YANG Shu-Qiang2009,20(10):2867-2884 [Abstract(4944)] [View PDF(6431)1.43 M]Robust Feedback Credibility-Based Distributed P2P Trust ModelHU Jian-Li,WU Quan-Yuan,ZHOU Bin and LIU Jia-Hong2009,20(10):2885-2898 [Abstract(5552)] [View PDF(8141)1.09 M]Sketch-Based Anomalies Detection with IP Address TraceabilityLUO Na,LI Ai-Ping,WU Quan-Yuan and LU Hua-Biao2009,20(10):2899-2906 [Abstract(5292)] [View PDF(7743)530.76 K]Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption SchemePANG Liao-Jun,LI Hui-Xian,JIAO Li-Cheng and WANG Yu-Min2009,20(10):2907-2914 [Abstract(5633)] [View PDF(7815)497.68 K]Education Resource Grid Model and Replica Creation StrategiesXING Chang-Ming,LIU Fang-Ai,YANG Lin and LI Wen2009,20(10):3844-2856 [Abstract(4361)] [View PDF(6071)642.62 K]
Addressing Protocols for Wireless Sensor NetworksDU Zhi-Gao,QIAN De-Pei and LIU Yi2009,20(10):2787-2798 [Abstract(8163)] [View PDF(10297)691.97 K]
Efficient Scheduling Algorithm for Hard Real-Time Tasks in Primary-Backup Based Multiprocessor SystemsWANG Jian,SUN Jian-Ling,WANG Xin-Yu,YANG Xiao-Hu,WANG Shen-Kang and CHEN Jun-Bo2009,20(10):2628-2636 [Abstract(4707)] [View PDF(7030)469.51 K]Experimental Study to Compare the Use of Metamorphic Testing and Assertion CheckingZHANG Zhen-Yu,CHAN WK,TSE TH and U Pei-Feng2009,20(10):2637-2654 [Abstract(6029)] [View PDF(7128)821.81 K]Structure Matching Method Based on Functional DependenciesLI Guo-Hui,DU Xiao-Kun,HU Fang-Xiao,YANG Bing and TANG Xiang-Hong2009,20(10):2667-2678 [Abstract(6145)] [View PDF(6881)623.67 K]View-Invariant Action Recognition Based on Action GraphsYANG Yue-Dong,HAO Ai-Min,CHU Qing-Jun,ZHAO Qin-Ping and WANG Li-Li2009,20(10):2679-2691 [Abstract(5302)] [View PDF(8387)745.46 K]Distributed Secure Clustering Protocol in Wireless Sensor NetworksYU Lei,LI Jian-Zhong and LUO Ji-Zhou2009,20(10):2705-2720 [Abstract(6191)] [View PDF(8589)785.34 K]Traffic Load-Based Interference-Aware Routing Protocol for Mobile Ad Hoc NetworksZHANG Xin-Ming,LIU Qiong,DAI Shi-Fang and LIU Yong-Zhen2009,20(10):2721-2728 [Abstract(5683)] [View PDF(6818)615.79 K]ACO-Based Algorithm for Solving Energy Hole Problems in Wireless Sensor NetworksSONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min2009,20(10):2729-2743 [Abstract(14544)] [View PDF(12629)1.12 M]Task Scheduling Based on Multidimensional Performance Clustering of Grid Service ResourcesCHEN Zhi-Gang and YANG Bo2009,20(10):2766-2775 [Abstract(5702)] [View PDF(6868)554.10 K]Distributed Proving Oriented Language and Method for Trust NegotiationWANG Xiao-Feng,SU Jin-Shu,ZHANG Qiang and ZHANG Yi-Ming2009,20(10):2776-2786 [Abstract(5753)] [View PDF(6447)583.96 K]Verifying Mobile Ad-Hoc Security Routing Protocols with Type InferenceLI Qin and ZENG Qing-Kai2009,20(10):2822-2833 [Abstract(5195)] [View PDF(7121)645.24 K]Finding and Ranking Semantic Web SitesZHANG Xiang,GE Wei-Yi and U Yu-Zhong2009,20(10):2834-3843 [Abstract(5959)] [View PDF(7613)541.91 K]2008年中国计算机大会推荐优秀论文介绍ZHENG Wei-Min2009,20(10):2857-2858 [Abstract(5069)] [View PDF(6304)191.09 K]