Volume 18,Issue 3,2007 Table of Contents
Strategy of Extracting Domain Knowledge for STRIPS WorldWU Xiang-Jun,JIANG Yun-Fei and LING Ying-Biao2007,18(3):490-504 [Abstract(4450)] [View PDF(5661)1007.50 K]A Quick Multi-Objective Evolutionary Algorithm Based on Dominating TreeSHI Chuan,LI Qing-Yong and SHI Zhong-Zhi2007,18(3):505-516 [Abstract(4284)] [View PDF(5925)798.86 K]A Synthetic Fingerprint Generation Method and Its ImplementationHU Jin,TIAN Jie,CHEN Xin-Jian,YANG Xin and SHI Peng2007,18(3):517-526 [Abstract(4271)] [View PDF(5769)746.52 K]Behavior Modeling and Abnormality Detection Based on Semi-Supervised Learning MethodLI He-Ping,HU Zhan-Yi,WU Yi-Hong and WU Fu-Chao2007,18(3):527-537 [Abstract(5675)] [View PDF(6760)798.64 K]A Computational Model for Chinese Syntactic Structure Induction Based on Sentence AlignmentWANG Hou-Feng and WANG Bo2007,18(3):538-546 [Abstract(4176)] [View PDF(5193)505.64 K]An Interactive Key Video Object Selection ModelOUYANG Jian-Quan,LI Jin-Tao and ZHANG Yong-Dong2007,18(3):547-554 [Abstract(4577)] [View PDF(4948)499.06 K]Text Segmentation Model Based on Multiple Discriminant AnalysisZHU Jing-Bo,YE Na and LUO Hai-Tao2007,18(3):555-564 [Abstract(4342)] [View PDF(5610)669.18 K]Semantic Role Labeling with Maximum Entropy ClassifierLIU Ting,CHE Wan-Xiang and LI Sheng2007,18(3):565-573 [Abstract(5221)] [View PDF(6971)540.19 K]A Dynamic Formation Algorithm of Multi-Agent Coalition StructureZHANG Xin-Liang and SHI Chun-Yi2007,18(3):565-573 [Abstract(3463)] [View PDF(5884)567.41 K]An Object-Oriented Design Model of Software AgentLI Jian-Xing,MAO Xin-Jun and SHU Yao2007,18(3):582-591 [Abstract(5377)] [View PDF(5865)566.51 K]Unsupervised Texture Segmentation Based on Geodesic Active RegionsHE Yuan,LUO Yu-Pin and HU Dong-Cheng2007,18(3):592-599 [Abstract(4766)] [View PDF(5528)529.26 K]Anisotropic Diffusion of Halting Speed Fields in Geometric Active Contour ModelHE Chuan-Jiang and TANG Li-Ming2007,18(3):600-607 [Abstract(4926)] [View PDF(6436)549.99 K]A Robust Bootstrapping Algorithm of Speaker Models for On-Line Unsupervised Speaker IndexingFU Zhong-Hua and ZHANG Yan-Ning2007,18(3):608-616 [Abstract(4455)] [View PDF(5615)484.20 K]Adaptive Exchanging Strategies in Parallel Ant Colony AlgorithmCHEN Ling and ZHANG Chun-Fang2007,18(3):617-624 [Abstract(4625)] [View PDF(5822)544.66 K]Normal Measure Based Multi-Constrained Path SelectionZHENG Yan-Xing,WANG Xiao-Qing and TIAN Jing2007,18(3):636-645 [Abstract(4861)] [View PDF(5432)649.92 K]A Dynamic Web Services Selection Algorithm with QoS Global Optimal in Web Services CompositionLIU Shu-Lei,LIU Yun-Xiang,ZHANG Fan,TANG Gui-Fen and JING Ning2007,18(3):646-656 [Abstract(8621)] [View PDF(8523)695.83 K]Dynamics of Multiagents Coalition Formation in Combinatorial Electronic MarketplacesGONG Yong,YAO Li and SHA Ji-Chang2007,18(3):657-668 [Abstract(4365)] [View PDF(5285)852.75 K]A Wavelet Data Compression Algorithm Using Ring Topology for Wireless Sensor NetworksZHOU Si-Wang,LIN Ya-Ping,ZHANG Jian-Ming,OUYANG Jing-Cheng and LU Xin-Guo2007,18(3):669-680 [Abstract(4466)] [View PDF(5254)723.22 K]A Method of Selecting Steady Path Based on Neighbor Change Ratio in Mobile Ad Hoc NetworksCAI Yi-Bing,LI Hai-Bo,LI Zhong-Cheng and c2007,18(3):681-692 [Abstract(5010)] [View PDF(6388)791.07 K]Path Holding Probability Based Ad Hoc On-Demand Routing ProtocolLIU Jun,GUO Wei,XIAO Bai-Long and HUANG Fei2007,18(3):693-701 [Abstract(4217)] [View PDF(5442)626.88 K]An Energy-Efficient Distributed Topology-Control Algorithm for Ad Hoc NetworksLUO Yu-Hong,WANG Jian-Xin,HUANG Jia-Wei and CHEN Song-Qiao2007,18(3):702-713 [Abstract(4342)] [View PDF(5503)841.77 K]A Hybrid Peer-to-Peer Lookup Service Algorithm on Distributed Hash TableYANG Feng,LI Feng-Xia,YU Hong-Liang,ZHAN Shou-Yi and ZHENG Wei-Min2007,18(3):714-721 [Abstract(5107)] [View PDF(6177)559.52 K]A Public Key Encryption Algorithm on Braid GroupsTANG Xue-Ming,HONG Fan and CUI Guo-Hua2007,18(3):722-729 [Abstract(4783)] [View PDF(5536)509.38 K]A Multi-Level Security Model with Least Privilege Support for Trusted SubjectWU Yan-Jun,LIANG Hong-Liang and ZHAO Chen2007,18(3):730-738 [Abstract(4869)] [View PDF(5824)496.53 K]Information Disguising and Hiding Technique to Protect Digital Elevation Model DataLUO Yong,YANG Yue-Xiang,CHENG Li-Zhi and XU Zhi-Hong2007,18(3):739-745 [Abstract(4877)] [View PDF(5694)447.06 K]Constructing Optimistic ID-Based Fair Exchange Protocols via Proxy SignatureXU Jing,ZHANG Zhen-Feng and FENG Deng-Guo2007,18(3):746-754 [Abstract(5820)] [View PDF(4979)610.88 K]A New Approach in Optical Burst Switching Networks with QoS SupportXU Chang-Biao,LONG Ke-Ping and ZHANG Bi-Bo2007,18(3):755-764 [Abstract(4022)] [View PDF(5021)672.20 K]A Fair Bandwidth Allocation Mechanism with Preference to Short FlowsZHANG He-Ying,JIANG Jie and DOU Wen-Hua2007,18(3):765-774 [Abstract(4085)] [View PDF(4938)562.08 K]
Development in Signer-Independent Sign Language Recognition and the Ideas of Solving Some Key ProblemsJIANG Feng,GAO Wen,WANG Chun-Li,YAO Hong-Xun and ZHAO De-Bin2007,18(3):477-489 [Abstract(6781)] [View PDF(8206)755.14 K]Study on Selfishness in Application-Layer MulticastLI Dan,WU Jian-Ping and CUI Yong2007,18(3):625-635 [Abstract(7205)] [View PDF(7934)619.66 K]