JOURNAL OF COMPUTERS (JCP)
ISSN : 1796-203X
Volume : 4    Issue : 3    Date : March 2009

Special Issue: Selected Best Papers of International Workshop on Knowledge Discovery and
Data Mining 2008 (WKDD 2008) - Track on Innovative Computing
Guest Editors: Qi Luo and Ben K. M. Sim

Article Information


Editorial
Qi Luo and Ben K. M. Sim
Page(s): 177-178
Abstract  |  Full Text: PDF (84 KB)


A New T-F Function Approach for Discrete Global Optimization
Weixiang Wang and Youlin Shang
Page(s): 179-183
Abstract  |  Full Text: PDF (110 KB)


A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol
Bo Meng
Page(s): 184-192
Abstract  |  Full Text: PDF (208 KB)


Design Web Services: Towards Service Reuse at the Design Level
Wang Chu and Depei Qian
Page(s): 193-200
Abstract  |  Full Text: PDF (129 KB)


DL(2m): A New Scalable Interconnection Network for System-on-Chip
Youyao Liu, Jungang Han, and Huimin Du
Page(s): 201-207
Abstract  |  Full Text: PDF (190 KB)


Stream Data Classification Using Improved Fisher Discriminate Analysis
Ling Chen, Ling-Jun Zou, Li Tu
Page(s): 208-214
Abstract  |  Full Text: PDF (182 KB)


MCs Detection with Combined Image Features and Twin Support Vector Machines
Xinsheng Zhang, Xinbo Gao, and Ying Wang
Page(s): 215-221
Abstract  |  Full Text: PDF (143 KB)


A Novel Secure Terminal System Based on Trusted Hardware: U-Key
Wei-Peng Liu, Jun Hu, and Xing  Zhang
Page(s): 222-229
Abstract  |  Full Text: PDF (165 KB)


An Improved KNN Text Classification Algorithm Based on Clustering
Yong Zhou, Youwen Li, and Shixiong Xia
Page(s): 230-237
Abstract  |  Full Text: PDF (177 KB)


HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience
Yan Liu, Renfa Li, Cheng Xu, and Fei Yu
Page(s): 238-244
Abstract  |  Full Text: PDF (337 KB)


Application of Refined LSA and MD5 Algorithms in Spam Filtering
Jingtao Sun, Qiuyu Zhang, and Zhanting Yuan
Page(s): 245-250
Abstract  |  Full Text: PDF (123 KB)


Dynamic Modeling of Biotechnical Process Based on Online Support Vector Machine
Xianfang Wang, Zhiyong Du, Jindong Chen, and Feng Pan
Page(s): 251-258
Abstract  |  Full Text: PDF (173 KB)


Topology and Routing Algorithm Based on the Combination Gray Code with Johnson Code
Xiaoqiang Yang, Huimin Du, and Jungang Han
Page(s): 259-264
Abstract  |  Full Text: PDF (141 KB)


Evaluation Research on the Quality of the Railway Passenger Service Based on the Linguistic
Variables and the Improved PROMETHEE-II Method
Peide Liu and Zhongliang Guan
Page(s): 265-270
Abstract  |  Full Text: PDF (129 KB)


Research on E-mail Filtering Based On Improved Bayesian
Pei-yu Liu, Li-wei Zhang, and Zhen-fang Zhu
Page(s): 271-275
Abstract  |  Full Text: PDF (120 KB)


Risk Evaluation Method of High-technology Based on Uncertain Linguistic Variable and TOPSIS
Method
Yongqing Wei and Peide Liu
Page(s): 276-282
Abstract  |  Full Text: PDF (121 KB)