Volume 20,Issue 9,2009 Table of Contents
Kernelization Techniques and Its Applications to Parameterized ComputationLI Shao-Hua,WANG Jian-Xin and CHEN Jian-Er2009,20(9):2307-2319 [Abstract(7095)] [View PDF(10973)772.77 K]
Parameter Model Based Strip-Mining Technique on the Stream ProcessorDU Jing,AO Fu-Jiang,TANG Tao and YANG Xue-Jun2009,20(9):2320-2331 [Abstract(4704)] [View PDF(5691)750.01 K]lgorithm of Optimizing Quantum Reversible Logic SynthesisLI Zhi-Qiang,LI Wen-Qian and CHEN Han-Wu2009,20(9):2332-2343 [Abstract(4570)] [View PDF(6389)2.89 M]Fat Computational Complexity and Heuristic Design for the TSPJIANG He,HU Yan,LI Qiang and YU Hong2009,20(9):2344-2351 [Abstract(5473)] [View PDF(9460)494.75 K]BDD-Based Incremental Heuristic SearchXU Yan-Yan and YUE Wei-Ya2009,20(9):2352-2365 [Abstract(5162)] [View PDF(7249)990.78 K]Approach to Chinese Word Segmentation Based on Character-Word Joint DecodingSONG Yan,CAI Dong-Feng,ZHANG Gui-Ping and ZHAO Hai2009,20(9):2366-2375 [Abstract(5241)] [View PDF(8603)546.05 K]Concept-Based Data Clustering ModelZHANG Ming-Wei,LIU Ying,ZHANG Bin and ZHU Zhi-Liang2009,20(9):2387-2396 [Abstract(5102)] [View PDF(7441)366.22 K]Model for Internet News Force Evaluation Based on Information Retrieval TechnologiesYANG Wei-Jie,DAI Ru-Wei and CUI Xia2009,20(9):2397-2406 [Abstract(4984)] [View PDF(7497)546.50 K]
Algorithm for Creating Voronoi Diagrams for Two-Dimensional Riemannian ManifoldsHENG Dan,YANG Qin,LI Ji-Gang and CAI Qiang2009,20(9):2407-2416 [Abstract(6088)] [View PDF(8325)720.00 K]
Anchor Shot Detection Based on Face Detection and SIFTYANG Wu-Yi,ZENG Zhi,ZHANG Shu-Wu and LI He-Ping2009,20(9):2417-2425 [Abstract(5056)] [View PDF(6299)627.73 K]Efficient Trajectory Outlier Detection Algorithm Based on R-TreeLIU Liang-Xu,QIAO Shao-Jie,LIU Bin,LE Jia-Jin and TANG Chang-Jie2009,20(9):2426-2435 [Abstract(5785)] [View PDF(8333)704.84 K]Efficient Subgraph Query Processing Algorithms on Graph-Structured XML DocumentsWANG Hong-Zhi,LUO Ji-Zhou and LI Jian-Zhong2009,20(9):2436-2449 [Abstract(4630)] [View PDF(7147)766.42 K]Effective Image Auto-Annotation via Discriminative Hyperplane Tree Based Generative ModelWANG Mei,ZHOU Xiang-Dong,XU Hong-Tao and SHI Bai-Le2009,20(9):2450-2461 [Abstract(4512)] [View PDF(5744)766.32 K]Storage Optimized Containment-Encoded Intervals Indexing for Data Stream QueryingYAO Qiu-Lin,WANG Ying,LIU Ping and GUO Li2009,20(9):2462-2469 [Abstract(3745)] [View PDF(5519)545.56 K]
Techniques of Network Distance PredictionXING Chang-You and CHEN Ming2009,20(9):2470-2482 [Abstract(8354)] [View PDF(10493)716.78 K]
MAC Protocol for Wireless Sensor Networks via Collaborative CompressionHU Yu-Peng,LIN Ya-Ping,JIANG Hong-Yan,LI Xiao-Long and ZHOU Si-Wang2009,20(9):2483-2494 [Abstract(4713)] [View PDF(5872)676.46 K]Hierarchical Role-Based Delegation Authorization Execution Model for Service GridCHEN Zhi-Gang,GUI Jin-Song and GUO Ying2009,20(9):2495-2510 [Abstract(4517)] [View PDF(6542)923.53 K]Load Balancing for Home Agents in MIPv6 Based on Active Overload PreventionZHANG Han-Wen,ZHANG Yu-Jun,MA Chao and LI Zhong-Cheng2009,20(9):2511-2519 [Abstract(4202)] [View PDF(5895)1.44 M]Efficient Fault Diagnosis Algorithm in Dynamic Internet Service EnvironmentCHU Ling-Wei,ZOU Shi-Hong,CHENG Shi-Duan,TIAN Chun-Qi and WANG Wen-Dong2009,20(9):2520-2530 [Abstract(4710)] [View PDF(6446)703.92 K]Collusion Problem of the EBS-Based Dynamic Key Management SchemeKONG Fan-Rui,LI Chun-Wen,DING Qing-Qing,JIAO Fei and GU Qi-Bin2009,20(9):2531-2541 [Abstract(4611)] [View PDF(6269)796.80 K]Truthful Mechanisms for Maximum Lifetime Routing in Wireless Ad Hoc NetworksXIE Zhi-Peng and ZHANG Qing2009,20(9):2542-2557 [Abstract(4443)] [View PDF(5749)718.49 K]Adaptive Client Puzzle Scheme Against Denial-of-Service AttacksCHEN Rui-Chuan,GUO Wen-Jia,TANG Li-Yong and CHEN Zhong2009,20(9):2558-2573 [Abstract(3919)] [View PDF(5831)754.09 K]Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc NetworksSUN Yu-Xing,HUANG Song-Hua,CHEN Li-Jun and XIE Li2009,20(9):2574-2586 [Abstract(5403)] [View PDF(6895)607.50 K]Impossible Differential Cryptanalysis of CLEFIA-128/192/256WANG Wei and WANG Xiao-Yun2009,20(9):2587-2596 [Abstract(5192)] [View PDF(6770)505.24 K]Multi-Camera Collaboration Based on Trifocal Tensor TransferLIANG Hua,LIU Yun-Hui and CAI Xuan-Ping2009,20(9):2597-2606 [Abstract(4634)] [View PDF(6116)843.41 K]Locally Linear Embedding Based on Relative ManifoldWEN Gui-Hua,LU Ting-Hui,JIANG Li-Jun and WEN Jun2009,20(9):3476-2386 [Abstract(4547)] [View PDF(6759)1.38 M]Triangle Mesh Compression Based on Reverse Subdivision for Mobile TerminalsMA Jian-Ping,LUO Xiao-Nan,CHEN Bo and LI Zheng2009,20(9):3607-2615 [Abstract(4201)] [View PDF(6632)747.07 K]