Volume 17,Issue 12,2006 Table of Contents
A Parallel Analysis Algorithm for Sequence Stream Based on Proactive Fault ToleranceZHAO Feng,LI Qing-Hua and JIN Li2006,17(12):2416-2424 [Abstract(4270)] [View PDF(5220)635.14 K]Efficient Fault Tolerant Compilation: Compress Error Flow to Reduce Power and Enhance PerformanceGAO Long and YANG Xue-Jun2006,17(12):2425-2437 [Abstract(4763)] [View PDF(5404)842.78 K]Impact of the Compactness of Failure Regions on the Performance of Adaptive Random TestingCHEN Tsong-Yueh,KUO Fei-Ching and SUN Chang-Ai2006,17(12):2438-2449 [Abstract(5007)] [View PDF(5133)1.01 M]A Risk-Driven Method for Prioritizing Requirements in Iteration DevelopmentHUANG Meng,SHU Feng-Di and LI Ming-Shu2006,17(12):2450-2460 [Abstract(4582)] [View PDF(5859)690.81 K]A Simulation Model of Loosely Coupled Inter-Organizational WorkflowsCHENG Shao-Wu,XU Xiao-Fei,WANG Gang and LI Quan-Long2006,17(12):2461-2470 [Abstract(6918)] [View PDF(5792)702.65 K]A Global Algorithm for Straight Line Stereo Matching Based on Feature GroupingWEN GongJian2006,17(12):2471-2484 [Abstract(4319)] [View PDF(6210)829.94 K]Bounded Model Checking for Temporal Epistemic Logic in Synchronous Multi-Agent SystemsLUO Xiang-Yu,SU Kai-Le and YANG Jin-Ji2006,17(12):2485-2498 [Abstract(5079)] [View PDF(5567)1.00 M]Algorithms for Equal-Quality Fine Granularity Scalable Video StreamingMEI Zheng,LI Jin-Tao and NING Hua2006,17(12):2499-2507 [Abstract(4688)] [View PDF(5328)711.22 K]Histogram Sequence of Local Gabor Binary Pattern for Face Description and IdentificationZHANG Wen-Chao,SHAN Shi-Guang,ZHANG Hong-Ming,CHEN Jie,CHEN Xi-Lin and GAO Wen2006,17(12):2508-2517 [Abstract(6251)] [View PDF(6306)690.62 K]Implementation of Preference Reasoning by Manipulating Logical ChainZHANG Zhi-Zheng,ZHAI Yu-Qing x and XING Han-Cheng2006,17(12):2518-2528 [Abstract(4393)] [View PDF(5680)915.71 K]Super-Resolution Reconstruction for Face Images Based on Particle Filters MethodHUANG Hua,FAN Xin,QI Chun and ZHU Shi-Hua2006,17(12):2529-2536 [Abstract(4435)] [View PDF(6147)560.51 K]Choosing Multi-Issue Negotiating Object Based on Trust and K-Armed Bandit ProblemWANG Li-Ming,HUANG Hou-Kuan and CHAI Yu-Mei2006,17(12):2537-2546 [Abstract(4972)] [View PDF(6531)687.07 K]Confidence Measures and Integrating Algorithm in Utterance VerificationYAN Bin-Feng,ZHU Xiao-Yan,ZHANG Zhi-Jiang and ZHANG Fan2006,17(12):2547-2553 [Abstract(4837)] [View PDF(5794)435.67 K]Information and Services Integrating and Scheduling Model for Event HandlingLUO Ying-Wei,LIU Xin-Peng,PENG Hao-Bo,WANG Xigo-Lin and XU Zhuo-Qun2006,17(12):2554-2564 [Abstract(4587)] [View PDF(5228)618.04 K]A Method of Topology Discovery for Switched Ethernet Based on Address Forwarding TablesSUN Yan-Tao,WU Zhi-Mei and SHI Zhi-Qiang2006,17(12):2565-2576 [Abstract(4949)] [View PDF(7229)758.90 K]Search on Security in Sensor NetworksLI Ping,LIN Ya-Ping and ZENG Wei-Ni2006,17(12):2577-2588 [Abstract(5470)] [View PDF(5607)658.43 K]A Genetic Local Search Algorithm for the Parallel Machine Batch Process Scheduling ProblemXU Xiao-Fei,ZHAN De-Chen and XU Xiao-Fei2006,17(12):2589-2600 [Abstract(4548)] [View PDF(6677)847.80 K]Constraint Specification of Weakly Hard Real-Time SystemCHEN Ji-Ming,SONG Ye-Qiong and SUN You-Xian2006,17(12):2601-2608 [Abstract(4699)] [View PDF(5417)551.44 K]
Multi-Pattern Matching Algorithms and Hardware Based ImplementationLI Wei-Nan,E Yue-Peng,GE Jing-Guo and QIAN Hua-Lin2006,17(12):2403-2415 [Abstract(8996)] [View PDF(10158)721.77 K]