Abstract is missing.
- Normative Modeling for Personalized Clinical Pathway Using Organizational Semiotics MethodsWeizi Li, Kecheng Liu, Shuzhang Li, Hongqiao Yang. 3-7 [doi]
- Research on Holistic Index Method of Geography Markup LanguageHaitao Zhang, Shuliang Zhang, Guonian Lv. 7-12 [doi]
- Computer Aided Analysis of Bifurcation of a Spatial Dynamical SystemWang Lin, Zhongyue Li. 8-10 [doi]
- A New Method for Modulation Classification Based on Bootstrap TechniqueFeng Wang, Bing-bing Li. 11-14 [doi]
- An Improved Color Image Enhancement Algorithm Based on MSRLi He, You Yang. 13-16 [doi]
- A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token ProxyYouxiang Duan, Yongtang Bao, Lijiang Pan, Beibei Yan, Jiuyun Xun, Nianyun Shi. 15-20 [doi]
- A Hardware Implement of Bus Bridge Based on Single CPU and Dual Bus ArchitectureTiedong Wang, Fengjing Shao, RenCheng Sun, He Huang. 17-20 [doi]
- A 3D Controllable Head and Face Modeling Method for a Certain PersonDuan Hong. 21-24 [doi]
- Normalization for Removing Code Variations in Modular ProgramsTiantian Wang, Xiaohong Su, Peijun Ma. 21-24 [doi]
- A RP(k)-Based Educational Resource Grid and Resource Awareness ModelNai wen Liu, Fang ai Liu. 25-30 [doi]
- The Classification Diagram of Character Identification in Several Different and Similar Structures of Time SeriesJunhai Ma, Peiling Xiao, Zhiqiang Wang. 25-28 [doi]
- Touched Human Object Segmentation Based on Mean Shift AlgorithmSen Guo, Wei Liu, Jinghua Wang. 29-33 [doi]
- Image Denoising with Contourlet Transform Based on PCALin-li Sun, Yan Li, Jian-ming Zheng. 31-33 [doi]
- Resolving Synchronization and Analyzing Based on Aspect-Oriented ProgrammingYang Zhang, Jingjun Zhang, Yuejuan Chen, Qiaoling Wang. 34-37 [doi]
- Design and Implementation of Secure Instant Messaging System Based on MSNBin Zhang, Meng Feng, Hou-ren Xiong, Dianyou Hu. 38-41 [doi]
- A Simple and Efficient Edge Detection AlgorithmGuangyu Luan, Rensheng Che. 40-44 [doi]
- A Framework for Analyzing Correlative Software and Hardware FaultsZhaoxiang Yi, Xiaodong Mu, Li Zhang, Peng Zhao, Zongrun Yin. 42-45 [doi]
- Detection of Non-iris Region in the Iris RecognitionZhongliang Luo, Tusheng Lin. 45-48 [doi]
- Study on Object Location Fusion Algorithm of Actual License Plate ImagesMei Wang, Guangda Su, Guohong Wang. 46-49 [doi]
- Barrier Coverage of Wireless Sensor Networks Based on Clifford AlgebraWenming Cao, Tiancheng He. 49-52 [doi]
- A Storage Method for XML Document Based on Relational DatabaseSainan Liu, Caifeng Liu, Liming Guan. 50-53 [doi]
- A P2P Traffic Classification Method Based on SVMXusheng Zhou. 53-57 [doi]
- Cryptanalysis and Improvements of Two Certificateless Signature Schemes with Additional PropertiesQiang Nong, Yanhua Hao. 54-58 [doi]
- Research of Graph-Based Workflow Access ControlYonghe Wei, Chunjing Shi. 58-62 [doi]
- Feature Reduction Based on Analysis of Covariance MatrixLishi Zhang, Xianchang Wang, Leilei Qu. 59-62 [doi]
- Study on Integrated Intelligent Control with Hierarchical StructureWu Wang, Hong-ling Wang. 63-65 [doi]
- A Hierarchical Method for Estimating Relative Importance in Complex NetworksWeiming Zhang, QingXian Wang. 63-65 [doi]
- The Research of Software Product Line Engineering Process and Its Integrated Development Environment ModelJianli Dong, Jianzhou Wang, Donghuai Sun, Haiyan Lu. 66-71 [doi]
- A Data Mining Application in Stellar SpectraBin Jiang, Jingchang Pan, Zhenping Yi, Qiang Guo. 66-69 [doi]
- Influence Law of Pedestrian WAD in Vehicle/Pedestrian CollisionsYanhui Fan, Hongguo Xu. 70-73 [doi]
- Extension Cluster Prediction Model Used in Predicting Wastewater EmissionsLiangfang Lin, Tao Zeng, Yongquan Yu, Shangfang Lin. 72-75 [doi]
- Analysis and Improvement of Scheduling Algorithms Based on (m, k)-Firm ConstraintLanying Li, Yu Tan. 74-77 [doi]
- Task Construction with Temporal Consistency for Embedded Control Software DesignYan Li, Chen Wen. 76-79 [doi]
- Research on Face Detection Classifier Using an Improved Adboost AlgorithmLiuxia Lisu. 78-81 [doi]
- Intelligent Control and Alarm System Based on TC35iWei Liu, Hexin Chen, Junwei Zhang, Guangyao Zhu, Yuehong Zhang. 80-83 [doi]
- An Adaptive Development Framework for Web-Based Enterprise Information SystemXudong Liu, Xiaofei Xu, De-chen Zhan, Limin Qiao. 82-86 [doi]
- A Simpler Framework Based on the Applied Pi Calculus and Its Application to Electronic Cash ProtocolXiaojuan Cai, Yuxin Deng. 87-90 [doi]
- Knowledge Based Model for Holistic Information Security Risk AnalysisJing-Wen Huang, Yong-Sheng Ding, Zhi-Hua Hu. 88-91 [doi]
- Seamless LBS Based on the Integration of WSN and GPSDejun Zou, Zhongliang Deng, Lianming Xu, Weizheng Ren. 91-96 [doi]
- Determination of Safety Stock for Power Enterprises Under UncertaintyLihong Ma, Ming Lin. 92-94 [doi]
- The Mapping Definition and Realization Process About Architecture-Centric Agent ModelXiaona Xia, Baoxiang Cao. 95-98 [doi]
- Multi-agent Based Distributed Video Surveillance System over IPWu Chao, Xin Ming Jun. 97-100 [doi]
- The Performance Analysis of Fast EAP Re-authentication ProtocolQing Xu, Changsheng Wan, Aiqun Hu. 99-103 [doi]
- A Bitmap Compression Algorithm for Vertical Association Rules MiningLiu Yang, Mei Qiao. 101-104 [doi]
- Heterogeneous Sensors Track-to-Track Correlation Algorithm Based on Gray Correlative DegreeYoupeng Huang, Yongfeng Zhou, Haibo Zhang. 104-108 [doi]
- An Optimized Parallel FFT Algorithm on Multiprocessors with Cache Technology in LinuxJun Tan, Xingshu Chen, Long Xiao. 105-109 [doi]
- An Algorithm of Web Text Clustering Analysis Based on Fuzzy SetYun Peng, Shu-liang Ding. 109-113 [doi]
- Extending Sliding-Window Semantics over Data StreamsLeisong Chen, Guoping Lin. 110-113 [doi]
- Research on a Behavior-Based Software Test Process ModelYongzhong Lu, Simeng Da, Jun Yang, Junli Song, Songlin Nie. 114-117 [doi]
- Research on Decision Support System of Water Pollution Control Based on Immune AgentBo-Ping Zhang, Guo-xi Wu, Shi-yu Shang. 114-117 [doi]
- Development of a Computerized Method to Inspect Empty Glass BottleHuan-jun Liu, Yao-nan Wang. 118-123 [doi]
- SCTP-Based Server Cluster Heartbeat Detection MechanismLei Zhang, Hao Dai, Mingkai Ma, Shaoqing Xu. 118-122 [doi]
- Research of Electrical Product Production Planning for Mass CustomizationQinghe Hu, Shuang Zhang, Xingwei Wang. 123-125 [doi]
- Applying Data Fusion in Collaborative Alerts CorrelationXin Zhuang, Debao Xiao, Xuejiao Liu, Yugang Zhang. 124-127 [doi]
- Hierarchical Clustering of Large-Scale Short Conversations Based on Domain OntologyYongheng Wang, Bo Guo. 126-130 [doi]
- Application and Research of Numerical Integration in Cloth SimulationYan Jiang, Zhengdong Liu. 128-132 [doi]
- Construction of Remote Experiment Framework for MR Imaging TechniqueShengdong Nie, Yanhua Ren, Ying Liu, Wenwen Yu. 131-135 [doi]
- A New Approach of Extended Chirp Scaling Algorithm for High Squint Missile-Borne SAR Data ProcessingQiang Zhou, Changwen Qu, Feng Su, Ying Wang. 133-136 [doi]
- Generalized Canonical Correlation Analysis Using GSVDFu-Chang Liu, Quan-Sen Sun, Jian Zhang, De-Shen Xia. 136-141 [doi]
- A CT/MRI Image Fusion Algorthim Combined Non-separble Wavelet Transform and Regional PriorityLi-qun Gao, Wen-ge. 137-140 [doi]
- Superresolution Reconstruction of Multiframe Images Using Regularization with a Quadratic Form Observation ModelYajuan Wu, Minghui Wang, Xiaofeng Liu, Yi Zhan. 141-145 [doi]
- Design of Digital Educational Resource Platforms in UniversityChen Gang. 142-145 [doi]
- Single-ViewWei Zhang, Hui Wei. 146-150 [doi]
- An Algorithm of Coupling from the Past with Directional ThresholdLinfeng Shen, Haihui Wang, Shiyin Qin. 146-149 [doi]
- Teaching Information Resources Integration Based on Heterogeneous Data Exchange and Sharing of TechnologyDali Yin, Meiyu Jiang. 150-153 [doi]
- Research on Information Fusion on Evaluation of Driver FatigueJun Zhang, Zhong-xiang Zhu, Zheng-he Song, En-rong Mao. 151-155 [doi]
- The Related Techniques of Content-Based Image RetrievalXiaohong Yu, Jinhua Xu. 154-158 [doi]
- Sensor Scheduling for Target Tracking in a Wireless Sensor Network Using Modified Particle Swarm OptimizationMingyue Feng, Xianqing Yi, Guohui Li, Zhanshuai Du, Xiangneng Wang. 156-159 [doi]
- Visual Object Matching Based on Gradient ICA FeatureZhijun Pei, Huaxia Zhang. 159-162 [doi]
- Hiding Informationin in Java Class FileDaofu Gong, Fenlin Liu, Bin Lu, Ping Wang, Lan Ding. 160-164 [doi]
- Modeling Object-Oriented Framework with ZTiange Zhang, Xiaochun Xiao, Leqiu Qian. 165-170 [doi]
- Novel Stereo Matching Method on Multi-scale Harris Corner PointsTiesheng Fan, Bing Niu, Qingsong Wang, Tao Wang, Dapeng Qu. 167-170 [doi]
- Model of Network Traffic Based on Network Applications and Network UsersPeng Liu, Fang Liu, Zhenming Lei. 171-174 [doi]
- Uncertain Multi-attribute Decision Making Method Based on Fuzzy Ideal PointsDongjing Pan. 171-174 [doi]
- Development of Multi-video Based Virtual Classroom and Its Application in English as Second Language LearningRuimin Zhang, Bofeng Zhang, Jingchen Zhu, Huiting Huang. 175-179 [doi]
- Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerceHuaiqing Lin, Zhitang Li, Yejiang Zhang, Chuiwei Lu. 175-179 [doi]
- A Dynamic Adaptive Load Balance Algorithm in Parallel Intrusion Detection SystemJie-Fang Liu, Fang-Min Dong. 180-183 [doi]
- Analysis and Representation on Workshop-Oriented Domain OntologyChunjing Shi, Yongxian Liu, Yongping Hao. 180-185 [doi]
- An Efficient Concrete Bridge Disease Identification System Based on Sample DatabaseHuilin Liu. 184-188 [doi]
- Research and Simulation Analysis of Improved Dual-clocking Algorithm in EPONAihan Yin, Peizhou Zhang. 186-189 [doi]
- An Improved Genetic Algorithm for Vehicle Routing Problem with Time-WindowWenfeng Wang, Zuntong Wang, Fei Qiao. 189-194 [doi]
- The Design of a Low-Power Asynchronous DES Coprocessor for Sensor Network EncryptionYijun Liu, Pinghua Chen, Guobo Xie, Zhusong Liu, Zhenkun Li. 190-193 [doi]
- Chinese Sign Language Recognition for a Vision-Based Multi-features ClassifierYang Quan, Peng Jinye. 194-197 [doi]
- Efficient Supply Chain Adjustment Model with Demand Fluctuations in E-commerceMei Liu, Yonghong Wang, Ying Gao, Shijiu Yin. 195-198 [doi]
- Partial Relevance Feedback for 3D Model RetrievalBaokun Hu, Yusheng Liu, Shuming Gao, Jing Hu. 198-201 [doi]
- Error Estimation of Catmull-Clark Subdivision SurfacesXuejuan Chen. 199-202 [doi]
- A New Algorithm for Solving the Complex Nonlinear EcosystemYezhi Lin, Weiming Wang. 202-205 [doi]
- A Color Correction Algorithm of Multi-view Video Based on Depth SegmentationYue Fei, Mei Yu, Feng Shao, Gangyi Jiang. 206-209 [doi]
- Research on PolicyQi Shen, Maoguang Wang. 207-211 [doi]
- Specification of Agent in Complex Adaptive SystemChuanjun Ren, Hongbing Huang, Shiyao Jin. 210-216 [doi]
- Research on System Architecture of SOA-Based Network Teaching SystemZhou Xuan, Gao Ling. 212-215 [doi]
- Energy Efficient Data Transmission Mechanism in Wireless Sensor NetworksNa Xia, Mei Tang, Jian-guo Jiang, Dun Li, Hao-wei Qian. 216-219 [doi]
- A Text Digital Watermarking for Chinese Word DocumentJin An Liu, Lu He, Dingyi Fang, Xiaolin Gui. 217-220 [doi]
- Decision Support in Cancer Base on Fuzzy Adaptive PSO for Feedforward Neural Network TrainingLiman Zhang, Haiming Wang, Jinzhao Liang, Jianzhou Wang. 220-223 [doi]
- SIM-Array: A Flexible Storage System SimulatorXiao Zhang, Xiao-Nan Zhao, Jian-Quan Chen. 221-225 [doi]
- Class Loader Firmware on Java SoCHua-Ning Wang, Wei-Wei Dai, Hong-Zhou Tan, Zhi-Rui Chen. 224-227 [doi]
- The Platform of Quick Development of Mobile 3D GameJieyi Zhao, Min Tang, Ruofeng Tong, Jinxiang Dong. 226-229 [doi]
- Study and Application of Key Technologies of LAN Remote ControlAi-min Wang, Yu-xing Yang, Xiao Li. 228-231 [doi]
- 3D Surface Texture Synthesis Based on Wavelet TransformMuwei Jian, Shuan Liu, Junyu Dong. 230-233 [doi]
- Examination Certificate Based on Two-Dimensional Bar Code TechnologyChun-lei Xia. 232-234 [doi]
- A Novel Fingerprint Bifurcation Extraction Algorithm Based on Neural Network Template MatchingJianwei Leng, Jianyun Ni, Jing Luo. 234-237 [doi]
- Reconstructed System of CT Image Based on Contour TrackingX. M. Cheng, Z. Cui. 235-238 [doi]
- Combined Application of EMTDC and Simulink for Hybrid Simulation of IPSFeng Ji, Lijun Fu, Hongwei Zhu. 238-241 [doi]
- APR: A Trust Model Based on Perceived Risk for P2P E-commerce SystemJunfeng Tian, Qian Liu. 239-242 [doi]
- A New Controlled Commutation Strategies for Matrix ConverterLv Hao, Nie Ziling, Zhihao Ye. 242-245 [doi]
- Fast Mobile Target Tracking Based on Kalman Filter and MUSIC AlgorithmGuo Yan, Qian Zuping, Yao Zeqing, Li Ning. 243-246 [doi]
- A Genetic Algorithm for Solving RCPSPHua Zhang, Hao Xu, Wuliang Peng. 246-249 [doi]
- Feature Selection Based on Ant Colony Optimization and Rough Set TheoryMing He. 247-250 [doi]
- An ACO for Solving RCPSPLi Zhou, Dong Wang, Wuliang Peng. 250-253 [doi]
- Fitting Longitudinal Mixed Effects Logistic Models in S-PlusLichun Jiang, Yaoxiang Li. 251-254 [doi]
- A New Approach to Fast Multiple Reference Frame Motion Estimation for H.264Shufang Zhang, Yanling Wang, Jinhua Kang, Hua Li. 254-258 [doi]
- Winner Trace Marking in Self-Organizing Neural Network for ClassificationYonghui Wang, Yunhui Yan, Yanping Wu. 255-260 [doi]
- Research and Development of MFNS Software Based on Software EngineeringD. D. You, W. F. Li, M. Shao. 259-263 [doi]
- Use Ajax to Prevent Repeat Form SubmissionErmei Zhang, Chen Liu, Zhengqiu Yang. 261-264 [doi]
- Face Recognition Based on Local Feature AnalysisZhi-ming Qian, Peng-yu Su, Dan Xu. 264-267 [doi]
- Method of Chinese Grammar Rules Automatically Access Based on Mining Association RulesChao Tang, Chen Liu. 265-268 [doi]
- Research and Implementation of Signal Control Simulation for a Single Intersection Based on 3DS MAXWen-bo Wang. 268-271 [doi]
- The Inter-cluster Routing Algorithm of Clustering Data Collection Protocol in WSNsXin-lian Zhou, Xu Jian-bo. 269-272 [doi]
- Simulation of FlexRay Communication Using C LanguageChuanyan Xu, Yong Zhang. 272-276 [doi]
- Fractal Image Coding Based on Oriented Wavelet Sub-treeShan Jiang, Kai Shuang, Li Wei Sun. 273-276 [doi]
- An Adaptive Method of Car Plate Image Enhancement Based on a Simplified Pulse Coupled Neural NetworkCheng Wang, Shao-Fa Li. 277-279 [doi]
- Research on Handover in Hierarchical Mobile IPv6 Based on the Fast DAD Mechanism in Visual DomainZheming Li, Ling Li, Yulan Huang. 277-280 [doi]
- A Novel Visual Programming Method Designed for Error Rate ReductionXiajiong Shen, Ge Wang, Jun Gu, Xinfa Dong. 280-283 [doi]
- The Dimensionality Reduction of Feature Vectors by Generalized Cross ProductJinwen Wei, Yanling Chen, Junjie Guo. 281-284 [doi]
- An Image Retrieval Method Based on Spatial Features of ColorsHaishan Chen, Xuan Han, Bochao Hu. 284-287 [doi]
- Research on Organizational-Level Software Process Improvement Model and Its ImplementationXiaoguang Yan, Xiaogang Wang, Linpin Luo, Zhuoning Chen. 285-289 [doi]
- Study on Neural Network of Circuit Failure Diagnosis SystemChenghui Yang, Jianjun Meng, Wenzhe Qi. 288-291 [doi]
- A Simple Global Calibration Method Based on 1D Target for Multi-binocular Vision SensorHong Lei, Zhenzhong Wei, Guangjun Zhang. 290-294 [doi]
- An Electronic Voting Scheme Based on Secure Multi-party ComputationCao Gang. 292-294 [doi]
- Study on Subcarrier and Power Allocation Algorithm for Downlink Transmission in Multiuser OFDM SystemSuo-ping Li, Xiu-feng Tian, Min Li. 295-298 [doi]
- Smart-Phone Based Server-Aided ComputationTianjie Cao, Tao He, Qihan Luo. 295-298 [doi]
- Boundary Extraction of Tube-Type Bottle Based on Wavelet Restoration and Mathematical MorphologyChanghua Lu, Xiaokang Deng, Neng Fu, Chun Liu. 299-302 [doi]
- A MAC Protocol Based on S-MAC for Power Asymmetric WSN NetworkYun Li, Hao Jia, Zhanjun Liu, Zhi Ren, Guo-jun Li. 299-302 [doi]
- Granularity-Wise Separations in Covering Approximation Spaces with Some Approximation OperatorsXun Ge. 303-306 [doi]
- Energy-Efficient Dynamic Clustering Algorithm in Wireless Sensor NetworksMing Zhang, Chenglong Gong. 303-306 [doi]
- Stabilization Control of Networked Control Systems with Long Time DelayQixin Zhu, Hongli Liu, Juan Jiang, Yanping Wang. 307-310 [doi]
- Layered Secure Access Research for Space NetworkYanbin Qian, Xingyuan Chen, Xuehui Du, Hongqi Zhang. 307-311 [doi]
- Research and Implementation of a Reverse Engineering Method for Software ReuseLan Wang, Anquan Jie. 311-314 [doi]
- Algorithm Research of Face Image Gender Classification Based on 2-D Gabor Wavelet Transform and SVMChuanxu Wang, Yun Liu, Zuo-yong Li. 312-315 [doi]
- Scene Text Extraction Based on HSLJin-liang Yao, Yibo Gao, Liangjun Ma, Yiping Yang. 315-319 [doi]
- Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain FactorsYong Guan, Zhong-fu Tan, Mian-bin Wang, Xiao-jun Li. 316-320 [doi]
- NGOSS-centric Framework of Telecommunication Electronic CommerceTung-Hsiang Chou, Yu-Min Lee. 320-323 [doi]
- Modeling and Formal Analysis of RealChen Shu, Wu Guo Qing. 321-324 [doi]
- Visualization Study of fKdV Equation Simulation with MatlabZhengren Wu, Mei Liu, Songling Wang, Youliang Cheng. 324-326 [doi]
- Monitoring and Early-Warning of the Supply Chain by Using System Dynamics and Neural NetworksRuoyu Fei, Dong Wang. 325-329 [doi]
- Infrared Facial Expression Recognition Using Wavelet TransformShangfei Wang, Siliang Lv, Xufa Wang. 327-330 [doi]
- The Combination of SSE and Tensor Voting for Salient Points Detection in Natural ImagesYihang Bo, Siwei Luo, Qi Zou, Jie Lin. 330-334 [doi]
- Fuzzy Conceptual Information Modeling in UML Data ModelZ. M. Ma. 331-334 [doi]
- A Framework of Game-Based Electronic MarketplaceJun Hu, Chun Guan. 335-338 [doi]
- Shifting from a Computer Game to a Physical Game: A Case Study of ePetWeihua Tan, Wenjun Li, Xiaocong Zhou, Xiao-bin Zhang. 335-338 [doi]
- A Unifying Approach to Determine the Blocking Probability for Four Models in the Multicast Three-Stage Clos NetworkFan Yu, Nai-jie Gu, Yan-Jun Liu. 339-342 [doi]
- Red Blood Cell Classification through Depth Map and Surface FeatureRuihu Wang, Brendan McCane. 339-342 [doi]
- Application of Data Mining in Psychological EvaluationHengqing Tong, Li Guo. 343-346 [doi]
- An Integrated Approach for DiffServ MulticastingQian Gao. 343-347 [doi]
- A New Lossless Compression Algorithm for Vector MapsYun Ling, Chen-yi Qian, Xun Wang. 347-351 [doi]
- Research on E-HUB-Based Manufacturing Resources Integration for SMEsBin Wang, Defang Liu, Ning Zhou, Linzhen Zhou. 352-355 [doi]
- An Improved PSO Algorithm and its Application to Grid Scheduling ProblemYan-ping Bu, Wei Zhou, Jin-shou Yu. 352-355 [doi]
- Research on Product Configuration Model and Expression of ConstraintsJiehui Zou, Qungui Du, Bingkang Huang. 356-359 [doi]
- The Research and Application of Apla-Java Reusable ComponentsAnquan Jie, Lan Wan, Zhizhang Hua, Jinyun Xue. 356-359 [doi]
- A Specific Target Track Method Based on SVM and AdaBoostHua-jun Song, Mei-li Shen. 360-363 [doi]
- A Web Geographical Information System Applied to Radio Station Information ManagementSu Li, Zhongming Han, Wenzheng Li, Runhe Shi. 360-363 [doi]
- M-commerce Security Solution Based on the 3rd Generation Mobile CommunicationTiejun Pan, Leina Zheng, Chengbin Fang, Wenji Huang, Leilei Fang. 364-367 [doi]
- Parallelized Network Coding with SIMD Instruction SetsLi Han, Huan-yan Qian. 364-369 [doi]
- Some Characterizations of Wavelets with Composite DilationsGuochang Wu, Yadong Zhang. 368-371 [doi]
- A Formal Method Support for Resource Modeling of Web Services CompositionYi Zhu, Zhiqiu Huang, Hang Zhou. 370-375 [doi]
- A Fuzzy Connectedness Segmentation of Image Sequences Based on 3D Seed Points SelectionChen Yanda, Bao Susu, Peng Fengping. 372-375 [doi]
- Comparative Investigation of BP and RBF Neural Network on Identifying Reliability of Communication NetworksBin Song, Zhenghong Peng. 376-379 [doi]
- Adding Extension Models to Government Business ModelTianying Chen, Bosheng Zhou, Shaomin Xing, Yong Yang. 376-379 [doi]
- Design and Implementation of XML-based GUI for Cross Platform Backup SystemHuajun Chen, Zhi Zheng. 380-382 [doi]
- Macro-Model of Cell-Based Logic Block for Power Ground Network AnalysisZexiang Liu, Lan Chen, XuBang Shen. 380-383 [doi]
- AWright-ADL for Aspectual Component Composition PlatformBin Wang, Chunyan Wen, Wei Zhu, Jinfang Sheng. 383-386 [doi]
- A Bidirectional Chord System Based on Base-k Finger TableHuayun Yan, Yunliang Jiang, Xinmin Zhou. 384-388 [doi]
- Event-Driven Model for Manufacturing Execution System PlatformWenli Shang, Bin Duan, Haibo Shi. 387-390 [doi]
- Damage Identification Methods for Stiffness Mutation Position of Tower Structure Based on Dynamic Response Information TruncationBaifeng Gao, Huijian Li, Yanxia Li. 389-393 [doi]
- The Robust Likelihood Model of State Measurement and Its Applications in Articulated Object TrackingZhiquan Feng, Yanwei Zheng, Ling Zhang, Bo Yang, Jingxiang Zhang. 391-396 [doi]
- A CS Grammar Based Query Form Information Extraction MethodFujiang Liu, Shichun Deng, Nianbin Wang, Xinping Li. 394-398 [doi]
- A UML-Based Approach to Testing Web ApplicationsLiPing Li, Huaikou Miao, Zhong-sheng Qian. 397-401 [doi]
- A Logic to Model Time in Cryptographic ProtocolsXinfeng Lei, Jun Liu, Junmo Xiao. 399-403 [doi]
- H Infinity Network-Servo Tracking ControlZhou Gu, DaoBo Wang. 402-405 [doi]
- A Dynamic Load Balancing Method Based on Stability AnalysisQingyang Meng, Jianzhong Qiao, Jun Liu, Shukuan Lin. 404-408 [doi]
- An Improved Tikhonov Regularization Method for Conductivity Tomography ImagingBaobin Feng, Wenjuan Wang, Junxing Cao. 406-409 [doi]
- Research and Development of Simulation System for Virtual GrindingChong Su, Lida Zhu, Junming Hou, Wanshan Wang. 409-412 [doi]
- A LDAP Directory Server Model of Workflow Management SystemsZhiyi Wang, Zeng Wang, Yifan Yang. 410-413 [doi]
- Multilayer Physical Model of Eyeball with Application to Simulation of IOP IncreaseYing Ju, Hao Yang, Boliang Wang, Jiezhen Xie. 413-416 [doi]
- Analyze and Understand the Layout Characteristics of Ballot ImageGang Xiao, Jun-qiang Shen, Jiu Jun Chen, Fei Gao. 414-417 [doi]
- IT Project Change ManagementEnzhao Hu, Yang Liu. 417-420 [doi]
- Distributed Hot Spots Caching Mechanism for Queries with Popular DistributionJianyong Chen, Haijian Long, Leijuan Liang. 418-421 [doi]
- Logistics Development in the Yangtze River Delta Area in ChinaChangbing Jiang, Shanshan Wang, Linghu Li. 421-425 [doi]
- Research Framework on Enterprise Common Information Model Oriented Network CooperationRanzhe Jing. 422-426 [doi]
- Study on Working Vacation Polling System for WDM with PH Distribution Service TimeHaiyan Chen, Fengwen Wang, Naishuo Tian, Jingliang Qian. 426-429 [doi]
- An Optimal Equitable Matching Algorithm and ModelingDan Chen, Yong Yuxue. 427-430 [doi]
- The Bayesian Analysis of Reliability of Electrical ProductsShao-hua Jin, Jian-guo Lu, Yan-ping Wan, Shu-guang Sun. 430-433 [doi]
- Modeling Aspect-Oriented Extension Software ArchitectureFurong Li, Wei Sun, Zhigang Jia. 431-434 [doi]
- Dynamic Policy Based Network Management Scheme in Mobile EnvironmentXue-jie Liu, Yanheng Liu, Da Wei, Hu-ying Liu. 434-437 [doi]
- Financial Performance Analysis of E-collaboration Supply Chain under Transportation DisruptionsTianjian Yang. 435-439 [doi]
- The Heterogeneous Data Integration Based on XML in Coal EnterpriseFeng Tian, Xiao-bing Han, Feng-bo Wu. 438-441 [doi]
- Edge Mapping: A New Motion Estimation Method for Video StabilizationLingqiao Liu, Zhizhong Fu, Jingjing Xie, Wei Qian. 440-444 [doi]
- Research on the Composite Arithmetic of Logic Compound Sentences in DecompilationLongjie Zhang, Xiao-fang Xie, Shengzhi Yuan, Jiang Tang. 442-446 [doi]
- Organization Application Oriented Software Process Measurement ModelXiaodong Guo, Li Meng. 445-449 [doi]
- Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing SchemeYanshuo Zhang, Zhuojun Liu, Guifang Huang. 447-450 [doi]
- Towards Formalizing UML Activity Diagrams in CSPDong Xu, Nduwimfura Philbert, Zongtian Liu, Wei Liu. 450-453 [doi]
- Polymorphic Algorithm of JavaScript Code ProtectionJiancheng Qin, Zhongying Bai, Yuan Bai. 451-454 [doi]
- An Improved Fingerprint Singular Point Detection Algorithm Based on Continuous Orientation FieldTing Tang, Xiaopei Wu, Ming Xiang. 454-457 [doi]
- Teaching Quality Evaluation Based on Grey RelationTie Wang, Jianyang Lin, Dan Li, Chen Gao. 455-458 [doi]
- Using Fuzzy Wavelet Neural Network to Solve MCDM ProblemWei Zhang, Jinfu Zhu. 458-461 [doi]
- Design of Pork Traceability Information SystemYangqing Zhu, Lianming Zeng, Hua Li, Hui Yu. 459-462 [doi]
- A Computation Method for the Value of Globe Trust Based on MAX-MIN Ant SystemLei Cui, Xian-Zhong Xie. 462-465 [doi]
- Explaining the Implicit Parallelism of Genetic Algorithm and Computational Complexity by Quantum TheoryWang Peng. 463-466 [doi]
- Accelerating Fractal Image Encoding Based on Gray Value Moment Features of Normalized BlockGaoping Li. 466-470 [doi]
- A Uniform Negotiation and Delivery Framework for TCP-Based Data Collaboration ApplicationsWei Zhang, Weimin Lei, Xiuwu Zhang. 467-471 [doi]
- Analysis and Simulation Protocols Based on Slotted ALOHA for Plastic Optical Fiber NetworkNing Zhang, Ronghua Liu. 471-475 [doi]
- An Incremental Query Algorithm for Optimal Path Queries under Traffic JamsXiaoyu Song, Lanyang Yu, Huanliang Sun. 472-475 [doi]
- Research on Noise Detection Based on Improved Gradient FunctionXiaosheng Liu, Zhihui Chen. 476-479 [doi]
- A Fast Enumeration Algorithm for Attribute Reduction Based on GroupingXiao Wei, Ning Xu. 476-479 [doi]
- CGSP-DAILi Li, Wanbing Shi, Jiazao Lin, Lei Jiang, Lian Li. 480-484 [doi]
- A Study on Cgi of Embedded WebserverZhenxing Wang, Xianyi Ren. 480-483 [doi]
- Growth Characteristics of Calcium Silicides Films from the Deposited Ca Films at the Different Sputtering Ar PressureYinye Yang, Quan Xie. 484-487 [doi]
- Search of Fast Mode Selection Algorithm Based on Macroblock-AdaptiveWei-xing Zhu, Ri-xia Wnag, Xin-cheng Li. 485-488 [doi]
- An Automated Test Tool of Web Application Based on StrutsJianyi Niu, Zhengqiu Yang. 488-490 [doi]
- A Novel Video Searching Model Based on Ontology Inference and Multimodal Information FusionJing Zhang. 489-492 [doi]
- Research on Routing Protocol of Wireless Ad Hoc Network Based on Wearable ComputersYan Gao, Danyan Luo, Decheng Zuo, Xiaozong Yang. 491-494 [doi]
- An Improved FCM Algorithm Incorporating Spatial Information for Image SegmentationBin Li, Wufan Chen, Dandan Wang. 493-495 [doi]
- Distributed Spatial Data Mining Based on BPEL-Service-ChainsYong Wang, Ting Wang. 495-498 [doi]
- Analysis and Design for Nonlinear Networked Control Systems with Interval Time-Varying DelayHongyan Chu, Dong Yue. 496-499 [doi]
- Numerical Simulation of Water-Filling Process in Long-Distance Diversion Tunnel with Free FlowXiaoling Wang, Chenchen Wang, Juan An, Tao Li. 499-503 [doi]
- MIS Implementing Approaches Choose Based on Analytic Hierarchy ProcessXinming Hu, Huosong Xia. 500-504 [doi]
- Research and Development of the Key Technologies for Distributed Test FrameworkHui Jie, Yuqing Lan, Like Ma, Shouyuan Tang. 504-507 [doi]
- A Novel Algorithm for Background Updating and Target TrackingHui-Zhong Zhuang, Han Li. 505-508 [doi]
- TC: The Transmission Control Strategy for Restricted Floating Sensor NetworkXiaodong Liu, Yuan Feng, Zhongwen Guo. 508-511 [doi]
- An Axiomatic Characterization of Fuzzy Formal Contexts Based on T-implication OperatorsXiaoxue Song, Wen-Xiu Zhang. 509-512 [doi]
- Content-Oriented Automatic Text Categorization with the Cognitive Situation ModelsYi Guo, Zhiqing Shao, Nan Hua. 512-516 [doi]
- Fuzzy Integrated Evaluation of E-commerce Information SystemJiangao Deng, Min Wang. 513-516 [doi]
- Effects of Stirrer on the Field Uniformity at Low Frequency in a Reverberation Chamber and its SimulationXiaoqiang Liu, Guanghui Wei, Yongqiang Zhang, Chenghuai Zhang. 517-519 [doi]
- Hardware Threat: The Challenge of Information SecurityQingBao Li, Hongbo Gao, Bing Xu, Zhiyong Jiao. 517-520 [doi]
- The Deployment Method and Movement Control Strategy in Mobile Wireless Sensor NetworksChuyu Xiao, Ya-li Peng, Min Yu. 520-523 [doi]
- Noise Undressing and Information Identifying of the Financial Correlation MatrixJianqiang Sun. 521-524 [doi]
- Research on Data Fusion Algorithm in ZigBee ProtocolPing Wang, Ming-Chuan Cheng, Wen-Zao Shi. 524-527 [doi]
- An Anomaly Intrusion Detection Algorithm Based on Minimal Diversity Semi-supervised ClusteringJuan Wang, Ke Zhang, Da-sen Ren. 525-528 [doi]
- Influencing Factors with Respect to Basic Essence in National Defence for Chinese University StudentsYanlong Cheng, Ying Ge. 528-531 [doi]
- S^2AN-WBN: An Innovative Hybrid P2P Location NetworkLei Gao, Guangzhou Zeng. 529-535 [doi]
- White Blood Cell Detection Using a Novel Fuzzy Morphological Shared-Weight Neural NetworkCheng Ke. 532-535 [doi]
- Simultaneous Image Denoising and Curve Extraction by Tensor VotingXiao-fang Shao, Ling-wei Ye, Ming-juan Cai, Yong Wang. 536-538 [doi]
- Termination of Nested LoopBin Wu, Zhongqin Bi. 536-539 [doi]
- Performance Comparison between Color and Spatial Segmentation for Image Retrieval and Its Parallel System ImplementationPengdong Gao, Yongquan Lu, Chu Qiu, Nan Li, Wenhua Yu, Rui Lv. 539-543 [doi]
- A Secure and Efficient Group Key Agreement for Ad Hoc NetworksTao Feng, Yilin Wang, Jianfeng Ma. 540-543 [doi]
- Slot Time Synchronization for TDMA-Based Ad Hoc NetworksFuqiang Wang, Peng Zeng, Haibin Yu. 544-548 [doi]
- Signals Transform Circuit Based on Flexibility Technology and Its Hardware ImplementationYi Wang, Xing-hua Fu. 544-546 [doi]
- Research on Simulation and Evaluation of Production Running in Digital Factory EnvironmentTing Yang, Dinghua Zhang, Bing Chen, Shan Li. 547-550 [doi]
- Conditional Markov Network Hybrid Classifiers Using on Client Credit ScoringShuangcheng Wang, Cuiping Leng, Piqiang Zhang. 549-553 [doi]
- DTrace the Solaris Doors in Inter-process CommunicationWeizhen Sun, Jia Geng. 551-553 [doi]
- A 3D Reconstruction System of Indoor Scenes with Rotating PlatformFeng Zhang, Limin Shi, Zhenhui Xu, Zhanyi Hu. 554-558 [doi]
- Research on Path Completion Technique in Web Usage MiningYan Li, Boqin Feng, Qinjiao Mao. 554-559 [doi]
- Large Scale Scenes Reconstruction from Multiple ViewsLimin Shi, Feng Zhang, Zhenhui Xu, Zhanyi Hu. 559-563 [doi]
- 3D Evaluation and Analysis of Landslide Instability Mechanism of Reservoir Banks: A Case Study in the Three Gorges ReservoirMingchao Li, Zhongyao Wang, Jie Liu. 560-563 [doi]
- Application-Adaptive Model Evaluation in E-government Spatial Information ServiceYong Wang, Na Zhou, Ji-ping Liu. 564-568 [doi]
- Optimization Processing in Quadrilateral Meshes Generation Based on Cloud DataLijuan Wu. 564-567 [doi]
- A Study on the One-Time Pad Scheme Based Stern-Brocot TreeHongqiang Jiao, Junfeng Tian, Baomin Wang. 568-571 [doi]
- An Algorithm for License Plate Recognition Using Radial Basis Function Neural NetworkBo Li, Zhi-yuan Zeng, Jian-zhong Zhou, Hua-li Dong. 569-572 [doi]
- Cracking Cancelable Fingerprint Template of RathaQuan Feng, Fei Su, Anni Cai, Feifei Zhao. 572-575 [doi]
- A Statistical Information Reconstruction Method of Images Based on Multiple-Point Geostatistics Integrating Soft Data with Hard DataTing Zhang, Detang Lu, Daolun Li. 573-578 [doi]
- The Research and Implementation Research of Mobile Agent Technology in Commercial Data Query SystemYouqun Shi, Zhongwei Rong. 576-581 [doi]
- Design and Implementation of a P2P-Based Media Streaming SystemKun Sun, Bin Sun, Yuan Bai. 579-582 [doi]
- Image Rectification Using Affine Epipolar Geometric ConstraintLiansheng Sui, Jiulong Zhang, Duwu Cui. 582-588 [doi]
- An Image Based Classification Method for CataractHualei Shen, Hongwei Hao, Lihong Wei, Zhibin Wang. 583-586 [doi]
- Research on the Acquisition Terminal for Intelligent InstrumentYanping Gao, Feng Tan, Xinlian Zhang. 587-590 [doi]
- Data Stream Grouping Aggregate Algorithms Based on Compound Sliding WindowYingli Zhong, Jinbao Li, Longjiang Guo, Yan Yang. 589-593 [doi]
- The Refresh Efficiency on Difference Processor Cache ArchitectureZheng Liu, Weizhen Sun. 591-593 [doi]
- Identification of Severe Precipitation Radar Echo Reflectivity with Back-Propagation ANNJing Wang, Yuchun Gao, Yi Xiong, Minghu Cheng, Shuai Zhu. 594-597 [doi]
- An Improved Algorithm of Adaptive Fuzzy Image EnhancementDawei Chen, Ying Qian. 594-598 [doi]
- SAR Image Segmentation Method Using DP Mixture ModelsLi Sun, Yanning Zhang, Guangjian Tian, Miao Ma. 598-601 [doi]
- Research on the Algorithm of Decrypting Encrypted Synchronous Sequential MachineGuangYu Zeng, Min Fan, QingBao Li, Li Zhou. 599-602 [doi]
- Multi-view Object Segmentation Based on Epipolar Plane Image AnalysisLiangzhong Fan, Xin Yu, Zhenyu Shu, Qiaowen Zhang. 602-605 [doi]
- A Kind of Active Fortify Method of Moving Object DetectionYing Lin, Yang Fu, Yan-hong Sun, Yue-heng Sun. 603-607 [doi]
- A Storage Algorithm of Code Parameters in Embedded System Based on Dynamic ProgrammingNa Xu, Xiaotong Zhang, Yan Zhang, Lingling Yuan, Lei Zhang, Guolin Hu. 606-609 [doi]
- Ajax Applied in Environment Monitoring System Based on WSNWei Han, Kang-ling Fang, Xiao-hui Li, Liang Zhang. 608-611 [doi]
- Training Samples Selection Method in Intrusion Detection SystemShuyan Cao, Li Zhang. 610-612 [doi]
- A Novel Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack by ACKSilei Lei, Rui Zhang, Jun Liu, Junmo Xiao. 612-616 [doi]
- Global Mild Solution for a Chemotaxis-Haptotaxis Model of Tumor InvasionMingjun Wang, Minghao Li. 613-616 [doi]
- A New Scheme of Image Retrieval Based Upon Digital WatermarkingJindong Xu, Wen-hua Qin, Meng-ying Ni. 617-620 [doi]
- Image Auto Coregistration and Interferogram Estimation Using Matrix FittingSen Zhang, Jinsong Tang, San-wen Zhu. 617-621 [doi]
- Wetrp: A Platform for Recording of Windows Program Execution TracesXiaobing Xiong, Hui Shu, Jianmin Chen, Yongjun He. 621-625 [doi]
- A Unified Scheme for Fast EZW Coding AlgorithmMinghe Huang, Cuixiang Zhong. 622-626 [doi]
- The Design and Implementation of Crossbar in SMP Symmetrical Multi-processor SystemQingBao Li, XiaoPeng Niu, GuangYu Zeng. 626-629 [doi]
- A Novel Method for Qualitative Modeling and Simulation Based on XMLChenxi Shao, Pengfei Chen, Lizhong Wang, Fangfang Liu. 627-631 [doi]
- A Delivery Tree Building Approach for Application Layer MulticastXinchang Zhang, Xiaodong Li, Zheng Wang, Baoping Yan. 630-634 [doi]
- Active Authorization Rules for Enforcing RBAC with Spatial CharacteristicsZhu Tang, Shiguang Ju, Weihe Chen. 632-636 [doi]
- Crack Fault Diagnosis Based on MEP Based Neural NetworkMingjun Liu, Liming Xiu, Guangfeng Jia, Yuehui Chen. 635-639 [doi]
- A New Dynamic Network Monitoring Based on IAFang Wu, Zhijin Zhao, Xueyi Ye. 637-640 [doi]
- An Efficient R-G-B Algorithm for Web Crawler on Information ExtractionHuiye Sun, Yaoguo Li, Shan Lin, Mingying Zhu. 640-643 [doi]
- A Novel Timing Synchronization Method for SC-FDE SystemsLi-xun Huang, Li-jun Sun. 641-643 [doi]
- Mining Correlated Policy Rules with Concept LatticeSuyun Jiao, Yanheng Liu, Xuejie Liu, Da Wei, Hai-yan Hu. 644-647 [doi]
- An Optimized Chord Algorithm for Accelerating the Query of Hot ResourcesJiajing Li, Xudong Yang. 644-647 [doi]
- System for Performing Resource Management and Control and Task Scheduling in Grid ComputingYu-tao Fan, Sheng-chen Yu, Yang Xue. 648-651 [doi]
- An Algorithm of Offsetting Complex Region Based on AutoCADFei Gao. 648-651 [doi]
- Promoting Adaptation of Semantic Web Service Composition Using Context InformationLirong Qiu, Yongcun Cao, Xiaobing Zhao, GuoSheng Yang. 652-656 [doi]
- Implementation of Simulation Platform for Craniofacial Surgery Based on COMXu Min, Wang Yu, Yi-qun Cui, Wen-yu Li, Fang Gu. 652-657 [doi]
- A New Face Tracking Algorithm Based on Local Binary Pattern and Skin Color InformationChuanxu Wang, Zuo-yong Li. 657-660 [doi]
- Simulation and Analysis of MFlood Protocol in Wireless NetworkRuncai Huang, Yiwen Zhuang, Qiying Cao. 658-662 [doi]
- A New Kind of Super-Resolution Reconstruction Algorithm Based on the ICM and the B-spline InterpolationXiang-guang Zhang. 661-664 [doi]
- Missile Aim-Point Choice Based on Analytic Hierarchy ProcessMin Zhu, Haiyan Li. 663-666 [doi]
- An Improved Algorithm of Human Skin Detection in Video Image Based on Linear Combination of 2-order Markov and Wiener PredictorYun Liu, Chuanxu Wang. 665-668 [doi]
- On Generating Self-Similar Network Traffic Using Multi-core ProcessorsShuo Zhang, Rongcai Zhao, Ke An. 667-672 [doi]
- A Layered Service Registry Model in Government Information Resource Governance and InterchangeJun Liu, Jianzhong Qiao, Shukuan Lin, Su Ge. 669-673 [doi]
- Research on Fuzzy Evaluation Method of E-business Website Based on Rough SetJun Ma, Huiling Shi, Fengyi Zou. 673-676 [doi]
- AHP Methodology for Partner Selection in Collaborative DesignJunming Hou, Chong Su, Wanshan Wang. 674-677 [doi]
- An Adaptive Watermark Scheme Based on Contourlet TransformWei Feng, Ming Tong, Hong Bing Ji. 677-681 [doi]
- Eucommia Bark Quality Assessment Based on Rough Sets and PerceptronTie Wang, Zhiguang Chen, Gaonan Wang, Jianyang Lin. 678-681 [doi]
- Energy Analysis Method of Computational ComplexityWang Peng. 682-685 [doi]
- Paradox Stems from the Security Model or the Security Proof?Qiong Pu, Jianmin Ding. 682-685 [doi]
- A Mini Arc Recognition Algorithm Based on the Topological InferenceXiaoyu Song, Bin He, Yonghui Wang. 686-689 [doi]
- The W-Model for Testing Software Product LinesJin-hua Li, Qiong Li, Jing Li. 690-693 [doi]
- Stereo Matching Based on Local Invariant Region IdentificationQian Hu, Zhengqiu Yang. 690-693 [doi]
- The Research and Design of Log Management System Based on Struts FrameYue Tian, Xiaobin Li, Zhengqiu Yang. 694-697 [doi]
- Secure Design of RFID Tags in the New Type License Plates Automatic Identification SystemZhiguo Zhou, Wenyin Li, Chunyan Deng, Tong Li, Yanwen Li. 694-697 [doi]
- The Experimental Research on the Method of Integrating AHP with GISJi-ping Liu, Na Zhou, Yong Wang. 698-702 [doi]
- New Well Design of Hydrological Network Information System Based on GISSong Mei. 698-701 [doi]
- To Play with a Computer SystemYingjie Li, Cuihua Wang. 702-704 [doi]
- Memory Leak Detection in Sun Solaris OSQinqin Ni, Weizhen Sun, Sen Ma. 703-707 [doi]
- A Multipath Forwarding Algorithm Based-On Predictive Path Loss Rate for Real-Time ApplicationCai Ling, Jinkuan Wang, Cuirong Wang. 705-708 [doi]
- Research on Edge Detection and Description of Packaged Grain ImageYing Lin, Xing-lin Fang, Yue-heng Sun, Yan-hong Sun. 708-711 [doi]
- Phased Waking Coverage Scheme Based on Hibernation of Redundant Nodes for Wireless Sensor NetworksChen Feng, Jiang Peng, He Qing. 709-713 [doi]
- Study for Packaged Granary Grain Quantity Intelligent ReckoningYing Lin, Yong Liu, Yueheng Sun. 712-715 [doi]
- Wavelet Difference Reduction Coding with Edge Detection and TrackingXu Yan, Fuhai Li, Dong Cheng, Guilin Wen. 714-718 [doi]
- Adaptive Filter by Using Segment Proportionate Extended Correlation LMS Algorithm in the Double-Talk ConditionRui Chen, Zhifeng E, Jiawen Hu, Mohammad Reza Asharif. 716-719 [doi]
- Human Face Feature Extraction and Recognition Base on SIFTYanbin Han, Jianqin Yin, Jinping Li. 719-722 [doi]
- A Dynamic Clustering-Based Algorithm for Wireless Sensor NetworksLimin Meng, Kai Zhou, Jingyu Hua, Zhijiang Xu. 720-723 [doi]
- An Isophote-Oriented Image Interpolation MethodYi Zhan, Minghui Wang, Meng Li. 723-726 [doi]
- A Reliable Distributed Process Management SystemLei Zhang, Xingshu Chen, Bo Xu. 724-728 [doi]
- A New Effective Collaborative Filtering Algorithm Based on User s Interest PartitionKeqin He, Liang He, Weiwei Xia. 727-731 [doi]
- Chinese Partial Parsing with Modal Finite-State ApproachYiqiang Zhao, Junfang Zeng, Yiping Yang. 729-733 [doi]
- Balancing and Sequencing Optimization of the Mixed Model Assembly LinesZhenxin Cao, Shiping Ma. 732-736 [doi]
- Resemblance Object-Class Relationships in Fuzzy Object-Oriented DatabasesZ. M. Ma. 734-737 [doi]
- A Survey of Location Based Service for Galileo SystemJun-jie Peng. 737-741 [doi]
- Towards a Framework of Aspect-Oriented Modeling with UMLXiao-cong Zhou, Chang Liu, Yan-tao Niu, Tai-zong Lai. 738-741 [doi]
- Research and Implementation of Screen Printing System Based on Hybrid CMPQing Cheng Li, Liu Yang, Zheng Xuan Bai, Hai Jun Hu. 742-745 [doi]
- Localization Using GASA for Wireless Sensor NetworksYifang Tang, Meiling Sun. 742-746 [doi]
- Research on ASP-Based Information Security SystemLinzhen Zhou, Defang Liu, Bin Wang. 746-749 [doi]
- Object-Oriented Raster-Based Data Model for Urban Growth Simulation SystemZijun Wang, Shengbo Chen, Lingjun Zhao. 747-751 [doi]
- A Formal Description Method for Aspect-Oriented Statechart Based on CSPBin Wang, Chunhua Zhu, Jinfang Sheng. 750-753 [doi]
- Speckle Reduction of Polarimetric SAR Image Based on ICA-SCS AlgorithmHongyan Chen, Shang Ma, Yuancheng Yao. 752-755 [doi]
- Research on Key Technique of Weed Locating Based on Binocular Vision SystemWei-xing Zhu, Li-bing Xia, Feng Xiong. 754-757 [doi]
- Construct Information Flow Graph Based on PDGJian Zeng, Shiguang Ju, Xiangmei Song. 756-759 [doi]
- Hand's Skin Detection Based on Ellipse ClusteringHaokui Tang, Zhiquan Feng. 758-761 [doi]
- Synchronous Multi-splitting and Schwarz Methods for Solving Linear Complementarity ProblemsGuangbin Wang, Hao Wen, Fuping Tan. 760-762 [doi]
- Research on Features Extraction from Frame Image SequencesZhiquan Feng, Peilin Du, Xiaona Song, Zhengxiang Chen, Ting Xu, Deliang Zhu. 762-766 [doi]
- A New Security Mechanism Based on SIP in Wireless LAN-3G IntegrationHui Lin, Li Xu, Xiaoding Wang. 763-767 [doi]
- Molecular Dynamics Study of Streptavidin Binding to Surface-Immobilized BiotinQingbin Li, Sergey Gusarov, Andriy Kovalenko. 767-770 [doi]
- The Process Management and Quality Control of Graduation DesignShumin Zhou, Aihua Liu, Jianghui Fu. 768-770 [doi]
- A New Mechanism Supporting QoS and Mobility in SUPANETYu Gao, Huaxin Zeng. 771-776 [doi]
- Deviation Problem and its SolvingXin Wang, Hui-tong Jia, Yu-lian Ma, Yu-dong Wang. 771-776 [doi]
- Using Data Recovery Models for Multi-shift Scheduling in Wireless Sensor NetworksXu Xu, Yu Hen Hu, Wei Liu, Jingping Bi. 777-782 [doi]
- Design and Implementation of Generalized R-TreeHui Li, Shiguang Ju, Weihe Chen. 777-781 [doi]
- An Attack Scenario Based Approach for Software Security Testing at Design StageKe He, Zhiyong Feng, Xiaohong Li. 782-787 [doi]
- An Octree Ray Casting Algorithm Based on Multi-core CPUsGu Jing, Wei Song. 783-787 [doi]
- Pseudo Noise Code Acquisition Using Fast Fourier TransformPing Huang, Bing-fa Zu, Hui Wang. 788-792 [doi]
- Study on a Real-Time Image Object Tracking SystemQiang Wang, Zhanhong Gao. 788-791 [doi]
- The Evaluation of B2C E-Commerce Web Sites Based on Fuzzy AHPJun Fei, Lihua Yu. 792-795 [doi]
- A New Modulation Identification Scheme for OFDM in Multipath Rayleigh Fading ChannelJingjing Zhang, Bingbing Li. 793-796 [doi]
- Design and Implementation of a Power System Sensor Network for Wide-Area MeasurementQi Huang, Shi Jing, Chang-hua Zhang, Yong Chen. 796-799 [doi]
- General Automatic Learning Mail Filtering SystemRenbo Pang, Li Zhang, Wei Zhang. 797-801 [doi]
- Application of Mobile Agent and Trusted Third Party on Digital Copyright Protecting in E-commerceFu-Cheng You. 800-804 [doi]
- Website Structure Optimization Technology Based on Customer Interest Clustering AlgorithmShutong Cheng, Congfu Xu, Hongwei Dan. 802-804 [doi]
- A Transmission Scheme for Encrypted Speech over GSM NetworkYucun Yang, Suili Feng, Wu Ye, Xinsheng Ji. 805-808 [doi]
- Real-Time Image Geometric Rectification for Scene Matching Based on Aircraft AttitudeXiaogang Yang, Fei Meng, Liyong Hu, Junshan Li. 805-808 [doi]
- Description of PDE Models in ModelicaZhihua Li, Huili Zhang, Ling Zheng. 809-813 [doi]