Volume 17,Issue 7,2006 Table of Contents
Model-Free Gene Selection Method by Considering Unbalanced SamplesLI Jian-Zhong,YANG Kun,GAO Hong,LUO Ji-Zhou and GUO Zheng2006,17(7):1485-1493 [Abstract(4457)] [View PDF(5905)655.99 K]Deep Approximation of Set Cover Greedy Algorithm for Test SetCUI Peng and LIU Hong-Jing2006,17(7):1494-1500 [Abstract(4930)] [View PDF(6167)421.39 K]An Optimized and Efficiently Parallelized Dynamic Programming for RNA Secondary Structure PredictionTAN Guang-Ming,FENG Sheng-Zhong and SUN Ning-Hui2006,17(7):1501-1509 [Abstract(4834)] [View PDF(5764)705.47 K]Formal Analysis of Timeliness in Non-Repudiation ProtocolsLI Bo-Tao and LUO Jun-Zhou2006,17(7):1510-1516 [Abstract(4594)] [View PDF(5426)560.69 K]Complexities of Renaming for Formulas in MAX(1) and MARG(1)XU Dao-Yun,DONG Gai-Fang and WANG Jian2006,17(7):1517-1526 [Abstract(4119)] [View PDF(5089)621.77 K]Upper Bounds on the Size of Inner Voronoi Diagrams of Multiply Connected PolygonsYANG Cheng-Lei,WANG Jia-Ye and MENG Xiang-Xu2006,17(7):1527-1534 [Abstract(4489)] [View PDF(5202)472.52 K]3D Interaction Techniques Based on Semantics in Virtual EnvironmentsJI Lian-En,ZHANG Feng-Jun,FU Yong-Gang and DAI Guo-Zhong2006,17(7):1535-1543 [Abstract(4080)] [View PDF(10621)503.58 K]Morphing Based on Mended Sparse-Field Algorithm of Level-Set MethodWENG Jian-Guang,ZHUANG Yue-Ting and PAN Yun-He2006,17(7):1544-1552 [Abstract(4000)] [View PDF(5312)555.30 K]A High Performance EBCOT Coding and Its VLSI ArchitectureLIU Kai,LI Yun-Song and WU Cheng-Ke2006,17(7):1553-1560 [Abstract(4787)] [View PDF(5455)524.85 K]Representation and Rendering of General Julia Sets Based on Tri-Dimensional Polynomial MapsCHENG Jin and TAN Jian-Rong2006,17(7):1561-1570 [Abstract(4220)] [View PDF(5095)661.28 K]Oil Style Image Generation via Fluid SimulationZHAO Yang and XU Dan2006,17(7):1571-1579 [Abstract(4160)] [View PDF(5965)590.51 K]Similarity-Based Objective Measure for Performance of Image FusionWANG Chao and YE Zhong-Fu2006,17(7):1580-1587 [Abstract(4730)] [View PDF(7831)748.72 K]A Noninterference Model for Nondeterministic SystemsXIE Jun and HUANG Hao2006,17(7):1601-1608 [Abstract(4238)] [View PDF(5134)500.41 K]A Congestion Control Algorithm for Layered Multicast Based on Differentiated ServicesYE Xiao-Guo,WANG Ru-Chuan and WANG Shao-Di2006,17(7):1609-1616 [Abstract(4161)] [View PDF(5111)495.32 K]Convolutional Fingerprinting Information Codes for Collusion SecurityZHU Yan,YANG Yong-Tian and FENG Deng-Guo2006,17(7):1617-1626 [Abstract(4319)] [View PDF(5645)767.71 K]Analysis and Improvement of a Multisecret Sharing Authenticating SchemeWANG Gui-Lin and QING Si-Han2006,17(7):1627-1632 [Abstract(4143)] [View PDF(5259)371.29 K]A Vulnerability Model of Distributed Systems Based on Reliability TheoryFENG Ping-Hui,LIAN Yi-Feng,DAI Ying-Xia and BAO Xu-Hua2006,17(7):1633-1640 [Abstract(5123)] [View PDF(6717)1.12 M]Real-Time System Design Based on Logic OR Constrained OptimizationLIU Jun-Xiang,WANG Yong-Ji,WANG Yuan,XING Jian-Sheng and ZENG Hai-Tao2006,17(7):1641-1649 [Abstract(4482)] [View PDF(5403)595.12 K]Energy-Constrained Software Prefetching OptimizationCHEN Juan,YI Hui-Zhan,DONG Yong and YANG Xue-Jun2006,17(7):1650-1660 [Abstract(4395)] [View PDF(5484)887.43 K]
Cluster-Based Routing Protocols for Wireless Sensor NetworksSHEN Bo,ZHANG Shi-Yong and ZHONG Yi-Ping2006,17(7):1588-1600 [Abstract(13976)] [View PDF(17495)808.73 K]