Volume 15,Issue 8,2004 Table of Contents

Other Issues:  
  
Contents

  • Ripple-Effect Analysis of Software Architecture Evolution Based on Reachability Matrix
  • WANG Ying-Hui,ZHANG Shi-Kun,LIU Yu and WANG Li-Fu
  • 2004,15(8):1107-1115 [Abstract(3270)]  [View PDF(3201)752.23 K]
  • An Improved Least-Slack-First Scheduling Algorithm
  • JIN Hong,WANG Hong-An,WANG Qiang and DAI Guo-Zhong
  • 2004,15(8):1116-1123 [Abstract(3607)]  [View PDF(4101)726.65 K]
  • A Secure Monitoring Model Based on the Clark-Wilson Integrity Policies
  • QING Si-Han,WEN Hong-Zi,LEI Hao and WANG Jian
  • 2004,15(8):1124-1132 [Abstract(2835)]  [View PDF(3626)745.65 K]
  • Object Identification and Its Compression for Multi-Versioning Technique
  • DOU Wan-Feng and LI Chun-Ping
  • 2004,15(8):1133-1140 [Abstract(2656)]  [View PDF(2960)729.54 K]
  • An Approach to Combination of Conflicting Evidences by Disturbance of Ignorance
  • LIN Zuo-Quan,MU Ke-Dian and HAN Qing
  • 2004,15(8):1150-1156 [Abstract(3544)]  [View PDF(3296)634.47 K]
  • An Agent-Based Database System Framework and Its Parallel Algorithm of Rules
  • ZHANG Mao-Yuan and LU Zheng-Ding
  • 2004,15(8):1157-1164 [Abstract(2955)]  [View PDF(2912)696.84 K]
  • Research on Closed Data Cube Technology
  • LI Sheng-En and WANG Shan
  • 2004,15(8):1165-1171 [Abstract(3129)]  [View PDF(3348)678.98 K]
  • An Approach of Association Rules Mining with Maximal Nonblank for Recommendation
  • WANG Da-Ling,YU Ge and BAO Yu-Bin
  • 2004,15(8):1182-1188 [Abstract(2605)]  [View PDF(2807)602.42 K]
  • Fast Updating of Globally Frequent Itemsets
  • YANG Ming,SUN Zhi-Hui and SONG Yu-Qing
  • 2004,15(8):1189-1197 [Abstract(2934)]  [View PDF(3401)813.41 K]
  • An Improved Algorithm Based on Maximum Clique and FP-Tree for Mining Association Rules
  • CHEN An-Long,TANG Chang-Jie,TAO Hong-Cai,YUAN Chang-An and XIE Fang-Jun
  • 2004,15(8):1198-1207 [Abstract(3737)]  [View PDF(3259)671.83 K]
  • Adaptive Sampling Methodology in Network Measurements
  • WANG Jun-Feng,YANG Jian-Hua,ZHOU Hong-Xia,XIE Gao-Gang and ZHOU Ming-Tian
  • 2004,15(8):1227-1236 [Abstract(3088)]  [View PDF(3118)833.75 K]
  • Searching the Optimal Route of a Mobile Agent in Multi-Provider Network Environment
  • ZHAO Hui,HOU Jian-Rong and SHI Bai-Le
  • 2004,15(8):1237-1244 [Abstract(2964)]  [View PDF(2868)835.44 K]
  • Robust Public Watermarking Based on Chaotic Map
  • WANG Hong-Xia,HE Chen and DING Ke
  • 2004,15(8):1245-1251 [Abstract(2804)]  [View PDF(3635)1.50 M]
  • A Video Watermarking Algorithm Based on 3D Gabor Transform
  • ZHANG Li-He,WU Hong-Tao and HU Chang-Li
  • 2004,15(8):1252-1258 [Abstract(3332)]  [View PDF(3860)1.30 M]
  • Security of Quantum Cryptography Against Trojan Horse Attacking
  • ZENG Gui-Hua
  • 2004,15(8):1259-1264 [Abstract(2978)]  [View PDF(2789)479.74 K]
  • Review Articles

  • Research Progress in Spatio-Temporal Reasoning
  • LIU Da-You,HU He,WANG Sheng-Sheng and XIE Qi
  • 2004,15(8):1141-1149 [Abstract(5470)]  [View PDF(5091)743.42 K]
  • Analysis and Management of Streaming Data: A Survey
  • JIN Che-Qing,QIAN Wei-Ning and ZHOU Ao-Ying
  • 2004,15(8):1172-1181 [Abstract(6908)]  [View PDF(7812)814.96 K]
  • Research and Development of Internet Worms
  • WEN Wei-Ping,QING Si-Han,JIANG Jian-Chun and WANG Ye-Jun
  • 2004,15(8):1208-1219 [Abstract(12303)]  [View PDF(7994)948.49 K]
  • A Survey on Internet Topology Modeling
  • ZHANG Yu,ZHANG Hong-Li and FANG Bin-Xing
  • 2004,15(8):1220-1226 [Abstract(6411)]  [View PDF(6937)606.53 K]