Volume 16,Issue 1,2005 Table of Contents
Thinking on the Development of Software Engineering TechnologyYANG Fu-Qing2005,16(1):1-7 [Abstract(22719)] [View PDF(24016)614.61 K]A Description Approach to Software by HOQ Extension Concept and Its Quantitative StructuralizationXIONG Wei,Yoshimichi WATANABE and Hisakazu SHINDO2005,16(1):8-16 [Abstract(4122)] [View PDF(6145)826.90 K]An Approach for Detecting Correlated Software DefectsJING Tao,JIANG Chang-Hai,HU De-Bin,BAI Cheng-Gang and CAI Kai-Yuan2005,16(1):17-28 [Abstract(4916)] [View PDF(6520)1.57 M]Multi-Modal Interaction in Handheld Mobile ComputingWANG Yue,YUE Wei-Ning,WANG Heng and DONG Shi-Hai2005,16(1):29-36 [Abstract(4741)] [View PDF(6722)317.63 K]Modeling Variability in Software Product FamilyZOU Sheng-Xiang,ZHANG Wei,ZHAO Hai-Yan and MEI Hong2005,16(1):37-49 [Abstract(5331)] [View PDF(5830)1.15 M]Research on Pen-Based Interaction Information ModelLI Jie,TIAN Feng and DAI Guo-Zhong2005,16(1):50-57 [Abstract(3713)] [View PDF(6240)747.27 K]A Finite Element Segmentation Algorithm for Jacquard ImageFENG Zhi-Lin,YIN Jian-Wei,CHEN Gang and DONG Jin-Xiang2005,16(1):58-66 [Abstract(4435)] [View PDF(6064)1.18 M]An Image Segmentation and Its Algorithm Based on Fuzzy ConnectednessPAN Jian-Jiang,YANG Xun-Nian and WANG Guo-Zhao2005,16(1):67-76 [Abstract(4299)] [View PDF(7500)985.35 K]An Efficient Approach to Extraction of Region of InterestZHANG Hong-Mei,BIAN Zheng-Zhong,GUO You-Min and YE Min2005,16(1):77-88 [Abstract(5126)] [View PDF(5424)1.90 M]An Improved Rate Monotonic Schedulability Test AlgorithmLIU Jun-Xiang,WANG Yong-Ji and Matthew Cartmell2005,16(1):89-100 [Abstract(5432)] [View PDF(5443)1.03 M]Dynamic Scheduling Algorithms with Software Fault-Tolerance in Hard Real-Time SystemsLI Qing-Hua,HAN Jian-Jun,Abbas A Essa and ZHANG Wei2005,16(1):101-107 [Abstract(4280)] [View PDF(5795)668.35 K]Fast Real-Time Adaptive Audio Mixing Schemes in Multimedia ConferencingFAN Xing,GU Wei-Kang and YE Xiu-Qing2005,16(1):108-115 [Abstract(4402)] [View PDF(6722)860.23 K]A Non-Interactive Protocol for Member Expansion in a Secret Sharing SchemeDONG Pan,KUANG Xiao-Hui and LU Xi-Cheng2005,16(1):116-120 [Abstract(4158)] [View PDF(5440)448.90 K]Safety Critical Real-Time Networks Based on Ethernet TechnologyYANG Shi-Ping,SANG Nan and XIONG Guang-Ze2005,16(1):121-134 [Abstract(3911)] [View PDF(5590)1004.13 K]A Transparent Low-Cost Recovery Protocol for Mobile-to-Mobile CommunicationLI Qing-Hua,JIANG Ting-Yao and ZHANG Hong-Jun2005,16(1):135-144 [Abstract(4039)] [View PDF(5463)749.22 K]A Clone Based Multicast Algorithm with Adjustable ParameterLIU Fang and YANG Hai-Chao2005,16(1):145-150 [Abstract(4035)] [View PDF(5253)597.51 K]An Efficient Revocation Algorithm in ACJT Group SignatureCHEN Ze-Wen,WANG Ji-Lin,HUANG Ji-Wu,WANG Yu-Min and HUANG Da-Ren2005,16(1):151-157 [Abstract(3945)] [View PDF(5872)701.21 K]Connection Management Based on Gnutella NetworkZHUANG Lei,PAN Chun-Jian,GUO Yong-Qiang and WANG Cong-Yin2005,16(1):158-164 [Abstract(4459)] [View PDF(5967)666.54 K]