Volume 20,Issue 6,2009 Table of Contents
Parallel Model of DDS and Its FormalizationLIU Zhen-Huan,WEI Li,CHEN Yan,ZHAO Rong-Sheng and WANG Ju2009,20(6):1406-1413 [Abstract(4853)] [View PDF(7852)554.88 K]SAT-Based Compositional Verification Strategy for Concurrent Software with States, EventsZHOU Cong-Hua2009,20(6):1414-1424 [Abstract(5026)] [View PDF(5967)671.35 K]Heuristic Symbolic Verification of Safety Properties for Parameterized SystemsYANG Qiu-Song and LI Ming-Shu2009,20(6):1444-1456 [Abstract(4499)] [View PDF(6368)840.10 K]Non-Functional Attributes Oriented Description and Verification in UML Class DiagramsZHANG Yan and MEI Hong2009,20(6):1457-1469 [Abstract(4861)] [View PDF(8012)854.96 K]Service Collaboration Approach Based on Decentralized Mediation ModelQIAO Xiao-Qiang,WEI Jun and HUANG Tao2009,20(6):1470-1486 [Abstract(4541)] [View PDF(7039)1.19 M]Automatic Hierarchical Layout Algorithm for UML Class DiagramWANG Xiao-Bo,WANG Huan and LIU Chao2009,20(6):1487-1498 [Abstract(6076)] [View PDF(10215)784.25 K]Benchmarking Software Task Performance Based on Data Envelopment AnalysisRUAN Li,WANG Yong-Ji,WANG Qing and ZENG Hai-Tao2009,20(6):1499-1510 [Abstract(4631)] [View PDF(6371)822.75 K]Discrete No-Fit Polygon, A Simple Structure for the 2-D Irregular Packing ProblemZHANG De-Fu,CHEN Jing-Chi,LIU Yong-Kai and CHEN Huo-Wang2009,20(6):1511-1520 [Abstract(5200)] [View PDF(7504)687.65 K]Extension Rule Algorithms Based on IMOM and IBOHM Heuristics StrategiesLI Ying,SUN Ji-Gui,WU Xia and ZHU Xing-Jun2009,20(6):1521-1527 [Abstract(5286)] [View PDF(6475)459.54 K]Lowest-Level Left Align Best-Fit Algorithm for the 2D Rectangular Strip Packing ProblemJIANG Xing-Bo,Lü Xiao-Qing and LIU Cheng-Cheng2009,20(6):1528-1538 [Abstract(7048)] [View PDF(11792)829.39 K]Run Length Coding-Based Dynamic Trust Model for P2P NetworkFANG Qun,JI Yi,WU Guo-Xin,ZHAO Sheng-Hui and WU Peng2009,20(6):1602-1616 [Abstract(5417)] [View PDF(7468)1.11 M]Set of Necessary and Sufficient Conditions in Collision Attacks on MD5CHEN Shi-Wei and JIN Chen-Hui2009,20(6):1617-1624 [Abstract(5304)] [View PDF(7026)542.42 K]Component Property Based Remote AttestationQIN Yu and FENG Deng-Guo2009,20(6):1625-1641 [Abstract(5833)] [View PDF(8324)1.28 M]Topology-Transparent Hybrid MAC Protocol for Ad Hoc NetworksLI Wei,WANG Shan and WEI Ji-Bo2009,20(6):1642-1650 [Abstract(4878)] [View PDF(6122)568.13 K]Robust Appearance-Based Method for Head Pose EstimationMA Bing-Peng,SHAN Shi-Guang,CHEN Xi-Lin and GAO Wen2009,20(6):1651-1663 [Abstract(4487)] [View PDF(6414)1.11 M]Motion Synthesis for Virtual Human Using Functional Data AnalysisLI Chun-Peng,WANG Zhao-Qi and XIA Shi-Hong2009,20(6):1664-1672 [Abstract(5324)] [View PDF(7671)857.93 K]Constructing Surface on Irregular MeshesHE Jun,ZHANG Cai-Ming and YANG Xing-Qiang2009,20(6):1673-1684 [Abstract(5050)] [View PDF(7280)831.51 K]Improved Coherent Hierarchical Culling Algorithm Based on Probability Computing ModelLIANG Xiao-Hui,REN Wei,YU Zhuo and LIANG Ai-Min2009,20(6):1685-1693 [Abstract(4522)] [View PDF(6375)666.58 K]Modified Algorithm with Bidirectional Diffusion for TV Image InterpolationZHAN Yi,WANG Ming-Hui,WAN Qun and LI Meng2009,20(6):1694-1702 [Abstract(4375)] [View PDF(6793)945.62 K]
Combinatorial Testing: Principles and MethodsYAN Jun and ZHANG Jian2009,20(6):1393-1405 [Abstract(12379)] [View PDF(21058)831.86 K]Research on Software Fault Injection TestingCHEN Jin-Fu,LU Yan-Sheng and XIE Xiao-Dong2009,20(6):1425-1443 [Abstract(10254)] [View PDF(18585)1.09 M]Research of QoS on Wireless Mesh NetworksDONG Chao,CHEN Gui-Hai and WANG Hai2009,20(6):1539-1552 [Abstract(8040)] [View PDF(10036)2.32 M]Biometric Template ProtectionLI Peng,TIAN Jie,YANG Xin,SHI Peng and ZHANG Yang-Yang2009,20(6):1553-1573 [Abstract(11015)] [View PDF(16074)1.60 M]Network Distance Prediction Technology ResearchWANG Yi-Jie and LI Xiao-Yong2009,20(6):1574-1590 [Abstract(7749)] [View PDF(11954)1.06 M]