Volume 16,Issue 3,2005 Table of Contents
Generating SAT Instances from First-Order FormulasHUANG Zhuo and ZHANG Jian2005,16(3):327-335 [Abstract(5673)] [View PDF(5955)1019.11 K]Homomorphism Proof Systems for Unsatisfiable FormulasXU Dao-Yun2005,16(3):336-345 [Abstract(4610)] [View PDF(4827)1.13 M]A Tag Type for Certifying Compilation of Java ProgramCHEN Hui,CHEN Yi-Yun and RU Xiang-Min2005,16(3):346-354 [Abstract(3863)] [View PDF(5419)1.01 M]QRDChecker: A Model Checking Tool for QRDCPEI Yu,XU Qi-Wen,LI Xuan-Dong and ZHENG Guo-Liang2005,16(3):355-364 [Abstract(4117)] [View PDF(5711)684.99 K]Convergence of a Mean Shift AlgorithmLI Xiang-Ru,WU Fu-Chao and HU Zhan-Yi2005,16(3):365-374 [Abstract(8864)] [View PDF(13851)1.12 M]A Round-Robin Scheduling Algorithm by Iterating Between Slots for Input- Queued SwitchesWU Jun,CHEN Qing and LUO Jun-Zhou2005,16(3):375-383 [Abstract(4683)] [View PDF(6010)997.49 K]A Distributed Computing Model for Wu's MethodWU Yong-Wei,YANG Guang-Wen,YANG Hong,ZHENG Wei-Min and LIN Dong-Dai2005,16(3):384-391 [Abstract(4271)] [View PDF(5927)884.29 K]Approximated Computational Hardness and Local Search Approximated Algorithm Analysis for k-Median ProblemPAN Rui,ZHU Da-Ming,MA Shao-Han and XIAO Jin-Jie2005,16(3):392-399 [Abstract(5244)] [View PDF(7075)1.03 M]Schedule of Activity Instances in Workflow Management SystemSUN Rui-Zhi and SHI Mei-Lin2005,16(3):400-406 [Abstract(4471)] [View PDF(5533)824.27 K]An Active Measurement Model for Software Process Control and ImprovementWANG Qing,LI Ming-Shu and LIU Xia2005,16(3):407-418 [Abstract(4391)] [View PDF(5901)1.24 M]A Method for the Design of Petri Net Controller Enforcing General Linear ConstraintsWANG Shou-Guang and YAN Gang-Feng2005,16(3):419-426 [Abstract(3846)] [View PDF(5344)1018.53 K]A Quantification Approach to Software Requirements Analysis and Its Fuzzy Analytic Hierarchy Process MappingXIONG Wei,Hisakazu SHINDO and Yoshimichi WATANABE2005,16(3):427-433 [Abstract(4221)] [View PDF(8354)864.87 K]A Distributed Entropy-Based Long-Life QoS Routing Algorithm in Ad Hoc NetworkSHEN Hui,SHI Bing-Xin,ZOU Ling,SHI Jian and ZHOU Jian-Xin2005,16(3):445-452 [Abstract(4033)] [View PDF(5971)1.00 M]An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without ErasureHE Yun-Xiao,LI Bao and Lü Ke-Wei2005,16(3):453-461 [Abstract(4046)] [View PDF(4873)1003.62 K]Traffic Control in Linux-Based RoutersZHANG Huan-Qiang and WU Zhi-Mei2005,16(3):462-471 [Abstract(3615)] [View PDF(5898)1.03 M]Cryptanalysis of a Member Deletion Scheme for Group SignatureHUANG Zhen-Jie and LIN Xuan-Zhi2005,16(3):472-476 [Abstract(3973)] [View PDF(5002)628.75 K]A Method for Mobile Agent Data ProtectionTAN Xiang,GU Yu-Qing and BAO Chong-Ming2005,16(3):477-484 [Abstract(3957)] [View PDF(5332)763.89 K]
Improving TCP Performance over MANET: A SurveyFENG Yan-Jun,SUN Li-Min,QIAN Hua-Lin and SONG Cheng2005,16(3):434-444 [Abstract(7901)] [View PDF(8031)1.14 M]