Advanced Search

    column
    Delay-Tolerant Network Routing Algorithm
    Xiao Mingjun and Huang Liusheng
    2009, 46(7): 1065-1073.
    Abstract PDF
    Model Analysis for ARQ Based Multi-Link Forwarding Strategy in WSN
    Zhu Hongsong, Xu Yongjun, Li Xiaowei, Sun Limin
    2009, 46(7): 1074-1085.
    Abstract PDF
    An Improved PI Active Queue Management Algorithm Based on Network State Parameters Estimation
    Liu Feng, Dang Xiaolin, and Xu Zhen
    2009, 46(7): 1086-1093.
    Abstract PDF
    A Fair-Oriented Two-Level Scheduling Scheme for QoS Guarantee in WiMAX
    Chen Ting, Li Jiandong, Zhong Shaobo, Li Changle
    2009, 46(7): 1094-1101.
    Abstract PDF
    An Authentication Protocol for Station Roaming in WLAN Mesh
    Cao Chunjie, Yang Chao, Ma Jianfeng, Zhu Jianming
    2009, 46(7): 1102-1109.
    Abstract PDF
    Modeling and Analysis of Divide-and-Rule-Hybrid-Benign Worms
    Zhou Hanxun, Zhao Hong, Wen Yingyou
    2009, 46(7): 1110-1116.
    Abstract PDF
    Automatic Performance Tuning of Sparse Matrix-Vector Multiplication:Implementation Techniques and Its Application Research
    Yuan E, Zhang Yunquan, Liu Fangfang, Sun Xiangzheng
    2009, 46(7): 1117-1126.
    Abstract PDF
    A Fault Injection Model of Component Security Testing
    Chen Jinfu, Lu Yansheng, and Xie Xiaodong
    2009, 46(7): 1127-1135.
    Abstract PDF
    Automatic Grading of Student Programs Based on Program Understanding
    Ma Peijun, Wang Tiantian, and Su Xiaohong
    2009, 46(7): 1136-1142.
    Abstract PDF
    Integration Verification of Workflow Business Rule Semantic
    Li Haibo, Zhan Dechen, Xu Xiaofei
    2009, 46(7): 1143-1151.
    Abstract PDF
    Trustworthy Software Evaluation Using Utility Based Evidence Theory
    Yang Shanlin, Ding Shuai, and Chu Wei
    2009, 46(7): 1152-1159.
    Abstract PDF
    Conformant Planning as Modal Logic Axiomatic System D
    Lü Shuai, Liu Lei, Li Ying, and Shi Lian
    2009, 46(7): 1160-1168.
    Abstract PDF
    Qualitative Spatial Reasoning for Multi-Dimensional Topology and Size Relations
    Wang Shengsheng, Liu Jie, Wang Xinying, and Liu Dayou
    2009, 46(7): 1169-1175.
    Abstract PDF
    Search Result Clustering Method Based on SOM and LSI
    Chen Yiheng, Qin Bing, Liu Ting, Wang Ping, and Li Sheng
    2009, 46(7): 1176-1183.
    Abstract PDF
    Temporal Multi-Document Summarization Based on Macro-Micro Importance Discriminative Model
    He Ruifang, Qin Bing, Liu Ting, Pan Yuequn, and Li Sheng
    2009, 46(7): 1184-1191.
    Abstract PDF
    A Computer Model of Directional Visual Attention
    Zhao Hongwei, Wang Hui, Liu Pingping, and Dai Jinbo
    2009, 46(7): 1192-1197.
    Abstract PDF
    Scene Image Categorization Based on Content Correlation
    Qin Lei, Gao Wen
    2009, 46(7): 1198-1205.
    Abstract PDF
    Effective Property and Best Combination of Classifier Linear Combination
    Fu Zhongliang
    2009, 46(7): 1206-1216.
    Abstract PDF
    A Data Privacy Preservation Method Based on Lossy Decomposition
    Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, Yin Jian
    2009, 46(7): 1217-1225.
    Abstract PDF
    Normalization of XML Document with Strong MVD under Incomplete Information Circumstances
    Yin Lifeng, Hao Zhongxiao
    2009, 46(7): 1226-1233.
    Abstract PDF
    A Single Open-Defect Analysis Method for Power/Ground Networks
    Luo Zuying, Zhang Yubin, Yu Xianchuan
    2009, 46(7): 1234-1240.
    Abstract PDF