Volume 16,Issue 7,2005 Table of Contents

Other Issues:  
  
Contents

  • On Rough Algebras
  • DAI Jian-Hua and PAN Yun-He
  • 2005,16(7):1197-1204 [Abstract(3893)]  [View PDF(5208)760.43 K]
  • Lawvere Theorem in Institution of Regular Order-Sorted Equational Logic and Initial (Terminal) Semantics for Its Glued Theories
  • LIU Fu-Chun
  • 2005,16(7):1205-1209 [Abstract(4118)]  [View PDF(4819)657.31 K]
  • Metamorphic Testing and Special Case Testing: A Case Study
  • WU Peng,SHI Xiao-Chun,TANG Jiang-Jun,LIN Hui-Min and CHEN T.Y.
  • 2005,16(7):1210-1220 [Abstract(5977)]  [View PDF(5370)1.24 M]
  • Managing the Inconsistency of Software Requirements
  • ZHU Xue-Feng and JIN Zhi
  • 2005,16(7):1221-1231 [Abstract(4784)]  [View PDF(7446)476.41 K]
  • Detecting Feature Interactions in Next Generation Communication Software
  • WANG Dong and MEI Hong
  • 2005,16(7):1232-1241 [Abstract(3717)]  [View PDF(5703)1021.12 K]
  • A Method for Semantic Verification of Workflow Processes Based on Petri Net Reduction Technique
  • ZHOU Jian-Tao,SHI Mei-Lin and YE Xin-Ming
  • 2005,16(7):1242-1251 [Abstract(5091)]  [View PDF(6478)1.06 M]
  • Processing Algorithms for Predictive Aggregate Queries over Data Streams
  • LI Jian-Zhong,GUO Long-Jiang,ZHANG Dong-Dong and WANG Wei-Ping
  • 2005,16(7):1252-1261 [Abstract(4672)]  [View PDF(8553)765.33 K]
  • Study on Distributed Sequential Pattern Discovery Algorithm
  • ZOU Xiang,ZHANG Wei,LIU Yang and CAI Qing-Sheng
  • 2005,16(7):1262-1269 [Abstract(4794)]  [View PDF(5716)693.70 K]
  • SEEKER: Keyword-Based Information Retrieval over Relational Databases
  • WEN Ji-Jun and WANG Shan
  • 2005,16(7):1270-1281 [Abstract(4912)]  [View PDF(7032)467.25 K]
  • Exceptional Slices Mining Based on Singular Value Decomposition
  • YU Hui,MA Xiu-Li,TAN Shao-Hua,TANG Shi-Wei and YANG Dong-Qing
  • 2005,16(7):1282-1288 [Abstract(3742)]  [View PDF(5586)298.12 K]
  • A Group of Threshold Group-Signature Schemes with Privilege Subsets
  • CHEN Wei-Dong and FENG Deng-Guo
  • 2005,16(7):1289-1295 [Abstract(3820)]  [View PDF(5003)642.07 K]
  • An Admission Control Algorithm with Minimum Contending Throughput Guarantee
  • FU Xiao-Rui and ZHANG Lian-Fang
  • 2005,16(7):1296-1304 [Abstract(3826)]  [View PDF(5129)764.64 K]
  • Characterization of Handoff in Mobile IP
  • ZHAO Qing-Lin,LI Zhong-Cheng,FENG Li and YANG Jian-Hua
  • 2005,16(7):1305-1313 [Abstract(3349)]  [View PDF(5202)779.38 K]
  • A Distributed Dynamic Micro-Mobility Management Scheme for Mobile IPv6
  • WANG Sheng-Ling,LIU Guo-Rong,SHEN Jun-Yi,HOU Yi-Bin and HUANG Jian-Hui
  • 2005,16(7):1314-1322 [Abstract(3816)]  [View PDF(5404)405.49 K]
  • A Robust Multi-Bits Image Watermarking Algorithm Based on HMM in Wavelet Domain
  • ZHANG Rong-Yue,NI Jiang-Qun and HUANG Ji-Wu
  • 2005,16(7):1323-1332 [Abstract(4404)]  [View PDF(6024)1.74 M]
  • A Fully Public Key Tracing and Revocation Scheme Provably Secure Against Adaptive Adversary
  • TAN Zuo-Wen,LIU Zhuo-Jun and XIAO Hong-Guang
  • 2005,16(7):1333-1343 [Abstract(4720)]  [View PDF(5553)876.23 K]
  • On the Security of Three Stream Ciphers
  • ZHANG Bin,WU Hong-Jun,FENG Deng-Guo and BAO Feng
  • 2005,16(7):1344-1351 [Abstract(4098)]  [View PDF(5326)755.12 K]
  • A New Network Improvement Algorithm in QoS Providing System
  • YANG Ting,SUN Yu-Geng,HU Hua-Dong and SUN Yong-Jin
  • 2005,16(7):1352-1358 [Abstract(3649)]  [View PDF(5175)686.37 K]