Volume 23,Issue 5,2012 Table of Contents
Efficient Algorithm Based on Action Space for Solving the 2D Rectangular Packing ProblemHE Kun,HUANG Wen-Qi and JIN Yan2012,23(5):1037-1044 [Abstract(4868)] [View PDF(7773)565.76 K]Termination Analysis of Nonlinear LoopsLI Yi2012,23(5):1045-1052 [Abstract(3964)] [View PDF(5243)522.06 K]Parallel Computing Method of Canonical Correlation Analysis for High-Dimensional Data Streams in Irregular StreamsZHOU Yong,LU Xiao-Wei and CHENG Chun-Tian2012,23(5):1053-1072 [Abstract(3935)] [View PDF(6456)943.86 K]Approximation Algorithms for a Two-Stage Hybrid Flow ShopWEI Qi and JIANG Yi-Wei2012,23(5):1073-1084 [Abstract(3484)] [View PDF(4875)559.26 K]Pronoun Resolution in English and Chinese Languages Based on Tree KernelKONG Fang and ZHOU Guo-Dong2012,23(5):1085-1099 [Abstract(4884)] [View PDF(6320)760.27 K]Descending Kernel Track of Static and Dynamic Topic Models in Topic TrackingHONG Yu,CANG Yu,YAO Jian-Min,ZHOU Guo-Dong and ZHU Qiao-Ming2012,23(5):1100-1119 [Abstract(4779)] [View PDF(5946)1.06 M]Head-Modifier Dependency Reordering Model for Phrased SMTLIU Shui,LI Sheng,ZHAO Tie-Jun and LIU Peng-Yuan2012,23(5):1120-1131 [Abstract(4243)] [View PDF(5690)934.42 K]Selective Boosting Algorithm for Maximizing the Soft MarginFANG Yu-Ke,FU Yan,ZHOU Jun-Lin,SHE Li and SUN Chong-Jing2012,23(5):1132-1147 [Abstract(4592)] [View PDF(5893)995.71 K]Query Answer over Inconsistent Database with Credible AnnotationsWU Ai-Hua,TAN Zi-Jing and WANG Wei2012,23(5):1167-1182 [Abstract(4991)] [View PDF(5985)771.24 K]Data Stream Prediction Based on Episode Rule MatchingZHU Hui-Sheng,WANG Wei and SHI Bai-Le2012,23(5):1183-1194 [Abstract(3995)] [View PDF(5653)628.83 K]Rare Category Detection Algorithm Based on Weighted Boundary DegreeHUANG Hao,HE Qin-Ming,CHEN Qi,QIAN Feng,HE Jiang-Feng and MA Lian-Hang2012,23(5):1195-1206 [Abstract(4177)] [View PDF(5626)695.21 K]Jamming Attacks in Wireless NetworkSUN Yan-Qiang,WANG Xiao-Dong and ZHOU Xing-Ming2012,23(5):1207-1221 [Abstract(5295)] [View PDF(14868)737.19 K]Energy-Balanced Unequal Clustering Routing Protocol for Wireless Sensor NetworksJIANG Chang-Jiang,SHI Wei-Ren,TANG Xian-Lun,WANG Ping and XIANG Min2012,23(5):1222-1232 [Abstract(6087)] [View PDF(9861)698.22 K]Analysis of Scheduling Performance in Wireless Networks with Successive Interference CancellationLü Shao-He,WANG Xiao-Dong and ZHOU Xing-Ming2012,23(5):1233-1247 [Abstract(3781)] [View PDF(5182)808.40 K]Image Interpolation Algorithm Based on Implicit Piecewise Autoregressive ModelREN Jie,LIU Jia-Ying,BAI Wei and GUO Zong-Ming2012,23(5):1248-1259 [Abstract(4864)] [View PDF(5269)789.25 K]Direct Anonymous Attestation Scheme in Cross Trusted Domain for Wireless Mobile NetworksYANG Li,MA Jiang-Feng and JIANG Qi2012,23(5):1260-1271 [Abstract(4449)] [View PDF(6745)768.54 K]Http-Flood DDoS Detection Scheme Based on Large Deviation and Performance AnalysisWANG Jin,YANG Xiao-Long and LONG Ke-Ping2012,23(5):1272-1280 [Abstract(3854)] [View PDF(6427)531.62 K]
Autofocusing Method for Microscopy with Low Image Content DensityZHAI Yong-Ping,LIU Yun-Hui,ZHOU Dong-Xiang and LIU Shun2012,23(5):1281-1294 [Abstract(5755)] [View PDF(6113)980.65 K]
Image Retrieval Approach Based on Sparse Canonical Correlation AnalysisZHUANG Ling,ZHUANG Yue-Ting,WU Jiang-Qin,YE Zhen-Chao and WU Fei2012,23(5):1295-1304 [Abstract(5274)] [View PDF(9270)602.55 K]Global Anisotropic Quad-Dominant RemeshingZHU Wei-Peng,GAO Cheng-Ying and LUO Xiao-Nan2012,23(5):1305-1314 [Abstract(4017)] [View PDF(6572)768.99 K]Super-Resolution Based on Sparse Dictionary CodingLI Min,CHENG Jian,LE Xiang and LUO Huan-Min2012,23(5):1315-1324 [Abstract(4805)] [View PDF(10071)745.50 K]Image Editing Algorithms Based on Adaptive Mesh DeformationJIN Yong,WU Qing-Biao and LIU Li-Gang2012,23(5):1325-1334 [Abstract(3760)] [View PDF(7489)980.29 K]
Research on Cloud DatabasesLIN Zi-Yu,LAI Yong-Xuan,LIN Chen,XIE Yi and ZOU Quan2012,23(5):1148-1166 [Abstract(14491)] [View PDF(19469)946.37 K]