A novel computer architecture to prevent destruction by viruses Gao QingshiHu YueLiu Honglan Regular Papers Pages: 241 - 248
Mandarin pronunciation modeling based on CASS corpus Zheng FangSong ZhanjiangWilliam Byrne Regular Papers Pages: 249 - 263
From active to passive — Progress in testing internet routing protocols Zhao YixinJu JianpingXia Yin Regular Papers Pages: 264 - 283
An algebraic hardware/software partitioning algorithm Qin ShengchaoHe JifengZhang Naixiao Regular Papers Pages: 284 - 294
Effective discovery of exception class association rules Zhou AoyingWei LiYu Fang Regular Papers Pages: 304 - 313
Singularity analysis of geometric constraint systems Peng XiaoboChen LipingZhou Ji Correspondence Pages: 314 - 323
A new algorithm for generalized optimal discriminant vectors Wu XiaojunYang JingyuCao Qiying Correspondence Pages: 324 - 330
Agent cooperation based control integration by activity-sharing and joint intention Gao JiLin Donghao Correspondence Pages: 331 - 339
An algorithm based on tabu search for satisfiability problem Huang WenqiZhang DefuWang Houxiang Correspondence Pages: 340 - 346
Automatic image-based pencil sketch rendering Wang JinBao HujunXu Yingqing Correspondence Pages: 347 - 355
Study of general incomplete star interconnection networks Shi YuntaoHou ZifengSong Jianping Notes Pages: 356 - 361
Two accelerating techniques for 3D reconstruction Liu ShixiaHu ShiminSun Jiaguang Notes Pages: 362 - 368