Volume 16,Issue 10,2005 Table of Contents

Other Issues:  
  
Contents

  • Approximate-Backbone Guided Fast Ant Algorithms to QAP
  • ZOU Peng,ZHOU Zhi,CHEN Guo-Liang,JIANG He and GU Jun
  • 2005,16(10):1691-1698 [Abstract(4596)]  [View PDF(5193)549.96 K]
  • A Practical Algorithm for Haplotyping by Maximum Parsimony
  • ZHANG Qiang-Feng,CHE Hao-Yang,CHEN Guo-Liang and SUN Guang-Zhong
  • 2005,16(10):1699-1707 [Abstract(3884)]  [View PDF(4516)588.96 K]
  • Effective Synchronization Removal in Concurrent Java Programs
  • WU Ping,CHEN Yi-Yun and ZHANG Jian
  • 2005,16(10):1708-1716 [Abstract(4032)]  [View PDF(5289)487.16 K]
  • An Extended Resources Model Based on Distributed Cognition Theory
  • WANG Chang-Qing,DENG Chang-Zhi,MA Cui-Xia,HUA Qing-Yi and DAI Guo-Zhong
  • 2005,16(10):1717-1725 [Abstract(3913)]  [View PDF(5189)1.29 M]
  • A Real-Time Dynamic Voltage Scaling Algorithm Based on Syntax Tree for Low Power
  • YI Hui-Zhan,CHEN Juan,YANG Xue-Jun and LIU Zhe
  • 2005,16(10):1726-1734 [Abstract(3962)]  [View PDF(5493)541.03 K]
  • Event Constraint Based Software Process Validation
  • GU Qing and CHEN Dao-Xu
  • 2005,16(10):1735-1742 [Abstract(3945)]  [View PDF(4405)541.03 K]
  • A Formal Method for Analyzing Electronic Commerce Protocols
  • QING Si-Han
  • 2005,16(10):1757-1765 [Abstract(3822)]  [View PDF(4638)412.54 K]
  • A Minimum Delay Spanning Tree Algorithm for the Application-Layer Multicast
  • CAO Jia and LU Shi-Wen
  • 2005,16(10):1766-1773 [Abstract(4489)]  [View PDF(6388)368.00 K]
  • A Generic Audit Policy Model on Multilevel Secure DBMS
  • HE Yong-Zhong,LI Lan and FENG Deng-Guo
  • 2005,16(10):1774-1783 [Abstract(4119)]  [View PDF(4601)524.99 K]
  • Extending the Theory of Strand Spaces
  • SHEN Hai-Feng,XUE Rui,HUANG He-Yan and CHEN Zhao-Xiong
  • 2005,16(10):1784-1789 [Abstract(3951)]  [View PDF(4933)488.57 K]
  • P2P-Oriented Secure Reliable Storage System
  • CHEN Ming,YANG Guang-Wen,LIU Xue-Zheng,SHI Shu-Ming and WANG Ding-Xing
  • 2005,16(10):1790-1797 [Abstract(4123)]  [View PDF(5018)332.04 K]
  • A Multiplicative Watermark Detection Algorithm for Digital Images in the DCT Domains
  • SUN Zhong-Wei and FENG Deng-Guo
  • 2005,16(10):1798-1804 [Abstract(4176)]  [View PDF(5874)496.95 K]
  • An Electronic Voting Scheme
  • LI Yan-Jiang,MA Chuan-Gui and HUANG Liu-Sheng
  • 2005,16(10):1805-1810 [Abstract(3820)]  [View PDF(5523)297.62 K]
  • A Study of Online Financial Trading Confirmation Scheme
  • CHEN Shun,YAO Qian and XIE Li
  • 2005,16(10):1811-1815 [Abstract(3948)]  [View PDF(4457)300.34 K]
  • An Anonymous Fingerprinting Scheme Based on Additively Homomorphic Public Key Cryptosystem
  • SUN Zhong-Wei,FENG Deng-Guo and WU Chuan-Kun
  • 2005,16(10):1816-1821 [Abstract(3908)]  [View PDF(5636)250.59 K]
  • Three Algorithms for Improving the Effectiveness of Software Pipelining:Comparison and Combination
  • LI Wen-Long,CHEN Yu,LIN Hai-Bo and TANG Zhi-Zhong
  • 2005,16(10):1822-1832 [Abstract(3754)]  [View PDF(5397)731.74 K]
  • Hiding Memory Access Latency in Software Pipelining
  • LIU Li,LI Wen-Long,CHEN Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1833-1841 [Abstract(5130)]  [View PDF(5218)619.93 K]
  • Optimization to Prevent Cache Penalty in Modulo Scheduling
  • LIU Li,LI Wen-Long,GUO Zhen-Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1842-1852 [Abstract(4125)]  [View PDF(4753)697.82 K]
  • Summarization of Results of Program Funded by NSFC in the Field of Natural Language Processing in Recent Years
  • XU Lin and ZHAO Tie-Jun
  • 2005,16(10):1853-1858 [Abstract(4698)]  [View PDF(6613)352.46 K]
  • Review Articles

  • Research on Theory and Approach of Provable Security
  • FENG Deng-Guo
  • 2005,16(10):1743-1756 [Abstract(10127)]  [View PDF(19670)545.62 K]