Volume 20,Issue 6,2009 Table of Contents

Other Issues:  
  
Contents

  • Parallel Model of DDS and Its Formalization
  • LIU Zhen-Huan,WEI Li,CHEN Yan,ZHAO Rong-Sheng and WANG Ju
  • 2009,20(6):1406-1413 [Abstract(4853)]  [View PDF(7852)554.88 K]
  • SAT-Based Compositional Verification Strategy for Concurrent Software with States, Events
  • ZHOU Cong-Hua
  • 2009,20(6):1414-1424 [Abstract(5026)]  [View PDF(5967)671.35 K]
  • Heuristic Symbolic Verification of Safety Properties for Parameterized Systems
  • YANG Qiu-Song and LI Ming-Shu
  • 2009,20(6):1444-1456 [Abstract(4499)]  [View PDF(6368)840.10 K]
  • Non-Functional Attributes Oriented Description and Verification in UML Class Diagrams
  • ZHANG Yan and MEI Hong
  • 2009,20(6):1457-1469 [Abstract(4861)]  [View PDF(8012)854.96 K]
  • Service Collaboration Approach Based on Decentralized Mediation Model
  • QIAO Xiao-Qiang,WEI Jun and HUANG Tao
  • 2009,20(6):1470-1486 [Abstract(4541)]  [View PDF(7039)1.19 M]
  • Automatic Hierarchical Layout Algorithm for UML Class Diagram
  • WANG Xiao-Bo,WANG Huan and LIU Chao
  • 2009,20(6):1487-1498 [Abstract(6076)]  [View PDF(10215)784.25 K]
  • Benchmarking Software Task Performance Based on Data Envelopment Analysis
  • RUAN Li,WANG Yong-Ji,WANG Qing and ZENG Hai-Tao
  • 2009,20(6):1499-1510 [Abstract(4631)]  [View PDF(6371)822.75 K]
  • Discrete No-Fit Polygon, A Simple Structure for the 2-D Irregular Packing Problem
  • ZHANG De-Fu,CHEN Jing-Chi,LIU Yong-Kai and CHEN Huo-Wang
  • 2009,20(6):1511-1520 [Abstract(5200)]  [View PDF(7504)687.65 K]
  • Extension Rule Algorithms Based on IMOM and IBOHM Heuristics Strategies
  • LI Ying,SUN Ji-Gui,WU Xia and ZHU Xing-Jun
  • 2009,20(6):1521-1527 [Abstract(5286)]  [View PDF(6475)459.54 K]
  • Lowest-Level Left Align Best-Fit Algorithm for the 2D Rectangular Strip Packing Problem
  • JIANG Xing-Bo,Lü Xiao-Qing and LIU Cheng-Cheng
  • 2009,20(6):1528-1538 [Abstract(7048)]  [View PDF(11792)829.39 K]
  • Run Length Coding-Based Dynamic Trust Model for P2P Network
  • FANG Qun,JI Yi,WU Guo-Xin,ZHAO Sheng-Hui and WU Peng
  • 2009,20(6):1602-1616 [Abstract(5417)]  [View PDF(7468)1.11 M]
  • Set of Necessary and Sufficient Conditions in Collision Attacks on MD5
  • CHEN Shi-Wei and JIN Chen-Hui
  • 2009,20(6):1617-1624 [Abstract(5304)]  [View PDF(7026)542.42 K]
  • Component Property Based Remote Attestation
  • QIN Yu and FENG Deng-Guo
  • 2009,20(6):1625-1641 [Abstract(5833)]  [View PDF(8324)1.28 M]
  • Topology-Transparent Hybrid MAC Protocol for Ad Hoc Networks
  • LI Wei,WANG Shan and WEI Ji-Bo
  • 2009,20(6):1642-1650 [Abstract(4878)]  [View PDF(6122)568.13 K]
  • Robust Appearance-Based Method for Head Pose Estimation
  • MA Bing-Peng,SHAN Shi-Guang,CHEN Xi-Lin and GAO Wen
  • 2009,20(6):1651-1663 [Abstract(4487)]  [View PDF(6414)1.11 M]
  • Motion Synthesis for Virtual Human Using Functional Data Analysis
  • LI Chun-Peng,WANG Zhao-Qi and XIA Shi-Hong
  • 2009,20(6):1664-1672 [Abstract(5324)]  [View PDF(7671)857.93 K]
  • Constructing Surface on Irregular Meshes
  • HE Jun,ZHANG Cai-Ming and YANG Xing-Qiang
  • 2009,20(6):1673-1684 [Abstract(5050)]  [View PDF(7280)831.51 K]
  • Improved Coherent Hierarchical Culling Algorithm Based on Probability Computing Model
  • LIANG Xiao-Hui,REN Wei,YU Zhuo and LIANG Ai-Min
  • 2009,20(6):1685-1693 [Abstract(4522)]  [View PDF(6375)666.58 K]
  • Modified Algorithm with Bidirectional Diffusion for TV Image Interpolation
  • ZHAN Yi,WANG Ming-Hui,WAN Qun and LI Meng
  • 2009,20(6):1694-1702 [Abstract(4375)]  [View PDF(6793)945.62 K]
  • Review Articles

  • Combinatorial Testing: Principles and Methods
  • YAN Jun and ZHANG Jian
  • 2009,20(6):1393-1405 [Abstract(12379)]  [View PDF(21058)831.86 K]
  • Research on Software Fault Injection Testing
  • CHEN Jin-Fu,LU Yan-Sheng and XIE Xiao-Dong
  • 2009,20(6):1425-1443 [Abstract(10254)]  [View PDF(18585)1.09 M]
  • Research of QoS on Wireless Mesh Networks
  • DONG Chao,CHEN Gui-Hai and WANG Hai
  • 2009,20(6):1539-1552 [Abstract(8040)]  [View PDF(10036)2.32 M]
  • Biometric Template Protection
  • LI Peng,TIAN Jie,YANG Xin,SHI Peng and ZHANG Yang-Yang
  • 2009,20(6):1553-1573 [Abstract(11015)]  [View PDF(16074)1.60 M]
  • Network Distance Prediction Technology Research
  • WANG Yi-Jie and LI Xiao-Yong
  • 2009,20(6):1574-1590 [Abstract(7749)]  [View PDF(11954)1.06 M]