Volume 16,Issue 10,2005 Table of Contents
Approximate-Backbone Guided Fast Ant Algorithms to QAPZOU Peng,ZHOU Zhi,CHEN Guo-Liang,JIANG He and GU Jun2005,16(10):1691-1698 [Abstract(4680)] [View PDF(5785)549.96 K]A Practical Algorithm for Haplotyping by Maximum ParsimonyZHANG Qiang-Feng,CHE Hao-Yang,CHEN Guo-Liang and SUN Guang-Zhong2005,16(10):1699-1707 [Abstract(3955)] [View PDF(5107)588.96 K]Effective Synchronization Removal in Concurrent Java ProgramsWU Ping,CHEN Yi-Yun and ZHANG Jian2005,16(10):1708-1716 [Abstract(4088)] [View PDF(6057)487.16 K]An Extended Resources Model Based on Distributed Cognition TheoryWANG Chang-Qing,DENG Chang-Zhi,MA Cui-Xia,HUA Qing-Yi and DAI Guo-Zhong2005,16(10):1717-1725 [Abstract(4005)] [View PDF(5998)1.29 M]A Real-Time Dynamic Voltage Scaling Algorithm Based on Syntax Tree for Low PowerYI Hui-Zhan,CHEN Juan,YANG Xue-Jun and LIU Zhe2005,16(10):1726-1734 [Abstract(4029)] [View PDF(6196)541.03 K]Event Constraint Based Software Process ValidationGU Qing and CHEN Dao-Xu2005,16(10):1735-1742 [Abstract(4013)] [View PDF(5104)541.03 K]A Formal Method for Analyzing Electronic Commerce ProtocolsQING Si-Han2005,16(10):1757-1765 [Abstract(3872)] [View PDF(5264)412.54 K]A Minimum Delay Spanning Tree Algorithm for the Application-Layer MulticastCAO Jia and LU Shi-Wen2005,16(10):1766-1773 [Abstract(4547)] [View PDF(7156)368.00 K]A Generic Audit Policy Model on Multilevel Secure DBMSHE Yong-Zhong,LI Lan and FENG Deng-Guo2005,16(10):1774-1783 [Abstract(4201)] [View PDF(5211)524.99 K]Extending the Theory of Strand SpacesSHEN Hai-Feng,XUE Rui,HUANG He-Yan and CHEN Zhao-Xiong2005,16(10):1784-1789 [Abstract(3996)] [View PDF(5586)488.57 K]P2P-Oriented Secure Reliable Storage SystemCHEN Ming,YANG Guang-Wen,LIU Xue-Zheng,SHI Shu-Ming and WANG Ding-Xing2005,16(10):1790-1797 [Abstract(4173)] [View PDF(5624)332.04 K]A Multiplicative Watermark Detection Algorithm for Digital Images in the DCT DomainsSUN Zhong-Wei and FENG Deng-Guo2005,16(10):1798-1804 [Abstract(4250)] [View PDF(6516)496.95 K]An Electronic Voting SchemeLI Yan-Jiang,MA Chuan-Gui and HUANG Liu-Sheng2005,16(10):1805-1810 [Abstract(3867)] [View PDF(6170)297.62 K]A Study of Online Financial Trading Confirmation SchemeCHEN Shun,YAO Qian and XIE Li2005,16(10):1811-1815 [Abstract(4005)] [View PDF(5084)300.34 K]An Anonymous Fingerprinting Scheme Based on Additively Homomorphic Public Key CryptosystemSUN Zhong-Wei,FENG Deng-Guo and WU Chuan-Kun2005,16(10):1816-1821 [Abstract(3961)] [View PDF(6257)250.59 K]Three Algorithms for Improving the Effectiveness of Software Pipelining:Comparison and CombinationLI Wen-Long,CHEN Yu,LIN Hai-Bo and TANG Zhi-Zhong2005,16(10):1822-1832 [Abstract(3824)] [View PDF(6113)731.74 K]Hiding Memory Access Latency in Software PipeliningLIU Li,LI Wen-Long,CHEN Yu,LI Sheng-Mei and TANG Zhi-Zhong2005,16(10):1833-1841 [Abstract(5233)] [View PDF(5875)619.93 K]Optimization to Prevent Cache Penalty in Modulo SchedulingLIU Li,LI Wen-Long,GUO Zhen-Yu,LI Sheng-Mei and TANG Zhi-Zhong2005,16(10):1842-1852 [Abstract(4199)] [View PDF(5374)697.82 K]Summarization of Results of Program Funded by NSFC in the Field of Natural Language Processing in Recent YearsXU Lin and ZHAO Tie-Jun2005,16(10):1853-1858 [Abstract(4787)] [View PDF(7246)352.46 K]
Research on Theory and Approach of Provable SecurityFENG Deng-Guo2005,16(10):1743-1756 [Abstract(10394)] [View PDF(22333)545.62 K]