Volume 23,
Number 1,
January 2008
- Xiao-Dong Li, Wenjian Luo, Xin Yao:
Preface.
1
- Xiaomin Hu, Jun Zhang, Yun Li:
Orthogonal Methods Based Ant Colony Search for Solving Continuous Optimization Problems.
2-18
- Ehab Z. Elfeky, Ruhul A. Sarker, Daryl Essam:
Analyzing the Simple Ranking and Selection Process for Constrained Evolutionary Optimization.
19-34
- Nan Ding, Shude Zhou, Zengqi Sun:
Histogram-Based Estimation of Distribution Algorithm: A Competent Method for Continuous Optimization.
35-43
- Lam Thu Bui, Kalyanmoy Deb, Hussein A. Abbass, Daryl Essam:
Interleaving Guidance in Evolutionary Multi-Objective Optimization.
44-63
- Grant Dick, Peter A. Whigham:
Spatially-Structured Sharing Technique for Multimodal Problems.
64-76
- Daniel Kunkle, Donghui Zhang, Gene Cooperman:
Mining Frequent Generalized Itemsets and Generalized Association Rules Without Redundancy.
77-102
- Zhenhua Huang, Jiankui Guo, Sheng-Li Sun, Wei Wang:
Efficient Optimization of Multiple Subspace Skyline Queries.
103-111
- Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu:
Clustering Text Data Streams.
112-128
- Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.
129-140
- Han-Xin Sun, Kun-Peng Yang, Yulai Zhao, Dong Tong, Xu Cheng:
CASA: A New IFU Architecture for Power-Efficient Instruction Cache and TLB Designs.
141-153
- Cheng-Dong Jiang, Guo-Liang Chen:
Double Barrier Coverage in Dense Sensor Networks.
154-165
Volume 23,
Number 2,
March 2008
- Sheng Zhong, Rui Xue:
Preface.
165
- Rui Xue, Ninghui Li, Jiangtao Li:
Algebraic Construction for Zero-Knowledge Sets.
166-175
- Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki:
WWW Business Applications Based on the Cellular Model.
176-187
- Grigorios Loukides, Jianhua Shao:
An Efficient Clustering Algorithm for k -Anonymisation.
188-202
- Chun-Lin Xin, Wei-Min Ma, Lei Yang:
Competitive Analysis of Two Special Online Device Replacement Problems.
203-213
- Baodong Qin, Ming Li, Fanyu Kong:
Cryptanalysis of a Type of CRT-Based RSA Algorithms.
214-221
- Jibao Lai, Huiqiang Wang, Xiaowu Liu, Ying Liang, Ruijuan Zheng, Guo-sheng Zhao:
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization.
222-230
- Bo Chen, Hui He, Jun Guo:
Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis.
231-239
- Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao:
Generic Transformation from Weakly to Strongly Unforgeable Signatures.
240-252
- Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin:
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
253-264
- Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
265-269
- Yanli Liu, Jin Wang, Xi Chen, Yanwen Guo, Qunsheng Peng:
A Robust and Fast Non-Local Means Algorithm for Image Denoising.
270-279
- Yueh-Yi Lai, Wen-Kai Tai:
Transition Texture Synthesis.
280-289
- Jia Li, Liyong Shen, Xiao-Shan Gao:
Proper Reparametrization of Rational Ruled Surface.
290-297
- Zusong Li, Dandan Huan, Weiwu Hu, Zhimin Tang:
Chip Multithreaded Consistency Model.
298-305
Volume 23,
Number 3,
May 2008
- Miaomiao Wang, Jiannong Cao, Jing Li, Sajal K. Das:
Middleware for Wireless Sensor Networks: A Survey.
305-326
- Jie Wu, Shuhui Yang:
SmallWorld Model-Based Polylogarithmic Routing Using Mobile Nodes.
327-342
- Vaishali P. Sadaphal, Bijendra N. Jain:
Random and Periodic Sleep Schedules for Target Detection in Sensor Networks.
343-354
- Xiao-Lin Li, Jiannong Cao:
Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications.
355-364
- Kan Cai, Michael J. Feeley, Brendan Cully, Sharath J. George:
Understanding Performance for Two 802.11 Competing Flows.
365-376
- Fereshteh Amini, Moazzam Khan, Jelena V. Misic, Hossein Pourreza:
Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange.
377-388
- Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou:
Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis.
389-399
- Michele Garetto, Marco Gribaudo, Carla-Fabiana Chiasserini, Emilio Leonardi:
Sensor Deployment and Relocation: A Unified Scheme.
400-412
- Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal:
ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks.
413-425
- Feng Lu, Liang-Tien Chia, Kok-Leong Tay, Wai-Hoe Chong:
NBgossip: An Energy-Efficient Gossip Algorithm for Wireless Sensor Networks.
426-437
- Juan A. Sánchez, Rafael Marín-Pérez, Pedro M. Ruiz:
Beacon-Less Geographic Routing in Real Wireless Sensor Networks.
438-450
- François Ingelrest, David Simplot-Ryl:
Maximizing the Delivery of MPR Broadcasting Under Realistic Physical Layer Assumptions.
451-460
- Jaime Lloret, Miguel Garcia, Jesús Tomás, Fernando Boronat:
GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks.
461-480
Volume 23,
Number 4,
July 2008
- Haixun Wang, Jian Pei:
Clustering by Pattern Similarity.
481-496
- Lu-An Tang, Bin Cui, Hong-Yan Li, Gaoshan Miao, Dongqing Yang, Xinbiao Zhou:
PGG: An Online Pattern Based Approach for Stream Variation Management.
497-515
- Byron Choi, Gao Cong, Wenfei Fan, Stratis Viglas:
Updating Recursive XML Views of Relations.
516-537
- Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin:
Continually Answering Constraint k - NN Queries in Unstructured P2P Systems.
538-556
- Xian Zhang, Yu Hao, Xiaoyan Zhu, Ming Li:
New Information Distance Measure and Its Application in Question Answering System.
557-572
- Loris Nanni, Alessandra Lumini:
Cluster-Based Nearest-Neighbour Classifier and Its Application on the Lightning Classification.
573-581
- Xiaoyong Fang, Zhigang Luo, Zhenghua Wang:
Predicting RNA Secondary Structure Using Profile Stochastic Context-Free Grammars and Phylogenic Analysis.
582-589
- Hao Lang, Bin Wang, Gareth J. F. Jones, Jin-Tao Li, Fan Ding, Yi-Xuan Liu:
Query Performance Prediction for Information Retrieval Based on Covering Topic Score.
590-601
- Xu Sun, Houfeng Wang, Bo Wang:
Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression.
602-611
- Hai Zhao, Chunyu Kit:
Scaling Conditional Random Fields by One-Against-the-Other Decomposition.
612-619
- Weiwu Hu, Jian Wang:
Making Effective Decisions in Computer Architects' Real-World: Lessons and Experiences with Godson-2 Processor Designs.
620-632
- Qiong Zou, Xiao-Feng Li, Long-Bing Zhang:
Runtime Engine for Dynamic Profile Guided Stride Prefetching.
633-643
- Jigang Wu, Thambipillai Srikanthan, Guang-Wei Zou:
New Model and Algorithm for Hardware/Software Partitioning.
644-651
- Tiziana Calamoneri, Saverio Caminiti, Rossella Petreschi:
A General Approach to L ( h, k )-Label Interconnection Networks.
652-659
- Renyi Xiao:
Survey on Anonymity in Unstructured Peer-to-Peer Systems.
660-671
- Nan Du, Bai Wang, Bin Wu:
Community Detection in Complex Networks.
672-683
- Youjian Zhao, Zuhui Yue, Jian-Ping Wu:
Research on Next-Generation Scalable Routers Implemented with H-Torus Topology.
684-693
Volume 23,
Number 5,
September 2008
- Markus Hinkelmann, Andreas Jakoby, Peer Stechert:
t-Private and t-Secure Auctions.
694-710
- Bing Yang, Jing Chen, Enyue Lu, Si-Qing Zheng:
Design and Performance Evaluation of Sequence Partition Algorithms.
711-718
- Avraham Trakhtman:
Some Aspects of Synchronization of DFA.
719-727
- Xuehou Tan, Bo Jiang:
Searching a Polygonal Region by Two Guards.
728-739
- Wei-Lin Li, Peng Zhang, Daming Zhu:
On Constrained Facility Location Problems.
740-748
- Florian Diedrich, Rolf Harren, Klaus Jansen, Ralf Thöle, Henning Thomas:
Approximation Algorithms for 3D Orthogonal Knapsack.
749-762
- Jianxin Wang, Xiaoshuang Xu, Jianer Chen:
Approximation Algorithm Based on Chain Implication for Constrained Minimum Vertex Covers in Bipartite Graphs.
763-768
- Weiming Wang, Ligang Dong, Bin Zhuge:
Analysis and Implementation of an Open Programmable Router Based on Forwarding and Control Element Separation.
769-779
- Shaoliang Peng, Shanshan Li, Lei Chen, Yuxing Peng, Nong Xiao:
Scalable Base-Station Model-Based Multicast in Wireless Sensor Networks.
780-791
- Dong-nian Cheng, Yuxiang Hu, Cai-xia Liu:
Parallel Algorithm Core: A Novel IPSec Algorithm Engine for Both Exploiting Parallelism and Improving Scalability.
792-805
- Lizhong Dai, Dongmei Zhao:
Uplink Scheduling for Supporting Real Time Voice Traffic in IEEE 802.16 Backhaul Networks.
806-814
- Pisai Setthawong, Surat Tanterdtid:
Flood Avoidance Mechanisms for Bridged Resilient Packet Rings.
815-824
- Jun-Wu Dong, Dingyi Pei, Xue-Li Wang:
A Class of Key Predistribution Schemes Based on Orthogonal Arrays.
825-831
- Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang:
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.
832-842
- Zhixiong Chen, Shengqiang Li:
Some Notes on Generalized Cyclotomic Sequences of Length pq.
843-850
- Murat Ekinci, Murat Aykut:
Palmprint Recognition by Applying Wavelet-Based Kernel PCA.
851-861
- Gang Xu, Guozhao Wang, Xiao-Diao Chen:
Free-Form Deformation with Rational DMS-Spline Volumes.
862-873
- Kangwoo Lee:
Guiding Attention by Cooperative Cues.
874-884
Volume 23,
Number 6,
November 2008
- Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcarin, Maurizio Morisio:
Synthesizing Service Composition Models on the Basis of Temporal Business Rules.
885-894
- Gang Huang, Lianshan Sun:
An Access Control Framework for Reflective Middleware.
895-904
- Hua-Ming Liao, Guo-Shun Pei:
Cache-Based Aggregate Query Shipping: An Efficient Scheme of Distributed OLAP Query Processing.
905-915
- Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang:
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks.
916-928
- Donggeon Noh, Heonshik Shin:
URECA: Efficient Resource Location Middleware for Ubiquitous Environment.
929-943
- Xue Zhang, Jue Hong, Sanglu Lu, Li Xie, Jiannong Cao:
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks.
944-956
- Yongxuan Lai, Yilong Chen, Hong Chen:
PEJA: Progressive Energy-Efficient Join Processing for Sensor Networks.
957-972
- Hong Shen, Yu Zhang:
Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows.
973-987
- Jianhua Feng, Guoliang Li, Na Ta:
A Semantic Cache Framework for Secure XML Queries.
988-997
- Nan Chen, Lidan Shou, Gang Chen, Jinxiang Dong:
Adaptive Indexing of Moving Objects with Highly Variable Update Frequencies.
998-1014
- Bai-Lin Yang, Frederick W. B. Li, Zhi-Geng Pan, Xun Wang:
An Effective Error Resilient Packetization Scheme for Progressive Mesh Transmission over Unreliable Networks.
1015-1025
- Chandrajit L. Bajaj, Guoliang Xu, Qin Zhang:
Higher-Order Level-Set Method and Its Application in Biomolecular Surfaces Construction.
1026-1036
- Da Wang, Yu Hu, Huawei Li, Xiaowei Li:
Design-for-Testability Features and Test Implementation of a Giga Hertz General Purpose Microprocessor.
1037-1046
Copyright © Fri Mar 12 17:29:57 2010
by Michael Ley (ley@uni-trier.de)