Volume 17,Issue 8,2006 Table of Contents
A Functional Requirement Based Hierarchical Agglomerative Approach to Program ClusteringZHANG Lu,MEI Hong and SUN Jia-Su2006,17(8):1661-1668 [Abstract(4634)] [View PDF(5456)482.47 K]A PDCA-Based Software Process Control and Improvement ModelWU Zhan-Chun,WANG Qing and LI Ming-Shu2006,17(8):1669-1680 [Abstract(4775)] [View PDF(6611)685.07 K]Software Reliability Modeling Based on Unascertained TheoryZHANG Yong-Qiang and SUN Sheng-Juan2006,17(8):1681-1687 [Abstract(4445)] [View PDF(6626)426.84 K]An Automated Approach for Structural Test Data Generation Based on Messy GAXUE Yun-Zhi,CHEN Wei,WANG Yong-Ji,ZHAO Chen and WANG Qing2006,17(8):1688-1697 [Abstract(4461)] [View PDF(5591)630.87 K]An Action Semantic-Based Approach to UML1.X-2.0 Model TransformationCHEN Xiu-Hong,HE Ke-Qing and HE Lu-Lu2006,17(8):1698-1706 [Abstract(4189)] [View PDF(4997)487.77 K]A Multi-Dimensional Separation of Concerns Approach for Model Driven Process Framework ModelingDUAN Yu-Cong and GU Yu-Qing2006,17(8):1707-1716 [Abstract(4436)] [View PDF(5469)573.41 K]Representation of Mathematical Knowledge in National Knowledge InfrastructureCAO Cun-Gen,SUI Yue-Fei,SUN Yu and ZENG Qing-Tian2006,17(8):1731-1742 [Abstract(4436)] [View PDF(6312)649.97 K]An Iceberg Cube Algorithm for Large Compressed Data WarehousesLUO Ji-Zhou,LI Jian-Zhong and ZHAO Kai2006,17(8):1743-1752 [Abstract(4773)] [View PDF(5588)593.05 K]An Anti-Noise Algorithm for Mining Asynchronous Coincidence Pattern in Multi-StreamsCHEN An-Long,TANG Chang-Jie,YUAN Chang-An,PENG Jing and HU Jian-Jun2006,17(8):1753-1763 [Abstract(4049)] [View PDF(5167)792.33 K]An Effective Method for Privacy Preserving Association Rule MiningZHANG Peng,TONG Yun-Hai,TANG Shi-Wei,YANG Dong-Qing and MA Xiu-Li2006,17(8):1764-1774 [Abstract(6347)] [View PDF(7339)654.90 K]Time Stratified Packet Sampling Based on Measurement Buffer for Flow MeasurementWANG Hong-Bo,WEI An-Ming,LIN Yu and CHENG Shi-Duan2006,17(8):1775-1784 [Abstract(4203)] [View PDF(5182)696.68 K]An Energy-Efficient Data Dissemination Protocol in Large-Scale Sensor NetworksSHI Gao-Tao and LIAO Ming-Hong2006,17(8):1785-1795 [Abstract(4186)] [View PDF(5509)915.80 K]A Fast Outlier Detection Algorithm for Data Streams Based on Dynamic GridsYANG Yi-Dong,SUN Zhi-Hui,ZHU Yu-Quan,YANG Ming and ZHANG Bo-Li2006,17(8):1796-1803 [Abstract(4515)] [View PDF(5467)569.09 K]Security Analysis on Administrative Model of Role-Based Access ControlYANG Qiu-Wei,HONG Fan,YANG Mu-Xiang and ZHU Xian2006,17(8):1804-1810 [Abstract(5268)] [View PDF(5952)436.67 K]A Key Agreement Scheme for Mobile Ad Hoc Networks Based on Password AuthenticationWANG Xiao-Feng,ZHANG Jing,WANG Shang-Ping,ZHANG Ya-Ling and QIN Bo2006,17(8):1811-1817 [Abstract(4111)] [View PDF(5383)520.12 K]A Distributed Trust Model with High-Compatibility Based on Bridge CAZHU Peng-Fei,DAI Ying-Xia and BAO Xu-Hua2006,17(8):1818-1823 [Abstract(4616)] [View PDF(5674)314.71 K]
P2P Data ManagementYU Min,LI Zhan-Huai and ZHANG Long-Bo2006,17(8):1717-1730 [Abstract(8283)] [View PDF(8933)711.00 K]