Volume 13,Issue 7,2002 Table of Contents
A Secure and Efficient General VSS ProtocolZHANG Fu-tai,ZHANG Fang-guo and WANG Yu-min2002,13(7):1187-1192 [Abstract(3356)] [View PDF(5019)369.83 K]Mapping of Nested Loops to MultiprocessorsYIN Xin-chun,CHEN Ling and XIE Li2002,13(7):1193-1198 [Abstract(3332)] [View PDF(5055)477.30 K]Honeycomb SubdivisionZHANG Hong-xin and WANG Guo-jin2002,13(7):1199-1208 [Abstract(3614)] [View PDF(4843)557.78 K]An Intelligent Mobile Agents-Based Architecture for Network Fault DetectionZHANG Pu-han and SUN Yu-fang2002,13(7):1209-1219 [Abstract(3834)] [View PDF(5550)651.74 K]Using Adaptive Router Throttles Against Distributed Denial-of-Service AttacksLIANG Feng and David Yau2002,13(7):1220-1227 [Abstract(4474)] [View PDF(5634)983.42 K]Using Distributed Active Agents to Detect the Symmetry Axes in Gray ImagesLIU Jun-yi and WANG Run-sheng2002,13(7):1238-1241 [Abstract(3599)] [View PDF(4718)302.05 K]Plane-Based WarpingZHANG Yan-ci and WU En-hua2002,13(7):1242-1249 [Abstract(4152)] [View PDF(5373)472.15 K]A Java Virtual Machine Based on Hybrid Concurrent Compilation and Execution ModelYANG Bo,WANG Ding-xing and ZHENG Wei-min2002,13(7):1250-1256 [Abstract(3641)] [View PDF(5478)401.99 K]A Polynomial Algorithm to Decide Liveness and Boundedness of ESAC NetsJIAO Li and LU Wei-ming2002,13(7):1257-1263 [Abstract(3811)] [View PDF(5306)401.13 K]Constraints for Fusion Algorithms in Meta Search Engine SystemsYANG Xiao-hua,LIU Zhen-yu,TAN Min-sheng,LIU Jie and ZHANG Min-jie2002,13(7):1264-1270 [Abstract(3923)] [View PDF(5429)552.25 K]A New Formal System of Intention Consequences Lm5cZHU Zi-ru,CHEN Xiao-ping and ZHOU Yi2002,13(7):1271-1277 [Abstract(3921)] [View PDF(4850)531.12 K]Analysis of Digital Video Effect Shot Transition Detection AlgorithmBAI Xue-sheng,ZHANG Zi-yin,XU Guang-you,YANG Shi-qiang and SHI Yuan-chun2002,13(7):1278-1283 [Abstract(3932)] [View PDF(5168)383.86 K]Estimation of QoS Parameters Based on Measurement and Its ApplicationZHAO Bin,LIU Zeng-ji and LI Xiao-meng2002,13(7):1284-1289 [Abstract(3209)] [View PDF(5208)517.74 K]An Embedding Strategy and Algorithm for Image Watermarking in DWT DomainHUANG Da-ren,LIU Jiu-fen and HUANG Ji-wu2002,13(7):1290-1297 [Abstract(8274)] [View PDF(10044)467.71 K]Intention Tracking in Agent-GroupLI Yi and SHI Chun-yi2002,13(7):1298-1302 [Abstract(3248)] [View PDF(5281)307.73 K]A Unified Resource Mapping Strategy in Computational Grid EnvironmentsDING Qing,CHEN Guo-liang and GU Jun2002,13(7):1303-1308 [Abstract(4542)] [View PDF(5258)361.29 K]A Simple and Fast Algorithm for Detecting the Convexity and Concavity of Vertices for an Arbitrary PolygonLIU Run-tao2002,13(7):1309-1312 [Abstract(3875)] [View PDF(6150)248.84 K]Study on the Proof Method of Authentication Protocols Based on Strand SpaceLIU Dong-xi and BAI Ying-cai2002,13(7):1313-1317 [Abstract(4123)] [View PDF(5008)307.52 K]A Hypermedia Retrieval Model Based on Pattern MatchingZHOU Xue-hai,LI Guang-ya,LI Xi,GONG Yu-chang and ZHAO Zhen-xi2002,13(7):1318-1323 [Abstract(3713)] [View PDF(4855)397.34 K]Maintaining Temporal Views in Data WarehousesLI Qi and BAI Ying-cai2002,13(7):1324-1330 [Abstract(3562)] [View PDF(5004)457.95 K]Mobile Agent System by Incremental Timestamp Security TechniqueWAN Yan,SUN Yong-qiang,ZHU Xiang-hua and TANG Jin2002,13(7):1331-1337 [Abstract(3339)] [View PDF(5173)458.86 K]An Accelerate Algorithm on Fast Wavelet Transform for Signal ProcessingLI Jian-ping,YAN Zhong-hong and ZHANG Wan-ping2002,13(7):1338-1344 [Abstract(3574)] [View PDF(5159)426.57 K]
Overviews on Software Architecture ResearchSUN Chang-ai,JIN Mao-zhong and LIU Chao2002,13(7):1228-1237 [Abstract(14297)] [View PDF(17310)500.04 K]