Volume 15,Issue 8,2004 Table of Contents
Ripple-Effect Analysis of Software Architecture Evolution Based on Reachability MatrixWANG Ying-Hui,ZHANG Shi-Kun,LIU Yu and WANG Li-Fu2004,15(8):1107-1115 [Abstract(4553)] [View PDF(5682)752.23 K]An Improved Least-Slack-First Scheduling AlgorithmJIN Hong,WANG Hong-An,WANG Qiang and DAI Guo-Zhong2004,15(8):1116-1123 [Abstract(5234)] [View PDF(8163)726.65 K]A Secure Monitoring Model Based on the Clark-Wilson Integrity PoliciesQING Si-Han,WEN Hong-Zi,LEI Hao and WANG Jian2004,15(8):1124-1132 [Abstract(4281)] [View PDF(6829)745.65 K]Object Identification and Its Compression for Multi-Versioning TechniqueDOU Wan-Feng and LI Chun-Ping2004,15(8):1133-1140 [Abstract(3804)] [View PDF(5331)729.54 K]An Approach to Combination of Conflicting Evidences by Disturbance of IgnoranceLIN Zuo-Quan,MU Ke-Dian and HAN Qing2004,15(8):1150-1156 [Abstract(4812)] [View PDF(5694)634.47 K]An Agent-Based Database System Framework and Its Parallel Algorithm of RulesZHANG Mao-Yuan and LU Zheng-Ding2004,15(8):1157-1164 [Abstract(4198)] [View PDF(5182)696.84 K]Research on Closed Data Cube TechnologyLI Sheng-En and WANG Shan2004,15(8):1165-1171 [Abstract(4368)] [View PDF(5907)678.98 K]An Approach of Association Rules Mining with Maximal Nonblank for RecommendationWANG Da-Ling,YU Ge and BAO Yu-Bin2004,15(8):1182-1188 [Abstract(3769)] [View PDF(5081)602.42 K]Fast Updating of Globally Frequent ItemsetsYANG Ming,SUN Zhi-Hui and SONG Yu-Qing2004,15(8):1189-1197 [Abstract(4121)] [View PDF(5889)813.41 K]An Improved Algorithm Based on Maximum Clique and FP-Tree for Mining Association RulesCHEN An-Long,TANG Chang-Jie,TAO Hong-Cai,YUAN Chang-An and XIE Fang-Jun2004,15(8):1198-1207 [Abstract(5079)] [View PDF(5631)671.83 K]Adaptive Sampling Methodology in Network MeasurementsWANG Jun-Feng,YANG Jian-Hua,ZHOU Hong-Xia,XIE Gao-Gang and ZHOU Ming-Tian2004,15(8):1227-1236 [Abstract(4488)] [View PDF(5892)833.75 K]Searching the Optimal Route of a Mobile Agent in Multi-Provider Network EnvironmentZHAO Hui,HOU Jian-Rong and SHI Bai-Le2004,15(8):1237-1244 [Abstract(4136)] [View PDF(5405)835.44 K]Robust Public Watermarking Based on Chaotic MapWANG Hong-Xia,HE Chen and DING Ke2004,15(8):1245-1251 [Abstract(4078)] [View PDF(6143)1.50 M]A Video Watermarking Algorithm Based on 3D Gabor TransformZHANG Li-He,WU Hong-Tao and HU Chang-Li2004,15(8):1252-1258 [Abstract(4411)] [View PDF(6256)1.30 M]Security of Quantum Cryptography Against Trojan Horse AttackingZENG Gui-Hua2004,15(8):1259-1264 [Abstract(4106)] [View PDF(5106)479.74 K]
Research Progress in Spatio-Temporal ReasoningLIU Da-You,HU He,WANG Sheng-Sheng and XIE Qi2004,15(8):1141-1149 [Abstract(7655)] [View PDF(9014)743.42 K]Analysis and Management of Streaming Data: A SurveyJIN Che-Qing,QIAN Wei-Ning and ZHOU Ao-Ying2004,15(8):1172-1181 [Abstract(9573)] [View PDF(13494)814.96 K]Research and Development of Internet WormsWEN Wei-Ping,QING Si-Han,JIANG Jian-Chun and WANG Ye-Jun2004,15(8):1208-1219 [Abstract(16634)] [View PDF(16525)948.49 K]A Survey on Internet Topology ModelingZHANG Yu,ZHANG Hong-Li and FANG Bin-Xing2004,15(8):1220-1226 [Abstract(8511)] [View PDF(11161)606.53 K]