Volume 14,Issue 6,2003 Table of Contents

Other Issues:  
  
Contents

  • Performance Analysis of Strictly Synchronized Stochastic Petri Nets
  • LIU Hong,LIN Chuang and WU Jian-Ping
  • 2003,14(6):1029-1036 [Abstract(2449)]  [View PDF(3027)701.13 K]
  • Application of Net Reduction to Feedback Controller Design of Petri Nets
  • WANG Shou-Guang,YAN Gang-Feng and JIANG Jing-Ping
  • 2003,14(6):1037-1042 [Abstract(2763)]  [View PDF(2765)617.53 K]
  • Design of a Trust Valuation Model in Software Service Coordination
  • XU Feng,Lü Jian,ZHENG Wei and CAO Chun
  • 2003,14(6):1043-1051 [Abstract(4074)]  [View PDF(3147)761.29 K]
  • Study and Application of a Workflow Meta-Model
  • ZHAO Wen,HU Wen-Hui,ZHANG Shi-Kun and WANG Li-Fu
  • 2003,14(6):1052-1059 [Abstract(3283)]  [View PDF(7803)613.88 K]
  • Priority Mapping in Real-Time Middleware
  • GUO Chang-Guo,WANG Huai-Min,ZOU Peng and WANG Feng
  • 2003,14(6):1060-1065 [Abstract(3023)]  [View PDF(3023)612.50 K]
  • Research on Component Composition and Its Formal Reasoning
  • REN Hong-Min and QIAN Le-Qiu
  • 2003,14(6):1066-1074 [Abstract(3214)]  [View PDF(3877)730.96 K]
  • Super-Resolution Restoration with Multi-Scale Edge-Preserving Regularization
  • ZHANG Xin-Ming and SHEN Lan-Sun
  • 2003,14(6):1075-1081 [Abstract(3687)]  [View PDF(5467)846.60 K]
  • A Method for Singularity Detection in Fingerprint Images
  • TAN Tai-Zhe,NING Xin-Bao,YIN Yi-Long,ZHAN Xiao-Si and CHEN Yun
  • 2003,14(6):1082-1088 [Abstract(3462)]  [View PDF(3298)842.76 K]
  • A Fast Clustering Algorithm Based on Reference and Density
  • MA Shuai,WANG Teng-Jiao,TANG Shi-Wei,YANG Dong-Qing and GAO Jun
  • 2003,14(6):1089-1095 [Abstract(3413)]  [View PDF(5762)693.83 K]
  • A Self-Learning Model under Uncertain Condition
  • WANG Guo-Yin and HE Xiao
  • 2003,14(6):1096-1102 [Abstract(3104)]  [View PDF(3780)924.73 K]
  • A Multiple Classifiers Integration Method Based on Full Information Matrix
  • TANG Chun-Sheng and JIN Yi-Hui
  • 2003,14(6):1103-1109 [Abstract(2999)]  [View PDF(3280)643.97 K]
  • An Improved Elman Model and Recurrent Back-Propagation Control Neural Networks
  • SHI Xiao-Hu,LIANG Yan-Chun and XU Xu
  • 2003,14(6):1110-1119 [Abstract(3411)]  [View PDF(2971)1.12 M]
  • A Host-Based Anomaly Intrusion Detection Model Based on Genetic Programming
  • SU Pu-Rui,LI De-Quan and FENG Deng-Guo
  • 2003,14(6):1120-1126 [Abstract(3246)]  [View PDF(3004)537.27 K]
  • A High Performance Web Server Based on Pipeline
  • YAO Nian-Min,ZHENG Ming-Yang and JU Jiu-Bin
  • 2003,14(6):1127-1133 [Abstract(3642)]  [View PDF(3244)562.36 K]
  • Towards Adaptive Load Balancing Services for Web Application Servers
  • FAN Guo-Chuang,ZHU Huan,HUANG Tao and FENG Yu-Lin
  • 2003,14(6):1134-1141 [Abstract(2991)]  [View PDF(3346)631.54 K]
  • A Web Pre-Fetching Model Based on Analyzing User Access Pattern
  • XU Huan-Qing and WANG Yong-Cheng
  • 2003,14(6):1142-1147 [Abstract(3200)]  [View PDF(3847)602.73 K]
  • A Security Model for Cryptographic Protocols
  • LIU Yi-Wen,LI Wei-Qin and FENG Deng-Guo
  • 2003,14(6):1148-1156 [Abstract(3489)]  [View PDF(2753)716.32 K]
  • A Multimedia Authentication System Combining Digital Signature and Digital Watermarking
  • HU Jun-Quan,HUANG Ji-Wu,ZHANG Long-Jun and HUANG Da-Ren
  • 2003,14(6):1157-1163 [Abstract(3136)]  [View PDF(3728)743.72 K]
  • Two Classes of Robust Threshold Key Escrow Schemes
  • CAO Zhen-Fu
  • 2003,14(6):1164-1171 [Abstract(3013)]  [View PDF(3163)699.52 K]
  • A Digital Fingerprinting Algorithm Based on Binary Codes
  • WANG Yan,Lü Shu-Wang and XU Han-Liang
  • 2003,14(6):1172-1177 [Abstract(3399)]  [View PDF(3367)611.05 K]
  • Analyzing and Improving the TCP Stability in Wireless Ad Hoc Networks
  • LI Yun,CHEN Qian-Bin,LONG Ke-Ping and WU Shi-Qi
  • 2003,14(6):1178-1186 [Abstract(3660)]  [View PDF(3916)855.56 K]