Volume 17,Issue 7,2006 Table of Contents

Other Issues:  
  
Contents

  • Model-Free Gene Selection Method by Considering Unbalanced Samples
  • LI Jian-Zhong,YANG Kun,GAO Hong,LUO Ji-Zhou and GUO Zheng
  • 2006,17(7):1485-1493 [Abstract(4434)]  [View PDF(5767)655.99 K]
  • Deep Approximation of Set Cover Greedy Algorithm for Test Set
  • CUI Peng and LIU Hong-Jing
  • 2006,17(7):1494-1500 [Abstract(4898)]  [View PDF(5995)421.39 K]
  • An Optimized and Efficiently Parallelized Dynamic Programming for RNA Secondary Structure Prediction
  • TAN Guang-Ming,FENG Sheng-Zhong and SUN Ning-Hui
  • 2006,17(7):1501-1509 [Abstract(4803)]  [View PDF(5562)705.47 K]
  • Formal Analysis of Timeliness in Non-Repudiation Protocols
  • LI Bo-Tao and LUO Jun-Zhou
  • 2006,17(7):1510-1516 [Abstract(4565)]  [View PDF(5291)560.69 K]
  • Complexities of Renaming for Formulas in MAX(1) and MARG(1)
  • XU Dao-Yun,DONG Gai-Fang and WANG Jian
  • 2006,17(7):1517-1526 [Abstract(4097)]  [View PDF(4959)621.77 K]
  • Upper Bounds on the Size of Inner Voronoi Diagrams of Multiply Connected Polygons
  • YANG Cheng-Lei,WANG Jia-Ye and MENG Xiang-Xu
  • 2006,17(7):1527-1534 [Abstract(4464)]  [View PDF(5076)472.52 K]
  • 3D Interaction Techniques Based on Semantics in Virtual Environments
  • JI Lian-En,ZHANG Feng-Jun,FU Yong-Gang and DAI Guo-Zhong
  • 2006,17(7):1535-1543 [Abstract(4043)]  [View PDF(10488)503.58 K]
  • Morphing Based on Mended Sparse-Field Algorithm of Level-Set Method
  • WENG Jian-Guang,ZHUANG Yue-Ting and PAN Yun-He
  • 2006,17(7):1544-1552 [Abstract(3964)]  [View PDF(5168)555.30 K]
  • A High Performance EBCOT Coding and Its VLSI Architecture
  • LIU Kai,LI Yun-Song and WU Cheng-Ke
  • 2006,17(7):1553-1560 [Abstract(4718)]  [View PDF(5309)524.85 K]
  • Representation and Rendering of General Julia Sets Based on Tri-Dimensional Polynomial Maps
  • CHENG Jin and TAN Jian-Rong
  • 2006,17(7):1561-1570 [Abstract(4184)]  [View PDF(4946)661.28 K]
  • Oil Style Image Generation via Fluid Simulation
  • ZHAO Yang and XU Dan
  • 2006,17(7):1571-1579 [Abstract(4128)]  [View PDF(5844)590.51 K]
  • Similarity-Based Objective Measure for Performance of Image Fusion
  • WANG Chao and YE Zhong-Fu
  • 2006,17(7):1580-1587 [Abstract(4693)]  [View PDF(7675)748.72 K]
  • A Noninterference Model for Nondeterministic Systems
  • XIE Jun and HUANG Hao
  • 2006,17(7):1601-1608 [Abstract(4209)]  [View PDF(4999)500.41 K]
  • A Congestion Control Algorithm for Layered Multicast Based on Differentiated Services
  • YE Xiao-Guo,WANG Ru-Chuan and WANG Shao-Di
  • 2006,17(7):1609-1616 [Abstract(4124)]  [View PDF(4978)495.32 K]
  • Convolutional Fingerprinting Information Codes for Collusion Security
  • ZHU Yan,YANG Yong-Tian and FENG Deng-Guo
  • 2006,17(7):1617-1626 [Abstract(4301)]  [View PDF(5507)767.71 K]
  • Analysis and Improvement of a Multisecret Sharing Authenticating Scheme
  • WANG Gui-Lin and QING Si-Han
  • 2006,17(7):1627-1632 [Abstract(4101)]  [View PDF(5139)371.29 K]
  • A Vulnerability Model of Distributed Systems Based on Reliability Theory
  • FENG Ping-Hui,LIAN Yi-Feng,DAI Ying-Xia and BAO Xu-Hua
  • 2006,17(7):1633-1640 [Abstract(5088)]  [View PDF(6579)1.12 M]
  • Real-Time System Design Based on Logic OR Constrained Optimization
  • LIU Jun-Xiang,WANG Yong-Ji,WANG Yuan,XING Jian-Sheng and ZENG Hai-Tao
  • 2006,17(7):1641-1649 [Abstract(4458)]  [View PDF(5257)595.12 K]
  • Energy-Constrained Software Prefetching Optimization
  • CHEN Juan,YI Hui-Zhan,DONG Yong and YANG Xue-Jun
  • 2006,17(7):1650-1660 [Abstract(4364)]  [View PDF(5356)887.43 K]
  • Review Articles

  • Cluster-Based Routing Protocols for Wireless Sensor Networks
  • SHEN Bo,ZHANG Shi-Yong and ZHONG Yi-Ping
  • 2006,17(7):1588-1600 [Abstract(13861)]  [View PDF(16560)808.73 K]