Volume 21,Issue 11,2010 Table of Contents

Other Issues:  
  
Contents

  • Decomposition of Large Class Diagrams Generated by Reverse Engineering
  • LIU Hui,SHAO Wei-Zhong and MA Zhi-Yi
  • 2010,21(11):2701-2710 [Abstract(4719)]  [View PDF(7601)385.33 K]
  • Weak Join for the Constraint-Based Polyehdra Abstract Domain
  • CHEN Li-Qian,WANG Ji and LIU Wan-Wei
  • 2010,21(11):2711-2724 [Abstract(5379)]  [View PDF(6373)664.29 K]
  • Identification of Centrally Managed Aggregations in Design Patterns Using Shape Analysis
  • ZHOU Xiao-Yu,QIAN Ju,CHEN Lin and XU Bao-Wen
  • 2010,21(11):2725-2737 [Abstract(4800)]  [View PDF(5775)568.66 K]
  • Method for Generating Software Architecture Models from Formal Specifications
  • ZHU Yi,HUANG Zhi-Qiu,CAO Zi-Ning,ZHOU Hang and LIU Ya-Ping
  • 2010,21(11):2738-2751 [Abstract(5547)]  [View PDF(7284)436.65 K]
  • Syntax and Semantics of Timed Property Sequence Chart
  • ZHANG Peng-Cheng,LI Bi-Xin and LI Wen-Rui
  • 2010,21(11):2752-2767 [Abstract(5413)]  [View PDF(6734)709.02 K]
  • Component Substitutability Analysis and Verification Based on Behavior Automata
  • ZHANG Jing-Zhou,REN Hong-Min,ZONG Yu-Wei,QIAN Le-Qiu and ZHU San-Yuan
  • 2010,21(11):2768-2781 [Abstract(4887)]  [View PDF(5836)593.25 K]
  • Covering Model of Granular Computing
  • SHE Yan-Hong and WANG Guo-Jun
  • 2010,21(11):2782-2789 [Abstract(5230)]  [View PDF(5694)329.62 K]
  • High Efficient Complex System Genetic Algorithm
  • ZHUANG Jian,YANG Qing-Yu,DU Hai-Feng and YU De-Hong
  • 2010,21(11):2790-2801 [Abstract(5393)]  [View PDF(7644)453.83 K]
  • Clustering Algorithm Based on the Distributions of Intrinsic Clusters
  • ZENG Yi-Ling,XU Hong-Bo,WU Gao-Wei and BAI Shuo
  • 2010,21(11):2802-2813 [Abstract(4829)]  [View PDF(6184)507.84 K]
  • Semi-Supervised Cluster Ensemble Model Based on Bayesian Network
  • WANG Hong-Jun,LI Zhi-Shu,QI Jian-Huai,CHENG Yang,ZHOU Peng and ZHOU Wei
  • 2010,21(11):2814-2825 [Abstract(6385)]  [View PDF(7198)456.73 K]
  • Possibilistic Extension Rules for Reasoning and Knowledge Compilation
  • YIN Ming-Hao,SUN Ji-Gui,LIN Hai and WU Xia
  • 2010,21(11):2826-2837 [Abstract(4556)]  [View PDF(5856)397.10 K]
  • Classification Algorithm Combined GCM with CCM in Cancer Recognition
  • LU Xin-Guo,Lin Ya-Ping,Luo Jia-Wei and Li Dan
  • 2010,21(11):2838-2851 [Abstract(4983)]  [View PDF(7684)504.36 K]
  • Analyzing the Characteristics of Application Traffic Behavior Based on Chi-Square Statistics
  • CHEN Liang and GONG Jian
  • 2010,21(11):2852-2865 [Abstract(4913)]  [View PDF(6563)470.09 K]
  • Performance Optimization for IEEE 802.11 with QoS Differentiation Supporting
  • MAO Jian-Bing,MAO Yu-Ming,LENG Su-Peng and BAI Xiang
  • 2010,21(11):2866-2882 [Abstract(5087)]  [View PDF(6203)671.35 K]
  • Localization in Wireless Sensor Network Using Locality Preserving Canonical Correlation Analysis
  • GU Jing-Jing,CHEN Song-Can and ZHUANG Yi
  • 2010,21(11):2883-2891 [Abstract(5298)]  [View PDF(6541)377.47 K]
  • Network Coding Method Using Heuristic Algorithms for Wireless Ad Hoc Networks
  • JIAO Xian-Long,WANG Xiao-Dong and ZHOU Xing-Ming
  • 2010,21(11):2892-2905 [Abstract(4737)]  [View PDF(5894)546.34 K]
  • Forward-Secure Multi-Signature in the Standard Model: Security Model and Construction
  • YU Jia,HAO Rong,KONG Fan-Yu,CHENG Xiang-Guo and GUO Xiang-Fa
  • 2010,21(11):2920-2932 [Abstract(5514)]  [View PDF(6109)411.77 K]
  • Design of Double Rounds Clustering Protocol for Improving Energy Efficient in Wireless Sensor Networks
  • CHEN Qing-Zhang,ZHAO Xiao-Min and CHEN Xiao-Ying
  • 2010,21(11):2933-2943 [Abstract(5036)]  [View PDF(5876)469.05 K]
  • Critical Vulnerability Analysis and Exploitation Based on Exception Capture
  • SHI Yun-Feng,ZHANG Jin-Xiang and FENG Jian-Hua
  • 2010,21(11):2944-2958 [Abstract(4216)]  [View PDF(5852)434.38 K]
  • Real-Time Subsurface Scattering Rendering Method for Dynamic Objects
  • ZHAO Qin-Ping,LI Shuai,HAO Ai-Min and GAO Yu-Jian
  • 2010,21(11):2959-2970 [Abstract(4419)]  [View PDF(7497)599.80 K]
  • Near Duplicate Keyframes Identifying and Correlation Analyzing of News Video Stories
  • WEN Jun,WU Ling-Da,ZEN Pu and LUAN Xi-Dao
  • 2010,21(11):2971-2984 [Abstract(4302)]  [View PDF(6435)652.81 K]
  • Stereo Matching Algorithm Using Segment Geometric Constraint and Disparity Probability
  • ZHAI Zhen-Gang,LU Yao and ZHAO Hong
  • 2010,21(11):2985-2998 [Abstract(4528)]  [View PDF(7056)605.19 K]
  • Online First

  • Prerequisite to 1-Connected Vehicular Ad Hoc Networks in Highway Scenarios
  • XIONG Wei and LI Qing-Quan
  • 2010,21(11):2906-2919 [Abstract(6218)]  [View PDF(7906)1001.99 K]