Volume 13,Issue 7,2002 Table of Contents
A Secure and Efficient General VSS ProtocolZHANG Fu-tai,ZHANG Fang-guo and WANG Yu-min2002,13(7):1187-1192 [Abstract(3335)] [View PDF(4931)369.83 K]Mapping of Nested Loops to MultiprocessorsYIN Xin-chun,CHEN Ling and XIE Li2002,13(7):1193-1198 [Abstract(3316)] [View PDF(4959)477.30 K]Honeycomb SubdivisionZHANG Hong-xin and WANG Guo-jin2002,13(7):1199-1208 [Abstract(3594)] [View PDF(4761)557.78 K]An Intelligent Mobile Agents-Based Architecture for Network Fault DetectionZHANG Pu-han and SUN Yu-fang2002,13(7):1209-1219 [Abstract(3821)] [View PDF(5465)651.74 K]Using Adaptive Router Throttles Against Distributed Denial-of-Service AttacksLIANG Feng and David Yau2002,13(7):1220-1227 [Abstract(4460)] [View PDF(5548)983.42 K]Using Distributed Active Agents to Detect the Symmetry Axes in Gray ImagesLIU Jun-yi and WANG Run-sheng2002,13(7):1238-1241 [Abstract(3584)] [View PDF(4638)302.05 K]Plane-Based WarpingZHANG Yan-ci and WU En-hua2002,13(7):1242-1249 [Abstract(4139)] [View PDF(5289)472.15 K]A Java Virtual Machine Based on Hybrid Concurrent Compilation and Execution ModelYANG Bo,WANG Ding-xing and ZHENG Wei-min2002,13(7):1250-1256 [Abstract(3627)] [View PDF(5365)401.99 K]A Polynomial Algorithm to Decide Liveness and Boundedness of ESAC NetsJIAO Li and LU Wei-ming2002,13(7):1257-1263 [Abstract(3796)] [View PDF(5213)401.13 K]Constraints for Fusion Algorithms in Meta Search Engine SystemsYANG Xiao-hua,LIU Zhen-yu,TAN Min-sheng,LIU Jie and ZHANG Min-jie2002,13(7):1264-1270 [Abstract(3913)] [View PDF(5331)552.25 K]A New Formal System of Intention Consequences Lm5cZHU Zi-ru,CHEN Xiao-ping and ZHOU Yi2002,13(7):1271-1277 [Abstract(3904)] [View PDF(4768)531.12 K]Analysis of Digital Video Effect Shot Transition Detection AlgorithmBAI Xue-sheng,ZHANG Zi-yin,XU Guang-you,YANG Shi-qiang and SHI Yuan-chun2002,13(7):1278-1283 [Abstract(3913)] [View PDF(5072)383.86 K]Estimation of QoS Parameters Based on Measurement and Its ApplicationZHAO Bin,LIU Zeng-ji and LI Xiao-meng2002,13(7):1284-1289 [Abstract(3194)] [View PDF(5120)517.74 K]An Embedding Strategy and Algorithm for Image Watermarking in DWT DomainHUANG Da-ren,LIU Jiu-fen and HUANG Ji-wu2002,13(7):1290-1297 [Abstract(8241)] [View PDF(9915)467.71 K]Intention Tracking in Agent-GroupLI Yi and SHI Chun-yi2002,13(7):1298-1302 [Abstract(3216)] [View PDF(5178)307.73 K]A Unified Resource Mapping Strategy in Computational Grid EnvironmentsDING Qing,CHEN Guo-liang and GU Jun2002,13(7):1303-1308 [Abstract(4528)] [View PDF(5176)361.29 K]A Simple and Fast Algorithm for Detecting the Convexity and Concavity of Vertices for an Arbitrary PolygonLIU Run-tao2002,13(7):1309-1312 [Abstract(3855)] [View PDF(6006)248.84 K]Study on the Proof Method of Authentication Protocols Based on Strand SpaceLIU Dong-xi and BAI Ying-cai2002,13(7):1313-1317 [Abstract(4111)] [View PDF(4919)307.52 K]A Hypermedia Retrieval Model Based on Pattern MatchingZHOU Xue-hai,LI Guang-ya,LI Xi,GONG Yu-chang and ZHAO Zhen-xi2002,13(7):1318-1323 [Abstract(3700)] [View PDF(4767)397.34 K]Maintaining Temporal Views in Data WarehousesLI Qi and BAI Ying-cai2002,13(7):1324-1330 [Abstract(3550)] [View PDF(4927)457.95 K]Mobile Agent System by Incremental Timestamp Security TechniqueWAN Yan,SUN Yong-qiang,ZHU Xiang-hua and TANG Jin2002,13(7):1331-1337 [Abstract(3327)] [View PDF(5088)458.86 K]An Accelerate Algorithm on Fast Wavelet Transform for Signal ProcessingLI Jian-ping,YAN Zhong-hong and ZHANG Wan-ping2002,13(7):1338-1344 [Abstract(3549)] [View PDF(5079)426.57 K]
Overviews on Software Architecture ResearchSUN Chang-ai,JIN Mao-zhong and LIU Chao2002,13(7):1228-1237 [Abstract(14211)] [View PDF(16852)500.04 K]