Volume 15,Issue 8,2004 Table of Contents

Other Issues:  
  
Contents

  • Ripple-Effect Analysis of Software Architecture Evolution Based on Reachability Matrix
  • WANG Ying-Hui,ZHANG Shi-Kun,LIU Yu and WANG Li-Fu
  • 2004,15(8):1107-1115 [Abstract(3131)]  [View PDF(3137)752.23 K]
  • An Improved Least-Slack-First Scheduling Algorithm
  • JIN Hong,WANG Hong-An,WANG Qiang and DAI Guo-Zhong
  • 2004,15(8):1116-1123 [Abstract(3474)]  [View PDF(3952)726.65 K]
  • A Secure Monitoring Model Based on the Clark-Wilson Integrity Policies
  • QING Si-Han,WEN Hong-Zi,LEI Hao and WANG Jian
  • 2004,15(8):1124-1132 [Abstract(2702)]  [View PDF(3553)745.65 K]
  • Object Identification and Its Compression for Multi-Versioning Technique
  • DOU Wan-Feng and LI Chun-Ping
  • 2004,15(8):1133-1140 [Abstract(2503)]  [View PDF(2875)729.54 K]
  • An Approach to Combination of Conflicting Evidences by Disturbance of Ignorance
  • LIN Zuo-Quan,MU Ke-Dian and HAN Qing
  • 2004,15(8):1150-1156 [Abstract(3385)]  [View PDF(3156)634.47 K]
  • An Agent-Based Database System Framework and Its Parallel Algorithm of Rules
  • ZHANG Mao-Yuan and LU Zheng-Ding
  • 2004,15(8):1157-1164 [Abstract(2838)]  [View PDF(2852)696.84 K]
  • Research on Closed Data Cube Technology
  • LI Sheng-En and WANG Shan
  • 2004,15(8):1165-1171 [Abstract(3003)]  [View PDF(3218)678.98 K]
  • An Approach of Association Rules Mining with Maximal Nonblank for Recommendation
  • WANG Da-Ling,YU Ge and BAO Yu-Bin
  • 2004,15(8):1182-1188 [Abstract(2484)]  [View PDF(2733)602.42 K]
  • Fast Updating of Globally Frequent Itemsets
  • YANG Ming,SUN Zhi-Hui and SONG Yu-Qing
  • 2004,15(8):1189-1197 [Abstract(2804)]  [View PDF(3324)813.41 K]
  • An Improved Algorithm Based on Maximum Clique and FP-Tree for Mining Association Rules
  • CHEN An-Long,TANG Chang-Jie,TAO Hong-Cai,YUAN Chang-An and XIE Fang-Jun
  • 2004,15(8):1198-1207 [Abstract(3437)]  [View PDF(3179)671.83 K]
  • Adaptive Sampling Methodology in Network Measurements
  • WANG Jun-Feng,YANG Jian-Hua,ZHOU Hong-Xia,XIE Gao-Gang and ZHOU Ming-Tian
  • 2004,15(8):1227-1236 [Abstract(2934)]  [View PDF(3033)833.75 K]
  • Searching the Optimal Route of a Mobile Agent in Multi-Provider Network Environment
  • ZHAO Hui,HOU Jian-Rong and SHI Bai-Le
  • 2004,15(8):1237-1244 [Abstract(2804)]  [View PDF(2812)835.44 K]
  • Robust Public Watermarking Based on Chaotic Map
  • WANG Hong-Xia,HE Chen and DING Ke
  • 2004,15(8):1245-1251 [Abstract(2664)]  [View PDF(3558)1.50 M]
  • A Video Watermarking Algorithm Based on 3D Gabor Transform
  • ZHANG Li-He,WU Hong-Tao and HU Chang-Li
  • 2004,15(8):1252-1258 [Abstract(3171)]  [View PDF(3759)1.30 M]
  • Security of Quantum Cryptography Against Trojan Horse Attacking
  • ZENG Gui-Hua
  • 2004,15(8):1259-1264 [Abstract(2843)]  [View PDF(2724)479.74 K]
  • Review Articles

  • Research Progress in Spatio-Temporal Reasoning
  • LIU Da-You,HU He,WANG Sheng-Sheng and XIE Qi
  • 2004,15(8):1141-1149 [Abstract(5196)]  [View PDF(4986)743.42 K]
  • Analysis and Management of Streaming Data: A Survey
  • JIN Che-Qing,QIAN Wei-Ning and ZHOU Ao-Ying
  • 2004,15(8):1172-1181 [Abstract(6470)]  [View PDF(7658)814.96 K]
  • Research and Development of Internet Worms
  • WEN Wei-Ping,QING Si-Han,JIANG Jian-Chun and WANG Ye-Jun
  • 2004,15(8):1208-1219 [Abstract(11131)]  [View PDF(7801)948.49 K]
  • A Survey on Internet Topology Modeling
  • ZHANG Yu,ZHANG Hong-Li and FANG Bin-Xing
  • 2004,15(8):1220-1226 [Abstract(6108)]  [View PDF(6795)606.53 K]