Volume 14,Issue 1,2003 Table of Contents
Diagnostic Information Generation in Model Checking Value-Passing ProcessesLIU Jian and LIN Hui-Min2003,14(1):1-8 [Abstract(4055)] [View PDF(5267)1.05 M]Characterizations of Quantum AutomataQIU Dao-Wen2003,14(1):9-15 [Abstract(3666)] [View PDF(4715)664.00 K]Translating γ-Calculus into Action CalculusJIN Ying and JIN Cheng-Zhi2003,14(1):16-22 [Abstract(3751)] [View PDF(4880)646.85 K]Automata and Grammars Theory Based on Quantum LogicQIU Dao-Wen2003,14(1):23-27 [Abstract(4159)] [View PDF(5165)535.30 K]A Massive Data Sort Algorithm Based on Serpentine TapeLI Jian-Zhong and ZHANG Yan-Qiu2003,14(1):28-34 [Abstract(5060)] [View PDF(5428)595.29 K]A Multilevel Reduction Algorithm to TSPZOU Peng,ZHOU Zhi,CHEN Guo-Liang and GU Jun2003,14(1):35-42 [Abstract(4255)] [View PDF(6610)906.15 K]A Cooperative Checkpointing Algorithm with Message Complexity O(n)WANG Dong-Sheng and SHAO Ming-Long2003,14(1):43-48 [Abstract(4167)] [View PDF(5047)553.10 K]Improvement of a Distributed Termination Detection AlgorithmLIU Xu-Min and SU Yun-Lin2003,14(1):49-53 [Abstract(4455)] [View PDF(4825)466.56 K]Specification and Verification of the Triple-Modular Redundancy Fault-Tolerant SystemGUO Liang and TANG Zhi-Song2003,14(1):54-61 [Abstract(4364)] [View PDF(5082)766.54 K]A Process Meta-Model Supporting Dynamic Change of WorkflowSUN Rui-Zhi and SHI Mei-Lin2003,14(1):62-67 [Abstract(4293)] [View PDF(6265)518.63 K]An Approach to Static Prediction and Visual Analysis of Program Execution TimeSUN Chang-Ai,JIN Mao-Zhong,LIU Chao and LIU Chao2003,14(1):68-75 [Abstract(4133)] [View PDF(5830)751.26 K]Task-Based Access Control ModelDENG Ji-Bo and HONG Fan2003,14(1):76-82 [Abstract(9103)] [View PDF(12563)614.90 K]Analysis for Scheduling Theory and Approach of Open Real-Time SystemZOU Yong,LI Ming-Shu and WANG Qing2003,14(1):83-90 [Abstract(4083)] [View PDF(6696)659.49 K]History Sensitivity of the Multilevel Security PoliciesSHI Wen-Chang and SUN Yu-Fang2003,14(1):91-96 [Abstract(4551)] [View PDF(5581)651.13 K]Research and Implementation of Jade Bird Object-Oriented Software Modeling ToolMA Zhi-Yi,ZHAO Jun-Feng,MENG Xiang-Wen and ZHANG Wen-Juan2003,14(1):97-102 [Abstract(5436)] [View PDF(5595)563.88 K]A UML-Based Model Analysis Method in Hardware-Software CodesignCHEN Si-Gong,QIN Xiao and ZHANG Heng-Chong2003,14(1):103-109 [Abstract(4133)] [View PDF(5949)608.01 K]A Distributed Web Server System Based on Cooperative Cache Using TagLIN Man-Yun and QIAN Hua-Lin2003,14(1):117-123 [Abstract(3609)] [View PDF(5195)603.23 K]A Theory of Generalized Multi-Rate Multicast Weight-Based Fair Rate AllocationZHAI Ming-Yu and GU Guan-Qun2003,14(1):124-131 [Abstract(3751)] [View PDF(5253)814.43 K]A Clustering Algorithm Applied to the Management of Mobile Ad Hoc NetworkFENG Yong-Xin,WANG Guang-Xing,LIU Zhi-Guo and JIANG Yue-Qiu2003,14(1):132-138 [Abstract(3646)] [View PDF(6058)566.81 K]Commitment of Mobile Distributed Real-Time Nested TransactionLIU Yun-Sheng,LIAO Guo-Qiong,LI Guo-Hui and XIA Jia-Li2003,14(1):139-145 [Abstract(3817)] [View PDF(4916)641.40 K]Cheat-Proof Secret Share Schemes Based on RSA and One-Way FunctionFEI Ru-Chun and WANG Li-Na2003,14(1):146-150 [Abstract(4198)] [View PDF(5818)479.41 K]Key Management for Secure Multicast Using Huffman HierarchyQU Jin1,GE Jian-Hua and JIANG Ming2003,14(1):151-156 [Abstract(3754)] [View PDF(5356)578.86 K]
A Survey on Internet Measurement and AnalysisZHANG Hong-Li,FANG Bin-Xing,HU Ming-Zeng,JIANG Yu,ZHAN Chun-Yan and ZHANG Shu-Feng2003,14(1):110-116 [Abstract(8664)] [View PDF(11224)675.66 K]