Abstract is missing.
- Research on Threshold Denoising of FCGAMingyi Cui, Xinxiang Zhang, Huichao Mi. 3-8 [doi]
- Communication Optimization Algorithms based on Extend Data Flow GraphXuerong Gong, Linsheng Lu, Rongcai Zhao. 3-8 [doi]
- Lifetime Optimized Methods of Correlated Data Gathering on Sensor NetworksXun Zhou, Shengfei Shi, Jizhou Luo, Wei Zhang. 3-8 [doi]
- Study on distributing pattern of shared data in CC-NUMA systemGuoteng Pan, Qiang Dou, Lunguo Xie. 9-14 [doi]
- A (t, n)-threshold verified multi-secret sharing scheme based on ECDLPRuanhua Shi, Hong Zhong, Liusheng Huang. 9-13 [doi]
- Study on Heuristic Algorithm for Dynamic Scheduling Problem of Earth Observing SatellitesJunmin Wang, Jufang Li, Yujin Tan. 9-14 [doi]
- Coverage-preserving Data Gathering in Wireless Sensor NetworksHongli Xu, Liusheng Huang, Junmin Wu, Yang Wang. 14-19 [doi]
- Leveraging Single-user OpenOffice Suite for Collaboration by Transparent AdaptationHaifeng Shen, Suiping Zhou, Chengzheng Sun. 15-20 [doi]
- A Novel Algorithm for Load Balancing in Distributed SystemsHuafeng Deng, Yunsheng Liu, Yingyuan Xiao. 15-19 [doi]
- Tasks Allocation for Real-Time Applications in Heterogeneous Sensor Networks for Energy MinimizationJinghua Zhu, Jianzhong Li, Hong Gao. 20-25 [doi]
- A Replication and Cache based Distributed Metadata Management System for Data GridKe Shi. 20-25 [doi]
- Distributed and Integrated and and Collaborative Research Environment (DiCore): An Architectural DesignHongjun Su, Hong Zhang, Ray Hashemi. 21-26 [doi]
- New Synchronization Scheme Between Audio and VideoLifeng Qi, Hexin Chen, Yan Zhao. 26-29 [doi]
- Optimization Framework for Distributed Clustering Scheme in Wireless Sensor NetworksYongxuan Lai, Xiaobo Fan, Hong Chen, Ting-Ting Xie. 26-31 [doi]
- Integrating Agents and Web Services into Cooperative Design Platform of Vehicles HeadlightTingting Fu, Yigang Wang, Peng Liu, Yehua Du. 27-32 [doi]
- A New Scheme for Off-line Signature Verification Using DWT and Fuzzy NetWei Tian, Yizheng Qiao, Zhiqiang Ma. 30-35 [doi]
- A service-based Workflow Model for Virtual EnterpriseShaofei Wu, Siying Wei, Jinlong Zhang. 32-36 [doi]
- An Approach To QoS-Driven Knowledge Engine For Spatial Problem Collaborative ProcessingMingjun Xin, Quan Qian, Yingyong Chen, Weihua Li. 33-38 [doi]
- A New Kind of Hybrid Filter Based on the Peak-and-Valley Filter and PCNNYun Liu, Xiangguang Zhang, Chuanxu Wang. 36-39 [doi]
- An Approach for Web Services Composition based on QoS and Discrete Particle Swarm OptimizationMing Chen, Zhenwu Wang. 37-41 [doi]
- Trusted Code Remote Execution through Trusted Computing and VirtualizationLiqiang Zhang, Lu Chen, Huanguo Zhang, Fei Yan. 39-44 [doi]
- Slices Mining Based on Singular ValueLijie Zhang, Haili Yin, Hui Liu. 40-43 [doi]
- A Web service discovery algorithm based on dynamic compositionFuzhi Zhang, Yan Wang, Lin Wang. 42-46 [doi]
- Parzen Windows Estimation Using Laplace Kernel: A Novel Parametric Analysis with Information ContentJingsong He, Jian Tan, Qiansheng Fang. 44-49 [doi]
- Research of Real-time Forecast Technology in Fault of Missile Guidance System Based on Grey Model and Data FusionXinguo Wang, Aihua Li, Xiaogang Zhou, Hualong Xu. 45-49 [doi]
- Fuzzy Integrative Performance Evaluation for Supply Chain SystemJianhua Yang. 47-52 [doi]
- Comparison of Adaptive Receivers for DS-CDMA SystemsXubao Sun, Xujian Li. 50-53 [doi]
- Concept Hierarchies Generation for Classification using Fuzzy Formal Concept AnalysisWen Zhou, Zongtian Liu, Yan Zhao. 50-55 [doi]
- A Novel Method for Moving Object Detection in Foggy DayGong Chen, Heqin Zhou, Jiefeng Yan. 53-58 [doi]
- A Shared-Path-Protection Based Heuristic Algorithm for the Capacity Placement Problem in Mesh NetworksWei Xu, Xingming Li. 54-59 [doi]
- The Intelligent Damage Assessment and Intelligent Reconfiguration System of Ship Diesel SystemYue Hou, Jinyun Pu. 56-61 [doi]
- The Wavelet-based Contourlet Transform for Image FusionLei Tang, Zonggui Zhao. 59-64 [doi]
- A Mixed Shared and Multi Paths Protection Scheme with SRLG ConstraintsZongli Tang, Xingming Li. 60-65 [doi]
- Periodic solution for a class of higher-dimension impulsive functional differential equations with parameterJ. G. Yin, M. J. Gai, G. Zhou, X. H. Hou. 62-66 [doi]
- Multilevel Minimum Cross Entropy Threshold Selection Based on Quantum Particle Swarm OptimizationYong Zhao, Zongde Fang, Kanwei Wang, Hui Pang. 65-69 [doi]
- Traffic measurement Mechanisms for high precision Internet ApplicationsZhenqi Wang, Jin Liu. 66-69 [doi]
- A new mechanical algorithm for solving system of Volterra integral equationWeiming Wang, Zhenbing Zeng, Lu Yang. 67-72 [doi]
- A New Model of Printer Color Management Based on Legendre Neural NetworkXinwu Li. 70-74 [doi]
- Dual-tree Complex Wavelets Transforms for Image DenoisingBo Chen, Zexun Geng, Yang Yang, Tianshuang Shen. 70-74 [doi]
- Classification for a class of second order singular equations on time scalesChao Zhang, Lianghong Zhang. 73-76 [doi]
- A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGsXiangbin Shi, Fang Liu, Ling Du, Xiaohong Chen, Yuansheng Xing. 75-80 [doi]
- Application of the Rough Set to Image Median DenoisingBo Chen, Zexun Geng, Yang Yang, Xiaosong Liu. 75-78 [doi]
- Positive Solutions for Quasilinear Second Order Differential EquationShijie Dong, Zhifeng Gao, Yunhai Wang. 77-80 [doi]
- A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural NetworkWeixin Gao, Nan Tang, Xiangyang Mu. 79-83 [doi]
- Research on Matching between User Queries and Web Pages Based on BAMBo Deng, Yajun Du. 81-85 [doi]
- Research on Adaptive Error Concealment for Video Transmission over packet-lossy channelMing Yin, Yun Xie, Fen Guo, Shuting Cai. 81-85 [doi]
- Design of a High-speed FPGA-based 32-bit Floating-point FFT ProcessorShengmei Mou, Xiaodong Yang. 84-87 [doi]
- A Novel Approach to Commercial Detection in News VideoShi-Jin Li, Hao Li, Zhijian Wang. 86-90 [doi]
- Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force TransducersYan Chen, Benoit Boulet, Ping Chen, Mingbo Zhao. 86-91 [doi]
- Research on the RAW Dependency in Floating-point FFT ProcessorsShengmei Mou, Xiaodong Yang. 88-92 [doi]
- Automatic Audio Classification and Speaker Identification for Video Content AnalysisShu-Chang Liu, Jing Bi, Zhiqiang Jia, Rui Chen, Jie Chen, Minmin Zhou. 91-96 [doi]
- Automatic Keyphrase Extraction from Chinese BooksYijiang Chen, Xiaodong Shi, Changle Zhou, Chang Su. 92-97 [doi]
- Research on Data Encryption Technology Based on Chaos TheoryGannan Yuan, Fuyou Wang, Yanling Hao. 93-98 [doi]
- Identifying Code for Directed GraphYichun Xu, Renbin Xiao. 97-101 [doi]
- The Application of Fuzzy Neural Network in the Iatrical MonitorPing Chen, Mingbo Zhao, Shaoqing Jia. 98-103 [doi]
- A proxy blind signature scheme based on elliptic curve with proxy revocationWenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang. 99-104 [doi]
- Examination of Processing Load in Applying DACS Scheme to Practical NetworkKazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii. 102-107 [doi]
- Using Trust Metric to Detect Malicious Behaviors in WSNsMingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang. 104-108 [doi]
- A Proactive Secure Multisecret Sharing Threshold SchemeFeng Li, Jianwei Shang, Daxing Li. 105-110 [doi]
- Hop-Distance Algorithm for Self-Localization of Wireless Sensor NetworksDali Zhao, Yunhui Men, Linliang Zhao. 108-112 [doi]
- MAC Performance and Improvement in Mobile Wireless Sensor NetworksBing Liu 0006, Ke Yu, Lin Zhang, Huimin Zhang. 109-114 [doi]
- A Strong RSA Signature Scheme and Its ApplicationZhengjun Cao, Lihua Liu. 111-115 [doi]
- Internet Applications Usage Accounting Based on FlowZhenqi Wang, Jin Liu. 113-116 [doi]
- The Upper Bound of The Number of Nodes On Fixed Energy Budget in Wireless Sensor NetworksFang Wang, Guifa Teng, Lisheng Ren. 115-118 [doi]
- Key management based on elliptic curve Paillier scheme in ad hoc networksHuaqun Wang, Shuping Zhao, Guoxing Jiang. 116-119 [doi]
- The Research on the Construct Technology of the Test System Based on the NetworkQian Feng, Meng Chen. 117-122 [doi]
- Agent-based Trust Model in Wireless Sensor NetworksHaiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao. 119-124 [doi]
- Risk Evaluation for Host System Based on Theory of EvidenceChunyan Li, Yizun Guo. 120-124 [doi]
- A Hybrid and Efficient Scheme of Multicast Source AuthenticationJinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou. 123-125 [doi]
- Research of technology on making Linux interrupts taskedHongwei Zhao, Kechi Fang, Xuebai Zang. 125-128 [doi]
- An Attitude-adaptation Negotiation Strategy in Electronic Market EnvironmentsShujuan Li, Yongquan Liang, Xingpeng Xiao, Jixue Li, Qijia Tian. 125-130 [doi]
- New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile AgentsRenwang Su. 126-131 [doi]
- An Immune Middleware for Embedded SystemWei Zheng, Xiaofeng Meng, Qun Sun. 129-134 [doi]
- Web Marine Spatial Information Service Based on Electronic Nautical ChartsFeixiang Zhu, Yingjun Zhang, Wenhai Sang. 131-136 [doi]
- Identity-Based cryptography for GridHongwei Li, Shixin Sun. 132-137 [doi]
- Study on Modular Design-based Reconfigurable Embedded Network Numerical ControlJ. H. Zhang, Z. D. Zhou. 135-139 [doi]
- The Design and Implementation of XML-based Workflow EngineXin Jin, Jing Xu, XueMeng Li. 137-142 [doi]
- A note on homogeneous bent functionsXiaolin Wang, Jianqin Zhou, Yubing Zang. 138-142 [doi]
- Applications of On-chip Trace on Debugging Embedded ProcessorXiao Hu, Shuming Chen. 140-145 [doi]
- Wide-w-NAF Method for Scalar Multiplication on Köblitz CurvesMing Li, Baodong Qin, Fanyu Kong, Daxing Li. 143-148 [doi]
- HIDE - A Web-based Hydrological Integrated Data EnvironmentNimmy Ravindran, Yao Liang. 143-148 [doi]
- A class of SIR epidemic model with saturation incidence and age of infectionJunyuan Yang, Fengqin Zhang, Xiaoyan Wang. 146-149 [doi]
- An Energy Efficient Query Procesing Algorithm Based on Relevant Node Selection for Wireless Sensor NetworksGuilin Li, Jianzhong Li. 149-154 [doi]
- Non-functional Attributes Modeling in Software ArchitectureJingjun Zhang, Furong Li, Yang Zhang, Liguo Wang. 149-153 [doi]
- Profitless delays for permanence in a pure-delayed nonautomous Lotka-Volterra competitive system with infinite delays and discrete delaysXinzhu Meng, Huidong Cheng, Lansun Chen. 150-153 [doi]
- Asymptotic Weighted Periodic Oscillations for Dynamic Systems Caused by Impulse and Time DelayHuifeng Li, Jinliang Wang. 154-157 [doi]
- An Architecture for Software Systems with time constraintsJianmin Jiang, Hongping Shu, Li Xu. 154-159 [doi]
- Delay-Minimum Energy-Aware Routing Protocol (DERP) for Wireless Sensor NetworksLiming He. 155-160 [doi]
- Existence of Three Solutions for a Fourth-order Two-point Boundary Value ProblemJinsheng Liu, Jietao Zou. 158-161 [doi]
- Agent-oriented Petri Net based Modeling of Dynamic Behavior for Wide-area Backup ProtectionXiaoyang Tong, Xiaoru Wang. 160-165 [doi]
- Energy-Efficient Multi-Path Routing with Short Latency and Low Overhead for Wireless Sensor NetworksLiming He. 161-167 [doi]
- A Camera Calibration Strategy in The Video-based Traffic Information DetectionYu Yuan, Jiang Dan. 162-166 [doi]
- A Component-based Framework for Embedded Digital Instrumentation Software with Design PatternsYixing Xia, Yaowu Chen. 166-170 [doi]
- Localized Flooding Backbone Construction for Location Privacy in Sensor NetworksYingchang Xiang, Dechang Chen, Xiuzhen Cheng, Kai Xing, Min Song. 167-171 [doi]
- Design of Robust Observer for the Switched Discrete-Time Linear System with Time DelaysDejun Tang. 167-173 [doi]
- What Affects Decoding Complexity of Distributed Video Codec Based on Turbo CodeSheng Fang, Yongquan Liang, Shenyuan Li. 171-176 [doi]
- Research on Logical Function Blocks in ForCES-Based RoutersLigang Dong, Bin Zhuge, Weiming Wang. 172-177 [doi]
- A Real-time Vision-based Vehicle Tracking and Traffic SurveillanceZhifang Liu, Zhisheng You. 174-179 [doi]
- Machine-Vision-Based Measurement of BGA Connector Solder BallsJun Gao. 177-180 [doi]
- A New Inner Congestion Control Mechanism in Terabit RoutersHuaxi Gu, Kun Wang, Chu Ke, Changshan Wang, Guochang Kang. 178-181 [doi]
- Probabilistic Logic Operator based on Zero-order N/T-Norms Complete ClustersHaiyang Xu, Wenshan Cui, Ping Wang. 180-184 [doi]
- A Method for Blind Detection of OFDM Signal Based on Power Spectrum ReprocessingHaiying Zhang, Chaowei Yuan. 181-186 [doi]
- DynaNP - A Coarse-grain Dataflow Network Processor Architecture with Dynamic Configurable Processing PathTao Li, Xiaoming Zhang, ZhiGang Sun. 182-187 [doi]
- Improved Particle Swarm Optimization for Realistic Portfolio SelectionFasheng Xu, Wei Chen, Ling Yang. 185-190 [doi]
- Study on Statistics Iterative Thresholding Segmentation Based on Aviation ImageGuang Yang, Kexiong Chen, Maiyu Zhou, Zhonglin Xu, Yongtian Chen. 187-188 [doi]
- Two Certificateless Aggregate Signatures From Bilinear MapsZheng Gong, Yu Long, Xuan Hong, Kefei Chen. 188-193 [doi]
- Improved Image Coding Algorithm Based on Embedded ZerotreeFuheng Liu, Xuhong Liu, Guijuan Kuang, Yi Xiu. 189-192 [doi]
- An Improved Anisotropic Diffusion PDE for Noise RemovalZhifeng Wang, Xiaomao Li, Yandong Tang. 191-195 [doi]
- Biswapped Networks and Their Topological PropertiesWenjun Xiao, Weidong Chen, Mingxin He, Wenhong Wei, Behrooz Parhami. 193-198 [doi]
- Publicly Verifiable Secret Sharing with Enrollment AbilityJia Yu, Fanyu Kong, Rong Hao. 194-199 [doi]
- A New Face Recognition Method Based on 2DWPCAKe Han, Quan Feng, Xiu-chang Zhu, Huiyuan Wang. 196-199 [doi]
- A Scalable Search Algorithm on Unstructured P2P NetworksFuyong Yuan, Jian Liu, Chunxia Yin. 199-204 [doi]
- Forward-Secure Traceable Ring SignatureChengyu Hu, Daxing Li. 200-204 [doi]
- Multi-view Face Detection Based on the Enhanced AdaBoost Using Walsh FeaturesYunyang Yan, Guo Zhibo Guo, Jingyu Yang. 200-205 [doi]
- An Efficient ID-Based Restrictive Partially Blind Signature SchemeXiaoming Hu, Shangteng Huang. 205-209 [doi]
- Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal LogicZhengyuan Ning, Xianwei Lai, Shanli Hu, Qingqing Zhan. 205-210 [doi]
- Segmentation of Touching Characters in Mathematical Expressions Using Contour Feature TechniqueXuedong Tian, Yan Zhang. 206-209 [doi]
- Voice Conversion Using Canonical Correlation Analysis Based on Gaussian Mixture ModelZhihua Jian, Zhen Yang. 210-215 [doi]
- Geometric Design of Developable Bezier and B-spline Parametric SurfacesJunqing Yang, Min Zhou, Quanyi Lv, Hongchan Zheng. 210-215 [doi]
- Matrix Multiplication on the Biswapped-Mesh NetworkWenhong Wei, Wenjun Xiao. 211-215 [doi]
- Offset Approximation Algorithm for Subdivision SurfacesJunqing Yang, Min Zhou, Xiaohong An, Lining Zhang. 216-221 [doi]
- Integrated Multi-Agent and Semantic P2P Grid Resource Discovery ModelZenggang Xiong, Yang Yang, Xuemin Zhang, Dairong Yu, Li Liu. 216-220 [doi]
- The Design and Optimization of H.264 Encoder Based on the Nexperia PlatformZhengdong Li, Xianwen Zeng, Zhongcheng Yin, Shaobin Hu, Lei Wang. 216-219 [doi]
- IR Image Based Eye Gaze EstimationDongshi Xia, Zongcai Ruan. 220-224 [doi]
- An algorithm of job shop rolling scheduling based on singular rough setsYongmei Hu, Yanan Fu, Lei Jia, Qiqiang Li. 221-225 [doi]
- The Research and Application of Fuzzy Immune PID Control in the Load Control System of Tube MillGuili Yuan, Ji-zhen Liu, Wen Tan, Xiangjie Liu. 222-226 [doi]
- ICA based Noise Subtraction for Linear System Identification in Additive Noisy OutputYing Gao, Yue Li, Baojun Yang. 225-228 [doi]
- Research on the Knowledge-based Decision Support System for the Safety of RocketsWei Li. 226-231 [doi]
- State-based Time-Series Analysis and PredictionJixin Ma. 227-232 [doi]
- A Topology Set Method for VectorizationJinhe Wang. 229-234 [doi]
- A Hibrid Model for Computational Morphology ApplicationYang Xu, Houfeng Wang. 232-237 [doi]
- Data Mining Prediction of Shovel Cable Service LifespanLizhen Wang, Ao Yang, Hong Zhang. 233-238 [doi]
- Fast Correlation Tracking Method based on Circular ProjectionMeili Shen, Huajun Song, Weiwei Sheng, Zunnian Liu. 235-238 [doi]
- Power Consumption Forecast by Combining Neural Networks with Immune AlgorithmShuxia Yang. 238-241 [doi]
- LQRD: An Improved ECN AlgorithmJun Lai, Wu Ye, Suili Feng. 239-244 [doi]
- Rough Set Approach for Processing Information TableE. Xu, Shaocheng Tong, Liangshan Shao, Baiqing Ye. 239-243 [doi]
- Arithmetic Computing Based Chinese Automatic Parsing MethodXiao Yang, Jiancheng Wan, Ling Zhang. 242-247 [doi]
- An Novel Association Rule Mining Based Missing Nominal Data Imputation MethodJianhua Wu, Qinbao Song, Junyi Shen. 244-249 [doi]
- Overlay Network Testing by OpenDHTXun Duan, Jian-shi Li. 245-248 [doi]
- Prediction of R in Sinter Process based on Grey Neural Network AlgebraAimin Wang, Qiang Song. 248-252 [doi]
- A Sufficient and Necessary Condition for the Absolute Consistency of XML DTDsYan Lu, Zhongxiao Hao, Ran Dai. 249-254 [doi]
- Learning Bayesian Network structure from distributed homogeneous dataKuixiang Gou, Xiujun Gong, Zheng Zhao. 250-254 [doi]
- Research on Ant Colony Neural Network PID Controller and ApplicationChengzhi Cao, Xiaofeng Guo, Yang Liu. 253-258 [doi]
- D-S Theory-based Trust Model FIRE:::+::: in Multi-agent SystemsPingping Lu, Bin Li, Maolin Xing, Liang Li. 255-260 [doi]
- Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring ElementXiangguang Zhang, Yun Liu, Chuanxu Wang. 255-258 [doi]
- Design and Implementation of Wireless Computational Grid based on JavaSpaceBin Wen, Changqing Liu. 259-261 [doi]
- Image Segmentation with Multi-Scale GVF Snake Model Based on B-Spline WaveletJun Zhang, Jun Liu. 259-263 [doi]
- A Policy Language for Adaptive Web Services Security FrameworkJianxin Li, Bin Li, Liang Li, Tongsheng Che. 261-266 [doi]
- ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor NetworksLinchun Li, Jianhua Li, Ling Tie, Jun Pan. 262-267 [doi]
- Group Delay Based Approach for Frequency Estimation in Complex NoisesLihua Fu, Hongwei Li, Meng Zhang, Yuantong Shen. 264-268 [doi]
- An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc NetworksHui Zhang, Yuning Dong. 267-272 [doi]
- Distributed Key Establishment Scheme in Wireless Sensor NetworkHongwei Zhao, Shihui Pei, Pingping Liu. 268-273 [doi]
- Robust Algorithm of Vehicle Classification ApplicationShengLi Shi, Zhong Qin, Jianmin Xu. 269-272 [doi]
- Key-Insulated Group Signature Scheme with Verifier-Local RevocationRupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li. 273-278 [doi]
- Detecting Compromised Nodes in Wireless Sensor NetworksMary Mathews, Min Song, Sachin Shetty, Rick McKenzie. 273-278 [doi]
- Application and Analysis of Time Domain Cross Correlation for Traffic Flow Speed MeasurementLichao Wang, Qiyong Lu, Xi Chen. 274-279 [doi]
- Security Analysis of wrNAF and SPA Resistant Scalar MultiplicationBaodong Qin, Ming Li, Fanyu Kong, Daxing Li. 279-284 [doi]
- Secure Routing Protocol based Trust for Ad Hoc NetworksZhiyuan Liu, Shejie Lu, Jun Yan. 279-283 [doi]
- Improvements on MB-layer Rate Control Scheme for H.264 video Using complexity estimationMing Yin, Yun Xie, Fen Guo, Shuting Cai. 280-284 [doi]
- Novel Scheme based on Ping-pong Effect for Predictive Fast Handovers for Mobile IPv6Hongmei Wang, Zongpu Jia, Huan Zhao. 284-287 [doi]
- Improving Blind Equalization Algorithm for Wireless Communication SystemsLijun Sun, Ying He. 285-288 [doi]
- Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear PairingsRongbo Lu, Dake He, Changji Wang. 285-290 [doi]
- Optimal Cluster-Cluster Design for Sensor Network with Guaranteed Capacity and Fault ToleranceBin Zeng, Jun Wei, Tao Hu. 288-293 [doi]
- Edge Detection of Images based on Fuzzy Cellular AutomataKe Zhang, Zhong Li, Xiaoou Zhao. 289-294 [doi]
- An Efficient ID-Based Partially Blind Signature SchemeXiaoming Hu, Shangteng Huang. 291-296 [doi]
- A Distributed Trust-based Reputation Model in P2P SystemYu-Mei Liu, Shoubao Yang, Leitao Guo. 294-299 [doi]
- Motion Vector Data Decoding Using Spatial-Temporal Source RedundancyMengmeng Zhang, Yuehai Wang, Changnian Zhang, Shumin Zhou. 295-298 [doi]
- A Fuzzy Clustering Method Based on Domain KnowledgeJunli Lu, Lizhen Wang, Yaobo Li. 297-302 [doi]
- KZCAN: A Kautz based content-addressable networkJiguo Yu, Jingjing Song, Wenjun Liu, Li Zhao, Baoxiang Cao. 299-304 [doi]
- An Feasible Key Management Scheme in Ad Hoc NetworkYa-tao Yang, Oing Zeng, Yong Fang, Yaping Chi. 300-303 [doi]
- XML Query Recommendation Based On Association RulesYijun Bei, Gang Chen, Lihua Yu, Feng Shao, Jinxiang Dong. 303-308 [doi]
- Study and Implementation of a Improved Group Key Protocol for Mobile Ad Hoc NetworksQiuna Niu. 304-308 [doi]
- Study On Non-FIFO Arc in Time-Dependent NetworksWuming Luo, Pingyang Han. 305-310 [doi]
- Hybrid Ontology Integration for Distributed SystemYe Liang, Hong Bao, Hongzhe Liu. 309-314 [doi]
- An IA-Based Classification Rule Mining AlgorithmZiqiang Wang, Qingzhou Zhang, Dexian Zhang. 309-313 [doi]
- Research on an Integrated Network Management SystemLianxing Jia Wei Zhu, Chenggong Zhai, Yi Du. 311-316 [doi]
- Secure Routing for Mobile Ad Hoc NetworksJing Liu, Fei Fu, Junmo Xiao, Yang Lu. 314-318 [doi]
- Applying Multiple Classifier Systems to SoftMan s Perception SystemAizhong Mi, Jiquan Shen, Xuefeng Zheng, Xuyan Tu. 315-320 [doi]
- The Computer Bracket Pressure Monitor System of Fully Mechanized Coalface in Coal Mine Based On CAN BusYong Zhang, Xianghong Yan, Yang Song, Hongmei Zhu. 317-322 [doi]
- Adaptive Backoff Algorithm based on Network Congestion in Multi-hop Wireless Ad hoc NetworksHailun Xia, Zhimin Zeng, Wei Ding. 319-324 [doi]
- OBSI: Object Based Storage System for Massive Image DatabasesLihua Yu, Gang Chen, Yijun Bei, Feng Shao, Jinxiang Dong. 321-326 [doi]
- A Framework for Reliability Computation of the IP NetworkTao Yu, Shanzhi Chen, Ming Ai, Xin Li, Yuhong Li, Zhen Qin. 323-327 [doi]
- Scatternet Formation Algorithm in Multi-hop Environment based on BionicsJingjing Wang, Mingbo Zhao. 325-330 [doi]
- Optimizing Network Configurations Based on Potential Profit LossFeng Zhao, Peidong Zhu, Meng Wang, Baosheng Wang. 327-332 [doi]
- Numerical Solution of A Type of Nonlinear Parabolic EquationsLili Wang, Wei Gu. 328-333 [doi]
- Multi-path-based Distributed TCP Caching for Wireless Sensor NetworksYuhua Liu, Hao Huang, Kaihua Xu. 331-335 [doi]
- A Reputation System with Privacy and IncentiveBo Yang, Min Zhou, Guohuan Li. 333-338 [doi]
- Positive solutions of m-points conjugate boundary value problemsShuli Wang, Jianming Zhang. 334-338 [doi]
- Rough Neural Network Modeling Through Supervised G-K Fuzzy ClusteringDongbo Zhang, Yaonan Wang, Huixian Huang. 336-341 [doi]
- Existence of Nonoscillatory Solution for Second Order Nonlinear Neutral Delay Differential EquationJinzhu Zhang, Zhen Jin, Huimin Zhang. 339-342 [doi]
- The Research of ID Strategy Based on Antigen Presenting Principle and its AdaptabilityFuxiong Sun, Ping Xiong, Tao Sun. 339-344 [doi]
- Chinese Question Classification Based on Ensemble LearningKeliang Jia, Kang Chen, Xiaozhong Fan, Yu Zhang. 342-347 [doi]
- Two dimensional pattern formation of prey-predator systemHongxia Shen, Zhen Jin. 343-346 [doi]
- An Improved Identity-based Fault-tolerant Conference Key Distribution SchemeYongquan Cai, Xiuying Li. 345-349 [doi]
- Quantum network based on multiparty quantum secret sharingHongyang Ma, Bingquan Chen. 347-351 [doi]
- A Parsing Model Based on Ordered Tree Inclusion MatchingXiao Yang, Jiancheng Wan, Fang Tan. 348-353 [doi]
- Description of Key Performance Index States based on Cloud Theory and the Weighted Mean method for Multi-sensorQiuyu Zhang, Lei Sun, Yanfeng Jin. 350-354 [doi]
- Quantum Information Security Protocols and Quantum Coding TheoryXin Lü, Zhi Ma. 352-356 [doi]
- Study on Prediction of Prosodic Phrase Boundaries in Chinese TTSZiping Zhao, Yaoting Zhu. 354-358 [doi]
- A half face recognition schemeshidu dong, Bo He, Qun Jiang, Huaqiu Wang, Tongyuan Huang. 355-358 [doi]
- P2P Trust Model: The Resource Chain ModelSinjae Lee, Shaojian Zhu, Yanggon Kim. 357-362 [doi]
- Algorithm for Tracking of Fast Motion Objects with Adaptive Mean ShiftGuoliang Wang, Dequn Liang, Yanchun Wang, Zhaohua Hu. 359-363 [doi]
- Artificial Immunity-Based Feature Extraction for Spam DetectionBurim Sirisanyalak, Ohm Sornil. 359-364 [doi]
- Network Protocols Analyzing by an Environmental Bisimulation MethodMin Gan, Guoying Yue, Hongfa Wang. 363-367 [doi]
- A Fractal Watermarking Scheme for Image in DWT DomainShuguo Yang, Chunxia Li, Shenghe Sun, Rongsheng Xie. 364-368 [doi]
- Semantic Approach to Visualization Service DiscoveryShu Gao, Dingfang Chen. 365-370 [doi]
- A Rapid Grouping Aggregation Algorithm Based on the Multi-Dimension Hierarchical EncodingKongfa Hu, Zhenzhi Gong, Qingli Da. 368-373 [doi]
- New Texture Features Based on Wavelet Transform Coinciding with Human Visual PerceptionMuwei Jian, Junyu Dong, Dawei Gao, Zuojuan Liang. 369-373 [doi]
- A Resource Allocation Model with Cost-Performance Ratio in Data GridXiangang Zhao, Liutong Xu, Bai Wang. 371-376 [doi]
- An Algorithm for SAR Image Embedded Compression Based on Wavelet TransformKun Li, Shuang Wang, Biao Hou, Licheng Jiao. 374-378 [doi]
- Getting Fuzzy Control Query Table by Data MiningJun Gao. 374-378 [doi]
- An Efficient Hybrid P2P Incentive SchemeZhitao Guan, Yuanda Cao, Muhammad Hanif Durad, Liehuang Zhu. 377-382 [doi]
- An Effective Method To Improve kNN Text ClassifierXiulan Hao, Xiaopeng Tao, Shuyun Wang, Yunfa Hu. 379-384 [doi]
- Coal Thickness Prediction Based on Support Vector Machine RegressionZhengWei Li, Shixiong Xia, Niuqiang, Zhanguo Xia. 379-383 [doi]
- Image with Less Information Watermarking Algorithm Based on DWTHou Yingkun, Zhu Xiangcai, Zhu Lili, Liu Mingxia. 383-387 [doi]
- BDA information management and decision support based on DWZhijun Ma, Li Chen, Yizhen Zhang. 384-387 [doi]
- A Novel SVM Decision Tree and its application to Face DetectionJianqing Su, Gonggui Wang, Qiong Hu, Shouyi Li. 385-389 [doi]
- A Content Protection Scheme for H.264-based Video SequenceMeihua Wang, Kefeng Fan, Bin Yue, Xiaojun Yu. 388-393 [doi]
- Battle Damage Assessment based on Bayesian NetworkZhijun Ma, Quan Shi, Bin Li. 388-391 [doi]
- Intelligent Cultural Advisor System: an interactive on-line culture guidebookHarry Zhou. 390-395 [doi]
- Infrared Point Target Detection and Tracking Based on DSPHongwei Zhao, Xiaolin Zhao, Yiming Qi. 392-394 [doi]
- Emotion classification of mandarin speech based on TEO nonlinear featuresHui Gao, Shanguang Chen, Guangchuan Su. 394-398 [doi]
- Intelligent Window Based on Embedded SystemJingwen Tian, Meijuan Gao, Jin Li. 395-399 [doi]
- Research on Technologies of Spatial Configuration Information RetrievalHaibin Sun, Xin Chen. 396-401 [doi]
- Stochastic Network Fluid Modeling with Probabilistic Wavelet SystemZhi Liu, Yun Zhang. 399-403 [doi]
- Dependable distributed embedded system assessment platform designQiang Huang, Xiaofeng Liang, Yingying Zhu. 400-405 [doi]
- A Multi-object Motion-tracking Method for Video SurveillanceJiang Dan, Yu Yuan. 402-405 [doi]
- A Novel Approach to Detect the Presence of LSB Steganographic MessagesZongyuan Deng, Xi Shao, Zhen Yang. 404-408 [doi]
- Application of Embedded System in Construction MachineryMingshan Liu, Yuan Zhou. 406-411 [doi]
- Oscillation Criteria of Second-Order Delay Dynamic Equations on Time ScalesZhenlai Han, Shurong Sun. 406-411 [doi]
- Multiple Positive Solutions for Second Order m-Point Boundary Value ProblemsZhenfeng Gao, Yunhai Wang, Yanping Guo. 409-412 [doi]
- A Web Services Based Email Extension for Remote Monitoring of Embedded SystemsPeng Liu, Guojun Dai, Tingting Fu. 412-416 [doi]
- Existence of Positive Solutions for Boundary Value Problems on a Measure Chain with a ParameterHuting Yuan, Feng Mi. 412-416 [doi]
- LATEX The existence of positive solutions for multi-point BVPs with dependence on the first order derivativeWeihua Jiang, Xiuming Li, Bin Wang. 413-416 [doi]
- Optimal Guaranteed Cost Control for a Class of Uncertain Systems with both State and Input Delays via Delta Operator ApproachJiqing Qiu, Hongjiu Yang, Jinhui Zhang. 417-422 [doi]
- Mining User s Interest from Reading Behavior in E-learning SystemYongquan Liang, Zhongying Zhao, Qingtian Zeng. 417-422 [doi]
- Clever Uses of Matrices for Neutral Delay Difference SystemsGuang Zhang, Bao Shi. 417-421 [doi]
- A model for Tuberculosis with Various Latent PeriodsZhongwei Jia, Xiaowen Li, Zhen Jin, Dan Feng, Wuchun Gao. 422-425 [doi]
- An Approach to Build Accessible Grid ServiceJie Yin, Yuexuan Wang, Cheng Wu. 423-428 [doi]
- Robust Stability of Uncertain Cellular Neural Networks with Time-Varying DelaysLianqing Su, Zhifeng Gao, Jiqing Qiu, Peng Shi. 423-426 [doi]
- Multi-Connection Mechanism of Mobile Agent in GridZhirou Zhang, Wengang Cheng, Dawei Dong. 426-430 [doi]
- A Log-Sigmoid lagrangisn neutral network for solving nonlinear programmingLimei Zhou, Liwei Zhang. 427-431 [doi]
- A Research for Quality Preservation Methodology for SOA EnvironmentYoungkon Lee, Gwyduk Yeom. 429-434 [doi]
- Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer NetworksYu Jin, Zhimin Gu, Zhijie Ban. 431-436 [doi]
- An Ontology Framework for EC Automated Negotiation ProtocolShujuan Ji, Qijia Tian, Yongquan Liang, Hongmei Yang. 432-437 [doi]
- Study on Classification Algorithm of Multi-subject TextYuping Qin, Qing Ai, Xiukun Wang, Xiangna Li. 435-438 [doi]
- Communication Optimization on Automatic Program ParallelizationChunli Dong, Rongcai Zhao, Zhuojie Ma, Donghong Li. 437-442 [doi]
- The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation ProjectsHongxia Jin, Jianna Zhao, Xiaoxuan Chen. 438-443 [doi]
- Survey of Public Key Digital Watermarking SystemsRongsheng Xie, Keshuo Wu, Jiangbo Du, Chunguang Li. 439-443 [doi]
- A New Clustering Algorithm Based on Token RingYongquan Liang, Jiancong Fan, Zhongying Zhao. 443-446 [doi]
- The Evaluation Study of Knowledge Management Performance Based on Grey-AHP MethodFang Jin, Peide Liu, Xin Zhang. 444-449 [doi]
- An Automatic Target Detection Post-Processing Algorithm Based on Swarm IntelligenceZhuo Chen, Xiangshuang Liu, Xiaodong Zhunag. 444-449 [doi]
- A Two-phase Flight Data Feature Selection Method Using both Filter and WrapperLiang Zhang, Fengming Zhang, Yongfeng Hu. 447-452 [doi]
- Application of Multi-Agent for Collaborative Product Design EngineeringYan Li. 450-454 [doi]
- Evaluation Model of Customer Satisfaction of B2C E-Commerce Based on Combination of Linguistic Variables and Fuzzy Triangular NumbersPeide Liu. 450-454 [doi]
- Feature Extraction by Foley-Sammon Transform with KernelsZhenzhou Chen. 453-457 [doi]
- an Improved Adaptive Genetic Algorithm in Optimization of Partner SelectionXuesen Ma, Jianghong Han, Zhenchun Wei, Yuefei Wang. 455-460 [doi]
- The application of particle swarm optimizaton algorithm in training forward neural networkShaozhong Song, Libiao Zhang, Shu Hua. 455-457 [doi]
- Studies on CAD System with Artificial IntelligenceJun Wang, Huixue Sun. 458-463 [doi]
- Processing Global Nearest Neighbor QueryXiaofeng Liu, Chuanbo Chen, Yunsheng Liu. 458-462 [doi]
- An Ant Colony System Hybridized with Randomized Algorithm for TSPChengming Qi. 461-465 [doi]
- Signature of quantum message using quantum fingerprint and stabilizer codeYing Guo, Wenshan Cui, Yutao Zhang. 463-466 [doi]
- Research on Detecting Method of Submarine Oil Pipelines Corrosion Degree Based on Chaos Genetic Algorithm Neural NetworkMeijuan Gao, Jingwen Tian, Kai Li. 464-469 [doi]
- A New Optimization Engine for the LSF Vector QuantizationJian Tang, Jingsong He, Lu Huang. 466-471 [doi]
- Perfect Concurrent Signature ProtocolZhenjie Huang, Rufen Huang, Xuanzhi Lin. 467-472 [doi]
- Low Dimensional Simplex Evolution --- A Hybrid Heuristic for Global OptimizationChangtong Luo, Bo Yu. 470-474 [doi]
- Solving Timetabling Problem Using Genetic and Heuristic AlgorithmsDuc Thanh Nguyen. 472-477 [doi]
- ID-based threshold signature and mediated signature schemesYong Yu, Bo Yang, Ying Sun. 473-478 [doi]
- An Enhancement Dynamic Contract Net ProtocolZhaowen Wei, Junyan Yan, Yunpeng Ou. 475-480 [doi]
- stability analysis of timing acquisition methods with multi-hypothesis in indoor UWB multipath and MAI channelHongjiang Wang, Fei Ji, Shengming Jiang, Liying Huang, Gang Wei. 478-483 [doi]
- An Encryption solution in Digital Trunking SystemChongyu Wei, Chengjin Wang, Chunlin Zhou. 479-482 [doi]
- Study on The Property of Training Samples and Learning Space with Genetic AlgorithmsJingsong He, Jian Tang, Qiansheng Fang. 481-486 [doi]
- A Practical Digital Watermarking Protocol Based On PKI-CAXiaosu Chen, Dali Zhu, Jian Liu. 483-488 [doi]
- An Innovative Restoration Algorithm with Prioritized Preemption EnabledJingyi Wang, Zhiyu Zhou, Jian Wu. 484-489 [doi]
- Research on Lossless Image Compression Algorithms Using Fermat Number TransformHong Zhang, Zhengxing Cai, Fan Yang, Wei Wei. 487-490 [doi]
- Research of Asynchronous Communication Messaging Model Based on Time Decoupling in Distributed Object-Oriented MiddlewareYanhong Zhao, Yinzhang Guo, Shangwang Bai. 489-493 [doi]
- Congestion Control Model Based on Hop-by-hop Feedback for Active NetworksFei Nie, Zengzhi Li. 490-494 [doi]
- Maximum Variance Image Segmentation Based on Improved Genetic AlgorithmChunmei Wang, Suzhen Wang, Chongming Zhang, Junzhong Zou. 491-494 [doi]
- Research on Ontology-based Representation and Retrieval of ComponentsQuan Liu, Xinjuan Jin, Yihong Long. 494-499 [doi]
- Distortion Analysis in Scalable Image Compression Scheme based on efficient Codebook selectionMuhammad Kamran, Haroon-Ur-Rashid Khan, Shi Feng. 495-500 [doi]
- Two multi-constrained multicast QoS routing algorithmLin Huang, Yulin Zhang, Yonghong Ren. 495-500 [doi]
- Component-based approach to develop integrated diagnostic platformHong Ji, Xiaofeng Meng, Bo Zhong, Xiaomei Chen. 500-504 [doi]
- Anti-periodic boundary value problem for impulsive differential equations with delayFengqin Zhang. 501-504 [doi]
- Fusion of ICA Spatial and Temporal and Localized Features for Face RecognitionJiajin Lei, Chao Lu. 501-506 [doi]
- The SIS epidemic model with impulsive effectsJin Zhen, Mainul Haque. 505-507 [doi]
- Domain-Analysis in Software Reuse - Application in Warehouse ManagementYouxin Meng, Aiguang Young, Xianwei Wang, Kun Shao. 505-510 [doi]
- Local And Global Features Extracting and Fusion For microbial RecognitionXiaojuan Li, Cunshe Chen, Anbo Liang, Yan Shi. 507-511 [doi]
- Global Stability of a tuberculosis model with vertical transsmissionChun Ma, Fengqin Zhang, Zhen Jin. 508-511 [doi]
- A service-oriented methodology supporting automatic synthesis and verification of component behavior modelPengcheng Zhang, Yu Zhou, Bixin Li. 511-516 [doi]
- Oscillations of a class of second-order nonlinear delay differential equations with variable sign coefficientsJietao Zou, Jianguo Zhang, Xiaoyou Han, Hongxia Zhu. 512-516 [doi]
- Distributed Parallel Algorithm For Nonlinear Optimization Without DerivativesCongying Han, Guoping He, Huanqing Cui, Xuping Zhang. 512-515 [doi]
- Selection of the Order of Autoregressive Models for Host Load Prediction in GridJiuyuan Huo, Liqun Liu, Li Liu, Yi Yang, Lian Li. 516-521 [doi]
- Add Semantic Role to Dependency Structure Language Model for Topic Detection and TrackingJing Qiu, Lejian Liao. 517-521 [doi]
- Research on Mobile IP Routing of Space Network that Based on IP over CCSDSLizheng Jiang, Xin Meng, Shuqian Liu, H. U. Shengbo Hu. 517-520 [doi]
- Mobile-Agent-Based Information-Driven Multiresolution Algorithm for target tracking in Wireless Sensor NetworksHaifeng Hu, Zhen Yang. 521-525 [doi]
- An Integrated Prefetching and Caching Strategy for Mobile Web Caching SystemBeihong Jin, Sihua Tian, Chen Lin, Xin Ren, Yu Huang 0002. 522-527 [doi]
- A method to construct dynamic S-box based on chaotic mapJing Qiu, Xiaofeng Liao, Ping Wang. 522-525 [doi]
- Threats Analysis and Prevention for Grid and Web Service SecurityJiancheng Ni, Zhishu Li, Zhonghe Gao, Jirong Sun. 526-531 [doi]
- Energy-Efficient Power Control Game for Cognitive Radio SystemsShilun Cheng, Zhen Yang. 526-530 [doi]
- A Fault-Tolerant Mutual Exclusion Resource Reservation Protocol for Clustered Mobile Ad hoc NetworksMohammad Moallemi, Mohammad Hossien Yaghmaee, Mahmoud Naghibzadeh. 528-533 [doi]
- A New Algorithm for Weighted Proportional Fairness Based Spectrum Allocation of Cognitive RadiosFeng Tian, Zhen Yang. 531-536 [doi]
- A Framework for Revocation of Proxy Certificates in a GridShushan Zhao, Akshai K. Aggarwal, Robert D. Kent. 532-537 [doi]
- Time Synchronization with Extended Clock Model for Wireless Sensor NetworksLiming He. 534-539 [doi]
- Research on User Applying Mode for Video Conference SystemYuqing Zhang, Qun Wang, Jianfeng Zou, Xuezhi Tao, Libin Zhang. 537-542 [doi]
- User Interface Design ModelXudong Lu, Jiancheng Wan. 538-543 [doi]
- Analysis of communication traffic characteristics of two-hop-relay cellular system in the dead spotsWeifeng Lu, Meng Wu. 540-545 [doi]
- Voice Conversion Adopting SOLAFSLei Zhao, Yinqiu Gao. 543-548 [doi]
- Xregion: A structure-based approach to Storing XML Data in Relational DatabasesLiyan Yuan, Meng Xue. 544-551 [doi]
- LSMR: a Label Switching Multipath Routing protocol for Ad Hoc NetworksWei Rong, Muqing Wu, Tianhang Yu. 546-551 [doi]
- An RBF Network Based Beamformer for MIMO Wireless Communication SystemsLing Zhang, X. Z. Zhang. 549-552 [doi]
- The existence of periodic solutions for a class impulsive differential equationsYanping Guo, Wei Xiang, Xiujun Liu. 552-555 [doi]
- A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog DeviationLong Jin, Xvming Shi. 552-557 [doi]
- Lossless Compression of Hyperspectral Imagery Using Integer Principal Component Transform and 3-D Tarp CoderXin Luo, Lei Guo, Zhen Liu. 553-558 [doi]
- Test Cases Generation from UML Activity DiagramsHyungchoul Kim, Sungwon Kang, Jongmoon Baik, In-Young Ko. 556-561 [doi]
- The Study of Compost Quality Evaluation Modeling Method Based on Fuzzy Neural Network for Sewage TreatmentJingwen Tian, Meijuan Gao, Yujuan Xiang. 558-563 [doi]
- Segmentation and Recognition of Mallow Cells Image Based on Wavelet and Genetic ClusterZhenjie Hou, Shuoshi Ma, Xichun Pei, Wei Zhang. 559-563 [doi]
- Nash Equilibrium stability of rent-sinking competition and its game analysisBin Wang, Silian Sui, Hongliang Zhao. 562-566 [doi]
- A Nonparametric Approach to Pricing Convertible Bond via Neural NetworkWei Zhou, Meiying Yang, Liyan Han. 564-569 [doi]
- Multi-issue Negotiation Research based on Niched Co-evolutionary Genetic AlgorithmYong Yuan, Yong-quan Liang. 564-569 [doi]
- Classification and Existence of Non-oscillatory Solutions for Two-Dimensional Neutral Difference SystemBinbin Du, Guang Zhang. 567-572 [doi]
- A Modified SOFM Segmentation Method in Reverse EngineeringShusheng Zhong, Xiaoliang Bai, Xuemei Liu. 570-573 [doi]
- A Hybrid Multi-objective Evolutionary Algorithm and Its Application in Component-based Product DesignXiangwei Zheng, Huichuan Duan, Hong Liu. 570-575 [doi]
- An Optimized Breaking Index for the Boussinesq-Type Numerical ModelShuang Li, Hailun He, Jinbao Song. 573-577 [doi]
- Automatic Text Summarization Based on Lexical Chains and Structural FeaturesLei Yu, Jia Ma, Fuji Ren, Shingo Kuroiwa. 574-578 [doi]
- Genetic algorithm-based study on flow allocation in a multicommodity stochastic-flow network with unreliable nodesQiang Liu, Hailin Zhang, Xiaoxian Ma, Qingzhen Zhao. 576-581 [doi]
- Validity Test of the Eigenfunction Expansion Method in the Transient Wave Propagation SimulationHailun He, Shuang Li, Jinbao Song. 578-581 [doi]
- Hybrid Application On Job-Shop Scheduling by Genetic Algorithm and MAS Spring-NetYumin Dong, Shufen Xiao. 579-584 [doi]
- A New Hybrid Genetic Algorithm for the Stochastic Loader ProblemHong Wang, Peixin Zhao. 582-586 [doi]
- SAT-based Bounded Model Checking for SE-LTLConghua Zhou, Shiguang Ju. 582-587 [doi]
- Parallel analysis of polymorphic viral code using automated deduction systemRuo Ando. 585-592 [doi]
- A Query Expansion Method Based On Semantic ElementLi Li. 587-590 [doi]
- Research and Application of Software-reuseYong Liu, Ai-guang Yang. 588-593 [doi]
- Research on Risk Control Model of Cooperatively Technical Innovation based on Wavelet and Nerve NetworkChanghui Yang. 591-594 [doi]
- A Double Level Granularity for Multimedia on Demand SystemXiaoguang Liu, Gang Wang, Jing Liu. 593-596 [doi]
- The differences of COTS-based project stakeholdersYunmei Du, Shixian Li. 594-598 [doi]
- Chaotic Time Series Prediction Based on Radial Basis Function NetworkTao Ding, Hongfei Xiao. 595-599 [doi]
- Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for GridsCongfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao. 597-602 [doi]
- A Unified-Index Based Distributed Specification for Heterogeneous Components ManagementMing Zhong, Yaoxue Zhang, Pengwei Tian, Cunhao Fang, Yuezhi Zhou. 599-604 [doi]
- Study of Ontology-based Semantic Matching of Model FunctionHongmei Zhu, Yongquan Liang, Wejuan Lian, Qijia Tian, Yong Zhang. 600-604 [doi]
- Numerical Simulation of A Difference Scheme Applied in Image Processing Based on Four-Order PDEsLijie Zhang, Hui Liu, Yan Wang. 603-605 [doi]
- Self-Adaptive PD Control of Robot ManipulatorDongyuan Ge, Shousheng Jiang. 605-610 [doi]
- Multi-device User Interface Development with Composition-oriented User Interface Design PatternsShihong Feng, Jiancheng Wan. 605-610 [doi]
- Recognizing Humans Based on Gait Moment ImageQinyong Ma, Shenkang Wang, Dongdong Nie, Jianfeng Qiu. 606-610 [doi]
- A hybrid metaheuristic ACO-GA with an Application in Sports Competition SchedulingGuangdong Huang, Ping Ling, Qun Wang. 611-616 [doi]
- A Phase Unwrapping Algorithm for 3D ReconstructionHong Zhang, Hongjun Su, Xianyu Su. 611-615 [doi]
- A Novel Strategy of Coalition Evolvement Based on InterestXiang Yin, Jianguo Jiang, Na Xia. 611-615 [doi]
- A Tristate Filter for Image Denoising ProcessingYanhua Ma, Chuanjun Liu, Haiying Sun. 616-621 [doi]
- Particle Swarm Optimization with Adaptive ParametersDongyong Yang, Jinyin Chen, Naofumi Matsumoto. 616-621 [doi]
- GA in Optimized Control of Central Air-conditioning System Based on ANN SimulationXianmei Zhao, Haoyin Li, Jin Zhang. 617-622 [doi]
- A Study about the Mapping of Process- Processor based on Petri NetsXianwen Fang, Zhicai Xu, Zhixiang Yin. 622-626 [doi]
- Multifractal and R/S Analysis of Protein StructureTingting Zheng, Jiaxing Cheng, Junjun Mao, Jie Song. 622-626 [doi]
- Model for Parallel Verification of ProgramsPei He, Lishan Kang, Qiongzhang Li. 623-628 [doi]
- A Task Scheduling Algorithm of Single Processor Parallel Test SystemJiajing Zhuo, Chen Meng, Minghu Zou. 627-632 [doi]
- Quality assessment of beef based of computer vision and electronic noseCunshe Chen, Xiaojuan Li, Huimei Yuan. 627-631 [doi]
- A Survey of Reasoning in ParallelizationMikhail Chalabine, Christoph W. Keßler. 629-634 [doi]
- Double Unmanned Air Vehicle’s Path Planning for Scout via Cross-Entropy MethodJinquan Wang, Xiaoguang Gao, Jianguo Shi, Zhengsheng Li. 632-635 [doi]
- Research of multi-factors heuristics tasks scheduling model and its algorithms in grid environmentXianwu Zeng, Cunchen Gao, Shuping Bao. 633-639 [doi]
- Non-interactive Designated Confirmer Signature with Specific VerifierYong Li 0002. 635-640 [doi]
- A PACA-Based Multicast Routing AlgorithmZiqiang Wang, Xia Sun, Dexian Zhang. 636-639 [doi]
- DYFARS: Boosting Reliability in Fault-tolerant Heterogeneous Systems Through Dynamic SchedulingWei Luo, Junlin Li, Fuming Yang, Gang Tu, Liping Pang, Lin Shu. 640-645 [doi]
- A Formal Approach to Specifying Architecture Aspects and Their Weaving logicChunhua Yang, Jiancheng Wan. 640-645 [doi]
- Protocol Engineering Principles for Cryptographic Protocols DesignLing Dong, Kefei Chen, Mi Wen, Yanfei Zheng. 641-646 [doi]
- A Cluster-Based and Routing Balanced P2P Lookup ProtocolYang Lu, Ming Chen. 646-651 [doi]
- A Lightweight value-based Software Architecture EvaluationChang-Ki Kim, Dan-Hyung Lee, In-Young Ko, Jongmoon Baik. 646-649 [doi]
- A provably secure ID-based mediated signcryption schemeYong Yu, Bo Yang, Ying Sun. 647-652 [doi]
- Mapping Software Design Changes to Source Code ChangesXiangchen Tan, Tie Feng, Jiachen Zhang. 650-655 [doi]
- On Path-length and Routing-tag Algorithm for Hybrid Irregular Multi-stage Interconnection NetworksNitin, Vivek Kumar Sehgal, Nakul Sharma, Kunal Krishna, Abhishek Bhatia. 652-657 [doi]
- A Business Modeled Approach for Trust Management in P2P NetworksT. Srinivasan, N. Vidyapriyadarshini, Smrithika Appaiah. 653-658 [doi]
- The Management and Validation of Business Rules in Telecom Operator’ Settlement and Apportion SystemBiying Lin, Yanhui Zhang. 656-661 [doi]
- Multiple Moving Prey Pursuit Algorithm Based on the Changeable AllianceYuehai Wang, Mengmeng Zhang. 658-662 [doi]
- A PSO-Based Web Document Classification AlgorithmZiqiang Wang, Qingzhou Zhang, Dexian Zhang. 659-664 [doi]
- A Scable Peer-to-Peer Overlay for Applications with Time ConstraintsBo Liu, Yansheng Lu. 662-667 [doi]
- Towards Quantitative Evaluation of UML based Software ArchitectureJinhua Li, Zhenbo Guo, Yun Zhao, Zhenhua Zhang, Ruijuan Pang. 663-669 [doi]
- Data Mining based on Clonal Selection Wavelet NetworkZhenguo Chen. 665-669 [doi]
- The research of local area storage grid systemPeihe Tang, Hao Liu. 668-672 [doi]
- Formalization of Architecture-Centric Model Mapping Using Category TheoryJinkui Hou, Jiancheng Wan, Shuaiqiang Wang. 670-675 [doi]
- An Improved Semantic Smoothing Model for Model-Based Document ClusteringJiarong Cai, Yubao Liu, Jian Yin. 670-675 [doi]
- A New Double scheduling DBA Algorithm for next generation access networkWei Chen, Jingtao Song, Jinan Leng, Hanyang Lu. 673-678 [doi]
- A Quick Algorithm for Computing Core Based on the Positive RegionWeidong Cai, Zhangyan Xu, Wei Song, Bingru Yang. 676-681 [doi]
- Modeling and Practice on Component Based Software Design - a Case StudyWenying Feng, Peter O Keefe, Shushuang Man. 676-681 [doi]
- Organization technology of Mobile Peer-to-peer Network Based on Mobile UnitYe Liang, Linlin Ci. 679-682 [doi]
- A Dynamic Reconfigurable Adaptive Software Architecture for Federate in HLA-based simulationYang Hu, Chen Hang. 682-687 [doi]
- Finding Frequent Items in Data Streams using ESBFShuyun Wang, Hexiang Xu, Yunfa Hu. 682-687 [doi]
- Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop NetworkXiuhua Fu, Wenan Zhou, Junli Xu, Junde Song. 683-688 [doi]
- Automatic Performance Evaluation Of Palm RecognitionZhenyu Qi, Jing Xu. 688-693 [doi]
- Survivable and Efficient Clustered Keying In Wiresless Sensor NetworksXizheng Zhang. 688-693 [doi]
- A Policy-Based Energy Efficient Clustering Scheme for Wireless Sensor NetworksMin Xiao, Gaolin Chen, Debao Xiao. 689-694 [doi]
- Knowledge-based system to define context in commercial applicationsNayat Sánchez Pi, Virginia Fuentes, Javier Carbó, José Manuel Molina. 694-699 [doi]
- Toward a Formalization of UML2.0 Metamodel using Z SpecificationsAhmed M. Mostafa, Manal A. Ismai, Hatem El-Bolok, E. M. Saad. 694-701 [doi]
- An Adaptive Counter Propagation NetworkYi-hong Dong, Chao Sun, Xiaoying Tai. 695-700 [doi]
- A Traceability Link Model for the Unified ProcessPatrick Maeder, Ilka Philippow, Matthias Riebisch. 700-705 [doi]
- A Dyeing Color Matching Method Combining RBF Neural Networks with Genetic AlgorithmsHaitao Li, Aisong Shi, Bingsen Zhang. 701-706 [doi]
- On Testing Multi-threaded Java ProgramsXufang Gong, Yanchen Wang, Ying Zhou, Bixin Li. 702-706 [doi]
- Hierarchical Junction Trees as the Secondary Structure for Inference in Bayesian NetworksDan Wu, Libin Wu. 706-712 [doi]
- Aerodynamic Parameter Fitting Based on Robust Least Squares Support Vector MachinesXusheng Gan, Hongcai Zhnag, Yongmei Cheng, Chao Shi. 707-711 [doi]
- Software Program Cohesion Notion Apply to Evaluating Product Process AssignmentFusheng Qiu, Wenjian Liu. 707-712 [doi]
- Assessment on Fault-tolerance Performance Using Neural Network Model Based on Ant Colony Optimization Algorithm for Fault Diagnosis in Distribution Systems of Electric Power SystemsZhisheng Zhang, Yaming Sun. 712-716 [doi]
- Image Fusion Based on Wavelet TransformMuwei Jian, Junyu Dong, Yang Zhang. 713-718 [doi]
- Noisy Speech Recognition Based on Speech EnhancementXia Wang, Hongmei Tang, Xiaoqun Zhao. 713-716 [doi]
- Efficient Partially Blind Signature from LFSRZheng Gong, Yu Long, Kefei Chen. 717-722 [doi]
- Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal SystemDebin Pang, Ning Zhang. 717-721 [doi]
- Research on RAIM Algorithm under the Assumption of Simultaneous Multiple Satellites FailureQiang Zhang Xiaolin Zhang, Xiaoming Chang. 719-724 [doi]
- HVS-based imperceptibility measure of watermark in watermarked color imageHongmei Yang, Yongquan Liang, Lianshan Liu, Haibin Sun. 722-727 [doi]
- An Approach to Convert Any Threshold Signature into a Threshold Group SignatureGuowen Li, Jia Yu, Rupeng Li, Daxing Li. 723-726 [doi]
- Subframe Interpolation Optimized Coding of LSF ParametersLinliang Chen, Yanping Yu, Kuang Wang. 725-728 [doi]
- A Study of Secure Multi-party Ranking ProblemWen Liu, Shoushan Luo, Ping Chen. 727-732 [doi]
- Detecting Arithmetic of Passenger’s Location Based on Image ProcessingYing Yang, Jing Sheng, Wei Zhou. 728-731 [doi]
- Region-based Image Fusion Using Energy EstimationYingjie Zhang, Liling Ge. 729-734 [doi]
- Speeding up Fractal Image Compression Based on Local Extreme PointsJinshu Han. 732-737 [doi]
- A Survey on Failure Prediction of Large-Scale Server ClustersZhenghua Xue, Xiaoshe Dong, Siyuan Ma, Weiqing Dong. 733-738 [doi]
- A Hierarchical Segmentation Algorithm Based on Mumford and Shah ModelYingjie Zhang, Liling Ge. 735-740 [doi]
- A Combining Approach for Chinese Word SegmentationAiqing Wang, Sen Zhang. 738-743 [doi]
- Alert Verification Based on Attack Classification in Collaborative Intrusion DetectionMin Xiao, Debao Xiao. 739-744 [doi]
- A Synchronous Detection of the Road Boundary and Lane Marking for Intelligent VehiclesWeina Lu, Haifang Wang, Qingzhu Wang. 741-745 [doi]
- Performance Evaluation of TriBA - A Novel Scalable ArchitectureHaroon-Ur-Rashid Khan, Shi Feng. 744-749 [doi]
- A Hybrid Parallel Algorithm for Complex Decision Problem OptimizationYan Luo, Changrui Yu. 745-750 [doi]
- An Event Correlation Synchronization Algorithm for MMOGXiangbin Shi, Fang Liu, Ling Du, Xinghai Zhou, Yuansheng Xing. 746-751 [doi]
- Research on RTOS-Integrated TMR for Fault Tolerant SystemsHao Fu, Ming Cai, Liu Fang, Peng Liu, Jinxiang Dong. 750-755 [doi]
- Eliminating Redundant Communication of Code Generation for Distributed Memory MachinesYanan Shen, Rongcai Zhao, Lei Wang. 751-756 [doi]
- One Solution for Accurate Collision Detection in Virtual Assembly EnvironmentYanfeng Wang, Yi Zheng. 752-757 [doi]
- Bitmap Filtering: An Efficient Speedup Method for XML Structural MatchingFeng Shao, Gang Chen, Lihua Yu, Yijun Bei, Jinxiang Dong. 756-761 [doi]
- Equivalence of the Oscillation of Two Coupled Difference SystemsX. Y. Zeng. 757-761 [doi]
- Reducing the Dimensionality of Feature Vectors for Texture Image Retrieval Based on Wavelet DecompositionJunyu Dong, Muwei Jian, Dawei Gao, Shengke Wang. 758-763 [doi]
- A Modified Model for Private Data Security Facing E-commerceChunyong Yin, Jianshi Li, Ruxia Sun. 762-765 [doi]
- On the Higher Order Difference Equation x::n::+1 = (x::n-k+1::)/(-1+x::n::x::n-1::...x::n-k+1::)L. Y. Wang, D. C. Zhang, B. Shi, X. Y. Zeng. 762-765 [doi]
- Combining Color and Texture and Region with Objects of User s Interest for Content-Based Image RetrievalMuwei Jian, Junyu Dong, Ruichun Tang. 764-769 [doi]
- Approach toward a flexible semantic E-business in Web Service CommunityXuejuan Huang, Xinmeng Chen, Jiazhen Xu, Hua Li, Jinshuo Liu. 766-771 [doi]
- Peirodic Growing of Two Populations Intergrowth SystemYing Gao. 766-769 [doi]
- Parallel Particle Swarm Optimization for Attribute ReductionLei Xu, Fengming Zhang. 770-775 [doi]
- Positive solutions of m-point boundary value problems for second order differential equations with an advanced argumentYanping Guo, Yunhai Wang, Changlong Yu. 770-773 [doi]
- Ontology-Based Semantic Integration Method for Domain-Specific Scientific DataHu Changjun, Zhang Xiaoming, Zhao Qian, Zhao Chongchong. 772-777 [doi]
- Analysis of Source Codes by Beginners in Programming EducationChieko Matsuyama, Toyoshiro Nakashima, Naohiro Ishii. 774-781 [doi]
- Multidimensional Fuzzy Interpolative Reasoning Method Based on /lambda -Width SimilarityBaowen Wang, Qingda Zhang, Wenyuan Liu, Yan Shi. 776-781 [doi]
- A Learner Model for Learning-by-Example ContextYuanfan Zhang, Laurence Capus, Nicole Tourigny. 778-785 [doi]
- SOSRA: Sewice-Oriented Semantic Representation ArchitectureLin Zhang. 782-787 [doi]
- Tailoring Software Evolution ProcessFei Dai, Tong Li. 782-787 [doi]
- Research on Building Polygon Map Generalization AlgorithmZhong Xie, Zi Ye, Liang Wu. 786-791 [doi]
- Research of Information Fusion Evaluation Methodology Based on Dominance relationYunxiang Liu, Weichang Wu, JiaJun Lin. 788-793 [doi]
- Research on Visualization Techniques for Web Usability AnalysisJianli Duan, Ning Zhang. 788-791 [doi]
- Video Transmission over Ad Hoc Networks Using Multiple Description Coding and Clustering-based Multiple PathsYuan Chen, Shengsheng Yu, Jingli Zhou, Jun Fan. 792-797 [doi]
- Image Denoising Based on MORF and Minimization Total VariationChengwu Lu. 792-796 [doi]
- A Design for an Online RSS Reader Based On AJAXLuo Zhong, Shishi Huang, Peng Liu, Yi Yu. 794-798 [doi]
- Improvement of PageRank for Focused CrawlerFuyong Yuan, Chunxia Yin, Jian Liu. 797-802 [doi]
- Rotation Invariant Image Classification based on MPEG-7 Homogeneous Texture DescriptorLei Zhang, Jun Ma, Xinshun Xu, Bo Yuan. 798-803 [doi]
- An Off-Line Divisible E-Cash Scheme Based on Smart CardWenyuan Liu, Yongan Luo, Yali Si, Baowen Wang, Feng Li. 799-804 [doi]
- Generalized Association Rule Mining Algorithms based on Data CubeHong Zhang, Bo Zhang, Lingdong Kong, Zhengxing Cai. 803-808 [doi]
- Research on Topology Discovery for IPv6 NetworkJunhai Luo, Mingyu Fang, Danxia Ye. 804-809 [doi]
- Information Usage System by Static Portal PageKazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii. 805-811 [doi]
- Advances of Research in Fuzzy Integral for Classifiers’ fusionZhizhou Kong, Zixing Cai. 809-814 [doi]
- Design of Multimedia Conference Control System based on SIPJianyun Ni, Jing Luo. 810-814 [doi]
- Study and Application of Web-based Data Mining in E-BusinessYanguang Shen, Lili Xing, Yiting Peng. 812-816 [doi]
- An Efficient K-means Clustering Algorithm Based on Influence FactorsMingwei Leng, Haitao Tang, Xiaoyun Chen. 815-820 [doi]
- Improved BSS Based Schemes for Active SteganalysisBo Xu, Zhenbao Zhang, Jiazhen Wang, Xiaoqin Liu. 815-818 [doi]
- Credit based Fairness Control in Wireless Sensor NetworkShanshan Li, Xiangke Liao, Shaoliang Peng, Peidong Zhu, Jie Jiang. 817-822 [doi]
- A Vision-Based Road Surveillance System Using Improved Background Subtraction and Region Growing ApproachJinglei Zhang, Zhengguang Liu. 819-822 [doi]
- Research on Distributed E-Commerce System ArchitectureYang Xia, Qiang Zhang, Zhao Xu, Zhang Ling. 821-825 [doi]
- Variable Step Size Technique for Adaptive Blind DecorrelationShifeng Ou, Xiaohui Zhao, Ying Gao. 823-826 [doi]
- An Efficient Clustering-Based Method for Data Gathering and Compressing in Sensor NetworksQianqian Ren, Jianzhong Li, Jinbao Li. 823-828 [doi]
- A Policy-Based Framework for Designing Strategies for Service NegotiationCheng Yu, Huamao Gu. 826-831 [doi]
- Speech Enhancement Employing Modified a Priori SNR EstimationShifeng Ou, Xiaohui Zhao, Ying Gao. 827-831 [doi]
- Throughput Performance of Marine STDMA Ad-hoc NetworkHuafeng Wu, Haiguang Chen, Qiang Zhou, Chuanshan Gao. 829-834 [doi]
- An XML-based Representation for Generic Bill of Materials (GBOM)Fusheng Qiu, Wenjian Liu. 832-837 [doi]
- A Kalman Smoothing Algorithm for Speech Enhancement Based on the Properties of Vocal Tract Varying SlowlyHui Li, Xin Wang, Beiqian Dai, Wei Lu. 832-836 [doi]
- A QoS Multicast Routing Algorithm for Wireless Mesh NetworksZongwu Ke, Layuan Li, Qiang Sun, Nianshen Chen. 835-840 [doi]
- Job-attention Replica Replacement StrategyLihua Ai, Siwei Luo. 837-840 [doi]
- Modeling Web Service Choreography and Orchestration with Colored Petri NetsXinguo Deng, Ziyu Lin, Weiqing Chen, Ruliang Xiao, Lina Fang, Ling Li. 838-843 [doi]
- Space-Time Codes Based On Bit Interleaved Quasi-Super-Orthogonal DesignsZhengquan Li, Libing Pan. 841-842 [doi]
- A P2P Architecture for Large-scale VoD ServiceAi Wu, Lianhai Yuan, Xinsong Liu, Kejian Liu. 841-846 [doi]
- Segmentation of color images using multi-FART networkYiwen Dou Guobing Ma. 843-847 [doi]
- A New Supervised Clustering Algorithm for Data Set with Mixed AttributesShijin Li, Yuelong Zhu, Jing Liu, Xiaohua Zhang. 844-849 [doi]
- Exploiting Heterogeneity of Nodes to Enhance Search Performance in Large-Scale Peer-to-Peer NetworkYadong Gong, Xiaola Lin. 847-852 [doi]
- A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video CodingSheng Fang, Xujian Li, Liwei Zhang. 848-853 [doi]
- Evaluation of High-tech Program Based on Rough Set TheoryTinghuai Ma, Meili Tang. 850-854 [doi]
- Building personalized recommendation system in E-Commerce using association rule-based mining and classificationXizheng Zhang. 853-857 [doi]
- Region-based Image Fusion by Using Region PrioritiesYingjie Zhang, Liling Ge. 854-859 [doi]
- A software architecture for real-time embedded systems based on pre-run-time schedulingJia Xu. 858-863 [doi]
- Improved Approach of Seed Point Selection in RPCCL Algorithm for Aerial Remote Sensing Hyper-spectral Data Clustering with Data Dimensionality ReductionXuefeng Liu, Guangrong Ji, Wencang Zhao, Junna Cheng. 860-865 [doi]
- The relation of CMM and software lifecycle modelZhang Sen, Yao Zheng. 864-869 [doi]
- A New Type of Proxy Ring Signature Scheme with Revocable AnonymityChengyu Hu, Daxing Li. 866-868 [doi]
- Ring Blind Signature SchemeChengyu Hu, Daxing Li. 869-871 [doi]
- New Software Quality Metrics for Object-Oriented ProgramsDapeng Liu, Shaochun Xu. 870-875 [doi]
- Attack scenario construction with a new sequential mining techniqueLi Wang, Zhitang Li, Dong Li, Jie Lei. 872-877 [doi]
- Address Fragment-Compact Garbage Collection AlgorithmFei Yang, Baolin Yin. 876-881 [doi]
- Design and implementation of a personal firewall Based on NDIS Intermediate DriversChaokai He. 878-882 [doi]
- A Formal Testing Framework for UML StatechartsXuede Zhan. 882-887 [doi]
- Efficient Identity-based Signature Scheme with Partial Message RecoveryYong Li 0002, Huiyan Chen. 883-888 [doi]
- Fuzzy Many-Valued Context Analysis Based on Formal DescriptionYan Wang, Baoxiang Cao. 888-892 [doi]
- Knowledge Interconnection Based on Binary Semantic Relation AnalysisYuxia Lei, Yan Wang, Baoxiang Cao. 893-898 [doi]
- A New Orientation for Multi-Class SVMTu Xu, Dake He, Yu Luo. 899-904 [doi]
- A Hierarchical Clustering Based on Overlap Similarity MeasureJun Qu, Qingshan Jiang, Fangfei Weng, Zhiling Hong. 905-910 [doi]
- OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale NetworksSirui Yang, Hai Jin, Xiaofei Liao, Hong Yao. 911-916 [doi]
- A Virus Immunization Model Based on Communities in Large Scale NetworksJianhua Sun, Jizha Qin, Shu Chen, Hao Chen, Dingding Li. 917-922 [doi]
- Security Analysis and Improvement of a ( t, n ) Threshold Proxy Signature SchemeFanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li. 923-926 [doi]
- Efficient Modular Exponentiation with Three-Moduli (2:::n::: 1, 2:::n:::+3)Bangju Wang, Huanguo Zhang, Yuhua Wang. 927-931 [doi]
- A Mixed Fast Particle FilterFasheng Wang, Qingjie Zhao, Hongbin Deng. 932-936 [doi]
- Experiment of Phase Unwrapping algorithm in Interferometric Synthetic Aperture SonarJun Yue, Zhinong Zou, Jinsong Tang, Aiqing Wang. 937-942 [doi]
- A New Data Protecting Scheme Based on TPMMingdi Xu, Jian He, Bo Zhang, Huanguo Zhang. 943-947 [doi]
- On the Encryption of Image Decompression with User s IdentityDeyun Yang, Zhengliang Huan. 948-951 [doi]
- Towards Semi-Automatic Generation of Provably Correct Algorithmic ProgramsHaihe Shi, Jinyun Xue. 952-957 [doi]
- Distributed Secure Information Sharing Model for E-Government in ChinaXin Lü. 958-962 [doi]
- QoS Performance Analysis in Deployment of DiffServ Aware MPLS Traffic EngineeringDongli Zhang, Dan Ionescu. 963-967 [doi]
- Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area NetworksWei Zhang, Jingsha He. 968-973 [doi]
- Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar TrafficRuyan Wang, Dapeng Wu, Fang Guo. 974-978 [doi]
- Research on XML United-Signature Technology and Its ImplementationJiaxin Qiao. 979-983 [doi]
- Experimentation of Interferometric Synthetic Aperture SonarJun Yue, Ming Chen, Jinsong Tang. 984-988 [doi]
- A Robust 3D Model Watermarking Scheme Based on Feature RecognitionShuguo Yang, Chunxia Li, Shenghe Sun, Yaoqun Xu. 989-993 [doi]
- Trustable Ad Hoc Networks of Agent SocietiesKaiyu Wan, Vasu S. Alagar, Zongyuan Yang. 994-1000 [doi]
- Clustering Ensemble based on the K-NN AlgorithmFangfei Weng, Qingshan Jiang, Lifei Chen, Zhiling Hong. 1001-1006 [doi]
- An Improved Attribute Reduction Algorithm Based on Rough SetHaijun Wang, Shaoliang Wei, Yimin Chen. 1007-1010 [doi]
- Mining of Reuse Patterns in CDMA Network OptimizationWen Ye, Hongxu Cui. 1011-1016 [doi]
- A Connection Degree-Based Rough Set Model and its Application to Knowledge ReductionLiuling Dai, Bing Huang, Dongxiao Yang. 1017-1021 [doi]
- Incorporating a PMF-Based Injury Model into a Multi-Agent Representation of Crowd BehaviorFrederic (Rick) D. McKenzie, Herbie H. Piland III, Min Song. 1022-1027 [doi]
- SINS/GPS Integrated Navigation for AUV with RBF-Neural NetworkQi Wang, Xiaosu Xu. 1028-1033 [doi]
- An Adaptive Probability Access Mechanism for Wireless Sensor NetworkWei Liang, Haibin Yu, Chang Che. 1040-1045 [doi]
- A Mesh-Based QoS Aware Multicast Routing ProtocolDayin Promkotwong, Ohm Sornil. 1046-1051 [doi]
- An Improved Estimation Algorithm for User Vertical Protection LevelXijun Zhu, Zhimin Li, Yueming Dai. 1052-1055 [doi]
- Solutions of fractional differential equations with constant coefficientsChunhai Kou, Xiuyun Zhang. 1056-1059 [doi]
- Numerical Stability of Delay Integro-Differential Equations under Resolvent ConditionsJinjun Zhao, Yang Xu. 1060-1063 [doi]
- Matrix Method for Principal Normal Form of Propositional FormulaTingming Wang, Aiqing Wang. 1064-1067 [doi]
- Application of Concurrent Subspace Design to Shape Design of Automatic Underwater Vehicle*Peng Wang, Baowei Song, Yonghu Wang, Lichuan Zhang. 1068-1071 [doi]
- Modeling electronic institutions with extended colored Petri netGuoyong Cai, Ji Gao, Yong Huang. 1072-1077 [doi]
- OR-ATP: An Operation Refinement Approach As a Process of Automatic Theorem ProvingShuaiqiang Wang, Jiancheng Wan, Jinkui Hou. 1078-1083 [doi]
- Culture-Centered Design: Cultural Factors in Interface Usability and Usability testsHuiyang Li, Xianghong Sun, Kan Zhang. 1084-1088 [doi]
- A Collaborative Retrieval System--Full Text Base and DatabaseChuanyao Yang, Yuqin Li, Zhenghua Wang, Chenghong Zhang, Yunfa Hu. 1089-1094 [doi]
- Efficient XML query using Relational Data ModelSungchul Hong, Yeong-Tae Song. 1095-1100 [doi]
- Two Symmetrical Decomposition Methods for Structure-complex Petri Net and Their ApplicationsQingtian Zeng. 1101-1106 [doi]
- A Dynamic and Interactive Diagnosing and Testing Method for Development of Digital TV Receiver SystemGuangde Wang, Fang Miao, WenJia Zhang, Hongyang Yu. 1107-1112 [doi]
- Documents Distribution Strategy Based on Queuing Model and Chaotic Searching Algorithm in Web Server ClusterZhi Xiong, Chengcheng Guo. 1113-1118 [doi]
- Concept Index for Document Retrieval with Peer-to-Peer NetworkWenhui Ma, Wenbin Fang, Gang Wang, Jing Liu. 1119-1123 [doi]
- Automated Test Data Generation Algorithm Based On Reversed Binary TreeJunyi Li, Jiaguang Sun. 1124-1128 [doi]
- Prioritized Constraints with Data Sampling Scores for Automatic Test Data GenerationXiao Ma, J. Jenny Li, David M. Weiss. 1129-1134 [doi]
- Performance Modeling and Evaluation of e-commerce Systems Using UML 2.0D. Evangelin Geetha, Ch. Ram Mohan Reddy, T. V. Suresh Kumar, K. Rajani Kanth. 1135-1140 [doi]
- Security Analysis for Internet Banking ModelsOsama Dandash, Phu Dung Le, Bala Srinivasan. 1141-1146 [doi]
- A Yellow Page Information Retrieval System Based on Sorted Duality Interrelevant Successive Tree and Industry OntologyChuanyao Yang, Yuqin Li, Zhenghua Wang, Chenghong Zhang, Yunfa Hu. 1147-1152 [doi]
- The Architecture of CAR Component Web ServiceMingyi Mao, Zhicheng Chen, Qian Mo. 1153-1157 [doi]
- Study on the E-Government Information Sources Exchange Based on Directory ServiceXingkai Yang, Chengshu Lü, Yanzhang Wang. 1158-1163 [doi]
- XSS application worms: New Internet infestation and optimized protective measuresJayamsakthi Shanmugam, M. Ponnavaikko. 1164-1169 [doi]
- Automatic attack plan recognition from intrusion alertsLi Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang. 1170-1175 [doi]
- A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem Fengyin Li, Jiguo Yu, Hongwei Ju. 1176-1182 [doi]