Abstract is missing.
- Adaptive Dimensioning of Cloud Data CentersWenhong Tian. 5-10 [doi]
- Formal Analysis of Fault Recovery in Self-Organizing SystemsJan Calta, Miroslaw Malek. 11-18 [doi]
- Dependability Analysis for AADL Models by PVSGeng Chen, Lei Luo, Rong Gong, Shenglin Gui. 19-24 [doi]
- Behavioral Study of UNIX Commands in a Faulty EnvironmentCássio Martini Martins Pereira, Rodrigo Fernandes de Mello. 25-30 [doi]
- Verification of a Lock-Free Implementation of Multiword LL/SC ObjectHui Gao, Yan Fu, Wim H. Hesselink. 31-36 [doi]
- Policy Description Language for Dynamic Access Control ModelsM. Hashimoto, M. Kim, H. Tsuji, H. Tanaka. 37-42 [doi]
- Reliability and Dependability Modeling and Analysis of Dynamic Aspects in Complex SystemsSalvatore Distefano. 43-48 [doi]
- TCBC: Trap Caching Bounds Checking for CYoshitaka Arahori, Katsuhiko Gondow, Hideo Maejima. 49-56 [doi]
- A Rare Feature Recognition Approach Based on Fuzzy ART Neural NetworksJun Zha, Cong Lu, HongGuang Lv. 57-62 [doi]
- A Utility-Based Adaptive Resource Allocation Policy in Virtualized EnvironmentJian Wan, Peipei Shan, Xianghua Xu. 63-68 [doi]
- Achieving Information Security in Network Computing SystemsVincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa. 71-77 [doi]
- Securing Session Initiation Protocol in Voice over IP DomainIyad Alsmairat, Rajan Shankaran, Mehmet A. Orgun, Eryk Dutkiewicz. 78-83 [doi]
- Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPAHongwu Lv, Huiqiang Wang, Qian Zhao, Chunguang Ma. 84-89 [doi]
- Composition Planning for Networked AppliancesChatchawin Namman, Anirach Mingkhwan. 90-94 [doi]
- A Dynamic Protection System of Web Server in Virtual Cluster Using Live MigrationRuo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda. 95-102 [doi]
- Replica Placement in Multi-tier Data GridQaisar Rasool, Jianzhong Li, Shuo Zhang. 103-108 [doi]
- Grey Prediction Control of Adaptive Resources Allocation in Virtualized Computing SystemXianghua Xu, Yanna Yan, Jian Wan. 109-114 [doi]
- Security Analysis of NSSK Protocol and its ImprovementJunguo Liao, Bin Zhu, Yong He. 115-118 [doi]
- Evolutionary Design of Relatively Large Combinational Circuits with an Extended Stepwise Dimension ReductionZhifang Li, Wenjian Luo, Lihua Yue, Xufa Wang. 119-124 [doi]
- Research on Secure and Reconfigurable Architecture Based on Embedded HardwareZhiqiang Zhu, Mingdi Xu, Huanguo Zhang. 127-131 [doi]
- Low Power Embedded Speech Enhancement System Based on a Fixed-Point DSPYu Cai, Jianping Yuan, Xiaochuan Ma, Chaohuan Hou. 132-136 [doi]
- A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-SwappingHuiqiang Wang, Xikun Dong, Haifeng Wang. 137-142 [doi]
- Energy-Efficient Cluster-Based Scheme for Handling Node Failure in Real-Time Sensor NetworksHamid Karimi, Mehdi Kargahi, Nasser Yazdani. 143-148 [doi]
- Real Hardware Verification by Software for Bootstrap Using TSCKunio Miyamoto, Hidehiko Tanaka. 149-152 [doi]
- Solving Aircraft-Sequencing Problem Based on Bee Evolutionary Genetic Algorithm and Clustering MethodSiliang Wang. 157-161 [doi]
- Generating an Approximately Optimal Detector Set by Evolving Random SeedsJie Zhang, Wenjian Luo, Baoliang Xu. 162-168 [doi]
- Learning Navigation Map on OntologyTianying Chen, Hongguang Fu. 169-174 [doi]
- Semantic Web Services Composition Model Based on Domain Ontology Cost GraphWu Chongyun, Wen Jun. 175-178 [doi]
- An Approach to Multi-issue Active Negotiation Control Algorithm in Multi-stagesLipeng Wang, Mingjun Xin. 179-182 [doi]
- A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging AlgorithmsMy Chau Tu, Dongil Shin, Dongkyoo Shin. 183-187 [doi]
- Robust and Fast Keypoint Recognition Based on SE-FASTXueting Tan, Xubo Yang, Shuangjiu Xiao. 188-193 [doi]
- Pattern Matching with Independent Wildcard GapsFan Min, Xindong Wu, Zhenyu Lu. 194-199 [doi]
- Toward an Understanding of User-Defined Conditional PreferencesZhiyong Yu, Zhiwen Yu, Xingshe Zhou, Yuichi Nakamura. 203-208 [doi]
- Design and Implementation of a High Resolution Localization System for In-Vivo Capsule EndoscopyJinlong Hou, Yongxin Zhu, Le Zhang, Yuzhuo Fu, Feng Zhao, Li Yang, Guoguang Rong. 209-214 [doi]
- Adaptive Fuzzy Control with Modulated Membership Function Applies to Path Tracking Based on Location SystemWei-Jun Pan, Chih-Chun Lin, Leehter Yao. 215-220 [doi]
- Design of a Rule Based System Using Structured Query LanguageUmair Abdullah, Mohammad Jamil Sawar, Aftab Ahmed. 223-228 [doi]
- Intelligent Context-Based Adaptation for Spatial Routing Applications in Dynamic EnvironmentDejian Meng, Stefan Poslad, Yide Zhang. 229-234 [doi]
- Blog Hotness Evaluation Model Based on Text Opinion AnalysisJianjiang Li, Xuechun Zhang, Yu Weng, Changjun Hu. 235-240 [doi]
- A Web Text Filter Based on Rough Set Weighted BayesianYu Wu, Kun She, William Zhu, Xiaojun Yue, Huiqiong Luo. 241-245 [doi]
- Measuring the Probability of Correctness of Contextual Information in Context Aware SystemsNermin Brgulja, Rico Kusber, Klaus David, Matthias Baumgarten. 246-253 [doi]
- Cooperative Alert Topic Detection Model in Distributed EnvironmentJianjiang Li, Chengxiu Xue, Yu Weng, Changjun Hu. 254-259 [doi]
- A Comparison of Social Service Selection TechniquesElodie Billionniere, David Greiman, Kinnis Gosha. 260-265 [doi]
- Synthesis and Analysis in Artificial Intelligence: The Role of Theory in Agent ImplementationRoxanne B. Raine, Rieks op den Akker, Zhiqiang Cai, Arthur C. Graesser, Danielle S. McNamara. 266-269 [doi]
- A Software Agent Based Simulation Model for Systems with Decision UnitsYuan Miao. 270-275 [doi]
- A Novel Variable-Boundary-Coded Quantum Genetic Algorithm for Function OptimizationHegen Xiong, Kai Xiong, Qiuhua Tang. 279-285 [doi]
- On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature SchemesJianhong Zhang, Hua Chen, Shengnan Gao. 286-291 [doi]
- Cryptanalysis of Two Identity Based Signcryption SchemesQi Xia, Chunxiang Xu. 292-294 [doi]
- Cyber-I: Vision of the Individual's Counterpart on CyberspaceJie Wen, Kai Ming, Furong Wang, Benxiong Huang, Jianhua Ma. 295-302 [doi]
- Multidimensional Pervasive Adaptation into Ambient Intelligent EnvironmentsYacine Bellik, Gaëtan Pruvost, Achilles Kameas, Christos Goumopoulos, Hani Hagras, Michael Gardner, Tobias Heinroth, Wolfgang Minker. 303-308 [doi]
- Performance Study of RFID Localisation in a Challenging Indoor EnvironmentSiok Kheng Tan, Zhong Fan. 311-316 [doi]
- A Mobile Health Monitoring System Using RFID Ring-Type Pulse SensorYu-Chi Wu, Pei-Fan Chen, Zhi-Huang Hu, Chao-Hsu Chang, Gwo-Chuan Lee, Wen-Ching Yu. 317-322 [doi]
- Similarity Computation Using Reconfigurable Embedded HardwareDarshika G. Perera, Kin Fun Li. 323-329 [doi]
- A Memetic Algorithm Based on P Systems for IIR Digital Filter DesignChunxiu Liu, Gexiang Zhang, Xuebai Zhang, Hongwen Liu. 330-334 [doi]
- Key Techniques of Interoperable DRM on Linux PlatformYulin Wang, Xuebin Liu. 335-338 [doi]
- VDE: Seamless Mobility on Desktop EnvironmentXiaofei Liao, Xianwen Chen, Hai Jin, Zongfen Han. 339-344 [doi]
- Mobile Phones as 3-DOF Controllers: A Comparative StudyNicholas Katzakis, Masahiro Hori. 345-349 [doi]
- Modeling Reputation Scheme in P2P File-Sharing by Stochastic Activity NetworksPeiqing Zhang, Bjarne E. Helvik. 353-358 [doi]
- Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless NetworksChen Chun-mei, Jiang Hong, Yang Shi-en. 359-363 [doi]
- On-demand Query Processing in Mobile Ad Hoc NetworksLongjiang Li, Supeng Leng, Yuming Mao. 364-368 [doi]
- A New Method for Coverage in Wireless Sensor NetworksN. Attarzadeh, Ali Barati, Ali Movaghar. 369-372 [doi]
- A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless NetworksKe Liu, Supeng Leng, Huirong Fu, Longjiang Li. 373-378 [doi]
- Multi-objective Optimization of Cross-Layer Configuration for Cognitive Wireless NetworkHong Jiang, Yujun Bao, Qiang Li, Yu Qing Huang. 379-383 [doi]
- A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor NetworkChen Hao, Guo Yajun. 384-388 [doi]
- An Adaptive Low Latency Cross-Layer MAC Protocol for Wireless Sensor NetworksZhenzhou Tang, Qian Hu. 389-393 [doi]
- A New Approach to Secure Aggregation of Private Data in Wireless Sensor NetworksRabindra Bista, Kyoung-Jin Jo, Jae-Woo Chang. 394-399 [doi]
- ABSR: An Agent Based Self-Recovery Model for Wireless Sensor NetworkChunguang Ma, Xiangjun Lin, Hongwu Lv, Huiqiang Wang. 400-404 [doi]
- An Improved Method to Reduce Over-Segmentation of Watershed Transformation and its Application in the Contour Extraction of Brain ImageHui Zhu, Bofeng Zhang, Anping Song, Wu Zhang. 407-412 [doi]
- Automatic Segmentation in Tongue Image by Mouth Location and Active Appearance ModelXiuqin Zhong, Hongguang Fu, Junhua Yang, Weiming Wang. 413-417 [doi]
- A General Framework of Brain-Computer Interface with Visualization and Virtual Reality FeedbackGufei Sun, Kuangda Li, Xiaoqiang Li, Bofeng Zhang, Shizhong Yuan, Gengfeng Wu. 418-423 [doi]
- Salmon: Precise 3D Contours in Real TimeTariq Khan, John Morris, Khurram Jawed, Georgy L. Gimel'farb. 424-429 [doi]
- Correlation Between Forehead EEG and Sensorimotor Area EEG in Motor Imagery TaskKuangda Li, Gufei Sun, Bofeng Zhang, Shaochun Wu, Gengfeng Wu. 430-435 [doi]
- Position Calculating and Path Tracking of Three Dimensional Location System Based on Different Wave VelocitiesChih-Chun Lin, She-Shang Xue, L. Yao. 436-441 [doi]
- Efficient Video Quality Assessment for Broadcasting Multimedia SignalXingang Liu, Kook-yeol Yoo, Ho-Youl Jung, Yong Wan Park. 442-447 [doi]
- A Peer to Peer Large Data Parallel Computing System and its Application in High-Resolution Video ProcessingYanru Chen, Guowei Chen, M. Matsumoto. 448-451 [doi]
- Runtime Safety Models in Open Systems of SystemsD. Schneider, M. Trapp. 455-460 [doi]
- People Reidentification in a Camera NetworkI. O. de Oliveira, J. L. de Souza Pio. 461-466 [doi]
- Web Service Selection Algorithm Based on Particle Swarm OptimizationHong Xia, Yan Chen, Zengzhi Li, Haichang Gao, Yanping Chen. 467-472 [doi]
- A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing TheoryQian Zhao, Huiqiang Wang, Guangsheng Feng, Xu Lu, Hongwu Lv. 473-477 [doi]
- Research on Parallelization of Aspect-Oriented ProgramTengfei He, Xiaoguang Mao. 478-482 [doi]
- Reducing Program Environment Misjudgement on VM Detection Using TSCK. Miyamoto, H. Tanaka. 483-485 [doi]
- Password Recovery for RAR Files Using CUDAGuang Hu, Jianhua Ma, Benxiong Huang. 486-490 [doi]
- Design Optimization under Aleatory and Epistemic UncertaintiesJuan Wei, Bo Yang, Wei Liu. 491-495 [doi]
- Integration of Resource Poor Wireless Sensor Networks into Smart SpacesNuno Costa, António Pereira, Carlos Serôdio. 496-501 [doi]
- Autonomic Trust Extraction for Trustworthy Service Discovery in Urban ComputingKyounghee Jung, Younghee Lee. 502-507 [doi]
- A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse BehaviorsBehzad Zare Moayedi, Mohammad Abdollahi Azgomi. 508-513 [doi]
- Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing PlatformZhiqiang Zhu, Mingdi Xu, Huanguo Zhang. 514-519 [doi]
- Study on Buffer Optimal Control Algorithm Based on Infinitesimal Perturbation Analysis for Broadband Satellite NetworksWang Lei, He Ning. 523-526 [doi]
- An Improved Intrusion Detection Method in Mobile AdHoc NetworkFangchao Yin, Xin Feng, Yonglin Han, Libai He, Huan Wang. 527-532 [doi]
- Multicasting Tree Transformation for Concurrent Modest Multimedia ServiceMi-young Kang, Ji-Seung Nam, Seo-Gyun Kim. 533-538 [doi]
- Finding Arc and Vertex-Disjoint Paths in NetworksZheng Xie, Hongze Leng, Zhi Chen, Jun Zhang. 539-544 [doi]
- A Routing Misbehavior Detection and Mitigating Scheme Based on Reputation in Hybrid Wireless Mesh NetworksJinsong Gui. 545-550 [doi]
- Multi-metric Routing Decisions in VANETXiao-Bo Wang, Yu-Liang Yang, Jian-wei An. 551-556 [doi]
- Routing on Shortest Pair of Disjoint Paths with Bandwidth GuaranteedHongze Leng, Meilian Liang, Junqiang Song, Zheng Xie, Jun Zhang. 557-561 [doi]
- Data Caching Based on Improved DGA in Ad Hoc NetworksHongbin Song, Xiaoqiang Xiao, Ming Xu, Lei Lin. 562-565 [doi]
- A Study on Buffer Efficiency and Surround Routing Strategy in Delay Tolerant NetworkQian He, Yang Li, Xiumei Fan. 566-570 [doi]
- A Load-Balancing and Energy-Aware Routing Protocol for MANET Accessing InternetJian Xu, Xiang-Cai Zhu. 571-574 [doi]
- Compact Routing on Random Power Law GraphsMingdong Tang, Jing Yang 0001, Guoqing Zhang. 575-578 [doi]
- A Framework for Identifier-Based Routing for Future InternetJie Hou, Yaping Liu, Zhenghu Gong. 579-584 [doi]
- Noise Source Recognition Based on Two-Level Architecture Neural Network Ensemble for Incremental LearningGao Zhihua, B. Kerong, Cui Lilin. 587-590 [doi]
- Crawling Strategy of Focused Crawler Based on Niche Genetic AlgorithmHuilian Fan, Guangpu Zeng, Xianli Li. 591-594 [doi]
- A Hybrid Algorithm for Solving Two-Part Division Problem in Network Community DetectionChengying Mao, Man Luo, Zhenmei Zhu. 595-600 [doi]
- Influence Diagram Model with Interval-Valued UtilitiesLihua Zhou, Weiyi Liu, Lizhen Wang. 601-605 [doi]
- Research on Social Relation Extraction of Web PersonsGan Tian, Mo Qian. 606-610 [doi]
- World Models and Technologies of Psychological Impact to Resolve International ConflictsA. V. Manoilo. 611-614 [doi]
- Fast Complex Network Clustering Algorithm Using AgentsDi Jin, Dayou Liu, Bo Yang 0002, Jie Liu. 615-619 [doi]
- Dynamic Social Network Analysis Using Latent Space Model and an Integrated Clustering AlgorithmAiwu Xu, Xiaolin Zheng. 620-625 [doi]
- Research on Network Flow Evaluation Benchmark ModelZhou Jian, Hu Longmao, Zhou Yanran. 626-631 [doi]
- Research on the Application of Expert Knowledge Map Based on Social Network AnalysisTong Liu, Yanqin Shi, Chensheng Wu. 632-635 [doi]
- Research on Component-Based Model Driven Architecture Development and AssemblyFei Chen, Wan-hua Cao, Yong Huang. 636-641 [doi]
- A Study of High Concurrency Workload Influence on Modern ProcessorBaojie Chai, Dawei Liu, Jie Zhao, Wenjun Yang. 642-647 [doi]
- An Analysis of Security in Social NetworksWeimin Luo, Jingbo Liu, Jing Liu, Chengyu Fan. 648-651 [doi]
- Models of Information and Psychological Operations Used in International ConflictsA. V. Manoilo. 652-657 [doi]
- Bowling Alone and Trust Decline in Social Network SitesPaolo Massa, Martino Salvetti, Danilo Tomasoni. 658-663 [doi]
- Discovery and Visualization of Hierarchical Overlapping Communities from Bibliography InformationPushpa Kumar, Li Wang, J. Chauhan, Kang Zhang. 664-669 [doi]
- Water-Bloom Medium-Term Prediction Based on Gray-BP Neural Network MethodShiping Zhu, Zaiwen Liu, Xiaoyi Wang, Jun Dai. 673-676 [doi]
- A Hybrid Approach for Chinese Named Entity Recognition in Music DomainXueqing Zhang, Zhen Liu, Huizhong Qiu, Yan Fu. 677-681 [doi]
- Research on One Intelligent Prediction Method for Water BloomXiaoyi Wang, Zaiwen Liu, Shiping Zhu, Jun Dai, Chenling Zhu, Minghua Yang. 682-685 [doi]
- Designing a Network Acquisition System of Competitive IntelligenceGuoliang Shi, Xiaorong Mou, Xu Wan. 686-689 [doi]
- Towards Integrated Simulation of Cyber-Physical Systems: A Case Study on Intelligent Water DistributionJing Lin, Sahra Sedigh, Ann Miller. 690-695 [doi]
- Intrusion Detection Based on Data MiningGeorge S. Oreku, Fredrick Japhet Mtenzi. 696-701 [doi]
- Using Nature to Best Clarify Computer Security and ThreatsGeorge S. Oreku, Fredrick Mtenzi. 702-707 [doi]
- Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing ArchitecturesWassim Itani, Ayman I. Kayssi, Ali Chehab. 711-716 [doi]
- Cloud Security with Virtualized Defense and Reputation-Based Trust MangementKai Hwang, Sameer Kulkareni, Yue Hu. 717-722 [doi]
- SRD-DFA: Achieving Sub-rule Distinguishing with Extended DFA StructureGao Xia, Xiaofei Wang, Bin Liu. 723-728 [doi]
- Intrusion Detection in the CloudSebastian Roschke, Feng Cheng 0002, Christoph Meinel. 729-734 [doi]
- A Benchmark of Transparent Data Encryption for Migration of Web Applications in the CloudJi Hu, Andreas Klein. 735-740 [doi]
- A Design of Data Acquisition of High Speed CCD CameraWan Xiao Feng, Wang Bingyi, Zeng Pu, Liu Shung. 743-745 [doi]
- Acceptance and Applications of Smart Cards Technology in University SettingsAbdulrahman A. Mirza, Khaled Alghathbar. 746-748 [doi]
- Design of 3D Positioning Algorithm Based on RFID Receiver Array for In Vivo Micro-RobotLe Zhang, Yongxin Zhu, Tingting Mo, Jinlong Hou, Hao Hu. 749-753 [doi]
- Public-Mailbox-Based Online Homework-Automatic-Processing PlatformYuan Lin, Riping Gen, Guixian Xu. 754-757 [doi]
- An On-line Monitor System on Off-Gases of Vehicles with WSN's Design Based on Zigbee TechnologyZhi-qin Liu, Xiu-feng Jiang, Hai-hao Wang, Kai Zhang. 758-763 [doi]
- Joint Topology-Transparent Scheduling and Multipath QoS Routing in MANETsYuan Li, Baolin Sun, Xing Luo. 767-771 [doi]
- The Optimal Design of Tree Structure Based on Ant Colony of Wireless Sensor Networks RoutingGang Hu, Pan Zhang, Wei Zhang. 772-776 [doi]
- A Practical Solution for Automatic Service Discovery and Usage over Resource Poor Ad-hoc Sensor NetworksNuno Costa, António Pereira, Carlos Serôdio. 777-781 [doi]
- A Remote Monitoring System of IDC Room Based on ZigBee Wireless Sensor NetworksShuchao Ma, Ming Zhu, Lei Wang, Lei Shu, Suran Li, Shumin Huang. 782-787 [doi]
- Research of Fingerprint Image Quality EstimationYulan Zhao, Chunfeng Jiang, Xiufeng Fang, Bin Huang. 791-795 [doi]
- Interactive Pervasive Wireless Services over GPRS and BluetoothYong Tang. 796-801 [doi]
- Robust Medical Data Delivery for Wireless Pervasive HealthcareShanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy. 802-807 [doi]
- A Newly Developed Diamond Search AlgorithmChen hui, Jia Hai-Tao. 811-814 [doi]
- Comparison of Neural Network and Kriging Method for Creating Simulation-Optimization MetamodelsYuan Ren, Guangchen Bai. 815-821 [doi]
- REAR: Real-Time Energy Aware Routing for Wireless Adhoc Micro Sensors NetworkSohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar, Muhammad Zubair Aziz. 825-830 [doi]
- An Intelligent MANet Routing Method MECSheng Cao, Yong Chen. 831-834 [doi]
- Notice of Violation of IEEE Publication PrinciplesA Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval)R. Sudha. 837-842 [doi]
- A New Connected Component Analysis Algorithm Based on Max-TreeYan Fu, Xu Chen, Hui Gao. 843-844 [doi]
- P2P-Based Single Sign-OnYong Ma, Xuewen Chen, Ling Li, Yaoming Luo. 845-846 [doi]
- Research of Fingerprint RecognitionChunfeng Jiang, Yulan Zhao, Wei Xu, Xiangping Meng. 847-848 [doi]
- A Synthetic Network Management Model Based on ForCES FE ModelFenggen Jia, Kangping Liu, Bin Zhuge, Weiming Wang. 849-850 [doi]
- A Symmetric Key Based RFID Authentication Protocol Using Encrypted Tag IDJuseok Shin, Yongsoo Park, Sungsoo Kim, Youngbak Kim, Kyungoul Kim, Wonseok Choi, KwangSeon Ahn. 851-852 [doi]
- A Lightweight RFID Authentication Protocol Using Step by Step Symmetric Key ChangeKyoungyoul Kim, Kyungho Chung, Juseok Shin, Hyunwoo Kang, Sejin Oh, Chunho Han, KwangSeon Ahn. 853-854 [doi]
- Realization of Intelligent Dynamic Topology Management in Next Generation NetworkCong Wu, Shiguo Xu. 855-856 [doi]
- Publish and Subscribe Model Based on WS-NotificationGuangpu Zeng, Huilian Fan. 857-858 [doi]
- Research of Summarization Extraction in Multiple Topics DocumentTao Liao, Zongtian Liu. 859-860 [doi]
- A Kind of Improved Vector Space ModelXiaoping Xu, Junhu Yan. 861-862 [doi]
- A Short Distance Data Dissemination Protocol for Wireless Sensor NetworksKyungho Chung, Sungsoo Kim, YongHwan Kim, Myungsil Choi, Yongsoo Park, KwangSeon Ahn. 863-864 [doi]
- Delay-Dependent Robust Global Asymptotic Stability for Stochastic Neural Networks with Discrete-Delay and Unbounded Distributed DelaysJinzhong Cui, Mengzhuo Luo, Shouming Zhong. 865-866 [doi]