Volume 15,Issue 8,2004 Table of Contents
Ripple-Effect Analysis of Software Architecture Evolution Based on Reachability MatrixWANG Ying-Hui,ZHANG Shi-Kun,LIU Yu and WANG Li-Fu2004,15(8):1107-1115 [Abstract(4564)] [View PDF(5848)752.23 K]An Improved Least-Slack-First Scheduling AlgorithmJIN Hong,WANG Hong-An,WANG Qiang and DAI Guo-Zhong2004,15(8):1116-1123 [Abstract(5269)] [View PDF(8318)726.65 K]A Secure Monitoring Model Based on the Clark-Wilson Integrity PoliciesQING Si-Han,WEN Hong-Zi,LEI Hao and WANG Jian2004,15(8):1124-1132 [Abstract(4311)] [View PDF(6977)745.65 K]Object Identification and Its Compression for Multi-Versioning TechniqueDOU Wan-Feng and LI Chun-Ping2004,15(8):1133-1140 [Abstract(3817)] [View PDF(5453)729.54 K]An Approach to Combination of Conflicting Evidences by Disturbance of IgnoranceLIN Zuo-Quan,MU Ke-Dian and HAN Qing2004,15(8):1150-1156 [Abstract(4840)] [View PDF(5822)634.47 K]An Agent-Based Database System Framework and Its Parallel Algorithm of RulesZHANG Mao-Yuan and LU Zheng-Ding2004,15(8):1157-1164 [Abstract(4240)] [View PDF(5321)696.84 K]Research on Closed Data Cube TechnologyLI Sheng-En and WANG Shan2004,15(8):1165-1171 [Abstract(4399)] [View PDF(6063)678.98 K]An Approach of Association Rules Mining with Maximal Nonblank for RecommendationWANG Da-Ling,YU Ge and BAO Yu-Bin2004,15(8):1182-1188 [Abstract(3790)] [View PDF(5224)602.42 K]Fast Updating of Globally Frequent ItemsetsYANG Ming,SUN Zhi-Hui and SONG Yu-Qing2004,15(8):1189-1197 [Abstract(4152)] [View PDF(6015)813.41 K]An Improved Algorithm Based on Maximum Clique and FP-Tree for Mining Association RulesCHEN An-Long,TANG Chang-Jie,TAO Hong-Cai,YUAN Chang-An and XIE Fang-Jun2004,15(8):1198-1207 [Abstract(5124)] [View PDF(5775)671.83 K]Adaptive Sampling Methodology in Network MeasurementsWANG Jun-Feng,YANG Jian-Hua,ZHOU Hong-Xia,XIE Gao-Gang and ZHOU Ming-Tian2004,15(8):1227-1236 [Abstract(4514)] [View PDF(6049)833.75 K]Searching the Optimal Route of a Mobile Agent in Multi-Provider Network EnvironmentZHAO Hui,HOU Jian-Rong and SHI Bai-Le2004,15(8):1237-1244 [Abstract(4159)] [View PDF(5518)835.44 K]Robust Public Watermarking Based on Chaotic MapWANG Hong-Xia,HE Chen and DING Ke2004,15(8):1245-1251 [Abstract(4098)] [View PDF(6305)1.50 M]A Video Watermarking Algorithm Based on 3D Gabor TransformZHANG Li-He,WU Hong-Tao and HU Chang-Li2004,15(8):1252-1258 [Abstract(4447)] [View PDF(6378)1.30 M]Security of Quantum Cryptography Against Trojan Horse AttackingZENG Gui-Hua2004,15(8):1259-1264 [Abstract(4136)] [View PDF(5241)479.74 K]
Research Progress in Spatio-Temporal ReasoningLIU Da-You,HU He,WANG Sheng-Sheng and XIE Qi2004,15(8):1141-1149 [Abstract(7688)] [View PDF(9360)743.42 K]Analysis and Management of Streaming Data: A SurveyJIN Che-Qing,QIAN Wei-Ning and ZHOU Ao-Ying2004,15(8):1172-1181 [Abstract(9630)] [View PDF(13888)814.96 K]Research and Development of Internet WormsWEN Wei-Ping,QING Si-Han,JIANG Jian-Chun and WANG Ye-Jun2004,15(8):1208-1219 [Abstract(16700)] [View PDF(17504)948.49 K]A Survey on Internet Topology ModelingZHANG Yu,ZHANG Hong-Li and FANG Bin-Xing2004,15(8):1220-1226 [Abstract(8553)] [View PDF(11495)606.53 K]