Volume 17,Issue 2,2006 Table of Contents
An Algorithm for Minimal Connected Cover Set Problem in Wireless Sensor NetworksJIANG Jie,FANG Li,ZHANG He-Ying and DOU Wen-Hua2006,17(2):175-184 [Abstract(5148)] [View PDF(8050)664.57 K]A Time-Sequence Similarity Matching Algorithm for Seismological Relevant ZonesWU Shao-Chun,WU Geng-Feng,WANG Wei and YU Zhao-Chun2006,17(2):185-192 [Abstract(4468)] [View PDF(6017)329.82 K]An Approach to Correcting DNA Sequencing ErrorZHENG Wei-Min,ZHANG Hua and WANG Xiao-Chuan2006,17(2):193-199 [Abstract(4636)] [View PDF(5563)413.99 K]Wavelength Assignment Algorithms on Trees of Rings under Different Communication ModelsXU Yin-Long,WANG Qi-Hua and CHEN Guo-Liang2006,17(2):200-208 [Abstract(3898)] [View PDF(4827)538.74 K]A Fast Matching Algorithm Based on Image Gray ValueLI Qiang and ZHANG Bo2006,17(2):216-222 [Abstract(5586)] [View PDF(16169)495.06 K]Small World Structure Inspired Many to Many Kernel Associative Memory Models and Their ApplicationCHEN Lei,CHEN Song-Can and ZHANG Dao-Qiang2006,17(2):223-231 [Abstract(4320)] [View PDF(5712)953.78 K]A Sequence Similarity Query Processing Technique Based on Two-Partitioning Frequency TransformationWANG Guo-Ren,GE Jian,XU Heng-Yu and ZHENG Ruo-Shi2006,17(2):232-241 [Abstract(4388)] [View PDF(5274)619.16 K]Localization of Singular Points in Fingerprint Images Based on the Gaussian-Hermite MomentsWANG Lin and DAI Mo2006,17(2):242-249 [Abstract(4542)] [View PDF(5429)687.78 K]Grouping Utterances in Spoken DialoguesXU Wei-Qun,XU Bo and HUANG Tai-Yi2006,17(2):250-258 [Abstract(4537)] [View PDF(5257)609.12 K]Inducing Fuzzy Classes for Chinese Polysemic Verbs via Subcategorization InformationHAN Xi-Wu and ZHAO Tie-Jun2006,17(2):259-266 [Abstract(4715)] [View PDF(5397)633.08 K]A Neighborhood-Based Bandwidth Scheduling Scheme in WiMAX NetworksDU Wen-Feng,JIA Wei-Jia and WANG Guo-Jun2006,17(2):267-274 [Abstract(4437)] [View PDF(5015)492.46 K]A High Precision Approach of Network Delay Measurement Based on General PCLI Wen-Wei,ZHANG Da-Fang,XIE Gao-Gang and YANG Jin-Min2006,17(2):275-284 [Abstract(4705)] [View PDF(7863)535.19 K]Modeling and Improvement of PIM-SM ProtocolLI Dan,WU Jian-Ping,CUI Yong,XU Ke and LIU Ying2006,17(2):285-294 [Abstract(4647)] [View PDF(5570)594.07 K]A Router Anomaly Traffic Filter Algorithm Based on Character AggregationSUN Zhi-Xin,TANG Yi-Wei,ZHANG Wei,GONG Jing and WANG Ru-Chuan2006,17(2):295-304 [Abstract(4812)] [View PDF(5880)587.12 K]Certificates Storage Strategy and Search Algorithm Based on Hilbert CurveGAO Ying,CHENG Tao-Yuan and WANG Shan2006,17(2):305-314 [Abstract(4266)] [View PDF(5571)553.50 K]A Semi-Fragile Image Watermarking Resisting to JPEGLI Chun and HUANG Ji-Wu2006,17(2):315-324 [Abstract(4443)] [View PDF(7152)967.62 K]Data Allocation Algorithms in Layered P2P StreamingLIU Ya-Jie,ZHANG He-Ying,DOU Wen-Hua and CHEN Jun-Feng2006,17(2):325-332 [Abstract(4944)] [View PDF(5814)488.58 K]Cryptanalysis of the TAE Mode and Its ImprovementWANG Peng and FENG Deng-Guo2006,17(2):333-338 [Abstract(4573)] [View PDF(5329)389.61 K]An Advanced Algorithm to P2P Semantic Routing Based on the Topologically-Aware Clustering in Self-Organizing ModeLIU Ye and YANG Peng2006,17(2):339-348 [Abstract(4016)] [View PDF(5846)546.67 K]Goal Ordering Extraction and Abstract MethodLI Ying and JIN Zhi2006,17(2):349-355 [Abstract(4076)] [View PDF(4580)443.39 K]
Advances in Algorithmic CompositionFENG Yin and ZHOU Chang-Le2006,17(2):209-215 [Abstract(8051)] [View PDF(9597)357.02 K]