Volume 22,Issue 4,2011 Table of Contents

Other Issues:  
  
Contents

  • Running Mechanism and Strategy Description Language SADL for Self-Adaptive MAS
  • DONG Meng-Gao,MAO Xin-Jun,CHANG Zhi-Ming,WANG Ji and QI Zhi-Chang
  • 2011,22(4):609-624 [Abstract(5707)]  [View PDF(7772)884.28 K]
  • Algorithm for Distributed Constraint Optimization Problems with Low Constraint Density
  • DING Bo,WANG Huai-Min,SHI Dian-Xi and TANG Yang-Bin
  • 2011,22(4):625-639 [Abstract(4973)]  [View PDF(7341)1.39 M]
  • BACH: A Toolset for Bounded Reachability Analysis of Linear Hybrid Systems
  • BU Lei,LI You,WANG Lin-Zhang and LI Xuan-Dong
  • 2011,22(4):640-658 [Abstract(5264)]  [View PDF(6934)669.57 K]
  • Formal Semantics of Universal Modal Sequence Diagram
  • LI Wen-Rui,WANG Zhi-Jian and ZHANG Peng-Cheng
  • 2011,22(4):659-675 [Abstract(6618)]  [View PDF(7106)878.20 K]
  • Correlative Particle Swarm Optimization Model
  • SHEN Yuan-Xia,WANG Guo-Yin and ZENG Chuan-Hua
  • 2011,22(4):695-708 [Abstract(5789)]  [View PDF(7191)761.46 K]
  • Fast Ensemble Pruning Algorithm Based on FP-Tree
  • ZHAO Qiang-Li,JIANG Yan-Huang and XU Ming
  • 2011,22(4):709-721 [Abstract(6238)]  [View PDF(7161)664.81 K]
  • Laurel: A Hybrid Overlay Network for Data Distribution
  • ZHENG Zhong,WANG Yi-Jie and MA Xing-Kong
  • 2011,22(4):722-735 [Abstract(5375)]  [View PDF(6743)744.92 K]
  • Cooperative Game Theory-Based CAC Strategy for Mobile Communication Systems
  • ZHANG Hui,FANG Xu-Ming and YUAN Qin
  • 2011,22(4):736-744 [Abstract(5673)]  [View PDF(6516)505.20 K]
  • Reputation Model with Feedback of Ranking for P2P Systems
  • LI Zhi-Jun,JIANG Shou-Xu and LI Xiao-Yi
  • 2011,22(4):745-760 [Abstract(5108)]  [View PDF(7434)847.00 K]
  • Detecting SIP Flooding Attacks Against IMS Network
  • WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun
  • 2011,22(4):761-772 [Abstract(6186)]  [View PDF(8362)836.62 K]
  • P2P Probabilistic Routing Algorithm Based on Data Copying and Bloom Filter
  • ZHU Gui-Ming,GUO De-Ke and JIN Shi-Yao
  • 2011,22(4):773-781 [Abstract(5329)]  [View PDF(6723)667.12 K]
  • A Multiple Scalar Multiplications Algorithm in the Elliptic Curve Cryptosystem
  • CHEN Hou-You and MA Chuan-Gui
  • 2011,22(4):782-788 [Abstract(5726)]  [View PDF(8083)435.19 K]
  • Automatic Image Annotation by Fusing Semantic Topics
  • LI Zhi-Xin,SHI Zhi-Ping,LI Zhi-Qing and SHI Zhong-Zhi
  • 2011,22(4):801-812 [Abstract(5321)]  [View PDF(9827)769.84 K]
  • Directly Fusion Method for Combining Variable Exposure Value Images
  • ZHANG Jun,DAI Xia,SUN De-Quan and WANG Bang-Ping
  • 2011,22(4):813-825 [Abstract(5324)]  [View PDF(10541)819.56 K]
  • Fast Directional Discrete Cosine Transforms Based Image Compression
  • CHEN Bo,WANG Hong-Xia and CHENG Li-Zhi
  • 2011,22(4):826-832 [Abstract(5687)]  [View PDF(8149)554.54 K]
  • Qualitative and Quantitative Representing and Reasoning for Goals Satisfiability
  • WANG Shou-Xin,ZHANG Li,WANG Shuai,SHEN Ju-Fang and LIU Yu
  • 2011,22(4):593-608 [Abstract(7574)]  [View PDF(9883)512.98 K]
  • Review Articles

  • Granular Computing Models for Knowledge Uncertainty
  • WANG Guo-Yin,ZHANG Qing-Hua,MA Xi-Ao and YANG Qing-Shan
  • 2011,22(4):676-694 [Abstract(8445)]  [View PDF(13234)404.64 K]
  • Contents

  • Image Shrinkage Based on Hot-Target Map and Featured Edge Preservation
  • LIANG Yun,SU Zhuo,LUO Xiao-Nan and WANG Dong
  • 2011,22(4):789-800 [Abstract(7234)]  [View PDF(8049)797.25 K]