Volume 16,Issue 7,2005 Table of Contents
On Rough AlgebrasDAI Jian-Hua and PAN Yun-He2005,16(7):1197-1204 [Abstract(3893)] [View PDF(5208)760.43 K]Lawvere Theorem in Institution of Regular Order-Sorted Equational Logic and Initial (Terminal) Semantics for Its Glued TheoriesLIU Fu-Chun2005,16(7):1205-1209 [Abstract(4118)] [View PDF(4819)657.31 K]Metamorphic Testing and Special Case Testing: A Case StudyWU Peng,SHI Xiao-Chun,TANG Jiang-Jun,LIN Hui-Min and CHEN T.Y.2005,16(7):1210-1220 [Abstract(5977)] [View PDF(5370)1.24 M]Managing the Inconsistency of Software RequirementsZHU Xue-Feng and JIN Zhi2005,16(7):1221-1231 [Abstract(4784)] [View PDF(7446)476.41 K]Detecting Feature Interactions in Next Generation Communication SoftwareWANG Dong and MEI Hong2005,16(7):1232-1241 [Abstract(3717)] [View PDF(5703)1021.12 K]A Method for Semantic Verification of Workflow Processes Based on Petri Net Reduction TechniqueZHOU Jian-Tao,SHI Mei-Lin and YE Xin-Ming2005,16(7):1242-1251 [Abstract(5091)] [View PDF(6478)1.06 M]Processing Algorithms for Predictive Aggregate Queries over Data StreamsLI Jian-Zhong,GUO Long-Jiang,ZHANG Dong-Dong and WANG Wei-Ping2005,16(7):1252-1261 [Abstract(4672)] [View PDF(8553)765.33 K]Study on Distributed Sequential Pattern Discovery AlgorithmZOU Xiang,ZHANG Wei,LIU Yang and CAI Qing-Sheng2005,16(7):1262-1269 [Abstract(4794)] [View PDF(5716)693.70 K]SEEKER: Keyword-Based Information Retrieval over Relational DatabasesWEN Ji-Jun and WANG Shan2005,16(7):1270-1281 [Abstract(4912)] [View PDF(7032)467.25 K]Exceptional Slices Mining Based on Singular Value DecompositionYU Hui,MA Xiu-Li,TAN Shao-Hua,TANG Shi-Wei and YANG Dong-Qing2005,16(7):1282-1288 [Abstract(3742)] [View PDF(5586)298.12 K]A Group of Threshold Group-Signature Schemes with Privilege SubsetsCHEN Wei-Dong and FENG Deng-Guo2005,16(7):1289-1295 [Abstract(3820)] [View PDF(5003)642.07 K]An Admission Control Algorithm with Minimum Contending Throughput GuaranteeFU Xiao-Rui and ZHANG Lian-Fang2005,16(7):1296-1304 [Abstract(3826)] [View PDF(5129)764.64 K]Characterization of Handoff in Mobile IPZHAO Qing-Lin,LI Zhong-Cheng,FENG Li and YANG Jian-Hua2005,16(7):1305-1313 [Abstract(3349)] [View PDF(5202)779.38 K]A Distributed Dynamic Micro-Mobility Management Scheme for Mobile IPv6WANG Sheng-Ling,LIU Guo-Rong,SHEN Jun-Yi,HOU Yi-Bin and HUANG Jian-Hui2005,16(7):1314-1322 [Abstract(3816)] [View PDF(5404)405.49 K]A Robust Multi-Bits Image Watermarking Algorithm Based on HMM in Wavelet DomainZHANG Rong-Yue,NI Jiang-Qun and HUANG Ji-Wu2005,16(7):1323-1332 [Abstract(4404)] [View PDF(6024)1.74 M]A Fully Public Key Tracing and Revocation Scheme Provably Secure Against Adaptive AdversaryTAN Zuo-Wen,LIU Zhuo-Jun and XIAO Hong-Guang2005,16(7):1333-1343 [Abstract(4720)] [View PDF(5553)876.23 K]On the Security of Three Stream CiphersZHANG Bin,WU Hong-Jun,FENG Deng-Guo and BAO Feng2005,16(7):1344-1351 [Abstract(4098)] [View PDF(5326)755.12 K]A New Network Improvement Algorithm in QoS Providing SystemYANG Ting,SUN Yu-Geng,HU Hua-Dong and SUN Yong-Jin2005,16(7):1352-1358 [Abstract(3649)] [View PDF(5175)686.37 K]