Volume 16,Issue 3,2005 Table of Contents

Other Issues:  
  
Contents

  • Generating SAT Instances from First-Order Formulas
  • HUANG Zhuo and ZHANG Jian
  • 2005,16(3):327-335 [Abstract(5673)]  [View PDF(5955)1019.11 K]
  • Homomorphism Proof Systems for Unsatisfiable Formulas
  • XU Dao-Yun
  • 2005,16(3):336-345 [Abstract(4610)]  [View PDF(4827)1.13 M]
  • A Tag Type for Certifying Compilation of Java Program
  • CHEN Hui,CHEN Yi-Yun and RU Xiang-Min
  • 2005,16(3):346-354 [Abstract(3863)]  [View PDF(5419)1.01 M]
  • QRDChecker: A Model Checking Tool for QRDC
  • PEI Yu,XU Qi-Wen,LI Xuan-Dong and ZHENG Guo-Liang
  • 2005,16(3):355-364 [Abstract(4117)]  [View PDF(5711)684.99 K]
  • Convergence of a Mean Shift Algorithm
  • LI Xiang-Ru,WU Fu-Chao and HU Zhan-Yi
  • 2005,16(3):365-374 [Abstract(8864)]  [View PDF(13851)1.12 M]
  • A Round-Robin Scheduling Algorithm by Iterating Between Slots for Input- Queued Switches
  • WU Jun,CHEN Qing and LUO Jun-Zhou
  • 2005,16(3):375-383 [Abstract(4683)]  [View PDF(6010)997.49 K]
  • A Distributed Computing Model for Wu's Method
  • WU Yong-Wei,YANG Guang-Wen,YANG Hong,ZHENG Wei-Min and LIN Dong-Dai
  • 2005,16(3):384-391 [Abstract(4271)]  [View PDF(5927)884.29 K]
  • Approximated Computational Hardness and Local Search Approximated Algorithm Analysis for k-Median Problem
  • PAN Rui,ZHU Da-Ming,MA Shao-Han and XIAO Jin-Jie
  • 2005,16(3):392-399 [Abstract(5244)]  [View PDF(7075)1.03 M]
  • Schedule of Activity Instances in Workflow Management System
  • SUN Rui-Zhi and SHI Mei-Lin
  • 2005,16(3):400-406 [Abstract(4471)]  [View PDF(5533)824.27 K]
  • An Active Measurement Model for Software Process Control and Improvement
  • WANG Qing,LI Ming-Shu and LIU Xia
  • 2005,16(3):407-418 [Abstract(4391)]  [View PDF(5901)1.24 M]
  • A Method for the Design of Petri Net Controller Enforcing General Linear Constraints
  • WANG Shou-Guang and YAN Gang-Feng
  • 2005,16(3):419-426 [Abstract(3846)]  [View PDF(5344)1018.53 K]
  • A Quantification Approach to Software Requirements Analysis and Its Fuzzy Analytic Hierarchy Process Mapping
  • XIONG Wei,Hisakazu SHINDO and Yoshimichi WATANABE
  • 2005,16(3):427-433 [Abstract(4221)]  [View PDF(8354)864.87 K]
  • A Distributed Entropy-Based Long-Life QoS Routing Algorithm in Ad Hoc Network
  • SHEN Hui,SHI Bing-Xin,ZOU Ling,SHI Jian and ZHOU Jian-Xin
  • 2005,16(3):445-452 [Abstract(4033)]  [View PDF(5971)1.00 M]
  • An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without Erasure
  • HE Yun-Xiao,LI Bao and Lü Ke-Wei
  • 2005,16(3):453-461 [Abstract(4046)]  [View PDF(4873)1003.62 K]
  • Traffic Control in Linux-Based Routers
  • ZHANG Huan-Qiang and WU Zhi-Mei
  • 2005,16(3):462-471 [Abstract(3615)]  [View PDF(5898)1.03 M]
  • Cryptanalysis of a Member Deletion Scheme for Group Signature
  • HUANG Zhen-Jie and LIN Xuan-Zhi
  • 2005,16(3):472-476 [Abstract(3973)]  [View PDF(5002)628.75 K]
  • A Method for Mobile Agent Data Protection
  • TAN Xiang,GU Yu-Qing and BAO Chong-Ming
  • 2005,16(3):477-484 [Abstract(3957)]  [View PDF(5332)763.89 K]
  • Review Articles

  • Improving TCP Performance over MANET: A Survey
  • FENG Yan-Jun,SUN Li-Min,QIAN Hua-Lin and SONG Cheng
  • 2005,16(3):434-444 [Abstract(7901)]  [View PDF(8031)1.14 M]