Volume 16,Issue 10,2005 Table of Contents

Other Issues:  
  
Contents

  • Approximate-Backbone Guided Fast Ant Algorithms to QAP
  • ZOU Peng,ZHOU Zhi,CHEN Guo-Liang,JIANG He and GU Jun
  • 2005,16(10):1691-1698 [Abstract(3709)]  [View PDF(3606)549.96 K]
  • A Practical Algorithm for Haplotyping by Maximum Parsimony
  • ZHANG Qiang-Feng,CHE Hao-Yang,CHEN Guo-Liang and SUN Guang-Zhong
  • 2005,16(10):1699-1707 [Abstract(3118)]  [View PDF(2891)588.96 K]
  • Effective Synchronization Removal in Concurrent Java Programs
  • WU Ping,CHEN Yi-Yun and ZHANG Jian
  • 2005,16(10):1708-1716 [Abstract(3257)]  [View PDF(3543)487.16 K]
  • An Extended Resources Model Based on Distributed Cognition Theory
  • WANG Chang-Qing,DENG Chang-Zhi,MA Cui-Xia,HUA Qing-Yi and DAI Guo-Zhong
  • 2005,16(10):1717-1725 [Abstract(3205)]  [View PDF(3450)1.29 M]
  • A Real-Time Dynamic Voltage Scaling Algorithm Based on Syntax Tree for Low Power
  • YI Hui-Zhan,CHEN Juan,YANG Xue-Jun and LIU Zhe
  • 2005,16(10):1726-1734 [Abstract(3113)]  [View PDF(3749)541.03 K]
  • Event Constraint Based Software Process Validation
  • GU Qing and CHEN Dao-Xu
  • 2005,16(10):1735-1742 [Abstract(3186)]  [View PDF(2902)541.03 K]
  • A Formal Method for Analyzing Electronic Commerce Protocols
  • QING Si-Han
  • 2005,16(10):1757-1765 [Abstract(3004)]  [View PDF(3141)412.54 K]
  • A Minimum Delay Spanning Tree Algorithm for the Application-Layer Multicast
  • CAO Jia and LU Shi-Wen
  • 2005,16(10):1766-1773 [Abstract(3652)]  [View PDF(4711)368.00 K]
  • A Generic Audit Policy Model on Multilevel Secure DBMS
  • HE Yong-Zhong,LI Lan and FENG Deng-Guo
  • 2005,16(10):1774-1783 [Abstract(3283)]  [View PDF(3055)524.99 K]
  • Extending the Theory of Strand Spaces
  • SHEN Hai-Feng,XUE Rui,HUANG He-Yan and CHEN Zhao-Xiong
  • 2005,16(10):1784-1789 [Abstract(3204)]  [View PDF(3377)488.57 K]
  • P2P-Oriented Secure Reliable Storage System
  • CHEN Ming,YANG Guang-Wen,LIU Xue-Zheng,SHI Shu-Ming and WANG Ding-Xing
  • 2005,16(10):1790-1797 [Abstract(3333)]  [View PDF(3507)332.04 K]
  • A Multiplicative Watermark Detection Algorithm for Digital Images in the DCT Domains
  • SUN Zhong-Wei and FENG Deng-Guo
  • 2005,16(10):1798-1804 [Abstract(3399)]  [View PDF(4254)496.95 K]
  • An Electronic Voting Scheme
  • LI Yan-Jiang,MA Chuan-Gui and HUANG Liu-Sheng
  • 2005,16(10):1805-1810 [Abstract(3050)]  [View PDF(3813)297.62 K]
  • A Study of Online Financial Trading Confirmation Scheme
  • CHEN Shun,YAO Qian and XIE Li
  • 2005,16(10):1811-1815 [Abstract(3253)]  [View PDF(3012)300.34 K]
  • An Anonymous Fingerprinting Scheme Based on Additively Homomorphic Public Key Cryptosystem
  • SUN Zhong-Wei,FENG Deng-Guo and WU Chuan-Kun
  • 2005,16(10):1816-1821 [Abstract(3210)]  [View PDF(3913)250.59 K]
  • Three Algorithms for Improving the Effectiveness of Software Pipelining:Comparison and Combination
  • LI Wen-Long,CHEN Yu,LIN Hai-Bo and TANG Zhi-Zhong
  • 2005,16(10):1822-1832 [Abstract(2924)]  [View PDF(3615)731.74 K]
  • Hiding Memory Access Latency in Software Pipelining
  • LIU Li,LI Wen-Long,CHEN Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1833-1841 [Abstract(4112)]  [View PDF(3566)619.93 K]
  • Optimization to Prevent Cache Penalty in Modulo Scheduling
  • LIU Li,LI Wen-Long,GUO Zhen-Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1842-1852 [Abstract(3315)]  [View PDF(3240)697.82 K]
  • Summarization of Results of Program Funded by NSFC in the Field of Natural Language Processing in Recent Years
  • XU Lin and ZHAO Tie-Jun
  • 2005,16(10):1853-1858 [Abstract(3866)]  [View PDF(4478)352.46 K]
  • Review Articles

  • Research on Theory and Approach of Provable Security
  • FENG Deng-Guo
  • 2005,16(10):1743-1756 [Abstract(8179)]  [View PDF(13844)545.62 K]