Volume 20,Issue 4,2009 Table of Contents

Other Issues:  
  
Contents

  • Throughput Analytical Model and Adaptive MAC Scheme for IEEE 802.11e EDCA Based on AIFS Differentiation
  • BAI Xiang,MAO Yu-Ming,LENG Su-Peng,MAO Jian-Bing and XIE Jun
  • 2009,20(4):780-794 [Abstract(5478)]  [View PDF(8003)886.73 K]
  • An Efficient Algorithm of XML Twig Pattern Matching Without Merging
  • TAO Shi-Qun+, and FU Li-Zhen
  • 2009,20(4):795-803 [Abstract(4869)]  [View PDF(7371)513.93 K]
  • Data Reduction Based on Artificial Immune System
  • GONG Mao-Guo,HAO Lin,JIAO Li-Cheng,WANG Xiao-Hua and SUN Yi-Fei
  • 2009,20(4):804-814 [Abstract(5774)]  [View PDF(7442)739.41 K]
  • Geodesic Distance-Based Generalized Gaussian Laplacian Eigenmap
  • ZENG Xian-Hua,LUO Si-Wei,WANG Jiao and ZHAO Jia-Li
  • 2009,20(4):815-824 [Abstract(5043)]  [View PDF(8509)611.20 K]
  • A Latent Variable Model for Cluster Ensemble
  • WANG Hong-Jun,LI Zhi-Shu,CHENG Yang,ZHOU Peng and ZHOU Wei
  • 2009,20(4):825-833 [Abstract(5125)]  [View PDF(7597)562.20 K]
  • A Local Learning Approach for Natural Image Matting
  • PENG Hong-Jing,CHEN Song-Can and ZHANG Dao-Qiang
  • 2009,20(4):834-844 [Abstract(6003)]  [View PDF(8466)815.69 K]
  • On Modeling and Deploying an Effective Scan Monitoring System
  • MA Li-Bo,LI Xing and ZHANG Liang
  • 2009,20(4):845-857 [Abstract(4317)]  [View PDF(6546)672.96 K]
  • Method of Hierarchical States in Planning Based on Model Checking
  • WEN Zhong-Hua,HUANG Wei,LIU Ren-Ren and JIANG Yun-Fei
  • 2009,20(4):858-869 [Abstract(5107)]  [View PDF(6498)598.14 K]
  • Chinese Chunking with Large Margin Method
  • ZHOU Jun-Sheng,DAI Xin-Yu,CHEN Jia-Jun and QU Wei-Guang
  • 2009,20(4):870-877 [Abstract(4564)]  [View PDF(7474)476.87 K]
  • Dynamic Vague Region Relations Based on Vague Sets
  • HAO Zhong-Xiao and LI Song
  • 2009,20(4):878-889 [Abstract(4802)]  [View PDF(6690)830.28 K]
  • Optimization Crossover Scale for Improving Performance of Crossover Operator
  • CHEN Hao,CUI Du-Wu,LI Xue and WEI Hong-Li
  • 2009,20(4):890-901 [Abstract(4733)]  [View PDF(8104)737.24 K]
  • An Integrity Check Method for Fine-Grained Data
  • CHEN Long and WANG Guo-Yin
  • 2009,20(4):902-909 [Abstract(5421)]  [View PDF(7744)467.11 K]
  • An XML Keyword Retrieval Algorithm Based on Nearest Pair
  • JI Cong-Rui,DENG Zhi-Hong and TANG Shi-Wei
  • 2009,20(4):910-917 [Abstract(5663)]  [View PDF(7056)493.24 K]
  • A Cost-Based Heuristic Algorithm for Repairing Inconsistent XML Document
  • WU Ai-Hua,WANG Xian-Sheng,TAN Zi-Jing and WANG Wei
  • 2009,20(4):918-929 [Abstract(5325)]  [View PDF(6655)627.87 K]
  • A Low-Rate DoS Detection Method Based on Feature Extraction Using Wavelet Transform
  • HE Yan-Xiang,CAO Qiang,LIU Tao,HAN Yi and XIONG Qi
  • 2009,20(4):930-941 [Abstract(5832)]  [View PDF(8227)680.62 K]
  • Performance Analysis of Stochastic Delivery Transport Protocols in WSNs
  • XIONG Bin-Bin,LIN Chuang and REN Feng-Yuan
  • 2009,20(4):942-953 [Abstract(5113)]  [View PDF(7110)779.43 K]
  • High Throughput MAC Protocol for Static Ad Hoc Network
  • ZHANG Ke-Wang,ZHANG De-Yun and JIANG Wei-Hua
  • 2009,20(4):954-964 [Abstract(5903)]  [View PDF(7098)611.04 K]
  • Maximal Coverage Scheduling in Wireless Directional Sensor Networks
  • CHENG Wei-Fang,LIAO Xiang-Ke and SHEN Chang-Xiang
  • 2009,20(4):975-984 [Abstract(5702)]  [View PDF(7586)593.79 K]
  • New Definition of Small Message Criterion and Its Application in Transaction Covert Channel Mitigating
  • ZENG Hai-Tao,WANG Yong-Ji,ZU Wei,CAI Jia-Yong and RUAN Li
  • 2009,20(4):985-996 [Abstract(5130)]  [View PDF(6889)643.01 K]
  • Methodology for Measuring Available Bandwidth on Arbitrary Links
  • HE Li and YU Shun-Zheng
  • 2009,20(4):997-1013 [Abstract(5153)]  [View PDF(8049)847.03 K]
  • Algorithm of Voronoi Tessellation Based Data Compression over Sensor Networks
  • XIE Zhi-Jun,WANG Lei and CHEN Hong
  • 2009,20(4):1014-1022 [Abstract(4670)]  [View PDF(6481)563.36 K]
  • Clustering-Based Approximate Scheme for Data Aggregation over Sensor Networks
  • XIE Lei,CHEN Li-Jun,CHEN Dao-Xu and XIE Li
  • 2009,20(4):1023-1037 [Abstract(4534)]  [View PDF(6811)804.70 K]
  • Optimal Sensor Deployment Based on Secure Connection in Mobile Sensor Network
  • JIA Jie,CHEN Jian,CHANG Gui-Ran and WEN Ying-You
  • 2009,20(4):1038-1047 [Abstract(5159)]  [View PDF(7102)709.09 K]
  • Implicit Authorization Analysis of Role-Based Administrative Model
  • LIU Wei,CAI Jia-Yong and HE Ye-Ping
  • 2009,20(4):1048-1057 [Abstract(4699)]  [View PDF(7064)563.25 K]
  • Attacking Algorithms Against Continuous Queries in LBS and Anonymity Measurement
  • LIN Xin,LI Shan-Ping and YANG Zhao-Hui
  • 2009,20(4):1058-1068 [Abstract(6855)]  [View PDF(8265)629.07 K]
  • Efficient Verifiably Encrypted Signature Scheme without Random Oracles
  • YANG Hao-Miao,SUN Shi-Xin and XU Ji-You
  • 2009,20(4):1069-1076 [Abstract(5109)]  [View PDF(7726)518.96 K]
  • Functional Verification of “ShenWei-1” High Performance Microprocessor
  • HUANG Yong-Qin,ZHU Ying,JU Peng-Jin,WU Zhi-Yong and CHEN Cheng
  • 2009,20(4):1077-1086 [Abstract(8226)]  [View PDF(9472)548.05 K]