Volume 21,Issue 11,2010 Table of Contents
Decomposition of Large Class Diagrams Generated by Reverse EngineeringLIU Hui,SHAO Wei-Zhong and MA Zhi-Yi2010,21(11):2701-2710 [Abstract(4719)] [View PDF(7601)385.33 K]Weak Join for the Constraint-Based Polyehdra Abstract DomainCHEN Li-Qian,WANG Ji and LIU Wan-Wei2010,21(11):2711-2724 [Abstract(5379)] [View PDF(6373)664.29 K]Identification of Centrally Managed Aggregations in Design Patterns Using Shape AnalysisZHOU Xiao-Yu,QIAN Ju,CHEN Lin and XU Bao-Wen2010,21(11):2725-2737 [Abstract(4800)] [View PDF(5775)568.66 K]Method for Generating Software Architecture Models from Formal SpecificationsZHU Yi,HUANG Zhi-Qiu,CAO Zi-Ning,ZHOU Hang and LIU Ya-Ping2010,21(11):2738-2751 [Abstract(5547)] [View PDF(7284)436.65 K]Syntax and Semantics of Timed Property Sequence ChartZHANG Peng-Cheng,LI Bi-Xin and LI Wen-Rui2010,21(11):2752-2767 [Abstract(5413)] [View PDF(6734)709.02 K]Component Substitutability Analysis and Verification Based on Behavior AutomataZHANG Jing-Zhou,REN Hong-Min,ZONG Yu-Wei,QIAN Le-Qiu and ZHU San-Yuan2010,21(11):2768-2781 [Abstract(4887)] [View PDF(5836)593.25 K]Covering Model of Granular ComputingSHE Yan-Hong and WANG Guo-Jun2010,21(11):2782-2789 [Abstract(5230)] [View PDF(5694)329.62 K]High Efficient Complex System Genetic AlgorithmZHUANG Jian,YANG Qing-Yu,DU Hai-Feng and YU De-Hong2010,21(11):2790-2801 [Abstract(5393)] [View PDF(7644)453.83 K]Clustering Algorithm Based on the Distributions of Intrinsic ClustersZENG Yi-Ling,XU Hong-Bo,WU Gao-Wei and BAI Shuo2010,21(11):2802-2813 [Abstract(4829)] [View PDF(6184)507.84 K]Semi-Supervised Cluster Ensemble Model Based on Bayesian NetworkWANG Hong-Jun,LI Zhi-Shu,QI Jian-Huai,CHENG Yang,ZHOU Peng and ZHOU Wei2010,21(11):2814-2825 [Abstract(6385)] [View PDF(7198)456.73 K]Possibilistic Extension Rules for Reasoning and Knowledge CompilationYIN Ming-Hao,SUN Ji-Gui,LIN Hai and WU Xia2010,21(11):2826-2837 [Abstract(4556)] [View PDF(5856)397.10 K]Classification Algorithm Combined GCM with CCM in Cancer RecognitionLU Xin-Guo,Lin Ya-Ping,Luo Jia-Wei and Li Dan2010,21(11):2838-2851 [Abstract(4983)] [View PDF(7684)504.36 K]Analyzing the Characteristics of Application Traffic Behavior Based on Chi-Square StatisticsCHEN Liang and GONG Jian2010,21(11):2852-2865 [Abstract(4913)] [View PDF(6563)470.09 K]Performance Optimization for IEEE 802.11 with QoS Differentiation SupportingMAO Jian-Bing,MAO Yu-Ming,LENG Su-Peng and BAI Xiang2010,21(11):2866-2882 [Abstract(5087)] [View PDF(6203)671.35 K]Localization in Wireless Sensor Network Using Locality Preserving Canonical Correlation AnalysisGU Jing-Jing,CHEN Song-Can and ZHUANG Yi2010,21(11):2883-2891 [Abstract(5298)] [View PDF(6541)377.47 K]Network Coding Method Using Heuristic Algorithms for Wireless Ad Hoc NetworksJIAO Xian-Long,WANG Xiao-Dong and ZHOU Xing-Ming2010,21(11):2892-2905 [Abstract(4737)] [View PDF(5894)546.34 K]Forward-Secure Multi-Signature in the Standard Model: Security Model and ConstructionYU Jia,HAO Rong,KONG Fan-Yu,CHENG Xiang-Guo and GUO Xiang-Fa2010,21(11):2920-2932 [Abstract(5514)] [View PDF(6109)411.77 K]Design of Double Rounds Clustering Protocol for Improving Energy Efficient in Wireless Sensor NetworksCHEN Qing-Zhang,ZHAO Xiao-Min and CHEN Xiao-Ying2010,21(11):2933-2943 [Abstract(5036)] [View PDF(5876)469.05 K]Critical Vulnerability Analysis and Exploitation Based on Exception CaptureSHI Yun-Feng,ZHANG Jin-Xiang and FENG Jian-Hua2010,21(11):2944-2958 [Abstract(4216)] [View PDF(5852)434.38 K]Real-Time Subsurface Scattering Rendering Method for Dynamic ObjectsZHAO Qin-Ping,LI Shuai,HAO Ai-Min and GAO Yu-Jian2010,21(11):2959-2970 [Abstract(4419)] [View PDF(7497)599.80 K]Near Duplicate Keyframes Identifying and Correlation Analyzing of News Video StoriesWEN Jun,WU Ling-Da,ZEN Pu and LUAN Xi-Dao2010,21(11):2971-2984 [Abstract(4302)] [View PDF(6435)652.81 K]Stereo Matching Algorithm Using Segment Geometric Constraint and Disparity ProbabilityZHAI Zhen-Gang,LU Yao and ZHAO Hong2010,21(11):2985-2998 [Abstract(4528)] [View PDF(7056)605.19 K]
Prerequisite to 1-Connected Vehicular Ad Hoc Networks in Highway ScenariosXIONG Wei and LI Qing-Quan2010,21(11):2906-2919 [Abstract(6218)] [View PDF(7906)1001.99 K]