Volume 16,Issue 10,2005 Table of Contents

Other Issues:  
  
Contents

  • Approximate-Backbone Guided Fast Ant Algorithms to QAP
  • ZOU Peng,ZHOU Zhi,CHEN Guo-Liang,JIANG He and GU Jun
  • 2005,16(10):1691-1698 [Abstract(4680)]  [View PDF(5785)549.96 K]
  • A Practical Algorithm for Haplotyping by Maximum Parsimony
  • ZHANG Qiang-Feng,CHE Hao-Yang,CHEN Guo-Liang and SUN Guang-Zhong
  • 2005,16(10):1699-1707 [Abstract(3955)]  [View PDF(5107)588.96 K]
  • Effective Synchronization Removal in Concurrent Java Programs
  • WU Ping,CHEN Yi-Yun and ZHANG Jian
  • 2005,16(10):1708-1716 [Abstract(4088)]  [View PDF(6057)487.16 K]
  • An Extended Resources Model Based on Distributed Cognition Theory
  • WANG Chang-Qing,DENG Chang-Zhi,MA Cui-Xia,HUA Qing-Yi and DAI Guo-Zhong
  • 2005,16(10):1717-1725 [Abstract(4005)]  [View PDF(5998)1.29 M]
  • A Real-Time Dynamic Voltage Scaling Algorithm Based on Syntax Tree for Low Power
  • YI Hui-Zhan,CHEN Juan,YANG Xue-Jun and LIU Zhe
  • 2005,16(10):1726-1734 [Abstract(4029)]  [View PDF(6196)541.03 K]
  • Event Constraint Based Software Process Validation
  • GU Qing and CHEN Dao-Xu
  • 2005,16(10):1735-1742 [Abstract(4013)]  [View PDF(5104)541.03 K]
  • A Formal Method for Analyzing Electronic Commerce Protocols
  • QING Si-Han
  • 2005,16(10):1757-1765 [Abstract(3872)]  [View PDF(5264)412.54 K]
  • A Minimum Delay Spanning Tree Algorithm for the Application-Layer Multicast
  • CAO Jia and LU Shi-Wen
  • 2005,16(10):1766-1773 [Abstract(4547)]  [View PDF(7156)368.00 K]
  • A Generic Audit Policy Model on Multilevel Secure DBMS
  • HE Yong-Zhong,LI Lan and FENG Deng-Guo
  • 2005,16(10):1774-1783 [Abstract(4201)]  [View PDF(5211)524.99 K]
  • Extending the Theory of Strand Spaces
  • SHEN Hai-Feng,XUE Rui,HUANG He-Yan and CHEN Zhao-Xiong
  • 2005,16(10):1784-1789 [Abstract(3996)]  [View PDF(5586)488.57 K]
  • P2P-Oriented Secure Reliable Storage System
  • CHEN Ming,YANG Guang-Wen,LIU Xue-Zheng,SHI Shu-Ming and WANG Ding-Xing
  • 2005,16(10):1790-1797 [Abstract(4173)]  [View PDF(5624)332.04 K]
  • A Multiplicative Watermark Detection Algorithm for Digital Images in the DCT Domains
  • SUN Zhong-Wei and FENG Deng-Guo
  • 2005,16(10):1798-1804 [Abstract(4250)]  [View PDF(6516)496.95 K]
  • An Electronic Voting Scheme
  • LI Yan-Jiang,MA Chuan-Gui and HUANG Liu-Sheng
  • 2005,16(10):1805-1810 [Abstract(3867)]  [View PDF(6170)297.62 K]
  • A Study of Online Financial Trading Confirmation Scheme
  • CHEN Shun,YAO Qian and XIE Li
  • 2005,16(10):1811-1815 [Abstract(4005)]  [View PDF(5084)300.34 K]
  • An Anonymous Fingerprinting Scheme Based on Additively Homomorphic Public Key Cryptosystem
  • SUN Zhong-Wei,FENG Deng-Guo and WU Chuan-Kun
  • 2005,16(10):1816-1821 [Abstract(3961)]  [View PDF(6257)250.59 K]
  • Three Algorithms for Improving the Effectiveness of Software Pipelining:Comparison and Combination
  • LI Wen-Long,CHEN Yu,LIN Hai-Bo and TANG Zhi-Zhong
  • 2005,16(10):1822-1832 [Abstract(3824)]  [View PDF(6113)731.74 K]
  • Hiding Memory Access Latency in Software Pipelining
  • LIU Li,LI Wen-Long,CHEN Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1833-1841 [Abstract(5233)]  [View PDF(5875)619.93 K]
  • Optimization to Prevent Cache Penalty in Modulo Scheduling
  • LIU Li,LI Wen-Long,GUO Zhen-Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1842-1852 [Abstract(4199)]  [View PDF(5374)697.82 K]
  • Summarization of Results of Program Funded by NSFC in the Field of Natural Language Processing in Recent Years
  • XU Lin and ZHAO Tie-Jun
  • 2005,16(10):1853-1858 [Abstract(4787)]  [View PDF(7246)352.46 K]
  • Review Articles

  • Research on Theory and Approach of Provable Security
  • FENG Deng-Guo
  • 2005,16(10):1743-1756 [Abstract(10394)]  [View PDF(22333)545.62 K]