Volume 18,Issue 7,2007 Table of Contents
A Reduction Technique of Petri Nets Based on Logic CircuitYE Jian-Hong,SONG Wen and SUN Shi-Xin2007,18(7):1553-1562 [Abstract(4394)] [View PDF(6133)734.05 K]Reasoning Within Extended Fuzzy Description Logic Supporting Terminological Axiom RestrictionsKANG Da-Zhou,XU Bao-Wen,LU Jian-Jiang and LI Yan-Hui2007,18(7):1563-1572 [Abstract(4553)] [View PDF(5107)479.43 K]The Complexity of Dual Models Problem of Propositional Linear Temporal LogicsWU Zhi-Lin and ZHANG Wen-Hui2007,18(7):1573-1581 [Abstract(4123)] [View PDF(4851)598.30 K]Feature Model Driven Web Services Composition Approach and Its Support ToolXING Yan,GU Fang and MEI Hong2007,18(7):1582-1591 [Abstract(3986)] [View PDF(5278)564.42 K]Sequential Patterns-Based Cache Replacement in Servlet ContainerLI Yang,ZHANG Wen-Bo,WEI Jun,ZHONG Hua and HUANG Tao2007,18(7):1592-1602 [Abstract(4729)] [View PDF(5661)699.64 K]EfLA Algorithm Based on Dynamic FeedbackTANG Feng,WU Cheng-Gang,FENG Xiao-Bing and ZHANG Zhao-Qing2007,18(7):1603-1611 [Abstract(4427)] [View PDF(4901)562.14 K]MDA-Based Model Management Method and Its Application for TRISO-ModelYUAN Feng and LI Ming-Shu2007,18(7):1612-1625 [Abstract(4795)] [View PDF(5547)758.25 K]Manufacturing Supply Chain Planning Based on Extended State Task NetworkSU Sheng,ZHAN De-Chen and XU Xiao-Fei2007,18(7):1626-1638 [Abstract(3602)] [View PDF(6000)971.52 K]Evaluation and Improvement of Vertical Handoff Algorithms in Heterogeneous Wireless NetworksLIU Min,LI Zhong-Cheng,GUO Xiao-Bing and ZHANG De-Kui2007,18(7):1652-1659 [Abstract(4535)] [View PDF(6588)535.17 K]Online Model Estimating-Based Performance Guarantee Mechanism for Dynamic Web SiteZHANG Yong,HUANG Tao,CHEN Ning-Jiang and JIN Bei-Hong2007,18(7):1660-1671 [Abstract(4253)] [View PDF(5559)787.71 K]A Location-Independent Connected Coverage Protocol for Wireless Sensor NetworksMAO Ying-Chi,FENG Guo-Fu,CHEN Li-Jun and CHEN Dao-Xu2007,18(7):1672-1684 [Abstract(5198)] [View PDF(5804)862.84 K]A Collaborative Filtering Recommendation Algorithm Based on Influence SetsCHEN Jian and YIN Jian2007,18(7):1685-1694 [Abstract(4874)] [View PDF(6510)669.61 K]TCP Proxy for Satellite NetworkZENG Bin,LI Zhi-Tang and XU Fan-Jiang2007,18(7):1695-1704 [Abstract(4445)] [View PDF(6216)671.08 K]A Semantic Data Coordination Based Approach for Application Integration in PortalsSONG Jing-Yu,WEI Jun and WAN Shu-Chao2007,18(7):1705-1714 [Abstract(3883)] [View PDF(5281)529.10 K]Capture and Storage of Digital Evidence Based on Security Operating SystemDING Li-Ping,ZHOU Bo-Wen and WANG Yong-Ji2007,18(7):1715-1729 [Abstract(4697)] [View PDF(6326)762.96 K]A Prestige Reporting Mechanism Based on Gray System TheoryXU Lan-Fang,HU Huai-Fei,SANG Zi-Xia,XU Feng-Ming and ZOU De-Qing2007,18(7):1730-1737 [Abstract(4523)] [View PDF(5393)538.32 K]Applying Dixon Resultants in CryptographyTANG Xi-Jin and FENG Yong2007,18(7):1738-1745 [Abstract(4476)] [View PDF(5434)673.01 K]An Improved Formal Model of Cryptographic ProtocolZHANG Chang,WANG Ya-Di,HAN Ji-Hong and GUO Yuan-Bo2007,18(7):1746-1755 [Abstract(4159)] [View PDF(5887)824.71 K]A Parallelizable Message Authentication CodeWANG Da-Yin,LIN Dong-Dai and WU Wen-Ling2007,18(7):1756-1764 [Abstract(5040)] [View PDF(5417)505.24 K]Coverage-Ensured Reliable Links with Accurate Timing in Mobile Ad Hoc NetworkZHANG Zhi-Guo,LIU Cong and ZHANG Peng2007,18(7):1765-1773 [Abstract(3683)] [View PDF(5083)536.53 K]Construction of Elliptic Curves over Finite Fields with a Point of Given OrderWANG Kun-Peng and LI Bao2007,18(7):1774-1777 [Abstract(4444)] [View PDF(5598)250.29 K]Debt Relationship Based Fair File Exchange in Distributed Hash Table NetworkYU Kun,WU Guo-Xin,XU Li-Bo and CHEN Gang2007,18(7):1778-1785 [Abstract(4504)] [View PDF(5406)505.20 K]A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANETLU Xi-Cheng,AN Hui-Yao,PENG Yu-Xing and PENG Wei2007,18(7):1786-1798 [Abstract(4185)] [View PDF(5490)887.59 K]Compression of Tate Pairings on Elliptic CurvesHU Lei2007,18(7):1799-1805 [Abstract(4464)] [View PDF(5223)466.54 K]Hardware/Software Interface Design of Godson-2 Simultaneous Multithreading ProcessorLI Zu-Song,XU Xian-Chao,HU Wei-Wu and TANG Zhi-Min2007,18(7):1806-1817 [Abstract(4224)] [View PDF(5340)591.80 K]An NPV-Based Optimal Fault-Tolerant Routing Algorithm for Generalized HypercubeTIAN Shao-Huai,LU Ying-Ping and ZHANG Da-Fang2007,18(7):1818-1830 [Abstract(4226)] [View PDF(5064)1.35 M]Stream Task Scheduling Method for Deadline-Sensitive ApplicationsYU Ge,LI Xiao-Jing,YANG Xiao-Chun,OU Zheng-Yu and DENG Qing-Xu2007,18(7):1831-1843 [Abstract(4256)] [View PDF(5273)527.59 K]A Static Priority Assignment Algorithm with the Least Number of Priority LevelsXING Jian-Sheng,WANG Yong-Ji,LIU Jun-Xiang,ZENG Hai-Tao and NASRO Min-Allah2007,18(7):1844-1854 [Abstract(3976)] [View PDF(5710)734.26 K]
Lightweight Intrusion Detection System Based on Feature SelectionCHEN You,CHENG Xue-Qi,LI Yang and DAI Lei2007,18(7):1639-1651 [Abstract(7613)] [View PDF(10237)845.09 K]