Volume 21,Issue 3,2010 Table of Contents
Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SONGCIChang-Le ZHOU,Wei YOU and Xiao-Jun Ding2010,21(3):427-437 [Abstract(33229)] [View PDF(40724)308.76 K]RFID Data Interpolation Algorithm Based on Dynamic Probabilistic Path-Event ModelGU Yu,YU Ge,LI Xiao-Jing and WANG Yi2010,21(3):438-451 [Abstract(5207)] [View PDF(7142)1.27 M]Approach for Object Recognition Based on a Computational Model of Feature BindingLIU Xi,SHI Zhong-Zhi,SHI Zhi-Wei and SHI Zhi-Ping2010,21(3):452-460 [Abstract(5719)] [View PDF(6990)964.63 K]Hidden Markov Model for Multi-Thread Programs Time Sequence AnalysisKONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,SHUAI Jian-Mei and GONG Tao2010,21(3):461-472 [Abstract(5711)] [View PDF(7346)814.22 K]Real-Time Query Processing for Sensor Networks Based on Ant AlgorithmYU Jian-Ping and LIN Ya-Ping2010,21(3):473-489 [Abstract(5347)] [View PDF(8698)1.32 M]Relative Distance-Aware Data Delivery Scheme for Delay Tolerant Mobile Sensor NetworksXU Fu-Long,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai,LI Jian-Ping and ZHU Jin-Qi2010,21(3):490-504 [Abstract(5029)] [View PDF(6685)1.03 M]Key Management Scheme Using Time-Based Deployment for Wireless Sensor NetworksYUAN Ting,MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong2010,21(3):516-527 [Abstract(5588)] [View PDF(7057)940.68 K]Approach of Degenerate Test Set Generation Based on Secure State TransitionCHENG Liang,ZHANG Yang and FENG Deng-Guo2010,21(3):539-547 [Abstract(5259)] [View PDF(6761)658.31 K]Collision Classification Model-Based Collision Resolution AlgorithmZHANG Qi-Fei,LIU Wei,SUN Bao-Lin,GUI Chao and YAN Bing2010,21(3):548-563 [Abstract(5609)] [View PDF(6810)1.08 M]Markov Model of DCF Protocol Based on Fixed Slot in Multi-Hop Ad Hoc NetworksLEI Lei1,XU Zong-Ze and CAI Wei-Ling2010,21(3):564-574 [Abstract(5537)] [View PDF(6884)815.49 K]
Approach for Efficient Subgraph Isomorphism Testing for Multiple GraphsZHANG Shuo,LI Jian-Zhong,,GAO Hong and ZOU Zhao-Nian2010,21(3):401-414 [Abstract(7981)] [View PDF(10527)915.78 K]Pointer Logic for Verification of Pointer ProgramsCHEN Yi-Yun,LI Zhao-Peng,WANG Zhi-Fang and HUA Bao-Jian2010,21(3):415-426 [Abstract(5528)] [View PDF(6083)857.80 K]Reputation-Based Collaborative Management Method for Inter-Domain Routing SecurityHU Ning,ZOU Peng and ZHU Pei-Dong2010,21(3):505-515 [Abstract(6631)] [View PDF(7962)767.44 K]Delay-Guaranteed Key Flow Routing Adjustment AlgorithmPEI Yu-Jie,WANG Hong-Bo and CHENG Shi-Duan2010,21(3):528-538 [Abstract(6402)] [View PDF(9045)989.71 K]