Volume 17,Issue 1,2006 Table of Contents
Reachability Checking of Finite Precision Timed AutomataYan RJ,Li GY,Xu YB,Liu CM and Tang ZS2006,17(1):1-10 [Abstract(5066)] [View PDF(5352)708.55 K]Petri Net Refinement and Its Application in System DesignXIA Chuan-Liang,JIAO Li and LU Wei-Ming2006,17(1):11-19 [Abstract(4368)] [View PDF(5265)724.64 K]Fuzzy ER Modeling with Description LogicsJIANG Yun-Cheng,TANG Yong and WANG Ju2006,17(1):20-30 [Abstract(5345)] [View PDF(5956)817.31 K]A Task-Type Aware Transaction Scheduling Algorithm in J2EEDING Xiao-Ning,ZHANG Xin,JIN Bei-Hong and HUANG Tao2006,17(1):31-38 [Abstract(4200)] [View PDF(5181)518.91 K]Feature-Based Component Model and Normalized Design ProcessWANG Zhong-Jie,XU Xiao-Fei and ZHAN De-Chen2006,17(1):39-47 [Abstract(4306)] [View PDF(5480)593.07 K]Scenario-Based Consistency Verification of Component-Based Real-Time System DesignsHU Jun,YU Xiao-Feng,ZHANG Yan,LI Xuan-Dong and ZHENG Guo-Liang2006,17(1):48-58 [Abstract(4668)] [View PDF(5299)729.39 K]Directed Hypergraph Based and Resource Constrained Enterprise Process Structure OptimizationSUN Xue-Dong,XU Xiao-Fei and WANG Gang2006,17(1):59-68 [Abstract(4384)] [View PDF(5591)419.65 K]A Domain Model of Pen-Based User Interface Software and Its UsageQIN Yan-Yan,TIAN Feng,WANG Xiao-Chun and DAI Guo-Zhong2006,17(1):69-78 [Abstract(4247)] [View PDF(5788)570.35 K]A Fast Multicast Handoff Based Hierarchical Mobile Multicast ArchitectureWU Qian,WU Jian-Ping,XU Ming-Wei and CUI Yong2006,17(1):86-95 [Abstract(4370)] [View PDF(5284)651.91 K]Construction of Peer-to-Peer Multiple-Grain Trust ModelZHANG Qian,ZHANG Xia,WEN Xue-Zhi,LIU Ji-Ren and Ting Shan2006,17(1):96-107 [Abstract(4705)] [View PDF(6350)807.79 K]An End-to-End Available Bandwidth Estimation MethodologyLIU Min,LI Zhong-Cheng,GUO Xiao-Bing and DENG Hui2006,17(1):108-116 [Abstract(4511)] [View PDF(6618)618.13 K]Distributed Monitoring Model with Bounded Delay for Evolving NetworksCAI Zhi-Ping,YIN Jian-Ping,LIU Fang and LIU Xiang-Hui2006,17(1):117-123 [Abstract(5007)] [View PDF(5117)465.85 K]Research on Automated Trust NegotiationLI Jian-Xin,HUAI Jin-Peng and LI Xian-Xian2006,17(1):124-133 [Abstract(4881)] [View PDF(6295)472.98 K]Underlying Techniques for Large-Scale Distributed Computing Oriented Publish/Subscribe SystemMA Jian-Gang,HUANG Tao,WANG Jin-Ling,XU Gang and YE Dan2006,17(1):134-147 [Abstract(5214)] [View PDF(11427)664.65 K]Analysis of Security Protocols Based on Authentication TestYANG Ming and LUO Jun-Zhou2006,17(1):148-156 [Abstract(4474)] [View PDF(5473)560.99 K]Ownership Proofs of Digital Works Based on Secure Multiparty ComputationZHU Yan,YANG Yong-Tian,SUN Zhong-Wei and FENG Deng-Guo2006,17(1):157-166 [Abstract(4636)] [View PDF(4784)590.63 K]Precomputation for Multi-Constrained QoS Routing in GMPLS NetworksHUA Yu,WU Chan-Le and WANG Yong2006,17(1):167-174 [Abstract(3993)] [View PDF(4692)593.27 K]