Volume 20,Issue 4,2009 Table of Contents
Throughput Analytical Model and Adaptive MAC Scheme for IEEE 802.11e EDCA Based on AIFS DifferentiationBAI Xiang,MAO Yu-Ming,LENG Su-Peng,MAO Jian-Bing and XIE Jun2009,20(4):780-794 [Abstract(5416)] [View PDF(7775)886.73 K]An Efficient Algorithm of XML Twig Pattern Matching Without MergingTAO Shi-Qun+, and FU Li-Zhen2009,20(4):795-803 [Abstract(4836)] [View PDF(7138)513.93 K]Data Reduction Based on Artificial Immune SystemGONG Mao-Guo,HAO Lin,JIAO Li-Cheng,WANG Xiao-Hua and SUN Yi-Fei2009,20(4):804-814 [Abstract(5711)] [View PDF(7243)739.41 K]Geodesic Distance-Based Generalized Gaussian Laplacian EigenmapZENG Xian-Hua,LUO Si-Wei,WANG Jiao and ZHAO Jia-Li2009,20(4):815-824 [Abstract(4996)] [View PDF(8310)611.20 K]A Latent Variable Model for Cluster EnsembleWANG Hong-Jun,LI Zhi-Shu,CHENG Yang,ZHOU Peng and ZHOU Wei2009,20(4):825-833 [Abstract(5088)] [View PDF(7385)562.20 K]A Local Learning Approach for Natural Image MattingPENG Hong-Jing,CHEN Song-Can and ZHANG Dao-Qiang2009,20(4):834-844 [Abstract(5950)] [View PDF(8250)815.69 K]On Modeling and Deploying an Effective Scan Monitoring SystemMA Li-Bo,LI Xing and ZHANG Liang2009,20(4):845-857 [Abstract(4277)] [View PDF(6335)672.96 K]Method of Hierarchical States in Planning Based on Model CheckingWEN Zhong-Hua,HUANG Wei,LIU Ren-Ren and JIANG Yun-Fei2009,20(4):858-869 [Abstract(5072)] [View PDF(6295)598.14 K]Chinese Chunking with Large Margin MethodZHOU Jun-Sheng,DAI Xin-Yu,CHEN Jia-Jun and QU Wei-Guang2009,20(4):870-877 [Abstract(4508)] [View PDF(7302)476.87 K]Dynamic Vague Region Relations Based on Vague SetsHAO Zhong-Xiao and LI Song2009,20(4):878-889 [Abstract(4747)] [View PDF(6444)830.28 K]Optimization Crossover Scale for Improving Performance of Crossover OperatorCHEN Hao,CUI Du-Wu,LI Xue and WEI Hong-Li2009,20(4):890-901 [Abstract(4690)] [View PDF(7889)737.24 K]An Integrity Check Method for Fine-Grained DataCHEN Long and WANG Guo-Yin2009,20(4):902-909 [Abstract(5359)] [View PDF(7516)467.11 K]An XML Keyword Retrieval Algorithm Based on Nearest PairJI Cong-Rui,DENG Zhi-Hong and TANG Shi-Wei2009,20(4):910-917 [Abstract(5598)] [View PDF(6849)493.24 K]A Cost-Based Heuristic Algorithm for Repairing Inconsistent XML DocumentWU Ai-Hua,WANG Xian-Sheng,TAN Zi-Jing and WANG Wei2009,20(4):918-929 [Abstract(5289)] [View PDF(6497)627.87 K]A Low-Rate DoS Detection Method Based on Feature Extraction Using Wavelet TransformHE Yan-Xiang,CAO Qiang,LIU Tao,HAN Yi and XIONG Qi2009,20(4):930-941 [Abstract(5757)] [View PDF(7965)680.62 K]Performance Analysis of Stochastic Delivery Transport Protocols in WSNsXIONG Bin-Bin,LIN Chuang and REN Feng-Yuan2009,20(4):942-953 [Abstract(5040)] [View PDF(6862)779.43 K]High Throughput MAC Protocol for Static Ad Hoc NetworkZHANG Ke-Wang,ZHANG De-Yun and JIANG Wei-Hua2009,20(4):954-964 [Abstract(5837)] [View PDF(6900)611.04 K]Maximal Coverage Scheduling in Wireless Directional Sensor NetworksCHENG Wei-Fang,LIAO Xiang-Ke and SHEN Chang-Xiang2009,20(4):975-984 [Abstract(5603)] [View PDF(7401)593.79 K]New Definition of Small Message Criterion and Its Application in Transaction Covert Channel MitigatingZENG Hai-Tao,WANG Yong-Ji,ZU Wei,CAI Jia-Yong and RUAN Li2009,20(4):985-996 [Abstract(5050)] [View PDF(6664)643.01 K]Methodology for Measuring Available Bandwidth on Arbitrary LinksHE Li and YU Shun-Zheng2009,20(4):997-1013 [Abstract(5098)] [View PDF(7828)847.03 K]Algorithm of Voronoi Tessellation Based Data Compression over Sensor NetworksXIE Zhi-Jun,WANG Lei and CHEN Hong2009,20(4):1014-1022 [Abstract(4619)] [View PDF(6246)563.36 K]Clustering-Based Approximate Scheme for Data Aggregation over Sensor NetworksXIE Lei,CHEN Li-Jun,CHEN Dao-Xu and XIE Li2009,20(4):1023-1037 [Abstract(4468)] [View PDF(6586)804.70 K]Optimal Sensor Deployment Based on Secure Connection in Mobile Sensor NetworkJIA Jie,CHEN Jian,CHANG Gui-Ran and WEN Ying-You2009,20(4):1038-1047 [Abstract(5085)] [View PDF(6890)709.09 K]Implicit Authorization Analysis of Role-Based Administrative ModelLIU Wei,CAI Jia-Yong and HE Ye-Ping2009,20(4):1048-1057 [Abstract(4655)] [View PDF(6876)563.25 K]Attacking Algorithms Against Continuous Queries in LBS and Anonymity MeasurementLIN Xin,LI Shan-Ping and YANG Zhao-Hui2009,20(4):1058-1068 [Abstract(6772)] [View PDF(8070)629.07 K]Efficient Verifiably Encrypted Signature Scheme without Random OraclesYANG Hao-Miao,SUN Shi-Xin and XU Ji-You2009,20(4):1069-1076 [Abstract(5066)] [View PDF(7520)518.96 K]Functional Verification of “ShenWei-1” High Performance MicroprocessorHUANG Yong-Qin,ZHU Ying,JU Peng-Jin,WU Zhi-Yong and CHEN Cheng2009,20(4):1077-1086 [Abstract(8150)] [View PDF(9155)548.05 K]