Volume 18,Issue 9,2007 Table of Contents

Other Issues:  
  
Contents

  • Quantum Clonal Algorithm for Multicast Routing Problem
  • LI Yang-Yang and JIAO Li-Cheng
  • 2007,18(9):2063-2069 [Abstract(4262)]  [View PDF(5334)490.80 K]
  • Parameterized Algorithm of the Individual Haplotyping MSR Problem with Mate-Pairs
  • XIE Min-Zhu,CHEN Jian-Er and WANG Jian-Xin
  • 2007,18(9):2070-2082 [Abstract(4406)]  [View PDF(5258)828.79 K]
  • A Combinational Heuristic Algorithm for the Three-Dimensional Packing Problem
  • ZHANG De-Fu,WEI Li-Jun,CHEN Qing-Shan and CHEN Huo-Wang
  • 2007,18(9):2083-2089 [Abstract(5234)]  [View PDF(11724)509.33 K]
  • Haplotyping and Haplotype Frequency Estimates on Trio Genotype Data
  • ZHANG Qiang-Feng,XU Yun,CHEN Guo-Liang and CHE Hao-Yang
  • 2007,18(9):2090-2099 [Abstract(4104)]  [View PDF(5108)681.03 K]
  • A Probabilistic Study on the Multiple Solutions of the P3P Problem
  • ZHANG Cai-Xia and HU Zhan-Yi
  • 2007,18(9):2100-2104 [Abstract(4540)]  [View PDF(4980)320.22 K]
  • Efficient Partial Redundancy Fault Tolerance Compilation: Replicating Critical Subgraph of Error Flow
  • GAO Long,WANG Zhi-Yuan and YANG Xue-Jun
  • 2007,18(9):2105-2116 [Abstract(4179)]  [View PDF(4948)802.44 K]
  • A Performance Model-Based Self-Configuration Framework for Middleware
  • HU Jian-Jun,GUAN He-Qing,WEI Jun and HUANG Tao
  • 2007,18(9):2117-2129 [Abstract(4373)]  [View PDF(5302)790.49 K]
  • Verification of C Programs Using Assume-Guarantee Reuse of Searching
  • YI Xiao-Dong,WANG Ji and YANG Xue-Jun
  • 2007,18(9):2130-2140 [Abstract(4558)]  [View PDF(5337)789.70 K]
  • Towards Software Process Enactment Based on the SPEM2XPDL Model Transformation
  • YUAN Feng and LI Ming-Shu
  • 2007,18(9):2141-2152 [Abstract(3905)]  [View PDF(4952)1.02 M]
  • A Method of Time Constraint Workflow Model Analysis and Verification
  • WANG Yuan and FAN Yu-Shun
  • 2007,18(9):2153-2161 [Abstract(4111)]  [View PDF(5549)630.42 K]
  • Error Correction of Continuous Handwriting Recognition by Multimodal Fusion
  • AO Xiang,WANG Xu-Gang,DAI Guo-Zhong and WANG Hong-An
  • 2007,18(9):2162-2173 [Abstract(4444)]  [View PDF(5620)844.96 K]
  • Representation and Extension of Rough Set Theory Based on Formal Concept Analysis
  • QU Kai-She,ZHAI Yan-Hui,LIANG Ji-Ye and LI De-Yu
  • 2007,18(9):2174-2182 [Abstract(4506)]  [View PDF(6877)641.98 K]
  • Interactive Evolutionary Computation with Fitness Noise and Its Convergence Robustness
  • HAO Guo-Sheng,SHI You-Qun,HUANG Yong-Qing,Lü Jun-Huai and GUO Guang-Song
  • 2007,18(9):2183-2193 [Abstract(4192)]  [View PDF(5173)868.38 K]
  • Xmesh: A Mesh-Like Topology for Network on Chip
  • ZHU Xiao-Jing,HU Wei-Wu,MA Ke and ZHANG Long-Bing
  • 2007,18(9):2194-2204 [Abstract(4884)]  [View PDF(6324)651.08 K]
  • High Performance Control-Plane Communication Model for Scalable Routers
  • XU Ke,WU Kun and WANG Qing-Qing
  • 2007,18(9):2205-2215 [Abstract(4064)]  [View PDF(5197)677.04 K]
  • A User Behavior Based Semantic Search Approach under P2P Environment
  • QIU Zhi-Huan,XIAO Ming-Zhong and DAI Ya-Fei
  • 2007,18(9):2216-2225 [Abstract(4635)]  [View PDF(5561)718.79 K]
  • An Overlay Topology Based Proactive Replication in Unstructured P2P Systems
  • FENG Guo-Fu,ZHANG Jin-Cheng,GU Qing,LU Sang-Lu and CHEN Dao-Xu
  • 2007,18(9):2226-2234 [Abstract(3935)]  [View PDF(5452)621.62 K]
  • Movement-Assisted Data Gathering Scheme with Load-Balancing for Sensor Networks
  • SHI Gao-Tao and LIAO Ming-Hong
  • 2007,18(9):2235-2244 [Abstract(4988)]  [View PDF(5051)683.56 K]
  • DDOS Attack Detecting and Defending Model
  • SUN Zhi-Xin,JIANG Ju-Liang and JIAO Lin
  • 2007,18(9):2245-2258 [Abstract(5202)]  [View PDF(7003)841.44 K]
  • Performance Analysis of the Contention Resolution Scheme in IEEE 802.16
  • LU Wen-Yan,JIA Wei-Jia,DU Wen-Feng and ZHANG Li-Zhuo
  • 2007,18(9):2259 [Abstract(5335)]  [View PDF(5698)714.31 K]
  • Techniques of Building a Scalable, Efficient Intrusion Monitoring Architecture
  • YANG Wu,FANG Bin-Xing and YUN Xiao-Chun
  • 2007,18(9):2271-2282 [Abstract(4671)]  [View PDF(5107)691.62 K]
  • Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moment of Original Image
  • ZHANG Li,QIAN Gong-Bin and XIAO Wei-Wei
  • 2007,18(9):2283-2294 [Abstract(4439)]  [View PDF(5112)883.84 K]
  • Multi-Level and Dynamic Security Access Control for CAD Models in Collaborative Environment
  • FANG Cui-Hao,YE Xiu-Zi,PENG Wei and ZHANG Yin
  • 2007,18(9):2295-2305 [Abstract(4485)]  [View PDF(5885)776.54 K]
  • Algebraic B-Spline Curve Reconstruction Based on Signed Distance Field
  • LI Yun-Xi,FENG Jie-Qing and JIN Xiao-Gang
  • 2007,18(9):2306-2317 [Abstract(4461)]  [View PDF(6187)929.10 K]
  • Illumination Normalization with Morphological Quotient Image
  • HE Xiao-Guang,TIAN Jie,WU Li-Fang,ZHANG Yao-Yao and YANG Xin
  • 2007,18(9):2318-2325 [Abstract(5208)]  [View PDF(5595)937.10 K]
  • Bound Estimations on Lower Derivatives of Rational Triangular Bézier Surfaces
  • CAO Juan,CHEN Wen-Yu and WANG Guo-Zhao
  • 2007,18(9):2326-2335 [Abstract(4194)]  [View PDF(4642)558.68 K]
  • Multisolution Shape Editing of Point-Sampled Geometry
  • XIAO Chun-Xia,FENG Jie-Qing,ZHOU Ting-Fang,ZHENG Wen-Ting and Peng Qun-Sheng
  • 2007,18(9):2336-2345 [Abstract(4332)]  [View PDF(5081)953.81 K]
  • Ternary Subdivision Scheme for Quadrilateral Mesh with Fast Convergence
  • LIU Li,ZHANG Cai-Ming,YANG Xing-Qiang and BO Peng-Bo
  • 2007,18(9):2346-2355 [Abstract(4254)]  [View PDF(5168)680.17 K]
  • A Method for Character Animation Generation and Control
  • GAO Quan-Sheng and HONG Bing-Rong
  • 2007,18(9):2356-2364 [Abstract(4169)]  [View PDF(4996)686.21 K]