Volume 16,Issue 10,2005 Table of Contents

Other Issues:  
  
Contents

  • Approximate-Backbone Guided Fast Ant Algorithms to QAP
  • ZOU Peng,ZHOU Zhi,CHEN Guo-Liang,JIANG He and GU Jun
  • 2005,16(10):1691-1698 [Abstract(3239)]  [View PDF(3332)549.96 K]
  • A Practical Algorithm for Haplotyping by Maximum Parsimony
  • ZHANG Qiang-Feng,CHE Hao-Yang,CHEN Guo-Liang and SUN Guang-Zhong
  • 2005,16(10):1699-1707 [Abstract(2694)]  [View PDF(2621)588.96 K]
  • Effective Synchronization Removal in Concurrent Java Programs
  • WU Ping,CHEN Yi-Yun and ZHANG Jian
  • 2005,16(10):1708-1716 [Abstract(2837)]  [View PDF(3261)487.16 K]
  • An Extended Resources Model Based on Distributed Cognition Theory
  • WANG Chang-Qing,DENG Chang-Zhi,MA Cui-Xia,HUA Qing-Yi and DAI Guo-Zhong
  • 2005,16(10):1717-1725 [Abstract(2812)]  [View PDF(3157)1.29 M]
  • A Real-Time Dynamic Voltage Scaling Algorithm Based on Syntax Tree for Low Power
  • YI Hui-Zhan,CHEN Juan,YANG Xue-Jun and LIU Zhe
  • 2005,16(10):1726-1734 [Abstract(2684)]  [View PDF(3463)541.03 K]
  • Event Constraint Based Software Process Validation
  • GU Qing and CHEN Dao-Xu
  • 2005,16(10):1735-1742 [Abstract(2755)]  [View PDF(2699)541.03 K]
  • A Formal Method for Analyzing Electronic Commerce Protocols
  • QING Si-Han
  • 2005,16(10):1757-1765 [Abstract(2588)]  [View PDF(2889)412.54 K]
  • A Minimum Delay Spanning Tree Algorithm for the Application-Layer Multicast
  • CAO Jia and LU Shi-Wen
  • 2005,16(10):1766-1773 [Abstract(3220)]  [View PDF(4437)368.00 K]
  • A Generic Audit Policy Model on Multilevel Secure DBMS
  • HE Yong-Zhong,LI Lan and FENG Deng-Guo
  • 2005,16(10):1774-1783 [Abstract(2815)]  [View PDF(2785)524.99 K]
  • Extending the Theory of Strand Spaces
  • SHEN Hai-Feng,XUE Rui,HUANG He-Yan and CHEN Zhao-Xiong
  • 2005,16(10):1784-1789 [Abstract(2801)]  [View PDF(3132)488.57 K]
  • P2P-Oriented Secure Reliable Storage System
  • CHEN Ming,YANG Guang-Wen,LIU Xue-Zheng,SHI Shu-Ming and WANG Ding-Xing
  • 2005,16(10):1790-1797 [Abstract(2874)]  [View PDF(3182)332.04 K]
  • A Multiplicative Watermark Detection Algorithm for Digital Images in the DCT Domains
  • SUN Zhong-Wei and FENG Deng-Guo
  • 2005,16(10):1798-1804 [Abstract(2972)]  [View PDF(3769)496.95 K]
  • An Electronic Voting Scheme
  • LI Yan-Jiang,MA Chuan-Gui and HUANG Liu-Sheng
  • 2005,16(10):1805-1810 [Abstract(2668)]  [View PDF(3317)297.62 K]
  • A Study of Online Financial Trading Confirmation Scheme
  • CHEN Shun,YAO Qian and XIE Li
  • 2005,16(10):1811-1815 [Abstract(2842)]  [View PDF(2771)300.34 K]
  • An Anonymous Fingerprinting Scheme Based on Additively Homomorphic Public Key Cryptosystem
  • SUN Zhong-Wei,FENG Deng-Guo and WU Chuan-Kun
  • 2005,16(10):1816-1821 [Abstract(2747)]  [View PDF(3632)250.59 K]
  • Three Algorithms for Improving the Effectiveness of Software Pipelining:Comparison and Combination
  • LI Wen-Long,CHEN Yu,LIN Hai-Bo and TANG Zhi-Zhong
  • 2005,16(10):1822-1832 [Abstract(2512)]  [View PDF(3227)731.74 K]
  • Hiding Memory Access Latency in Software Pipelining
  • LIU Li,LI Wen-Long,CHEN Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1833-1841 [Abstract(3640)]  [View PDF(3266)619.93 K]
  • Optimization to Prevent Cache Penalty in Modulo Scheduling
  • LIU Li,LI Wen-Long,GUO Zhen-Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1842-1852 [Abstract(2860)]  [View PDF(2945)697.82 K]
  • Summarization of Results of Program Funded by NSFC in the Field of Natural Language Processing in Recent Years
  • XU Lin and ZHAO Tie-Jun
  • 2005,16(10):1853-1858 [Abstract(3463)]  [View PDF(4145)352.46 K]
  • Review Articles

  • Research on Theory and Approach of Provable Security
  • FENG Deng-Guo
  • 2005,16(10):1743-1756 [Abstract(7356)]  [View PDF(11165)545.62 K]