Volume 21,Issue 11,2010 Table of Contents
Decomposition of Large Class Diagrams Generated by Reverse EngineeringLIU Hui,SHAO Wei-Zhong and MA Zhi-Yi2010,21(11):2701-2710 [Abstract(4736)] [View PDF(7768)385.33 K]Weak Join for the Constraint-Based Polyehdra Abstract DomainCHEN Li-Qian,WANG Ji and LIU Wan-Wei2010,21(11):2711-2724 [Abstract(5423)] [View PDF(6526)664.29 K]Identification of Centrally Managed Aggregations in Design Patterns Using Shape AnalysisZHOU Xiao-Yu,QIAN Ju,CHEN Lin and XU Bao-Wen2010,21(11):2725-2737 [Abstract(4830)] [View PDF(5921)568.66 K]Method for Generating Software Architecture Models from Formal SpecificationsZHU Yi,HUANG Zhi-Qiu,CAO Zi-Ning,ZHOU Hang and LIU Ya-Ping2010,21(11):2738-2751 [Abstract(5582)] [View PDF(7450)436.65 K]Syntax and Semantics of Timed Property Sequence ChartZHANG Peng-Cheng,LI Bi-Xin and LI Wen-Rui2010,21(11):2752-2767 [Abstract(5447)] [View PDF(6935)709.02 K]Component Substitutability Analysis and Verification Based on Behavior AutomataZHANG Jing-Zhou,REN Hong-Min,ZONG Yu-Wei,QIAN Le-Qiu and ZHU San-Yuan2010,21(11):2768-2781 [Abstract(4920)] [View PDF(5984)593.25 K]Covering Model of Granular ComputingSHE Yan-Hong and WANG Guo-Jun2010,21(11):2782-2789 [Abstract(5257)] [View PDF(5861)329.62 K]High Efficient Complex System Genetic AlgorithmZHUANG Jian,YANG Qing-Yu,DU Hai-Feng and YU De-Hong2010,21(11):2790-2801 [Abstract(5439)] [View PDF(7814)453.83 K]Clustering Algorithm Based on the Distributions of Intrinsic ClustersZENG Yi-Ling,XU Hong-Bo,WU Gao-Wei and BAI Shuo2010,21(11):2802-2813 [Abstract(4851)] [View PDF(6298)507.84 K]Semi-Supervised Cluster Ensemble Model Based on Bayesian NetworkWANG Hong-Jun,LI Zhi-Shu,QI Jian-Huai,CHENG Yang,ZHOU Peng and ZHOU Wei2010,21(11):2814-2825 [Abstract(6434)] [View PDF(7390)456.73 K]Possibilistic Extension Rules for Reasoning and Knowledge CompilationYIN Ming-Hao,SUN Ji-Gui,LIN Hai and WU Xia2010,21(11):2826-2837 [Abstract(4588)] [View PDF(6024)397.10 K]Classification Algorithm Combined GCM with CCM in Cancer RecognitionLU Xin-Guo,Lin Ya-Ping,Luo Jia-Wei and Li Dan2010,21(11):2838-2851 [Abstract(5019)] [View PDF(7954)504.36 K]Analyzing the Characteristics of Application Traffic Behavior Based on Chi-Square StatisticsCHEN Liang and GONG Jian2010,21(11):2852-2865 [Abstract(4941)] [View PDF(6729)470.09 K]Performance Optimization for IEEE 802.11 with QoS Differentiation SupportingMAO Jian-Bing,MAO Yu-Ming,LENG Su-Peng and BAI Xiang2010,21(11):2866-2882 [Abstract(5120)] [View PDF(6508)671.35 K]Localization in Wireless Sensor Network Using Locality Preserving Canonical Correlation AnalysisGU Jing-Jing,CHEN Song-Can and ZHUANG Yi2010,21(11):2883-2891 [Abstract(5344)] [View PDF(6700)377.47 K]Network Coding Method Using Heuristic Algorithms for Wireless Ad Hoc NetworksJIAO Xian-Long,WANG Xiao-Dong and ZHOU Xing-Ming2010,21(11):2892-2905 [Abstract(4768)] [View PDF(6026)546.34 K]Forward-Secure Multi-Signature in the Standard Model: Security Model and ConstructionYU Jia,HAO Rong,KONG Fan-Yu,CHENG Xiang-Guo and GUO Xiang-Fa2010,21(11):2920-2932 [Abstract(5533)] [View PDF(6282)411.77 K]Design of Double Rounds Clustering Protocol for Improving Energy Efficient in Wireless Sensor NetworksCHEN Qing-Zhang,ZHAO Xiao-Min and CHEN Xiao-Ying2010,21(11):2933-2943 [Abstract(5068)] [View PDF(6050)469.05 K]Critical Vulnerability Analysis and Exploitation Based on Exception CaptureSHI Yun-Feng,ZHANG Jin-Xiang and FENG Jian-Hua2010,21(11):2944-2958 [Abstract(4244)] [View PDF(6016)434.38 K]Real-Time Subsurface Scattering Rendering Method for Dynamic ObjectsZHAO Qin-Ping,LI Shuai,HAO Ai-Min and GAO Yu-Jian2010,21(11):2959-2970 [Abstract(4486)] [View PDF(7890)599.80 K]Near Duplicate Keyframes Identifying and Correlation Analyzing of News Video StoriesWEN Jun,WU Ling-Da,ZEN Pu and LUAN Xi-Dao2010,21(11):2971-2984 [Abstract(4340)] [View PDF(6594)652.81 K]Stereo Matching Algorithm Using Segment Geometric Constraint and Disparity ProbabilityZHAI Zhen-Gang,LU Yao and ZHAO Hong2010,21(11):2985-2998 [Abstract(4559)] [View PDF(7211)605.19 K]
Prerequisite to 1-Connected Vehicular Ad Hoc Networks in Highway ScenariosXIONG Wei and LI Qing-Quan2010,21(11):2906-2919 [Abstract(6254)] [View PDF(8131)1001.99 K]