Volume 17,Issue 12,2006 Table of Contents
A Parallel Analysis Algorithm for Sequence Stream Based on Proactive Fault ToleranceZHAO Feng,LI Qing-Hua and JIN Li2006,17(12):2416-2424 [Abstract(4268)] [View PDF(5202)635.14 K]Efficient Fault Tolerant Compilation: Compress Error Flow to Reduce Power and Enhance PerformanceGAO Long and YANG Xue-Jun2006,17(12):2425-2437 [Abstract(4751)] [View PDF(5386)842.78 K]Impact of the Compactness of Failure Regions on the Performance of Adaptive Random TestingCHEN Tsong-Yueh,KUO Fei-Ching and SUN Chang-Ai2006,17(12):2438-2449 [Abstract(5001)] [View PDF(5111)1.01 M]A Risk-Driven Method for Prioritizing Requirements in Iteration DevelopmentHUANG Meng,SHU Feng-Di and LI Ming-Shu2006,17(12):2450-2460 [Abstract(4577)] [View PDF(5836)690.81 K]A Simulation Model of Loosely Coupled Inter-Organizational WorkflowsCHENG Shao-Wu,XU Xiao-Fei,WANG Gang and LI Quan-Long2006,17(12):2461-2470 [Abstract(6915)] [View PDF(5772)702.65 K]A Global Algorithm for Straight Line Stereo Matching Based on Feature GroupingWEN GongJian2006,17(12):2471-2484 [Abstract(4315)] [View PDF(6192)829.94 K]Bounded Model Checking for Temporal Epistemic Logic in Synchronous Multi-Agent SystemsLUO Xiang-Yu,SU Kai-Le and YANG Jin-Ji2006,17(12):2485-2498 [Abstract(5074)] [View PDF(5545)1.00 M]Algorithms for Equal-Quality Fine Granularity Scalable Video StreamingMEI Zheng,LI Jin-Tao and NING Hua2006,17(12):2499-2507 [Abstract(4683)] [View PDF(5312)711.22 K]Histogram Sequence of Local Gabor Binary Pattern for Face Description and IdentificationZHANG Wen-Chao,SHAN Shi-Guang,ZHANG Hong-Ming,CHEN Jie,CHEN Xi-Lin and GAO Wen2006,17(12):2508-2517 [Abstract(6247)] [View PDF(6288)690.62 K]Implementation of Preference Reasoning by Manipulating Logical ChainZHANG Zhi-Zheng,ZHAI Yu-Qing x and XING Han-Cheng2006,17(12):2518-2528 [Abstract(4390)] [View PDF(5650)915.71 K]Super-Resolution Reconstruction for Face Images Based on Particle Filters MethodHUANG Hua,FAN Xin,QI Chun and ZHU Shi-Hua2006,17(12):2529-2536 [Abstract(4432)] [View PDF(6131)560.51 K]Choosing Multi-Issue Negotiating Object Based on Trust and K-Armed Bandit ProblemWANG Li-Ming,HUANG Hou-Kuan and CHAI Yu-Mei2006,17(12):2537-2546 [Abstract(4970)] [View PDF(6504)687.07 K]Confidence Measures and Integrating Algorithm in Utterance VerificationYAN Bin-Feng,ZHU Xiao-Yan,ZHANG Zhi-Jiang and ZHANG Fan2006,17(12):2547-2553 [Abstract(4832)] [View PDF(5779)435.67 K]Information and Services Integrating and Scheduling Model for Event HandlingLUO Ying-Wei,LIU Xin-Peng,PENG Hao-Bo,WANG Xigo-Lin and XU Zhuo-Qun2006,17(12):2554-2564 [Abstract(4583)] [View PDF(5210)618.04 K]A Method of Topology Discovery for Switched Ethernet Based on Address Forwarding TablesSUN Yan-Tao,WU Zhi-Mei and SHI Zhi-Qiang2006,17(12):2565-2576 [Abstract(4946)] [View PDF(7209)758.90 K]Search on Security in Sensor NetworksLI Ping,LIN Ya-Ping and ZENG Wei-Ni2006,17(12):2577-2588 [Abstract(5464)] [View PDF(5590)658.43 K]A Genetic Local Search Algorithm for the Parallel Machine Batch Process Scheduling ProblemXU Xiao-Fei,ZHAN De-Chen and XU Xiao-Fei2006,17(12):2589-2600 [Abstract(4540)] [View PDF(6654)847.80 K]Constraint Specification of Weakly Hard Real-Time SystemCHEN Ji-Ming,SONG Ye-Qiong and SUN You-Xian2006,17(12):2601-2608 [Abstract(4694)] [View PDF(5401)551.44 K]
Multi-Pattern Matching Algorithms and Hardware Based ImplementationLI Wei-Nan,E Yue-Peng,GE Jing-Guo and QIAN Hua-Lin2006,17(12):2403-2415 [Abstract(8989)] [View PDF(10137)721.77 K]