Volume 15,Issue 8,2004 Table of Contents

Other Issues:  
  
Contents

  • Ripple-Effect Analysis of Software Architecture Evolution Based on Reachability Matrix
  • WANG Ying-Hui,ZHANG Shi-Kun,LIU Yu and WANG Li-Fu
  • 2004,15(8):1107-1115 [Abstract(4553)]  [View PDF(5682)752.23 K]
  • An Improved Least-Slack-First Scheduling Algorithm
  • JIN Hong,WANG Hong-An,WANG Qiang and DAI Guo-Zhong
  • 2004,15(8):1116-1123 [Abstract(5234)]  [View PDF(8163)726.65 K]
  • A Secure Monitoring Model Based on the Clark-Wilson Integrity Policies
  • QING Si-Han,WEN Hong-Zi,LEI Hao and WANG Jian
  • 2004,15(8):1124-1132 [Abstract(4281)]  [View PDF(6829)745.65 K]
  • Object Identification and Its Compression for Multi-Versioning Technique
  • DOU Wan-Feng and LI Chun-Ping
  • 2004,15(8):1133-1140 [Abstract(3804)]  [View PDF(5331)729.54 K]
  • An Approach to Combination of Conflicting Evidences by Disturbance of Ignorance
  • LIN Zuo-Quan,MU Ke-Dian and HAN Qing
  • 2004,15(8):1150-1156 [Abstract(4812)]  [View PDF(5694)634.47 K]
  • An Agent-Based Database System Framework and Its Parallel Algorithm of Rules
  • ZHANG Mao-Yuan and LU Zheng-Ding
  • 2004,15(8):1157-1164 [Abstract(4198)]  [View PDF(5182)696.84 K]
  • Research on Closed Data Cube Technology
  • LI Sheng-En and WANG Shan
  • 2004,15(8):1165-1171 [Abstract(4368)]  [View PDF(5907)678.98 K]
  • An Approach of Association Rules Mining with Maximal Nonblank for Recommendation
  • WANG Da-Ling,YU Ge and BAO Yu-Bin
  • 2004,15(8):1182-1188 [Abstract(3769)]  [View PDF(5081)602.42 K]
  • Fast Updating of Globally Frequent Itemsets
  • YANG Ming,SUN Zhi-Hui and SONG Yu-Qing
  • 2004,15(8):1189-1197 [Abstract(4121)]  [View PDF(5889)813.41 K]
  • An Improved Algorithm Based on Maximum Clique and FP-Tree for Mining Association Rules
  • CHEN An-Long,TANG Chang-Jie,TAO Hong-Cai,YUAN Chang-An and XIE Fang-Jun
  • 2004,15(8):1198-1207 [Abstract(5079)]  [View PDF(5631)671.83 K]
  • Adaptive Sampling Methodology in Network Measurements
  • WANG Jun-Feng,YANG Jian-Hua,ZHOU Hong-Xia,XIE Gao-Gang and ZHOU Ming-Tian
  • 2004,15(8):1227-1236 [Abstract(4488)]  [View PDF(5892)833.75 K]
  • Searching the Optimal Route of a Mobile Agent in Multi-Provider Network Environment
  • ZHAO Hui,HOU Jian-Rong and SHI Bai-Le
  • 2004,15(8):1237-1244 [Abstract(4136)]  [View PDF(5405)835.44 K]
  • Robust Public Watermarking Based on Chaotic Map
  • WANG Hong-Xia,HE Chen and DING Ke
  • 2004,15(8):1245-1251 [Abstract(4078)]  [View PDF(6143)1.50 M]
  • A Video Watermarking Algorithm Based on 3D Gabor Transform
  • ZHANG Li-He,WU Hong-Tao and HU Chang-Li
  • 2004,15(8):1252-1258 [Abstract(4411)]  [View PDF(6256)1.30 M]
  • Security of Quantum Cryptography Against Trojan Horse Attacking
  • ZENG Gui-Hua
  • 2004,15(8):1259-1264 [Abstract(4106)]  [View PDF(5106)479.74 K]
  • Review Articles

  • Research Progress in Spatio-Temporal Reasoning
  • LIU Da-You,HU He,WANG Sheng-Sheng and XIE Qi
  • 2004,15(8):1141-1149 [Abstract(7655)]  [View PDF(9014)743.42 K]
  • Analysis and Management of Streaming Data: A Survey
  • JIN Che-Qing,QIAN Wei-Ning and ZHOU Ao-Ying
  • 2004,15(8):1172-1181 [Abstract(9573)]  [View PDF(13494)814.96 K]
  • Research and Development of Internet Worms
  • WEN Wei-Ping,QING Si-Han,JIANG Jian-Chun and WANG Ye-Jun
  • 2004,15(8):1208-1219 [Abstract(16634)]  [View PDF(16525)948.49 K]
  • A Survey on Internet Topology Modeling
  • ZHANG Yu,ZHANG Hong-Li and FANG Bin-Xing
  • 2004,15(8):1220-1226 [Abstract(8511)]  [View PDF(11161)606.53 K]