Volume 17,Issue 2,2006 Table of Contents
An Algorithm for Minimal Connected Cover Set Problem in Wireless Sensor NetworksJIANG Jie,FANG Li,ZHANG He-Ying and DOU Wen-Hua2006,17(2):175-184 [Abstract(5173)] [View PDF(8179)664.57 K]A Time-Sequence Similarity Matching Algorithm for Seismological Relevant ZonesWU Shao-Chun,WU Geng-Feng,WANG Wei and YU Zhao-Chun2006,17(2):185-192 [Abstract(4489)] [View PDF(6142)329.82 K]An Approach to Correcting DNA Sequencing ErrorZHENG Wei-Min,ZHANG Hua and WANG Xiao-Chuan2006,17(2):193-199 [Abstract(4652)] [View PDF(5698)413.99 K]Wavelength Assignment Algorithms on Trees of Rings under Different Communication ModelsXU Yin-Long,WANG Qi-Hua and CHEN Guo-Liang2006,17(2):200-208 [Abstract(3927)] [View PDF(4956)538.74 K]A Fast Matching Algorithm Based on Image Gray ValueLI Qiang and ZHANG Bo2006,17(2):216-222 [Abstract(5619)] [View PDF(16315)495.06 K]Small World Structure Inspired Many to Many Kernel Associative Memory Models and Their ApplicationCHEN Lei,CHEN Song-Can and ZHANG Dao-Qiang2006,17(2):223-231 [Abstract(4355)] [View PDF(5880)953.78 K]A Sequence Similarity Query Processing Technique Based on Two-Partitioning Frequency TransformationWANG Guo-Ren,GE Jian,XU Heng-Yu and ZHENG Ruo-Shi2006,17(2):232-241 [Abstract(4411)] [View PDF(5400)619.16 K]Localization of Singular Points in Fingerprint Images Based on the Gaussian-Hermite MomentsWANG Lin and DAI Mo2006,17(2):242-249 [Abstract(4567)] [View PDF(5553)687.78 K]Grouping Utterances in Spoken DialoguesXU Wei-Qun,XU Bo and HUANG Tai-Yi2006,17(2):250-258 [Abstract(4581)] [View PDF(5419)609.12 K]Inducing Fuzzy Classes for Chinese Polysemic Verbs via Subcategorization InformationHAN Xi-Wu and ZHAO Tie-Jun2006,17(2):259-266 [Abstract(4753)] [View PDF(5550)633.08 K]A Neighborhood-Based Bandwidth Scheduling Scheme in WiMAX NetworksDU Wen-Feng,JIA Wei-Jia and WANG Guo-Jun2006,17(2):267-274 [Abstract(4473)] [View PDF(5171)492.46 K]A High Precision Approach of Network Delay Measurement Based on General PCLI Wen-Wei,ZHANG Da-Fang,XIE Gao-Gang and YANG Jin-Min2006,17(2):275-284 [Abstract(4726)] [View PDF(8029)535.19 K]Modeling and Improvement of PIM-SM ProtocolLI Dan,WU Jian-Ping,CUI Yong,XU Ke and LIU Ying2006,17(2):285-294 [Abstract(4679)] [View PDF(5730)594.07 K]A Router Anomaly Traffic Filter Algorithm Based on Character AggregationSUN Zhi-Xin,TANG Yi-Wei,ZHANG Wei,GONG Jing and WANG Ru-Chuan2006,17(2):295-304 [Abstract(4829)] [View PDF(6009)587.12 K]Certificates Storage Strategy and Search Algorithm Based on Hilbert CurveGAO Ying,CHENG Tao-Yuan and WANG Shan2006,17(2):305-314 [Abstract(4296)] [View PDF(5734)553.50 K]A Semi-Fragile Image Watermarking Resisting to JPEGLI Chun and HUANG Ji-Wu2006,17(2):315-324 [Abstract(4473)] [View PDF(7318)967.62 K]Data Allocation Algorithms in Layered P2P StreamingLIU Ya-Jie,ZHANG He-Ying,DOU Wen-Hua and CHEN Jun-Feng2006,17(2):325-332 [Abstract(4964)] [View PDF(5952)488.58 K]Cryptanalysis of the TAE Mode and Its ImprovementWANG Peng and FENG Deng-Guo2006,17(2):333-338 [Abstract(4597)] [View PDF(5485)389.61 K]An Advanced Algorithm to P2P Semantic Routing Based on the Topologically-Aware Clustering in Self-Organizing ModeLIU Ye and YANG Peng2006,17(2):339-348 [Abstract(4027)] [View PDF(5974)546.67 K]Goal Ordering Extraction and Abstract MethodLI Ying and JIN Zhi2006,17(2):349-355 [Abstract(4120)] [View PDF(4704)443.39 K]
Advances in Algorithmic CompositionFENG Yin and ZHOU Chang-Le2006,17(2):209-215 [Abstract(8090)] [View PDF(10010)357.02 K]