Volume 17,Issue 7,2006 Table of Contents
Model-Free Gene Selection Method by Considering Unbalanced SamplesLI Jian-Zhong,YANG Kun,GAO Hong,LUO Ji-Zhou and GUO Zheng2006,17(7):1485-1493 [Abstract(4434)] [View PDF(5767)655.99 K]Deep Approximation of Set Cover Greedy Algorithm for Test SetCUI Peng and LIU Hong-Jing2006,17(7):1494-1500 [Abstract(4898)] [View PDF(5995)421.39 K]An Optimized and Efficiently Parallelized Dynamic Programming for RNA Secondary Structure PredictionTAN Guang-Ming,FENG Sheng-Zhong and SUN Ning-Hui2006,17(7):1501-1509 [Abstract(4803)] [View PDF(5562)705.47 K]Formal Analysis of Timeliness in Non-Repudiation ProtocolsLI Bo-Tao and LUO Jun-Zhou2006,17(7):1510-1516 [Abstract(4565)] [View PDF(5291)560.69 K]Complexities of Renaming for Formulas in MAX(1) and MARG(1)XU Dao-Yun,DONG Gai-Fang and WANG Jian2006,17(7):1517-1526 [Abstract(4097)] [View PDF(4959)621.77 K]Upper Bounds on the Size of Inner Voronoi Diagrams of Multiply Connected PolygonsYANG Cheng-Lei,WANG Jia-Ye and MENG Xiang-Xu2006,17(7):1527-1534 [Abstract(4464)] [View PDF(5076)472.52 K]3D Interaction Techniques Based on Semantics in Virtual EnvironmentsJI Lian-En,ZHANG Feng-Jun,FU Yong-Gang and DAI Guo-Zhong2006,17(7):1535-1543 [Abstract(4043)] [View PDF(10488)503.58 K]Morphing Based on Mended Sparse-Field Algorithm of Level-Set MethodWENG Jian-Guang,ZHUANG Yue-Ting and PAN Yun-He2006,17(7):1544-1552 [Abstract(3964)] [View PDF(5168)555.30 K]A High Performance EBCOT Coding and Its VLSI ArchitectureLIU Kai,LI Yun-Song and WU Cheng-Ke2006,17(7):1553-1560 [Abstract(4718)] [View PDF(5309)524.85 K]Representation and Rendering of General Julia Sets Based on Tri-Dimensional Polynomial MapsCHENG Jin and TAN Jian-Rong2006,17(7):1561-1570 [Abstract(4184)] [View PDF(4946)661.28 K]Oil Style Image Generation via Fluid SimulationZHAO Yang and XU Dan2006,17(7):1571-1579 [Abstract(4128)] [View PDF(5844)590.51 K]Similarity-Based Objective Measure for Performance of Image FusionWANG Chao and YE Zhong-Fu2006,17(7):1580-1587 [Abstract(4693)] [View PDF(7675)748.72 K]A Noninterference Model for Nondeterministic SystemsXIE Jun and HUANG Hao2006,17(7):1601-1608 [Abstract(4209)] [View PDF(4999)500.41 K]A Congestion Control Algorithm for Layered Multicast Based on Differentiated ServicesYE Xiao-Guo,WANG Ru-Chuan and WANG Shao-Di2006,17(7):1609-1616 [Abstract(4124)] [View PDF(4978)495.32 K]Convolutional Fingerprinting Information Codes for Collusion SecurityZHU Yan,YANG Yong-Tian and FENG Deng-Guo2006,17(7):1617-1626 [Abstract(4301)] [View PDF(5507)767.71 K]Analysis and Improvement of a Multisecret Sharing Authenticating SchemeWANG Gui-Lin and QING Si-Han2006,17(7):1627-1632 [Abstract(4101)] [View PDF(5139)371.29 K]A Vulnerability Model of Distributed Systems Based on Reliability TheoryFENG Ping-Hui,LIAN Yi-Feng,DAI Ying-Xia and BAO Xu-Hua2006,17(7):1633-1640 [Abstract(5088)] [View PDF(6579)1.12 M]Real-Time System Design Based on Logic OR Constrained OptimizationLIU Jun-Xiang,WANG Yong-Ji,WANG Yuan,XING Jian-Sheng and ZENG Hai-Tao2006,17(7):1641-1649 [Abstract(4458)] [View PDF(5257)595.12 K]Energy-Constrained Software Prefetching OptimizationCHEN Juan,YI Hui-Zhan,DONG Yong and YANG Xue-Jun2006,17(7):1650-1660 [Abstract(4364)] [View PDF(5356)887.43 K]
Cluster-Based Routing Protocols for Wireless Sensor NetworksSHEN Bo,ZHANG Shi-Yong and ZHONG Yi-Ping2006,17(7):1588-1600 [Abstract(13861)] [View PDF(16560)808.73 K]