Volume 23,Issue 7,2012 Table of Contents
On the Expressiveness of Context-Sensitive Graph GrammarsZOU Yang,Lü Jian,CAO Chun,HU Hao,SONG Wei and YANG Qi-Liang2012,23(7):1635-1655 [Abstract(4476)] [View PDF(6243)1.12 M]Bounded Model Checking for Probabilistic Computation Tree LogicZHOU Cong-Hua,LIU Zhi-Feng and WANG Chang-Da2012,23(7):1656-1668 [Abstract(4731)] [View PDF(7679)734.14 K]W4H: An Analytical Framework for Software Deployment TechnologiesCHEN Wei,WEI Jun and HUANG Tao2012,23(7):1669-1687 [Abstract(4175)] [View PDF(7032)916.89 K]A Constraint-Based Approach to Identifying and Analyzing Failure-Causing RegionsSUN Chang-Ai2012,23(7):1688-1701 [Abstract(3514)] [View PDF(5671)706.39 K]Genetic Algorithm Based Approach to Personal Worklist Resource SchedulingDENG Tie-Qing,REN Gen-Quan and LIU Ying-Bo2012,23(7):1702-1716 [Abstract(4923)] [View PDF(7079)836.69 K]Loop-Nest Auto-Vectorization Based on SLPWEI Shuai,ZHAO Rong-Cai and YAO Yuan2012,23(7):1717-1728 [Abstract(4305)] [View PDF(6563)613.61 K]Approximation Sets of Rough SetsZHANG Qing-Hua,WANG Guo-Yin and XIAO Yu2012,23(7):1745-1759 [Abstract(5711)] [View PDF(7040)772.09 K]Nature Computation with Self-Adaptive Dynamic Control Strategy of Population SizeWANG Rong-Fang,JIAO Li-Cheng,LIU Fang and YANG Shu-Yuan2012,23(7):1760-1772 [Abstract(4253)] [View PDF(7179)839.34 K]Modified Immune Clonal Constrained Multi-Objective Optimization AlgorithmSHANG Rong-Hua,JIAO Li-Cheng,HU Chao-Xu and MA Jing-Jing2012,23(7):1773-1786 [Abstract(4431)] [View PDF(6057)924.27 K]Visual Word Soft-Histogram for Image RepresentationWANG Yan-Jie,LIU Xia-Bi and JIA Yun-De2012,23(7):1787-1795 [Abstract(4069)] [View PDF(6602)602.71 K]On the Limitation of the Power of Coalitional Normative SystemsWANG Chong-Jun,WU Jun,ZHANG Lei and XIE Jun-Yuan2012,23(7):1796-1804 [Abstract(3958)] [View PDF(4479)513.65 K]Multi-Scale Cooperative Mutation Particle Swarm Optimization AlgorithmTAO Xin-Min,LIU Fu-Rong,LIU Yu and TONG Zhi-Jing2012,23(7):1805-1815 [Abstract(5058)] [View PDF(7411)598.97 K]Improving Coarse-Grained Arc Consistency Algorithms in Solving Constraint Satisfaction ProblemsLI Hong-Bo,LI Zhan-Shan and WANG Tao2012,23(7):1816-1823 [Abstract(4152)] [View PDF(6486)448.76 K]Active Routing Based Intra-Domain Mobility Management for Wireless Mesh NetworksZHANG Yu-Jun,ZHANG Han-Wen and XU Zhi-Jun2012,23(7):1838-1848 [Abstract(4276)] [View PDF(5668)761.97 K]TypeSampler: A Type Sampling Approach Based on GossipZHENG Zhong,WANG Yi-Jie,MA Xing-Kong and YANG Yong-Tao2012,23(7):1849-1868 [Abstract(3791)] [View PDF(5420)1.15 M]JPEG Steganalysis Based on Feature Fusion by Principal Component AnalysisHUANG Wei,ZHAO Xian-Feng,FENG Deng-Guo and SHENG Ren-Nong2012,23(7):1869-1879 [Abstract(4733)] [View PDF(7095)754.67 K]Efficiency Evaluation Model of System Security Measures in the Given Vulnerabilities SetWU Di,FENG Deng-Guo,LIAN Yi-Feng and CHEN Kai2012,23(7):1880-1898 [Abstract(3932)] [View PDF(7096)1022.97 K]Cryptographic Properties of BOMMYANG Xiao,FAN Xiu-Bin,WU Chuan-Kun,YU Yu-Yin and FENG Xiu-Tao2012,23(7):1899-1907 [Abstract(4521)] [View PDF(7698)512.14 K]Origin Authentication Scheme Against BGP Address Prefix HijackingLIU Zhi-Hui,SUN Bin,GU Li-Ze and YANG Yi-Xian2012,23(7):1908-1923 [Abstract(4512)] [View PDF(7097)916.93 K]A Demand Based Packet Scheduling Algorithm for Multipath TransferCAO Yu and XU Ming-Wei2012,23(7):1924-1934 [Abstract(4018)] [View PDF(7055)812.00 K]
Research on Resolving Object Coreference on the Semantic WebHU Wei,BAI Wen-Yang and QU Yu-Zhong2012,23(7):1729-1744 [Abstract(7380)] [View PDF(8063)826.66 K]MAC Protocols for Cognitive Radio NetworksKAN Bao-Qiang,FAN Jian-Hua and WANG Jian-Ye2012,23(7):1824-1837 [Abstract(8026)] [View PDF(11659)780.12 K]