Volume 16,Issue 11,2005 Table of Contents
A Role-Based Approach for Decentralized Dynamic Service CompositionLIU Bi-Xin,WANG Yu-Feng,JIA Yan and WU Quan-Yuan2005,16(11):1859-1867 [Abstract(4188)] [View PDF(5957)614.47 K]Consistency Analysis of Complex Declarative Simulation ModelsDING Jian-Wan,CHEN Li-Ping,ZHOU Fan-Li and HUANG Hua2005,16(11):1868-1875 [Abstract(3955)] [View PDF(5200)469.34 K]A Kind of Reactive SPM and the Expression of Its Dynamic Semantics with XYZDONG Guang-Zhi,LIU Jun-Fei and QI Xuan2005,16(11):1876-1885 [Abstract(4105)] [View PDF(5167)582.66 K]A Data Object Placement Algorithm Based on Dynamic Interval MappingLIU Zhong and ZHOU Xing-Ming2005,16(11):1886-1893 [Abstract(4480)] [View PDF(5798)422.65 K]Face Samples Expanding Based on the GA Re-SamplingCHEN Jie,CHEN Xi-Lin and GAO Wen2005,16(11):1894-1901 [Abstract(4026)] [View PDF(4828)542.01 K]An Optimized Neural Network Linear Ensemble for ClassificationWANG Zheng-Qun,CHEN Shi-Fu and CHEN Zhao-Qian2005,16(11):1902-1908 [Abstract(4332)] [View PDF(5421)398.31 K]High Speed Multi-Language Machine Translation Based on Pruning on the Tree of Representations of Semantic ElementsGAO Xiao-Yu,GAO Qing-Shi,HU Yue and LI Li2005,16(11):1909-1919 [Abstract(4123)] [View PDF(5271)1.01 M]Speculative Computation Based on Master Agent Belief Revision and Its Resource NegotiationWANG Li-Ming and HUANG Hou-Kuan2005,16(11):1920-1928 [Abstract(3924)] [View PDF(4755)503.31 K]Adaptive Failure Detection in Web Application ServerCHEN Ning-Jiang,WEI Jun,YANG Bo and HUANG Tao2005,16(11):1929-1938 [Abstract(4023)] [View PDF(5143)666.07 K]An Approach to Measure and Evaluate the Network SecurityHU Han-Ping,CHEN Xiang,ZHANG Bao-Liang and GUO Wen-Xuan2005,16(11):1939-1945 [Abstract(3535)] [View PDF(5701)547.35 K]A Maximum Lifetime Data Gathering Algorithm for Wireless Sensor NetworksZHANG Qing,XIE Zhi-Peng,LING Bo,SUN Wei-Wei and SHI Bai-Le2005,16(11):1946-1957 [Abstract(4749)] [View PDF(5329)796.88 K]Web Key Resource Page Judgment Based on Improved Decision Tree AlgorithmLIU Yi-Qun,ZHANG Min and MA Shao-Ping2005,16(11):1958-1966 [Abstract(3999)] [View PDF(5060)467.74 K]Signature Scheme for Specified Threshold Verifiers and Security ProofsCHEN Wei-Dong,FENG Deng-Guo and TAN Zuo-Wen2005,16(11):1967-1974 [Abstract(5095)] [View PDF(5228)496.91 K]A Self-Adaptive Algorithm on Image EncryptionCHEN Gang,ZHAO Xiao-Yu and LI Jun-Li2005,16(11):1975-1982 [Abstract(4384)] [View PDF(5737)745.54 K]A Heuristic Strategy for Spherical Point LocationWU Yong,HE Yuan-Jun and CAI Hong-Ming2005,16(11):1983-1991 [Abstract(4045)] [View PDF(5003)704.80 K]Extension of the Ball BasisSHEN Wan-Qiang and WANG Guo-Zhao2005,16(11):1992-1999 [Abstract(3571)] [View PDF(4696)536.37 K]Mesh Fusion Based on Variational Implicit SurfacesWAN Hua-Gen,JIN Xiao-Gang,LIU Gang,FENG Jie-Qing and PENG Qun-Sheng2005,16(11):2000-2007 [Abstract(4129)] [View PDF(5289)488.38 K]Implementation of Finite Element Method Mesh Generation from Multiple Trimmed Free SurfacesZHANG Su and SHI Fa-Zhong2005,16(11):2008-2013 [Abstract(3908)] [View PDF(5656)425.74 K]Texture Mapping on Real World Models from Multiple Photographic ImagesLIU Gang,PENG Qun-Sheng and BAO Hu-Jun2005,16(11):2014-2020 [Abstract(3887)] [View PDF(5048)401.24 K]Summarization and Analysis of Application for Funding and Supporting for Programs by Computer Science Division of Information Science Department of NSFC in 2005XU Lin,LIU Zhi-Yong and LIU Ke2005,16(11):2021-2028 [Abstract(4127)] [View PDF(6393)1.13 M]