Volume 18,Issue 4,2007 Table of Contents
Detecting Feature Interactions by Pattern AnalysisZUO Ji-Hong,WANG Qian-Xiang and MEI Hong2007,18(4):796-807 [Abstract(4100)] [View PDF(5462)701.40 K]Error Flow Model: Modeling and Analysis of Software Propagating Hardware FaultsYANG Xue-Jun and GAO Long2007,18(4):808-820 [Abstract(4448)] [View PDF(5311)795.63 K]An Approach for Optimizing Test Suite Based on Testing Requirement ReductionZHANG Xiao-Fang,XU Bao-Wen,NIE Chang-Hai and SHI Liang2007,18(4):821-831 [Abstract(5685)] [View PDF(7063)956.33 K]An Approach to Analyzing Dependence Based on Exception Propagation AnalysisJIANG Shu-Juan,XU Bao-Wen,SHI Liang and ZHOU Xiao-Yu2007,18(4):832-841 [Abstract(4170)] [View PDF(5620)631.54 K]Levelset Method with Multi-Speed-Function and Its Application in Segmentation of Medical ImagesCHEN Jian,TIAN Jie,XUE Jian and DAI Ya-Kang2007,18(4):842-849 [Abstract(4373)] [View PDF(5778)358.58 K]Block Motion Estimation Based on Immune Clonal SelectionLIU Fang and PAN Xiao-Ying2007,18(4):850-860 [Abstract(4035)] [View PDF(5467)749.62 K]A Simpler and More Effective Particle Swarm Optimization AlgorithmHU Wang and LI Zhi-Shu2007,18(4):861-868 [Abstract(10627)] [View PDF(13407)692.44 K]A More Topologically Stable ISOMAP AlgorithmSHAO Chao,HUANG Hou-Kuan and ZHAO Lian-Wei2007,18(4):869-877 [Abstract(5249)] [View PDF(6994)741.24 K]Robust Speech Recognition Based on Neighborhood SpaceYAN Bin-Feng,ZHU Xiao-Yan,ZHANG Zhi-Jiang and ZHANG Fan2007,18(4):878-883 [Abstract(5041)] [View PDF(5468)405.05 K]An Efficient Algorithm for Mining Approximate Frequent Item over Data StreamsWANG Wei-Ping,LI Jian-Zhong,ZHANG Dong-Dong and GUO Long-Jiang2007,18(4):884-892 [Abstract(5202)] [View PDF(7172)545.31 K]Complex Twig Pattern Query Processing over XML StreamsYANG Wei-Dong,WANG Qing-Ming and SHI Bai-Le2007,18(4):893-904 [Abstract(4827)] [View PDF(5617)758.91 K]Clustering Evolving Data Streams over Sliding WindowsCHANG Jian-Long,CAO Feng and ZHOU Ao-Ying2007,18(4):905-918 [Abstract(5513)] [View PDF(7854)860.78 K]Layered Solution for SLCA Problem in XML Information RetrievalKONG Ling-Bo,TANG Shi-Wei,YANG Dong-Qing,WANG Teng-Jiao and GAO Jun2007,18(4):919-932 [Abstract(4944)] [View PDF(6185)843.04 K]A Fast Outlier Detection Algorithm for High Dimensional Categorical Data StreamsZHOU Xiao-Yun,SUN Zhi-Hui,ZHANG Bai-Li and YANG Yi-Dong2007,18(4):933-942 [Abstract(5228)] [View PDF(6801)571.89 K]Access Control in New Network EnvironmentLIN Chuang,FENG Fu-Jun and LI Jun-Shan2007,18(4):955-966 [Abstract(5635)] [View PDF(8089)695.74 K]Anomaly Detection Based on Web Users' Browsing BehaviorsXIE Yi and YU Shun-Zheng2007,18(4):967-977 [Abstract(5767)] [View PDF(8038)672.08 K]Towards the Optimization of Access Control ListZENG Kuang-Yi and YANG Jia-Hai2007,18(4):978-986 [Abstract(4255)] [View PDF(5980)564.98 K]A Cluster-Based Multipath Routing Algorithm in Mobile Ad Hoc NetworksAN Hui-Yao,LU Xi-Cheng and PENG Wei2007,18(4):987-995 [Abstract(5203)] [View PDF(5826)524.29 K]Percolation-Based Probabilistic Reliable Dissemination for Mobile Ad Hoc NetworksZHENG Jing,LU Xi-Cheng and CAO Jian-Nong2007,18(4):996-1006 [Abstract(4117)] [View PDF(4894)663.52 K]Forking Lemma and the Security Proofs for a Class of ID-Based SignaturesGU Chun-Xiang,ZHU Yue-Fei and PAN Xiao-Yu2007,18(4):1007-1014 [Abstract(4903)] [View PDF(7511)570.08 K]Independent Oblivious TransferHUANG Qiong and ZHAO Yi-Ming2007,18(4):1015-1025 [Abstract(4622)] [View PDF(5153)681.46 K]Macor: A Maintainable XQuery Model for Representing Nested Schema MappingsQIAN Gang and DONG Yi-Sheng2007,18(4):1026-1038 [Abstract(3960)] [View PDF(5653)524.03 K]A High Performance Computer System Evaluation Model Based on HPCC and Analytic Hierarchy ProcessLIU Chuan-Yi and WANG Dong-Sheng2007,18(4):1039-1046 [Abstract(4717)] [View PDF(6891)551.10 K]SimOS-Goodson: A Goodson-Processor Based Multi-Core Full-System SimulatorGAO Xiang,ZHANG Fu-Xin,TANG Yan,ZHANG Long-Bing,HU Wei-Wu and TANG Zhi-Min2007,18(4):1047-1055 [Abstract(5297)] [View PDF(7182)570.91 K]Automatedly Checking Function Execution Context of Kernel Programs in Operation SystemsWANG Li,YANG Xue-Jun,WANG Ji and LUO Yu2007,18(4):1056-1067 [Abstract(4805)] [View PDF(5946)690.53 K]Mission Reliability Analysis of Generalized Phased Mission SystemsMO Yu-Chang,YANG Xiao-Zong,CUI Gang and LIU Hong-Wei2007,18(4):1068-1076 [Abstract(5065)] [View PDF(6315)559.63 K]
Software Cost Estimation Method and ApplicationLI Ming-Shu,HE Mei,YANG Da,SHU Feng-Di and WANG Qing2007,18(4):775-795 [Abstract(11056)] [View PDF(15479)1.36 M]Topology Control for Wireless Sensor NetworksZHANG Xue,LU Sang-Lu,CHEN Gui-Hai,CHEN Dao-Xu and XIE Li2007,18(4):943-954 [Abstract(9637)] [View PDF(12300)699.81 K]