Volume 21,Issue 3,2010 Table of Contents

Other Issues:  
  
Contents

  • Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SONGCI
  • Chang-Le ZHOU,Wei YOU and Xiao-Jun Ding
  • 2010,21(3):427-437 [Abstract(33229)]  [View PDF(40724)308.76 K]
  • RFID Data Interpolation Algorithm Based on Dynamic Probabilistic Path-Event Model
  • GU Yu,YU Ge,LI Xiao-Jing and WANG Yi
  • 2010,21(3):438-451 [Abstract(5207)]  [View PDF(7142)1.27 M]
  • Approach for Object Recognition Based on a Computational Model of Feature Binding
  • LIU Xi,SHI Zhong-Zhi,SHI Zhi-Wei and SHI Zhi-Ping
  • 2010,21(3):452-460 [Abstract(5719)]  [View PDF(6990)964.63 K]
  • Hidden Markov Model for Multi-Thread Programs Time Sequence Analysis
  • KONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,SHUAI Jian-Mei and GONG Tao
  • 2010,21(3):461-472 [Abstract(5711)]  [View PDF(7346)814.22 K]
  • Real-Time Query Processing for Sensor Networks Based on Ant Algorithm
  • YU Jian-Ping and LIN Ya-Ping
  • 2010,21(3):473-489 [Abstract(5347)]  [View PDF(8698)1.32 M]
  • Relative Distance-Aware Data Delivery Scheme for Delay Tolerant Mobile Sensor Networks
  • XU Fu-Long,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai,LI Jian-Ping and ZHU Jin-Qi
  • 2010,21(3):490-504 [Abstract(5029)]  [View PDF(6685)1.03 M]
  • Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks
  • YUAN Ting,MA Jian-Qing,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2010,21(3):516-527 [Abstract(5588)]  [View PDF(7057)940.68 K]
  • Approach of Degenerate Test Set Generation Based on Secure State Transition
  • CHENG Liang,ZHANG Yang and FENG Deng-Guo
  • 2010,21(3):539-547 [Abstract(5259)]  [View PDF(6761)658.31 K]
  • Collision Classification Model-Based Collision Resolution Algorithm
  • ZHANG Qi-Fei,LIU Wei,SUN Bao-Lin,GUI Chao and YAN Bing
  • 2010,21(3):548-563 [Abstract(5609)]  [View PDF(6810)1.08 M]
  • Markov Model of DCF Protocol Based on Fixed Slot in Multi-Hop Ad Hoc Networks
  • LEI Lei1,XU Zong-Ze and CAI Wei-Ling
  • 2010,21(3):564-574 [Abstract(5537)]  [View PDF(6884)815.49 K]
  • Online First

  • Approach for Efficient Subgraph Isomorphism Testing for Multiple Graphs
  • ZHANG Shuo,LI Jian-Zhong,,GAO Hong and ZOU Zhao-Nian
  • 2010,21(3):401-414 [Abstract(7981)]  [View PDF(10527)915.78 K]
  • Pointer Logic for Verification of Pointer Programs
  • CHEN Yi-Yun,LI Zhao-Peng,WANG Zhi-Fang and HUA Bao-Jian
  • 2010,21(3):415-426 [Abstract(5528)]  [View PDF(6083)857.80 K]
  • Reputation-Based Collaborative Management Method for Inter-Domain Routing Security
  • HU Ning,ZOU Peng and ZHU Pei-Dong
  • 2010,21(3):505-515 [Abstract(6631)]  [View PDF(7962)767.44 K]
  • Delay-Guaranteed Key Flow Routing Adjustment Algorithm
  • PEI Yu-Jie,WANG Hong-Bo and CHENG Shi-Duan
  • 2010,21(3):528-538 [Abstract(6402)]  [View PDF(9045)989.71 K]