Volume 20,Issue 10,2009 Table of Contents

Other Issues:  
  
Contents

  • Refactoring Generic Instantiations Based on Type Propagation Analysis
  • CHEN Lin,XU Bao-Wen,QIAN Ju,ZHOU Tian-Lin and ZHOU Yu-Ming
  • 2009,20(10):2617-2627 [Abstract(4917)]  [View PDF(6617)642.10 K]
  • Algorithms for Rule Generation and Matchmaking in Context-Aware System
  • LIU Dong,MENG Xiang-Wu,CHEN Jun-Liang and XIA Ya-Mei
  • 2009,20(10):2655-2666 [Abstract(5332)]  [View PDF(7325)782.68 K]
  • Internet Traffic Classification Using C4.5 Decision Tree
  • XU Peng and LIN Sen
  • 2009,20(10):2692-2704 [Abstract(5780)]  [View PDF(11114)645.73 K]
  • Route-Sign-Based Adaptive Void Handling Geographical Routing Algorithm
  • ZHANG Heng-Yang,WANG Ling,LIU Yun-Hui and CAI Xuan-Ping
  • 2009,20(10):2744-2751 [Abstract(4730)]  [View PDF(5946)566.38 K]
  • Cache System Based on Disk Media for Network Storage
  • YIN Yang,LIU Zhen-Jun and XU Lu
  • 2009,20(10):2752-2765 [Abstract(4781)]  [View PDF(7806)892.16 K]
  • Overcome the Limitation on Authentication Test
  • LIU Jia-Fen and ZHOU Ming-Tian
  • 2009,20(10):2799-2809 [Abstract(4945)]  [View PDF(5640)581.28 K]
  • Cryptographic Workflow Key Encapsulation Mechanism Based on Signcryption
  • LAI Xin and HE Da-Ke
  • 2009,20(10):2810-2821 [Abstract(4809)]  [View PDF(6499)614.13 K]
  • Importance Sampling Method of Software Reliability Estimation
  • ZHANG De-Ping,NIE Chang-Hai and XU Bao-Wen
  • 2009,20(10):2859-2866 [Abstract(5583)]  [View PDF(8169)500.93 K]
  • Similarity Search in Data Stream with Adaptive Segmental Approximations
  • WU Feng,ZHONG Yan,WU Quan-Yuan,JIA Yan and YANG Shu-Qiang
  • 2009,20(10):2867-2884 [Abstract(4944)]  [View PDF(6431)1.43 M]
  • Robust Feedback Credibility-Based Distributed P2P Trust Model
  • HU Jian-Li,WU Quan-Yuan,ZHOU Bin and LIU Jia-Hong
  • 2009,20(10):2885-2898 [Abstract(5552)]  [View PDF(8141)1.09 M]
  • Sketch-Based Anomalies Detection with IP Address Traceability
  • LUO Na,LI Ai-Ping,WU Quan-Yuan and LU Hua-Biao
  • 2009,20(10):2899-2906 [Abstract(5292)]  [View PDF(7743)530.76 K]
  • Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme
  • PANG Liao-Jun,LI Hui-Xian,JIAO Li-Cheng and WANG Yu-Min
  • 2009,20(10):2907-2914 [Abstract(5633)]  [View PDF(7815)497.68 K]
  • Education Resource Grid Model and Replica Creation Strategies
  • XING Chang-Ming,LIU Fang-Ai,YANG Lin and LI Wen
  • 2009,20(10):3844-2856 [Abstract(4361)]  [View PDF(6071)642.62 K]
  • Review Articles

  • Addressing Protocols for Wireless Sensor Networks
  • DU Zhi-Gao,QIAN De-Pei and LIU Yi
  • 2009,20(10):2787-2798 [Abstract(8163)]  [View PDF(10297)691.97 K]
  • Online First

  • Efficient Scheduling Algorithm for Hard Real-Time Tasks in Primary-Backup Based Multiprocessor Systems
  • WANG Jian,SUN Jian-Ling,WANG Xin-Yu,YANG Xiao-Hu,WANG Shen-Kang and CHEN Jun-Bo
  • 2009,20(10):2628-2636 [Abstract(4707)]  [View PDF(7030)469.51 K]
  • Experimental Study to Compare the Use of Metamorphic Testing and Assertion Checking
  • ZHANG Zhen-Yu,CHAN WK,TSE TH and U Pei-Feng
  • 2009,20(10):2637-2654 [Abstract(6029)]  [View PDF(7128)821.81 K]
  • Structure Matching Method Based on Functional Dependencies
  • LI Guo-Hui,DU Xiao-Kun,HU Fang-Xiao,YANG Bing and TANG Xiang-Hong
  • 2009,20(10):2667-2678 [Abstract(6145)]  [View PDF(6881)623.67 K]
  • View-Invariant Action Recognition Based on Action Graphs
  • YANG Yue-Dong,HAO Ai-Min,CHU Qing-Jun,ZHAO Qin-Ping and WANG Li-Li
  • 2009,20(10):2679-2691 [Abstract(5302)]  [View PDF(8387)745.46 K]
  • Distributed Secure Clustering Protocol in Wireless Sensor Networks
  • YU Lei,LI Jian-Zhong and LUO Ji-Zhou
  • 2009,20(10):2705-2720 [Abstract(6191)]  [View PDF(8589)785.34 K]
  • Traffic Load-Based Interference-Aware Routing Protocol for Mobile Ad Hoc Networks
  • ZHANG Xin-Ming,LIU Qiong,DAI Shi-Fang and LIU Yong-Zhen
  • 2009,20(10):2721-2728 [Abstract(5683)]  [View PDF(6818)615.79 K]
  • ACO-Based Algorithm for Solving Energy Hole Problems in Wireless Sensor Networks
  • SONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min
  • 2009,20(10):2729-2743 [Abstract(14544)]  [View PDF(12629)1.12 M]
  • Task Scheduling Based on Multidimensional Performance Clustering of Grid Service Resources
  • CHEN Zhi-Gang and YANG Bo
  • 2009,20(10):2766-2775 [Abstract(5702)]  [View PDF(6868)554.10 K]
  • Distributed Proving Oriented Language and Method for Trust Negotiation
  • WANG Xiao-Feng,SU Jin-Shu,ZHANG Qiang and ZHANG Yi-Ming
  • 2009,20(10):2776-2786 [Abstract(5753)]  [View PDF(6447)583.96 K]
  • Verifying Mobile Ad-Hoc Security Routing Protocols with Type Inference
  • LI Qin and ZENG Qing-Kai
  • 2009,20(10):2822-2833 [Abstract(5195)]  [View PDF(7121)645.24 K]
  • Finding and Ranking Semantic Web Sites
  • ZHANG Xiang,GE Wei-Yi and U Yu-Zhong
  • 2009,20(10):2834-3843 [Abstract(5959)]  [View PDF(7613)541.91 K]
  • 2008年中国计算机大会推荐优秀论文介绍
  • ZHENG Wei-Min
  • 2009,20(10):2857-2858 [Abstract(5069)]  [View PDF(6304)191.09 K]