Volume 14,Issue 6,2003 Table of Contents
Performance Analysis of Strictly Synchronized Stochastic Petri NetsLIU Hong,LIN Chuang and WU Jian-Ping2003,14(6):1029-1036 [Abstract(3581)] [View PDF(5355)701.13 K]Application of Net Reduction to Feedback Controller Design of Petri NetsWANG Shou-Guang,YAN Gang-Feng and JIANG Jing-Ping2003,14(6):1037-1042 [Abstract(3733)] [View PDF(4948)617.53 K]Design of a Trust Valuation Model in Software Service CoordinationXU Feng,Lü Jian,ZHENG Wei and CAO Chun2003,14(6):1043-1051 [Abstract(5822)] [View PDF(5848)761.29 K]Study and Application of a Workflow Meta-ModelZHAO Wen,HU Wen-Hui,ZHANG Shi-Kun and WANG Li-Fu2003,14(6):1052-1059 [Abstract(4644)] [View PDF(10480)613.88 K]Priority Mapping in Real-Time MiddlewareGUO Chang-Guo,WANG Huai-Min,ZOU Peng and WANG Feng2003,14(6):1060-1065 [Abstract(4193)] [View PDF(5544)612.50 K]Research on Component Composition and Its Formal ReasoningREN Hong-Min and QIAN Le-Qiu2003,14(6):1066-1074 [Abstract(4624)] [View PDF(6760)730.96 K]Super-Resolution Restoration with Multi-Scale Edge-Preserving RegularizationZHANG Xin-Ming and SHEN Lan-Sun2003,14(6):1075-1081 [Abstract(5021)] [View PDF(8321)846.60 K]A Method for Singularity Detection in Fingerprint ImagesTAN Tai-Zhe,NING Xin-Bao,YIN Yi-Long,ZHAN Xiao-Si and CHEN Yun2003,14(6):1082-1088 [Abstract(4623)] [View PDF(6385)842.76 K]A Fast Clustering Algorithm Based on Reference and DensityMA Shuai,WANG Teng-Jiao,TANG Shi-Wei,YANG Dong-Qing and GAO Jun2003,14(6):1089-1095 [Abstract(5016)] [View PDF(8676)693.83 K]A Self-Learning Model under Uncertain ConditionWANG Guo-Yin and HE Xiao2003,14(6):1096-1102 [Abstract(4397)] [View PDF(6567)924.73 K]A Multiple Classifiers Integration Method Based on Full Information MatrixTANG Chun-Sheng and JIN Yi-Hui2003,14(6):1103-1109 [Abstract(4079)] [View PDF(5951)643.97 K]An Improved Elman Model and Recurrent Back-Propagation Control Neural NetworksSHI Xiao-Hu,LIANG Yan-Chun and XU Xu2003,14(6):1110-1119 [Abstract(4657)] [View PDF(5750)1.12 M]A Host-Based Anomaly Intrusion Detection Model Based on Genetic ProgrammingSU Pu-Rui,LI De-Quan and FENG Deng-Guo2003,14(6):1120-1126 [Abstract(4438)] [View PDF(5269)537.27 K]A High Performance Web Server Based on PipelineYAO Nian-Min,ZHENG Ming-Yang and JU Jiu-Bin2003,14(6):1127-1133 [Abstract(4909)] [View PDF(5765)562.36 K]Towards Adaptive Load Balancing Services for Web Application ServersFAN Guo-Chuang,ZHU Huan,HUANG Tao and FENG Yu-Lin2003,14(6):1134-1141 [Abstract(4317)] [View PDF(5696)631.54 K]A Web Pre-Fetching Model Based on Analyzing User Access PatternXU Huan-Qing and WANG Yong-Cheng2003,14(6):1142-1147 [Abstract(4518)] [View PDF(6321)602.73 K]A Security Model for Cryptographic ProtocolsLIU Yi-Wen,LI Wei-Qin and FENG Deng-Guo2003,14(6):1148-1156 [Abstract(4824)] [View PDF(5252)716.32 K]A Multimedia Authentication System Combining Digital Signature and Digital WatermarkingHU Jun-Quan,HUANG Ji-Wu,ZHANG Long-Jun and HUANG Da-Ren2003,14(6):1157-1163 [Abstract(4370)] [View PDF(6726)743.72 K]Two Classes of Robust Threshold Key Escrow SchemesCAO Zhen-Fu2003,14(6):1164-1171 [Abstract(4219)] [View PDF(5531)699.52 K]A Digital Fingerprinting Algorithm Based on Binary CodesWANG Yan,Lü Shu-Wang and XU Han-Liang2003,14(6):1172-1177 [Abstract(4670)] [View PDF(6408)611.05 K]Analyzing and Improving the TCP Stability in Wireless Ad Hoc NetworksLI Yun,CHEN Qian-Bin,LONG Ke-Ping and WU Shi-Qi2003,14(6):1178-1186 [Abstract(4954)] [View PDF(6423)855.56 K]